I hereby claim:
- I am joestump on github.
- I am joestump (https://keybase.io/joestump) on keybase.
- I have a public key whose fingerprint is 2944 FAE9 2234 A26B 3E7A 5DA0 887D 2343 C10E 0455
To claim this, I am signing this object:
[Unit] | |
Description=Certbot Renewal | |
[Service] | |
# Create /root/.aws/config using the config example. | |
Environment=AWS_PROFILE=certbot | |
# This will renew the certificate using Route53 DNS challenge. | |
# The post-hook will combine the certs for lighttpd and restart. | |
ExecStart=/usr/bin/certbot certonly --non-interactive --dns-route53 --dns-route53-propagation-seconds 120 -d your-domain.example.com --agree-tos -m your-email@example.com --post-hook "cat /etc/letsencrypt/live/your-domain.example.com/privkey.pem /etc/letsencrypt/live/your-domain.example.com/cert.pem | /etc/letsencrypt/live/your-domain.example.com/combined.pem && systemctl restart lighttpd" |
# Use LetsEncrypt SSL certificates and set port to default SSL/TLS port. | |
# This approach does not use Nginx. | |
http: | |
server_port: 443 | |
ssl_certificate: /ssl/fullchain.pem | |
ssl_key: /ssl/privkey.pem |
import requests | |
import json | |
import urllib3 | |
UNIFI_LOGIN_PATH = '/api/auth/login' | |
# Disable SSL verification warnings | |
urllib3.disable_warnings() |
#!/bin/bash | |
set -xe | |
#This script pulls various information from the Synology NAS | |
#Edit /etc/crontab then restart, synoservice -restart crond | |
#Metrics to capture, set to false if you want to skip that specific set | |
capture_system="true" #model information, temperature, update status, | |
capture_memory="false" #information about memory stats | |
capture_cpu="true" #CPU usage |
provider "aws" {} | |
provider "github" {} | |
resource "github_repository" "test" { | |
name = "joestump-test" | |
description = "Terraform test repository" | |
private = true | |
} | |
resource "aws_s3_bucket" "test" { |
AWSTemplateFormatVersion: 2010-09-09 | |
Description: Installs IAM role and policy to allow Support Center access to PCS's CSKAccountProvisioner production role. | |
Resources: | |
TerraformAdministratorRole: | |
Type: "AWS::IAM::Role" | |
Properties: | |
RoleName: PCSSupportAccessRole | |
MaxSessionDuration: 3600 | |
AssumeRolePolicyDocument: | |
Version: "2012-10-17" |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
npm run build | |
gas deploy -s ./conf/$CLIENT_SECRETS -c ./conf/$OAUTH_CREDENTIALS -b ./build -f $GAS_FILE_ID |
from boto.s3.connection import S3Connection | |
from progressbar import Percentage, ETA, FileTransferSpeed, Bar, ProgressBar | |
class S3Transfer(object): | |
def __init__(self, aws_key, aws_secret): | |
self.conn = S3Connection(aws_key, aws_secret) | |
self.progress_bar = None | |
def _update_progress_bar(self, bytes_transferred, size): |