export CF_Key="sdfsdfsdfljlbjkljlkjsdfoiwje" export CF_Email="firstname.lastname@example.org" ~/.acme.sh/acme.sh --issue -d 'example.com' -d '*.example.com' --dns dns_cf -k ec-256 ~/.acme.sh/acme.sh --issue --dns dns_cf -d subdomain.example.com
|# create nginx user|
|sudo adduser --system --home /nonexistent --shell /bin/false --no-create-home --disabled-login --disabled-password --gecos "nginx user" --group nginx|
|sudo chown nginx:nginx /var/log/nginx/access.log /var/log/nginx/error.log|
|# check if neccesary files exist|
|ls -l /etc/nginx/|
Gmail: delete old emails automatically
Automatically deletes old emails that match the specified label.
- Create a new Google Apps Script at https://script.google.com
- Update the following constants:
LABEL_TO_DELETE: the label that should be have old messages deleted
OSX ships with bash 3 by default, but you need bash 4 to use npx shell auto fallback. Using homebrew:
(instructions borrowed from https://github.com/Homebrew/homebrew-command-not-found)
brew update && brew install bash # Add the new shell to the list of allowed shells sudo bash -c 'echo /usr/local/bin/bash >> /etc/shells' # Change to the new shell chsh -s /usr/local/bin/bash
##Working with ansible-vault
I've been using a lot of Ansible lately and while almost everything has been great, finding a clean way to implement ansible-vault wasn't immediately apparent.
What I decided on was the following: put your secret information into a
vars file, reference that
vars file from your
task, and encrypt the whole
vars file using
Let's use an example: You're writing an Ansible role and want to encrypt the spoiler for the movie Aliens.