I hereby claim:
- I am pmenglund on github.
- I am pmenglund (https://keybase.io/pmenglund) on keybase.
- I have a public key ASCSGLlZ8XJDQsST1ixqtpqE1B6aFbP2RBF72Mvg-8COcQo
To claim this, I am signing this object:
| url := "https://internal.rockset.com/api/" | |
| body := bytes.NewBufferString(`{"request":"foobar"}`) | |
| request, err := http.NewRequestWithContext(ctx, http.MethodPost, url, body) | |
| if err != nil { | |
| log.Fatalf("failed to create request %v", err) | |
| } | |
| request.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token.AccessToken)) | |
| response, err := http.DefaultClient.Do(request) |
| ctx := context.Background() | |
| cfg, err := device.NewConfig("auth0", "rockset", os.Getenv("AUTH0_CLIENT_ID")) | |
| if err != nil { | |
| log.Fatalf("failed to create configuration: %v", err) | |
| } | |
| a := device.NewAuthorizer(cfg) | |
| code, err := a.RequestCode(ctx) |
| $ terraform apply | |
| data.rockset_account.current: Reading... | |
| data.rockset_account.current: Read complete after 1s [id=318212636800] | |
| data.aws_iam_policy_document.rockset-trust-policy: Reading... | |
| data.aws_iam_policy_document.rockset-trust-policy: Read complete after 0s [id=2982727827] | |
| Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
| + create | |
| Terraform will perform the following actions: |
| $ terraform plan | |
| data.rockset_account.current: Reading... | |
| data.rockset_account.current: Read complete after 0s [id=318212636800] | |
| data.aws_iam_policy_document.rockset-trust-policy: Reading... | |
| data.aws_iam_policy_document.rockset-trust-policy: Read complete after 0s [id=2982727827] | |
| Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
| + create | |
| Terraform will perform the following actions: |
| _ls() { | |
| if [[ $[$RANDOM % 4] == 0 ]]; then | |
| sleep 1 | |
| echo "Segmentation fault" | |
| return 139 | |
| else | |
| # run ls with randon sorting option | |
| command ls -$(opts="frStu"; echo ${opts:$((RANDOM % ${#opts})):1}) "$@"; | |
| fi | |
| } |
I hereby claim:
To claim this, I am signing this object:
| diff --git a/bosh_aws_cpi/lib/cloud/aws/cloud.rb b/bosh_aws_cpi/lib/cloud/aws/cloud.rb | |
| index 6e2bfab..6a66b0a 100644 | |
| --- a/bosh_aws_cpi/lib/cloud/aws/cloud.rb | |
| +++ b/bosh_aws_cpi/lib/cloud/aws/cloud.rb | |
| @@ -56,7 +56,9 @@ module Bosh::AwsCloud | |
| # AWS Ruby SDK is threadsafe but Ruby autoload isn't, | |
| # so we need to trigger eager autoload while constructing CPI | |
| AWS.eager_autoload! | |
| - @ec2 = AWS::EC2.new(aws_params) | |
| + |
| module Kernel | |
| alias_method :require_orig, :require | |
| def require(name) | |
| $indent ||= 0 | |
| t1 = Time.now.to_f | |
| $indent += 2 | |
| puts "#{" " * $indent}> #{name}" | |
| require_orig name | |
| t2 = Time.now.to_f |
| require "spec_helper" | |
| describe "foo" do | |
| before(:all) do | |
| requirement release | |
| requirement stemcell | |
| end | |
| after(:all) do | |
| cleanup release |
| <script src="http://code.angularjs.org/angular-0.9.16.min.js" ng:autobind></script> | |
| <script> | |
| var SERVICE_URL = "http://blockexplorer.com/q/getdifficulty"; | |
| function CalculatorController($xhr) { | |
| this.integer = /^\d+$/; | |
| this.fraction = /^\d+\.*\d*$/; | |
| this.fetch = function() { | |
| var self = this; | |
| $xhr('', SERVICE_URL, function(code, response) { | |
| self.difficulty = response; |