I hereby claim:
- I am kriansa on github.
- I am kriansa (https://keybase.io/kriansa) on keybase.
- I have a public key whose fingerprint is BC27 7BE0 9E8A 6F10 59C3 911B 3E78 8475 6312 F945
To claim this, I am signing this object:
#!/bin/sh | |
# ========================================================= # | |
# MyEzBkp | |
# Easy and simple backup of your entire MySQL Server. | |
# | |
# Ver: 1.0 | |
# By: Kriansa | |
# | |
# This script requires root privileges to run! | |
# Tested only in RHEL based distros (Fedora & CentOS) |
/** | |
* Replaces any ${variables} in the template string by the data object | |
*/ | |
var parseTemplate = function(template, data) { | |
return template.replace(/\$\{([\w\d]+)\}/g, function(token, variable){ | |
return data[variable]; | |
}); | |
} |
/** | |
* Returns the string with accented and non-standard Latin-based characters converted into ASCII approximate equivalents. | |
* | |
* @returns {String} | |
*/ | |
String.prototype.normalize = function() { | |
var NormalizeSource = { | |
'A': /[AⒶAÀÁÂẦẤẪẨÃĀĂẰẮẴẲȦǠÄǞẢÅǺǍȀȂẠẬẶḀĄȺⱯ]/g, | |
'B': /[BⒷBḂḄḆɃƂƁ]/g, | |
'C': /[CⒸCĆĈĊČÇḈƇȻꜾ]/g, |
class CitiesController < ApplicationController | |
def all_by_state_id | |
uf = params[:id] | |
cities = City.joins(:state).where('states.id' => uf).select('cities.id, cities.name') | |
render :json => { data: { cities: cities } } | |
end | |
end |
# Open stdout and stderr streams and start external executable with timeout. | |
# The timeout is given in seconds. | |
# | |
# Block form: | |
# | |
# exec_with_timeout(timeout, [env,] cmd... [, opts]) {|stdout, stderr| | |
# stdout.read | |
# ... | |
# } | |
# |
--- a/ext/openssl/ossl_ssl.c | |
+++ b/ext/openssl/ossl_ssl.c | |
@@ -107,6 +107,18 @@ | |
OSSL_SSL_METHOD_ENTRY(TLSv1), | |
OSSL_SSL_METHOD_ENTRY(TLSv1_server), | |
OSSL_SSL_METHOD_ENTRY(TLSv1_client), | |
+#if defined(HAVE_TLSV1_2_METHOD) && defined(HAVE_TLSV1_2_SERVER_METHOD) && \ | |
+ defined(HAVE_TLSV1_2_CLIENT_METHOD) | |
+ OSSL_SSL_METHOD_ENTRY(TLSv1_2), | |
+ OSSL_SSL_METHOD_ENTRY(TLSv1_2_server), |
I hereby claim:
To claim this, I am signing this object:
# Append this content to the file /usr/share/X11/xkb/rules/evdev | |
# | |
# Custom options patch by Kriansa | |
! option = symbols | |
custom:multimedia_fn_keys = +media(multimedia_fn_keys) | |
custom:scroll_lock_key_usable = +media(scroll_lock_key_usable) |
#!/usr/bin/env bash | |
help() { | |
echo "Makes hardlinks out of a list of duplicates files generated by rdfind." | |
echo | |
echo "usage: $0 <duplicates_file>" | |
} | |
main() { | |
local duplicates_file=$1 |
#!/usr/bin/env bash | |
# | |
# Automatically updates the IP addresses for the ingress rules for SSH access on Vultr | |
# | |
# Requires: jq, curl, dig | |
main() { | |
export VULTR_API_KEY="YOUR-VULTR-API-KEY" | |
# Get existing rules at the Vultr firewall |