Skip to content

Instantly share code, notes, and snippets.

T Zhu myster-t

Block or report user

Report or block myster-t

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
shiki / beanstalkd
Created Aug 9, 2010
For CentOS, a modified /etc/init.d/beanstlkd file which creates a pid file in /var/run/
View beanstalkd
# beanstalkd - a simple, fast workqueue service
# chkconfig: - 57 47
# description: a simple, fast workqueue service
# processname: beanstalkd
# config: /etc/sysconfig/beanstalkd
View gist:1254684
dispatch_block_t RecursiveBlock(void (^block)(dispatch_block_t recurse))
// assuming ARC, so no explicit copy
return ^{ block(RecursiveBlock(block)); };
typedef void (^OneParameterBlock)(id parameter);
OneParameterBlock RecursiveBlock1(void (^block)(OneParameterBlock recurse, id parameter))
phughes /
Last active Dec 10, 2015
An Xcode precompilation script to turn your images into auto-completeable, type-checkable symbols.
import os.path as path
import string
import argparse
import glob
import re
def basename(filename):
base = filename
if filename.find('@2x') > 0:
base = filename[:filename.find('@2x')]
stormchasing / Auto Check-In to Southwest Flights.user.js
Last active Nov 7, 2019
Auto Check-In to Southwest Flights.user.js
View Auto Check-In to Southwest Flights.user.js
// ==UserScript==
// @name Auto Check-In to Southwest Flights
// @namespace
// @version 1.8
// @author Nicholas Buroojy (
// @contributor Ryan Izzo (
// @contributor JR Hehnly ( @stormchasing)
// @contributor Trevor McClellan (
// @description Automatically check in to Southwest Airline flights at the appropriate time.
// @include*
RobertoSchneiders /
Last active Oct 1, 2019
IAM Policy for deploy on Elastic Beanstalk

I am deploying with this IAM using Codeship and Circle CI to Elastic Beanstalk. I had a lot of trouble with this config. I talked to the aws support for about 6 hours until this worked properly, so, I guess it is worth to share.

UPDATE: In the end, I have to use the AWSElasticBeanstalkFullAccess policy. My custom policy keep breaking every week with some new added permission or some EB internal change. Anyway, the IAM I was using is below.

This works for me with CircleCI and EB Cli.

    "Version": "2012-10-17",
    "Statement": [
View AWS, ELB, CF and Let's Encrypt
Elastic Load Balancer, CloudFront and Let's Encrypt
You can’t perform that action at this time.