Skip to content

Instantly share code, notes, and snippets.

View stevenjack's full-sized avatar
📝
Available for contracting

Steven Jack stevenjack

📝
Available for contracting
View GitHub Profile
[default]
aws_access_key_id=blah
aws_secret_access_key=blah
region=eu-west-1
<?php
class Test
{
protected $item = array('test');
public function output()
{
echo "Item without {}: $this->item[0]\n";
echo "item with {}: {$item[0]}";
require 'terminal-notifier-guard'
# Simple guard file for running go tests
guard :shell do
watch(/(.*).go/) do |m|
`go test`.tap do |output|
if $? == 0
TerminalNotifier::Guard.success("\u2705 All tests passed")
else
TerminalNotifier::Guard.failed("\u26D4 Some tests failed")
{
"Version": "2008-10-17",
"Id": "AlarmTopicPolicy",
"Statement": [
{
"Sid": "Allow-Publish-Subscribe-AlarmTopicPolicy",
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
@stevenjack
stevenjack / 0_reuse_code.js
Last active August 29, 2015 14:20
Here are some things you can do with Gists in GistBox.
// Use Gists to store code you would like to remember later on
console.log(window); // log the "window" object to the console
package main
import (
"fmt"
"net/http"
"sync"
"time"
)
func main() {
0xecc6b20d3ccac1ee9ef109af5a7cdb85706b1df9

Contributions 29/04/2018

  • Added simple docker-compose support for running a cluster of 4 neo-go nodes to start working on consensus and eventually form part of the integration tests - nspcc-dev/neo-go#74.
  • Looked into issue which seemed to be the user having an issue with neo-python not neo-go 😂 - nspcc-dev/neo-go#75.

Create a new background service

  1. Copy the stack folder from aws-stacks/{stack_name} to compute/ecs/services/{stack_name}.
  2. Update provider sections to be inline with other services in that repo (Add version to providers and key to s3 backend config).
  3. Add modules/ecs/service/background module and supporting terraform data to be used in the module.
  4. Run t plan in assume-role container.
  5. Note down path for any resources that already exist (KMS, dynamoDB, SQS etc).
  6. Look up resource in terraform docs and find out syntax for import, KMS example: t import path.to.kms.key.resource arn::for::kms::key.
  7. Create resource with t apply -auto-approve.
  8. Go to repo of service, and the following to the Dockerfile: