You can find the MAC address for LAN1/eth0 (not the BMC MAC) via the SuperMicro IPMI interface by running the following command:
$ ipmitool -U <redacted> -P <redacted> -H 10.4.0.10 raw 0x30 0x21 | tail -c 18
00 25 90 f0 be ef
f = open("replay_last_battle.wotreplay", 'rb') | |
data = f.read() | |
magic_number, data = data[:4], data[4:] | |
block_count, data = int.from_bytes(data[:4], byteorder='little'), data[4:] | |
blocks = [] | |
for block_id in range(block_count): | |
block_length, data = int.from_bytes(data[:4], byteorder='little'), data[4:] |
films = [ | |
(1998, 2008), # The presidents | |
(1999, 2005), # Descrite math | |
(2001, 2009), # Tarjan | |
(2005, 2009), # Halting | |
(2007, 2011), # Steiner | |
(2010, 2020), # the four volume | |
(2012, 2018), # programming chall | |
(2014, 2022), # process term | |
(2018, 2020), # calculated bets |
You can find the MAC address for LAN1/eth0 (not the BMC MAC) via the SuperMicro IPMI interface by running the following command:
$ ipmitool -U <redacted> -P <redacted> -H 10.4.0.10 raw 0x30 0x21 | tail -c 18
00 25 90 f0 be ef
import requests | |
import lxml.etree as etree | |
def pp(url): | |
responce = requests.get(url, auth=auth) | |
if responce.status_code == 200: | |
content = responce.content | |
print etree.tostring(etree.fromstring(content), pretty_print = True) | |
else: | |
print "Invalid responce, code=%s, url=%s" % (responce.status_code, url) |
def diff(new, old): | |
""" Return diff of elements | |
:param new: | |
:param old: | |
:return: | |
same: bool (if compared values the same) | |
value: dict || list || value (depends on income object) | |
""" | |
if type(new) != type(old): | |
return new |