pacman -S curl docker ebtables ethtool wget unzip
Also cfssl is needed but available on AUR, using pacaur
pacaur -S cfssl
| # each mapRoles entry maps an IAM role to a username and set of groups | |
| # Each username and group can optionally contain template parameters: | |
| # 1) "{{AccountID}}" is the 12 digit AWS ID. | |
| # 2) "{{SessionName}}" is the role session name, with `@` characters | |
| # transliterated to `-` characters. | |
| # 3) "{{SessionNameRaw}}" is the role session name, without character | |
| # transliteration (available in version >= 0.5). | |
| mapRoles: | |
| # statically map arn:aws:iam::000000000000:role/KubernetesAdmin to cluster admin | |
| - roleARN: arn:aws:iam::000000000000:role/KubernetesAdmin | 
| apiVersion: v1 | |
| kind: Secret | |
| metadata: | |
| name: plex-claim-token | |
| namespace: media | |
| type: Opaque | |
| data: | |
| token: ${API_TOKEN_OPAQUE} | |
| --- | |
| apiVersion: v1 | 
| from SimpleCV import Camera | |
| class AsciiBoi: | |
| def __init__(self): | |
| pass | |
| def preProcess(self, img): | |
| edge_img = img.edges(30, 60) | 
wp --allow-root db query "select post_content from wp_posts where post_content like '%<img src%';" --skip-column-names --silent | grep -oP "<img\s+.*?src=['\"](.*?)['\"].*?>" | grep -oP "https?://[^\"]*" | sort | uniqparse_url(), create a PHP function* to find unique hosts and add first occurence of each to an array of links.| #!/bin/bash | |
| # You can call this script like this: | |
| # $./volume.sh up | |
| # $./volume.sh down | |
| # $./volume.sh mute | |
| function get_volume { | |
| amixer get Master | grep '%' | head -n 1 | cut -d '[' -f 2 | cut -d '%' -f 1 | |
| } | 
| #!/usr/bin/env bash | |
| #################################################################################### | |
| # Slack Bash console script for sending messages. | |
| #################################################################################### | |
| # Installation | |
| # $ curl -s https://gist.github.com/andkirby/67a774513215d7ba06384186dd441d9e/raw --output /usr/bin/slack | |
| # $ chmod +x /usr/bin/slack | |
| #################################################################################### | |
| # USAGE | |
| # Send message to slack channel/user | 
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| ''' | |
| Follow these steps to configure the webhook in Slack: | |
| 1. Navigate to https://<your-team-domain>.slack.com/services/new | |
| 2. Search for and select "Incoming WebHooks". |