I hereby claim:
- I am stengaard on github.
- I am stengaard (https://keybase.io/stengaard) on keybase.
- I have a public key whose fingerprint is F0E6 CB1A 2FBC 793C 9AA7 96CA B221 B141 AAC1 1E96
To claim this, I am signing this object:
| // An example of manual GC work in Go. Disconnects it's | |
| // receiver before GC to avoid outstanding requests. | |
| // | |
| // This implementation runs GC every 10 seconds - which is | |
| // slightly idiotic. I bet you could come up with a better | |
| // strategy. | |
| // | |
| // This is meant to illustrate how to sidestep the Go GC in | |
| // situations where the GC pause bites you in the in ass. | |
| package main |
I hereby claim:
To claim this, I am signing this object:
| def profile_this(fn): | |
| import cProfile | |
| def profiled_fn(*args, **kwargs): | |
| fpath = fn.__name__ + ".profile" | |
| prof = cProfile.Profile() | |
| ret = prof.runcall(fn, *args, **kwargs) | |
| prof.dump_stats(fpath) | |
| return ret | |
| return profiled_fn |
| If you ever see | |
| ipsec__plutorun: 003 "/etc/ipsec.secrets" line 16: error loading RSA private key file | |
| in your syslog | |
| root@:/etc/ipsec.d/private# openssl rsa -in vpn.example.com.key -outform pem -out vpn.example.com.key.new | |
| writing RSA key | |
| may very well help. |