File | Purpose |
---|---|
/etc/compose/docker-compose.yml |
Compose file describing what to deploy |
/etc/systemd/system/docker-compose-reload.service |
Executing unit to trigger reload on docker-compose.service |
/etc/systemd/system/docker-compose-reload.timer |
Timer unit to plan the reloads |
/etc/systemd/system/docker-compose.service |
Service unit to start and manage docker compose |
#!/usr/bin/env python | |
import argparse | |
import os | |
import subprocess | |
import sys | |
import time | |
# Required so we don't generate tons of logs during restore | |
disable_logging_sql = "ALTER USER postgres RESET pgaudit.log;" |
#!/usr/bin/env bash | |
set -eu | |
# Finds the heroku slug id from the compile apps latests releases | |
# via the commit SHA | |
function heroku_slug () { | |
heroku releases --app ${1} --json | \ | |
jq -rc --arg commit "${2}" \ | |
'.[] |
defmodule Broker.Workers.Appsignal do | |
@moduledoc false | |
alias Appsignal.Error | |
alias Appsignal.Transaction | |
def handle_event([:oban, event], measurement, meta, _) when event in [:success, :failure] do | |
transaction = record_event(measurement, meta) | |
if event == :failure && meta.attempt >= meta.max_attempts do | |
{reason, message, stack} = normalize_error(meta) |
package main | |
import ( | |
"context" | |
"flag" | |
"fmt" | |
"log" | |
"os" | |
"os/signal" | |
"syscall" |
import Foundation | |
import CoreLocation | |
extension CLLocation { | |
// Alias for `horizontalAccuracy` (more readable) | |
var uncertainty: Double { | |
return horizontalAccuracy | |
} | |
} |
#!/bin/bash | |
APP="my-app" | |
REMOTE_USER="deployer" | |
SERVER="example.com" | |
BUILD_DIR="/usr/src/${APP}" | |
DEPLOY_DIR="/opt/${APP}" | |
############ |
# Elixir v1.0 | |
defmodule Rules do | |
defmacro __using__(_) do | |
quote do | |
import unquote(__MODULE__) | |
@before_compile unquote(__MODULE__) | |
@rules [] | |
end | |
end |
Warning: Like the shitty OSS person I am, I forgot to update this. This particular iteration is exploitable in a really basic way that I missed. I will update this with the updated version hopefully soon
While authing against our Google Apps domain has worked pretty well up until now, we really needed a way to auth against out Github organization. Not everyone who is accessing some of our protected development content has an email account in our Google Apps domain. They do, however, have access to our github org.
Sadly it seems that apache and nginx modules for doing oauth are lacking.
I was hoping to avoid the whole lua approach (and mod_authnz_external
was a no go from the start). However I realized that Brian Akins (@bakins) had done some fancy omnibus work that got me 90% of the way there.
From there it was a matter of patching up the omnibus repo to bring it to current versions as well as adding in a few additional components.