jaのページ、リリースできました:tada:
- dev-1.13-ja.2ほぼ終わり
- あと一個
fragment branchProtection on BranchProtectionRule { | |
allowsDeletions | |
allowsForcePushes | |
creator { | |
login | |
} | |
id | |
isAdminEnforced | |
requiredStatusCheckContexts | |
requiredApprovingReviewCount |
jaのページ、リリースできました:tada:
var lib = require('./patch.js'); | |
var Sequelize = require('sequelize'); | |
var sequelize = new Sequelize('sqlite://dbname', {dialectModulePath: 'sql.js'}); | |
var User = sequelize.define('user', { | |
username: Sequelize.STRING, | |
birthday: Sequelize.DATE | |
}); |
<?xml version="1.0" encoding="UTF-8"?> | |
<configuration> | |
<system.webServer> | |
<rewrite> | |
<rules> | |
<rule name="Index"> | |
<match url="^(.*)$" /> | |
<conditions> | |
<add input="{REQUEST_FILENAME}" matchType="IsFile" negate="true" /> | |
<add input="{REQUEST_FILENAME}" matchType="IsDirectory" negate="true" /> |
I've been using a lot of Ansible lately and while almost everything has been great, finding a clean way to implement ansible-vault wasn't immediately apparent.
What I decided on was the following: put your secret information into a vars
file, reference that vars
file from your task
, and encrypt the whole vars
file using ansible-vault encrypt
.
Let's use an example: You're writing an Ansible role and want to encrypt the spoiler for the movie Aliens.
body { | |
font-family: Helvetica, arial, sans-serif; | |
font-size: 14px; | |
line-height: 1.6; | |
padding-top: 10px; | |
padding-bottom: 10px; | |
background-color: white; | |
padding: 30px; } | |
body > *:first-child { |
use strict; | |
use VM::EC2; | |
my $owner_id = $ENV{EC2_OWNER_ID} or die 'EC2_OWNER_ID is required.'; | |
#my $owner_id = shift or die 'aws_status.pl <owner_id>'; | |
my $ec2 = VM::EC2->new; | |
my @regions = $ec2->describe_regions(); | |
for my $region (@regions) { | |
# region |
つづきはこちらで http://akkunchoi.github.com/git-ref.html
Git
$ git init hoge # git リポジトリを作成。または...