If you have a LUKS-encrypted partition on another disk, it's easy to mount it inside WSL.
List your disks:
> wmic diskdrive list brief
Mount the whole disk inside WSL (using --bare
so WSL doesn't attempt to mount it automatically):
using Microsoft.Data.SqlClient; | |
using Microsoft.Extensions.Logging; | |
using System.Text.RegularExpressions; | |
internal sealed record SqlExecutionResult( | |
SqlExecutionResult.CommandState Status, | |
int CommandsExecuted, | |
IReadOnlyList<SqlRowExecutionResult>? RowsAffected) | |
{ | |
public enum CommandState |
If you have a LUKS-encrypted partition on another disk, it's easy to mount it inside WSL.
List your disks:
> wmic diskdrive list brief
Mount the whole disk inside WSL (using --bare
so WSL doesn't attempt to mount it automatically):
#!/usr/bin/python3 | |
import requests | |
from bs4 import BeautifulSoup, NavigableString, Tag | |
from http import HTTPStatus | |
from typing import List | |
from dataclasses import dataclass | |
from enum import Enum | |
class MyrientConsole(Enum): |
function Load { | |
param( | |
[scriptblock]$function, | |
[string]$Label | |
) | |
$job = Start-Job -ScriptBlock $function | |
$symbols = @("⣾⣿", "⣽⣿", "⣻⣿", "⢿⣿", "⡿⣿", "⣟⣿", "⣯⣿", "⣷⣿", | |
"⣿⣾", "⣿⣽", "⣿⣻", "⣿⢿", "⣿⡿", "⣿⣟", "⣿⣯", "⣿⣷") |
#! /bin/bash | |
find -- *.json | sed 's/.json$//' | while read -r col; do | |
echo "importing $col" | |
mongoimport -d edgraph -c "$col" --file "$col.json" --jsonArray | |
done |
<# | |
Uses the dotnet tool for determining NuGet package | |
vulnerabilities inside a project solution by checking all | |
available csproj files. | |
#> | |
function Find-Vulnerabilities { | |
param ( | |
[Parameter(Mandatory = $false)] | |
[string] $FilePath, | |
[Parameter(Mandatory = $false)] |
I can't take credit for much of the work here -- I adapted it from this blog post: https://tech.willhaben.at/mongodb-incremental-backups-dff4c8f54d58
My main contribution was to make it a little easier to use with docker as well as numerous little cleanup tasks. I also made it gzip the oplog backups and added support for SSL connections
Note that I havne't yet tested the point in time restore script; it likely needs work, particularly to make things work with the gzipped oplog files
See how a minor change to your commit message style can make a difference. Examples
Have a look at CLI util git-conventional-commits to ensure this conventions and generate changelogs
using Asterias.Application.Providers; | |
using Microsoft.AspNetCore.Http; | |
namespace Asterias.Infrastructure.Providers.File.LocalFileProvider | |
{ | |
public class LocalFileProvider : IFileProvider | |
{ | |
/// <summary> | |
/// Used for limiting amount of buffer | |
/// in memory |
#!/bin/bash | |
# Download, extract and make executable | |
sudo bash -c 'cd /usr/local/bin; curl -sSL https://aka.ms/downloadazcopy-v10-linux | tar --strip-components=1 --exclude=*.txt -xzvf -; chmod +x azcopy' |