How to use:
./wordle.sh
Or try the unlimit mode:
#!/usr/bin/env bash | |
set -Eeuo pipefail | |
trap cleanup SIGINT SIGTERM ERR EXIT | |
script_dir=$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd -P) | |
usage() { | |
cat <<EOF | |
Usage: $(basename "${BASH_SOURCE[0]}") [-h] [-v] [-f] -p param_value arg1 [arg2...] |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: cleaner | |
--- | |
kind: Role | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: cleaner |
#!/bin/bash | |
# Link/copy this file to your bin folder so you can run this easily | |
# | |
# ln -s $PWD/status.sh ~/.local/bin/status | |
pyfiles=$(git status -s | grep -vE '^ ?[DR] ' | awk {'print $2'} | grep '.py') | |
if [[ $pyfiles ]] | |
then |
daemon off; | |
worker_processes 1; | |
error_log logs/error.log; | |
events { | |
worker_connections 1024; | |
} | |
http { | |
include mime.types; |
(cors) { | |
@cors_preflight{args.0} method OPTIONS | |
@cors{args.0} header Origin {args.0} | |
handle @cors_preflight{args.0} { | |
header { | |
Access-Control-Allow-Origin "{args.0}" | |
Access-Control-Allow-Methods "GET, POST, PUT, PATCH, DELETE, OPTIONS" | |
Access-Control-Allow-Headers * | |
Access-Control-Max-Age "3600" |
/** | |
* @param {number} latitude in degrees | |
* @param {number} longitude in degrees | |
* @param {number} mapWidth in pixels | |
* @param {number} mapHeight in pixels | |
*/ | |
function latLonToOffsets(latitude, longitude, mapWidth, mapHeight) { | |
const FE = 180; // false easting | |
const radius = mapWidth / (2 * Math.PI); |
SUBSYSTEM!="sound", GOTO="pulseaudio_end" | |
ACTION!="change", GOTO="pulseaudio_end" | |
KERNEL!="card*", GOTO="pulseaudio_end" | |
SUBSYSTEMS=="pci", ATTRS{vendor}=="0x106b", ATTRS{device}=="0x1803", ENV{PULSE_PROFILE_SET}="apple-t2.conf" | |
LABEL="pulseaudio_end" |
There are at least two valid, signed TLS certificates that are bundled with publicly available Netgear device firmware.
These certificates are trusted by browsers on all platforms, but will surely be added to revocation lists shortly.
The firmware images that contained these certificates along with their private keys were publicly available for download through Netgear's support website, without authentication; thus anyone in the world could have retrieved these keys.
from django.contrib.postgres.fields import JSONField | |
from graphene.types.generic import GenericScalar | |
from graphene.utils.str_converters import to_camel_case, to_snake_case | |
from graphene_django.converter import convert_django_field | |
def patch_graphene_django_JSONField_converter(auto_camel_case=True): | |
""" | |
Ask `graphene_django` to convert `JSONField` to `GenericScalar` (JSON as is) instead of default `JSONString` |