I hereby claim:
- I am vothanhkiet on github.
- I am kiettv (https://keybase.io/kiettv) on keybase.
- I have a public key whose fingerprint is 543F 667C 5672 B2A9 F6F1 8A64 2916 4974 FFF3 AE6C
To claim this, I am signing this object:
| # Example Dockerfile | |
| FROM hello-world |
| #!/bin/bash | |
| instance_profile=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/` | |
| aws_access_key_id=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/${instance_profile} | grep AccessKeyId | cut -d':' -f2 | sed 's/[^0-9A-Z]*//g'` | |
| aws_secret_access_key=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/${instance_profile} | grep SecretAccessKey | cut -d':' -f2 | sed 's/[^0-9A-Za-z/+=]*//g'` | |
| token=`curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/${instance_profile} | sed -n '/Token/{p;}' | cut -f4 -d'"'` | |
| file="somefile.deb" | |
| bucket="some-bucket-of-mine" | |
| date="`date +'%a, %d %b %Y %H:%M:%S %z'`" |
| FROM traefik:camembert | |
| ADD traefik.toml . | |
| EXPOSE 80 | |
| EXPOSE 8080 | |
| EXPOSE 443 |
| cat /sys/kernel/debug/hid/0003:046D:C332.029F/rdesc | |
| 05 01 09 06 a1 01 85 01 05 07 19 e0 29 e7 15 00 25 01 75 01 95 08 81 02 81 03 95 06 75 08 15 00 26 a4 00 19 00 2a a4 00 81 00 c0 05 0c 09 01 a1 01 85 03 75 10 95 02 15 01 26 8c 02 19 01 2a 8c 02 81 00 c0 05 01 09 80 a1 01 85 04 75 02 95 01 15 01 25 03 09 82 09 81 09 83 81 60 75 06 81 03 c0 06 00 ff 09 01 a1 01 85 10 75 08 95 06 15 00 26 ff 00 09 01 81 00 09 01 91 00 c0 06 00 ff 09 02 a1 01 85 11 75 08 95 13 15 00 26 ff 00 09 02 81 00 09 02 91 00 c0 | |
| INPUT(1)[INPUT] | |
| Field(0) | |
| Application(GenericDesktop.Keyboard) | |
| Usage(8) | |
| Keyboard.00e0 | |
| Keyboard.00e1 |
I hereby claim:
To claim this, I am signing this object:
| vi /etc/environment | |
| add these lines... | |
| LANG=en_US.utf-8 | |
| LC_ALL=en_US.utf-8 |
| public function index(){ | |
| $categoryList = Category::all(); | |
| return view('category.list')->with('categoryList', $categoryList); | |
| } |
| func EncodeStreamingVideo(streamingFile io.Reader, request ShouldCanceler) (*os.File, error) { | |
| outputFilename := generateFilename("mp4") | |
| // Actually start the command. | |
| cmd := exec.Command("ffmpeg", | |
| // Read input from stdin. | |
| "-i", "-", | |
| // ... environment-specific ffmpeg options ... | |
| "-y", outputFilename) |
| function keepTrying(otherArgs, promise) { | |
| promise = promise||new Promise(); | |
| // try doing the important thing | |
| if(success) { | |
| promise.resolve(result); | |
| } else { | |
| setTimeout(function() { | |
| keepTrying(otherArgs, promise); |
I recently ran into a problem where I had a suite of applications hosted on a set of subdomains that all needed to be able to share a single cookie. Any cookies other than the shared cookie needed to stay specific to their subdomain, but this one shared cookie needed to be accessible to any of them. I also wanted to accomplish this using Laravel's Cookie facade.
To accomplish this, there were two issues to solve.
In Laravel 5.1, a feature was added which allows you to add a list of cookie names that should not be encrypted to the EncryptCookies Middleware under the $except array. Check out [the docs](http://laravel.com/docs/5.1/responses#attaching-cookies