I hereby claim:
- I am kalw on github.
- I am kalw (https://keybase.io/kalw) on keybase.
- I have a public key ASBVJJcQ_Zd6MIAjp6X912_UsKUVNb0ALXGYD7CvorqrDwo
To claim this, I am signing this object:
| # Generates 1 sample of the target word for manual verification. | |
| target_word = 'je suis malade' # Phonetic spellings may produce better samples | |
| tts_models_to_use = ['en_US-libritts_r-medium.pt', 'fr_FR-mls-medium.pt'] # Add more model filenames here if needed | |
| # Dictionary to store specific JSON config URLs for models that don't follow the standard pattern | |
| tts_config_urls = { | |
| 'fr_FR-mls-medium.pt': 'https://raw.githubusercontent.com/rhasspy/piper-sample-generator/refs/heads/master/models/fr_FR-mls-medium.pt.json' | |
| } | |
I hereby claim:
To claim this, I am signing this object:
| #docker run --rm -ti alpine:3.11.6 sh | |
| apk update | |
| apk add -U git-crypt gnupg | |
| export GPG_PRIV=$(cat /cat/to/priv.key) | |
| export GPG_PUB=$(cat /path/to/pub.key) | |
| export GPG_PASSPHRASE="myPassphrase" | |
| export GPG_KEYID=$(echo "${GPG_PUB}" | gpg --with-colons --import-options show-only --import |grep pub |awk -F':' '{print $5}') | |
| export GPG_EMAIL=$(echo "${GPG_PUB}" | gpg --with-colons --import-options show-only --import |grep uid| awk -F:: '{print $5}'| grep -o -e '<.*>' |sed -e 's/[<>]*//g') |
| version: '3.2' | |
| services: | |
| haproxy: | |
| container_name: haproxy | |
| image: haproxy | |
| ports: | |
| - "80:8080" | |
| volumes: | |
| - ./haproxy:/usr/local/etc/haproxy |
| 19,20c19 | |
| < CONFLICTS_INSTALL= zstd | |
| < CONFLICTS= beats | |
| --- | |
| > CONFLICTS= beats6* | |
| 25a25,27 | |
| > CGO_CFLAGS= -I. | |
| > CGO_LDFLAGS= -L. | |
| > |
| <html> | |
| <head> | |
| <script type="text/javascript" src="https://www.gstatic.com/charts/loader.js"></script> | |
| <script type="text/javascript"> | |
| // This is a quick hack to be able to see Gantt-like Timelines of gitlab build pipelines. | |
| // It makes it easier to diagnose the running time of the pipelines and understand resource usage. | |
| // Ideally, gitlab would directly provide such a view in its frontend. | |
| google.charts.load('current', {'packages':['gantt']}); |
| services: | |
| gitlab: | |
| image: gitlab/gitlab-ee:latest | |
| restart: always | |
| ports: | |
| - "24:22" | |
| - "80:80" | |
| - "443:443" | |
| volumes: | |
| - gitlab-data:/var/opt/gitlab |
| # https://meltdownattack.com | |
| - name: Patch Linux systems against Meltdown and Spectre | |
| hosts: "{{ target_hosts | default('all') }}" | |
| become: yes | |
| vars: | |
| reboot_after_update: "{{ reboot_after_update | default('no') }}" | |
| packages: | |
| # https://access.redhat.com/security/vulnerabilities/speculativeexecution | |
| RedHat7: |
| # https://meltdownattack.com | |
| - name: Patch Linux systems against Meltdown and Spectre | |
| hosts: "{{ target_hosts | default('all') }}" | |
| become: yes | |
| vars: | |
| reboot_after_update: "{{ reboot_after_update | default('no') }}" | |
| packages: | |
| # https://access.redhat.com/security/vulnerabilities/speculativeexecution | |
| RedHat7: |
| # https://meltdownattack.com | |
| - name: Check Linux systems against Meltdown and Spectre | |
| hosts: "{{ target_hosts | default('all') }}" | |
| become: yes | |
| vars: | |
| # https://github.com/speed47/spectre-meltdown-checker/archive/4961f8327f1cb391f10659c12255ac2dea0116cc.zip | |
| checker_version: 4961f8327f1cb391f10659c12255ac2dea0116cc | |
| tasks: |