I hereby claim:
- I am mig5 on github.
- I am mig5 (https://keybase.io/mig5) on keybase.
- I have a public key whose fingerprint is 0E6B 7951 85FC A187 066D 339C EEA4 341C 6D97 A0B6
To claim this, I am signing this object:
| ### autoscale.tf | |
| data "template_file" "userdata" { | |
| template = "${file("templates/userdata.tpl")}" | |
| vars { | |
| region = "${var.region}" | |
| file_system_id = "${aws_efs_file_system.prod-efs.id}" | |
| } | |
| } | |
| resource "aws_launch_configuration" "mig5-prod-lc" { |
| #!/bin/sh | |
| KEY1="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" | |
| KEY2="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" | |
| challenge=`head -c63 /dev/urandom | xxd -c 63 -ps` | |
| response=`qvm-run -a --nogui -u root -p sys-usb "ykchalresp -2 -x $challenge"` | |
| function yubi_auth() { |
I hereby claim:
To claim this, I am signing this object:
| vagrant() { | |
| if [[ $@ == "ssh" ]]; then | |
| command vagrant ssh || command vagrant up && command vagrant ssh | |
| else | |
| command vagrant $@ | |
| fi | |
| } |
| Jul 29 09:15:07 dom0 systemd[1]: Started Qubes NetVM startup. | |
| Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM gpg... | |
| Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM yubi... | |
| Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM vpn... | |
| Jul 29 09:15:07 dom0 qvm-start[2812]: --> Creating volatile image: /var/lib/qubes/appvms/gpg/volatile.img... | |
| Jul 29 09:15:07 dom0 qvm-start[2814]: --> Creating volatile image: /var/lib/qubes/servicevms/vpn/volatile.img... | |
| Jul 29 09:15:07 dom0 qvm-start[2813]: --> Creating volatile image: /var/lib/qubes/appvms/yubi/volatile.img... | |
| Jul 29 09:15:07 dom0 kernel: loop9: p1 p2 | |
| Jul 29 09:15:07 dom0 qvm-start[2813]: Lock is already obtained.. waiting 5 seconds til we try again (attempt #1) | |
| Jul 29 09:15:07 dom0 qvm-start[2814]: Lock is already obtained.. waiting 5 seconds til we try again (attempt #1) |
| #!/bin/bash | |
| # | |
| # Script to update template images in a big batch | |
| # | |
| # Get a list of templates | |
| TEMPLATES=$(qvm-ls | grep Tpl | awk {'print $1'} |cut -d[ -f2 | cut -d] -f1) | |
| usage() | |
| { |
| [miguel@dom0 ~]$ sudo tar c /var/lib/rpm /etc/yum.repos.d /etc/yum.conf 2>/dev/null | qvm-run -p "dom0-update-vm" 'tar x -C /var/lib/qubes/dom0-updates' | |
| tar: var: Cannot mkdir: Permission denied | |
| tar: var/lib/rpm: Cannot mkdir: No such file or directory | |
| tar: var: Cannot mkdir: Permission denied | |
| tar: var/lib/rpm/__db.001: Cannot open: No such file or directory | |
| tar: var: Cannot mkdir: Permission denied | |
| tar: var/lib/rpm/Dirnames: Cannot open: No such file or directory | |
| tar: var: Cannot mkdir: Permission denied |
| --- | |
| - hosts: all | |
| gather_facts: no | |
| tasks: | |
| - name: Backup database | |
| shell: "{{ item }}" | |
| with_items: | |
| - mkdir -p ~jenkins/dbbackups | |
| - drush @{{ shortname }}_{{ env }} sql-dump --skip-tables-key=common | gzip > ~jenkins/dbbackups/{{ shortname }}_{{ env }}_prior_to_{{ build }}.sql.gz |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| usage() { | |
| cat << EOF | |
| usage: $0 ARGUMENTS | |
| Simple wrapper script to query the vCloud API and return a | |
| YAML object of a specific virtual machine. | |
| Written by mig5 July 2014 |