View pasteboard_scrubber.lua
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function pasteboard_scrubber(copied_value) | |
local t_match = "^(https://twitter.com/[a-zA-Z0-9_]+/status/[0-9a-zA-Z]+)[?]+.+$" | |
local _, _, matched_value = string.find(copied_value, t_match) | |
if matched_value ~= nil then | |
-- Replace URL in pasteboard | |
hs.pasteboard.writeObjects(matched_value) | |
end | |
end |
View index.ts
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Copyright 2016-2019, Pulumi Corporation. All rights reserved. | |
import * as aws from "@pulumi/aws"; | |
import * as awsx from "@pulumi/awsx"; | |
import * as pulumi from "@pulumi/pulumi"; | |
//import { VpcEndpointService } from "@pulumi/aws/ec2"; | |
// **************************************************************************************************************************************** | |
// Grab some secrets from our config file | |
// **************************************************************************************************************************************** |
View index.ts
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import * as aws from "@pulumi/aws"; | |
const assumeRolePolicyDocument = JSON.stringify({ | |
Version: "2012-10-17", | |
Statement: [{ | |
Action: "sts:AssumeRole", | |
Principal: { | |
Service: "ec2.amazonaws.com" | |
}, | |
Effect: "Allow", |
View assume-role-policy.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": "sts:AssumeRole", | |
"Principal": { | |
"Service": "ec2.amazonaws.com" | |
}, | |
"Effect": "Allow", | |
"Sid": "" |
View iam.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
variable "role_name" {} | |
variable "role_policy_file" {} | |
resource "aws_iam_role" "role" { | |
name = "${var.role_name}" | |
assume_role_policy = "${file("${path.module}/policies/${var.role_policy_file}")}" | |
} | |
output "role_arn" { | |
value = "${aws_iam_role.role.arn}" |
View gist:3d157e784b1d60af283d
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am clstokes on github. | |
* I am clstokes (https://keybase.io/clstokes) on keybase. | |
* I have a public key whose fingerprint is B970 5386 3BE3 EAE8 446A 1FA8 AAC4 B68D A32C 32D4 | |
To claim this, I am signing this object: |
View gist:07ad4202a3fa6c627df4
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
clstokes-mbpro:consul-cluster clstokes$ terraform apply aws-nat-consul-cluster/terraform/ | |
atlas_artifact.consul: Refreshing state... (ID: us-east-1:ami-fa522a90,us-west-2:ami-9b4150fa) | |
atlas_artifact.consul_client: Refreshing state... (ID: us-east-1:ami-0e5f2764,us-west-2:ami-35435254) | |
template_file.consul_update: Refreshing state... (ID: d82b4576930c7fe3d4a263ba5b15ed833c1cd9e5b984b1c9b92447dff46a2459) | |
aws_vpc.main: Refreshing state... (ID: vpc-36b13452) | |
aws_key_pair.main: Refreshing state... (ID: atlas-example) | |
aws_subnet.subnet_b: Refreshing state... (ID: subnet-dd7077f6) | |
aws_subnet.subnet_c: Refreshing state... (ID: subnet-803eccf6) | |
aws_security_group.admin_access: Refreshing state... (ID: sg-4d38a62b) | |
aws_security_group.consul: Refreshing state... (ID: sg-4c38a62a) |
View do-ubuntu.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"variables": { | |
"region": "nyc2", | |
"source_image": "ubuntu-14-04-x64", | |
"atlas_username": "{{ env `ATLAS_USERNAME` }}", | |
"atlas_name": "digitalocean-example" | |
}, | |
"builders": [{ | |
"type": "digitalocean", | |
"image": "{{user `source_image`}}", |
View output
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
provider "aws" { | |
access_key = "ASDF" | |
secret_key = "ASDF" | |
region = "us-east-1" | |
} | |
resource "aws_security_group" "no_modifications_single_ingress" { | |
name = "no_modifications_single_ingress" | |
description = "this security group causes NO modifications each run" |
View gist:5a107c30f88eac4057de
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
variable "subnet_cidr_blocks" { | |
default = "192.168.0.0/24,192.168.1.0/24,192.168.2.0/24" | |
} |
NewerOlder