
Research
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
|Downloads|
The reality of ML training in universities is that we use what ever
hardware we are given (for free). This means that we might have a few
beefy GPU machines, an HPC cluster, plus some GCE/AWS credits that we
get through grants. Jaynes <https://github.com/episodeyang/jaynes>
__
is a well-designed python package that makes running across these
inhomogenous hardward resources a pleasure.
install (requires unix operating system.)
.. code-block:: bash
pip install jaynes
The best way to get started with jaynes is to take a look at one of the
example projects in the
[geyang/jaynes-starter-kit] <https://github.com/geyang/jaynes-starter-kit>
__.
For a rough idea, here is how to use jaynes to launch a training
function:
To run locally:
.. code-block:: python
import jaynes
def training(arg_1, key_arg=None, key_arg_2=None): print(f'training is running! (arg_1={arg_1}, key_arg={key_arg})')
jaynes.config(mode="local", arg_1=10, key_arg=0.3) jaynes.run(training) jaynes.listen()
We recommend setting up a main
training function with the following
sinature:
.. code-block:: python
from params_proto import ParamsProto
class Args(ParamsProto): seed = 100 lr = 3e-4 # ...
def main(**deps): from ml_logger import logger
Args._update(deps)
logger.log_params(Args=vars(Args))
# ... your main training steps
This way you can call the main fn directly for local debugging, but launch it as an entry point at scale.
Jaynes has gone through a large number of iterations. This version
incorporates best practices we learned from other open-source
communities. You can specify a jaynes.yml
config file (copy one from our sample project to get started! <example_projects>
__) for the
type of hosts (ssh/docker/singularity) and launchers
(ssh/ec2/gce/slurm), so that none of those settings need to appear in
your ML python script. When called from python, Jaynes automatically
traverses the file tree to find the root of the project, the same way as
git.
For example, to run your code-block on a remote computer via ssh:
.. code-block:: yaml
version: 0 verbose: true run: # this is specific to each launch, and is dynamically overwritten in-memory mounts: - !mounts.S3Code s3_prefix: s3://ge-bair/jaynes-debug local_path: . host_path: /home/ubuntu/ container_path: /Users/geyang/learning-to-learn pypath: true excludes: "--exclude='pycache' --exclude='.git' --exclude='.idea' --exclude='.egg-info' --exclude='*.pkl'" compress: true runner: !runners.Docker name: # not implemented yet image: "episodeyang/super-expert" startup: "yes | pip install jaynes ml-logger -q" work_directory: "{mounts[0].container_path}" ipc: host host: envs: "LANG=utf-8" pre_launch: "pip install jaynes ml-logger -q" launch: type: ssh ip: username: ubuntu pem: ~/.ssh/your_rsa_key
In python (your code-block):
.. code-block:: python
import jaynes
def training(arg_1, key_arg=None): print(f'training is running! (arg_1={arg_1}, key_arg={key_arg})')
jaynes.run(training)
A lot of times you want to setup a different run modes so it is easy to switch between them during development.
.. code-block:: yaml
version: 0 mounts: # mount configurations Available keys: NOW, UUID, - !mounts.S3Code &code-block_mount s3_prefix: s3://ge-bair/jaynes-debug local_path: . host_path: /home/ubuntu/jaynes-mounts/{NOW:%Y-%m-%d}/{NOW:%H%M%S.%f} # container_path: /Users/geyang/learning-to-learn pypath: true excludes: "--exclude='pycache' --exclude='.git' --exclude='.idea' --exclude='.egg-info' --exclude='*.pkl'" compress: true hosts: hodor: &hodor ip: username: ubuntu pem: ~/.ssh/incrementium-berkeley runners: - !runners.Docker &ssh_docker name: "some-job" # only for docker image: "episodeyang/super-expert" startup: yes | pip install jaynes ml-logger -q envs: "LANG=utf-8" pypath: "{mounts[0].container_path}" launch_directory: "{mounts[0].container_path}" ipc: host use_gpu: false modes: # todo: add support to modes. hodor: mounts: - *code-block_mount runner: *ssh_docker launch: type: ssh <<: *hodor
now run in python
.. code-block:: python
import jaynes
def training(arg_1, key_arg=None): print(f'training is running! (arg_1={arg_1}, key_arg={key_arg})')
jaynes.config(mode="hodor") jaynes.run(training)
Done
- â get the initial template to work
Installation
------------
.. code-block:: bash
pip install jaynes
Usage (**Show me the Mo-NAY!! :moneybag::money_with_wings:**)
-------------------------------------------------------------
Check out the `test_projects <example_projects>`__ folder for projects
that you can run.
To Develop
----------
.. code-block:: bash
git clone https://github.com/episodeyang/jaynes.git
cd jaynes
make dev
To test, run
.. code-block:: bash
make test
This ``make dev`` command should build the wheel and install it in your
current python environment. Take a look at the
`https://github.com/episodeyang/jaynes/blob/master/Makefile <https://github.com/episodeyang/jaynes/blob/master/Makefile>`__ for details.
**To publish**, first update the version number, then do:
.. code-block:: bash
make publish
Acknowledgements
----------------
This code-block is inspired by @justinfuâs
`doodad <https://github.com/justinjfu/doodad>`__, which is in turn built
on top of Peter Chenâs script.
This code-block is written from scratch to allow a more permissible
open-source license (BSD). Go bears :bear: !!
.. |Downloads| image:: http://pepy.tech/badge/jaynes
:target: http://pepy.tech/project/jaynes
FAQs
A tool for running python code with runner on aws
We found that jaynes demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
Product
We redesigned Socket's first logged-in page to display rich and insightful visualizations about your repositories protected against supply chain threats.