I hereby claim:
- I am briansbum on github.
- I am briansbum (https://keybase.io/briansbum) on keybase.
- I have a public key ASDggbtzONmzxfDS1DFs_sDivEU0GYw67JXMBLX_HG3h7Qo
To claim this, I am signing this object:
| #!/bin/bash | |
| # Create a ram drive | |
| mkdir /mnt/ramdrive | |
| mount -t tmpfs -o size=1024m tmpfs /mnt/ramdrive | |
| # Create a chroot in the ram drive | |
| mkdir /mnt/ramdrive/chroot | |
| # Copy the /bin directory from the root file system into the chroot environment |
| ⋊> ~/g/s/g/B/t/m/aws on policy-document-tests ↑ go test -v -timeout 30m -run TestAssertIAMPolicyIsCorrect 09:40:22 | |
| === RUN TestAssertIAMPolicyIsCorrect | |
| === PAUSE TestAssertIAMPolicyIsCorrect | |
| === CONT TestAssertIAMPolicyIsCorrect | |
| TestAssertIAMPolicyIsCorrect 2018-07-05T09:40:28+01:00 region.go:72: Looking up all AWS regions available in this account | |
| TestAssertIAMPolicyIsCorrect 2018-07-05T09:40:29+01:00 region.go:57: Using region ap-northeast-1 | |
| --- PASS: TestAssertIAMPolicyIsCorrect (1.45s) | |
| PASS | |
| ok github.com/Briansbum/terratest/modules/aws 1.474s | |
| ⋊> ~/g/s/g/B/t/m/aws on policy-document-tests ↑ go test -v -timeout 30m -run TestAssertS3BucketPolicyIsCorrect 09:40:30 |
| === RUN TestTerraformAwsExample | |
| === PAUSE TestTerraformAwsExample | |
| === CONT TestTerraformAwsExample | |
| TestTerraformAwsExample 2018-06-21T15:53:27+01:00 region.go:72: Looking up all AWS regions available in this account | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 region.go:57: Using region ap-southeast-1 | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 retry.go:69: Running terraform [init -upgrade=false] | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:52: Running command terraform with args [init -upgrade=false] | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: [0m[1mInitializing provider plugins...[0m | |
| TestTerraformAwsExample 2018-06-21T15:53:28+01:00 command.go:96: |
| // ==UserScript== | |
| // @name awsRegionIds | |
| // @namespace http://intenthq.com/ | |
| // @version 0.1 | |
| // @description Add AWS region ids to the region selector menu | |
| // @author github.com/Briansbum github.com/kittsville | |
| // @match https://*.console.aws.amazon.com/* | |
| // @grant none | |
| // ==/UserScript== |
| 2018-04-20T10:52:34.486Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/my-role" | |
| 2018-04-20T10:52:34.486Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Reading AppRole auth backend role "auth/approle/role/my-role" | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: 2018/04/20 10:52:34 [DEBUG] Vault API Request Details: | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: ---[ REQUEST ]--------------------------------------- | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: GET /v1/auth/approle/role/my-role HTTP/1.1 | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: Host: vaul.mycorp.com:8201 | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: User-Agent: Go-http-client/1.1 | |
| 2018-04-20T10:52:34.487Z [DEBUG] plugin.terraform-provider-vault_v1.1.0_x4: X-Vault-Token: 72ad29cc-f121 |
I hereby claim:
To claim this, I am signing this object: