Skip to content

Instantly share code, notes, and snippets.

View pgvishnuram's full-sized avatar
🏠
Working from home

pgvishnuram

🏠
Working from home
View GitHub Profile
@pgvishnuram
pgvishnuram / setup-protoc-3.21.9.sh
Last active April 2, 2024 07:41
download protoc
#!/bin/bash
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@v1.1.0
go install google.golang.org/protobuf/cmd/protoc-gen-go@v1.28
export PATH="$PATH:$(go env GOPATH)/bin"
PROTOC_ZIP=protoc-21.9-osx-x86_64.zip
curl -OL https://github.com/protocolbuffers/protobuf/releases/download/v21.9/$PROTOC_ZIP
sudo unzip -o $PROTOC_ZIP -d /usr/local bin/protoc
sudo unzip -o $PROTOC_ZIP -d /usr/local 'include/*'
{
"features": {
"stellar": {
"introducedVersion": "6.0.0"
},
"triggerer": {
"introducedVersion": "4.0.0"
}
},
"runtimeVersions": {
# most of these policies taken verbatim from the kyverno library
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: restrictedish-v2
annotations:
kubernetes.io/description: intended to simulate Openshifts restricted-v2
pods to be run with a UID, and SELinux context that are allocated to the namespace. This
is the most restrictive SCC and it is used by default for authenticated users.
On top of the legacy 'restricted' SCC, it also requires to drop ALL capabilities
#!/bin/bash
RELEASE_NAME=$1
EXECUTOR_TYPE=$(helm get values ${RELEASE_NAME} -n astronomer-${RELEASE_NAME} -o json | jq -r .airflow.executor)
if [ "$EXECUTOR_TYPE" = '"CeleryExecutor"' ]; then
SERVICE_NAME=(webserver scheduler worker flower)
else
SERVICE_NAME=(webserver scheduler)
{
"version": "1.0",
"available_releases": [
{
"version": "1.10.5",
"level": "new_feature",
"url": "https://github.com/astronomer/airflow/releases/tag/1.10.5-11",
"release_date": "2020-10-05T20:03:00+00:00",
"tags": ["1.10.5-alpine3.10-onbuild", "1.10.5-buster-onbuild", "1.10.5-alpine3.10", "1.10.5-buster"],
"channel": "stable",
{
"annotations": {
"list": [
{
"builtIn": 1,
"datasource": {
"type": "datasource",
"uid": "grafana"
},
"enable": true,
Docker Events stream
sending all events
{
id: '9ef0d5de-8317-4029-8470-ddfd677fe070',
timestamp: '2023-02-09T14:40:13.709631Z',
action: 'push',
target: {
mediaType: 'application/vnd.docker.distribution.manifest.v2+json',
size: 528,
sending all events
{
id: 'e575682b-7dc7-4e2b-8b79-857a7f316d3c',
timestamp: '2023-02-09T14:47:51.99137Z',
action: 'push',
target: {
mediaType: 'application/vnd.oci.image.manifest.v1+json',
size: 481,
digest: 'sha256:7fb7f34889c1886d77235fa9351bdd10450b93e5b9eec63ba8a2b0a6dfe18591',
length: 481,
from gql import gql, Client
from gql.transport.aiohttp import AIOHTTPTransport
token = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
api_url = "xxxxxxxxxx"
transport = AIOHTTPTransport(url=api_url,headers={'Authorization': token })
client = Client(transport=transport, fetch_schema_from_transport=True)
---
# Source: astronomer/charts/nginx/templates/nginx-config-role.yaml
################################
## NGINX Config Role
#################################
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: astronomer-nginx-config
labels: