This has been updated to install Dashboard v2.0.0, see below for pre v2.0.0 instructions
Generate the kubeconfig file for your cluster using the Kubeconfig File
button in the Cluster view of your cluster.
// SPDX-License-Identifier: MIT | |
pragma solidity 0.8.16; // (10M optimization runs) | |
interface MonacoInterface { | |
struct CarData { | |
uint32 balance; // Where 0 means the car has no money. | |
uint32 speed; // Where 0 means the car isn't moving. | |
uint32 y; // Where 0 means the car hasn't moved. | |
Car car; | |
} |
#!/bin/bash | |
###################################################### | |
# Basic settings | |
###################################################### | |
# server base directory | |
RAGNAROK_DIR=/rAthena | |
# mysql database settings | |
MYSQL_ROOT_PW="changeme" |
/* Common variables */ | |
const JWT = require('jsonwebtoken'); | |
// Payload | |
const payload = { | |
sub: 'Subject', | |
iss: 'Issuer', | |
exp: 1639248876 | |
} |
version: "3" | |
services: | |
mongo1: | |
hostname: mongo1 | |
container_name: localmongo1 | |
image: mongo:4.0-xenial | |
expose: | |
- 27017 | |
ports: | |
- 27011:27017 |
This has been updated to install Dashboard v2.0.0, see below for pre v2.0.0 instructions
Generate the kubeconfig file for your cluster using the Kubeconfig File
button in the Cluster view of your cluster.
This guide shows how to set up a bidirectional client/server authentication for plain TLS sockets.
Newer versions of openssl are stricter about certificate purposes. Use extensions accordingly.
Generate a Certificate Authority:
<?xml version="1.0" encoding="utf-8" ?> | |
<configuration> | |
<add key="Password" value="ThisIsNotARealPassword" /> | |
<add key="PublicKey" value="PgpPublicKey.asc" /> | |
<add key="PrivateKeyOnly" value="PgpPrivateKeyOnly.asc" /> | |
</configuration> |
Inspired by dannyfritz/commit-message-emoji
See also gitmoji.
Commit type | Emoji |
---|---|
Initial commit | 🎉 :tada: |
Version tag | 🔖 :bookmark: |
New feature | ✨ :sparkles: |
Bugfix | 🐛 :bug: |