Skip to content

Instantly share code, notes, and snippets.

View taveek's full-sized avatar
☁️

Tavee Khunbida taveek

☁️
View GitHub Profile
@taveek
taveek / README.md
Created April 23, 2026 07:16 — forked from ppries/README.md
Autonomous multi-agent workflow for OpenCode — plan, review, implement, PR from a Linear issue

Autonomous Multi-Agent Workflow for OpenCode

A fire-and-forget workflow that takes a Linear issue ID and autonomously plans, tests, implements, and opens a draft PR — with TDD baked in. You walk away; it notifies you when done.

Built for OpenCode using custom agents and slash commands.

Important: The /workflow command must run with agent: build (OpenCode's default agent with full tool access). The orchestrator needs unrestricted access to do git operations, dispatch subagents, and create PRs. If you're in a restricted mode, switch to build first.

Why this exists:

  • Fire and forget. Kick off a task and walk away. You get notified when it's done or needs attention.
@taveek
taveek / query_activedirectory.py
Created June 8, 2022 09:27 — forked from DiegoQueiroz/query_activedirectory.py
Python-LDAP Query Active Directory Example (with paged results to prevent ldap.SIZELIMIT_EXCEEDED exception)
# -*- coding: utf-8 -*-
# requires python-ldap (usually pip install python-ldap)
# But this package requires OpenLDAP libraries, so it is a pain to install it on Windows.
# So, if you're on Windows, I recomment to use pre-compiled binaries with this command (virtualenv supported):
# pip install https://download.lfd.uci.edu/pythonlibs/h2ufg7oq/python_ldap-3.1.0-cp37-cp37m-win_amd64.whl
import ldap
from ldap.controls import SimplePagedResultsControl
@taveek
taveek / rancher-keycloak-idp-configuration.md
Created May 13, 2022 02:31 — forked from PhilipSchmid/rancher-keycloak-idp-configuration.md
Rancher v2.X KeyCloak Authentication Backend Configuration

Rancher v2.X KeyCloak Authentication Backend Configuration

Ranchers official documentation about how to configure the Rancher <> KeyCloak setup is fine but definitely not sufficient to successfully configure it (https://rancher.com/docs/rancher/v2.x/en/admin-settings/authentication/keycloak/). That's the reason why here every single required step is documented down here.

KeyCloak Configuration

I simply use the default master realm for the Rancher client. Nevertheless, it would sometimes absolutely make sense to use a custom KeyCloak realm.

  1. Login as admin on https://keycloak.example.com/. Important: It's crucial that in KeyCloak the same username exists as you use as admin user on Rancher. Since I just use the admin account in this guide, this prerequisite is already achieved.
  2. Create a new client under https://keycloak.example.com/auth/admin/master/console/#/realms/master/clients
    • Client ID: https://rancher.example.com/v1-saml/keycloak/saml/metadata
@taveek
taveek / tmux_cheatsheet.markdown
Created September 9, 2021 12:26 — forked from henrik/tmux_cheatsheet.markdown
tmux cheatsheet

tmux cheatsheet

As configured in my dotfiles.

start new:

tmux

start new with session name: