Value | Color |
---|---|
\e[0;30m | Black |
\e[0;31m | Red |
\e[0;32m | Green |
\e[0;33m | Yellow |
\e[0;34m | Blue |
\e[0;35m | Purple |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
VOICE="Vicki" | |
BALANCE="100" | |
function voice_prompt () { | |
echo " SPEAKING: $1" | |
say -v "$VOICE" "$1" | |
} | |
function get_user_keypress () { | |
KEY="" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# current Git branch | |
branch=$(git symbolic-ref HEAD | sed -e 's,.*/\(.*\),\1,') | |
# v1.0.0, v1.5.2, etc. | |
versionLabel=v$1 | |
# establish branch and tag name variables | |
devBranch=develop |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ "name": "white", | |
"iscc-nbs": 263, | |
"hex": "#F2F3F4" }, | |
{ "name": "black", | |
"iscc-nbs": 267, | |
"hex": "#222222" }, | |
{ "name": "yellow", | |
"iscc-nbs": 82, | |
"hex": "#F3C300" }, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/***** "Remote" server first *****/ | |
-- Note: Unless the object you are trying to gain access to is in the same DATABASE, it's a remote datebase. Even if it's | |
-- on the same node! | |
-- 1. create the role and assign it a password. Note: CREATE USER is an alias for CREATE ROLE. Either one is fine | |
CREATE ROLE new_user WITH PASSWORD 'somepassword'; | |
-- 2. Grant the required permissions. This grants select, insert, update, and delete on all tables in the public schema. | |
-- I also gave execute to all functions in the public schema as well. | |
GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA public TO new_user; | |
GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA public TO new_user; |