Skip to content

Instantly share code, notes, and snippets.

{
repository(name: "spinnaker", owner: "spinnaker") {
r1: ref(qualifiedName: "master") {
target {
...commitsInRef
}
}
r2: ref(qualifiedName: "create-pull-request/patch") {
target {
...commitsInRef
{
repository(name: "spinnaker", owner: "spinnaker") {
ref(qualifiedName: "master") {
target {
... on Commit {
history(first: 1) {
edges {
node {
committedDate
}
@gh-mlfowler
gh-mlfowler / awsuser.tf
Created July 12, 2019 15:34
Handy piece of self contained Terraform for creating an AWS user with necessary exports for use with the CLI. Very useful for testing IAM permissions.
terraform {
required_version = ">=0.11.0"
}
provider "aws" {
version = "~> 2.0"
}
resource "aws_iam_user" "user" {
name = "testuser"
@gh-mlfowler
gh-mlfowler / aws_security_group_details.sh
Created June 7, 2018 18:27 — forked from richadams/aws_security_group_details.sh
A quick and dirty script to list out all security group settings on an AWS account. Barely tested, use at own risk, etc. Requires awscli to be installed.
#!/bin/bash
# Requires: awscli (http://aws.amazon.com/cli/)
# Prints out a list of all security groups and their settings, just for quickly auditing it.
# Want to do this for all regions...
REGIONS=(`aws ec2 describe-regions --region us-west-1 --output text | grep "-" | awk -F $'\t' '{print $3}'`)
for REGION in ${REGIONS[*]}; do
echo "=> $REGION"
# Grab all the security group info for this region in one call.

Keybase proof

I hereby claim:

  • I am gh-mlfowler on github.
  • I am mlfowler (https://keybase.io/mlfowler) on keybase.
  • I have a public key whose fingerprint is D672 6F94 0537 71E6 86FF A354 A547 D1A4 6D59 182D

To claim this, I am signing this object: