I hereby claim:
- I am shogan on github.
- I am shongololo (https://keybase.io/shongololo) on keybase.
- I have a public key ASC__OwOlbi7tNQGZyWVkXDzfeQlJgMjKxLwYydvVwz7jAo
To claim this, I am signing this object:
private void OnLaserHitTriggered(RaycastHit2D hitInfo) | |
{ | |
if (hitInfo.collider.gameObject == gameObject) | |
{ | |
if (bloodParticleSystem != null) | |
{ | |
bloodParticleSystem.Play(); | |
HealthPoints --; | |
} | |
} |
# Unity generated and a few customs # | |
# ================================= # | |
Temp/* | |
Library/* | |
Build/* | |
Obj/* | |
WebBuild/* | |
WindowsBuild/* | |
# ===================================== # |
# Get list of all untagged images with no repository set | |
docker images --format "{{.ID}}--{{.Repository}}--{{.Tag}}" | Where { $_ -match "<none>--<none>" } | % { $_.Split("--")[0] } | |
# Remove all untagged / no repository docker images | |
docker images --format "{{.ID}}--{{.Repository}}--{{.Tag}}" | Where { $_ -match "<none>--<none>" } | % { $_.Split("--")[0] } | % { docker rmi $_ } | |
# Remove all stopped containers | |
docker ps -a -q | % { docker rm $_ } |
# Search command history for specific terms | |
Get-Content (Get-PSReadlineOption).HistorySavePath | Where { $_ -match "SEARCH TERM HERE" } | |
# Using aws-vault with Terraform (to generate secure temporary session credentials in AWS for Terraform to use) can be tricky if you use a persistent session with aws-vault. | |
# These are the basic terraform workflow commands that work with aws-vault. | |
# The trick to using aws-vault and avoid session credential issues is to simply instruct aws-vault to not use a session with the --no-session flag. | |
# List / change TF workspace | |
aws-vault exec your_profile_name --no-session -- terraform workspace list | |
aws-vault exec your_profile_name --no-session -- terraform workspace select workspacenamehere | |
# Plan a change | |
aws-vault exec your_profile_name --no-session -- terraform plan -out="yourplan.tfplan" |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "Stmt1432372934255", | |
"Action": [ | |
"dynamodb:DeleteItem", | |
"dynamodb:GetItem", | |
"dynamodb:PutItem", | |
"dynamodb:Scan", |
I hereby claim:
To claim this, I am signing this object:
apiVersion: v1 | |
kind: Namespace | |
metadata: | |
labels: | |
app: metallb | |
name: metallb-system | |
--- | |
apiVersion: policy/v1beta1 | |
kind: PodSecurityPolicy | |
metadata: |
sudo tee /etc/apt/sources.list.d/kubernetes.list &>/dev/null <<EOF | |
deb http://apt.kubernetes.io/ kubernetes-xenial main | |
EOF | |
curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | sudo apt-key add - | |
sudo apt-get update | |
# Pin / install specific versions of the following components | |
sudo apt-get install -qy kubelet=1.16.2-00 kubectl=1.16.2-00 kubeadm=1.16.2-00 kubernetes-cni=0.7.5-00 |
#!/bin/bash | |
function allOSRealPath() { | |
if isOSWindows | |
then | |
path="" | |
case $1 in | |
.* ) path="$PWD/${1#./}" ;; | |
/* ) path="$1" ;; | |
* ) path="/$1" ;; |