I hereby claim:
- I am brettweavnet on github.
- I am brettweavnet (https://keybase.io/brettweavnet) on keybase.
- I have a public key whose fingerprint is 5976 B551 05D2 E8D2 C86E B49E 35CD F4E7 EB00 0645
To claim this, I am signing this object:
| #!/bin/bash | |
| # | |
| # This script will signal the provided Cloud Formation URL with success or failue. | |
| # Result is expected to be the return code of a configuration management script. | |
| # Success will only be signaled if the script returns 0 | |
| export result=$1 | |
| export url=$2 | |
| function help { |
| #!/bin/bash | |
| # | |
| # This script will signal the provided Cloud Formation URL with success or failue. | |
| # Result is expected to be the return code of a configuration management script. | |
| # Success will only be signaled if the script returns 0 | |
| export result=$1 | |
| export url=$2 | |
| function help { |
| #!/usr/bin/env ruby | |
| require 'aws-sdk' | |
| # create a table (10 read and 5 write capacity units) | |
| dynamo_db = AWS::DynamoDB.new :region => 'us-west-2' | |
| # get a table by name and specify its schema | |
| table = dynamo_db.tables['dynamo-test'] | |
| table.hash_key = ['Customer ID', :number] |
| module EnvVar | |
| def set_env_var(name, value) | |
| ENV.stub(:[]) | |
| ENV.stub(:[]).with(name).and_return(value) | |
| end | |
| end |
| ## Equipment | |
| ### Hygiene | |
| * Razor(s) | |
| * Earplugs | |
| * Eye Mask | |
| * Baby Powder | |
| * Chap Stick | |
| * Antacid |
| find . -type f -name '*.txt' -exec sed -i '' s/123/321/ {} + |
| import Data.Char | |
| data Request = Request { message :: String } | |
| main = getIt | |
| getIt :: IO() | |
| getIt = do | |
| msg <- getLine | |
| let r = Request { message = msg } |
I hereby claim:
To claim this, I am signing this object:
I keep my dot files public, I of course don't want to have my credentials stored in those dotfiles.
To call applications which require credentials to be set as env vars I have the following setup.
Create a file called ~/.run_with_creds with all the secret credentials after an env statement which then calls the input parameters:
env TRELLO_DEVELOPER_PUBLIC_KEY=xxx \
TRELLO_MEMBER_TOKEN=yyy \
AWS_ACCESS_KEY_ID=987 \