I hereby claim:
- I am likwid on github.
- I am likwid (https://keybase.io/likwid) on keybase.
- I have a public key whose fingerprint is 6AB6 C810 92D2 813E 269D AA00 DDC2 7DFE 0B49 862E
To claim this, I am signing this object:
resource aws_ec2_fleet buildkite_agents { | |
launch_template_config { | |
launch_template_specification { | |
launch_template_id = aws_launch_template.current.id | |
version = aws_launch_template.current.latest_version | |
} | |
override { | |
instance_type = "c5.4xlarge" | |
max_price = "0.4" |
let ip_address = env:VAULT_IP_ADDR as Text | |
let cluster_name = env:VAULT_CLUSTER_NAME as Text | |
let region = env:VAULT_KMS_REGION as Text | |
let kms_key_id = env:VAULT_KMS_KEY_ID as Text | |
let tls_disable = env:VAULT_TLS_FLAG |
I hereby claim:
To claim this, I am signing this object:
<script type="text/javascript" src="https://unpkg.com/[email protected]/umd/react.production.min.js"></script> | |
<script type="text/javascript" src="https://unpkg.com/[email protected]/umd/react-dom.production.min.js"></script> |
defaultEntryPoints = ["http"] | |
[accessLog] | |
[traefikLog] | |
[entryPoints] | |
[entryPoints.http] | |
address = ":4000" | |
compress = true |
const logger = (server) => { | |
setupLogging(server); | |
return server; | |
} | |
const connection = (server) => { | |
setupConnection(server); | |
return server; | |
} |
import aiobotocore | |
import asyncio | |
import boto3 | |
import logging | |
from aiohttp import web | |
from functools import partial | |
LOGGER_FORMAT = '%(asctime)s %(message)s' | |
logging.basicConfig(format=LOGGER_FORMAT, datefmt='[%H:%M:%S]') | |
log = logging.getLogger() |
const {__, curry, is, map, merge, objOf} = require("ramda"); | |
const makeArrayDoc = curry((list, containerName, doc) => | |
is(Array, list) ? | |
merge(objOf(containerName, list), doc) : | |
merge(objOf(containerName, [list]), doc)); | |
const makeListOf = curry((list, fn, name, doc) => { | |
const objs = map(([key, val]) => fn(key, val), list); | |
return merge(objOf(name, objs), doc); |
sudo mkdir /var/tmux | |
sudo chgrp $GROUP_NAME /var/tmux | |
sudo chmod g+ws /var/tmux | |
tmux -S /var/tmux/shared new -s $SESSION_NAME |
/** | |
* The iam-roles module manages iam roles and permissions to AWS API calls | |
* | |
* Usage: | |
* | |
* module "iam_roles" { | |
* source = "../terraform-modules//iam-roles" | |
* name = "Something" | |
* environment = "awslabsaccount" | |
* role_name = "describe" |