- Add a script
/jffs/my-startup.sh:
#!/bin/sh
# Copyright (C) 2021 Yuxiang Zhu <me@yux.im>
# Disable multicast snooping on br0
cru a br0-no-mcast-snooping "* * * * * /bin/sh -c '/bin/echo 0 > /sys/devices/virtual/net/br0/bridge/multicast_snooping'"| import asyncio | |
| import sys | |
| from pathlib import Path | |
| from ruamel.yaml import YAML | |
| from sqlalchemy import create_engine, text, Table, MetaData, select, Column, String, DateTime | |
| yaml = YAML(typ="rt") | |
| yaml.preserve_quotes = True |
| import asyncio | |
| import os | |
| import redis.asyncio as redis | |
| from redis.asyncio.lock import Lock | |
| from redis.asyncio.retry import Retry | |
| from redis.backoff import ExponentialBackoff | |
| async def long_running_task(): |
| # install dependencies with `pip install requests requests-gssapi` | |
| import requests | |
| from requests_gssapi import HTTPSPNEGOAuth | |
| def main(): | |
| non_paginated_url = "https://errata.devel.redhat.com/api/v1/cve_package_exclusion?filter[errata_id]=103179&page[size]=600&page[number]=1" | |
| resp = requests.get(non_paginated_url, auth=HTTPSPNEGOAuth(), verify=False) | |
| resp.raise_for_status() | |
| non_paginated_result = resp.json() |
| - sha256: e84fb1481f603a0512be9bd2e1c181433fe17dfff5942769b4aed417c6502f62 | |
| url: http://download.eng.bos.redhat.com/rcm-guest/puddles/RHAOS/plashets/4.11/art3171/4.11-202203121512.p%3f-embargoed/plashet.yml | |
| target: test-plashet.yml |
/jffs/my-startup.sh:#!/bin/sh
# Copyright (C) 2021 Yuxiang Zhu <me@yux.im>
# Disable multicast snooping on br0
cru a br0-no-mcast-snooping "* * * * * /bin/sh -c '/bin/echo 0 > /sys/devices/virtual/net/br0/bridge/multicast_snooping'"| import asyncio | |
| from os import wait | |
| import re | |
| from io import StringIO | |
| import sys | |
| from typing import Dict, List, Optional, TextIO | |
| import aiohttp | |
| import koji | |
| from datetime import datetime, timedelta |
| #!/bin/bash | |
| | |
| TRACKER=$1 | |
| | |
| if [ -z "$TRACKER" ]; then | |
| echo "Usage: $0 TRACKER_BUG_ID" | |
| exit 1 | |
| fi | |
| | |
| echo "Finding flaw bugs for tracker $TRACKER..." |
| table inet flowoffload { | |
| flowtable f { | |
| hook ingress priority 0 | |
| devices = { eno1, eno2, ens1f0, ens1f1, virbr0, virbr-cube-kvm } | |
| } | |
| chain flowoffload { | |
| type filter hook forward priority 0; policy accept; | |
| ip protocol { tcp, udp } flow offload @f | |
| ip6 nexthdr { tcp, udp } flow offload @f |
| // If both allow_unsupported_sfp=1 option and https://forums.servethehome.com/index.php?threads/patching-intel-x520-eeprom-to-unlock-all-sfp-transceivers.24634/ are not working, | |
| // your SFP+ transceivers may be too old to support Transceiver Compliance Codes in EEPROM. | |
| // Inspired from https://mails.dpdk.org/archives/dev/2019-May/131512.html. | |
| // Looking for the following content in src/ixgbe_phy.c: | |
| status = hw->phy.ops.read_i2c_eeprom(hw, | |
| IXGBE_SFF_10GBE_COMP_CODES, | |
| &comp_codes_10g); | |
| if (status != IXGBE_SUCCESS) | |
| goto err_read_i2c_eeprom; |
| package main | |
| import ( | |
| "bytes" | |
| "encoding/json" | |
| "fmt" | |
| "gopkg.in/jcmturner/gokrb5.v7/client" | |
| "gopkg.in/jcmturner/gokrb5.v7/config" | |
| "gopkg.in/jcmturner/gokrb5.v7/spnego" | |
| "io/ioutil" |