Well there's no builtin way of doing.
The problem is:
We need a way of skipping steps, or conditional pipelines that are triggered when
some dir/*
files.*
were changed since last commit.
Useful if you maintain a:
- Monorepo
{ | |
"annotations": { | |
"list": [ | |
{ | |
"builtIn": 1, | |
"datasource": "-- Grafana --", | |
"enable": true, | |
"hide": true, | |
"iconColor": "rgba(0, 211, 255, 1)", | |
"name": "Annotations & Alerts", |
Well there's no builtin way of doing.
The problem is:
We need a way of skipping steps, or conditional pipelines that are triggered when
some dir/*
files.*
were changed since last commit.
Useful if you maintain a:
# By default, Docker containers run as the root user. This is bad because: | |
# 1) You're more likely to modify up settings that you shouldn't be | |
# 2) If an attacker gets access to your container - well, that's bad if they're root. | |
# Here's how you can run change a Docker container to run as a non-root user | |
## CREATE APP USER ## | |
# Create the home directory for the new app user. | |
RUN mkdir -p /home/app |
I've been playing with jq, and I've been having a hard time finding examples of how it works with output from a service like AWS (which I use a lot).
Here is one I use a lot with vagrant-ec2.
When we're launching and killing a lot of instances, the AWS API is the only way to track down which instances are live, ready, dead, etc.
To find instances that are tagged with e.g. {"Key" = "Name", "Value" = "Web-00'} in the middle of a vagrant dev cycle, or a prod launch/replace cycle, you can do something like this:
This project has moved to https://github.com/jonhoo/drwmutex so it can be imported into Go applications.
import javax.crypto.*; | |
import javax.crypto.spec.GCMParameterSpec; | |
import java.nio.ByteBuffer; | |
import java.security.SecureRandom; | |
import java.util.Arrays; | |
public class AESGCMUpdateAAD2 { | |
// AES-GCM parameters | |
public static final int AES_KEY_SIZE = 128; // in bits |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
local ffi = require "ffi" | |
local sha512 = require "resty.sha512" | |
local aes = require "resty.aes" | |
local ffi_new = ffi.new | |
local ffi_str = ffi.string | |
local C = ffi.C | |
local setmetatable = setmetatable | |
local error = error |
var crypto = require("crypto"); | |
var moment = require("moment") | |
var s3 = { | |
generateS3Policy: function (fileName) { | |
var s3Policy = { | |
'conditions': [ | |
{'bucket': CONF.s3.bucket}, | |
['starts-with', '$key', 'uploads/' + fileName], | |
{'acl': 'public-read'}, |