I hereby claim:
- I am craigpatten on github.
- I am craigpatten (https://keybase.io/craigpatten) on keybase.
- I have a public key whose fingerprint is 1BBB 9DBC B113 37E9 06E5 4D4B 283E BC1A A897 9C84
To claim this, I am signing this object:
| // https://auth0.com/docs/rules | |
| function (user, context, callback) { | |
| var request = require("request"); | |
| var event = (context.stats.loginsCount > 1) ? "Login" : "Signup"; | |
| var options = { | |
| url: "https://hooks.slack.com/...", | |
| json: true, | 
| #!/usr/bin/env python | |
| import os | |
| import requests | |
| headers = { "authorization": "token %s" % os.environ["GITHUB_TOKEN"] } | |
| teams = requests.get("https://api.github.com/orgs/%s/teams" % os.environ["GITHUB_ORG"], headers=headers).json() | |
| everyone = set() | 
| #!/usr/bin/env node | |
| const fs = require("fs"); | |
| const crypto = require("crypto"); | |
| const walk = require("walk"); | |
| const concat = require("concat-stream"); | |
| const walker = walk.walk("/usr/share/man"); | |
| const hashes = {}; | 
| #!/usr/bin/env python3 | |
| """ | |
| Yank data from Swift and do [something] with it. | |
| """ | |
| import json | |
| import lzma | |
| import os | |
| import sys | 
| #!/usr/bin/env python | |
| import json | |
| import logging | |
| import os | |
| import random | |
| from multiprocessing.pool import ThreadPool | |
| import requests | 
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| """ | |
| Prettify qstat scheduler allocations. | |
| Example: | |
| $ echo foo/1+foo/2+foo/15+foo/16+blah/20+blah/21+blah/30+blah/31+blah/40 | prettify-qstat.py | |
| blah: 20-21, 30-31, 40, foo: 1-2, 15-16 | |
| """ | 
| #!/usr/bin/env python | |
| import boto, base64, hashlib | |
| from boto.s3.connection import S3Connection | |
| server = "your-hcp-endpoint.acme.com" | |
| hs3_id = base64.b64encode("your-hcp-username") | |
| hs3_secret = hashlib.md5("your-hcp-password").hexdigest() | |
| hs3 = S3Connection(aws_access_key_id = hs3_id, aws_secret_access_key = hs3_secret, host = server, debug = 2) | 
Note that this isn't a *.amazonaws.com wildcard. They're just somewhat enthusiastic delegations!
The current live regions (not including China) are:
> grep production output.md | awk '{print $2}'
ap-northeast-1.amazonaws.com
ap-southeast-1.amazonaws.com
ap-southeast-2.amazonaws.com
eu-central-1.amazonaws.com
| > dig @u1.amazonaws.com +norecurse us-central-1.amazonaws.com ns | |
| ; <<>> DiG 9.8.3-P1 <<>> @u1.amazonaws.com +norecurse us-central-1.amazonaws.com ns | |
| ; (1 server found) | |
| ;; global options: +cmd | |
| ;; Got answer: | |
| ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52516 | |
| ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 2 | |
| ;; QUESTION SECTION: |