I hereby claim:
- I am shogan on github.
- I am shongololo (https://keybase.io/shongololo) on keybase.
- I have a public key ASC__OwOlbi7tNQGZyWVkXDzfeQlJgMjKxLwYydvVwz7jAo
To claim this, I am signing this object:
public delegate void LaserHitTriggerHandler(RaycastHit2D hitInfo); | |
/// <summary> | |
/// Event that fires whenever the laser collides with an object (requires ignoreCollisions to be false). Subscribe to this event to be notified when the laser is hitting an object. The RaycastHit2D info will be sent through the event. | |
/// </summary> | |
public event LaserHitTriggerHandler OnLaserHitTriggered; | |
/// <summary> | |
/// Fires the OnLaserHitTriggered event every triggerInterval seconds. | |
/// </summary> |
private void OnLaserHitTriggered(RaycastHit2D hitInfo) | |
{ | |
if (hitInfo.collider.gameObject == gameObject) | |
{ | |
if (bloodParticleSystem != null) | |
{ | |
bloodParticleSystem.Play(); | |
HealthPoints --; | |
} | |
} |
# Unity generated and a few customs # | |
# ================================= # | |
Temp/* | |
Library/* | |
Build/* | |
Obj/* | |
WebBuild/* | |
WindowsBuild/* | |
# ===================================== # |
using UnityEngine; | |
using System.Collections; | |
using PixelSpriteGenerator; | |
public class RandomShrub : MonoBehaviour { | |
private PsgMask mask; | |
private PsgSprite sprite; | |
private SpriteRenderer sr; |
# Get list of all untagged images with no repository set | |
docker images --format "{{.ID}}--{{.Repository}}--{{.Tag}}" | Where { $_ -match "<none>--<none>" } | % { $_.Split("--")[0] } | |
# Remove all untagged / no repository docker images | |
docker images --format "{{.ID}}--{{.Repository}}--{{.Tag}}" | Where { $_ -match "<none>--<none>" } | % { $_.Split("--")[0] } | % { docker rmi $_ } | |
# Remove all stopped containers | |
docker ps -a -q | % { docker rm $_ } |
# Search command history for specific terms | |
Get-Content (Get-PSReadlineOption).HistorySavePath | Where { $_ -match "SEARCH TERM HERE" } | |
# Using aws-vault with Terraform (to generate secure temporary session credentials in AWS for Terraform to use) can be tricky if you use a persistent session with aws-vault. | |
# These are the basic terraform workflow commands that work with aws-vault. | |
# The trick to using aws-vault and avoid session credential issues is to simply instruct aws-vault to not use a session with the --no-session flag. | |
# List / change TF workspace | |
aws-vault exec your_profile_name --no-session -- terraform workspace list | |
aws-vault exec your_profile_name --no-session -- terraform workspace select workspacenamehere | |
# Plan a change | |
aws-vault exec your_profile_name --no-session -- terraform plan -out="yourplan.tfplan" |
I hereby claim:
To claim this, I am signing this object:
sudo tee /etc/dnsmasq.conf &>/dev/null <<EOF | |
# Our DHCP service will be providing addresses over our eth0 adapter | |
interface=eth0 | |
# We will listen on the static IP address we declared earlier | |
listen-address=10.0.0.1 | |
# Pre-allocate a bunch of IPs on the 10.0.0.0/8 network for the Raspberry Pi nodes | |
# DHCP will allocate these for 12 hour leases, but will always assign the same IPs to the same Raspberry Pi | |
# devices, as you'll populate the MAC addresses below with those of your actual Pi ethernet interfaces |