Attention: the list was moved to
https://github.com/dypsilon/frontend-dev-bookmarks
This page is not maintained anymore, please update your bookmarks.
Attention: the list was moved to
https://github.com/dypsilon/frontend-dev-bookmarks
This page is not maintained anymore, please update your bookmarks.
In Linux, when you add an IP to an interface, the kernel creates two routes for you:
table local: local x.x.x.y dev foo proto kernel scope host src x.x.x.y
table main: x.x.x.a/bb dev foo proto kernel scope link src x.x.x.y
Now, if you are setting up an HA pair or cluster, you will often have a VIP -- a "virtual" or "floating" IP -- which is moved between boxes during failovers. And if you happen to be running clients on these nodes as well which connect to that VIP, something very odd happens when you move the IP.
So... linux has routing rules, tables, and a cache. When a connection is made, the cache is consulted for a matching route tuple (src, dst, tos, fwmark, iif) and if it exists, the connection stores a pointer to it so each packet can rapidly be routed. If the cache entry expires or otherwise goes away, a new route is cloned by following the policy rules to look in the tables.
Now... when an IP you're connected to/from goes away... something very odd happens. The stack realizes that it can
GNU Octave is a high-level interpreted language, primarily intended for numerical computations.
(via GNU Octave)
Hint: I also mad an octave docset for Dash: https://github.com/obstschale/octave-docset
#!/bin/bash | |
# find all supermicro Java iKVM Viewer windows and resize | |
# them to display all the content | |
# | |
# for reasons that are beyond sanity, this shitty closed source program | |
# sets the min and max window sizes to the same values, making it unresizable | |
# through dragging. | |
# this wouldn't be so bad if it actually resized the window to display all | |
# the content. it constantly resizes based on the resolution of the |
Both grains and Pillars define input data to parameterize [Salt][1] states.
Depending on the purpose of data, one should make a choice to put it in one place or another.
NOTE:
If you use Amazon AWS for nearly anything, then you are probably familiar with KMS, the Amazon Key Management Service.
KMS is a service which allows API-level access to cryptographic primitives without the expense and complexity of a full-fledged HSM or CloudHSM implementation. There are trade-offs in that the key material does reside on servers rather than tamper-proof devices, but these risks should be acceptable to a wide range of customers based on the care Amazon has put into the product. You should perform your own diligence on whether KMS is appropriate for your environment. If the security profile is not adequate, you should consider a stronger product such as CloudHSM or managing your own HSM solutions.
The goal here is to provide some introductory code on how to perform envelope encrypt a message using the AWS KMS API.
KMS allows you to encrypt messages of up to 4kb in size directly using the encrypt()/decrypt() API. To exceed these limitations, you must use a technique called "envelope encryptio
--- | |
image: php:5.6 | |
stages: | |
- test_build | |
- test | |
- dist_build | |
- deploy | |
before_script: |
{ | |
"description": "Copy the centos.org CentOS 6 AMI into our account so that we can add boot volume encryption.", | |
"min_packer_version": "0.11.0", | |
"variables": { | |
"aws_region": "us-east-1", | |
"aws_vpc": null, | |
"aws_subnet": null, | |
"ssh_username": "centos" | |
}, | |
"builders": [ |