I hereby claim:
- I am johnybradshaw on github.
- I am johnybradshaw (https://keybase.io/johnybradshaw) on keybase.
- I have a public key whose fingerprint is C239 9765 B6A5 A948 1487 6D69 B67F 82C6 6908 8CD8
To claim this, I am signing this object:
#!/bin/bash | |
# Script to export Safari's reading list into a text file and email the individual links | |
# First take all of Safari's Reading List items and place them in a text file. | |
/usr/bin/plutil -convert xml1 -o - ~/Library/Safari/Bookmarks.plist | grep -E -o '<string>http[s]{0,1}://.*</string>' | grep -v icloud | sed -E 's/<\/{0,1}string>//g' > readinglistlinksfromsafari.txt | |
# Now loop over each of those URls within that text file and add them to pocket. | |
while IFS= read -r line | |
do | |
/usr/sbin/sendmail -i -f myaddress@link.com add@getpocket.com <<END |
I hereby claim:
To claim this, I am signing this object:
#This script is designed to delete any shared links you have | |
#You will need to have the Dropbox SDK installed, you can do that by running | |
#sudo -H pip install dropbox if on OS X | |
import dropbox | |
dbx = dropbox.Dropbox('YOUR AUTHORISATION TOKEN') | |
dbx.users_get_current_account() | |
for entry in dbx.sharing_get_shared_links('')._links_value: |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>plantronics</string> | |
<key>LaunchEvents</key> | |
<dict> | |
<key>com.apple.iokit.matching</key> | |
<dict> |
#!/bin/bash | |
/Applications/audiodevice input "Plantronics Savi 7xx" | |
/Applications/audiodevice output "Plantronics Savi 7xx" |
#Dropbox Powershell installer | |
#Version 3.2 | |
#Download and install the latest version of Dropbox for the purposes of Enterprise deployment | |
$source = 'C:\source' #Change this to a download directory of your choosing | |
$arguments = '/s' #Change /s to /NOLAUNCH to prevent client start | |
#Check to see if the user has the Administrator role on the machine, if not die | |
If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole(` | |
[Security.Principal.WindowsBuiltInRole] "Administrator")) |
provider "skytap" { | |
username = "${var.skytap_username}" | |
api_token = "${var.skytap_api_token}" | |
} | |
# Create a new environment | |
resource "skytap_environment" "two_lpar" { | |
template_id = "1498907" | |
name = "Two Node LPAR environment" | |
description = "Two deployed AIX LPARs with an iSCSI network" |
#!/bin/bash | |
if [[ $EUID -ne 0 ]]; then | |
echo "This script must be run as root" | |
exit 1 | |
fi | |
############################# | |
# | |
# OCP4 on Skytap Builder | |
# | |
############################# |
I hereby claim:
To claim this, I am signing this object:
provider "skytap" { | |
username = "username" | |
api_token = "" | |
} | |
# Create a new environment | |
resource "skytap_environment" "two_lpar" { | |
template_id = "1498907" | |
name = "Two Node LPAR environment" | |
description = "Two deployed AIX LPARs with an iSCSI network" |