php bin/magento --list
php bin/magento setup:upgrade
php bin/magento deploy:mode:set production
| <?php | |
| //* Do NOT include the opening php tag shown above. Copy the code shown below. | |
| //required plugins: code snippets, caldera forms, caldera forms run action | |
| add_action('consult_req_submitted', 'consult_req_submitted_sync_hubspot'); | |
| function consult_req_submitted_sync_hubspot( $data ){ | |
| $hubspot_api_key = 'ffffffff-27a0-4591-9b68-27d4bb31ed76'; | |
| $hubspot_list_id = '1'; //optional |
Creating an OAuth2 server is not a task that should be taken lightly. There are many security loopholes that could be exploited, and regular examinations are critical to handle possible vulnerabilities.
Auth is an authentication microservice based on the OAuth2 identity delegation protocol.
| 'use strict'; | |
| const DIST_DIR = 'gif/static'; | |
| const SRC_DIR = 'gif/static_src'; | |
| const MAPS_DIR = 'maps'; | |
| const JS_SRC = [ | |
| 'node_modules/angular/angular.js', | |
| 'node_modules/angular-route/angular-route.js', | |
| 'node_modules/angular-touch/angular-touch.js', |
| /* | |
| simple text emails | |
| looks for environment variables for the Mandrill credentials, as on Heroku for instance | |
| if not found, checks a prop file | |
| */ | |
| import org.apache.commons.mail.*; | |
| import java.io.File; | |
| import java.io.FileInputStream; | |
| import java.io.InputStream; |
| # /etc/nginx/sites-enabled/magento | |
| server { | |
| listen 80; | |
| server_name ec2-184-72-68-219.compute-1.amazonaws.com; | |
| root /var/www/magento/; | |
| access_log /var/log/nginx/magento-access_log; | |
| error_log /var/log/nginx/magento-error_log; | |
| location / { |
| """ | |
| An example of minimum requirements to make MultiValueField-MultiWidget for Django forms. | |
| """ | |
| import pickle | |
| from django.http import HttpResponse | |
| from django import forms | |
| from django.template import Context, Template | |
| from django.views.decorators.csrf import csrf_exempt |