KIND runs Kubernetes cluster in Docker, and leverages Docker networking for all the network features: port mapping, IPv6, containers connectivity, etc.
KIND uses a docker user defined network.
It creates a bridge named kind
| XZ Backdoor symbol deobfuscation. Updated as i make progress |
KIND runs Kubernetes cluster in Docker, and leverages Docker networking for all the network features: port mapping, IPv6, containers connectivity, etc.
KIND uses a docker user defined network.
It creates a bridge named kind
| # Example of using an InitContainer in place of a GitRepo volume. | |
| # Unilke GitRepo volumes, this approach runs the git command in a container, | |
| # with the associated hardening. | |
| apiVersion: v1 | |
| kind: Pod | |
| metadata: | |
| name: git-repo-demo | |
| annotations: | |
| seccomp.security.alpha.kubernetes.io/pod: 'docker/default' | |
| spec: |
| // Copyright 2016 Google Inc. All rights reserved. | |
| // Use of this source code is governed by the Apache 2.0 | |
| // license that can be found in the LICENSE file. | |
| // Command caption reads an audio file and outputs the transcript for it. | |
| package main | |
| import ( | |
| "fmt" | |
| "io" |
To remove a submodule you need to:
| package proxy | |
| import ( | |
| "io" | |
| "log" | |
| "net" | |
| ) | |
| func Proxy(srvConn, cliConn *net.TCPConn) { | |
| // channels to wait on the close event for each connection |
NOTE: This is a question I found on StackOverflow which I’ve archived here, because the answer is so effing phenomenal.
If you are not into long explanations, see [Paolo Bergantino’s answer][2].
| docker rmi $(docker images -q -f dangling=true) |