Skip to content

Instantly share code, notes, and snippets.

View jasonmcintosh's full-sized avatar
🔬

Jason jasonmcintosh

🔬
View GitHub Profile
kubectl rollout restart deployment spin-front50
kubectl rollout restart deployment spin-fiat
kubectl rollout restart deployment spin-orca
kubectl rollout restart deployment spin-igor
kubectl rollout restart deployment spin-kayenta
kubectl rollout restart deployment spin-rosco
kubectl rollout restart deployment spin-echo
kubectl rollout restart deployment spin-gate
kubectl rollout restart deployment spin-clouddriver
kubectl rollout restart deployment spin-echo
@jasonmcintosh
jasonmcintosh / get-image-tags.sh
Last active August 23, 2022 21:10
Docker API with CURL
## This is an example, note hte scope on the auth piece - THIS IS GENERATED PER REPO.
## Requires JQ to be installed
export IMAGE="armory/clouddriver"
export TOKEN=$(curl https://auth.docker.io/token\?scope\=repository:$IMAGE:pull\&service\=registry.docker.io | jq -r .token)
curl -v -H "Accept: application/vnd.docker.distribution.manifest.v2+json" -H "Accept: application/vnd.docker.distribution.manifest.list.v2+json" -H "Authorization: Bearer $TOKEN" https://index.docker.io/v2/$IMAGE/tags/list
@jasonmcintosh
jasonmcintosh / spinnaker.yml
Last active October 6, 2022 15:59
BAREBONES Armory Spinnaker yaml connected to a mysql db
apiVersion: v1
kind: PersistentVolume
metadata:
name: mysql-pv-spinnaker
labels:
type: local
spec:
storageClassName: spinnaker
capacity:
storage: 10Gi
ssh-rsa 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
@jasonmcintosh
jasonmcintosh / .vimrc
Created June 14, 2019 17:49
VIM RC File
set nocompatible
source $VIMRUNTIME/vimrc_example.vim
set noundofile
set nobackup
menu Edit.Convert\ to\ JSON :%!python -m json.tool<CR>
menu Syntax.AutoIndent\ File gg=G
set number
set tabstop=4 softtabstop=0 expandtab shiftwidth=2 smarttab
colorscheme pablo
execute pathogen#infect()
@jasonmcintosh
jasonmcintosh / find_missing_cf_aliases.sh
Last active December 18, 2018 20:28
Find Route53 records pointing to CloudFront with NO aliases (allows domain hijacking)
###########################################################################################################
## Requires: jq, awk, sed, aws-cli - and that you are using creds for the aws account you want to connect to
###########################################################################################################
function evaluateMissingAliasesInCloudFront() {
#INFO: This has been tested with the following use cases...
#INFO: * RECORD (CNAME) -> CF Distro
#INFO: * RECORD (A) -> CF Distro
#INFO: * RECORD (CNAME) -> RECORD(A) -> CF Distro
@jasonmcintosh
jasonmcintosh / aws-creds.sh
Last active April 27, 2020 22:29
aws-creds helper script
#!/bin/bash
VAULT_PATH=$1
ROLE=$2
DURATION=$3
if [ -z "$VAULT_ADDR" ]; then
echo "Missing VAULT_ADDR env variable"
exit 1
fi
if [ -z "$VAULT_PATH" ]; then