I hereby claim:
- I am stumason on github.
- I am stuissecure (https://keybase.io/stuissecure) on keybase.
- I have a public key ASCSc6RXYvbgdOBz7fDVphqCNdn6hmnqsonQChQI0Ls-9Qo
To claim this, I am signing this object:
# Tailwind CSS v4 Guide: Key Differences from v3 | |
## Installation | |
### Using PostCSS (Recommended) | |
```bash | |
npm install tailwindcss @tailwindcss/postcss postcss | |
``` | |
Configure your PostCSS: |
[phases.setup] | |
nixPkgs = ["...", "python311Packages.supervisor", "php82Extensions.redis"] | |
[phases.build] | |
cmds = [ | |
# Create required directories in one command | |
"mkdir -p /var/log /app/storage/framework/{views,cache,sessions} /app/bootstrap/cache /etc/supervisor/conf.d", | |
# Set permissions in a single command | |
"chown -R www-data:www-data /var/log /app/storage /app/bootstrap/cache", |
[phases.setup] | |
nixPkgs = ["...", "python311Packages.supervisor", "php82Extensions.redis"] | |
[phases.build] | |
cmds = [ | |
"mkdir -p /var/log", | |
"touch /var/log/nginx-access.log /var/log/nginx-error.log", | |
"chown -R www-data:www-data /var/log", | |
"chown -R www-data:www-data /app", | |
"chmod -R 755 /app", |
version: '3.8' | |
services: | |
bolt: | |
image: bolt.diy:latest | |
pull_policy: build | |
platform: linux/arm64 | |
build: | |
context: https://github.com/stackblitz-labs/bolt.diy.git#v0.0.6 | |
target: bolt-ai-production | |
dockerfile_inline: | |
LARAVEL 11 - NEW FEATURES AND CHANGES | |
=== artisan === | |
- **Isolatable Commands**: Implement the `Illuminate\Contracts\Console\Isolatable` interface to ensure only one instance of a command runs at a time. An `--isolated` option is added to the command for this purpose. | |
- **Lock ID**: Customize the atomic lock key by defining an `isolatableId` method in the command class. | |
- **Lock Expiration Time**: Adjust the expiration time of isolation locks by defining an `isolationLockExpiresAt` method in the command class. | |
- **Prompts for Missing Input**: Implement the `PromptsForMissingInput` interface to automatically prompt users for required arguments that are missing. | |
- **Custom Prompt Questions**: Use the `promptForMissingArgumentsUsing` method to customize questions for missing arguments. | |
- **After Prompting for Missing Arguments**: Implement the `afterPromptingForMissingArguments` method to handle additional input prompts after missing arguments are gathered. |
<?php | |
namespace App\Aws; | |
use Aws\Credentials\CredentialProvider; | |
use Aws\Credentials\Credentials; | |
use Aws\Signature\SignatureV4; | |
use GuzzleHttp\Psr7\Request; | |
use GuzzleHttp\Client; | |
use Illuminate\Support\Facades\App; |
""" | |
Switching between accounts where MFA is required can be a little manually intensive. | |
This script updates a temporary profile with a key, secret and session token (using a more stable profile - in this case 'default'). | |
You can then use this temporary profile to switch between accounts. | |
i.e I have my main profile | |
I created a `[mfa_temp_session]` profile in my credentials which looked like this: |
{ | |
"python.testing.unittestArgs": [ | |
"-v", | |
"-s", | |
".", | |
"-p", | |
"test_*.py" | |
], | |
"python.testing.pytestEnabled": false, | |
"python.testing.nosetestsEnabled": false, |
I hereby claim:
To claim this, I am signing this object:
<?php | |
namespace App\Traits; | |
use Psr\Http\Message\RequestInterface; | |
use Aws\Signature\SignatureV4; | |
use Aws\Credentials\CredentialProvider; | |
use Aws\Credentials\CredentialsInterface; | |
/** |