I hereby claim:
- I am briansbum on github.
- I am briansbum (https://keybase.io/briansbum) on keybase.
- I have a public key ASDggbtzONmzxfDS1DFs_sDivEU0GYw67JXMBLX_HG3h7Qo
To claim this, I am signing this object:
#!/bin/bash | |
# Create a ram drive | |
mkdir /mnt/ramdrive | |
mount -t tmpfs -o size=1024m tmpfs /mnt/ramdrive | |
# Create a chroot in the ram drive | |
mkdir /mnt/ramdrive/chroot | |
# Copy the /bin directory from the root file system into the chroot environment |
⋊> ~/g/s/g/B/t/m/aws on policy-document-tests ↑ go test -v -timeout 30m -run TestAssertIAMPolicyIsCorrect 09:40:22 | |
=== RUN TestAssertIAMPolicyIsCorrect | |
=== PAUSE TestAssertIAMPolicyIsCorrect | |
=== CONT TestAssertIAMPolicyIsCorrect | |
TestAssertIAMPolicyIsCorrect 2018-07-05T09:40:28+01:00 region.go:72: Looking up all AWS regions available in this account | |
TestAssertIAMPolicyIsCorrect 2018-07-05T09:40:29+01:00 region.go:57: Using region ap-northeast-1 | |
--- PASS: TestAssertIAMPolicyIsCorrect (1.45s) | |
PASS | |
ok github.com/Briansbum/terratest/modules/aws 1.474s | |
⋊> ~/g/s/g/B/t/m/aws on policy-document-tests ↑ go test -v -timeout 30m -run TestAssertS3BucketPolicyIsCorrect 09:40:30 |
=== RUN TestTerraformAwsExample | |
=== PAUSE TestTerraformAwsExample | |
=== CONT TestTerraformAwsExample | |
TestTerraformAwsExample 2018-06-21T15:53:27+01:00 region.go:72: Looking up all AWS regions available in this account | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 region.go:57: Using region ap-southeast-1 | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 retry.go:69: Running terraform [init -upgrade=false] | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:52: Running command terraform with args [init -upgrade=false] | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: [0m[1mInitializing provider plugins...[0m | |
TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: |
// ==UserScript== | |
// @name awsRegionIds | |
// @namespace http://intenthq.com/ | |
// @version 0.1 | |
// @description Add AWS region ids to the region selector menu | |
// @author github.com/Briansbum github.com/kittsville | |
// @match https://*.console.aws.amazon.com/* | |
// @grant none | |
// ==/UserScript== |
2018-04-20T10:52:34.486Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/my-role" | |
2018-04-20T10:52:34.486Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Reading AppRole auth backend role "auth/approle/role/my-role" | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Vault API Request Details: | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: ---[ REQUEST ]--------------------------------------- | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: GET /v1/auth/approle/role/my-role HTTP/1.1 | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: Host: vaul.mycorp.com:8201 | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: User-Agent: Go-http-client/1.1 | |
2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: X-Vault-Token: 72ad29cc-f121 |
I hereby claim:
To claim this, I am signing this object: