I hereby claim:
- I am johnybradshaw on github.
- I am johnybradshaw (https://keybase.io/johnybradshaw) on keybase.
- I have a public key whose fingerprint is C239 9765 B6A5 A948 1487 6D69 B67F 82C6 6908 8CD8
To claim this, I am signing this object:
| #!/bin/bash | |
| # Script to export Safari's reading list into a text file and email the individual links | |
| # First take all of Safari's Reading List items and place them in a text file. | |
| /usr/bin/plutil -convert xml1 -o - ~/Library/Safari/Bookmarks.plist | grep -E -o '<string>http[s]{0,1}://.*</string>' | grep -v icloud | sed -E 's/<\/{0,1}string>//g' > readinglistlinksfromsafari.txt | |
| # Now loop over each of those URls within that text file and add them to pocket. | |
| while IFS= read -r line | |
| do | |
| /usr/sbin/sendmail -i -f [email protected] [email protected] <<END |
I hereby claim:
To claim this, I am signing this object:
| #This script is designed to delete any shared links you have | |
| #You will need to have the Dropbox SDK installed, you can do that by running | |
| #sudo -H pip install dropbox if on OS X | |
| import dropbox | |
| dbx = dropbox.Dropbox('YOUR AUTHORISATION TOKEN') | |
| dbx.users_get_current_account() | |
| for entry in dbx.sharing_get_shared_links('')._links_value: |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>Label</key> | |
| <string>plantronics</string> | |
| <key>LaunchEvents</key> | |
| <dict> | |
| <key>com.apple.iokit.matching</key> | |
| <dict> |
| #!/bin/bash | |
| /Applications/audiodevice input "Plantronics Savi 7xx" | |
| /Applications/audiodevice output "Plantronics Savi 7xx" |
| #Dropbox Powershell installer | |
| #Version 3.2 | |
| #Download and install the latest version of Dropbox for the purposes of Enterprise deployment | |
| $source = 'C:\source' #Change this to a download directory of your choosing | |
| $arguments = '/s' #Change /s to /NOLAUNCH to prevent client start | |
| #Check to see if the user has the Administrator role on the machine, if not die | |
| If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole(` | |
| [Security.Principal.WindowsBuiltInRole] "Administrator")) |
| provider "skytap" { | |
| username = "${var.skytap_username}" | |
| api_token = "${var.skytap_api_token}" | |
| } | |
| # Create a new environment | |
| resource "skytap_environment" "two_lpar" { | |
| template_id = "1498907" | |
| name = "Two Node LPAR environment" | |
| description = "Two deployed AIX LPARs with an iSCSI network" |
| #!/bin/bash | |
| if [[ $EUID -ne 0 ]]; then | |
| echo "This script must be run as root" | |
| exit 1 | |
| fi | |
| ############################# | |
| # | |
| # OCP4 on Skytap Builder | |
| # | |
| ############################# |
I hereby claim:
To claim this, I am signing this object:
| provider "skytap" { | |
| username = "username" | |
| api_token = "" | |
| } | |
| # Create a new environment | |
| resource "skytap_environment" "two_lpar" { | |
| template_id = "1498907" | |
| name = "Two Node LPAR environment" | |
| description = "Two deployed AIX LPARs with an iSCSI network" |