In Git you can add a submodule to a repository. This is basically a repository embedded in your main repository. This can be very useful. A couple of usecases of submodules:
- Separate big codebases into multiple repositories.
#!/bin/bash | |
name="$1" | |
url="$2" | |
if [[ $name == "" ]]; then | |
echo No name provided. | |
exit 1 | |
fi |
#!/bin/bash | |
gsettings set org.gnome.desktop.interface color-scheme prefer-dark |
#!/bin/bash | |
# Install native dependencies | |
sudo dnf update -y | |
sudo dnf install -y curl wine | |
# Install MSYS2 | |
curl -L -o /tmp/msys2.exe 'https://github.com/msys2/msys2-installer/releases/download/2021-11-30/msys2-base-x86_64-20211130.sfx.exe' | |
wine64 /tmp/msys2.exe x -y -oC:/ |
I'm buiding a command line tool in Go that has an option to install itself as a service on Windows, which it needs admin rights for. I wanted to be able to have it reliably detect if it was running as admin already and if not, relaunch itself as admin. When the user runs the tool with the specific switch to trigger this functionality (-install or -uninstall in my case) they are prompted by UAC (User Account Control) to run the program as admin, which allows the tool to relaunch itself with the necessary rights.
To detect if I was admin, I tried the method described here first:
https://coolaj86.com/articles/golang-and-windows-and-admins-oh-my/
This wasn't accurately detecting that I was elevated, and was reporting that I was not elevated even when running the tool in CMD prompt started with "Run as Administrator" so I needed a more reliable method.
I didn't want to try writing to an Admin protected area of the filesystem or registry because Windows has the ability to transparently virtualize those writes
$ go tool dist list | |
android/386 | |
android/amd64 | |
android/arm | |
android/arm64 | |
darwin/386 | |
darwin/amd64 | |
darwin/arm | |
darwin/arm64 | |
dragonfly/amd64 |