Simply put, destructuring in Clojure is a way extract values from a datastructure and bind them to symbols, without having to explicitly traverse the datstructure. It allows for elegant and concise Clojure code.
| { | |
| "description": "F16 to Lock Screen", | |
| "manipulators": [ | |
| { | |
| "from": { | |
| "key_code": "f16" | |
| }, | |
| "to": [ | |
| { | |
| "key_code": "q", | 
| $ terraform apply | |
| Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
| + create | |
| <= read (data resources) | |
| Terraform will perform the following actions: | |
| # module.peering_ca-central-1_us-east-1.data.aws_ec2_transit_gateway.dst will be read during apply | |
| # (config refers to values not yet known) | 
| Verifying that +joeycoleman is my blockchain ID. https://onename.com/joeycoleman | 
I hereby claim:
- I am joey-coleman on github.
- I am joeycoleman (https://keybase.io/joeycoleman) on keybase.
- I have a public key whose fingerprint is 72C1 D299 97ED 068A B8C8 A400 F1F9 2DB5 9151 8821
To claim this, I am signing this object:
Creating a apache-proxy webapp on OS X using Server.app.  Just enable the webapp on the appropriate domains; the path etc is configured in the webapp plist.
The examples below come from the config I used to get jenkins running on the Overture build server.
Frankly, I think the mechanism used has promise, but is very poorly documented. So it goes with much of Apple's Server.app stuff, though. Apple's "Advanced Topics" page at http://www.apple.com/support/osxserver/advancedtopics/ is not a bad place to find a bit of help, though.
- One for the webapp description
- Lives in /Library/Server/Web/Config/apache2/webapps/
- Should be auto-detected by Server.app? Doesn't seem to be for me, no idea why.
 
- Lives in 
- The magic invocation webappctl restartappears to force a reload.
OS X 10.9.2, Server.app 3.0.3
So, Apple wants users to redirect (not forward!) mail to junkmail@ and notjunkmail@ to retrain the spam filter. I think that sucks --- this is not a reasonable way to do things in my opinion.
Anyway, the mechanism seems to be via the launch daemon configured at
/Applications/Server.app/Contents/ServerRoot/System/Library/LaunchDaemons/com.apple.salearn.plist