How to use:
./wordle.sh
Or try the unlimit mode:
self: super: { | |
consul-bin = self.callPackage ./hashicorp-generic.nix { | |
name = "consul"; | |
version = "1.7.3"; | |
sha256 = "0k03n7h5h8miqhh3n3y47894vhwdcp8m611w55f826swmq9angl1"; | |
}; | |
# and so on... | |
} |
#!/usr/local/bin/python3 | |
import requests | |
import json | |
from twilio.rest import Client | |
HEADERS = {'Accept': 'application/vnd.github.inertia-preview+json'} | |
GH_TOKEN = "XXX" # Your auth token from https://github.com/settings/tokens | |
TW_SID = "XXX" # Your Account SID from twilio.com/console | |
TW_TOKEN = "XXX" # Your Auth Token from twilio.com/console |
I often get asked which tools are good to use for securing your AWS infrastructure so I figured I'd write a short listof some useful Security Tools for the AWS Cloud Infrastructure.
This list is not intended be something completely exhaustive, more so provide a good launching pad for someone as they dig into AWS and want to make it secure from the start.
This section focuses on tools and services provided by the community and released as open-source.
def getProjectName() { | |
return 'JenkinsPipeline' | |
} | |
def getJDKVersion() { | |
return 'jdk1.8.0_101' | |
} | |
def getMavenConfig() { | |
return 'maven-config' |
package main | |
import ( | |
"flag" | |
"fmt" | |
"io" | |
"log" | |
"net" | |
"os" | |
"os/signal" |
{ | |
"description": "Copy the centos.org CentOS 6 AMI into our account so that we can add boot volume encryption.", | |
"min_packer_version": "0.11.0", | |
"variables": { | |
"aws_region": "us-east-1", | |
"aws_vpc": null, | |
"aws_subnet": null, | |
"ssh_username": "centos" | |
}, | |
"builders": [ |
#!/bin/sh | |
command="${*}" | |
printf "Initialized REPL for `%s`\n" "$command" | |
printf "%s> " "$command" | |
read -r input | |
while [ "$input" != "" ]; | |
do | |
eval "$command $input" | |
printf "%s> " "$command" |