Standard escape codes are prefixed with Escape
:
- Ctrl-Key:
^[
- Octal:
\033
- Unicode:
\u001b
- Hexadecimal:
\x1b
- Decimal:
27
#include <iostream> | |
#include <cstdint> | |
using namespace std; | |
// we are going to generate random numbers using | |
// an xorshift generator | |
static uint32_t xorshift_y; |
#! /bin/bash | |
# | |
# build-xnu-6153.11.26.sh | |
# Scott Knight | |
# | |
# Based on the script by Brandon Azad | |
# https://gist.github.com/bazad/654959120a423b226dc564073b435453 | |
# | |
# A script showing how to build XNU version 6153.11.26 on macOS Catalina | |
# 10.15 with Xcode 11.13.1. |
function _run_deferred() { | |
local _depth="$BASHPID.${#FUNCNAME[@]}" | |
[[ "$_depth" != "$_deferred_depth" ]] && return | |
local opt=$- | |
set +e | |
for (( i=${#_deferred[@]} - 1; i >= 0; i-- )); do | |
eval "${_deferred[i]}" | |
done | |
[[ "$opt" == *e* ]] && set -e | |
} |
// | |
// main.m | |
// EndpointSecurityDemo | |
// | |
// Created by Omar Ikram on 17/06/2019 - Catalina 10.15 Beta 1 (19A471t) | |
// Updated by Omar Ikram on 15/08/2019 - Catalina 10.15 Beta 5 (19A526h) | |
// Updated by Omar Ikram on 01/12/2019 - Catalina 10.15 (19A583) | |
// | |
#import <Foundation/Foundation.h> |
# Authorize read-write in the default namespace. Add this Role and the below RoleBinding to every namespace spinnaker deploys artifacts to | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: Role | |
metadata: | |
name: spinnaker-role | |
namespace: default | |
rules: | |
- apiGroups: [""] | |
resources: ["namespaces", "events", "replicationcontrollers", "serviceaccounts", "pods/logs"] |
#!/bin/bash | |
# IMPORTANT: Don't forget to logout from your Apple ID in the settings before running it! | |
# IMPORTANT: You will need to run this script from Recovery. In fact, macOS Catalina brings read-only filesystem which prevent this script from working from the main OS. | |
# This script needs to be run from the volume you wish to use. | |
# E.g. run it like this: cd /Volumes/Macintosh\ HD && sh /Volumes/Macintosh\ HD/Users/sabri/Desktop/disable.sh | |
# WARNING: It might disable things that you may not like. Please double check the services in the TODISABLE vars. | |
# Get active services: launchctl list | grep -v "\-\t0" | |
# Find a service: grep -lR [service] /System/Library/Launch* /Library/Launch* ~/Library/LaunchAgents |
#!/bin/bash | |
FILES=$@ | |
echo "Migrate: $FILES" | |
sed -i "s/errors.Wrapf(\(.*\), \"\(.*\)\", \(.*\))/fmt.Errorf(\"\2: %w\", \3, \1)/g" $FILES | |
sed -i "s/errors.Wrap(\(.*\), \"\(.*\)\")/fmt.Errorf(\"\2: %w\", \1)/g" $FILES | |
sed -i "s/errors.Errorf/fmt.Errorf/g" $FILES | |
goimports -w . |
For those who have been using kops for a while should know the upgrade from 1.11 to 1.12 poses a greater risk, as it will upgrade etcd2 to etcd3.
Since this upgrade is disruptive to the control plane (master nodes), although brief, it's still something we take very seriously because nearly all the Buffer production services are running on this single cluster. We felt a more thorough backup process than the currently implemented Heptio Velero was needed.
To my surprises, my Google searches didn't yield any useful result on how to carry out the backup steps. To be fair, there are a few articles that are specifically for backing up master nodes created by kubeedm but nothing too concrete for `kop
#!/bin/sh | |
# Launch a Pod ab-using a hostPath mount to land on a Kubernetes node cluster as root | |
# without requiring `privileged: true`, in particular can abuse `DenyExecOnPrivileged` | |
# admission controller. | |
# Pod command in turn runs a privileged container using node's /var/run/docker.sock. | |
# | |
# Tweaked for PKS nodes, which run their docker stuff from different | |
# /var/vcap/... paths | |
node=${1} | |
case "${node}" in |