This comes in handy often. I want to do something based on a Python file. Maybe I want to pull all the docstrings out and make a markdown file. Maybe I want generate a script that calls all the functions in a python file. Whatever it is, the abstract syntax tree can help. Here is an example for the first use case: I pull out all the docstrings. We used this to create the documentation for hackathon at Clear Technologies a few years ago.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" encoding="utf-8" ?> | |
<nlog xmlns="http://www.nlog-project.org/schemas/NLog.xsd" | |
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | |
xsi:schemaLocation="http://www.nlog-project.org/schemas/NLog.xsd NLog.xsd" | |
autoReload="true" | |
throwExceptions="false" | |
internalLogLevel="Off" internalLogFile="c:\temp\nlog-internal.log" > | |
<!-- optional, add some variabeles |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import hashlib as hasher | |
class Block: | |
def __init__(self, index, timestamp, data, previous_hash): | |
self.index = index | |
self.timestamp = timestamp | |
self.data = data | |
self.previous_hash = previous_hash | |
self.hash = self.hash_block() | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# sets up a PC for full stack boot camp at SMU | |
# assumes you have chocolatey installed | |
# https://chocolatey.org/ | |
# at this point it doesn't install EVERYTHING, just the basics. no databases yet. | |
ssh-keygen -N <change-to-actual-password-before-running> -f C:\Users\<insert user name here>\.ssh\id_rsa | |
wsl --install -d Ubuntu-20.04 | |
choco install -Force -y visualstudio2019buildtools | |
choco install -Force -y brave | |
choco install -Force -y git | |
choco install -Force -y vscode |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"$schema": "https://raw.githubusercontent.com/JanDeDobbeleer/oh-my-posh/main/themes/schema.json", | |
"final_space": true, | |
"blocks": [ | |
{ | |
"type": "prompt", | |
"alignment": "left", | |
"segments": [ | |
{ | |
"type": "shell", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
echo Whosa are yousa? | |
read yousaIs | |
echo Nicen to meets you $yousaIs. Messa thinkin weesa bein friends! |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
This script is designed to automate the set up of developer machines at Clear Technologies for work on Visual Storage Intelligence. | |
It should be run on a Windows 10 computer. I usually run a de-bloat script first, then I run this one. | |
Basically it install chocolatey then uses it to install everything we need to do our work. | |
It's mostly an unattended install but if you want to repos towards the bottom to be checked out you should copy the generated key | |
to beanstalk while the script is paused. | |
#> | |
Set-ExecutionPolicy Bypass -Scope Process -Force; | |
[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; | |
Invoke-Expression((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1')) |
NOTE: There is now an official way to do this in WSL 2, use it if possible - see MS post here
This guide will enable systemd
to run as normal under WSL 2. This will enable services like microk8s
, docker
and many more to just work
during a WSL session. Note: this was tested on Windows 10 Build 2004, running Ubuntu 20.04 LTS in WSL 2.
-
To enable
systemd
under WSL we require a tool calledsystemd-genie
-
Copy the contents of
install-sg.sh
to a new file/tmp/install-sg.sh
:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl --location --request POST 'https://vsi5.visualstorageintelligence.com/api/export/v1/enterprise_summary' \ | |
--header 'Content-Type: application/json' \ | |
--data-raw '{ | |
"export_format": "json", | |
"request_date": "10-31-2022", | |
"request_user": "your email here", | |
"request_password": "your password here" | |
}' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import http.client | |
import json | |
conn = http.client.HTTPSConnection("vsi5.visualstorageintelligence.com") | |
payload = json.dumps({ | |
"export_format": "json", | |
"request_date": "10-31-2022", | |
"request_user": "your email here", | |
"request_password": "your password here" | |
}) |
OlderNewer