Check out the guideline here: https://github.com/aliyun/aliyun-cli ( using Google translator)
Install python pip if necessary
curl https://bootstrap.pypa.io/get-pip.py | sudo python
Install aliyuncli
| /* | |
| https://www.youtube.com/watch?v=iOGIKG3EptI | |
| https://github.com/awslabs/aws-go-wordfreq-sample/blob/master/cmd/uploads3/main.go | |
| https://docs.aws.amazon.com/sdk-for-go/api/aws/ | |
| - first configure your aws credentials run: aws configure | |
| - go get -u github.com/aws/aws-sdk-go/aws | |
| - login to UI web aws s3 interface | |
| - go to S3 service |
Check out the guideline here: https://github.com/aliyun/aliyun-cli ( using Google translator)
Install python pip if necessary
curl https://bootstrap.pypa.io/get-pip.py | sudo python
Install aliyuncli
| # We need this for dependencies | |
| wget http://dl.fedoraproject.org/pub/epel/7/x86_64/e/epel-release-7-5.noarch.rpm | |
| rpm -Uvh epel-release-7-5.noarch.rpm | |
| # And this for Erlang > R16 | |
| wget http://packages.erlang-solutions.com/erlang-solutions-1.0-1.noarch.rpm | |
| rpm -Uvh erlang-solutions-1.0-1.noarch.rpm | |
| sudo yum update | |
| sudo yum install -y erlang-17.5.3-1.el7.centos |
A running example of the code from:
This gist creates a working example from blog post, and a alternate example using simple worker pool.
TLDR: if you want simple and controlled concurrency use a worker pool.
Why not? I thought it'd be interesting, and maybe useful.
| """ | |
| Store this file as `vars_plugins/password_from_keyring.py` and specify the | |
| following in `ansible.cfg`: | |
| ``` | |
| [defaults] | |
| vars_plugins=./vars_plugins | |
| ``` | |
| In your inventory specify: |
| # Description: | |
| # Query Consul with Hubot | |
| # | |
| # Commands: | |
| # hubot consul datacenters - Show Datacenters | |
| # hubot consul services - Show Services | |
| # hubot consul service <servicename> - Show Detailed info about a service | |
| # | |
| # Notes: | |
| # They are commented out by default, because most of them are pretty silly and |
| /* | |
| This example shows how you can use your data structure as a basis for | |
| your Firebase security rules to implement role-based security. We store | |
| each user by their Twitter uid, and use the following simplistic approach | |
| for user roles: | |
| 0 - GUEST | |
| 10 - USER | |
| 20 - MODERATOR |
| package main | |
| import "log" | |
| import "net/http" | |
| import "time" | |
| type Response struct { | |
| StatusCode int | |
| Url string | |
| } |
| (function( $ ){ | |
| $.fn.dependsOn = function(element, value) { | |
| var elements = this; | |
| var hideOrShow = function() { | |
| var $this = $(this); | |
| var showEm; | |
| if ( $this.is('input[type="checkbox"]') ) { | |
| showEm = $this.is(':checked'); | |
| } else if ($this.is('select')) { |