most of these require logout/restart to take effect
# Enable character repeat on keydown
defaults write -g ApplePressAndHoldEnabled -bool false
# Set a shorter Delay until key repeat
; AutoHotkey script, download from: | |
; http://www.autohotkey.com/ | |
; NOTE: Save this file with Windows line endings i.e. \r\n | |
; | |
cmd_line := "C:\bin\cygwin\bin\mintty.exe /bin/zsh --login" | |
wnd_class := "ahk_class mintty" | |
#c:: |
## -------------------------------------------------------------------------------------- | |
## | |
## This script is used to control how we deploy packages to Windows Azure. | |
## Orignial script (https://gist.github.com/PaulStovell/5234255) customized for | |
## Staging-To-Production with VIP swap deployment. | |
## | |
## NOTE: the script will only do Staging+VIP swap if $OctopusAzureSlot == "Staging". | |
## If $OctopusAzureSlot == anything else, the script will deploy directly to that slot | |
## without any further swapping. | |
## |
{ | |
"homepage": "http://www.iis.net/learn/install/web-platform-installer/web-platform-installer-v4-command-line-webpicmdexe-rtw-release", | |
"version": "7.1.50430", | |
"license" : "http://www.microsoft.com/web/webpi/eula/webpi_45_en.htm", | |
"architecture": { | |
"64bit": { | |
"url": "http://download.microsoft.com/download/C/F/F/CFF3A0B8-99D4-41A2-AE1A-496C08BEB904/WebPlatformInstaller_amd64_en-US.msi", | |
"hash": "fd3aa11da27a4698d9fd1fb61dcb5cae6d95ecf70554f0d655b0caf44b0d0ac6" | |
}, |
echo For my cloud agents, I had to get the pfx alias, Import the CARoot.cer, merge the pfx, and then change the password. | |
echo Based on https://github.com/haron/startssl-java and https://docs.oracle.com/javase/6/docs/technotes/tools/windows/keytool.html | |
cd %~dp0 | |
set JAVA_HOME=C:\BuildAgent\jre | |
set KEYTOOL=%JAVA_HOME%\bin\keytool | |
set KEYSTORE=%JAVA_HOME%\lib\security\cacerts | |
set PASSWORD=changeit | |
echo "Importing StartSSL certificates into %KEYSTORE%" > run.log | |
rem C:\BuildAgent>jre\bin\keytool -list -keystore .\conf\ssl\build.cloudapp.net.pfx -storetype pkcs12 |
$AzureAccountPassword = "xxxxxxxxxxxxxxxxxxxxxxxxx" | |
$AzureAccountUsername = "xxxxxxxxxxxxxxxxxxxxxxxxx" | |
$AzureAccountTenantId = "xxxxxxxxxxxxxxxxxxxxxxxxx" | |
$secpasswd = ConvertTo-SecureString -AsPlainText $AzureAccountPassword -Force | |
$mycreds = New-Object System.Management.Automation.PsCredential($AzureAccountUsername,$secpasswd ) | |
Login-AzureRmAccount -ServicePrincipal -Credential $mycreds -TenantId $AzureAccountTenantId | |
Get-AzureWebsite |
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} | |
[System.Net.ServicePointManager]::Expect100Continue = {$false} | |
[System.Net.ServicePointManager]::CheckCertificateRevocationList = $true; | |
[System.Net.ServicePointManager]::DefaultConnectionLimit = 1000; | |
[System.Net.ServicePointManager]::MaxServicePoints = 1000; | |
[System.Net.ServicePointManager]::ReusePort = $true; | |
[System.Net.ServicePointManager]::UseNagleAlgorithm = $false; | |
[System.Net.ServicePointManager]::EnableDnsRoundRobin = $false; | |
$url = "https://data-nsr.udir.no" |
(Get-AzureRmResource -ResourceGroupName testRG -ResourceType Microsoft.Web/sites -ResourceName testwebapp).Properties.OutboundIpAddresses -Split "," |
### Server management tools preview (next month): https://blogs.technet.microsoft.com/servermanagement/2016/02/09/introducing-server-management-tools/ | |
### View the online docs | |
start https://docs.microsoft.com/en-us/powershell/azuread/v2/azureactivedirectory | |
### Find the module | |
Find-Module AzureAD | Select-Object * | |
<# | |
Version Name Repository Description |
<# | |
Script showing how to create a KeyVault vault and enable logging | |
(GUIDs redacted) | |
#> | |
New-AzureRmResourceGroup -Name cmartRG0614 -Location westus | |
<# | |
ResourceGroupName : cmartRG0614 | |
Location : westus | |
ProvisioningState : Succeeded |