Security News
Maven Central Adds Sigstore Signature Validation
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
Utils to manipulate ceph ceph image.
currently there are two seperate modules. they have no relations.
pip install image-utils
print version:
from image_utils import version
version.version_string()
currently there are two modules.
this module is used to interact with ceph image.
from image_utils import ceph
# get source store.
src_store = ceph.get_store(conffile_path, ceph_user, keyring_path)
# get dest store.
dst_store = ceph.get_store(conffile_path2, ceph_user, keyring_path2)
# get an image location from source ceph pool.
src_loc = src_store.get_location(pool, image_name)
# copy image from src_store to dst_store, in dst_pool
ceph.copy(src_store, src_loc, dst_store, dst_pool)
this module is used to modify disk image. require guestfs
. while guestfs python bindings are not found
in pypi, you should install rpm package
yum install python-libguestfs
Then you are ready
from image_utils import fish
f = fish.Fish(mon_host, mon_port, client, key, pool, image_name)
f.launch()
f.add_mtu('192.168.1.100', 1450)
f.remove_file('/root/abc.txt')
f.shutdown()
while there are few apis in Fish
class, tweak the class and add more apis as your wish.
FAQs
Utils to manipulate ceph rbd image
We found that image-utils demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.