I hereby claim:
- I am derpauli on github.
- I am codepauli (https://keybase.io/codepauli) on keybase.
- I have a public key ASCqGw0HrjsWP0k1ONWmNItJcm47SlLqJqifpiPsecjfQAo
To claim this, I am signing this object:
# Run from an elevated PowerShell | |
# Credits to Chris Titus (https://christitus.com/windows-tool/) | |
iwr -useb https://christitus.com/win | iex |
import java.nio.charset.StandardCharsets; | |
def creds = com.cloudbees.plugins.credentials.CredentialsProvider.lookupCredentials( | |
com.cloudbees.plugins.credentials.Credentials.class | |
) | |
for (c in creds) { | |
println(c.id) | |
if (c.properties.description) { | |
println(" description: " + c.description) | |
} |
I hereby claim:
To claim this, I am signing this object:
import json | |
import boto3 | |
import zipfile | |
import tempfile | |
code_pipeline = boto3.client('codepipeline') | |
s3 = boto3.client('s3') |
resource "aws_iam_role" "cp-iam-role" { | |
name = "AWSCodePipelineDeployImage" | |
assume_role_policy = <<EOF | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { |
# ECR TRIGGER | |
resource "aws_cloudwatch_event_rule" "cwt-rule" { | |
name = "ecr-trigger-deploy-authms" | |
description = "Trigger codepipeline on image change" | |
event_pattern = <<PATTERN | |
{ | |
"detail-type": [ | |
"ECR Image Action" | |
], |
resource "aws_iam_access_key" "iam-key-ecr-deploy" { | |
user = aws_iam_user.iam-ecr-deploy.name | |
pgp_key = var.iam_pgp_ecr_deploy | |
} | |
resource "aws_iam_user" "iam-ecr-deploy" { | |
name = var.iam_user_name_ecr_auth | |
} | |
resource "aws_iam_user_policy" "iam-policy-ecr-deploy" { |
image: docker:latest | |
stages: | |
- build | |
services: | |
- docker:dind | |
variables: | |
REGION: "eu-central-1" |
'use strict'; | |
exports.handler = (event, context, callback) => { | |
const response = event.Records[0].cf.response; | |
const headers = response.headers; | |
// Server header to conceil technology | |
headers['server'] = [{ | |
key: 'Server', | |
value: "" |