Tokenize with specific delimeter and select specific item (awk
)
echo "sads/sadsad/sd" | awk -F/ '{print $1}
# sads
Tokenize with specific delimeter and retrieve and select a specific item (cut
)
--- | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
name: stripe-mock | |
spec: | |
selector: | |
matchLabels: | |
app: stripe-mock | |
replicas: 2 # tells deployment to run 2 pods matching the template |
#@data/values | |
--- | |
resources: | |
- uri: /service-A/v1 | |
name: this-is-a-test | |
- uri: /service-A/v2 | |
name: this-is-also-a-test |
BEARER=$(curl -u _token:$(gcloud auth print-access-token) https://gcr.io/v2/token?scope=repository:$NAME:pull | cut -d'"' -f 10)
RESPONSE=`curl -H "Authorization: Bearer $BEARER" https://gcr.io/v2/$NAME/manifests/$TAG`
DIGEST=`echo $RESPONSE | jq -r '.config.digest'`
curl -L -H "Authorization: Bearer $BEARER" https://gcr.io/v2/$NAME/blobs/$DIGEST | jq
GCP has an issue which surfaces when service accounts are recreated with the same name but without the old policies being removed. It is confusing because the GUI and CLI will show that permissions are there and it will even let you re-add them BUT, anytime you try to do something that requires the permissions it won't work. For example, if you try to push an image it may say that you don't have storage.buckets.get
even thought everything shows that you are part of storage.admin
.
Set the values to match your environment
export ACCOUNT=<service-account>
...as an alternative to the Serverless Framework.
CouchDb from http://couchdb.apache.org
Inkdrop from https://my.inkdrop.app/download
Synchronisation steps at https://docs.inkdrop.app/manual/synchronizing-in-the-cloud
Access CouchDb from http://127.0.0.1:5984/_utils/