I hereby claim:
- I am stefansedich on github.
- I am stefansedich (https://keybase.io/stefansedich) on keybase.
- I have a public key ASDfnoov4GJo4vKttiqbDF86tBTWKXvnrNKnZIk0btB70wo
To claim this, I am signing this object:
#!/bin/bash | |
set -eou pipefail | |
regions=$(aws ec2 describe-regions --query="Regions[].RegionName" --output=text) | |
for region in $regions | |
do | |
vpc_id=$(aws ec2 describe-vpcs --region=$region --filter="Name=is-default,Values=true" --query="Vpcs[].VpcId" --output=text) | |
if ! [ -z $vpc_id ] | |
then |
--- | |
apiVersion: helm.fluxcd.io/v1 | |
kind: HelmRelease | |
metadata: | |
name: sealed-secrets-controller | |
namespace: default | |
spec: | |
releaseName: sealed-secrets-controller | |
chart: | |
repository: https://kubernetes-charts.storage.googleapis.com/ |
I hereby claim:
To claim this, I am signing this object:
[tool.poetry] | |
name = "example" | |
version = "0.0.1" | |
authors = [] | |
[tool.poetry.dependencies] | |
black = {version = "19.3b0", allows-prereleases = true} | |
[build-system] | |
requires = ["poetry>=0.12"] |
FROM ruby | |
copy foo.rb ./ | |
RUN ruby foo.rb |
require 'sinatra/base' | |
class Application < Sinatra::Base | |
configure do | |
set :bind, '0.0.0.0' | |
set :port, 4567 | |
end | |
get '/' do | |
response.headers['Access-Control-Allow-Origin'] = '*' |
/*! stripe-js 18-02-2017 */ | |
(function() { | |
var a, b, c, d, e, f, g, h, i, j, k, l, m = {}.hasOwnProperty, | |
n = function(a, b) { | |
function c() { | |
this.constructor = a | |
} | |
for (var d in b) m.call(b, d) && (a[d] = b[d]); | |
return c.prototype = b.prototype, a.prototype = new c, a.__super__ = b.prototype, a | |
}; |
Content-Type: multipart/mixed; boundary="==BOUNDARY==" | |
MIME-Version: 1.0 | |
--==BOUNDARY== | |
MIME-Version: 1.0 | |
Content-Type: text/x-shellscript; charset="us-ascii" | |
Content-Disposition: attachment; filename="startup.sh" | |
#!/bin/bash | |
cluster="CLUSTER_NAME" |
#!/bin/bash | |
set -e | |
# Environment | |
REPOSITORY=$1 | |
# Remove untagged images from the specified repository. | |
aws ecr list-images --repository-name $REPOSITORY --query 'imageIds[?type(imageTag)!=`string`].[imageDigest]' --output text \ | |
| while read line; do aws ecr batch-delete-image --repository-name $REPOSITORY --image-ids imageDigest=$line; done |
=== TEST EXECUTION SUMMARY === | |
Akka.Cluster.Sharding.Tests Total: 82, Errors: 0, Failed: 0, Skipped: 79, Time: 0.566s | |
Akka.Cluster.Tests Total: 126, Errors: 0, Failed: 4, Skipped: 0, Time: 75.235s | |
Akka.Cluster.Tools.Tests Total: 19, Errors: 0, Failed: 0, Skipped: 19, Time: 0.090s | |
Akka.DI.AutoFac.Tests Total: 9, Errors: 0, Failed: 0, Skipped: 0, Time: 0.671s | |
Akka.DI.CastleWindsor.Tests Total: 9, Errors: 0, Failed: 0, Skipped: 0, Time: 0.886s | |
Akka.DI.Ninject.Tests Total: 9, Errors: 0, Failed: 0, Skipped: 0, Time: 0.787s | |
Akka.DI.StructureMap.Tests Total: 9, Errors: 0, Failed: 0, Skipped: 0, Time: 0.840s | |
Akka.DI.Unity.Tests Total: 9, Errors: 0, Failed: 0, Skipped: 0, Time: 0.731s | |
Akka.FSharp.Tests Total: 25, Errors: 0, Failed: 0, Skipped: 0, Time: 1.549s |