- Create a new directory with these three files (requirements.txt, main.py, README.md)
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt
python main.py
- Update
main()
to run the example prompt chains
Nodes are not assigned public IP. If you have accessible VM in the same VNET as worker nodes, then you can use that VM as jump host and connect the worker via private IP.
Alternatively public IP can be assigned to a worker node. This readme shows how to do that.
find out the resource group that AKS created for the node VMs
export class BaseEnvironment { | |
env: BaseEnvironment.Env | |
FirebaseConfig: { | |
apiKey: string, | |
authDomain: string, | |
databaseURL: string, | |
projectId: string, | |
storageBucket: string, | |
messagingSenderId: string | |
} |
// App | |
import { Component } from '@angular/core'; | |
@Component({ | |
selector: 'app', | |
template: '<span>{{ sayHello() }}</span>', | |
}) | |
export class App { | |
public name: string = 'John'; |
fastlane_version "1.33.0" | |
default_platform :ios | |
platform :ios do | |
before_all do | |
cocoapods | |
ENV['KEYCHAIN_NAME'] = "TempKeychain.keychain" | |
end |
#!/bin/bash | |
function switch_files { | |
mv $1.png $1.tmp.png | |
mv $1-inverse.png $1.png | |
mv $1.tmp.png $1-inverse.png | |
mv [email protected] [email protected] | |
mv [email protected] [email protected] | |
mv [email protected] [email protected] | |
} |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
List some crypto libraries for JavaScript out there. Might be a bit out dated. Scroll to the bottom.
http://www.w3.org/TR/WebCryptoAPI/
This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption. Additionally, it describes an API for applications to generate and/or manage the keying material necessary to perform these operations. Uses for this API range from user or service authentication, document or code signing, and the confidentiality and integrity of communications.