| Title | Description
The following describes the necessary Functions and Procedures to create a small "Sleep Timer Library" for OpenHAB (Don't know, if Library is the correct title, but you know what I mean ;-)). Using this approach, it's easy for you to create your own custom sleep timers.
NOTE: This stuff doesn't depend on any add-on.
The usage example does not cover initialization or recovery on system start and demonstrates a VERY BASIC example. But it's not very hard for you to integrate and customize it to your needs ;-)
#!/bin/sh | |
set -e | |
[ -z "$VAULT_ADDR" ] && VAULT_ADDR="https://127.0.0.1:8200" | |
case $1 in | |
store) | |
security add-generic-password -U -a "VAULT-$USER" -c "hvlt" -C "hvlt" -D "Hashicorp Vault" -s "$VAULT_ADDR" -w "$(cat)" | |
;; | |
get) |
# Working with a [System.IO.FileInfo] Object | |
## Get file object into variable | |
PS C:\DATA> $file = Get-ChildItem C:\DATA\test.xls | |
## Full path name | |
PS C:\DATA> $file.FullName | |
C:\DATA\test.xls | |
## Filename including extension | |
PS C:\DATA> $file.Name |
FROM debian:jessie | |
RUN apt-get update \ | |
&& apt-get install -y python-pip \ | |
&& pip install --upgrade pip flask | |
COPY ./server.py /server.py | |
EXPOSE 5000 | |
ENV FLASK_APP=server.py |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "Stmt12345", | |
"Action": [ | |
"s3:AbortMultipartUpload", | |
"s3:GetObject", | |
"s3:ListBucketMultipartUploads", | |
"s3:ListMultipartUploadParts", |
# Authenticate via the AWS EC2 authentication method (IAM method). If authentication is | |
# successful, the resulting token will be stored on the client and used | |
# for future requests. | |
# | |
# @example | |
# Vault.auth.aws_ec2_iam("dev-role-iam", "vault.example.com") #=> #<Vault::Secret lease_id=""> | |
# | |
# @param [String] role | |
# @param [String] iam_auth_header_value | |
# |
public class Constants { | |
/** | |
* Contains the path to your Lambda function code. | |
*/ | |
public static final String LAMBDA_TASK_ROOT = System.getenv("LAMBDA_TASK_ROOT"); | |
/** | |
* The environment variable is set to one of the following options, depending on the runtime of the Lambda function: | |
* AWS_Lambda_nodejs, AWS_Lambda_nodejs4.3, AWS_Lambda_nodejs6.10 |
Kong, Traefik, Caddy, Linkerd, Fabio, Vulcand, and Netflix Zuul seem to be the most common in microservice proxy/gateway solutions. Kubernetes Ingress is often a simple Ngnix, which is difficult to separate the popularity from other things.
This is just a picture of this link from March 2, 2019
Originally, I had included some other solution
# How to encrypt/decrypt your text/blob secret with AWS KMS with AWS cli | |
KEY_ID=alias/my-key | |
SECRET_BLOB_PATH=fileb://my-secret-blob | |
SECRET_TEXT="my secret text" | |
ENCRYPTED_SECRET_AS_BLOB=encrypted_secret_blob | |
DECRYPTED_SECRET_AS_BLOB=decrypted_secret_blob # Result of decrypt-blob target | |
encrypt-text: |