A tool to extract and query Claude Code session information for easy restoration with claude -r.
# List all sessions
python3 ~/.claude/extract-sessions.py| #!/usr/bin/env bash | |
| set -euo pipefail | |
| REPORT_FOLDER=/tmp/mdadm-report | |
| REPORT_FILE=/tmp/mdadm-report.txt | |
| MD_ARRAY=$(cat /proc/mdstat | grep -o 'md[0-9]\+') | |
| ARRAY_DEVICES=$(lsblk --json | jq --arg md_array "$MD_ARRAY" -r '.blockdevices[] | select(.children[0].name == $md_array) | .name') | |
| rm -rf $REPORT_FOLDER $REPORT_FILE |
| [tool.poetry] | |
| name = "temp" | |
| version = "0.1.0" | |
| description = "" | |
| authors = ["me"] | |
| readme = "README.md" | |
| [tool.poetry.dependencies] | |
| python = "^3.10" |
| from flask import Flask | |
| from uuid import uuid4 | |
| app = Flask(__name__) | |
| app.config["SECRET_KEY"] = str(uuid4()) | |
| IDP_CONFIG = { | |
| "well_known_url": "Identity Provider wellknown url: https://{TENANT}.auth0.com/.well-known/openid-configuration", |