Ref: https://gist.github.com/rnwolf/e09ae9ad6d3ac759767d129d52cab1f1
Key Binding | Description |
---|---|
SPC | < space > |
RET | < return > |
C | < ctrl > |
M | < alt >, M stands for Meta |
name: Elixir CI | |
on: push | |
jobs: | |
build: | |
runs-on: ubuntu-latest | |
container: |
import os | |
from datetime import datetime, timedelta | |
from typing import Any, Dict, Generator, List, Union | |
import requests | |
# Optional - to connect using OAuth credentials | |
from oauthlib.oauth1 import SIGNATURE_RSA | |
class JiraClient: | |
def __init__( |
Ref: https://gist.github.com/rnwolf/e09ae9ad6d3ac759767d129d52cab1f1
Key Binding | Description |
---|---|
SPC | < space > |
RET | < return > |
C | < ctrl > |
M | < alt >, M stands for Meta |
NOTE: Specific examples given for options, flags, commands variations, etc., are not comprehensive.
Vim has 2 main "modes", that chance the behavior of all your keys. The default mode of Vim is Normal Mode and is mostly used for moving the cursor and navigating the current file.
Some important (or longer) commands begin with ":" and you will see the text you enter next at the bottom left of the screen.
:q[uit]
- quit (the current window of) Vim. ("Window" here is internal to Vim, not if you have multiple OS-level windows of Vim open at once.)
:q!
- force quit (if the current buffer has been changed since the last save)
:e[dit] {filename}
- read file {filename} into a new buffer.
I attempted to get MaherAzzouzi to report their apparent information | |
disclosure vulnerability to Amanda upstream via an issue in their | |
CVE-2022-37703 repository. They apparently seemed to think that MITRE | |
automatically reports issues to upstreams, which is not the | |
case. Eventually, they deleted the issue after threatening to | |
irresponsibly disclose two local privilege escalations in Amanda, all | |
without any apparent attempt to notify upstream. As far as I can tell, | |
that hasn't happened yet. | |
I've asked Github to make the content of the issue public for |
I attempted to get MaherAzzouzi to report their apparent information | |
disclosure vulnerability to Amanda upstream via an issue in their | |
CVE-2022-37703 repository. They apparently seemed to think that MITRE | |
automatically reports issues to upstreams, which is not the | |
case. Eventually, they deleted the issue after threatening to | |
irresponsibly disclose two local privilege escalations in Amanda, all | |
without any apparent attempt to notify upstream. As far as I can tell, | |
that hasn't happened yet. | |
I've asked Github to make the content of the issue public for |
import os | |
from datetime import datetime, timedelta | |
from typing import Any, Dict, Generator, List, Union | |
import requests | |
# Optional - to connect using OAuth credentials | |
from oauthlib.oauth1 import SIGNATURE_RSA | |
class JiraClient: | |
def __init__( |
from datetime import datetime, timedelta | |
import functools | |
def timed_cache(**timedelta_kwargs): | |
def _wrapper(f): | |
update_delta = timedelta(**timedelta_kwargs) | |
next_update = datetime.utcnow() + update_delta | |
# Apply @lru_cache to f with no cache size limit |
Ref: https://gist.github.com/rnwolf/e09ae9ad6d3ac759767d129d52cab1f1
Key Binding | Description |
---|---|
SPC | < space > |
RET | < return > |
C | < ctrl > |
M | < alt >, M stands for Meta |
I was investigating the use of Hardware Security Modules (HSMs) to better secure some stuff at work. Our choice was a Nitrokey HSM 2 for its convenient price, features and open approach, including hardware. Unfortunately Nitrokeys's documentation is sparse at best and there is not much available documentation online to guide new users to get HSMs to work with GnuPG (GPG): it's even the opposite with some forum posts indicating that the Nitrokey HSM 2 is not compatible with GPG.
From what seems to be the current state of things, GPG works out of the box with OpenPGP cards (which are