

Tried this at work and discovered it only really works on vscode and probably eclipse. Other IDEs claimed support but it was found to be unusable.
Tried this at work and discovered it only really works on vscode and probably eclipse. Other IDEs claimed support but it was found to be unusable.
I do agree mostly with your point here, but I think you can limit the scope a bit more. Mainly provide a working build environment via one of the mentioned tools, since you will need it anyway for a ci/cd pipeline. You can additionally have a full development environment that you use available for people to use if they choose. It is important that it be one regularly used to keep the instructions up to date for anyone that might want to try to contribute.
From my observations as a sys admin, people tend to prefer the tools they are familiar with, especially as you cross disciplines. A known working example is usually easy to adapt to anyone’s preferred tooling.
The lack of version is the problem. Syntax has changed over time, so when someone finds or has an older compose file, there is no hint it won’t work with the current version of docker-compose until you get errors and no graceful way to handle it.
Compose doesn’t have a versioned standard, it did for a bit iirc, which also means you can’t always just grab a compose file and know it will always just work.
Most self hosted works fine with giant all in one containers, even for complex apps, it’s when you need to scale you usually hit problems with an all in one container approach and have to change.
The main benefits to paying for certs are
The only thing that matters to most people is that they don’t get cert errors going to/using a web site, or installing software. Any CA that is in the browsers, OS and various language trust stores is the same to that effect.
The rules for inclusion in the browsers trust stores are strict (many of the Linux distros and language trust stores just use the Mozilla cert set), which is where the trust comes from.
Which CA provider you choose doesn’t change your potential attack surface. The question on attack surface seems like it might come from lacking understanding of how certs and signing work.
A cert has 2 parts public cert and private key, CAs sign your sites public cert with their private key, they never have or need your private key. Public certs can be used to verify something was signed by the private key. Public certs can be used to encrypt data such that only the private key can decrypt it.
There was no reference to alamony or spousal support in the post, but I tend to see that “taking all my money” phase because of un-equilal division of assets. The post implies they feel there was an un-equilal division, but suggests they are in a better state now that the ex is out of their life despite that, which is a relatively healthy expression for what they are going/have gone through.
Where I am, non-financial spousal contributions are taken seriously and is seen as important as any other form of contribute to the marriage. I know that isn’t the case everywhere and if you experienced your non-financial contributions being downplayed, I am sorry.
Telling people to stop, is sweeping issues under the rug that should be, and need to be talked about. I do agree non-financial contributions get downplayed, it’s shitty that it still happens.
Never said venting was an excuse or the way this venting was happening was perfectly healthy, but that it is necessary to allow people to vent and telling people to stop isn’t healthy.
Being in a divorce currently, I have noticed a few things that aren’t talked about that I think lead to these memes being so popular.
Divorce laws vary a lot from location to location, in the US they are all state level laws. Not all state level divorce laws are fair to both parties, it seems to get worse if children are involved (some states have recently been adding laws that state 50/50 custody must be the assumed starting point because it hasn’t been).
Even if the divorce laws are written to be fair to both parties in theory, at least in my state, the judge has the flexibility to rule in ways that may seem or even be unfair (what is equatable is complicated).
Even if the judge would or does rule fairly on all issues presented to them, the lawyers (if the parties can even afford lawyers) may be perpetuating gender biases in divorces as well. So the issues may never even reach the judge and just be settled by an “agreement” between the parties pushed by the lawyers.
Most divorces settle, maybe even on terms that heavily favor one party, because going to trial is a lot of money. Lawyers know this and have “games” they can play. like 60%-70% of assets to one party is still cheaper in theory than going to trial for the other party, so they hold that line in negotiations and your own lawyer will push for you to agree to terms like that as a cost/benefit analysis exercise.
Even if none of that happened and it was fair the whole way through, it is a very complex emotional time, and men often don’t have the same level of social support to vent to.
Telling people to stop unless they are in some level of extreme situation is really toxic. People need to vent and be able to talk about what they are going through.
You can, and for Linux generally have to, manage your own secure boot keys and signing your own kernal, united, modules, etc. Conacal and Red Hat have signing keys iirc, but distributions can and do get the shim boot loader signed so secure boot works. The arch wiki has a page on how to setup secure boot . Many distros installers do end up signed as well so you can go through the full install process with secure boot enabled.
Short answer no, but you can add the source IP as part of the http header https://www.nginx.com/resources/wiki/start/topics/examples/forwarded/ then you have to log that bit of the header at the app level.
There can be ways of your are using ipv6, basically turning your cloud host into a router, but but ipv4 you would have to have a 1:1 mapping and setup the routing carefully to make it work.
In Linux everything is a file. So modifying files is all you really need. The hardest part is how to handle mobile endpoints like laptops, that don’t have always on connections. Ansible pull mode is what we were looking at in a POC, with triggers on VPN connection. Note we have a large Linux server footprint already managed by ansible, so it isn’t a large lift for us.