Skip to content

Instantly share code, notes, and snippets.

View fluxspir's full-sized avatar

Franck Labadille fluxspir

View GitHub Profile
le code barre ce coup ci est :
7898322980192
je récup :
78932298012
xev :
KeyPress event, serial 33, synthetic NO, window 0x1c00001,
root 0xc4, subw 0x0, time 668221216, (92,353), root:(410,500),
@fluxspir
fluxspir / xev
Created February 11, 2016 00:43
le barcode est :
7894650003787
il manque juste le 7 à la fin dans ce que je scanne.
Observe le xev
KeyPress event, serial 33, synthetic NO, window 0x1c00001,
root 0xc4, subw 0x0, time 667769946, (288,400), root:(543,484),
state 0x0, keycode 16 (keysym 0x37, 7), same_screen YES,
2016-02-07T23:04:08+01:00 localhost kernel: usb 2-1.2: USB disconnect, device number 6
2016-02-07T23:20:05+01:00 localhost kernel: usb 2-1.2: new low-speed USB device number 7 using ehci-pci
2016-02-07T23:20:05+01:00 localhost kernel: usb 2-1.2: New USB device found, idVendor=4242, idProduct=9188
2016-02-07T23:20:05+01:00 localhost kernel: usb 2-1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
2016-02-07T23:20:05+01:00 localhost kernel: usb 2-1.2: Product: RF-BCS-2
2016-02-07T23:20:05+01:00 localhost kernel: usb 2-1.2: Manufacturer: USBRF.COM
2016-02-07T23:20:05+01:00 localhost kernel: input: USBRF.COM RF-BCS-2 as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.2/2-1.2:1.0/0003:4242:9188.0007/input/input29
2016-02-07T23:20:05+01:00 localhost kernel: hid-generic 0003:4242:9188.0007: input,hidraw2: USB HID v1.01 Keyboard [USBRF.COM RF-BCS-2] on usb-0000:00:1d.0-1.2/input0
2016-02-11T00:58:46+01:00 localhost mtp-probe: checking bus 2, device 7: "/sys/devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.2"
201
lspci
00:00.0 Host bridge: Intel Corporation 2nd Generation Core Processor Family DRAM Controller (rev 09)
00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09)
00:16.0 Communication controller: Intel Corporation 6 Series/C200 Series Chipset Family MEI Controller #1 (rev 04)
00:19.0 Ethernet controller: Intel Corporation 82579LM Gigabit Network Connection (rev 04)
00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #2 (rev 04)
00:1b.0 Audio device: Intel Corporation 6 Series/C200 Series Chipset Family High Definition Audio Controller (rev 04)
00:1c.0 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 1 (rev b4)
00:1c.3 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 4 (rev b4)
00:1c.4 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 5 (rev b4)
query = self.session.query(Ucits)
for elem in "name", "owner", "resume":
result = query.filter(Ucits.code == datas["code"]).one()
if not getattr(result, elem) == datas[elem]:
if not getattr(result, elem):
old_value = ""
result.elem = datas[elem]
msg = "Updating {} - {} \n from old value {} \n\
with new value {}".format("Ucits",
elem,
for elem in "name", "owner", "resume":
query = self.session.query(Ucits)
query = query.filter(Ucits.code == datas["code"]).one()
pdb.set_trace()
if query.elem == datas[elem]:
print("cool")
else:
print("something to change")
target_path="${path}_yog"
find "$1" -type d | while read path; do
$bin/yog-crawl-directory "$path"
mkdir -p $target_path/$path
mv `find "$1" -name "index.html"` "${target_path}${path}"
mv `find "$1" -name "thumbs"` "${target_path}${path}"
done

Keybase proof

I hereby claim:

  • I am fluxspir on github.
  • I am franck (https://keybase.io/franck) on keybase.
  • I have a public key whose fingerprint is FD17 7256 4BFB 618D AF3E 18D6 37AC FF72 6165 4182

To claim this, I am signing this object: