- Just use qcow2 images and create an Oracle Custom Image.
- Images: https://gitlab.archlinux.org/archlinux/arch-boxes/-/packages
- Example: Arch-Linux-x86_64-cloudimg-20221015.94571.qcow2
Refs:
Refs:
From 30cf11cb52c49d17abb7b7d22379ff9c383daaa7 Mon Sep 17 00:00:00 2001 | |
From: Kyle Manna <[email protected]> | |
Date: Thu, 1 Sep 2022 09:46:52 -0500 | |
Subject: [PATCH] pkgrel: v0.4.1-3 add python-numpy + OpenGL dependencies | |
--- | |
.SRCINFO | 5 ++++- | |
PKGBUILD | 4 ++-- | |
2 files changed, 6 insertions(+), 3 deletions(-) | |
mode change 100755 => 100644 PKGBUILD |
#!/bin/bash | |
pacman -Qi | awk '/^Name/{name=$3} /^Required By/{req=$4} /^Installed Size/{print $4$5, name, req}' | grep None | sort -h |
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the
From 94f64148ce295a4ba7b96e539f8f82798697fa71 Mon Sep 17 00:00:00 2001 | |
From: Kyle Manna <[email protected]> | |
Date: Fri, 12 Nov 2021 20:03:13 -0600 | |
Subject: [PATCH] release: python-logfury: v1.0.1 | |
* Follow upstream. | |
* Use new git repo, old URL redirects. | |
* Use PyPI so pkg metadata is included. | |
* Update license file. | |
* Add test checks. |
#!/bin/bash | |
#set -ex | |
base=/sys/class/drm/card0/device/hwmon/hwmon? | |
cd $base | |
get_hwmon() { | |
for i in fan1_input pwm1; do | |
echo hwmon: $i: $(cat $i) | |
done | |
for i in temp?_input ; do |
#!/usr/bin/env python3 | |
"""Script to convert Bitcoin Armory transaction history to a format that Cointracking.info CSV""" | |
import argparse | |
import collections | |
import csv | |
import datetime | |
import json | |
import os |
$ curl -sSL https://testnet-api.helium.wtf/v1/validators/ | jq -S '[ .data[] | select(.status.listen_addrs) | select(.status.listen_addrs[] | contains("158.69.118.209")) ]' | tee validators-with-158.69.118.209-listener.json
$ curl -sSL https://testnet-api.helium.wtf/v1/validators/ | jq -S '[ .data[] | select(.status.listen_addrs) | select(.status.listen_addrs | length > 1) ]' | tee validators-with-length-greater-then-1.json
$ jq <validators-with-length-greater-then-1.json '. | length' ✘ 127
35
import socket | |
UDP_IP = '::' | |
UDP_PORT = 5005 | |
sock = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM) | |
sock.bind((UDP_IP, UDP_PORT)) | |
connection_oriented = True |