I hereby claim:
- I am justintarthur on github.
- I am justintarthur (https://keybase.io/justintarthur) on keybase.
- I have a public key whose fingerprint is 9E92 D2B9 2DBF 37AC 60BB 5027 DA45 B72D 195B 2168
To claim this, I am signing this object:
| #!/usr/bin/env sh | |
| set -e | |
| VALHEIM_APP_PATH=${1:-"${HOME}/Library/Application Support/Steam/SteamApps/common/Valheim/valheim.app"} | |
| BEPINEX_FRIENDLY_ENTITLEMENTS='<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "https://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1.0"><dict><key>com.apple.security.cs.allow-jit</key><true/><key>com.apple.security.cs.disable-library-validation</key><true/><key>com.apple.security.device.bluetooth</key><true/><key>com.apple.security.device.usb</key><true/><key>com.apple.security.network.client</key><true/><key>com.apple.security.network.server</key><true/><key>com.apple.security.cs.allow-dyld-environment-variables</key><true/></dict></plist>' | |
| ENTITLEMENTS_PATH='/tmp/revised_valheim_entitlements.plist' | |
| main() { | |
| read -p " | |
| Re-signing and re-entitling Valheim at |
| module &signal:1:0:$full:$large:$default; | |
| extension "amd:gcn"; | |
| extension "IMAGE"; | |
| // Sample Kernel From Michael Körber | |
| prog kernel &__signal_test_kernel( | |
| kernarg_u64 %val, | |
| kernarg_sig64 %handle_in, | |
| kernarg_sig64 %handle_out) |
| #!/bin/bash | |
| source /opt/python/run/venv/bin/activate | |
| source /opt/python/current/env | |
| if [ -f /etc/elasticbeanstalk/set-ulimit.sh ]; then | |
| source /etc/elasticbeanstalk/set-ulimit.sh | |
| fi | |
| exec python "$@" |
| """ | |
| Uses the same ecdsa library and hashing as Electrum <2.5 and approximates how likely a high-s | |
| signature is to be produced. | |
| Needs same dependencies as electrum, so can be run in the same virtualenv as electrum. | |
| """ | |
| import ecdsa | |
| from random import randint | |
| from os import urandom |
I hereby claim:
To claim this, I am signing this object:
| // Assumes an encoded password entry that looks like: | |
| // pbkdf2_sha256$13000$I2fysbVVZ$6WuU/biq8RveLuiTgpLeEJ7hcqoqpkqVlpUIHWUoi9I= | |
| String[] encodedPassword = passedInPassword.split("\\$"); | |
| int encodedIterations = Integer.parseInt(encodedPassword[1]); | |
| byte[] encodedSalt = encodedPassword[2].getBytes(Charset.forName("UTF-8")); | |
| String encodedHash = encodedPassword[3]; | |
| SecretKeyFactory f = null; | |
| try { |
| indices[scope.call(root_node)] ||= 0 | |
| set_left_and_rights.call(root_node) | |
| end | |
| + | |
| + # Set depths based on left/right nesting: | |
| + if column_names.map(&:to_s).include?(depth_column_name.to_s) | |
| + get_depths_sql = "SELECT #{quoted_table_name}.#{primary_key}, COUNT(parent.#{primary_key}) -1 AS #{quoted_depth_column_name} | |
| + FROM #{quoted_table_name}, #{quoted_table_name} AS parent | |
| + WHERE #{quoted_table_name}.#{quoted_left_column_name} BETWEEN parent.#{quoted_left_column_name} AND parent.#{quoted_right_column_name}" | |
| + |
| app.js: | |
| var app = angular.module('app', ['appControllers', 'appServices']); | |
| services.js: | |
| var services = angular.module('appServices', ['djangoRESTResources']); | |
| services.factory('Team', ['djResource', | |
| ... | |
| ]); | |
| // Or if you still need $resource to communicate with a different backend: |
| from django.views.decorators.csrf import csrf_exempt | |
| @csrf_exempt | |
| def reverse_proxy(request): | |
| """ | |
| Reverse proxy for a remote service. | |
| """ | |
| path = request.get_full_path() | |
| #Optionally, rewrite the path to fit whatever service we're proxying to. | |
| class EmberModelSerializer(serializers.ModelSerializer): | |
| """ | |
| A serializer that formats list data in a way that will be readable by Ember.js. | |
| """ | |
| @classmethod | |
| def get_class_ember_name(cls): | |
| type_name = cls.__name__.replace('Serializer','') | |
| return type_name.lower() |