- https://wasser.liebechaos.org/ - Convert CBOR to JSON to inspect it and validate it via CDDL schema
- https://cbor.me/ - Insert hex-encoded CBOR data in the right area to get the diagnostic output in the left or vice versa
- https://cbor.nemo157.com/ - Similar page with nicer UI
- https://cddl.anweiss.tech/ - Check your CDDL format
This simple script will take a picture of a whiteboard and use parts of the ImageMagick library with sane defaults to clean it up tremendously.
The script is here:
#!/bin/bash
convert "$1" -morphology Convolve DoG:15,100,0 -negate -normalize -blur 0x1 -channel RBG -level 60%,91%,0.1 "$2"
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def clear_data(session): | |
meta = db.metadata | |
for table in reversed(meta.sorted_tables): | |
print 'Clear table %s' % table | |
session.execute(table.delete()) | |
session.commit() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
\ProvidesFile{absender.lco} | |
\KOMAoptions{% | |
% fromemail=true, % Email wird im Briefkopf angezeigt | |
% fromphone=true, % Telefonnumer wird im Briefkopf angezeigt | |
% fromfax=true, % Faxnummer wird im Briefkopf angezeit | |
% fromurl=true, % URL wird im Briefkopf angezeigt | |
% fromlogo=true, % Logo wird im Briefkopf angezeigt | |
% subject=titled, % Druckt "Betrifft: " vor dem Betreff | |
locfield=wide, % Breite Absenderergänzung (location) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from flask import Request | |
class ProxiedRequest(Request): | |
""" | |
`Request` subclass that overrides `remote_addr` with Frontend Server's | |
HTTP_X_FORWARDED_FOR when available. | |
""" | |
@property | |
def remote_addr(self): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# | |
# udp_hole_punch_tester.py - UDP Hole Punching test tool | |
# | |
# Usage: udp_hole_punch_tester.py remote_host remote_port | |
# | |
# Run this script simultaneously on 2 hosts to test if they can punch | |
# a UDP hole to each other. | |
# | |
# * remote_port should be identical on 2 hosts. |