このスクリプトは、プロジェクトのバージョンを更新します。これはgitタグを参照し、指定されたバージョンに更新するか、現在のタグに基づいてインクリメントします。 'v'で始まるセマンティックバージョニングをサポートしています。 -vが指定された場合、タグをローカルで作成し、リモートにプッシュします。-rが指定された場合、タグがローカルまたはリモートに既に存在する場合は削除して再作成します。 -vが指定されておらず、-i(patch/minor/major)が指定された場合、最新のタグに基づいて自動インクリメントされたタグを作成し、リモートにプッシュします。 -vも-iも指定されておらず、-rのみが指定された場合、最新のタグを現在のコミットで再作成します。 スクリプトは、実際にタグ付けを行わずに新しいバージョンを表示するドライラン(-d)を実行できます。さらに、-nオプションを使用すると、タグが作成されてもリモートにプッシュされるのを防ぎます。
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| shopt -s extglob | |
| # generated from util-linux source: libmount/src/utils.c | |
| declare -A pseudofs_types=([anon_inodefs]=1 | |
| [autofs]=1 | |
| [bdev]=1 | |
| [bpf]=1 | |
| [binfmt_misc]=1 |
something like this will add a great regularly updated malware file for it to use. More security and privacy to you! Specifically, this uses https://github.com/StevenBlack/hosts Choose one of the Raw Hosts file from there to use.
To setup DNSMasq, follow the below ...
wget -O- https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts | awk '$1 == "0.0.0.0" { print "address=/"$2"/0.0.0.0/"}' > /etc/dnsmasq.d/malware.conf`
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| var parser = document.createElement('a'); | |
| parser.href = "http://example.com:3000/pathname/?search=test#hash"; | |
| parser.protocol; // => "http:" | |
| parser.hostname; // => "example.com" | |
| parser.port; // => "3000" | |
| parser.pathname; // => "/pathname/" | |
| parser.search; // => "?search=test" | |
| parser.hash; // => "#hash" | |
| parser.host; // => "example.com:3000" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| errno_headers="/usr/include/asm-generic/errno-base.h /usr/include/asm-generic/errno.h" | |
| print_usage () { | |
| echo "Usage: ${0##*/} ERRNO" | |
| } | |
| case $1 in |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| /** | |
| * @author : Dennis T Kaplan | |
| * | |
| * @version : 1.0 | |
| * Date : June 17, 2007 | |
| * Function : reverse strstr() | |
| * Purpose : Returns part of haystack string from start to the first occurrence of needle | |
| * $haystack = 'this/that/whatever'; | |
| * $result = rstrstr($haystack, '/') |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # | |
| # A simple command to untar any tarball. | |
| # | |
| # For times when you don't care whether it was compressed | |
| # with bzip2 or gzip, you just want to untar it already! | |
| # | |
| # Usage: untar [-v|--verbose] file | |
| # |