wget -O upgrade.sh 'https://gist.github.com/Bonveio/bb40b778b33ef06868c14c0240f25967/raw/upgrade.sh'
- Debian 10 to 11
bash upgrade.sh 11 - Debian 11 to 12
bash upgrade.sh 12 - Debian 12 to 13
bash upgrade.sh 13
| declare @TableName sysname = 'notification_responses' | |
| declare @Result varchar(max) = 'public class ' + @TableName + ' | |
| {' | |
| select @Result = @Result + ' | |
| public ' + ColumnType + NullableSign + ' ' + ColumnName + ' { get; set; } | |
| ' | |
| from | |
| ( | |
| select |
| apt-get update | |
| # apt-transport-https may be a dummy package; if so, you can skip that package | |
| apt-get install -y apt-transport-https ca-certificates curl gpg | |
| # If the directory `/etc/apt/keyrings` does not exist, it should be created before the curl command, read the note below. | |
| # sudo mkdir -p -m 755 /etc/apt/keyrings | |
| curl -fsSL https://pkgs.k8s.io/core:/stable:/v1.30/deb/Release.key | gpg --dearmor -o /etc/apt/keyrings/kubernetes-apt-keyring.gpg | |
| # This overwrites any existing configuration in /etc/apt/sources.list.d/kubernetes.list | |
| echo 'deb [signed-by=/etc/apt/keyrings/kubernetes-apt-keyring.gpg] https://pkgs.k8s.io/core:/stable:/v1.30/deb/ /' | tee /etc/apt/sources.list.d/kubernetes.list |
| sudo systemsetup -setremotelogin on | |
| sudo /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -access -on -users admin -privs -all -restart -agent -menu |
| <?xml version="1.0" encoding="UTF-8" standalone="yes"?> | |
| <TrustFrameworkPolicy | |
| xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | |
| xmlns:xsd="http://www.w3.org/2001/XMLSchema" | |
| xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06" | |
| PolicySchemaVersion="0.3.0.0" | |
| TenantId="pitchnhireb2c.onmicrosoft.com" | |
| PolicyId="B2C_1A_signup_signin_pnh_core" | |
| PublicPolicyUri="http://pitchnhireb2c.onmicrosoft.com/B2C_1A_signup_signin_pnh_core"> |
| sudo apt-get install -y v4l-utils | |
| sudo v4l2-ctl -d /dev/video0 --list-formats-ext |
| setlocal | |
| cd /d %~dp0 | |
| set backupdir=D:\iis\ | |
| %windir%\system32\inetsrv\appcmd list apppool /config /xml > %backupdir%\apppools.xml | |
| %windir%\system32\inetsrv\appcmd list site /config /xml > %backupdir%\sites.xml | |
| rem RESTORE | |
| %windir%\system32\inetsrv\appcmd add apppool /in < apppools.xml |
| sudo apt-add-repository ppa:certbot/certbot | |
| sudo apt install certbot | |
| wget https://github.com/joohoi/acme-dns-certbot-joohoi/raw/master/acme-dns-auth.py | |
| chmod +x acme-dns-auth.py | |
| nano acme-dns-auth.py | |
| # change #!/usr/bin/env python to #!/usr/bin/env python3 | |
| sudo mv acme-dns-auth.py /etc/letsencrypt/ |
| public static void GetAuthorizationToken() | |
| { | |
| ClientCredential cc = new ClientCredential(AzureDetails.ClientID, AzureDetails.ClientSecret); | |
| var context = new AuthenticationContext("https://login.microsoftonline.com/" + AzureDetails.TenantID); | |
| var result = context.AcquireTokenAsync("https://management.azure.com/", cc); | |
| if (result == null) | |
| { | |
| throw new InvalidOperationException("Failed to obtain the Access token"); | |
| } | |
| AzureDetails.AccessToken = result.Result.AccessToken; |
| [Unit] | |
| Description=ATS Backend APIs | |
| StartLimitIntervalSec=0 | |
| [Service] | |
| Environment=PORT=5555 | |
| Environment=LOG=true | |
| ExecStart=node dist/main | |
| WorkingDirectory=/var/local/ats-core | |
| User=root |