I hereby claim:
- I am goyalankit on github.
- I am goyalankit (https://keybase.io/goyalankit) on keybase.
- I have a public key ASB35EigYuQtVor3E2Z5EX4pOGO8cg17amOaWGkhKMPf0wo
To claim this, I am signing this object:
FROM python:3.10 | |
RUN pip install flask | |
COPY app.py app.py | |
CMD ["python3", "app.py"] |
import typing | |
from flytekit import task, workflow, get_reference_entity, kwtypes | |
from flytekit.models.core.identifier import ResourceType | |
from typing import Dict# noqa: E402 | |
@task | |
def say_hello() -> str: | |
return "hello world" |
# Copyright 2019, The TensorFlow Federated Authors. | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# | |
# http://www.apache.org/licenses/LICENSE-2.0 | |
# | |
# Unless required by applicable law or agreed to in writing, software | |
# distributed under the License is distributed on an "AS IS" BASIS, |
#!/usr/bin/perl | |
# Copyright Ben Maurer | |
# you can distribute this under the MIT/X11 License | |
my $pid=shift @ARGV; | |
unless ($pid) { | |
print "./smem.pl <pid>\n"; | |
exit 1; | |
} |
{ | |
"ociVersion": "1.0.0", | |
"process": { | |
"terminal": false, | |
"user": { | |
"uid": 0, | |
"gid": 0 | |
}, | |
"args": [ | |
"sh" |
import os | |
import time | |
from functools import wraps | |
def memoize_until_file_modified(filepath): | |
""""Memoize the data until the mtime of the file at filepath changes.""" | |
def memoize_until_file_modified_decorator(func): | |
@wraps(func) | |
def decorated(*args, **kwargs): | |
try: |
I hereby claim:
To claim this, I am signing this object:
# This script goes through all the network devices on the system | |
# and determines if the device in promiscuous mode. | |
# | |
# More information at: http://goyalankit.com/blog/promiscuous-mode-detection | |
# | |
# Usage: python is_promiscuous.py | |
# Author: Ankit Goyal (http://github.com/goyalankit) | |
import os |
1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.