I hereby claim:
- I am devvesa on github.
- I am devesa (https://keybase.io/devesa) on keybase.
- I have a public key ASC-lCrInLEgBlcAcCMs5-M3y_cIXQtAHwViMrVq5hcx_go
To claim this, I am signing this object:
from tornado.web import AsyncIOMAinLoop | |
import asyncio | |
def make_application( | |
handlers: Handlers = None, | |
settings: str = "settings.py", | |
command_line_parsing: bool = True, | |
validation_function=None, | |
) -> tornado.web.Application: | |
global ENABLE_PROFILER |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
{'$schema': 'http://json-schema.org/draft-04/schema#', | |
'description': 'Serialized Role object', | |
'properties': {'id': {'type': 'integer'}, | |
'meta': {'properties': {'conflicts': {'description': 'Specify which roles conflict this one.', | |
'type': 'array'}, | |
'description': {'description': 'Short description of role functionality', | |
'type': 'string'}, | |
'has_primary': {'description': 'During orchestration this role will be splitted into primary-role and role.', | |
'type': 'boolean'}, | |
'limits': {'properties': {'condition': {'type': 'string'}, |
This documents explains the packaging procedures and naming conventions for the networking-midonet MidoNet's Neutron plugin.
fwp_db.audited fwp['audited'] Result: fwp['audited'] | |
========================================================== | |
True True False | |
True False False | |
False True True | |
False False False |
[ssh_connection] | |
ssh_args=-o ForwardAgent=yes |
#!/usr/bin/env python | |
# Implement the 'findFirstCommonAncestor' method that given another TreeNode | |
# finds the first (deepest in the tree) common ancestor of 'this' TreeNode and | |
# the one passed to the method. Assume that each TreeNode is a node in a | |
# binary tree. You may add methods but not data members to the TreeNode class. | |
# | |
# Solution | |
# | |
# To approach this exercise I create two lists with the paths of the two |