I hereby claim:
- I am johannrichard on github.
- I am johannrichard (https://keybase.io/johannrichard) on keybase.
- I have a public key whose fingerprint is FD56 A316 743F 4B97 C0AA 2DF5 6706 03A7 F614 B32F
To claim this, I am signing this object:
### Keybase proof | |
I hereby claim: | |
* I am johannrichard on github. | |
* I am johannrichard (https://keybase.io/johannrichard) on keybase. | |
* I have a public key whose fingerprint is 9AFC 4017 D3BE 583A 0989 1C08 D05F 7D85 596E F4FB | |
To claim this, I am signing this object: |
#!/bin/sh | |
# Newest Jetty 9 version (See http://download.eclipse.org/jetty/) | |
JETTY_VERSION=9.3.6.v20151106 | |
# We reset everything | |
rm -Rf jetty-distribution-${JETTY_VERSION} jetty | |
# We prepare the dirs | |
mkdir -p jetty/opt jetty/etc/init.d jetty/etc/default jetty/DEBIAN |
[Unit] | |
Description=CEC REST Service | |
# Based on https://github.com/robbiet480/cec-web | |
[Service] | |
# Change port if running together with OpenHAB | |
EnvironmentFile=/etc/default/cec | |
ExecStart=/usr/local/bin/cec-web $CEC_WEB_OPTS | |
Type=simple |
I hereby claim:
To claim this, I am signing this object:
#!/bin/sh | |
# This little script downloads the VirtualHere USB client and sets up a service | |
# on arm-based systems | |
VHUSB_URL="https://virtualhere.com/sites/default/files/usbserver/vhusbdarm" | |
VHUSB_BINARY="/usr/local/bin/vhusbdarm" | |
VHUSB_SERVICE="/etc/systemd/system/vhusb.service" | |
if [[ `uname -m` == *"arm"* ]] | |
then |
#!/bin/sh | |
# Replace this in `/sbin/fixup-mac-address` | |
. /lib/functions.sh | |
. /lib/functions/system.sh | |
. /lib/ramips.sh | |
partname="" | |
offset="" | |
NEW_MAC= | |
YES= |
let country = 'de' // replace with 'at' for shops in Austria | |
let storeId = 251 | |
let param = args.widgetParameter | |
if (param != null && param.length > 0) { | |
storeId = param | |
} | |
const widget = new ListWidget() | |
const storeInfo = await fetchStoreInformation() | |
const storeCapacity = await fetchAmountOfPaper() |
/*** | |
* Worker Function for ASN prefix parsing | |
* Will query the BigIP API for a given ASN and return a plain-text representation of the ASN prefixes | |
* (IP ranges) that can be used in either OPNsense or pfSense URL Tables (Firewall alias). | |
* | |
* See https://docs.opnsense.org/manual/aliases.html (OPNsense) and https://docs.netgate.com/pfsense/en/latest/firewall/aliases.html (pfSense) for details of their use. | |
* | |
* You can deploy this worker for example on the free tier of CloudFlare (Up to 100'000 requests a day) or | |
* any other serverless platform that supports JavaScript | |
* |
Tailscale recently introduced the possibility to manage Tailnet ACLs in Git Repositories. This is my tailscale.yml
which has a notable difference to the one proposed by Tailscale. By putting the ACL test in front of the ACL deployment, it becomes a bit clearer that a failure happened b/c of a failed ACL.
Bonus: by installing act
, one can actually run these tests locally, e.g. before committing / pushing to Github. Works well with a Git pre-commit hook that will fail if the ACL test is unsusscessful. Combined with the 1Password cli
op
command, you can get a nice little ACL workflow.
op run --env-file=".github/act/.env" -- act --secret TS_API_KEY --secret TS_TAILNET
#!/bin/bash | |
################################ | |
# OS X Install ISO Creater # | |
# # | |
# Author: shela # | |
################################ | |
####################################### | |
# Declarations |