This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function pasteboard_scrubber(copied_value) | |
local t_match = "^(https://twitter.com/[a-zA-Z0-9_]+/status/[0-9a-zA-Z]+)[?]+.+$" | |
local _, _, matched_value = string.find(copied_value, t_match) | |
if matched_value ~= nil then | |
-- Replace URL in pasteboard | |
hs.pasteboard.writeObjects(matched_value) | |
end | |
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Copyright 2016-2019, Pulumi Corporation. All rights reserved. | |
import * as aws from "@pulumi/aws"; | |
import * as awsx from "@pulumi/awsx"; | |
import * as pulumi from "@pulumi/pulumi"; | |
//import { VpcEndpointService } from "@pulumi/aws/ec2"; | |
// **************************************************************************************************************************************** | |
// Grab some secrets from our config file | |
// **************************************************************************************************************************************** |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import * as aws from "@pulumi/aws"; | |
const assumeRolePolicyDocument = JSON.stringify({ | |
Version: "2012-10-17", | |
Statement: [{ | |
Action: "sts:AssumeRole", | |
Principal: { | |
Service: "ec2.amazonaws.com" | |
}, | |
Effect: "Allow", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": "sts:AssumeRole", | |
"Principal": { | |
"Service": "ec2.amazonaws.com" | |
}, | |
"Effect": "Allow", | |
"Sid": "" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
variable "role_name" {} | |
variable "role_policy_file" {} | |
resource "aws_iam_role" "role" { | |
name = "${var.role_name}" | |
assume_role_policy = "${file("${path.module}/policies/${var.role_policy_file}")}" | |
} | |
output "role_arn" { | |
value = "${aws_iam_role.role.arn}" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am clstokes on github. | |
* I am clstokes (https://keybase.io/clstokes) on keybase. | |
* I have a public key whose fingerprint is B970 5386 3BE3 EAE8 446A 1FA8 AAC4 B68D A32C 32D4 | |
To claim this, I am signing this object: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
clstokes-mbpro:consul-cluster clstokes$ terraform apply aws-nat-consul-cluster/terraform/ | |
atlas_artifact.consul: Refreshing state... (ID: us-east-1:ami-fa522a90,us-west-2:ami-9b4150fa) | |
atlas_artifact.consul_client: Refreshing state... (ID: us-east-1:ami-0e5f2764,us-west-2:ami-35435254) | |
template_file.consul_update: Refreshing state... (ID: d82b4576930c7fe3d4a263ba5b15ed833c1cd9e5b984b1c9b92447dff46a2459) | |
aws_vpc.main: Refreshing state... (ID: vpc-36b13452) | |
aws_key_pair.main: Refreshing state... (ID: atlas-example) | |
aws_subnet.subnet_b: Refreshing state... (ID: subnet-dd7077f6) | |
aws_subnet.subnet_c: Refreshing state... (ID: subnet-803eccf6) | |
aws_security_group.admin_access: Refreshing state... (ID: sg-4d38a62b) | |
aws_security_group.consul: Refreshing state... (ID: sg-4c38a62a) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"variables": { | |
"region": "nyc2", | |
"source_image": "ubuntu-14-04-x64", | |
"atlas_username": "{{ env `ATLAS_USERNAME` }}", | |
"atlas_name": "digitalocean-example" | |
}, | |
"builders": [{ | |
"type": "digitalocean", | |
"image": "{{user `source_image`}}", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
provider "aws" { | |
access_key = "ASDF" | |
secret_key = "ASDF" | |
region = "us-east-1" | |
} | |
resource "aws_security_group" "no_modifications_single_ingress" { | |
name = "no_modifications_single_ingress" | |
description = "this security group causes NO modifications each run" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
variable "subnet_cidr_blocks" { | |
default = "192.168.0.0/24,192.168.1.0/24,192.168.2.0/24" | |
} |
NewerOlder