Moved to https://virtualize.link/secure/
badges: | |
- entity: person.alex | |
style: | |
ha-state-label-badge: | |
$: | |
ha-label-badge: | |
$: | | |
.label-badge .label span{ | |
color: #000 !important; | |
} |
This code is usable only if you are on Home Assistant 0.114 or older
For Home Assistant 0.115 and newer please go to: https://github.com/AdamNaj/ZWaveGraphHA
#!/bin/bash | |
# Does the equivalent of sysprep for linux boxes to prepare them for cloning. | |
# Based on https://lonesysadmin.net/2013/03/26/preparing-linux-template-vms/ | |
# For issues or updated versions of this script, browse to the following URL: | |
# https://gist.github.com/AfroThundr3007730/ff5229c5b1f9a018091b14ceac95aa55 | |
# SPDX-License-Identifier: GPL-3.0-or-later | |
AUTHOR='AfroThundr' | |
BASENAME="${0##*/}" | |
MODIFIED='20240409' |
#Backup previous list | |
rm -f BLACKLIST_OLD.txt | |
mv BLACKLIST.txt BLACKLIST_OLD.txt | |
touch BLACKLIST.txt | |
#Download the file from PGL.YOYO | |
curl -O http://pgl.yoyo.org/as/iplist.php | |
#Download the file from emerging threats | |
curl -O http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt | |
#Download the first file from SpamHaus | |
curl -O http://www.spamhaus.org/drop/drop.txt |
#!powershell | |
# | |
# | |
# Author: Ian Cornett | |
# Version: 0.1 | |
# Version History: | |
# | |
# Purpose: Queue TFS Build from Ansible and return workable JSON dictionary for polling | |
# | |
# |
You won't get a fully-functional installation! At the time of writing, it turned out gem
is kind of broken on Ruby 2.3.0. Ruby gem installation fails with an error like kernel_require.rb:54:in
require': cannot load such file -- win32/resolv`.
{ | |
"Condition statement": { | |
"prefix": "cond", | |
"body": [ | |
"$1 { $0; break }" | |
], | |
"description": "Switch condition statement" | |
}, | |
"Condition single quoted string statement": { | |
"prefix": "condsqstr", |
convert -density 256x256 -background transparent favicon.svg -define icon:auto-resize -colors 256 favicon.ico |
There is a long standing issue in Ruby where the net/http library by default does not check the validity of an SSL certificate during a TLS handshake. Rather than deal with the underlying problem (a missing certificate authority, a self-signed certificate, etc.) one tends to see bad hacks everywhere. This can lead to problems down the road.
From what I can see the OpenSSL library that Rails Installer delivers has no certificate authorities defined. So, let's go fetch some from the curl website. And since this is for ruby, why don't we download and install the file with a ruby script?