Store it at .helix/languages.toml
.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
use aws_config::{meta::region::RegionProviderChain, BehaviorVersion, SdkConfig}; | |
use aws_sdk_ec2::Client; | |
const DEFAULT_REGION: &str = "us-east-1"; | |
const INSTANCE_ID_STATUS: &str = "i-0d10de49d69d7ed57"; | |
const INSTANCE_ID_START: &str = "i-06360477f59dd461d"; | |
enum InstanceStatus { | |
IP, | |
Status, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"json": { | |
}, | |
"markdown": { | |
"lineWidth":120, | |
}, | |
"excludes": [ | |
], | |
"plugins": [ | |
"https://plugins.dprint.dev/markdown-0.16.3.wasm" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
description = "virtual environments"; | |
inputs.devshell.url = "github:numtide/devshell"; | |
inputs.flake-utils.url = "github:numtide/flake-utils"; | |
outputs = { self, flake-utils, devshell, nixpkgs }: | |
flake-utils.lib.eachDefaultSystem (system: { | |
devShell = | |
let |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
version: '3.6' | |
services: | |
# Although the author recommends performing a link to reference this container as postgres, | |
# we could simply set the name as postgres. Also, link is a legacy flag. | |
postgres: | |
image: arminc/clair-db | |
clair: | |
image: arminc/clair-local-scan |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
images: | |
simplerisk/simplerisk-minimal: | |
CVE-2019-19814: Debian kernel not solved yet |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
description = "Jupyter playbook example"; | |
inputs = { | |
nixpkgs.url = "github:nixos/nixpkgs/nixpkgs-unstable"; | |
utils.url = "github:numtide/flake-utils"; | |
}; | |
outputs = { self, nixpkgs, utils }: | |
utils.lib.eachDefaultSystem (system: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
description = "Dhall example"; | |
inputs = { | |
nixpkgs.url = "github:nixos/nixpkgs/nixpkgs-unstable"; | |
utils.url = "github:numtide/flake-utils"; | |
}; | |
outputs = { self, nixpkgs, utils }: | |
utils.lib.eachDefaultSystem (system: |
This is a simple flake.nix
for the SMTP key generator.
Steps:
1- Grab the Python script from here. Name it as main.py
.
2- Set the secret key with SECRET_KEY=”insert_secret_key”
.
3- Set the region with REGION=region-code-# (us-east-1, ca-central-1, etc…)
.
3- Run nix run .# -- $SECRET_KEY $REGION
.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- a/protonvpn_nm_lib/core/subprocess_wrapper.py | |
+++ b/protonvpn_nm_lib/core/subprocess_wrapper.py | |
@@ -44,11 +44,9 @@ | |
binary_short_name => full secure path. | |
""" | |
# Look for root-owned directories in the system path in order | |
- for path in os.environ.get('PATH', '').split(os.path.pathsep): | |
+ for path in "@path@".split(os.path.pathsep): | |
if not os.path.isdir(path): | |
continue |
NewerOlder