I use Namecheap.com as a registrar, and they resale SSL Certs from a number of other companies, including Comodo.
These are the steps I went through to set up an SSL cert.
| 4r5e | |
| 5h1t | |
| 5hit | |
| a55 | |
| anal | |
| anus | |
| ar5e | |
| arrse | |
| arse | |
| ass |
| // $base-font-size: 16px; // not sure this ever did anything | |
| $base-line-height: 1.5; | |
| // this value may vary for each font | |
| // unitless value relative to 1em | |
| $cap-height: 0.68; | |
| @mixin baseline($font-size, $scale: 2) { |
I use Namecheap.com as a registrar, and they resale SSL Certs from a number of other companies, including Comodo.
These are the steps I went through to set up an SSL cert.
| module.exports = function(grunt) { | |
| require('matchdep').filterDev('grunt-*').forEach(grunt.loadNpmTasks); | |
| grunt.initConfig({ | |
| shell: { | |
| options: { | |
| stdout: true | |
| }, | |
| server: { |
| request({url: opts.url, method: 'GET', headers: { 'user-agent': opts.userAgent}, encoding: null}, function (error, response, body) { | |
| if(!error && response.statusCode == 200) { | |
| var img = new Image | |
| , canvas = new Canvas | |
| , ctx = canvas.getContext('2d'); | |
| img.onload = function() { | |
| canvas.width = img.width; | |
| canvas.height = img.height; | |
| ctx.fillStyle = 'white'; |
| #!/bin/bash | |
| # | |
| # Check a "few" things to help write more maintainable Go code. | |
| # | |
| # OK, it's fairly comprehensive. So simply remove or comment out | |
| # anything you don't want. | |
| # | |
| # Don't forget to install (go get) each of these tools. | |
| # More info at the URLs provided. | |
| # |
| FROM alpine:3.3 | |
| MAINTAINER Tom Maiaroto <[email protected]> | |
| # Install packages | |
| RUN apk --update --repository http://dl-3.alpinelinux.org/alpine/edge/main add \ | |
| freetype-dev \ | |
| libjpeg-turbo-dev \ | |
| libpng-dev \ | |
| libwebp-dev \ | |
| php7 \ |
| package main | |
| import ( | |
| "github.com/oschwald/geoip2-golang" | |
| "github.com/fatih/structs" | |
| aegis "github.com/tmaiaroto/aegis/framework" | |
| "net" | |
| "context" | |
| "net/url" | |
| "log" |
| // https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-lambda-trigger-syntax-shared.html | |
| // CognitoTriggerCallerContext contains information about the caller (should be the same for all triggers) | |
| type CognitoTriggerCallerContext struct { | |
| AWSSDKVersion string `json:"awsSdkVersion"` | |
| ClientID string `json:"clientId"` | |
| } | |
| // CognitoTriggerCommon contains common data from events sent by AWS Cognito (should be the same for all triggers) | |
| type CognitoTriggerCommon struct { |
| // Handle oauth2 callback, will exchange code for token | |
| func cognitoCallback(ctx context.Context, d *aegis.HandlerDependencies, req *aegis.APIGatewayProxyRequest, res *aegis.APIGatewayProxyResponse, params url.Values) error { | |
| // Exchange code for token | |
| tokens, err := d.Services.Cognito.GetTokens(req.QueryStringParameters["code"], []string{}) | |
| if err != nil { | |
| log.Println("Couldn't get access token", err) | |
| res.JSONError(500, err) | |
| } else { | |
| // verify the token | |
| _, err := d.Services.Cognito.ParseAndVerifyJWT(tokens.IDToken) |