Get-NetConnectionProfile
Set-NetConnectionProfile -InterfaceAlias "vEthernet (DockerNAT)" -NetworkCategory Private
##keep this running for Decryption
while ($true)
{
if ($(Get-SmbServerConfiguration).EncryptData)
input_list = [] | |
while True: | |
input_str = input() | |
if input_str == "": | |
break | |
else: | |
input_list.append(input_str) | |
#print(input_list) |
#import-module "Microsoft.TeamFoundation.DistributedTask.Task.Common" | |
$uri = "$($env:SYSTEM_TEAMFOUNDATIONCOLLECTIONURI)$env:SYSTEM_TEAMPROJECT/_apis/build/builds/$($env:BUILD_BUILDID)?api-version=2.0" | |
Write-Verbose "URI: $uri" | |
$body = "{keepForever:true}" | |
$result = Invoke-RestMethod -Uri $uri -Method Patch -ContentType "application/json" -Headers @{Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN"} -Body $body | |
Write-Output "RESULT: $result" |
Driver Support Required: | |
1. Display | |
2. 3D hardware acceleration support | |
3. Audio | |
4. Webcam | |
5. Video-game controller | |
http://somatorio.org/en/post/running-gui-apps-with-docker/ | |
https://blog.qmo.io/the-perfect-media-server-with-docker-plex-and-automatic-bittorrent/ |
containers: | |
- name: APP_NAME | |
image: "DOCKER_IMAGE_NAME" | |
ports: | |
- name: http | |
containerPort: 3000 | |
volumeMounts: | |
- name: share | |
mountPath: /var/lib/ | |
volumes: |
## ssh connection behind proxy, requires netcat(nc) installed | |
ssh USER@FINAL_DEST -o "ProxyCommand=nc -X connect -x PROXYHOST:PROXYPORT %h %p" |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
#Login | |
Login-AzureRmAccount | |
#Variables | |
$sourceRG = Read-Host 'sourceRG' #Name of source Resource Group | |
$destinationRG = Read-Host 'destinationRG' #Name of destinatino Resource Group | |
$Subscription = Read-Host 'SubscriptionName' #Name of Subscription | |
#Get resources | |
Select-AzureRmSubscription -SubscriptionName $Subscription |
#Login | |
Login-AzureRmAccount | |
#Variables | |
$oldSubscription = Read-Host 'oldSubscriptionID' #Name of source susbcription | |
$newSubscription = Read-Host 'newSubscriptionID' #Name of destination subscription | |
$sourceRG = Read-Host 'sourceRG' #Name of ource Resource Group | |
$destinationRG = Read-Host 'destinationRG' #Name of destinatino Resource Group | |
#Get resources |
The sole dependency is a build of openssl for your platform. Without further due, our first step is to provide Azure with a certificate that will be used to sign client certificates. We call this the root certificate and by importing it to Azure we trust certificates signed by it. Most of the following commands will ask you to guard the output files with a passphrase, leave them empty until you have a working solution, then follow the guide again and add strong passwords when you’re asked to.
openssl genrsa -aes256 -out MyAzureVPN.key 2048
openssl req -x509 -sha256 -new -key MyAzureVPN.key -out MyAzureVPN.cer -days 3650 -subj /CN="ca_name"
Note: fix for opesssl random number issue: openssl rand -out ~/.rnd -writerand ~/.rnd
In Azure portal navigate to “Virtual Networks Gateway/Configuration/Point-to-site” and cert name and data from MyAzureVPN.cer removing '--Begin/end certificate'.