Instance | Branch |
---|
import java.io.IOException; | |
import javafx.application.Application; | |
import javafx.scene.Scene; | |
import javafx.scene.layout.StackPane; | |
import javafx.scene.web.WebEngine; | |
import javafx.scene.web.WebView; | |
import javafx.stage.Stage; | |
public class Test extends Application { |
PRs are a great way of sharing information, and can help us be aware of the changes that are occuring in our codebase. They are also an excellent way of getting peer review on the work that we do, without the cost of working in direct pairs.
Ultimately though, the primary reason we use PRs is to encourage quality in the commits that are made to our code repositories
Done well, the commits (and their attached messages) contained within tell a story to people examining the code at a later date. If we are not careful to ensure the quality of these commits, we silently lose this ability.
["aabraham","aaccf","aadolf","aage","aalders","aali","aalis","aaliyah","aamina","aaminah","aamu","aapeli","aapo","aaren","aarika","aarne","aaron","aarón","aart","aartjan","aasen","aatami","aatos","aatto","aatu","aawiya","ab","abacus","abadines","abagael","abagail","abahri","abasolo","abazari","abba","abbai","abbán","abbas","abbatant","abbate","abbe","abbes","abbey","abbi","abbie","abbot","abbott","abby","abbye","abd-al-aziz","abd-al-hamid","abd-al-kader","abd-al-karim","abd-al-latif","abd-al-malik","abd-al-qadir","abd-al-rahman","abd-al-rashid","abd-allah","abdalla","abdallah","abdechahid","abdel","abdel-az","abdel-ma","abdel-ra","abdel-sa","abdelazi","abdelaziz","abdelbassir","abdeldjalil","abdelfattah","abdelghafour","abdelghani","abdelhadi","abdelhak","abdelhakim","abdelkader","abdelkarim","abdellah","abdellatif","abdelmad","abdelmadjid","abdelmalik","abdelmoumen","abdelrah","abdelran","abdelsal","abdenour","abderrahim","abderrao","abderraz","abderrazek","abdessalem","abdessatar","abdi","abdiou","abdo","ab |
#!/usr/bin/env bash | |
# Generate RSA private key | |
openssl genrsa -out private_key.pem 1024 |
Here are the simple steps needed to create a deployment from your local GIT repository to a server based on this in-depth tutorial.
You are developing in a working-copy on your local machine, lets say on the master branch. Most of the time, people would push code to a remote server like github.com or gitlab.com and pull or export it to a production server. Or you use a service like deepl.io to act upon a Web-Hook that's triggered that service.
Some notes about:
- Explaining why current day Linux memory swap thrashing still happens (as of 2016).
- Mitigating "stop the world" type thrashing issues on a Linux workstation when it's under high memory pressure and where responsiveness is more important than process completion.
- Prioritizing and limiting memory use.
- Older ulimit versus newer CGroup options.
These notes assume some basic background knowledge about memory management, ulimits and cgroups.
-
namespaces - overview of Linux namespaces http://man7.org/linux/man-pages/man7/namespaces.7.html
-
mount_namespaces - overview of Linux mount namespaces
If you hate git submodule
, then you may want to give git subtree
a try.
When you want to use a subtree, you add the subtree to an existing repository where the subtree is a reference to another repository url and branch/tag. This add
command adds all the code and files into the main repository locally; it's not just a reference to a remote repo.
When you stage and commit files for the main repo, it will add all of the remote files in the same operation. The subtree checkout will pull all the files in one pass, so there is no need to try and connect to another repo to get the portion of subtree files, because they were already included in the main repo.
Let's say you already have a git repository with at least one commit. You can add another repository into this respository like this:
Sometimes, we have to access git repositories over SSL and the server only provides a self-signed certificate 🙈. Although there are ways to increase the trust level for the self-signed certificate (https://confluence.atlassian.com/fishkb/unable-to-clone-git-repository-due-to-self-signed-certificate-376838977.html, https://confluence.atlassian.com/bitbucketserverkb/resolving-ssl-self-signed-certificate-errors-806029899.html), my recommendation is to just ignore SSL verification alltogether.
Prepend GIT_SSL_NO_VERIFY=true
before every git command run to skip SSL verification. This is particularly useful if you haven't checked out the repository yet.
Run git config http.sslVerify false
to disable SSL verification if you're working with a checked out repository already.