import requests | |
import json | |
import csv | |
import sys | |
KEY = "1dd922548150f47ec2980e90b659b793" | |
BULK = False | |
# One-by-one | |
def map_ip_to_location(ip): |
############################### | |
# Stage wkhtmltopdf | |
FROM madnight/docker-alpine-wkhtmltopdf as wkhtmltopdf | |
###################### | |
# Stage: ruby | |
FROM ruby:2.5.1-alpine3.7 as ruby | |
LABEL description="Base ruby image used by other stages" | |
###################### |
Choria supports Federating multiple collectives of nodes into a large Federated collective for the purpose of orchestrating.
Federation Requests have:
- A orchestration request as normal
- Special headers listing which nodes its for
The client chops a large request into bundles of 200 nodes and publish them to the network for federation. Multiple federation brokers can thus take care of distributing it.
This is a compiled list of falsehoods programmers tend to believe about working with time.
Don't re-invent a date time library yourself. If you think you understand everything about time, you're probably doing it wrong.
- There are always 24 hours in a day.
- February is always 28 days long.
- Any 24-hour period will always begin and end in the same day (or week, or month).
-
pg_dump is a nifty utility designed to output a series of SQL statements that describes the schema and data of your database. You can control what goes into your backup by using additional flags.
Backup:pg_dump -h localhost -p 5432 -U postgres -d mydb > backup.sql
Restore:
psql -h localhost -p 5432 -U postgres -d mydb < backup.sql
-h is for host.
-p is for port.
-U is for username.
-d is for database.
module xxx | |
class Application < Rails::Application | |
#(中略) | |
config.middleware.swap ActiveRecord::ConnectionAdapters::ConnectionManagement, | |
'ActiveRecord::ConnectionAdapters::ReconnectOnErrorManagement' | |
end | |
end |
If you use Amazon AWS for nearly anything, then you are probably familiar with KMS, the Amazon Key Management Service.
KMS is a service which allows API-level access to cryptographic primitives without the expense and complexity of a full-fledged HSM or CloudHSM implementation. There are trade-offs in that the key material does reside on servers rather than tamper-proof devices, but these risks should be acceptable to a wide range of customers based on the care Amazon has put into the product. You should perform your own diligence on whether KMS is appropriate for your environment. If the security profile is not adequate, you should consider a stronger product such as CloudHSM or managing your own HSM solutions.
The goal here is to provide some introductory code on how to perform envelope encrypt a message using the AWS KMS API.
KMS allows you to encrypt messages of up to 4kb in size directly using the encrypt()/decrypt() API. To exceed these limitations, you must use a technique called "envelope encryptio