I hereby claim:
- I am alainodea on github.
- I am alainodea (https://keybase.io/alainodea) on keybase.
- I have a public key ASCi9K4NyAy0TWik3h0UX8e3lDtFB_VH68t6IkswitByDgo
To claim this, I am signing this object:
| ;; put this in ~/.emacs.d/init.el after Emacs Prelude | |
| (autoload 'ghc-init "ghc" nil t) | |
| (add-hook 'haskell-mode-hook (lambda () (ghc-init))) | |
| (add-hook 'haskell-mode-hook `turn-on-haskell-decl-scan-mode) | |
| (add-hook 'haskell-mode-hook `turn-on-haskell-doc) | |
| (add-hook 'haskell-mode-hook `turn-on-haskell-simple-indent) | |
| (custom-set-variables | |
| '(haskell-tags-on-save t) |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <wchar.h> | |
| #include <sys/types.h> | |
| #include <ifaddrs.h> | |
| #include <netdb.h> | |
| #ifdef __linux__ |
| /* | |
| * Test getifaddrs behavior. | |
| */ | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <ifaddrs.h> | |
| #include <stdio.h> | |
| #include <net/if.h> | |
| #include <unistd.h> |
| { | |
| "Version": "2012-10-17", | |
| "Statement": [ | |
| { | |
| "Effect": "Allow", | |
| "Action": [ | |
| "autoscaling:*Tags*", | |
| "codedeploy:*Tags*", | |
| "datapipeline:*Tags*", | |
| "ec2:*Tags*", |
| /* DO NOT EDIT: This file is automatically generated by Cabal */ | |
| /* package rts-1.0 */ | |
| #define VERSION_rts "1.0" | |
| #define MIN_VERSION_rts(major1,major2,minor) (\ | |
| (major1) < 1 || \ | |
| (major1) == 1 && (major2) < 0 || \ | |
| (major1) == 1 && (major2) == 0 && (minor) <= 0) | |
| /* package ghc-prim-0.4.0.0 */ |
| /* DO NOT EDIT: This file is automatically generated by Cabal */ | |
| /* package rts-1.0 */ | |
| #define VERSION_rts "1.0" | |
| #define MIN_VERSION_rts(major1,major2,minor) (\ | |
| (major1) < 1 || \ | |
| (major1) == 1 && (major2) < 0 || \ | |
| (major1) == 1 && (major2) == 0 && (minor) <= 0) | |
| /* package ghc-prim-0.4.0.0 */ |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env stack | |
| -- stack --install-ghc --resolver lts-5.13 runghc --package aeson | |
| {-# LANGUAGE OverloadedStrings #-} | |
| import Data.Aeson | |
| import Data.Aeson.Types | |
| import qualified Data.Text as T | |
| main :: IO () |
| > let refToSalesforceLink inst x = concat [inst, take 5 $ drop 16 x, "0000", take 6 $ drop 21 x] | |
| > refToSalesforceLink "https://na123.salesforce.com/" "ref:_00A10cAbC._100A013ABCD:ref" | |
| "https://na123.salesforce.com/100A0000013ABCD" | |
| > |
| #!/bin/bash | |
| fileOption="$1" | |
| metadataFile="${fileOption:=FederationMetadata.xml}" | |
| idpIssuerId=$(xpath "${metadataFile}" "/*[local-name()='EntityDescriptor']/@entityID" 2>/dev/null) | |
| idpSsoUrl=$(xpath "${metadataFile}" "/*[local-name()='EntityDescriptor']/*[local-name()='IDPSSODescriptor']/*[local-name()='SingleSignOnService' and @Binding='urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST']/@Location" 2>/dev/null) | |
| xpath "${metadataFile}" "/*[local-name()='EntityDescriptor']/*[local-name()='IDPSSODescriptor']/*[local-name()='KeyDescriptor' and @use='signing']/*[local-name()='KeyInfo']/*[local-name()='X509Data']/*[local-name()='X509Certificate']/text()" | base64 --decode > idpSigCert.der 2> /dev/null | |
| cat <<EOF | |
| SAML Protocol Configuration | |
| idpIssuerId=${idpIssuerId} | |
| idpSsoUrl=${idpSsoUrl} |