Enable Auto-updates for all plugins using wp-cli? (since wordpress 5.5)

Since WP 5.5 just released and now you can set plugins to auto-update, can this be done via wp-cli? Looking at the documentation, I don’t see a sub-command for it: https://developer.wordpress.org/cli/commands/plugin/

I manage a lot of WordPress sites, most of which are OK to auto-update and would save me a lot of time if they did, as well as reducing security risks.

I’d like to enable auto-updates for plugins across over many wordpress sites. Any solutions?

Does Devil’s Sight enable one to see into Hunger of Hadar?

The hunger of Hadar spell (PHB, p. 251) creates a black void of darkness, which cannot be penetrated by light. This means that no one can see in, and those inside cannot see at all, which is a handy way to damage and control enemies since they don’t know which way is out.

This also means that characters cannot easily attack those inside.

The Devil’s Sight eldritch invocation, however, enables a warlock to see normally in magical and non-magical darkness.

Does this enable the warlock to see into the area of blackness created by hunger of Hadar and attack creatures inside? Are there any other sight mechanics that allow someone to see in or out of the spell?

Does Mirror Image enable Sneak Attack?

This question is related to this other question and builds on that.

From some of the answer provided in the linked question, it would seem that the RAI for proccing sneak attack is that the enemy perceives multiple threats and it has to split the attention among them.

Silent Image’s limitation is that it’s not moving if not using the caster action, so the Arcane Trickster controlling it can’t do both the illusion movement to be perceived as a threat AND the attack action, but it is reasonable if the illusion is moved by someone else.

But what about Mirror Images? Those move

Until the spell ends, the duplicates move with you and mimic your actions, shifting position so it’s impossible to track which image is real.

just like you, so on your attack they also attack, and are perceived as a threat.

So my question is: can I enable sneak attack using my Arcane Trickster mirror images? I’d argue for a RAW no, but I’d like to hear other opinions.

How to enable the option “edit physics shape” in the Sprite Editor?

I can successfully import .png files, create tilesets, and use them in my tilemaps in Unity. Thanks to DMGregory, I just learned that there exists an option to customize the Tilemap Collider 2D in the Sprite Editor, which allows me to set a custom collider for every tile instead of going through them one by one.

The steps I follow while creating a tileset in Unity is as follows.

  1. Import the .png file.
  2. Open the Sprite Editor.
  3. Select the option Multiple for Sprite Mode.
  4. Select Slice from the Sprite Editor.

Then, I create a Tile Palette in a folder, drop and drag my created tiles, and start creating my level.

I have never encountered the option to modify the colliders tile by tile. What am I doing wrong?

Does setting Query Optimizer Fixes to ON enable Scalar UDF Inlining on a database with compatibility level 140?

Azure SQL Database Managed Instance. Current Compatibility Level is set to 140 to match on-prem SQL Server 2017 test and development server. I just read this article on Scalar UDF Inlining and was curious if setting Query Optimizer Fixes to ON would enable this feature? I have read several more articles on the topic but none of them address this question.

Do I need to enable Trace Flag 1117 for equally sized data files?

I was reading about fill proportional algorithm in SQL Server and then I recalled TF1117. BOL states:

When a file in the filegroup meets the autogrow threshold, all files in the filegroup grow. This trace flag affects all databases and is recommended only if every database is safe to be grow all files in a filegroup by the same amount.

What I can’t understand is if data files are filling proportionally, won’t they auto-grow proportionally either? In that case we can’t omit using TF1117.

Https – how to enable secure connection with Jenkins?

Below is the cloud formation template that creates Elastic Load Balancer as public facing to jenkins(jenkins:ecs docker) running in VPC subnet:

{     "AWSTemplateFormatVersion": "2010-09-09",     "Description": "Jenkins Stack",     "Parameters":{         "VpcId": {             "Type": "AWS::EC2::VPC::Id",             "Description": "The target VPC Id"          },         "SubnetId": {             "Type": "AWS::EC2::Subnet::Id",             "Description": "The target subnet Id"         },         "KeyName": {             "Type": "String",             "Description": "The key pair that is allowed SSH access"         }     },     "Resources":{         "EC2Instance":{             "Type": "AWS::EC2::Instance",             "Properties":{                 "ImageId": "ami-05958d7635caa4d04",                 "InstanceType": "t2.micro",                 "SubnetId": { "Ref": "SubnetId"},                 "KeyName": { "Ref": "KeyName"},                 "SecurityGroupIds": [ { "Ref": "EC2InstanceSecurityGroup"} ],                 "IamInstanceProfile": { "Ref" : "EC2InstanceProfile"},                 "UserData":{                     "Fn::Base64": { "Fn::Join": ["", [                         "#!/bin/bash\n",                         "echo ECS_CLUSTER=", { "Ref": "EcsCluster" }, " >> /etc/ecs/ecs.config\n",                         "groupadd -g 1000 jenkins\n",                         "useradd -u 1000 -g jenkins jenkins\n",                         "mkdir -p /ecs/jenkins_home\n",                         "chown -R jenkins:jenkins /ecs/jenkins_home\n"                     ] ] }                 },                 "Tags": [ { "Key": "Name", "Value": { "Fn::Join": ["", [ { "Ref": "AWS::StackName"}, "-instance" ] ]} }]             }         },         "EC2InstanceSecurityGroup":{             "Type": "AWS::EC2::SecurityGroup",             "Properties": {                 "GroupDescription": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, " ingress security group" ] ] },                 "VpcId": { "Ref": "VpcId" },                 "SecurityGroupIngress": [                     {                         "IpProtocol": "tcp",                         "FromPort": "8080",                         "ToPort": "8080",                         "SourceSecurityGroupId": { "Ref": "ElbSecurityGroup"}                     },                     {                         "IpProtocol": "tcp",                         "FromPort": "22",                         "ToPort": "22",                         "CidrIp": ""                     }                 ],                 "Tags": [ { "Key": "Name", "Value": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, "-ec2-sg" ] ] } } ]             }         },         "EC2InstanceProfile": {             "Type": "AWS::IAM::InstanceProfile",             "Properties": {                 "Path": "/",                 "Roles": [ { "Ref": "EC2InstanceRole" } ]             }         },         "EC2InstanceRole": {             "Type": "AWS::IAM::Role",             "Properties": {                 "AssumeRolePolicyDocument":{                     "Version": "2012-10-17",                     "Statement": [                         {                             "Effect": "Allow",                             "Principal": { "Service": [ "ec2.amazonaws.com" ] },                             "Action": [ "sts:AssumeRole" ]                         }                     ]                 },                 "Path": "/",                 "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role" ]             }         },         "ElbSecurityGroup": {             "Type": "AWS::EC2::SecurityGroup",             "Properties": {                 "GroupDescription": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, " ELB ingress security group" ] ] },                 "VpcId": { "Ref": "VpcId"},                 "SecurityGroupIngress": [                     {                         "IpProtocol": "tcp",                         "FromPort": "80",                         "ToPort": "80",                         "CidrIp": ""                     }                 ],                 "Tags": [ { "Key": "Name", "Value": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, "-elb-sg" ] ] } } ]             }         },         "ElasticLoadBalancer": {             "Type": "AWS::ElasticLoadBalancing::LoadBalancer",             "Properties": {                 "CrossZone": "false",                 "SecurityGroups": [ { "Ref": "ElbSecurityGroup" } ],                 "Listeners": [                     {                         "LoadBalancerPort": "80",                         "InstancePort": "8080",                         "Protocol": "http"                     }                  ],                 "Instances": [ { "Ref": "EC2Instance"} ],                 "Subnets": [ { "Ref": "SubnetId"} ]             }         },         "EcsCluster": {             "Type": "AWS::ECS::Cluster"         },         "EcsTaskDefinition": {             "Type": "AWS::ECS::TaskDefinition",             "Properties": {                 "ContainerDefinitions": [                     {                         "Name": "jenkins",                         "Image": "somedockeracct/jenkins:ecs",                         "Memory": 500,                         "PortMappings": [                              {                                  "ContainerPort": 8080,                                  "HostPort": 8080                              },                             {                                  "ContainerPort": 50000,                                  "HostPort": 50000                              }                         ],                         "MountPoints": [                             {                                 "SourceVolume": "docker",                                 "ContainerPath": "/var/run/docker.sock"                             },                             {                                 "SourceVolume": "jenkins_home",                                 "ContainerPath": "/var/jenkins_home"                             }                         ]                     }                   ],                 "Volumes": [                     {                         "Name": "jenkins_home",                         "Host": { "SourcePath": "/ecs/jenkins_home" }                     },                     {                         "Name": "docker",                         "Host": { "SourcePath": "/var/run/docker.sock" }                     }                 ]             }         },         "EcsService": {             "Type": "AWS::ECS::Service",             "Properties": {                 "Cluster": { "Ref": "EcsCluster" },                 "TaskDefinition": { "Ref": "EcsTaskDefinition" },                 "DesiredCount": 1             }         }     },     "Outputs":{         "ElbDomainName": {             "Description": "Public DNS name of Elastic Load Balancer",             "Value": {                 "Fn::GetAtt": [                     "ElasticLoadBalancer",                     "DNSName"                 ]             }         },         "EC2InstanceDomainName": {             "Description": "Public DNS name of EC2 instance",             "Value": {                 "Fn::GetAtt": [                     "EC2Instance",                     "PublicDnsName"                 ]             }         }     } } 

where the docker file of jenkins master(jenkins:ecs) is:

FROM jenkins/jenkins:2.190.2  MAINTAINER Developer team <devteam@abc.com>  # Suppress apt installation warnings # https://serverfault.com/a/227194/220043 ENV DEBIAN_FRONTEND=noninteractive  # Official Jenkins image does not include sudo, change to root user USER root  # Used to set the docker group ID # Set to 497 by default, which is the groupID used by AWS Linux ECS instance ARG DOCKER_GID=497  # Create Docker Group with GID # Set default value of 497 if DOCKER_GID set to blank string by Docker compose RUN groupadd -g $  {DOCKER_GID:-497} docker  # Install base packages for docker, docker-compose & ansible # apt-key adv --keyserver keyserver.ubuntu.com --recv-keys AA8E81B4331F7F50 && \ RUN apt-get update -y && \     apt-get -y install bc \                     gawk \                     libffi-dev \                     musl-dev \                     apt-transport-https \                     curl \                     python3 \                     python3-dev \                     python3-setuptools \                     gcc \                     make \                     libssl-dev \                     python3-pip   # Used at build time but not runtime ARG DOCKER_VERSION=18.06.1~ce~3-0~debian  # Install the latest Docker CE binaries and add user `jenkins` to the docker group RUN apt-get update && \     apt-get -y install apt-transport-https \     ca-certificates \     curl \     gnupg-agent \     software-properties-common && \     curl -fsSL https://download.docker.com/linux/$  (. /etc/os-release; echo "$  ID")/gpg > /tmp/dkey; apt-key add /tmp/dkey && \     add-apt-repository \       "deb [arch=amd64] https://download.docker.com/linux/$  (. /etc/os-release; echo "$  ID") \       $  (lsb_release -cs) \       stable" && \     apt-get update && \     apt-get -y install docker-ce=$  {DOCKER_VERSION:-18.06.1~ce~3-0~debian}  && \         # docker-ce-cli=$  {DOCKER_VERSION:-18.06.1~ce~3-0~debian} \         # containerd.io && \     usermod -aG docker jenkins  ARG DOCKER_COMPOSE=1.24.1  # Install docker compose RUN curl -L "https://github.com/docker/compose/releases/download/$  {DOCKER_COMPOSE:-1.24.1}/docker-compose-$  (uname -s)-$  (uname -m)" \     -o /usr/local/bin/docker-compose && \     chmod +x /usr/local/bin/docker-compose && \     pip3 install ansible boto3  # Change to jenkins user USER jenkins  # Add jenkins plugin COPY plugins.txt /usr/share/jenkins/plugins.txt RUN /usr/local/bin/install-plugins.sh < /usr/share/jenkins/plugins.txt 

Master jenkins docker container runs in EC2(docker host).

In this scenario, ELB is not used for load balancing but to public face Jenkins. Currently ELB is connected using http

How to enable https secure connection to jenkins via ELB?

Who holds the responsibility to ensure secure connection? ELB or Jenkins

What to display if user does not enable location services?

This is a continuation of a previous question.

I’m developing an app whose only purpose is to display the closest Joe's Florida Tacos locations to my current location in Florida. It will have the usual list (closest first) and a map with the markers. The app doesn’t have any use outside of Florida.

Under normal circumstances, the user enabled “current location” so the app will display a list with the closest locations to user (like this). If the user switches to the map, the map will display location of the user and several markers.

But let’s say that “current location” is disabled. What will be displayed in the initial screen, where the list should be? Will it be empty or will it display everything? And let’s say that the user switches to map, what will the map display?

Is it possible to get an approximate location even if current location is off?

I don’t want to require that the user enables current location, but I don’t know what to display if it’s disabled.

Will requiring “Enable Location” negatively affect user perception?

I’m not a mobile phone poweruser, so please bear with me.

Let’s say I’m developing an app whose sole purpose is to display the closest FloridaBestTacos restaurants to my current location of Florida. It will have the usual list (closest first) and a map with the markers.

My question: do users frown upon an app that requires the user to enable “Current Location” to the point that the app cannot be used unless current location is enabled?

I’ve been researching apps and haven’t found a single popular app (with map and markers) that actually requires current location to be enabled.

I’ve also been trying to search for apps that are location-specific (ie. a map that just works in Texas), but haven’t had much luck either.