I hereby claim:
- I am andaag on github.
- I am andaag (https://keybase.io/andaag) on keybase.
- I have a public key ASALdtE-JmrCtsCl1_jP0z7ypNZrvzasaKIAqRNuG0gPZgo
To claim this, I am signing this object:
# systemctl list-unit-files | grep -i zfs | |
zfs-import-cache.service enabled enabled | |
zfs-import-scan.service disabled disabled | |
zfs-import.service masked enabled | |
zfs-load-module.service enabled enabled | |
zfs-mount.service enabled enabled | |
zfs-share.service enabled enabled | |
zfs-volume-wait.service enabled enabled | |
zfs-zed.service enabled enabled | |
zfs-import.target enabled enabled |
#cat /usr/share/ubiquity/zsys-setup | |
#!/bin/sh | |
# | |
# This script creates ZFS pools and dataset compatible with zsys | |
# | |
# Layout: |
I hereby claim:
To claim this, I am signing this object:
package com.schibsted.mp.ads.sales | |
import com.amazonaws.services.dynamodbv2.AmazonDynamoDB | |
import com.amazonaws.services.dynamodbv2.local.embedded.DynamoDBEmbedded | |
import org.jetbrains.spek.api.dsl.Spec | |
import org.jetbrains.spek.api.lifecycle.CachingMode | |
import org.jetbrains.spek.api.lifecycle.LifecycleAware | |
import java.io.File | |
import java.nio.file.Files | |
import java.nio.file.Paths |
#!/usr/bin/python3 | |
import json | |
import urllib | |
import urllib.request | |
import gzip | |
import os | |
### Need to setup some env's first | |
EUREKA_SOURCE = os.environ["EUREKA_SOURCE"] |
package no.finn.android.contentprovider; | |
import android.content.ContentResolver; | |
import android.database.ContentObserver; | |
import android.database.Cursor; | |
import android.net.Uri; | |
import android.os.Handler; | |
import android.os.Looper; | |
import android.support.annotation.NonNull; | |
import android.support.annotation.Nullable; |
public class RxActivityDelegate { | |
private static final String KEY_OBJECT = "rxActivityController.object"; | |
private static final String KEY_OBJECTTYPE = "rxActivityController.object.type"; | |
private static final String KEY_REQUESTCODE = "rxActivityController.requestCode"; | |
public static void setResponse(Activity activity, int requestCode, RxResponseHandler rxResponseHandler) { | |
Intent intent = activity.getIntent(); | |
intent.putExtra(KEY_OBJECT, JsonUtils.toBytes(rxResponseHandler)); | |
intent.putExtra(KEY_OBJECTTYPE, rxResponseHandler.getClass().getName()); |
package no.finn.android.ui.objectpage; | |
import java.lang.reflect.InvocationTargetException; | |
import java.lang.reflect.Method; | |
import android.content.Context; | |
import android.content.Intent; | |
import android.support.v7.internal.widget.ActivityChooserModel; | |
import android.widget.ShareActionProvider; |
public class GenericTypeConverter implements TypeConverter<GenericTypeConverter.GenericType> { | |
@Override | |
public GenericType parse(JsonParser jsonParser) throws IOException { | |
String field = null; | |
String value = null; | |
String fieldType = null; | |
String data = null; | |
#!/bin/bash | |
DEVICES=$(adb devices | egrep -v 'List of devices' | cut -f 1 | xargs echo) | |
IFS=' ' | |
echo "Installing emulator hacks" | |
for DEVICE in $DEVICES; do | |
adb -s $DEVICE uninstall no.finn.android.ci &>/dev/null | |
adb -s $DEVICE install -r "src/main/resources/android_emulator_hacks.apk" || exit 1 | |
adb -s $DEVICE shell pm grant no.finn.android_emulator_hacks android.permission.SET_ANIMATION_SCALE | |
adb -s $DEVICE shell am start -n no.finn.android_emulator_hacks/no.finn.android_emulator_hacks.HackActivity |