- Create 5GB FreeBSD image.
- Install FreeBSD on xhyve.
- Mount host directory.
| (ns percolation.core | |
| "Currently working for non-recursive, fully specified (no [:*]), attributes only (no limit, defaults etc.) pull api queries." | |
| (:require [datomic.api :as d])) | |
| (def schema | |
| "Percolation specific schema" | |
| [{:db/id #db/id[:db.part/db] | |
| :db/ident :percolator/name | |
| :db/valueType :db.type/string | |
| :db/cardinality :db.cardinality/one |
| 1 - Create a *private* GitHub/Bitbucket or similar git repo. Here I assume the repo is: | |
| https://github.com/calkan/bash_history.git | |
| 2 - Create .history directory and initialize it for the repo: | |
| mkdir $HOME/.history | |
| cd $HOME/.history | |
| git init | |
| touch README.md |
| <?xml version="1.0"?> | |
| <root> | |
| <item> | |
| <name>Evoluent VerticalMouse</name> | |
| <appendix>All customizations only apply for the Evoluent VerticalMouse.</appendix> | |
| <appendix>Note: button 4 (the mouse scroll button) and button 5 are swapped in Karabiner. I still use the default Evoluent labeling.</appendix> | |
| <devicevendordef> | |
| <vendorname>EVOLUENT</vendorname> | |
| <vendorid>0x1a7c</vendorid> | |
| </devicevendordef> |
TL;DR: I explain how to detect TLS 1.0 connections and, by way of custom headers, warn the user about the coming change to more modern TLS versions.
| #!/bin/bash | |
| # Copy files from and to Google Compute Engine instances | |
| # Automatically looks up the correct zone and uses ~/.ssh/id_rsa | |
| # Usage | |
| # gscp ./some.file some-instance-name:some-directory | |
| # gscp some-instance-name:some-directory ./some.file | |
| for project in $(gcloud projects list | grep -v PROJECT_ID | cut -d' ' -f 1); do | |
| PROJECT=$project |
| ### Step-by-step terminal instructions to install emacspeak on OS X. | |
| ### Copy-paste each step (one step at a time!) into the terminal. | |
| ### Much of the information presented here was copied from | |
| ### http://e-mac-speak.googlecode.com/svn/trunk/e-mac-speak-howto.org | |
| ### More useful settings may be found at https://github.com/ragb/emacs-ragb/blob/master/init.el | |
| ## WARNING: These steps worked for me, but they may not work for you. In fact they may break things, turn your computer into | |
| ## a paperweight, and/or eat your kittens. These instructions are provided in the hope that they may be useful, | |
| ## but you are responsible for running them and for any damange doing so may cause. |
| { pkgs ? import <nixpkgs> {} }: | |
| with pkgs; | |
| let | |
| su_exec = pkgs.stdenv.mkDerivation { | |
| name = "su-exec-0.2"; | |
| src = fetchurl { | |
| url = https://github.com/ncopa/su-exec/archive/v0.2.tar.gz; | |
| sha256 = "09ayhm4w7ahvwk6wpjimvgv8lx89qx31znkywqmypkp6rpccnjpc"; |
Currently, there is an explosion of tools that aim to manage secrets for automated, cloud native infrastructure management. Daniel Somerfield did some work classifying the various approaches, but (as far as I know) no one has made a recent effort to summarize the various tools.
This is an attempt to give a quick overview of what can be found out there. The list is alphabetical. There will be tools that are missing, and some of the facts might be wrong--I welcome your corrections. For the purpose, I can be reached via @maxvt on Twitter, or just leave me a comment here.
There is a companion feature matrix of various tools. Comments are welcome in the same manner.
link to the video
original essay
- Write in past tense so you don’t have to re-edit when mailing