Skip to content

Instantly share code, notes, and snippets.

View jaymzh's full-sized avatar

Phil Dibowitz jaymzh

View GitHub Profile
# should be
if some_condition && another_condition ||
more_condition && wonky_condition
puts "foo"
end
# But vim doesn't notice the line continuation here and does
if some_condition && another_condition ||
more_condition && wonky_condition
puts "foo"
@jaymzh
jaymzh / gist:0e024bc5e2df2bac73bb
Created August 25, 2014 23:21
Attributes FTW
== roles mergeing with roles ==
In this case:
```
default_attribute 'foo' => {'bar' => '123', 'bat' => '123'}
```
and later:

Keybase proof

I hereby claim:

  • I am jaymzh on github.
  • I am jaymzh (https://keybase.io/jaymzh) on keybase.
  • I have a public key whose fingerprint is 121B DA2D 4ACB 6361 6B36 7A0E 58E1 1BB1 E414 D9AD

To claim this, I am signing this object:

@jaymzh
jaymzh / gist:e269a27b146f404a1147
Last active January 9, 2016 03:46
fboss1-config
{
"version": 0,
"ports": [
{
"logicalID": 1,
"state": 2,
"minFrameSize": 64,
"maxFrameSize": 1500,
"parserType": 1,
"routable": true,
{
"version": 0,
"ports": [
{
"logicalID": 1,
"state": 2,
"minFrameSize": 64,
"maxFrameSize": 1500,
"parserType": 1,
"routable": true,
{
"version": 0,
"ports": [
{
"logicalID": 1,
"state": 2,
"minFrameSize": 64,
"maxFrameSize": 1500,
"parserType": 1,
"routable": true,
self.log.debug('internal', "fuckidfy fuck")
self.log.info('timing', "xyz took 2 seconds")
--- a/pyanaconda/iutil.py
+++ b/pyanaconda/iutil.py
@@ -790,10 +790,9 @@ def enable_service(service):
def disable_service(service):
""" Disable a systemd service in the sysroot """
- ret = _run_systemctl("disable", service, root=getSysroot())
-
- if ret != 0:
- raise ValueError("Error disabling service %s: %s" % (service, ret))
[vagrant@scale-www1 ~]$ sudo iptables -n -L
Chain INPUT (policy DROP)
target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 flags:0x17/0x02 ctstate NEW
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 flags:0x17/0x02 ctstate NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW
[vagrant@scale-www1 ~]$ sudo ip6tables -n -L
Chain INPUT (policy DROP)
target prot opt source destination
DROP all ::/0 ::/0 ctstate INVALID
ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT tcp ::/0 ::/0 tcp dpt:22 flags:0x17/0x02 ctstate NEW
ACCEPT all ::/0 ::/0
ACCEPT tcp ::/0 ::/0 tcp dpt:2222 flags:0x17/0x02 ctstate NEW
ACCEPT tcp ::/0 ::/0 tcp dpt:443 ctstate NEW
ACCEPT tcp ::/0 ::/0 tcp dpt:80 ctstate NEW