国内从 Docker Hub 拉取镜像有时会遇到困难,此时可以配置镜像加速器。
Dockerized 实践 https://github.com/y0ngb1n/dockerized
国内从 Docker Hub 拉取镜像有时会遇到困难,此时可以配置镜像加速器。
Dockerized 实践 https://github.com/y0ngb1n/dockerized
How to configure FreeBSD and applicable applications to work with Yubikey for authentication. This serves as my work-in-progress documentation of the configuration knobs needed to make this work properly.
libykcs11.so)| KFZUS-F3JGV-T95Y7-BXGAS-5NHHP | |
| T3ZWQ-P2738-3FJWS-YE7HT-6NA3K | |
| KFZUS-F3JGV-T95Y7-BXGAS-5NHHP | |
| 65Z2L-P36BY-YWJYC-TMJZL-YDZ2S | |
| SFZHH-2Y246-Z483L-EU92B-LNYUA | |
| GSZVS-5W4WA-T9F2E-L3XUX-68473 | |
| FTZ8A-R3CP8-AVHYW-KKRMQ-SYDLS | |
| Q3ZWN-QWLZG-32G22-SCJXZ-9B5S4 | |
| DAZPH-G39D3-R4QY7-9PVAY-VQ6BU | |
| KLZ5G-X37YY-65ZYN-EUSV7-WPPBS |
| library(tidycensus) | |
| library(mapgl) | |
| tx_income <- get_acs( | |
| geography = "tract", | |
| variables = "B19013_001", | |
| state = "TX", | |
| geometry = TRUE | |
| ) |
As far as I can tell, you can't do it conveniently. That is, git-rebase does not give you an option to preserve the committer date. Unless you give the --ignore-date (or its alias, --reset-author-date) option, it will always preserve the author date. However, there is no way to make git-rebase preserve the committer date, unless some manual script is crafted.
The best you can do is to make the committer date equal to the author date. Recently (in 2020 Q4), git-rebase --interactive has gained the ability to use the --committer-date-is-author-date flag with the interactive rebase. Before that, there was no way of influencing the committer date at all with the interactive rebase. Note that this flag does not preserve the committer date. It merely makes the committer date equal to the author date.
You might be thinking "well, isn't that effectively preserving the committer date, since normally the committer date is always equal to the author date?". Normally, you would be correct. However, there
| print("============================ Insyde H2O BIOS 'i'/'I' error-code ============================") | |
| print("= Insyde H2O BIOS (Acer, HP) System Disabled 'i'/'I' error-code response generator.") | |
| print("= this script meant to solve https://github.com/bacher09/pwgen-for-bios/issues/52 in Python 3") | |
| print("= ") | |
| print("= HP official response to BIOS Password reset: https://support.hp.com/us-en/document/c06368824") | |
| print("============ Start Quote ============") | |
| print("= A forgotten BIOS password cannot be reset by HP. HP is committed to the security and privacy of") | |
| print("= our customers. To resolve a forgotten BIOS password issue, a system board replacement is required,") | |
| print("= and additional customer costs apply. For more information, go to HP Worldwide Limited Warranty and Technical Support.") | |
| print("= https://www8.hp.com/us/en/privacy/limited_warranty.html") |
| javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\%27|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\%60))/g,jsRegex=/(?<=(\"|\'|\%60))(?:\/|https?:\/\/)[a-zA-Z0-9_?&=\/\-\#\.]+\.js(?:\?[^"'%60]*)?(?=(\"|\'|\%60))/g;const results=new Set;const paramMap=new Map();const jsFiles=new Set();function processContent(t,src){var e=t.matchAll(regex);for(let r of e){results.add(r[0]);var params=r[0].split('?')[1];if(params){params.split('&').forEach(param=>{var [key,]=param.split('=');if(key){if(!paramMap.has(key)){paramMap.set(key,[]);}paramMap.get(key).push(src||'Inline script or HTML');}});}}var j=t.matchAll(jsRegex);for(let r of j){jsFiles.add(r[0]);}}for(var i=0;i<scripts.length;i++){var t=scripts[i].src;if(t){jsFiles.add(t);fetch(t).then(function(t){return t.text()}).then(text=>processContent(text,t)).catch(function(t){console.log("An error occurred: ",t)});}else{processContent(scripts[i].textContent);}}var pageContent=document.documentElement.outerHTML;processContent(pageContent |
In this exercise, we will walk through the process of creating a basic infrastructure on AWS using Terraform, an open-source Infrastructure as Code (IaC) tool. Specifically, we'll create a Virtual Private Cloud (VPC) with two subnets, a public and a private one. We will also create an Internet gateway and a route table, which will be associated with our public subnet. This setup mimics a typical cloud infrastructure configuration, separating resources into public and private subnets for improved security and control.
If you wish to give it a shot before looking into the detailed step-by-step and the solution videos, here is an overview of what the created solution should deploy:
When running FastAPI app, all the logs in console are from Uvicorn and they do not have timestamp and other useful information. As Uvicorn applies python logging module, we can override Uvicorn logging formatter by applying a new logging configuration.
Meanwhile, it's able to unify the your endpoints logging with the Uvicorn logging by configuring all of them in the config file log_conf.yaml.
Before overriding:
uvicorn main:app --reload| POST / HTTP/1.1 | |
| Host: localhost | |
| User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36 | |
| Next-Action: x | |
| Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad | |
| Content-Length: 459 | |
| ------WebKitFormBoundaryx8jO2oVc6SWP3Sad | |
| Content-Disposition: form-data; name="0" |