- Removing evicted pods
kubectl delete pod --field-selector=status.phase=Failed --all-namespaces| #!/bin/sh | |
| # ============================================================================= | |
| # e1000e Data Collector - MINIMAL BusyBox Version (Enhanced v2) | |
| # Purpose: Collect data in initramfs environment with minimal dependencies | |
| # ============================================================================= | |
| # | |
| # DEPENDENCIES (ALL standard BusyBox applets): | |
| # sh, cat, echo, test, mkdir, cp, ls, readlink, cut, tr, basename | |
| # find, sort, grep, head, tail, date, sync, dd, od | |
| # |
| # remove old/broken sections if they exist | |
| uci -q delete firewall.lan_only_ips | |
| uci -q delete firewall.allow_lan_only_to_lan | |
| uci -q delete firewall.block_lan_only_to_wan | |
| # create ipset (fw4 still accepts config ipset, but it MUST have match fields) | |
| uci set firewall.lan_only_ips='ipset' | |
| uci set firewall.lan_only_ips.name='lan_only_ips' | |
| uci set firewall.lan_only_ips.family='ipv4' | |
| uci add_list firewall.lan_only_ips.match='src_net' |
| #!/bin/bash | |
| # | |
| # Mush mosh and SSM sessions together. | |
| # | |
| # Run mosh-server on an EC2 instance as part of an AWS Session Manager SSH | |
| # session, and feed the output into mosh-client locally. This is helpful | |
| # if you have an EC2 instance which: | |
| # | |
| # * Is publicly addressable | |
| # * Has a predictable Name tag but a shifting IP |
git clone https://github.com/spaceship-prompt/spaceship-prompt.git "$ZSH_CUSTOM/themes/spaceship-prompt" --depth=1
ln -s "$ZSH_CUSTOM/themes/spaceship-prompt/spaceship.zsh-theme" "$ZSH_CUSTOM/themes/spaceship.zsh-theme"
sed -i 's/^ZSH_THEME=".*"/ZSH_THEME="spaceship"/' ~/.zshrc| { | |
| "createdBy": "Redirector v3.5.3", | |
| "createdAt": "2023-12-11T08:55:48.601Z", | |
| "redirects": [ | |
| { | |
| "description": "Youtube", | |
| "exampleUrl": "https://www.youtube.com/watch?v=iv8Ci8omkks", | |
| "exampleResult": "https://invidious.g3rhard.cc/watch?v=iv8Ci8omkks", | |
| "error": null, | |
| "includePattern": "www.youtube.com/(watch.*)", |
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the
| #!/usr/bin/env bash | |
| set -Eeuo pipefail | |
| trap cleanup SIGINT SIGTERM ERR EXIT | |
| script_dir=$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd -P) | |
| usage() { | |
| cat <<EOF | |
| Usage: $(basename "${BASH_SOURCE[0]}") [-h] [-v] [-f] -p param_value arg1 [arg2...] |
| #!/usr/bin/perl -w | |
| # | |
| # Script to convert ClearCase historical information to Subversion. | |
| # | |
| # See pod documentation on the bottom of the script for details. | |
| # | |
| # Version 1.0.2 | |
| # | |
| # Revision history | |
| #================================================== |
| #!/bin/bash | |
| # https://github.com/ansible/ansible/issues/12686#issuecomment-268535162 | |
| cmd='' | |
| for i in "$@"; do | |
| i="${i//\\/\\\\}" | |
| cmd="$cmd \"${i//\"/\\\"}\"" | |
| done | |
| sudo su - root << END |