This gist is inspired by the video https://youtube.com/shorts/GysTi7uNTTI?si=Tb5WucfNBb5QoLAa
The goal of the video and this script, it's to emulate an framework similar to Flask or CDK
- Virtual Python environment (recommended)
This gist is inspired by the video https://youtube.com/shorts/GysTi7uNTTI?si=Tb5WucfNBb5QoLAa
The goal of the video and this script, it's to emulate an framework similar to Flask or CDK
""" | |
A script to parse cncf.io api events into ICS format | |
Developer: [email protected] | |
license: MIT | |
""" | |
import requests | |
from icalendar import Calendar, Event | |
from datetime import datetime |
cluster/gce/gci/append_or_replace_prefixed_line_test.go: cmd := exec.Command("bash", "-c", args) | |
cluster/gce/gci/configure_helper_test.go: cmd := exec.Command("bash", "-c", args) | |
cmd/importverifier/importverifier.go: cmd := "go" | |
cmd/kubeadm/app/cmd/completion_test.go: cmd := newCmdCompletion(&out, "") | |
cmd/kubeadm/app/preflight/checks.go: _, err := ipc.exec.LookPath(ipc.executable) | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "conntrack", mandatory: true, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "crictl", mandatory: true, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ebtables", mandatory: false, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ethtool", mandatory: false, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ip", mandatory: true, exec: execer}, |
cluster/gce/gci/append_or_replace_prefixed_line_test.go: cmd := exec.Command("bash", "-c", args) | |
cluster/gce/gci/configure_helper_test.go: cmd := exec.Command("bash", "-c", args) | |
cmd/importverifier/importverifier.go: cmd := "go" | |
cmd/kubeadm/app/cmd/completion_test.go: cmd := newCmdCompletion(&out, "") | |
cmd/kubeadm/app/preflight/checks.go: _, err := ipc.exec.LookPath(ipc.executable) | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "conntrack", mandatory: true, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "crictl", mandatory: true, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ebtables", mandatory: false, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ethtool", mandatory: false, exec: execer}, | |
cmd/kubeadm/app/preflight/checks_linux.go: InPathCheck{executable: "ip", mandatory: true, exec: execer}, |
chroot1.sh is a bash script to create a custom sandbox based on chroot0.sh from book Core Kubernetes. Christopher Love, Jay Vyas.
The script creates a process isolated sandbox using unshare. More information on https://www.manning.com/books/core-kubernetes
chroot0.sh is a bash script to create a custom sandbox based on chroot0.sh from book Core Kubernetes. Christopher Love, Jay Vyas.
More information on https://www.manning.com/books/core-kubernetes
#### Bash does not have a native ternary operator. Instead, the same functionality can be achieved using: | |
color="blue" | |
[[ "$color" == "blue" ]] && echo "🟦" || echo "🟩" | |
# Output: 🟦 | |
### More information here, https://how.wtf/ternary-operator-in-bash.html#ternary-operation |
#!/bin/bash | |
echo "Joining files /etc/passwd and /etc/shadow" | |
sudo sudo join -t ':' /etc/passwd /etc/shadow |
From 90d94e10cbf64cdf5af435c67af4fe5131c17811 Mon Sep 17 00:00:00 2001 | |
From: Francisco Perez <[email protected]> | |
Date: Wed, 24 Feb 2021 23:17:58 +0100 | |
Subject: [PATCH] Updating Makefile.am files in root folder and ccan for | |
building in Ubuntu 18 | |
--- | |
Makefile.am | 2 +- | |
ccan/Makefile.am | 1 + | |
2 files changed, 2 insertions(+), 1 deletion(-) |
#!/usr/bin/python | |
# | |
# Script for getting a openstack image list order by owner | |
# Developer: [email protected] | |
# Date: 23/09/2018 | |
import imp | |
from os import environ as env |