Forked from Captain Anonymous's Pen gpVRzj.
A Pen by Lee Hambley on CodePen.
Forked from Captain Anonymous's Pen gpVRzj.
A Pen by Lee Hambley on CodePen.
<!-- Cowardly Includes --> | |
<link href='http://fonts.googleapis.com/css?family=Open+Sans:400,800,300,600' rel='stylesheet' type='text/css'> | |
<link href='http://fonts.googleapis.com/css?family=Anonymous+Pro' rel='stylesheet' type='text/css'> | |
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css"> | |
<link rel="stylesheet" href="http://pfefferle.github.io/openwebicons/packages/openwebicons/css/openwebicons-cdn.css"> | |
<!-- End Cowardly Includes --> | |
<div class="harrow-card"> | |
<div class="harrow-card-title harrow-card-title_success"> | |
<h3><strong class="harrow-card-title-environment">Production</strong> Deployment</h3> |
// https://blogs.oracle.com/janp/entry/how_the_scp_protocol_works | |
package main | |
import ( | |
"fmt" | |
"golang.org/x/crypto/ssh" | |
) | |
const privateKey = `content of id_rsa` |
DATES = [ | |
"May 15", "May 16", "May 19", | |
"June 17", "June 18", | |
"July 14", "July 16", | |
"August 14", "August 15", "August 17" | |
] | |
def month(date); date.split[0]; end | |
def day(date); date.split[1]; end |
To define the function, paste the following code into your shell:
curlstats ()
{
( echo "url_effective\t%{url_effective}\n";
echo "http_code\t%{http_code}\n";
echo "content_type\t%{content_type}\n";
echo "http_connect\t%{http_connect}\n";
echo "time_total\t%{time_total}\n";
package main | |
import ( | |
"database/sql" | |
"fmt" | |
"log" | |
"net/http" | |
"strconv" | |
_ "github.com/lib/pq" |
CREATE DATABASE tt; | |
\c tt | |
CREATE TABLE widgets ( | |
id INT PRIMARY KEY NOT NULL, | |
name TEXT NOT NULL | |
); | |
INSERT INTO widgets (id, name) VALUES (456, 'AeroPress'); |
I hereby claim:
To claim this, I am signing this object:
Web applications need understand what permissions are granted to a current user in two key areas.
403
when trying to access a resource outside of one's graph)Further, in many applications in the wild (for better, or worse, perhaps I need new friends and colleagues) I've seen ways implementd to nerf or flat-out disable authorisation controls. In addition to the regular graph-based authorisation flow, the concept of super users is prevelant, and dangerous.