opencode auth login
# Select "Kimi For Coding"
# Enter your API key (sk-kimi-...)| const os = require("os"); | |
| const path = require("path"); | |
| const fs = require("fs/promises"); | |
| const OAUTH_FILE = path.join(os.homedir(), ".gemini", "oauth_creds.json"); | |
| // Type enum equivalent in JavaScript | |
| const Type = { | |
| TYPE_UNSPECIFIED: "TYPE_UNSPECIFIED", | |
| STRING: "STRING", |
Karabiner and KMonad are great open source software. Don't forget to support the authors and contributors.
If you want to try home row mods on OSX, don't use Karabiner but KMonad.
KMonad is harder at the beginning but then it is easier than Karabiner.
Creating layers in KMonad is trivial and without drawbacks, while it is impossible in Karabiner without drawbacks.
You need to compile a PR of the project. Install https://github.com/pqrs-org/Karabiner-DriverKit-VirtualHIDDevice/releases/download/v2.1.0/Karabiner-DriverKit-VirtualHIDDevice-2.1.0.pkg
| export class BTreeNode { | |
| constructor(isLeaf) { | |
| /** | |
| * @type {number[]} list of values in the node | |
| */ | |
| this.values = []; | |
| /** | |
| * @type {boolean} is a leaf | |
| */ | |
| this.leaf = isLeaf; |
| import { ApolloServer, gql } from 'apollo-server-micro'; | |
| const typeDefs = gql` | |
| type Query { | |
| sayHello: String | |
| } | |
| `; | |
| const resolvers = { | |
| Query: { |
| directive @hasRole ( | |
| OR: [ConstraintInput!] | |
| NOT: [ConstraintInput!] | |
| AND: [ConstraintInput!] | |
| has_some: [UserRole!] | |
| has_every: [UserRole!] | |
| ) on OBJECT | FIELD_DEFINITION | |
| input ConstraintInput { | |
| OR: [ConstraintInput!] |
Note: This is the guide for v 2.x.
For the v3, please follow this url: https://blog.csdn.net/sam_shan/article/details/80585240 Thanks @liy-cn for contributing.
For the v6, please follow the comment below: https://gist.github.com/trandaison/40b1d83618ae8e3d2da59df8c395093a?permalink_comment_id=5079514#gistcomment-5079514
Download: StarUML.io
wget -c http://cdn.sencha.com/ext/gpl/ext-6.2.0-gpl.zip
wget -c http://cdn.sencha.com/cmd/6.2.1/no-jre/SenchaCmd-6.2.1-linux-amd64.sh.zip
This guide shows how to set up a bidirectional client/server authentication for plain TLS sockets.
Newer versions of openssl are stricter about certificate purposes. Use extensions accordingly.
Generate a Certificate Authority: