I hereby claim:
- I am lrvick on github.
- I am lrvick (https://keybase.io/lrvick) on keybase.
- I have a public key whose fingerprint is 6B61 ECD7 6088 748C 7059 0D55 E90A 4013 36C8 AAA9
To claim this, I am signing this object:
#!/bin/bash | |
PASSWORD=$1 | |
# Add 'People' unit | |
ldapmodify \ | |
-h ldap.hashbang.sh \ | |
-D "cn=admin,dc=hashbang,dc=sh" \ | |
-w $PASSWORD \ | |
-a -n <<EOF |
#!/bin/bash | |
URL=$1 | |
LOG_FILE=$2 | |
WORKER_STEPS=( 10 100 200 500 1000 1500 ) | |
DELAY=10 | |
TEST_LENGTH=60s | |
for WORKERS in "${WORKER_STEPS[@]}"; do |
#cloud-config | |
coreos: | |
etcd: | |
addr: $private_ipv4:4001 | |
peer-addr: $private_ipv4:7001 | |
fleet: | |
public-ip: $private_ipv4 | |
update: | |
reboot-strategy: off |
# Yubico Yubikey | |
ATTRS{idVendor}=="1050", \ | |
ATTRS{idProduct}=="0010|0405|0110|0111|0116", \ | |
ENV{ID_SECURITY_TOKEN}="1", \ | |
RUN+="/bin/bash -c '/usr/bin/killall -9 scdaemon'", \ | |
TAG+="uaccess" | |
LABEL="yubico_end" |
I hereby claim:
To claim this, I am signing this object:
# Place in .ebextensions/00-bypass-nginx-proxy.config at the root of your appkication repository. | |
files: | |
"/tmp/setup_iptables.sh": | |
mode: "000755" | |
content: | | |
#!/bin/sh | |
# remove rules added by us (marked by the "added_by_ebextension" comment), if any | |
iptables-save | grep -v added_by_ebextension | iptables-restore |
#!/bin/bash | |
api_url='https://www.kickstarter.com/projects/597507018/pebble-2-time-2-and-core-an-entirely-new-3g-ultra/stats.json?v=1' | |
while sleep 1; do | |
ks_json=$(curl $api_url -s | gunzip 2> /dev/null ) | |
[ $? -ne 0 ] && continue | |
old_total=$total | |
total=$(echo $ks_json | jq -r '.project.pledged') | |
[[ "$total" == "$old_total" ]] && continue |
#!/bin/bash | |
environment=$1 | |
app_name=$2 | |
tag=$3 | |
asg_name=$( | |
aws ec2 describe-instances \ | |
--region us-west-2 \ | |
--filters \ | |
"Name=tag:$tag,Values='$app_name-$environment'" \ |
#!/bin/bash | |
tmpdir=$(mktemp -d) | |
export GNUPGHOME="$tmpdir" | |
echo "allow-loopback-pinentry" >> "$GNUPGHOME/gpg-agent.conf" | |
echo "pinentry-mode loopback" >> "$GNUPGHOME/gpg.conf" | |
function cleanup { | |
rm -rf "$GNUPGHOME" | |
} | |
trap cleanup EXIT |