jaのページ、リリースできました:tada:
- dev-1.13-ja.2ほぼ終わり
- あと一個
| fragment branchProtection on BranchProtectionRule { | |
| allowsDeletions | |
| allowsForcePushes | |
| creator { | |
| login | |
| } | |
| id | |
| isAdminEnforced | |
| requiredStatusCheckContexts | |
| requiredApprovingReviewCount |
jaのページ、リリースできました:tada:
| var lib = require('./patch.js'); | |
| var Sequelize = require('sequelize'); | |
| var sequelize = new Sequelize('sqlite://dbname', {dialectModulePath: 'sql.js'}); | |
| var User = sequelize.define('user', { | |
| username: Sequelize.STRING, | |
| birthday: Sequelize.DATE | |
| }); |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <configuration> | |
| <system.webServer> | |
| <rewrite> | |
| <rules> | |
| <rule name="Index"> | |
| <match url="^(.*)$" /> | |
| <conditions> | |
| <add input="{REQUEST_FILENAME}" matchType="IsFile" negate="true" /> | |
| <add input="{REQUEST_FILENAME}" matchType="IsDirectory" negate="true" /> |
I've been using a lot of Ansible lately and while almost everything has been great, finding a clean way to implement ansible-vault wasn't immediately apparent.
What I decided on was the following: put your secret information into a vars file, reference that vars file from your task, and encrypt the whole vars file using ansible-vault encrypt.
Let's use an example: You're writing an Ansible role and want to encrypt the spoiler for the movie Aliens.
| body { | |
| font-family: Helvetica, arial, sans-serif; | |
| font-size: 14px; | |
| line-height: 1.6; | |
| padding-top: 10px; | |
| padding-bottom: 10px; | |
| background-color: white; | |
| padding: 30px; } | |
| body > *:first-child { |
| use strict; | |
| use VM::EC2; | |
| my $owner_id = $ENV{EC2_OWNER_ID} or die 'EC2_OWNER_ID is required.'; | |
| #my $owner_id = shift or die 'aws_status.pl <owner_id>'; | |
| my $ec2 = VM::EC2->new; | |
| my @regions = $ec2->describe_regions(); | |
| for my $region (@regions) { | |
| # region |
つづきはこちらで http://akkunchoi.github.com/git-ref.html
Git
$ git init hoge # git リポジトリを作成。または...