name | about |
---|---|
Deploy Changes |
Ship a new Update to an existing Deployment |
Provide a Link to the Changeset that describes the changes to be deployed
--- FAIL: TestCookiesJarPersistence (0.00s) | |
main_test.go:186: unable to start cookie server unable to determine port strconv.Atoi: parsing "0.0.0.0:36515": invalid syntax | |
=== RUN TestEmbeddedClientTimeout | |
--- FAIL: TestEmbeddedClientTimeout (0.00s) | |
main_test.go:216: unable to start timeout server unable to determine port strconv.Atoi: parsing "0.0.0.0:36293": invalid syntax | |
=== RUN TestConcurrentRequestsNotRacyAndDontLeak_FailedRequest | |
--- FAIL: TestConcurrentRequestsNotRacyAndDontLeak_FailedRequest (0.00s) | |
main_test.go:234: unable to start server unable to determine port strconv.Atoi: parsing "0.0.0.0:42805": invalid syntax |
#!/usr/local/bin/python | |
"""Replacement for htpasswd""" | |
# Original author: Eli Carter | |
import os | |
import sys | |
import random | |
from optparse import OptionParser | |
# We need a crypt module, but Windows doesn't have one by default. Try to find |
package main | |
import ( | |
"fmt" | |
"log" | |
"os" | |
"runtime" | |
"runtime/pprof" | |
"strconv" | |
"sync" |
piyush:gilmour-e-go master λ go test --race -v ./... | |
=== RUN TestMergeHash | |
--- PASS: TestMergeHash (0.00s) | |
=== RUN TestMergeMismatch | |
--- PASS: TestMergeMismatch (0.00s) | |
=== RUN TestMergePointer | |
--- PASS: TestMergePointer (0.00s) | |
=== RUN TestMergeInterface | |
--- PASS: TestMergeInterface (0.00s) | |
=== RUN TestMergeInterfacePointer |
package main | |
import ( | |
"log" | |
"sync" | |
) | |
type MyStruct struct { | |
field int | |
} |
package main | |
import ( | |
"log" | |
"sync" | |
) | |
type MyStruct struct { | |
field int | |
} |
package main | |
import ( | |
"log" | |
"sync" | |
) | |
type MyStruct struct { | |
field int | |
} |
#!/bin/sh | |
set -e | |
service=$1 | |
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" | |
output="${DIR}/ssh_thumbprint" | |
cd $DIR | |
if [[ `azure service cert list | grep -c $service` -eq 0 ]]; then |
{ | |
"resource": { | |
"null_resource": { | |
"ssh_key": { | |
"triggers": { | |
"thumbprint": "${file(\"./ssl/ssh_thumbprint\")}" | |
}, | |
"provisioner": [{ | |
"local-exec": { | |
"command": "bash ./ssl/cert.sh ${azure_hosted_service.terraform.name}" |