I hereby claim:
- I am leucos on github.
- I am leucos (https://keybase.io/leucos) on keybase.
- I have a public key whose fingerprint is FA67 4EDA D648 9E50 BFA4 3F29 FDF5 4971 24B3 5C22
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/bin/sh | |
if [ ! -r '.vault_password' ]; then | |
exit 1 | |
fi | |
tmp=`mktemp` | |
cat > $tmp | |
ansible-vault encrypt $tmp --vault-password-file=.vault_password > /dev/null 2>&1 |
#!/bin/bash | |
# | |
# CI provisionning script | |
# | |
# This script will prepare CI run environments for Ansible roles | |
# It can be used in Travis or Vagrant | |
# | |
# It will also install itslef in /usr/local/bin/spec for subsequent runs in | |
# Vagrant | |
# |
#!/bin/sh | |
# | |
# Post-commit hook that decrypts files containing '$ANSIBLE_VAULT' | |
# | |
# File should be .git/hooks/post-commit and executable | |
CRYPT_TAG='^\$ANSIBLE_VAULT' | |
EXIT_STATUS=0 | |
wipe="\033[1m\033[0m" |
#!/bin/bash | |
# | |
# Pre-commit hook that verifies if all files containing 'vault' in the name | |
# are encrypted. | |
# If not, commit will fail with an error message | |
# | |
# Original author: @ralovely | |
# https://www.reinteractive.net/posts/167-ansible-real-life-good-practices | |
# | |
# File should be .git/hooks/pre-commit and executable |
#!/bin/bash | |
# | |
# What is that | |
# ============ | |
# | |
# This script will help you setting up your digital ocean | |
# infrastructure with Ansible v2.0+ and DO API v2 | |
# | |
# Usually, when working with DO, one is supposed to use digital_ocean.py | |
# inventory file, and spin up instances in a playbook. |
#!/bin/bash | |
# | |
# What is that | |
# ============ | |
# | |
# This script will help you setting up your digital ocean | |
# infrastructure with Ansible | |
# | |
# Usually, when working with DO, one is supposed to use digital_ocean.py | |
# inventory file, and spin up instances in a playbook. |
# Boot in UEFI mode !! | |
loadkeys fr | |
mount /dev/md125p3 /mnt | |
arch-chroot /mnt /bin/bash | |
mount /dev/md125p1 /boot/efi/ | |
pacman -S linux | |
pacman -S grub | |
grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=grub_uefi --recheck | |
grub-mkconfig -o /boot/grub/grub.cfg | |
umount /boot/efi |
# Ansible playbook to check for CVE-2015-0235 | |
# | |
# Check mode only | |
# ansible-playbook check_and_patch.yml | |
# | |
# To apply the fix : | |
# ansible-playbook check_and_patch.yml -e fix=true | |
# | |
- hosts: all | |
tasks: |
#!/bin/env ruby | |
# | |
require 'hiredis' | |
require 'redis' | |
require 'benchmark' | |
require 'pp' | |
TOTAL_PAGES_PER_WINDOW = 15_000_000 | |
CATEGORY_COUNT = 100 | |
ARTICLES_COUNT = 150 |