Skip to content

Instantly share code, notes, and snippets.

require 'prometheus/client'
prometheus = Prometheus::Client.registry
$email_job_retries = prometheus.counter(:http_requests, 'A counter of Email jobs that were retried')
ActiveSupport::Notifications.subscribe "enqueue_retry.active_job" do |name, start, finish, id, payload|
$email_job_retries.increment({ job: payload[:job] })
end
COMMENTS_REGEX = /^comment\+(.+)@example\.com/i
# app/mailboxes/application_mailbox.rb
class ApplicationMailbox < ActionMailbox::Base
routing COMMENTS_REGEX => :comments
end
# app/mailboxes/comments_mailbox.rb
class CommentsMailbox < ApplicationMailbox
def process
def test_broadcasts
assert_broadcasts 'messages', 0
ActionCable.server.broadcast 'messages', { text: 'hello' }
assert_broadcasts 'messages', 1
end
def test_subscribed_with_room_number
subscribe room_number: 1
assert subscription.confirmed?
assert_has_stream "chat_1"
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: vault-sidekick
spec:
replicas: 1
template:
metadata:
labels:
name: vault-sidekick
# Step 1: Fetch Kubernetes' service ClusterIP
data "kubernetes_service" "kubernetes" {
metadata {
name = "kubernetes"
}
}
# Step 2: Mount Vault Kubernetes authentication backend
resource "kubernetes_service_account" "vault-tokenreview" {
metadata {
name = "vault-tokenreview"
}
}
resource "kubernetes_cluster_role_binding" "vault-tokenreview-clusterrolebinding" {
metadata {
name = "vault-tokenreviewer"
}
provider "google" {
credentials = "${file("creds/account.json")}"
project = "vault-sidecar"
region = "europe-west2"
}
provider "kubernetes" {
}
resource "kubernetes_role_binding" "vault-operator-role-binding" {
metadata {
name = "vault-operator-rolebinding"
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "Role"
name = "vault-operator-role"
}
subject {
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: vaultservices.vault.security.coreos.com
spec:
group: vault.security.coreos.com
names:
kind: VaultService
listKind: VaultServiceList
plural: vaultservices
resource "kubernetes_role_binding" "etcd-operator-role-binding" {
metadata {
name = "etcd-operator"
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "Role"
name = "etcd-operator"
}
subject {