[INPUT]
Name mem
Tag mem.local
[OUTPUT]
Name stdout
| # | |
| # Wide-open CORS config for nginx | |
| # | |
| location / { | |
| if ($request_method = 'OPTIONS') { | |
| add_header 'Access-Control-Allow-Origin' '*'; | |
| # |
| version: "1.0" | |
| name: Secure Secret Run with GCP | |
| description: | | |
| Securely runs a user-provided shell script/command with a secret fetched from GCP Secret Manager. | |
| The secret is provided directly to the script's standard input (stdin). | |
| This step is designed to prevent the secret value from being exposed in environment variables, | |
| Codefresh logs (by this step itself), or unintentionally written to disk *by this step*. | |
| Security Considerations: | |
| - Shared Responsibility: The ultimate security of the secret, once it is piped to the |
| from atlassian import Jira | |
| # Jira Configuration | |
| JIRA_URL = "https://your-jira-instance.atlassian.net" | |
| JIRA_USER = "your-email@example.com" | |
| JIRA_API_TOKEN = "your-api-token" | |
| # Initialize Jira connection | |
| jira = Jira(url=JIRA_URL, username=JIRA_USER, password=JIRA_API_TOKEN, cloud=True) |
| /** | |
| * MIT License | |
| * | |
| * Copyright (c) 2016 Richard Adams (https://github.com/enriched) | |
| * | |
| * Permission is hereby granted, free of charge, to any person obtaining a copy | |
| * of this software and associated documentation files (the "Software"), to deal | |
| * in the Software without restriction, including without limitation the rights | |
| * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| * copies of the Software, and to permit persons to whom the Software is |
| #!/bin/sh | |
| SOURCE_TABLE=xxx-mydata-accp | |
| TARGET_TABLE=xxx-mydata-prod | |
| AWS_PROFILE=default | |
| AWS_REGION=ap-southeast-2 | |
| # Step 1 - export and transform | |
| aws --profile=$AWS_PROFILE \ |
| // | |
| // Make a few assumptions and add noise to latitude/longitude position | |
| // Ex, console.log(jitter(-26.4853429150483, -49.072945734375, 5)); | |
| // | |
| var rad_Earth = 6378.16; | |
| var one_degree = (2 * Math.PI * rad_Earth) / 360; | |
| var one_km = 1 / one_degree; | |
| function randomInRange(from, to, fixed) { |
| #!/bin/bash | |
| PASSWORD="password" | |
| USERNAME="username" | |
| SSHPORT=22 |
| import java.io.ByteArrayOutputStream; | |
| import java.io.IOException; | |
| import java.io.InputStream; | |
| import java.util.List; | |
| import java.util.Map; | |
| import java.util.Properties; | |
| import org.apache.avro.io.BinaryDecoder; | |
| import org.apache.avro.io.BinaryEncoder; | |
| import org.apache.avro.io.DecoderFactory; |
This document has been modified from its [original format][m1], which was written by Ning Shang (geek@cerias.net). It has been updated and reformatted into a [Markdown][m2] document by [Woody Gilk][m3] and [republished][m4].
When working with a remote git repository which is hosted on a third-party storage server, data confidentiality sometimes becomes