Skip to content

Instantly share code, notes, and snippets.

Paul Spencer pagameba

Block or report user

Report or block pagameba

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:16df89b4c72b010cc659d79e1f4e028d
resource "aws_ecs_service" "service" {
name = "${var.name}"
cluster = "${var.ecs_cluster_id}"
task_definition = "${aws_ecs_task_definition.task.arn}"
desired_count = "${var.desired_count}"
iam_role = "${aws_iam_role.ecs_service_role.arn}"
deployment_minimum_healthy_percent = "${var.deployment_minimum_healthy_percent}"
deployment_maximum_percent = "${var.deployment_maximum_percent}"
View gist:9bf2344ede1c3b45cd398a79d28dac52
resource "aws_iam_role_policy" "ecs_service_policy" {
name = "ecs-service-policy-${var.name}"
role = "${aws_iam_role.ecs_service_role.id}"
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
View gist:0f5c9c6992d516a6acb0187846784f55
resource "aws_iam_role" "ecs_service_role" {
name = "ecs-service-role-${var.name}"
assume_role_policy = <<EOT
{
"Version": "2008-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": [
View gist:2d62874662033f59de0260e6e4eb3048
/usr/local/opt/openssl/bin/openssl s_client -showcerts -connect vault.inside.canvaspophq.com:443 -verify_hostname vault.inside.canvaspophq.com -servername vault.inside.canvaspophq.com -CApath /usr/local/etc/openssl/certs
CONNECTED(00000003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = vault.inside.canvaspophq.com
verify return:1
---
Certificate chain
View gist:6db2d7f41adc1888163b0256efa606e0
openssl s_client -showcerts -connect <host>:443
CONNECTED(00000003)
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/CN=<host>
i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
-----BEGIN CERTIFICATE-----
View gist:72b1c5f7818f2fb361c00cd287c50da9
Error applying plan:
1 error(s) occurred:
* module.stack.module.ecs_cluster.aws_autoscaling_group.main: aws_autoscaling_group.main: diffs didn't match during apply. This is a bug with Terraform and should be reported as a GitHub Issue.
Please include the following information in your report:
Terraform Version: 0.10.4
Resource ID: aws_autoscaling_group.main
View gist:618aaa8c1da1ace80761749b8c095502
Concept for auto-processing:
given an inventory of crafting cards holding recipes (input and output) and a machine that can turn the input into the output for each one:
Loop over slots in the inventory
For current slot
get output of recipe
get # of items in a storage control module
test < some value
if >
View markdown.md

Typography

Headings

Headings from h1 through h6 are constructed with a # for each level:

# h1 Heading
## h2 Heading
### h3 Heading
@pagameba
pagameba / style.js
Created Oct 8, 2014
Create OL3 Style object(s) from object literals.
View style.js
var styleMap = {
fill: function(obj) {
if (typeof obj == 'string' || Array.isArray(obj)) {
obj = { color: obj };
}
return new ol.style.Fill(obj);
},
stroke: function(obj) {
if (typeof obj == 'string' || Array.isArray(obj)) {
obj = { color: obj };
View index.js
/*jslint node:true, sloppy: true, indent: 2, nomen: true, white: true */
var util = require('util')
, response = require('cradle/lib/cradle/response')
, mockJSON = {
total_rows: 1,
offset: 0,
rows: [{
id: 'some-id',
key: 'some-key',
You can’t perform that action at this time.