Find the part that looks like:
]]>
</script>
Add this right above it:
function onOpen() { | |
var ui = SpreadsheetApp.getUi(); | |
ui.createMenu('Fencing Tools') | |
.addItem('Parse Output', 'parseFenceOutput') | |
.addItem('Clear Inputs', 'clearFenceInput') | |
.addToUi(); | |
} | |
function onEdit(e){ | |
var range = e.range; |
#CLASS gmcp kill | |
#CLASS gmcp open | |
#FORMAT IAC %a 255 | |
#FORMAT DONT %a 254 | |
#FORMAT DO %a 253 | |
#FORMAT WONT %a 252 | |
#FORMAT WILL %a 251 | |
#FORMAT SB %a 250 |
Find the part that looks like:
]]>
</script>
Add this right above it:
<?xml version="1.0" encoding="iso-8859-1"?> | |
<!DOCTYPE muclient> | |
<!-- Graphical minimap and location GPS created by Quow--> | |
<muclient> | |
<plugin | |
name="CowBar" | |
author="Quow" | |
id="bfe35205f026786ea1d56e3b" | |
language="Lua" | |
purpose="Minimap, UI & More!" |
var bot = require('./../lib/initialize.js'); | |
bot.initialize({ | |
twitch: { | |
channel: 'llamadownunder', | |
bot: {name: 'LlamaDUBot', password: ''}, | |
subscribers: '' | |
}, | |
currency: { |
/* | |
Platform: Arduino Uno | |
Monitor an infrared breakbeam sensor (digital port 4) for interruptions | |
and increment a LED display with a counter. | |
*/ | |
#include <Wire.h> | |
#include "Adafruit_LEDBackpack.h" | |
#include "Adafruit_GFX.h" |
from sys import argv | |
from base64 import b64encode | |
from datetime import datetime | |
from Crypto.Hash import SHA, HMAC | |
def create_signature(secret_key, string): | |
""" Create the signed message from api_key and string_to_sign """ | |
string_to_sign = string.encode('utf-8') | |
hmac = HMAC.new(secret_key, string_to_sign, SHA) | |
return b64encode(hmac.hexdigest()) |
### Keybase proof | |
I hereby claim: | |
* I am binaryatrocity on github. | |
* I am binaryatrocity (https://keybase.io/binaryatrocity) on keybase. | |
* I have a public key whose fingerprint is 1675 E26E 4EC1 9B3F EDA9 3F1B C6C6 244D EB08 40B3 | |
To claim this, I am signing this object: |
import os | |
os.chdir(os.path.abspath(os.path.split(__file__)[0])) | |
activate_this = os.path.join(os.path.split(__file__)[0], 'venv', 'bin', 'activate_this.py') | |
execfile(activate_this, dict(__file__=activate_this)) |