Create "go path" directory (will store downloads and the source code that you yourself write)
mkdir ~/go
add following to your .bashrc or somewhere
if [ -d $HOME/go ]; then
export GOPATH=${HOME}/go
Nodes are not assigned public IP. If you have accessible VM in the same VNET as worker nodes, then you can use that VM as jump host and connect the worker via private IP.
Alternatively public IP can be assigned to a worker node. This readme shows how to do that.
find out the resource group that AKS created for the node VMs
Reseller Verkkokauppa.com https://www.verkkokauppa.com/fi/product/65504/hbvcf/Fuj-tech-Drop-HD-IP-kamera sold as "Fuj:tech Drop HD ‐IP-kamera"
OEM is Shenzhen Smarteye Digital Electronics Co., Ltd http://www.smarteyegroup.com/
Product: Wansview NCM700GC
drivers/usb/host/dwc_otg/dwc_otg_hcd.c: In function ‘assign_and_init_hc’: | |
drivers/usb/host/dwc_otg/dwc_otg_hcd.c:1243:19: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] | |
hc->xfer_buff = (uint8_t *) urb->dma + urb->actual_length; | |
^ | |
drivers/usb/host/dwc_otg/dwc_otg_hcd.c:1287:21: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] | |
hc->xfer_buff = (uint8_t *) urb->setup_dma; | |
^ | |
drivers/usb/host/dwc_otg/dwc_otg_hcd.c:1318:21: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] | |
hc->xfer_buff = (uint8_t *) hcd->status_buf_dma; | |
^ |
#!/usr/bin/env python3 | |
# | |
# Extract TLS pre-master secret to decrypt captured TLS stream in Wireshark | |
# | |
# Java TLS implementation can be configured to dump information on TLS stream, | |
# making it possible to extracting TLS key for decrypting the stream for debug | |
# purposes. | |
# | |
# This script is originally by Timothy Basanov | |
# https://timothybasanov.com/2016/05/26/java-pre-master-secret.html |
Get a list of all available go versions by running:
curl -s "https://golang.org/dl/?mode=json&include=all" | jq -r '.[].version' | sort -V
To install latest version of go (not including beta versions) by using existing go installation for bootstrapping:
GOLATEST=$(curl -s "https://golang.org/dl/?mode=json&include=all" | jq -r '.[].version | select(contains("beta") | not )' | sort -V | tail -1)
go get golang.org/dl/$GOLATEST # compiles go downloader
Problem: After installing Windows 10 on separate disk, Windows entry is not visible in grub menu. Windows 10 installer might not have used GPT partition table, but instead is using MBR for booting. It might still look like UEFI boot since Windows created small system partition with bit similar content as EFI partition would have.
The custom GRUB entry isn't needed (at least not for windows 10's boot manager), you can install to the BCD to your main EFI partition, with "bcdboot C:\Windows /s X: /f UEFI", where X is the letter you assigned to the UEFI partition. You can assign a letter to the UEFI partition either using the windows gui or using "diskpart" command line utility. This works even if windows isn't in a GPT partition
diff --git a/hack/generate-crd-clients.sh b/hack/generate-crd-clients.sh | |
index 9bfeadff..7fee28ca 100755 | |
--- a/hack/generate-crd-clients.sh | |
+++ b/hack/generate-crd-clients.sh | |
@@ -17,7 +17,6 @@ readonly DESTDIR=${DESTDIR:-$(mktemp -d)} | |
readonly YEAR=$(date +%Y) | |
readonly GO111MODULE=on | |
-readonly GOFLAGS=-mod=vendor |
diff --git a/apis/projectcontour/v1/httpproxy.go b/apis/projectcontour/v1/httpproxy.go | |
index 2c7a323d..5ee30820 100644 | |
--- a/apis/projectcontour/v1/httpproxy.go | |
+++ b/apis/projectcontour/v1/httpproxy.go | |
@@ -120,12 +120,12 @@ type TLS struct { | |
// backing cluster. | |
// +optional | |
Passthrough bool `json:"passthrough,omitempty"` | |
- // ClientValidation defines how to verify the client certificate. This setting: | |
- // 1. Enables TLS client certificate validation. |
This document describes manual test procedure for projectcontour/contour#2910
Generate the certificates for the test case by using https://github.com/tsaarni/certyaml