Chromium OS is cool. Chromium OS with crouton is cooler. Chromium OS with Docker is even cooler. This is specifically a guide for the Chromebook Pixel 2 (2015), but I can't think of any reason it wouldn't work with other devices.
#!/bin/bash | |
DEBUG=1; | |
if [ "$(id -u)" != "0" ]; then | |
echo "This script must be run as root" 1>&2 | |
exit 1 | |
fi | |
GREP="`which grep`"; |
# set up iam users, groups, roles, policies for cross account sts assume role access | |
# devs have near full rights to dev account, read access to prod with mfa requirement | |
# works great with a bit of https://github.com/remind101/assume-role for cli switching | |
# create a thing in one account vs the other | |
variable "prod_enable_flag" { | |
default = { | |
stage = 0 | |
prod = 1 |
#!/usr/bin/env ruby | |
require "socket" | |
require "uri" | |
if ENV["DATABASE_URL"] | |
url = URI.parse ENV["DATABASE_URL"] | |
puts "Waiting for DB on #{url}..." | |
30.times do | |
begin |
A curated list of AWS resources to prepare for the AWS Certifications
A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.
Index:
BR2_HAVE_DOT_CONFIG=y | |
BR2_ARCH_IS_64=y | |
BR2_x86_64=y | |
BR2_ARCH="x86_64" | |
BR2_ENDIAN="LITTLE" | |
BR2_GCC_TARGET_ARCH="nocona" | |
BR2_ARCH_HAS_ATOMICS=y | |
BR2_X86_CPU_HAS_MMX=y | |
BR2_X86_CPU_HAS_SSE=y | |
BR2_X86_CPU_HAS_SSE2=y |
{ | |
"ignition": { "version": "2.0.0" }, | |
"systemd": { | |
"units": [ | |
{ | |
"name": "auto-update-kmods.service", | |
"enable": true, | |
"contents": "[Unit]\nDescription=Install custom kernel modules\nAfter=lib-modules.mount network-online.target\nRequires=lib-modules.mount network-online.target\nConditionPathExists=!/opt/modules/%v\nConditionPathExistsGlob=/lib/modules/auto-update-kmods.d/*.sh\n\n[Service]\nType=oneshot\nExecStart=/bin/bash -ex /lib/modules/auto-update-kmods.sh\n\n[Install]\nWantedBy=multi-user.target\n" | |
}, | |
{ |
package main | |
import ( | |
"fmt" | |
"io" | |
"os" | |
) | |
var path = "/Users/novalagung/Documents/temp/test.txt" |
Currently, there is an explosion of tools that aim to manage secrets for automated, cloud native infrastructure management. Daniel Somerfield did some work classifying the various approaches, but (as far as I know) no one has made a recent effort to summarize the various tools.
This is an attempt to give a quick overview of what can be found out there. The list is alphabetical. There will be tools that are missing, and some of the facts might be wrong--I welcome your corrections. For the purpose, I can be reached via @maxvt on Twitter, or just leave me a comment here.
There is a companion feature matrix of various tools. Comments are welcome in the same manner.
In a terminal start a server.
$ python -m SimpleHTTPServer 8000
In another terminal set up the cgroups freezer.