I hereby claim:
- I am bracki on github.
- I am bracki (https://keybase.io/bracki) on keybase.
- I have a public key whose fingerprint is 6973 F3DB F562 53F9 A0A0 55FF A914 9FCB E1AF 1577
To claim this, I am signing this object:
\header { | |
title = "Spread That Feeling" | |
composer = "Pleasure" | |
} | |
up = \drummode { | |
\override Beam #'positions = #'(5.5 . 5.5) | |
sn16 sn <hhho bd>8 <hh sn> [hh] <hh bd> [hh] <hh sn> hh16 sn16 | |
<hh bd>8 [<hh bd>] <hh bd sn> <hh bd> <hh bd> hh <hh sn> hh16 sn16 | |
<hh bd>8 [<hh bd>] <hh bd sn> <hh bd> <hh bd> hh <hh sn> hh16 sn16 |
import boto3 | |
import requests | |
import pykube | |
def query_route53_records(): | |
c = boto.client("route53") | |
for zone in c.get_zones(): | |
records = c.get_all_rrsets(zone.id) | |
for r in records: |
from itsdangerous import JSONWebSignatureSerializer, BadSignature, SignatureExpired | |
import calendar | |
import datetime | |
class TimedJSONWebSignatureSerializer(JSONWebSignatureSerializer): | |
EXPIRES_IN_AN_HOUR = 3600 | |
def __init__(self, secret_key, salt=None, serializer=None, signer=None, signer_kwargs=None, algorithm_name=None, expires_in=None): |
I hereby claim:
To claim this, I am signing this object:
class ThriftOverHttp extends Filter[ThriftClientRequest, Array[Byte], HttpRequest, HttpResponse] { | |
def apply(request: ThriftClientRequest, service: Service[HttpRequest, HttpResponse]) = { | |
val httpRequest = convertThriftRequestToHttpRequest(request) | |
val response = service(httpRequest) | |
response flatMap { res => | |
Future.value(res.getContent().array()) | |
} | |
} | |
private def convertThriftRequestToHttpRequest(request: ThriftClientRequest) = { |
>>> import pyes | |
>>> conn = pyes.es.ES("localhost:9200") | |
>>> all = conn.scan(pyes.query.MatchAllQuery(), 'index', 'type') | |
>>> for a in all: | |
... hits = a['hits']['hits'] | |
... for hit in hits: | |
... conn.index(hit['_source'], 'new_index', 'type', hit['_id'], bulk=True) |
/* | |
We have to create our own key store since our API endpoint doesn't send the intermediate | |
SSL certificates | |
(see https://svn.jimdo-server.com/trac/ticket/52929). | |
1. Get server certificate: | |
i.e.: echo | openssl s_client -connect mobile.jimdoapi.com:443 2>&1 | \ | |
sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > jimdoapicert.pem | |
2. Create keystore: | |
i.e.: keytool -import -v -trustcacerts -alias 0 -file <(openssl x509 -in jimdoapicert.pem) \ |
panic: runtime error: invalid memory address or nil pointer dereference | |
[signal 0xb code=0x1 addr=0x0 pc=0x606edc] | |
goroutine 27 [running]: | |
github.com/awslabs/aws-sdk-go/aws.func·002() | |
/build/tmp-build/confd-branch-dynamodb/Godeps/_workspace/src/github.com/awslabs/aws-sdk-go/aws/credentials.go:252 +0x5c | |
github.com/awslabs/aws-sdk-go/aws.(*iamProvider).Credentials(0xc20822e320, 0x0, 0x7f84591a9980, 0xc2081c7d80) | |
/build/tmp-build/confd-branch-dynamodb/Godeps/_workspace/src/github.com/awslabs/aws-sdk-go/aws/credentials.go:265 +0x9af | |
github.com/awslabs/aws-sdk-go/aws.(*DefaultCredentialsProvider).Credentials(0xa53948, 0xc2081c79d0, 0x0, 0x0) | |
/build/tmp-build/confd-branch-dynamodb/Godeps/_workspace/src/github.com/awslabs/aws-sdk-go/aws/credentials.go:60 +0x1e2 | |
github.com/awslabs/aws-sdk-go/internal/signer/v4.Sign(0xc208040680) |
ec2 = Jenkins.instance.clouds.iterator().next() | |
template = ec2.getTemplate('jimdo-dev-box') | |
template.description = 'geloet' | |
template.save() | |
groovy.lang.ReadOnlyPropertyException: Cannot set readonly property: description for class: hudson.plugins.ec2.SlaveTemplate | |
at groovy.lang.MetaClassImpl.setProperty(MetaClassImpl.java:2377) | |
at groovy.lang.MetaClassImpl.setProperty(MetaClassImpl.java:3347) | |
at org.codehaus.groovy.runtime.InvokerHelper.setProperty(InvokerHelper.java:183) |
(ns riemann.test.nagios | |
(:use riemann.nagios | |
clj-nsca.core | |
clojure.test) | |
(:require [riemann.logging :as logging])) | |
(logging/init) | |
(def test-event | |
{:host "host01" :service "test_service" :state "ok" :description "Quick brown fox"}) |