Given that your key has expired.
$ gpg --list-keys
$ gpg --edit-key KEYID
Use the expire command to set a new expire date:
| #!/bin/bash -e | |
| curl -O https://dl.google.com/chrome/mac/stable/GGRO/googlechrome.dmg | |
| hdiutil attach googlechrome.dmg | |
| SRC=/Volumes/Google\ Chrome/Google\ Chrome.app/Contents/Frameworks/Google\ Chrome\ Framework.framework/Libraries/WidevineCdm | |
| DEST=/Applications/Chromium.app/Contents/Frameworks/Chromium\ Framework.framework/Libraries/ | |
| cp -R "$SRC" "$DEST" | |
| hdiutil detach /Volumes/Google\ Chrome/ |
| // /stacks/cicd-pipelines.ts | |
| // CDK app which creates a stack using a set of service definitions | |
| import 'source-map-support/register'; | |
| import { App } from '@aws-cdk/cdk'; | |
| import { ServiceCicdPipelines } from '../lib/cicd/pipelines'; | |
| import { deploymentTargetAccounts } from './config'; | |
| import services from './services'; | |
| const app = new App({ |
| // (C) 2018 ERAL | |
| // Distributed under the Boost Software License, Version 1.0. | |
| // (See copy at http://www.boost.org/LICENSE_1_0.txt) | |
| using UnityEngine; | |
| #if UNITY_EDITOR | |
| using UnityEditor; | |
| using System.Collections.Generic; | |
| using System.Linq; |
Follow the instructions on Github to Create an Access Token in Github
By default, git credentials are not cached so you need to tell Git if you want to avoid having to provide them each time Github requires you to authenticate. On Mac, Git comes with an “osxkeychain” mode, which caches credentials in the secure keychain that’s attached to your system account.
You can tell Git you want to store credentials in the osxkeychain by running the following:-
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>CGPDeviceCategory</key> | |
| <string>GamePad</string> | |
| <key>CGPDeviceType</key> | |
| <string>PS3</string> | |
| <key>CGPDisplayNameOvr</key> | |
| <string>DualShock3 Analogue Triggers</string> |
| using System; | |
| public abstract class DisposableResult<T> : IDisposable { | |
| public readonly T Value; | |
| protected DisposableResult(T value) { | |
| Value = value; | |
| } | |
Last updated March 13, 2024
This Gist explains how to sign commits using gpg in a step-by-step fashion. Previously, krypt.co was heavily mentioned, but I've only recently learned they were acquired by Akamai and no longer update their previous free products. Those mentions have been removed.
Additionally, 1Password now supports signing Git commits with SSH keys and makes it pretty easy-plus you can easily configure Git Tower to use it for both signing and ssh.
For using a GUI-based GIT tool such as Tower or Github Desktop, follow the steps here for signing your commits with GPG.
| ## Unity ## | |
| *.cs diff=csharp text | |
| *.cginc text | |
| *.shader text | |
| *.mat merge=unityyamlmerge eol=lf | |
| *.anim merge=unityyamlmerge eol=lf | |
| *.unity merge=unityyamlmerge eol=lf | |
| *.prefab merge=unityyamlmerge eol=lf |
| { | |
| "APIGatewayServiceRolePolicy": { | |
| "Arn": "arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy", | |
| "AttachmentCount": 0, | |
| "CreateDate": "2019-10-22T18:22:01+00:00", | |
| "DefaultVersionId": "v6", | |
| "Document": { | |
| "Statement": [ | |
| { |