React App Envionments (dotenv and create-react-app)
find . -type f -print0 | xargs -0 dos2unix |
// Using the module pattern for a jQuery feature | |
$( document ).ready(function() { | |
var feature = (function() { | |
var items = $( "#myFeature li" ); | |
var container = $( "<div class='container'></div>" ); | |
var currentItem = null; | |
var urlBase = "/foo.php?item="; | |
var createContainer = function() { | |
var item = $( this ); |
pip install virtualenv
within project root
virtualenv ./venv
cd ./venv/bin
source activate
cf set-org-role {user.name} {org} OrgAuditor
cf set-space-role {user.name} {org} {space} SpaceDeveloper
node { | |
stage('GetUserCredential') { | |
// Requires Credential setup (MyCredentialID) | |
withCredentials([[$class: 'UsernamePasswordMultiBinding', credentialsId: 'MyCredentialID', | |
usernameVariable: 'USERNAME', passwordVariable: 'PASSWORD']]) { | |
sh ''' | |
set +x | |
echo "$USERNAME" > output.txt | |
''' |
Since Git uses curl under the hood. It's possible to set up a ~/.netrc file with the credentials. For GitHub it would look something like this:
machine github.com
login <github username>
password <github oauth token>
using UnityEngine; | |
public class CenterOnScreenPoint : MonoBehaviour | |
{ | |
public Vector2 screenPosition; | |
[Range(0.25f, 4)] | |
public float distanceFromCamera = 1.5f; | |
public float maxSpeed = 0.65f; | |
[Range(0.005f, 0.01f)] | |
public float minDistance = 0.0075f; |
find -L /dir/to/start -samefile /tmp/orig.file | |
# find your local ip address on wireless adapater | |
ipconfig getifaddr en0 |
In terms of getting started quickly I ended up using a pihole deployment with extra lists, as described in https://www.youtube.com/watch?v=qNCzSA2bs9I
In this solution you get ad-block as "unnecessary" extra, but maybe it is more people than me who don't mind.
Start by installing pihole on some machine as described here https://github.com/pi-hole/pi-hole/#one-step-automated-install and get it up and running.
When you're finished with getting pihole to work, extend the pihole configuration as below (example on a debian system, with a .lan domain):
Create a file /etc/dnsmasq.d/02-lan.conf with content