I hereby claim:
- I am battlecow on github.
- I am bmk352 (https://keybase.io/bmk352) on keybase.
- I have a public key ASB4ezE5-pp075MQ99c7bflIOCQXfijRIFGcwHHXnACL-go
To claim this, I am signing this object:
#!/usr/bin/env python | |
# playback.py | |
# 2016-12-23 | |
# Public Domain | |
import os | |
import sys | |
import time |
package spinnaker | |
import ( | |
"bytes" | |
"encoding/json" | |
"fmt" | |
"io" | |
"log" | |
"net/http" | |
) |
FROM ubuntu:16.04 | |
ENV HOME /root | |
ENV BAMBOO_VERSION 6.5.1 | |
ENV DUMB_INIT_VERSION=1.2.1 | |
ENV DEBIAN_FRONTEND noninteractive | |
ENV LANG='en_US.UTF-8' LANGUAGE='en_US:en' LC_ALL='en_US.UTF-8' |
{ | |
"name": "slack-issue", | |
"version": "0.0.0", | |
"description": "Slack Issue Repro", | |
"main": "server.js", | |
"scripts": { | |
"test": "echo \"Error: no test specified\" && exit 1" | |
}, | |
"author": "Brian Kelley", | |
"license": "ISC", |
2019-12-18 12:46:48.415 INFO 1 --- [ handlers-16] c.n.s.orca.clouddriver.KatoRestService : [brian.kelley] ---- ERROR http://spin-clouddriver.spinnaker:7002/kubernetes/ops?clientRequestId=4d720dfc0ee324cb16bd485dadb0931ddc3d26dd1d1d8f29a257b999d5c8a4fc | |
2019-12-18 12:46:48.417 INFO 1 --- [ handlers-16] c.n.s.orca.clouddriver.KatoRestService : [brian.kelley] java.net.SocketTimeoutException: timeout | |
at okio.Okio$4.newTimeoutException(Okio.java:232) | |
at okio.AsyncTimeout.exit(AsyncTimeout.java:286) | |
at okio.AsyncTimeout$2.read(AsyncTimeout.java:241) | |
at okio.RealBufferedSource.indexOf(RealBufferedSource.java:358) | |
at okio.RealBufferedSource.readUtf8LineStrict(RealBufferedSource.java:230) | |
at okhttp3.internal.http1.Http1ExchangeCodec.readHeaderLine(Http1ExchangeCodec.java:242) | |
at okhttp3.internal.http1.Http1ExchangeCodec.readResponseHeaders(Http1ExchangeCodec.java:213) | |
at okhttp3.internal.connection.Exchange.readResponseHeaders(Exchange.java:115) |
FROM node:10-alpine | |
ENV NODE_ENV production | |
USER node | |
WORKDIR /home/node | |
COPY --chown=node:node . . |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
interfaces=( $(netstat -in | egrep 'utun\d .*\d+\.\d+\.\d+\.\d+' | cut -d ' ' -f 1) ) | |
rulefile="rules.tmp" | |
echo "" > $rulefile | |
sudo pfctl -a com.apple/tun -F nat | |
for i in "${interfaces[@]}" | |
do | |
RULE="nat on ${i} proto {tcp, udp, icmp} from 192.168.64.0/24 to any -> ${i}" | |
echo $RULE >> $rulefile | |
done |
apiVersion: extensions/v1beta1 | |
kind: PodSecurityPolicy | |
metadata: | |
name: restricted | |
annotations: | |
seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' | |
apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' | |
seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' | |
apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' | |
spec: |
consumer | |
.on('ready', () => { | |
consumer.subscribe([topic]); | |
consumer.getMetadata({topic: topic}, function (err, metadata) { | |
if (err) { | |
console.error('Error getting metadata'); | |
console.error(err); | |
} else { | |
console.log('Got metadata'); | |
console.log(metadata.topics[1]); |