In iTerm2, in the menu bar go to Scripts > Manage > New Python Script
Select Basic. Select Long-Running Daemon
Give the script a decent name (I chose auto_dark_mode.py
)
Save and open the script in your editor of choice.
let g:polyglot_disabled = ['groovy', 'Jenkinsfile', 'jenkinsfile'] | |
call plug#begin('~/.vim/plugged') | |
Plug 'direnv/direnv.vim' | |
Plug 'tpope/vim-sensible' | |
Plug 'tpope/vim-surround' | |
Plug 'tpope/vim-repeat' | |
Plug 'tpope/vim-fugitive' | |
Plug 'mbbill/undotree' | |
Plug 'junegunn/fzf' | |
Plug 'junegunn/fzf.vim' |
Testing Jenkins flows on your local machine, or running Jenkins in production in a docker container can be a little tricky with a docker-in-docker scenario. You could install Jenkins to avoid any docker-in-docker issues, but then you have Jenkins on your machine, and the local environment is likely going to be a fairly different from the actual production build servers, which can lead to annoying and time-consuming issues to debug.
Build environment differences are precisely why there is a strong argument to be made to run build processes strictly in docker containers. If we follow the philosophy that every build step or action should run in a docker container, even the Jenkins server itself, then we get massive benefits from things like, total control over the build environment, easily modify the build environment without the possibility of adversely effecting other jobs, explicit and strongly controlled tool versions,
with import <nixpkgs> {}; | |
(let | |
yoyo-migrations = with python27.pkgs; buildPythonPackage rec { | |
pname = "yoyo-migrations"; | |
version = "5.0.1"; | |
src = fetchPypi { | |
inherit pname version; | |
sha256 = "d458f78443b1db57eda423e86fe8b245561340a394da5dc83f40d6d1ae4237a4"; | |
}; | |
doCheck = false; |
# use C-a, since it's on the home row and easier to hit than C-b | |
set-option -g prefix C-a | |
unbind-key C-a | |
bind-key C-a send-prefix | |
set -g base-index 1 | |
# Easy config reload | |
bind-key R source-file ~/.tmux.conf \; display-message "tmux.conf reloaded." | |
# vi is good |
call plug#begin('~/.vim/plugged') | |
Plug 'fatih/vim-go', { 'do': ':GoInstallBinaries' } | |
Plug 'https://github.com/tpope/vim-sensible' | |
Plug 'https://github.com/tpope/vim-surround' | |
Plug 'https://github.com/tpope/vim-repeat' | |
Plug 'https://github.com/kien/ctrlp.vim' | |
Plug 'https://github.com/vim-scripts/auto-pairs-gentle' | |
Plug 'https://github.com/airblade/vim-gitgutter' | |
Plug 'https://github.com/majutsushi/tagbar.git' | |
Plug 'https://github.com/altercation/vim-colors-solarized' |
#!/bin/bash | |
# | |
# Open the specified file on GitHub. It will use the master branch by default: | |
# | |
# repo -f app/controllers/application_controller.rb | |
# | |
# Specify a different branch: | |
# | |
# repo -b another-branch -f app/controllers/application_controller.rb |
call plug#begin('~/.vim/plugged') | |
Plug 'fatih/vim-go', { 'do': ':GoInstallBinaries' } | |
Plug 'https://github.com/tpope/vim-sensible' | |
Plug 'https://github.com/tpope/vim-surround' | |
Plug 'https://github.com/tpope/vim-repeat' | |
Plug 'https://github.com/kien/ctrlp.vim' | |
Plug 'https://github.com/vim-scripts/auto-pairs-gentle' | |
Plug 'https://github.com/airblade/vim-gitgutter' | |
Plug 'https://github.com/majutsushi/tagbar.git' | |
Plug 'https://github.com/altercation/vim-colors-solarized' |
from influxdb import InfluxDBClient | |
db = "ci-metrics-testing" | |
client = InfluxDBClient("localhost", 8086, "root", "root", db) | |
client.create_database(db) # TODO: check if this overrites previous db | |
days = [ | |
# 1 | |
{ | |
"measurement": "commits", |
# If you use bash, this technique isn't really zsh specific. Adapt as needed. | |
source ~/keychain-environment-variables.sh | |
# AWS configuration example, after doing: | |
# $ set-keychain-environment-variable AWS_ACCESS_KEY_ID | |
# provide: "AKIAYOURACCESSKEY" | |
# $ set-keychain-environment-variable AWS_SECRET_ACCESS_KEY | |
# provide: "j1/yoursupersecret/password" | |
export AWS_ACCESS_KEY_ID=$(keychain-environment-variable AWS_ACCESS_KEY_ID); | |
export AWS_SECRET_ACCESS_KEY=$(keychain-environment-variable AWS_SECRET_ACCESS_KEY); |