I hereby claim:
- I am krancour on github.
- I am krancour (https://keybase.io/krancour) on keybase.
- I have a public key ASDTmVsyQkX6PEtVUnaBz6Jx7csydOnBOl9bsZ3BPrQWlQo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
### Keybase proof | |
I hereby claim: | |
* I am krancour on github. | |
* I am krancour (https://keybase.io/krancour) on keybase. | |
* I have a public key ASC8NnrXXN0YisXnnyDU-_rzmxHFH2gUC8p2Ol1swXz0EAo | |
To claim this, I am signing this object: |
I hereby claim:
To claim this, I am signing this object:
b6c5211
(router) - router: Pass on X-Forwarded-Proto and X-Forwarded-Port06b7ac8
(router) - ssl: Delete unused certs and dhparamde38946
(charts) - router: Make platformDomain configurable thru toml4295812
(charts) - builder: add git push lock timeout env to builder rcc15c268
(workflow-manager) - pkg,api: add ping path to swagger spec{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Conditions": { | |
"EmptyAvailabilityZone": { | |
"Fn::Equals": [ | |
{ | |
"Ref": "AvailabilityZone" | |
}, | |
"" | |
] |
#!/bin/bash | |
set -e | |
DEISCTL_VERSION="1.7.0" | |
deisctl --version | grep $DEISCTL_VERSION || echo "Expected deisctl version (${DEISCTL_VERSION}) not found." && exit 1 | |
echo "Copying Deis units..." |
git archive master | docker run -i -a stdin -a stdout -a stderr deis/slugbuilder - | docker run -i -a stdin -a stdout -a stderr -P deis/slugrunner start web |
>>> Publishing release from source tree <<< | |
docker tag -f deis/builder:git-18350a4 192.168.59.103:5000/deis/builder:git-18350a4 | |
docker push 192.168.59.103:5000/deis/builder:git-18350a4 | |
2015/05/12 15:05:32 Error: Invalid registry endpoint https://192.168.59.103:5000/v1/: Get https://192.168.59.103:5000/v1/_ping: EOF. If this private registry supports only HTTP or HTTPS with an unknown CA certificate, please add `--insecure-registry 192.168.59.103:5000` to the daemon's arguments. In the case of HTTPS, if you have access to the registry's CA certificate, no need for the flag; simply place the CA certificate at /etc/docker/certs.d/192.168.59.103:5000/ca.crt | |
make[1]: *** [push] Error 1 | |
make: *** [dev-release] Error 2 | |
>>> Error detected, dumping logs <<< |
nodes=(10.0.3.209 10.0.1.154 10.0.1.80 10.0.1.5) | |
for i in ${nodes[*]} | |
do | |
ssh core@$i date | |
done |