- Add this to your .rc file
preexec () {
(( $#_elapsed > 1000 )) && set -A _elapsed $_elapsed[-1000,-1]
typeset -ig _start=SECONDS
}
# Notify about long running commands
function precmd() {
| { | |
| "runtimeTarget": { | |
| "name": ".NETCoreApp,Version=v7.0", | |
| "signature": "" | |
| }, | |
| "compilationOptions": {}, | |
| "targets": { | |
| ".NETCoreApp,Version=v7.0": { | |
| "MyWebApp/1.0.0": { | |
| "dependencies": { |
| { | |
| "version": 3, | |
| "targets": { | |
| "net7.0": { | |
| "Microsoft.AspNetCore.Authentication.Abstractions/2.2.0": { | |
| "type": "package", | |
| "dependencies": { | |
| "Microsoft.AspNetCore.Http.Abstractions": "2.2.0", | |
| "Microsoft.Extensions.Logging.Abstractions": "2.2.0", | |
| "Microsoft.Extensions.Options": "2.2.0" |
| { | |
| "$schema": "http://cyclonedx.org/schema/bom-1.4.schema.json", | |
| "bomFormat": "CycloneDX", | |
| "specVersion": "1.4", | |
| "serialNumber": "urn:uuid:36ded7b4-8fa9-4caf-8b47-507c0acd6751", | |
| "version": 1, | |
| "metadata": { | |
| "timestamp": "2023-07-20T21:53:19-07:00", | |
| "tools": [ | |
| { |
| { | |
| "artifacts": [ | |
| { | |
| "id": "55b15606ad877995", | |
| "name": "adduser", | |
| "version": "3.115", | |
| "type": "deb", | |
| "foundBy": "dpkgdb-cataloger", | |
| "locations": [ | |
| { |
| { | |
| "artifacts": [ | |
| { | |
| "id": "55b15606ad877995", | |
| "name": "adduser", | |
| "version": "3.115", | |
| "type": "deb", | |
| "foundBy": "dpkgdb-cataloger", | |
| "locations": [ | |
| { |
| #!/bin/sh | |
| sudo apt-get -y install awscli | |
| export AWS_DEFAULT_REGION=$( curl -s http://169.254.169.254/latest/meta-data/placement/region ) | |
| EFS_ID=$( aws ssm get-parameter --name dev_efs_id --output text --query 'Parameter.Value' ) | |
| ACCESS_POINT_DATA=$( aws ssm get-parameter --name dev_efs_data_ap --output text --query 'Parameter.Value' ) | |
| EFS_MOUNT_AZ=$( aws ssm get-parameter --name dev_efs_az --output text --query 'Parameter.Value' ) | |
| IP_ALLOC_ID=$( aws ssm get-parameter --name dev_ip_allocation_id --output text --query 'Parameter.Value' ) | |
| SSH_PUBLIC_KEY=$( aws ssm get-parameter --name dev_ssh_key --output text --query 'Parameter.Value' ) |
preexec () {
(( $#_elapsed > 1000 )) && set -A _elapsed $_elapsed[-1000,-1]
typeset -ig _start=SECONDS
}
# Notify about long running commands
function precmd() {
| {"test":"cool"} |
| #!/bin/sh | |
| # This is a secret decryption script that will decrypt ejson-kms secrets and | |
| # export them to the shell environment. | |
| # | |
| # It expects two sane defaults: | |
| # 1. That $ENV has been set already, so that we know which environment we're in | |
| # and what secrets to export. | |
| # 2. That the location of your secrets are either relative at | |
| # _infra/secrets/$ENV.json or absolutely located at /opt/_infra/secrets/$ENV.json. |