I hereby claim:
- I am lognseth on github.
- I am lognseth (https://keybase.io/lognseth) on keybase.
- I have a public key ASAKiRu_bSSi-S_Y1wMCma2TYK-Vx3pPe8ARH_crtDUSZQo
To claim this, I am signing this object:
<# | |
.SYNOPSIS | |
Converts Mela recipe format to Crouton | |
.DESCRIPTION | |
#> | |
[CmdletBinding()] |
import os | |
import re | |
from azure.containerregistry import ContainerRegistryClient | |
from azure.identity import DefaultAzureCredential | |
# Set up authentication | |
credential = DefaultAzureCredential() | |
# Set up the container registry client | |
registry_name = os.environ["ACR_REGISTRY_NAME"] |
import subprocess | |
import os | |
import re | |
NewTagFromBuildPipeline = None # set to a string or use input() to take user input | |
Stage = None # set to a string or use input() to take user input | |
if not NewTagFromBuildPipeline: | |
NewTag = os.environ.get("NewTag") | |
print("new tag is:", NewTag) |
name | role | ||
---|---|---|---|
Admin User | admin@example.com | Admin | |
Editor User | editor@example.com | Editor | |
Viewer User | viewer@example.com | Viewer |
# Datasources | |
data "azurerm_virtual_network" "vnet" { | |
name = var.vnet_name | |
resource_group_name = var.vnet_resource_group_name | |
} | |
data "azurerm_subnet" "host_dbw_snt" { | |
name = "host_dbw_snt" | |
virtual_network_name = var.vnet_name |
#!/bin/bash | |
# Script to generate self-signed certificates to be used with nginx-ingress and MTLS. | |
# Made in such a way that is harder to accidentally overwrite any other certificates previously generated... | |
echo "Please enter customer, use case and stage name" | |
echo "Customer:" | |
read cust |
# Installation script for Shairport and dependencies | |
# First run chmod +x install_shairport_airplay2.sh | |
# Then run sh install_shairport_airplay2.sh | |
cd | |
cd Downloads | |
iwconfig wlan0 power off | |
apt-get update && apt-get upgrade -y |
# This script is used to install a) personal b) work c) both personal and work applications on a machine running Windows 11 | |
# Running this script will also install WSL and Ubuntu on WSL | |
# Use at your own risk | |
Write-Host "Checking for elevated permissions..." | |
if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole(` | |
[Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
Write-Warning "Insufficient permissions to run this script. Open the PowerShell console as an administrator and run this script again." | |
Break | |
} |
I hereby claim:
To claim this, I am signing this object: