I hereby claim:
- I am stevenfollis on github.
- I am stevenfollis (https://keybase.io/stevenfollis) on keybase.
- I have a public key ASA9MxEDFrTKbVpehiiKM6ChYD1niUX7-QGa9m9rgbTywwo
To claim this, I am signing this object:
//================================================================== | |
// Get list items | |
// define the target list url | |
var listUrl = 'http://samplesite/_vti_bin/ListData.svc/Employee'; | |
$.getJSON(listUrl, function(data) { | |
// loop through the result set | |
$.each(data.d.results, function(i, result) { | |
alert(result); | |
}); |
/*============================================================================*/ | |
/* Query an external endpoint via REST */ | |
function queryEndpoint(url, callback) { | |
// Issue a POST request to the SP.WebProxy.Invoke endpoint. | |
// The body has the information to issue a GET request | |
$.ajax({ | |
url: "../_api/SP.WebProxy.invoke", | |
type: "POST", |
// select and loop through all iframes inside of webparts | |
$('.ms-WPBody iframe').each(function(i, frame) { | |
// define a variable to hold the new width | |
var newWidth; | |
// starting with the iframe, search up the DOM for the closest webpart zone | |
// then find its width and store it | |
newWidth = $(frame).closest('.ms-webpart-zone').width(); |
I hereby claim:
To claim this, I am signing this object:
# https://docs.docker.com/engine/installation/windows/docker-ee/#install-docker-ee | |
<# Usage | |
Invoke-WebRequest ` | |
-UseBasicParsing ` | |
-OutFile C:\install-docker-ee.ps1 ` | |
-Uri https://gist.githubusercontent.com/stevenfollis/91d2b64b07a3c2110f879727761fbf1f/raw/install-docker-ee.ps1 | |
C:\install-docker-ee.ps1 |
######################################################### | |
# | |
# Name: ImportTestUsers.ps1 | |
# Author: Israel Vega (Adjusted for JSON by Steven Follis) | |
# Version: 1.0 | |
# Date: 06/08/2011 | |
# Comment: Create test users from a JSON array for import into an AD | |
# | |
######################################################### |
# Create directory to hold module files | |
mkdir -Force C:\DSC | |
#================================= | |
# Install xPendingReboot Module | |
# https://github.com/PowerShell/xPendingReboot | |
#================================= | |
# Download xPendingReboot | |
Invoke-WebRequest ` | |
-UseBasicParsing ` |
# Description: Boxstarter Script | |
# Author: Jess Frazelle <jess@linux.com> | |
# Last Updated: 2017-09-11 | |
# | |
# Install boxstarter: | |
# . { iwr -useb http://boxstarter.org/bootstrapper.ps1 } | iex; get-boxstarter -Force | |
# | |
# You might need to set: Set-ExecutionPolicy RemoteSigned | |
# | |
# Run this boxstarter by calling the following from an **elevated** command-prompt: |
# Distribute a Credential Spec file to all Windows Server cluster nodes | |
# gmsa.json by default, else set $env:CREDSPEC with filename | |
version: '3.3' | |
configs: | |
credspec: | |
file: ${ProgramData}/Docker/CredentialSpecs/${CREDSPEC:-gmsa.json} | |
services: | |
copy: | |
command: cmd /c copy credspec C:\\out\\${CREDSPEC:-gmsa.json} | |
configs: |
{ | |
... | |
"schemes" : | |
[ | |
... | |
{ | |
"background" : "#292A2B", | |
"black" : "#292A2B", | |
"blue" : "#45A9F9", | |
"brightBlack" : "#002B36", |