Skip to content

Instantly share code, notes, and snippets.

View theseal's full-sized avatar
🦭
🫶

Johan Wassberg theseal

🦭
🫶
View GitHub Profile
@theseal
theseal / weechat-light-terminal.conf
Created August 31, 2020 17:56 — forked from TauPan/weechat-light-terminal.conf
All my colour settings for a light (not white) terminal in weechat. I simply filtered my fset buffer with "color"
# Comma separated list of channels
/set colorize_nicks.look.blacklist_channels ""
# Comma separated list of nicks
/set colorize_nicks.look.blacklist_nicks "so,root"
# Whether to colorize input
/set colorize_nicks.look.colorize_input off
# If off, then use lazy matching instead
@theseal
theseal / SL-API-to-RSS
Created February 22, 2018 22:05
SL-API-to-RSS
#!/usr/bin/env python3
from flask import Flask
from flask import request
from feedgen.feed import FeedGenerator
import json
import requests
import re
app = Flask(__name__)
### Keybase proof
I hereby claim:
* I am theseal on github.
* I am theseal (https://keybase.io/theseal) on keybase.
* I have a public key whose fingerprint is 32A8 0D7E 787E 13A1 E103 0FD2 FBE3 FF1B 9F54 2247
To claim this, I am signing this object:
@theseal
theseal / vhost.conf
Created July 23, 2015 13:04
Apache HTTP -> HTTPS
<VirtualHost *:80>
RewriteEngine On
RewriteCond %{HTTPS} off
RewriteRule .* https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]
</VirtualHost>
@theseal
theseal / nginx.conf
Created March 15, 2014 17:59
nginx configuration
# Enforce SSL!
server {
listen 80;
listen [::]:80 ipv6only=on;
return 301 https://$host$request_uri;
}
# Score (100) 95 90 90 on ssllabs.com/ssltest
add_header Strict-Transport-Security "max-age=31536000;includeSubdomains";
ssl_dhparam /etc/ssl/certs/dhparam.pem;
@theseal
theseal / gist:9505968
Created March 12, 2014 12:29
heimdal formula
require 'formula'
class Heimdal < Formula
homepage 'http://www.h5l.org'
url 'http://h5l.org/dist/src/heimdal-1.5.2.tar.gz'
sha1 'dd0920a181d18236432e4b3e5eab6e468cda4b89'
depends_on :x11 => :recommended
def patches
@theseal
theseal / gist:8107178
Created December 24, 2013 00:49
Nginx configuration
add_header Strict-Transport-Security "max-age=31536000;includeSubdomains";
ssl_dhparam /etc/ssl/certs/dhparam.pem;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_session_cache builtin:1000 shared:SSL:10m;
ssl_session_timeout 5m;
ssl_ciphers 'ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4';