Skip to content

Instantly share code, notes, and snippets.

View mrash's full-sized avatar

Michael Rash mrash

View GitHub Profile
@mrash
mrash / ap_issue.html
Last active May 25, 2024 19:35
ApexCharts toggle issue in 3.49.0
<!DOCTYPE html>
<html>
<head>
<meta charset=utf-8 />
<title>Testing area chart series toggling</title>
</head>
<link href="../../apexcharts/samples/assets/styles.css" rel="stylesheet" />
<body>
@mrash
mrash / gist:0f12560983a8c2888c5f
Created June 19, 2015 00:17
Transparent gpg encryption / decryption with vim (.vimrc hack) - provides a simple command-line alternative to password managers like LastPass
" Transparent editing of gpg encrypted files.
" By Wouter Hanegraaff <wouter@blub.net>
augroup encrypted
au!
" First make sure nothing is written to ~/.viminfo while editing
" an encrypted file.
autocmd BufReadPre,FileReadPre *.gpg set viminfo=
" We don't want a swap file, as it writes unencrypted data to disk
autocmd BufReadPre,FileReadPre *.gpg set noswapfile
" Switch to binary mode to read the encrypted file
### Keybase proof
I hereby claim:
* I am mrash on github.
* I am mrash (https://keybase.io/mrash) on keybase.
* I have a public key whose fingerprint is 53EA 13EA 472E 3771 894F AC69 95D8 5D6B A742 839F
To claim this, I am signing this object:
@mrash
mrash / gist:8383288c66f973a2bbb2
Created August 7, 2014 03:49
OpenSSL: Generate lcov code coverage report
#!/bin/sh
#
# Basic script to compile OpenSSL with code coverage support via gcc
# gcov and build HTML reports with lcov.
#
LCOV_DIR=lcov-results
LCOV_FILE=coverage.info
LCOV_FILTERED=coverage_final.info
PREFIX=~/install/openssl
@mrash
mrash / gist:4e26359c399a98d8542a
Created August 7, 2014 03:46
Generate lcov code coverage report for OpenSSH
#!/bin/sh
LCOV_DIR=lcov-results
LCOV_FILE=coverage.info
LCOV_FILTERED=coverage_final.info
PREFIX=~/install/openssh ### tmp path
mkdir $LCOV_DIR
make clean
@mrash
mrash / mac_timemachine.sh
Last active March 31, 2021 18:17
Emulate encrypted Time Machine backups from a Mac to a Linux system with rsync 'snapshotting' + encfs.
#!/bin/sh -x
#
# Goal: Emulate encrypted Time Machine backups from a Mac to a Linux system
# with rsync 'snapshotting' + encfs. This provides an additional backup
# to a Linux based filesystem like ext4 just in case of HFS+ issues as
# described here: http://blog.barthe.ph/2014/06/10/hfs-plus-bit-rot/
# This is not expected to solve all potential bitrot scenarios - rather
# to provide some redundancy and make detection easier (with additional
# scripting effort).
#