Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am thorduri on github.
  • I am thordur (https://keybase.io/thordur) on keybase.
  • I have a public key ASCQj7s56Ko55xmoSnk2F3SvWhBB5PIRqdXqgJzazvnOLAo

To claim this, I am signing this object:

@thorduri
thorduri / main.go
Created November 23, 2016 21:38
viper.ConfigPaths()
package main
import (
"fmt"
"os"
log "github.com/Sirupsen/logrus"
"github.com/spf13/cobra"
"github.com/spf13/viper"
@thorduri
thorduri / yubitouch.sh
Created September 27, 2016 08:54 — forked from a-dma/yubitouch.sh
Bash script for setting or clearing touch requirements for cryptographic operations in the OpenPGP application on a YubiKey 4.
#!/bin/bash
# Bash script for setting or clearing touch requirements for
# cryptographic operations the OpenPGP application on a YubiKey 4.
#
# Author: Alessio Di Mauro <[email protected]>
GCA=$(which gpg-connect-agent)
DO=0
UIF=0
@thorduri
thorduri / service-checklist.md
Created September 25, 2016 11:01 — forked from acolyer/service-checklist.md
Internet Scale Services Checklist

Internet Scale Services Checklist

A checklist for designing and developing internet scale services, inspired by James Hamilton's 2007 paper "On Desgining and Deploying Internet-Scale Services."

Basic tenets

  • Does the design expect failures to happen regularly and handle them gracefully?
  • Have we kept things as simple as possible?