pages.*/*: replace {{" "}} with "{{ }}" (#15034)

The latter notation is preferred by the style guide.
This commit is contained in:
Lena
2024-12-05 18:27:27 +01:00
committed by GitHub
parent 1eb5d09fff
commit d74e776a9c
41 changed files with 45 additions and 45 deletions

View File

@@ -30,4 +30,4 @@
- Install certificate files into the specified locations (useful for automatic certificate renewal):
`acme.sh --install-cert -d {{example.com}} --key-file {{/path/to/example.com.key}} --fullchain-file {{/path/to/example.com.cer}} --reloadcmd {{"systemctl force-reload nginx"}}`
`acme.sh --install-cert -d {{example.com}} --key-file {{/path/to/example.com.key}} --fullchain-file {{/path/to/example.com.cer}} --reloadcmd "{{systemctl force-reload nginx}}"`

View File

@@ -21,7 +21,7 @@
- Reset to default text editor:
`gh config set editor {{""}}`
`gh config set editor ""`
- Disable interactive prompts:

View File

@@ -13,7 +13,7 @@
- Specify a copyright holder named Bobby Tables:
`licensor {{MIT}} {{"Bobby Tables"}} > {{LICENSE}}`
`licensor {{MIT}} "{{Bobby Tables}}" > {{LICENSE}}`
- Specify licence exceptions with a WITH expression:

View File

@@ -9,7 +9,7 @@
- Send data through a named pipe and send the command to the background:
`echo {{"Hello World"}} > {{path/to/pipe}} &`
`echo "{{Hello World}}" > {{path/to/pipe}} &`
- Receive data through a named pipe:

View File

@@ -33,4 +33,4 @@
- Run scan based on one or more [t]emplate [c]onditions:
`nuclei -tc {{"contains(tags, 'xss') && contains(tags, 'cve')"}} -u {{https://vulnerable.website}}`
`nuclei -tc "{{contains(tags, 'xss') && contains(tags, 'cve')}}" -u {{https://vulnerable.website}}`

View File

@@ -9,7 +9,7 @@
- Create a completion:
`openai api completions.create --model {{ada}} --prompt {{"Hello world"}}`
`openai api completions.create --model {{ada}} --prompt "{{Hello world}}"`
- Create a chat completion:
@@ -17,4 +17,4 @@
- Generate images via DALL·E API:
`openai api image.create --prompt {{"two dogs playing chess, cartoon"}} --num-images {{1}}`
`openai api image.create --prompt "{{two dogs playing chess, cartoon}}" --num-images {{1}}`

View File

@@ -17,7 +17,7 @@
- Assign multiple values to multiple variables:
`read {{_ variable1 _ variable2}} <<< {{"The surname is Bond"}}`
`read {{_ variable1 _ variable2}} <<< "{{The surname is Bond}}"`
- Do not let backslash (\\) act as an escape character:

View File

@@ -29,4 +29,4 @@
- Display text with formatting tags, custom alignment, and line width:
`rich --print {{"Hello [green on black]Stylized[/green on black] [bold]World[/bold]"}} --{{left|center|right}} --width {{10}}`
`rich --print "{{Hello [green on black]Stylized[/green on black] [bold]World[/bold]}}" --{{left|center|right}} --width {{10}}`

View File

@@ -17,7 +17,7 @@
- Test with multiple ranges:
`semver {{1.2.3}} --range {{">=1.0"}} {{"<2.0"}}`
`semver {{1.2.3}} --range "{{>=1.0}}" "{{<2.0}}"`
- Test multiple version strings and return only the ones that match:

View File

@@ -33,4 +33,4 @@
- Generate output with a SARIF template:
`trivy image --format {{template}} --template {{"@sarif.tpl"}} -o {{path/to/report.sarif}} {{image:tag}}`
`trivy image --format {{template}} --template "{{@sarif.tpl}}" -o {{path/to/report.sarif}} {{image:tag}}`

View File

@@ -21,4 +21,4 @@
- Create a virtual machine and kickstart an automated deployment based on Fedora 35 using only remote resources (no ISO required):
`virt-install --name {{vm_name}} --memory {{2048}} --disk path={{path/to/image.qcow2}},size={{20}} --location={{https://download.fedoraproject.org/pub/fedora/linux/releases/35/Everything/x86_64/os/}} --extra-args={{"inst.ks=https://path/to/valid/kickstart.org"}}`
`virt-install --name {{vm_name}} --memory {{2048}} --disk path={{path/to/image.qcow2}},size={{20}} --location={{https://download.fedoraproject.org/pub/fedora/linux/releases/35/Everything/x86_64/os/}} --extra-args="{{inst.ks=https://path/to/valid/kickstart.org}}"`

View File

@@ -17,7 +17,7 @@
- Use a custom [H]eader to fuzz subdomains while [h]iding specific response [c]odes and word counts. Increase the [t]hreads to 100 and include the target ip/domain:
`wfuzz -w {{path/to/file}} -H {{"Host: FUZZ.example.com"}} --hc {{301}} --hw {{222}} -t {{100}} {{example.com}}`
`wfuzz -w {{path/to/file}} -H "{{Host: FUZZ.example.com}}" --hc {{301}} --hw {{222}} -t {{100}} {{example.com}}`
- Brute force Basic Authentication using a list of usernames and passwords from files for each FUZ[z] keyword, [h]iding response [c]odes of unsuccessful attempts:
@@ -25,7 +25,7 @@
- Provide wordlist directly from the command-line and use POST request for fuzzing:
`wfuzz -z list,{{word1-word2-...}} {{https://api.example.com}} -d {{"id=FUZZ&showwallet=true"}}`
`wfuzz -z list,{{word1-word2-...}} {{https://api.example.com}} -d "{{id=FUZZ&showwallet=true}}"`
- Provide wordlists from a file applying base64 and md5 encoding on them (`wfuzz -e encoders` lists all available encoders):

View File

@@ -29,4 +29,4 @@
- Configure KRunner to open with the Meta (Command/Windows) global hotkey:
`kwriteconfig5 --file {{~/.config/kwinrc}} --group {{ModifierOnlyShortcuts}} --key {{Meta}} {{"org.kde.kglobalaccel,/component/krunner_desktop,org.kde.kglobalaccel.Component,invokeShortcut,_launch"}}`
`kwriteconfig5 --file {{~/.config/kwinrc}} --group {{ModifierOnlyShortcuts}} --key {{Meta}} "{{org.kde.kglobalaccel,/component/krunner_desktop,org.kde.kglobalaccel.Component,invokeShortcut,_launch}}"`

View File

@@ -13,4 +13,4 @@
- Set the wallpaper to a static [c]olor:
`swaybg --color {{"#rrggbb"}}`
`swaybg --color "{{#rrggbb}}"`

View File

@@ -10,7 +10,7 @@
- Render markdown to console from string:
`{{"# Markdown content"}} | Show-Markdown`
`"{{# Markdown content}}" | Show-Markdown`
- Open Markdown file in a browser: