Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Per http://docs.ansible.com/ansible/playbooks_vault.html you can set an environment variable to use a password file for vault access. We can use this to create an environment variable to hold the password.
Copy vault-env
from this project to ~/bin
. Then add this to your ~/.bashrc
:
export ANSIBLE_VAULT_PASSWORD_FILE=~/bin/vault-env
Tip
Microsoft active directory servers by default provide LDAP connections over unencrypted connections (boo!).
The steps below will create a new self signed certificate appropriate for use with and thus enabling LDAPS for an AD server. Of course the "self-signed" portion of this guide can be swapped out with a real vendor purchased certificate if required.
Steps have been tested successfully with Windows Server 2012R2, but should work with Windows Server 2008 without modification. Requires a working OpenSSL install (ideally Linux/OSX) and (obviously) a Windows Active Directory server.
(use-package smartparens | |
:diminish smartparens-mode | |
:init | |
(smartparens-global-mode) | |
:config | |
(require 'smartparens-config) | |
(add-hook 'eval-expression-minibuffer-setup-hook #'smartparens-mode) | |
(custom-set-variables | |
'(sp-base-key-bindings 'sp) | |
'(sp-override-key-bindings |
require 'parallel' | |
require 'rtesseract' | |
require 'mini_magick' | |
source = "/MyDirectory/my.pdf" | |
doc = {} | |
pdf = MiniMagick::Image.open(source) | |
Parallel.map(pdf.pages.each_with_index, in_threads: 8) do |page, idx| | |
tmpfile = Tempfile.new(['', '.tif']) | |
MiniMagick::Tool::Convert.new do |convert| |
When I use docker to work with the shared workspace with host under Ubuntu, I find that files created by docker user is owned by root. This is not the same with macOS.
Maybe this is becuase docker is run by root user and the default user mapping mechanism is to map container-root to host-user or host-root. So can I map the container-root or container-any-user to host-current-user?
Fortunately the latest docker supports the re-map the container user to any host user via Linux namespace. Refer to this.