github-backup | Backup GitHub | Continuous Backup library
kandi X-RAY | github-backup Summary
kandi X-RAY | github-backup Summary
Backup GitHub repositories locally.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of github-backup
github-backup Key Features
github-backup Examples and Code Snippets
Community Discussions
Trending Discussions on github-backup
QUESTION
One of our Apps github-backup
requires the use of an RSA Private Key as an Environment Variable.
Simply attempting to export the key it in the terminal e.g:
text
export PRIVATE_KEY=-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA04up8hoqzS1+
...
l48DlnUtMdMrWvBlRFPzU+hU9wDhb3F0CATQdvYo2mhzyUs8B1ZSQz2Vy==
-----END RSA PRIVATE KEY-----
Does not work ... because of the line breaks.
I did a bit of googling but did not find a workable solution ...
e.g: How to set multiline RSA private key environment variable for AWS Elastic Beans
Error:
-----END RSA PRIVATE KEY-----': not a valid identifier
followed the instructions in: http://blog.vawter.com/2016/02/10/Create-an-Environment-Variable-from-a-Private-Key
Created a file called keytoenvar.sh
with the following lines:
ANSWER
Answered 2018-Mar-26 at 10:28export the key
QUESTION
I'm using Terraform to create a few services in AWS. One of those services is an ECS task definition. I followed the docs and I keep getting the following error:
...ANSWER
Answered 2018-Jul-31 at 13:14As mentioned in the AWS ECS User Guide Fargate tasks require the execution role to be specified as part of the task definition.
EC2 launch type tasks don't require this because the EC2 instances themselves should have an IAM role that allows them to pull the container image and optionally push logs to Cloudwatch.
Because this is optional for EC2 launch types then Terraform needs to make this optional otherwise it breaks those. Strictly speaking Terraform doesn't have a way to do cross field validation at plan time so it's unable to tell you in the plan that because you have a Fargate launch type task then you need to specify the execution_role_arn
. There are workarounds for this using the CustomizeDiff
in the provider source but it's hacky as all hell and only used in a couple of places right now.
Note that the execution role is what is needed to launch the task, not the role that the task has that allows the task to do things.
So you should remove the ECS related permissions from your IAM policy as the task should not be interacting with S3 at all. Instead just add a role with the appropriate permissions as the execution role.
To use the AWS managed ECS task execution role you would do something like this:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install github-backup
Run npm install -g github-backup
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page