I hereby claim:
- I am altryne on github.
- I am altryne (https://keybase.io/altryne) on keybase.
- I have a public key ASC2hquNqomr9eq9cZbZ4d4Ioy7FdEPwOMYDw5E8vwaujgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
This guide is a fork from this gist.
Since Mavericks stopped using the deprecated ipfw (as of Mountain Lion), we'll be using pf to allow port forwarding.
Create an anchor file under /etc/pf.anchors/com.vagrant with your redirection rule like:
important note the trailing whitespace is nessesary
#A script to post back to Slack via the webhooks API
##why this exists?
Slack's own hubot adapter needs the hubot installation to be accessible via web. This can be problematic in some cases, as a security risk.
This hack let's you run your Hubot behind a firewall, and connect to Slack via the IRC gateway.
To respond, Hubot uses the incoming webhooks end-point of Slack.
EDIT : This script now lives as a repository here : https://github.com/Fundbox/freshbooks_demo_data
| javascript:(function(){$('.session').not('.break').each(function(ev){h=$(this).find('.speaker-photo%20a').attr('href');(h)%3Fh=h.substring(19):%22%22;s=$(this).find('.summary').text();s=s.replace(%22Topic%22,%22%22);tmp=$('%3Ca%20href=%22http://twitter.com/intent/tweet%3Ftext=Listening to%20%40'+%20h%20+'%20speaking%20at%20%2523fowa%20about%20'%20+%20s%20+'%26via=fowa,%40altryne%22%20target=%22_blank%22%20%3E%3Cimg%20src=%22//j.mp/R0Dnbf%22%3ETweet%20this%20talk!%3C/a%3E');$(this).find('.topic').before(tmp);})})(); |