This message, related to the development of the theme, only displays on the localhost homepage to notify you of any important theme changes.


Version 2.0.0 - July 20, 2020

Below are the following changes that could be breaking changes for your site. For more details on any change, please refer to PR #154.

The major breaking change is:

  1. Users that have front matter that utilize images (backwards compatibility for featured and associated parameters still remains) will need to adjust from [images]="SRC" to the new format.
[[images]]
    src = "" // Link to image
    alt = "" // Alt text for image
    stretch = // Optional: See screenshots for referenced values and outcomes

If you utilize any of the following, there might be a breaking:

  1. User custom templates may require adjustment.
  2. User custom i18n languages, or custom templates referencing i18n translations may require adjustment.
  3. User custom template for comments will require adjustment if it uses the theme’s CSS and/or JS.
  4. User custom CSS may need to adjust due to a variety of class name changes and specificity changes.

While I realize this is inconvenient, I hope that it is worth it to you in the long run. Thanks for using the theme, and feel free to submit issues as needed.

Suraj Deshmukh

Blog

containers, packaging, programming, hacks, kubernetes, openshift, fedora, centos

Project specific scripts

Instead of polluting your PATH the easier way to put project specific scripts

Suraj Deshmukh

2-Minute Read

There are always scripts that you write to automate some mundane tasks. And then you put that script in a directory that is in your PATH. But what this does is that it pollutes your system global PATH and shows up in places you wouldn’t want it to be in.

Writing your own Seccomp profiles for Docker

Understanding the seccomp profile json format

Suraj Deshmukh

3-Minute Read

A large number of system calls are exposed to every userland process with many of them going unused for the entire lifetime of the process. A certain subset of userland applications benefit by having a reduced set of available system calls. The resulting set reduces the total kernel surface exposed to the application. System call filtering is meant for use with those applications. Seccomp filtering provides a means for a process to specify a filter for incoming system calls.

Recent Posts

categories

About

I am a Software Engineer at Kinvolk, working on various tooling around container technology like Docker, Kubernetes.