aws configure set preview.efs true
aws efs describe-file-systems --profile TEST --region us-east-2
{
var key = <my key>, | |
secret = <my secret>, | |
https = require("https"), | |
https_options = { | |
"host": <host>, | |
"path": <path>, | |
"port": <port>, | |
"method": <method>, | |
"headers": { | |
"Authorization": "Basic " + new Buffer(key + ":" + secret, "utf8").toString("base64") |
<?php | |
// | |
// ATTENTION! | |
// This method of resizing field data TRUNCATES the information present in the field. | |
// This is heavily based on the solution available at https://github.com/evolvingweb/custom_field_resize | |
// with only a minor tweak to truncate field data before resizing the field, so we don't get an SQL error. | |
// | |
apt-get update | |
apt-get install -y ruby | |
wget https://aws-codedeploy-us-east-1.s3.amazonaws.com/releases/codedeploy-agent_1.0-1.1597_all.deb | |
mkdir codedeploy-agent_1.0-1.1597_ubuntu20 | |
dpkg-deb -R codedeploy-agent_1.0-1.1597_all.deb codedeploy-agent_1.0-1.1597_ubuntu20 | |
sed 's/2.0/2.7/' -i ./codedeploy-agent_1.0-1.1597_ubuntu20/DEBIAN/control | |
dpkg-deb -b codedeploy-agent_1.0-1.1597_ubuntu20 | |
dpkg -i codedeploy-agent_1.0-1.1597_ubuntu20.deb | |
systemctl start codedeploy-agent | |
systemctl enable codedeploy-agent |
<?php | |
declare(strict_types=1); | |
namespace Drupal\mymodule\StackMiddleware; | |
use Symfony\Component\HttpFoundation\InputBag; | |
use Symfony\Component\HttpFoundation\Request; | |
use Symfony\Component\HttpFoundation\Response; | |
use Symfony\Component\HttpKernel\HttpKernelInterface; |
See discussion at https://www.drupal.org/project/drupal/issues/937442
This workaround is based on code from "Address" contrib module: https://www.drupal.org/project/address Thanks to @bojanz who initially wrote it here: https://git.drupalcode.org/project/address/-/blob/8.x-1.x/address.install
#!/bin/bash | |
rm -f content | |
rm *.enc | |
rm *.pem | |
rm keyfile | |
rm *.b64 | |
rm *.dec | |
echo "generate: data-key for this content transfer" |
openssl key pair generate | |
//client - using meteor.js | |
const nodersa = Npm.require('node-rsa'); | |
import { HTTP } from 'meteor/http'; | |
const syncPost = Meteor.wrapAsync( HTTP.post, HTTP ); | |
encryptStringWithRsaPublicKey( data ) { | |
const absolutePath = Assets.absoluteFilePath( "public.key" ); //public key file path | |
const publicKey = fs.readFileSync( absolutePath, "utf8" ); |
const crypto = require("crypto") | |
// The `generateKeyPairSync` method accepts two arguments: | |
// 1. The type ok keys we want, which in this case is "rsa" | |
// 2. An object with the properties of the key | |
const { publicKey, privateKey } = crypto.generateKeyPairSync("rsa", { | |
// The standard secure default length for RSA keys is 2048 bits | |
modulusLength: 2048, | |
}) |