Skip to content

Instantly share code, notes, and snippets.

View ohsh6o's full-sized avatar
✈️
As of 5 November 2021, I am no longer a contractor in GSA 10x or other projects.

Alexander Stein (Inactive) ohsh6o

✈️
As of 5 November 2021, I am no longer a contractor in GSA 10x or other projects.
View GitHub Profile

Using an SSH tunnel to remotely administer a cloud.gov RDS

Cloud.gov let's you interact with your apps and bound services via SSH.

The cf-service-connect plugin lets you connect to your bound services, and is often your beset choice for interacting with services in cloud.gov. But what if cf-service-connect doesn't work for you (e.g., if you are using a newer version of the cf CLI?

SSH tunneling to the rescue!

Usage

``` Translated into terraform
resource "aws_iam_role_policy" "cc-iam-stack-IamRole-UUID_CloudCheckr-CloudTrail-Policy" {
name = "CloudCheckr-CloudTrail-Policy"
role = "cc-iam-stack-IamRole-UUID"
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
@rvdb
rvdb / schematron+xslt.sch
Created March 10, 2017 20:28
a Schematron file and XML test file, illustrating how (any?) XSLT instructions inside in Schematron patterns just seem to be executed
<?xml version="1.0" encoding="UTF-8"?>
<sch:schema xmlns:sch="http://purl.oclc.org/dsdl/schematron" queryBinding="xslt2"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:local="local">
<!-- all XSLT -->
<xsl:variable name="test">test value</xsl:variable>
<xsl:template name="get.test">
<xsl:value-of select="local:get.test()"/>