theme: onecraft
title: Welcome to Slidev info: |
Presentation slides for developers.
Learn more at Sli.dev
theme: onecraft
title: Welcome to Slidev info: |
Presentation slides for developers.
Learn more at Sli.dev
| classes: { | |
| NONE: {style.opacity: 0} | |
| # EMPTY: {style.fill: "#162a41"; style.stroke: "#162a41"; style.stroke-width: 0; width: 100; height: 100} | |
| EMPTY: {style.fill: "#f6f6f6"; style.stroke: "#162a41"; style.stroke-width: 0; width: 100; height: 100} | |
| ITEM: {style.fill: "white"; style.stroke: "#162a41"; style.stroke-width: 2; width: 100; height: 100} | |
| RED: {style.fill: "#d14d28"; style.stroke-width: 0} | |
| ORANGE: {style.fill: "#ed9301"; style.stroke-width: 0} | |
| YELLOW: {style.fill: "#f5df65"; style.stroke-width: 0} | |
| GREEN: {style.fill: "#2b9464"; style.stroke-width: 0} |
| { | |
| "formatter": { | |
| "enabled": true, | |
| "formatWithErrors": false, | |
| "indentStyle": "space", | |
| "indentWidth": 2, | |
| "lineEnding": "crlf", | |
| "lineWidth": 120, | |
| "attributePosition": "auto" | |
| }, |
| 1) Download cntlm deb package from http://sourceforge.net/projects/cntlm/files/cntlm/ | |
| 2) Login as root | |
| 3) Run command: | |
| $ dpkg -i cntlm*.deb | |
| 4a) Obtain password hash for the configuration file in step 4b (do not put plaintext password in configuration) | |
| $ cntlm -H -d <domain> -u <username> | |
| const libs = Object.keys(require('module')._cache); | |
| const filteredItems = libs.filter(item => { | |
| return item.includes('aLibName'); | |
| }); | |
| console.log(filteredItems); |
| jQuery.getJSON( | |
| 'https://connect.garmin.com/modern/proxy/web-gateway/course/owner/?_=1662219617626', | |
| function(act_list) | |
| { | |
| var t=0; | |
| console.log(act_list); | |
| act_list.coursesForUser.forEach( | |
| function(course) { | |
| setTimeout(function() { | |
| console.dir(course['courseId']); |
| Param( | |
| [Parameter(Mandatory)] | |
| [string]$sourceKvName, | |
| [Parameter(Mandatory)] | |
| [string]$destKvName | |
| ) | |
| Connect-AzAccount | |
| $secretNames = (Get-AzKeyVaultSecret -VaultName $sourceKvName).Name | |
| $secretNames.foreach{ | |
| Set-AzKeyVaultSecret -VaultName $destKvName -Name $_ ` |
| version: '3.9' | |
| services: | |
| database: | |
| container_name: database | |
| image: postgis/postgis:13-master | |
| volumes: | |
| - ./data/database:/var/lib/postgresql/data | |
| networks: | |
| - directus |
This minimalist post is about creating a private key and a certificate signing request (CSR) for a SAN SSL certificate using OpenSSL. These commands was tested on the Mac OS command line using iTerm 2.
Run the following command for generating the private key :
openssl genrsa -out acme.com.key 2048
| import { defineEndpoint } from '@directus/extensions-sdk'; | |
| import * as fs from 'fs'; | |
| import * as path from 'path'; | |
| import { spawn } from 'child_process'; | |
| import busboy from 'busboy'; | |
| export default defineEndpoint((router) => { |