Highest-rated fridges that should of each type, in order (respectively), with prices, that should fit in our kitchen, according to UFC Que Choisir.
https://www.quechoisir.org/comparatif-refrigerateur-congelateur-n429/
Highest-rated fridges that should of each type, in order (respectively), with prices, that should fit in our kitchen, according to UFC Que Choisir.
https://www.quechoisir.org/comparatif-refrigerateur-congelateur-n429/
`something`
I hereby claim:
To claim this, I am signing this object:
iOS:
2017-05-19 10:15:13,011 (7fcfcde91700) : DEBUG (runtime:717) - Handling request GET /music/audioaddict/channel?thumb=http%3A%2F%2Fstatic.audioaddict.com%2F2%2F9%2F0%2F1%2Fe%2Ff%2F2901ef5c923bb0f9ff856ac4007975f0.png&title=Chill+%26+Tropical+House&url=http%3A%2F%2Fprem2.radiotunes.com%3A80%2Frtchillntropicalhouse_hi%3F67b893d2c95e1c1&fmt=mp3&include_container=True&summary=The+sounds+of+Chill+%26+Tropical+House+are+expertly+made+for+lounging+and+dancing+alike+with+its+deeper+house+vibes.+%5Bmp3%2C+320%5D+%5Bhttp%3A%2F%2Fprem2.radiotunes.com%3A80%2Frtchillntropicalhouse_hi%3F67b893d2c95e1c1%5D&bitrate=320&includeBandwidths=1
2017-05-19 10:15:13,016 (7fcfcde91700) : DEBUG (runtime:814) - Found route matching /music/audioaddict/channel
2017-05-19 10:15:13,018 (7fcfcde91700) : CRITICAL (runtime:889) - Exception (most recent call last):
File "/usr/lib/plexmediaserver/Resources/Plug-ins-4955e31cf/Framework.bundle/Contents/Resources/Versions/2/Python/Framework/components/runtime.py", line 843, in handle
// See photo of whiteboard. | |
digraph model { | |
"Firefox" -> "CDN / Cloudfront"; | |
"Kinto Origin" [label="Kinto Origin (ELB & EC2)"]; | |
"CDN / Cloudfront" -> "Kinto Origin"; | |
"Kinto Origin" -> "Heka"; | |
"Kinto Origin" -> "PG" [label="RO"]; | |
"Kinto Admin" [label="Kinto Admin (EC2 & EIP)"]; | |
"Kinto Admin" -> "PG" [label="RW"]; |
#!/usr/bin/env bash | |
set -e | |
TFORM_VERSION="0.5.3_linux_amd64" | |
gem install puppet puppet-lint | |
puppet-lint --with-filename --no-80chars-check --no-autoloader_layout-check --fail-on-warnings puppet/ | |
puppet parser validate `find puppet/ -name '*.pp'` |
variable "environment" {} | |
variable "access_key" {} | |
variable "secret_key" {} | |
variable "secret_bucket" {} | |
variable "subnets" {} | |
variable "collector_cert" { | |
default = { | |
prod = "" | |
stage = "" | |
} |
AWS ELBs have a series of "policies" which group different HTTPS (read: TLS and SSL) profiles together. It is possible that the "2011-08" policy would be appropriate for this purpose (remains to be verified), otherwise we can define a custom policy that fits our needs. Unfortunately for us, these policies cannot currently be managed in Terraform, so this may end up be trickier than we'd first envisioned.
One possible workaround is to use local-exec to apply the policy manually, as suggested by t0m on IRC: http://paste.scsys.co.uk/488127
provisioner "local-exec" {
command = "aws elb create-load-balancer-policy --region ${var.region} --profile ${var.account} --load-balancer-name ${aws_elb.extelb.name} --policy-name EnableProxyProtocol --policy-type-name ProxyProtocolPolicyType --policy-attributes AttributeName=ProxyProtocol,AttributeValue=Tru
#!/usr/bin/env python2 | |
import SimpleHTTPServer | |
import SocketServer | |
import logging | |
PORT = 8000 | |
class GetHandler(SimpleHTTPServer.SimpleHTTPRequestHandler): |