This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/zsh | |
## postinstall | |
pathToScript=$0 | |
pathToPackage=$1 | |
targetLocation=$2 | |
targetVolume=$3 | |
# Optionally replace the value of this variable with the name of your organization. | |
organizationIdentifier=com.arekdreyer |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Anton's config for Starship | |
# Don't print a new line at the start of the prompt | |
add_newline = false | |
# Order of modules on prompt | |
format = """\ | |
[](fg:#9A348E)\ | |
$kubernetes\ | |
$username\ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Example Program for MightyOhm Geiger Counter FeatherWing + OLED Upgrade | |
// This example is specifically for use with Adafruit Feather HUZZAH (ESP8266) | |
// It will also work with other Feather boards with modifications | |
// | |
// By: Dan Watson | |
// syncchannel.blogspot.com | |
// 1/31/2016 | |
// This program makes use of the EspSoftSerial library to receive data from the Geiger counter. | |
// EspSoftwareSerial: https://github.com/scottwday/EspSoftSerial |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am antonwinter on github. | |
* I am antonwinter (https://keybase.io/antonwinter) on keybase. | |
* I have a public key whose fingerprint is EBEC 73B6 32E5 A92F AFBE AB78 91B7 FBA3 CE9A 0380 | |
To claim this, I am signing this object: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
def archive_to_bytes(archive): | |
def to_seconds(s): | |
SECONDS_IN_A = { | |
's': 1, | |
'm': 1 * 60, | |
'h': 1 * 60 * 60, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Find the IAM username belonging to the TARGET_ACCESS_KEY | |
# Useful for finding IAM user corresponding to a compromised AWS credential | |
# Usage: | |
# find_iam_user AWS_ACCESS_KEY_ID | |
# Requirements: | |
# | |
# Environmental variables: | |
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY | |
# or |