theme: onecraft
title: Welcome to Slidev info: |
Presentation slides for developers.
Learn more at Sli.dev
theme: onecraft
title: Welcome to Slidev info: |
Presentation slides for developers.
Learn more at Sli.dev
classes: { | |
NONE: {style.opacity: 0} | |
# EMPTY: {style.fill: "#162a41"; style.stroke: "#162a41"; style.stroke-width: 0; width: 100; height: 100} | |
EMPTY: {style.fill: "#f6f6f6"; style.stroke: "#162a41"; style.stroke-width: 0; width: 100; height: 100} | |
ITEM: {style.fill: "white"; style.stroke: "#162a41"; style.stroke-width: 2; width: 100; height: 100} | |
RED: {style.fill: "#d14d28"; style.stroke-width: 0} | |
ORANGE: {style.fill: "#ed9301"; style.stroke-width: 0} | |
YELLOW: {style.fill: "#f5df65"; style.stroke-width: 0} | |
GREEN: {style.fill: "#2b9464"; style.stroke-width: 0} |
{ | |
"formatter": { | |
"enabled": true, | |
"formatWithErrors": false, | |
"indentStyle": "space", | |
"indentWidth": 2, | |
"lineEnding": "crlf", | |
"lineWidth": 120, | |
"attributePosition": "auto" | |
}, |
1) Download cntlm deb package from http://sourceforge.net/projects/cntlm/files/cntlm/ | |
2) Login as root | |
3) Run command: | |
$ dpkg -i cntlm*.deb | |
4a) Obtain password hash for the configuration file in step 4b (do not put plaintext password in configuration) | |
$ cntlm -H -d <domain> -u <username> | |
const libs = Object.keys(require('module')._cache); | |
const filteredItems = libs.filter(item => { | |
return item.includes('aLibName'); | |
}); | |
console.log(filteredItems); |
jQuery.getJSON( | |
'https://connect.garmin.com/modern/proxy/web-gateway/course/owner/?_=1662219617626', | |
function(act_list) | |
{ | |
var t=0; | |
console.log(act_list); | |
act_list.coursesForUser.forEach( | |
function(course) { | |
setTimeout(function() { | |
console.dir(course['courseId']); |
Param( | |
[Parameter(Mandatory)] | |
[string]$sourceKvName, | |
[Parameter(Mandatory)] | |
[string]$destKvName | |
) | |
Connect-AzAccount | |
$secretNames = (Get-AzKeyVaultSecret -VaultName $sourceKvName).Name | |
$secretNames.foreach{ | |
Set-AzKeyVaultSecret -VaultName $destKvName -Name $_ ` |
version: '3.9' | |
services: | |
database: | |
container_name: database | |
image: postgis/postgis:13-master | |
volumes: | |
- ./data/database:/var/lib/postgresql/data | |
networks: | |
- directus |
This minimalist post is about creating a private key and a certificate signing request (CSR) for a SAN SSL certificate using OpenSSL. These commands was tested on the Mac OS command line using iTerm 2.
Run the following command for generating the private key :
openssl genrsa -out acme.com.key 2048
import { defineEndpoint } from '@directus/extensions-sdk'; | |
import * as fs from 'fs'; | |
import * as path from 'path'; | |
import { spawn } from 'child_process'; | |
import busboy from 'busboy'; | |
export default defineEndpoint((router) => { |