Understand your Mac and iPhone more deeply by tracing the evolution of Mac OS X from prelease to Swift. John Siracusa delivers the details.
You've got two main options:
// /stacks/cicd-pipelines.ts | |
// CDK app which creates a stack using a set of service definitions | |
import 'source-map-support/register'; | |
import { App } from '@aws-cdk/cdk'; | |
import { ServiceCicdPipelines } from '../lib/cicd/pipelines'; | |
import { deploymentTargetAccounts } from './config'; | |
import services from './services'; | |
const app = new App({ |
#!/bin/sh | |
if [[ `id -u` != 0 ]]; then | |
echo "Must be root to run script" | |
exit | |
fi | |
read -p "Enter user name and press [ENTER]: " UserName | |
if [[ $UserName == `dscl . -list /Users UniqueID | awk '{print $1}' | grep -w $UserName` ]]; then |
The following will guide you through the process of enabling SSL on a Apache webserver
Create a directory within /etc/apache2/
using Terminal.app: sudo mkdir /etc/apache2/ssl
Next, generate two host keys:
System process daemons that are system-wide provided by mac os x are described by launchd preference files that can be showed with the command: | |
$ sudo ls -all /System/Library/LaunchDaemons/ | |
Third party process daemons that are system-wide provided by the administrator are described by preference files that can be showed with the command: | |
$ sudo ls -all /Library/LaunchDaemons/ | |
Launch Agents that are per-user provided by mac os x usually loaded when the user logs in. Those provided by the system can be found with: | |
$ sudo ls -all /System/Library/LaunchAgents/ | |
Launch Agents that are per-user provided by the administrator and usually loaded when the user logs in. Those provided by the system can be found with: |
One of the best ways to reduce complexity (read: stress) in web development is to minimize the differences between your development and production environments. After being frustrated by attempts to unify the approach to SSL on my local machine and in production, I searched for a workflow that would make the protocol invisible to me between all environments.
Most workflows make the following compromises:
Use HTTPS in production but HTTP locally. This is annoying because it makes the environments inconsistent, and the protocol choices leak up into the stack. For example, your web application needs to understand the underlying protocol when using the secure
flag for cookies. If you don't get this right, your HTTP development server won't be able to read the cookies it writes, or worse, your HTTPS production server could pass sensitive cookies over an insecure connection.
Use production SSL certificates locally. This is annoying
#!/usr/bin/bash | |
CYGWIN=server | |
CYGSERVER=/usr/sbin/cygserver | |
PGDATA=/var/psql/data | |
PGCTL=/usr/sbin/pg_ctl | |
PGLOG=/var/psql/log/postgresql.log | |
usage() { | |
echo "USAGE: pg (start|stop|restart|reload|status)" | |
echo |