To access the api in this example, first we have to procure the Auth Token (using one of the OAuth2 Flows) containing a scope "canGreet".
Assumption is that the Authorization Server supports OpenId Connect 1.0 specifications.
<script> | |
import { onMount } from "svelte"; | |
import editorWorker from "monaco-editor/esm/vs/editor/editor.worker?worker"; | |
import jsonWorker from "monaco-editor/esm/vs/language/json/json.worker?worker"; | |
import cssWorker from "monaco-editor/esm/vs/language/css/css.worker?worker"; | |
import htmlWorker from "monaco-editor/esm/vs/language/html/html.worker?worker"; | |
import tsWorker from "monaco-editor/esm/vs/language/typescript/ts.worker?worker"; | |
let subscriptions = []; | |
export let content; |
// PS. Tailwind classes used for wrapper. | |
import { FC, useEffect, useState } from 'react' | |
import { FieldContainer } from '@keystone-ui/fields' | |
import { Field } from '@keystone-6/fields-document/views' | |
enum EditorState { | |
Loading, | |
Ready, | |
} |
# I am only showing the relavant sections that worked for me | |
# Install additional packages and do any other bootstrap configuration in this script | |
# For production clusters it's recommended to build own image with this step done in CI | |
bootstrapScript: | | |
#!/bin/bash | |
rm -rf /var/lib/apt/lists/* && \ | |
pip install \ | |
psycopg2==2.8.5 \ | |
redis==3.2.1 \ |
import com.cloudbees.hudson.plugins.folder.properties.FolderCredentialsProvider | |
import com.cloudbees.plugins.credentials.common.StandardCredentials | |
import com.cloudbees.hudson.plugins.folder.Folder | |
def creds = com.cloudbees.plugins.credentials.CredentialsProvider.lookupCredentials( | |
com.cloudbees.plugins.credentials.common.StandardCredentials.class, Jenkins.instance, null, null) | |
creds.eachWithIndex { | |
it, | |
i ->println "\n========== [Global] Credential ${i+1} Start ==========" | |
it.properties.each { | |
println it |
To access the api in this example, first we have to procure the Auth Token (using one of the OAuth2 Flows) containing a scope "canGreet".
Assumption is that the Authorization Server supports OpenId Connect 1.0 specifications.
--- | |
apiVersion: 1.0.0 | |
metadata: | |
name: web-java-spring-boot | |
attributes: | |
persistVolumes: 'false' | |
projects: | |
- | |
name: web-java-spring-boot | |
source: |
version: '3' | |
networks: | |
lan: | |
services: | |
core1: | |
image: neo4j:4.0.0-alpha10-enterprise | |
networks: |
Thanks to the original blog post: https://equimper.com/blog/how-to-setup-tailwindcss-in-phoenix-1.4
cd assets
npm i --save-dev tailwindcss postcss-loader postcss-import
# | |
# Configuration for Autoscaling group. | |
# | |
resource "aws_launch_template" "eks-cluster-worker-nodes" { | |
iam_instance_profile = { name = "${aws_iam_instance_profile.eks-cluster-worker-nodes.name}" } | |
image_id = "${data.aws_ami.eks-worker.id}" | |
name = "${var.cluster-name}-eks-cluster-worker-nodes" | |
vpc_security_group_ids = ["${aws_security_group.eks-cluster-worker-nodes.id}"] | |
key_name = "${var.ssh-key-name}" | |
instance_type = "${local.host-types[0]}" |
terraform { | |
required_providers { | |
aws = { | |
source = "hashicorp/aws" | |
version = "~> 4.0" | |
} | |
} | |
} | |
provider "aws" { |