Gist is a nice service. We can write code so easily and manage files as repository.
But bad points are …
- Many repository
- Gist destributes random hash to perticular gists (repositories).
- So difficult to find or remember contents as repository.
Gist is a nice service. We can write code so easily and manage files as repository.
But bad points are …
function Compare-XmlDocs($actual, $expected) { | |
if ($actual.Name -ne $expected.Name) { | |
throw "Actual name not same as expected: actual=" + $actual.Name | |
} | |
##attributes... | |
if ($actual.Attributes.Count -ne $expected.Attributes.Count) { | |
throw "attribute mismatch for actual=" + $actual.Name | |
} | |
for ($i=0;$i -lt $expected.Attributes.Count; $i =$i+1) { |
Per http://docs.ansible.com/ansible/playbooks_vault.html you can set an environment variable to use a password file for vault access. We can use this to create an environment variable to hold the password.
Copy vault-env
from this project to ~/bin
. Then add this to your ~/.bashrc
:
export ANSIBLE_VAULT_PASSWORD_FILE=~/bin/vault-env
# [ | |
# {rabbit, | |
# [## | |
## Network Connectivity | |
## ==================== | |
## | |
## By default, RabbitMQ will listen on all interfaces, using | |
## the standard (reserved) AMQP port. | |
## | |
## {tcp_listeners, [5672]}, |
# Get last 100 log entries as a PowerShell object | |
$gitHist = (git log --format="%ai`t%H`t%an`t%ae`t%s" -n 100) | ConvertFrom-Csv -Delimiter "`t" -Header ("Date","CommitId","Author","Email","Subject") | |
# Now you can do iterate over each commit in PowerShell, group sort etc. | |
# Example to get a commit top list | |
$gitHist|Group-Object -Property Author -NoElement|Sort-Object -Property Count -Descending | |
# Example do something for each commit | |
$gitHist|% {if ($_.Author -eq "Mattias Karlsson") {"Me"} else {"Someone else"} } |
$Username = "su" | |
$Password = "password" | |
$group = "Administrators" | |
$adsi = [ADSI]"WinNT://$env:COMPUTERNAME" | |
$existing = $adsi.Children | where {$_.SchemaClassName -eq 'user' -and $_.Name -eq $Username } | |
if ($existing -eq $null) { |
#requires -version 2 | |
<# | |
.SYNOPSIS | |
<Overview of script> | |
.DESCRIPTION | |
<Brief description of script> | |
.PARAMETER <Parameter_Name> | |
<Brief description of parameter input required. Repeat this attribute if required> |
<# | |
.SYNOPSIS | |
Gets a PowerShell Credential (PSCredential) from the Windows Credential Manager | |
.DESCRIPTION | |
This module will return a [PSCredential] object from a credential stored in Windows Credential Manager. The | |
Get-StoredCredential function can only access Generic Credentials. | |
Alias: GSC |
<# | |
.SYNOPSIS | |
Gets a PowerShell Credential (PSCredential) from the Windows Credential Manager | |
.DESCRIPTION | |
Adapted from: http://stackoverflow.com/questions/7162604/get-cached-credentials-in-powershell-from-windows-7-credential-manager | |
.PARAMETER TargetName | |
The name of the target login informations in the Windows Credential Manager |