Install HomeBrew first
brew update
brew tap caskroom/cask
brew install brew-caskIf you get the error "already installed", follow the instructions to unlink it, then install again:
| # We set an environment variable in this phase so it gets picked up by pip, but we don't want to bake secrets into our container image | |
| FROM python:3.6-alpine AS builder | |
| ARG INDEX_URL | |
| ENV PIP_EXTRA_INDEX_URL=$INDEX_URL | |
| COPY requirements.txt . | |
| RUN pip install -U pip \ | |
| && pip install --user -r requirements.txt |
| from airflow.contrib.hooks.gcs_hook import GoogleCloudStorageHook | |
| from airflow.exceptions import AirflowException | |
| from airflow.hooks.http_hook import HttpHook | |
| from airflow.models import BaseOperator | |
| from airflow.utils.decorators import apply_defaults | |
| import json | |
| import time | |
| class AppEngineOperator(BaseOperator): |
| import mock | |
| with mock.patch('path.to.ObjectClass.my_property', new_callable=mock.PropertyMock) as mock_my_property: | |
| mock_my_property.return_value = 'my value' |
Install HomeBrew first
brew update
brew tap caskroom/cask
brew install brew-caskIf you get the error "already installed", follow the instructions to unlink it, then install again:
Should be work with 0.18
Destructuring(or pattern matching) is a way used to extract data from a data structure(tuple, list, record) that mirros the construction. Compare to other languages, Elm support much less destructuring but let's see what it got !
myTuple = ("A", "B", "C")
myNestedTuple = ("A", "B", "C", ("X", "Y", "Z"))| #!/bin/bash | |
| echo "This is a idle script (infinite loop) to keep container running." | |
| echo "Please replace this script." | |
| cleanup () | |
| { | |
| kill -s SIGTERM $! | |
| exit 0 | |
| } |
| # Set variables in .bashrc file | |
| # don't forget to change your path correctly! | |
| export GOPATH=$HOME/golang | |
| export GOROOT=/usr/local/opt/go/libexec | |
| export PATH=$PATH:$GOPATH/bin | |
| export PATH=$PATH:$GOROOT/bin |
| I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the | |
| 10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself | |
| that I too could do it. | |
| First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially | |
| believed that it would be highly improbable under normal conditions to obtain the private key | |
| through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's | |
| challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to | |
| extract private keys. So I wanted to see first-hand if it was possible or not. |
I've sniffed most of the Tinder API to see how it works. You can use this to create bots (etc) very trivially. Some example python bot code is here -> https://gist.github.com/rtt/5a2e0cfa638c938cca59 (horribly quick and dirty, you've been warned!)