For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
from celery import shared_task | |
@shared_task(bind=True) | |
def cute_task(self, filters=None): | |
if filters is None: | |
filters = {} | |
for x in range(0, 10): | |
print(filters) | |
filters[str(uuid.uuid4())] = str(uuid.uuid4()) | |
raise self.retry() |
type Node interface { | |
Prepare() | |
Run() | |
} | |
func doSomeWork(n Node) { | |
// ... | |
n.Prepare() | |
// ... | |
n.Run() |
from sanic import Sanic | |
from sanic.response import json | |
from prometheus_client import Counter | |
from sanic_prometheus import monitor | |
c1 = Counter('simple_counter', "Just simple counter") | |
app = Sanic("snippet") | |
monitor(app).expose_endpoint() |
class C1: | |
def __init__(self, obj): | |
self.obj = obj | |
def __getattr__(self, name): | |
if hasattr(self.obj, name): | |
return getattr(self.obj, name) | |
def t1(self): |
import java.lang.Math; | |
import java.util.function.BinaryOperator; | |
import java.io.*; | |
// one class needs to have a main() method | |
public class Test | |
{ | |
// arguments are passed using the text field below this editor | |
[bumpversion] | |
current_version = 0.1.0 | |
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)(\-(?P<pre>[a-z]+)\.(?P<prenum>\d+))? | |
serialize = | |
{major}.{minor}.{patch}-{pre}.{prenum} | |
{major}.{minor}.{patch} | |
[bumpversion:file:test.txt] | |
[bumpversion:part:pre] |
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
server 172.158.0.0 255.255.0.0 | |
verb 3 | |
key ... | |
ca .. | |
cert ... | |
dh ... | |
tls-auth ... | |
key-direction 0 | |
keepalive 10 60 | |
persist-key |
server { | |
listen 80; | |
server_name _; | |
rewrite ^ https://$http_host$request_uri? permanent; # force redirect http to https | |
} | |
server { | |
listen 443; | |
ssl on; | |
ssl_certificate /path/to/ssl; |
I hereby claim:
To claim this, I am signing this object: