hexsha
string
size
int64
ext
string
lang
string
max_stars_repo_path
string
max_stars_repo_name
string
max_stars_repo_head_hexsha
string
max_stars_repo_licenses
list
max_stars_count
int64
max_stars_repo_stars_event_min_datetime
string
max_stars_repo_stars_event_max_datetime
string
max_issues_repo_path
string
max_issues_repo_name
string
max_issues_repo_head_hexsha
string
max_issues_repo_licenses
list
max_issues_count
int64
max_issues_repo_issues_event_min_datetime
string
max_issues_repo_issues_event_max_datetime
string
max_forks_repo_path
string
max_forks_repo_name
string
max_forks_repo_head_hexsha
string
max_forks_repo_licenses
list
max_forks_count
int64
max_forks_repo_forks_event_min_datetime
string
max_forks_repo_forks_event_max_datetime
string
content
string
avg_line_length
float64
max_line_length
int64
alphanum_fraction
float64
qsc_code_num_words_quality_signal
int64
qsc_code_num_chars_quality_signal
float64
qsc_code_mean_word_length_quality_signal
float64
qsc_code_frac_words_unique_quality_signal
float64
qsc_code_frac_chars_top_2grams_quality_signal
float64
qsc_code_frac_chars_top_3grams_quality_signal
float64
qsc_code_frac_chars_top_4grams_quality_signal
float64
qsc_code_frac_chars_dupe_5grams_quality_signal
float64
qsc_code_frac_chars_dupe_6grams_quality_signal
float64
qsc_code_frac_chars_dupe_7grams_quality_signal
float64
qsc_code_frac_chars_dupe_8grams_quality_signal
float64
qsc_code_frac_chars_dupe_9grams_quality_signal
float64
qsc_code_frac_chars_dupe_10grams_quality_signal
float64
qsc_code_frac_chars_replacement_symbols_quality_signal
float64
qsc_code_frac_chars_digital_quality_signal
float64
qsc_code_frac_chars_whitespace_quality_signal
float64
qsc_code_size_file_byte_quality_signal
float64
qsc_code_num_lines_quality_signal
float64
qsc_code_num_chars_line_max_quality_signal
float64
qsc_code_num_chars_line_mean_quality_signal
float64
qsc_code_frac_chars_alphabet_quality_signal
float64
qsc_code_frac_chars_comments_quality_signal
float64
qsc_code_cate_xml_start_quality_signal
float64
qsc_code_frac_lines_dupe_lines_quality_signal
float64
qsc_code_cate_autogen_quality_signal
float64
qsc_code_frac_lines_long_string_quality_signal
float64
qsc_code_frac_chars_string_length_quality_signal
float64
qsc_code_frac_chars_long_word_length_quality_signal
float64
qsc_code_frac_lines_string_concat_quality_signal
float64
qsc_code_cate_encoded_data_quality_signal
float64
qsc_code_frac_chars_hex_words_quality_signal
float64
qsc_code_frac_lines_prompt_comments_quality_signal
float64
qsc_code_frac_lines_assert_quality_signal
float64
qsc_codepython_cate_ast_quality_signal
float64
qsc_codepython_frac_lines_func_ratio_quality_signal
float64
qsc_codepython_cate_var_zero_quality_signal
bool
qsc_codepython_frac_lines_pass_quality_signal
float64
qsc_codepython_frac_lines_import_quality_signal
float64
qsc_codepython_frac_lines_simplefunc_quality_signal
float64
qsc_codepython_score_lines_no_logic_quality_signal
float64
qsc_codepython_frac_lines_print_quality_signal
float64
qsc_code_num_words
int64
qsc_code_num_chars
int64
qsc_code_mean_word_length
int64
qsc_code_frac_words_unique
null
qsc_code_frac_chars_top_2grams
int64
qsc_code_frac_chars_top_3grams
int64
qsc_code_frac_chars_top_4grams
int64
qsc_code_frac_chars_dupe_5grams
int64
qsc_code_frac_chars_dupe_6grams
int64
qsc_code_frac_chars_dupe_7grams
int64
qsc_code_frac_chars_dupe_8grams
int64
qsc_code_frac_chars_dupe_9grams
int64
qsc_code_frac_chars_dupe_10grams
int64
qsc_code_frac_chars_replacement_symbols
int64
qsc_code_frac_chars_digital
int64
qsc_code_frac_chars_whitespace
int64
qsc_code_size_file_byte
int64
qsc_code_num_lines
int64
qsc_code_num_chars_line_max
int64
qsc_code_num_chars_line_mean
int64
qsc_code_frac_chars_alphabet
int64
qsc_code_frac_chars_comments
int64
qsc_code_cate_xml_start
int64
qsc_code_frac_lines_dupe_lines
int64
qsc_code_cate_autogen
int64
qsc_code_frac_lines_long_string
int64
qsc_code_frac_chars_string_length
int64
qsc_code_frac_chars_long_word_length
int64
qsc_code_frac_lines_string_concat
null
qsc_code_cate_encoded_data
int64
qsc_code_frac_chars_hex_words
int64
qsc_code_frac_lines_prompt_comments
int64
qsc_code_frac_lines_assert
int64
qsc_codepython_cate_ast
int64
qsc_codepython_frac_lines_func_ratio
int64
qsc_codepython_cate_var_zero
int64
qsc_codepython_frac_lines_pass
int64
qsc_codepython_frac_lines_import
int64
qsc_codepython_frac_lines_simplefunc
int64
qsc_codepython_score_lines_no_logic
int64
qsc_codepython_frac_lines_print
int64
effective
string
hits
int64
8c08481604ffc4f9b4bebd59aabd54a2d704be24
2,192
py
Python
tests/system/InitFile/createInitFiles.py
nih23/MRIDrivenHeatSimulation
de6d16853df1faf44c700d1fc06584351bf6c816
[ "BSL-1.0", "BSD-3-Clause" ]
null
null
null
tests/system/InitFile/createInitFiles.py
nih23/MRIDrivenHeatSimulation
de6d16853df1faf44c700d1fc06584351bf6c816
[ "BSL-1.0", "BSD-3-Clause" ]
null
null
null
tests/system/InitFile/createInitFiles.py
nih23/MRIDrivenHeatSimulation
de6d16853df1faf44c700d1fc06584351bf6c816
[ "BSL-1.0", "BSD-3-Clause" ]
null
null
null
import netCDF4 as nc import numpy as np dim = 8 file_name = "init" def create_nc_file_1D(): global dim global file_name nc_file_name = file_name + "1D.nc" nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC") nNodes_0 = nc_file.createDimension("nNodes_0", dim) time = nc_file.createDimension("time") init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_0")) num_elem = dim a = np.ones(num_elem).reshape(dim) init_values[0,:] = a init_values[0,0] = 100.0 init_values[0,(dim-1)] = 100.0 nc_file.close() def create_nc_file_2D(): global dim global file_name nc_file_name = file_name + "2D.nc" nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC") nNodes_0 = nc_file.createDimension("nNodes_0", dim) nNodes_1 = nc_file.createDimension("nNodes_1", dim) time = nc_file.createDimension("time") init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_1", "nNodes_0")) num_elem = dim * dim a = np.ones(num_elem).reshape(dim, dim) init_values[0,:,:] = a init_values[0,0,:] = 100.0 init_values[0,:,0] = 100.0 init_values[0,(dim-1),:] = 100.0 init_values[0,:,(dim-1)] = 100.0 nc_file.close() def create_nc_file_3D(): global dim global file_name nc_file_name = file_name + "3D.nc" nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC") nNodes_0 = nc_file.createDimension("nNodes_0", dim) nNodes_1 = nc_file.createDimension("nNodes_1", dim) nNodes_2 = nc_file.createDimension("nNodes_2", dim) time = nc_file.createDimension("time") init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_2", "nNodes_1", "nNodes_0")) num_elem = dim * dim * dim a = np.ones(num_elem).reshape(dim, dim, dim) init_values[0,:,:,:] = a init_values[0,0,:,:] = 100.0 init_values[0,:,0,:] = 100.0 init_values[0,:,:,0] = 100.0 init_values[0,(dim-1),:,:] = 100.0 init_values[0,:,(dim-1),:] = 100.0 init_values[0,:,:,(dim-1)] = 100.0 nc_file.close() def main(): create_nc_file_1D() create_nc_file_2D() create_nc_file_3D() if __name__ == '__main__': main()
32.235294
97
0.643248
349
2,192
3.730659
0.117479
0.138249
0.126728
0.096774
0.868664
0.862519
0.862519
0.862519
0.814132
0.814132
0
0.061902
0.189325
2,192
67
98
32.716418
0.670793
0
0
0.327869
0
0
0.093066
0
0
0
0
0
0
1
0.065574
false
0
0.032787
0
0.098361
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
8c0ab98c56e291a74619205d2570edced9ce690c
36
py
Python
examples/read_channel.py
dovedevic/twitch.py
685dc893e4cf5daa9abd9571b6415acd9215b0bb
[ "MIT" ]
3
2019-11-20T01:08:35.000Z
2020-10-26T14:49:54.000Z
examples/read_channel.py
dovedevic/twitch.py
685dc893e4cf5daa9abd9571b6415acd9215b0bb
[ "MIT" ]
25
2019-11-19T22:57:44.000Z
2019-11-20T06:37:52.000Z
examples/read_channel.py
dovedevic/twitch.py
685dc893e4cf5daa9abd9571b6415acd9215b0bb
[ "MIT" ]
1
2019-11-20T01:00:35.000Z
2019-11-20T01:00:35.000Z
# TODO::Finish when API is finished
18
35
0.75
6
36
4.5
1
0
0
0
0
0
0
0
0
0
0
0
0.166667
36
1
36
36
0.9
0.916667
0
null
0
null
0
0
null
0
0
1
null
1
null
true
0
0
null
null
null
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
1
0
0
0
0
0
0
null
0
0
1
0
0
0
1
0
0
0
0
0
0
6
8c11463421cdf81febf23fb6192971e02a88fcc8
2,344
py
Python
serialmon/clitools/tools.py
cuhk-gw-suspension/serial-monitor
6f44b3e5223aa1ee71e2d49637463a436ec7e072
[ "MIT" ]
null
null
null
serialmon/clitools/tools.py
cuhk-gw-suspension/serial-monitor
6f44b3e5223aa1ee71e2d49637463a436ec7e072
[ "MIT" ]
2
2021-06-24T18:28:43.000Z
2021-07-09T17:52:58.000Z
serialmon/clitools/tools.py
cuhk-gw-suspension/serial-monitor
6f44b3e5223aa1ee71e2d49637463a436ec7e072
[ "MIT" ]
null
null
null
import click # __package__ = "serialmon" from ..utils.adaptUSBport import get_serial_device from ..utils.log import print_serial_info, print_int from ..monitor import app @click.group() def cli(): pass @cli.command() def list(): """list all ports not with description 'n/a'.""" try: title = "Available serial ports:" click.echo(title) for i, p in enumerate(get_serial_device()): click.echo("%d: %s\t\t%s" % (i, p.device, p.description)) except IOError as e: click.echo(e) @cli.command() @click.option('-p','--port', help='port path to the serial device,\n \ can be path string or number from serial list') @click.option('-b', '--baud', type=int, help='baud rate of the serial communication') @click.option('--timeout', default=1, required=False, help='timeout of the connection') def read(port, baud, timeout): """Read and print information from a serial port indefinitely.""" click.echo("start reading...") click.echo("Press ctrl C to escape.") try: port = int(port) except Exception: pass if type(port) is str: print_serial_info(port, baud, timeout) elif type(port) is int: p = get_serial_device() print_serial_info(p[port].device, baud, timeout) else: raise TypeError("wrong instruction of --port option.") @cli.command() @click.option('-p','--port', help='port path to the serial device,\n \ can be path string or number from serial list') @click.option('-b', '--baud', type=int, help='baud rate of the serial communication') @click.option('--timeout', default=1, required=False, help='timeout of the connection') def readInt(port, baud, timeout): """Read and print information from a serial port indefinitely.""" click.echo("start reading...") click.echo("Press ctrl C to escape.") try: port = int(port) except Exception: pass if type(port) is str: print_serial_info(port, baud, timeout) elif type(port) is int: p = get_serial_device() print_int(p[port].device, baud, timeout) else: raise TypeError("wrong instruction of --port option.") @cli.command() def gui(): """open gui with live plots of serial data (if data)""" app()
32.109589
87
0.626706
322
2,344
4.493789
0.291925
0.043538
0.041465
0.029026
0.721493
0.721493
0.721493
0.721493
0.721493
0.721493
0
0.001117
0.235922
2,344
72
88
32.555556
0.806812
0.101962
0
0.666667
0
0
0.171387
0
0
0
0
0
0
1
0.087719
false
0.052632
0.070175
0
0.157895
0.087719
0
0
0
null
0
0
0
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
0
0
0
0
0
6
8c1b4616eb0add7fc113193a78e373acf0a5c093
813
py
Python
apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py
gtfarng/Odoo_migrade
9cc28fae4c379e407645248a29d22139925eafe7
[ "Apache-2.0" ]
1
2019-12-19T01:53:13.000Z
2019-12-19T01:53:13.000Z
apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py
gtfarng/Odoo_migrade
9cc28fae4c379e407645248a29d22139925eafe7
[ "Apache-2.0" ]
null
null
null
apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py
gtfarng/Odoo_migrade
9cc28fae4c379e407645248a29d22139925eafe7
[ "Apache-2.0" ]
null
null
null
import odoo.tests # Part of Odoo. See LICENSE file for full copyright and licensing details. class TestUi(odoo.tests.HttpCase): post_install = True at_install = False def test_01_admin_survey_tour(self): self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready", login="admin") def test_02_demo_survey_tour(self): self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready", login="demo") def test_03_public_survey_tour(self): self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready")
45.166667
174
0.729397
117
813
4.615385
0.358974
0.1
0.188889
0.222222
0.662963
0.662963
0.662963
0.662963
0.662963
0.662963
0
0.008299
0.110701
813
17
175
47.823529
0.738589
0.088561
0
0
0
0
0.515562
0.499323
0
0
0
0
0
1
0.3
false
0
0.1
0
0.7
0
0
0
0
null
0
1
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
null
0
0
0
0
0
1
0
0
0
0
1
0
0
6
8c3a4ca6ed2cfd8a19fee29410d812da43b6f69c
231
py
Python
tests/markers.py
vyahello/async-weather-api
03edabb9c1d29b2fe9b478d2751361d6dc1d4a08
[ "MIT" ]
2
2020-01-06T19:10:22.000Z
2020-05-27T03:41:59.000Z
tests/markers.py
vyahello/async-weather-api
03edabb9c1d29b2fe9b478d2751361d6dc1d4a08
[ "MIT" ]
3
2020-10-30T19:34:54.000Z
2021-08-14T07:20:43.000Z
tests/markers.py
vyahello/async-weather-api
03edabb9c1d29b2fe9b478d2751361d6dc1d4a08
[ "MIT" ]
null
null
null
import pytest from _pytest.mark import MarkDecorator unit: MarkDecorator = pytest.mark.unit smoke: MarkDecorator = pytest.mark.smoke async_: MarkDecorator = pytest.mark.asyncio parametrize: MarkDecorator = pytest.mark.parametrize
28.875
52
0.82684
27
231
7
0.37037
0.26455
0.486772
0
0
0
0
0
0
0
0
0
0.099567
231
7
53
33
0.908654
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.333333
0
0.333333
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
0
0
6
8c41d1e8437812c606c41522ba8eea93f37695fa
148
py
Python
deployment/utils/__init__.py
Damehou/FaceParsing
2cb0d8aa8b698826ec56052c69bab7bb3f732fa5
[ "MIT" ]
138
2020-01-10T17:54:30.000Z
2022-03-17T04:05:38.000Z
deployment/utils/__init__.py
Damehou/FaceParsing
2cb0d8aa8b698826ec56052c69bab7bb3f732fa5
[ "MIT" ]
21
2020-02-07T12:27:41.000Z
2022-02-05T14:50:15.000Z
deployment/utils/__init__.py
Damehou/FaceParsing
2cb0d8aa8b698826ec56052c69bab7bb3f732fa5
[ "MIT" ]
28
2020-01-10T10:27:19.000Z
2022-03-10T07:52:25.000Z
# -*- coding: utf-8 -*- # @Author: luoling # @Date: 2019-10-29 18:32:28 # @Last Modified by: luoling # @Last Modified time: 2019-12-02 16:41:48
24.666667
42
0.621622
25
148
3.68
0.84
0.26087
0
0
0
0
0
0
0
0
0
0.239669
0.182432
148
5
43
29.6
0.520661
0.925676
0
null
0
null
0
0
null
0
0
0
null
1
null
true
0
0
null
null
null
1
0
0
null
1
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
6
8c4af7b529a066d2c65836b18d5f1cc3d8504d33
145
py
Python
robinhoodbot/utils/print.py
nikunjshanti/RobinhoodBot
edfd06192af59f51a19ff495d2dae34e282f4c4b
[ "MIT" ]
null
null
null
robinhoodbot/utils/print.py
nikunjshanti/RobinhoodBot
edfd06192af59f51a19ff495d2dae34e282f4c4b
[ "MIT" ]
null
null
null
robinhoodbot/utils/print.py
nikunjshanti/RobinhoodBot
edfd06192af59f51a19ff495d2dae34e282f4c4b
[ "MIT" ]
null
null
null
import os, sys # Disable def blockPrint(): sys.stdout = open(os.devnull, 'w') # Restore def enablePrint(): sys.stdout = sys.__stdout__
14.5
38
0.668966
19
145
4.894737
0.631579
0.290323
0
0
0
0
0
0
0
0
0
0
0.193103
145
9
39
16.111111
0.794872
0.103448
0
0
0
0
0.007874
0
0
0
0
0
0
1
0.4
true
0
0.2
0
0.6
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
0
0
1
0
0
6
4fc45afd790794daa78b174321f6caa83723a4a5
102
py
Python
forum_modules/pgfulltext/settings.py
Stackato-Apps/osqa
728bb43ae913e33769c52f40cadb26721faaf2b2
[ "Naumen", "Condor-1.1", "MS-PL" ]
1
2017-07-14T09:58:07.000Z
2017-07-14T09:58:07.000Z
forum_modules/pgfulltext/settings.py
Stackato-Apps/osqa
728bb43ae913e33769c52f40cadb26721faaf2b2
[ "Naumen", "Condor-1.1", "MS-PL" ]
null
null
null
forum_modules/pgfulltext/settings.py
Stackato-Apps/osqa
728bb43ae913e33769c52f40cadb26721faaf2b2
[ "Naumen", "Condor-1.1", "MS-PL" ]
null
null
null
from forum.settings.base import Setting PG_FTSTRIGGERS_VERSION = Setting('PG_FTSTRIGGERS_VERSION', 0)
34
61
0.843137
14
102
5.857143
0.714286
0.219512
0.487805
0.658537
0
0
0
0
0
0
0
0.010638
0.078431
102
3
61
34
0.861702
0
0
0
0
0
0.213592
0.213592
0
0
0
0
0
1
0
false
0
0.5
0
0.5
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
1
0
0
0
0
6
8b1a181d4a80ff9c87202f8428948e308af0ac1c
38
py
Python
savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py
Octoberr/swm0920
8f05a6b91fc205960edd57f9076facec04f49a1a
[ "Apache-2.0" ]
2
2019-05-19T11:54:26.000Z
2019-05-19T12:03:49.000Z
savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py
Octoberr/swm0920
8f05a6b91fc205960edd57f9076facec04f49a1a
[ "Apache-2.0" ]
1
2020-11-27T07:55:15.000Z
2020-11-27T07:55:15.000Z
savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py
Octoberr/swm0920
8f05a6b91fc205960edd57f9076facec04f49a1a
[ "Apache-2.0" ]
2
2021-09-06T18:06:12.000Z
2021-12-31T07:44:43.000Z
from .googlesearch import GoogleSearch
38
38
0.894737
4
38
8.5
0.75
0
0
0
0
0
0
0
0
0
0
0
0.078947
38
1
38
38
0.971429
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
8b4006429c201e86c45981f7862c0d01fef92855
24
py
Python
core/clip/__init__.py
ollietb/VQGAN-CLIP-Docker
f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce
[ "MIT" ]
57
2021-08-06T19:23:06.000Z
2022-03-30T04:20:11.000Z
core/clip/__init__.py
ollietb/VQGAN-CLIP-Docker
f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce
[ "MIT" ]
3
2021-09-01T00:31:10.000Z
2021-11-13T11:27:42.000Z
core/clip/__init__.py
ollietb/VQGAN-CLIP-Docker
f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce
[ "MIT" ]
12
2021-08-08T05:18:38.000Z
2022-03-24T20:12:56.000Z
from core.clip import *
12
23
0.75
4
24
4.5
1
0
0
0
0
0
0
0
0
0
0
0
0.166667
24
1
24
24
0.9
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
8c96709cc74e79fd1ae17bc35a57366229b8e015
53
py
Python
config/secrets.py
pcraig3/super
8ab30a456355ee2c7b7ea7368f254cacee1b1fef
[ "MIT" ]
null
null
null
config/secrets.py
pcraig3/super
8ab30a456355ee2c7b7ea7368f254cacee1b1fef
[ "MIT" ]
null
null
null
config/secrets.py
pcraig3/super
8ab30a456355ee2c7b7ea7368f254cacee1b1fef
[ "MIT" ]
null
null
null
OPENWEATHER_KEY = '354e5f35b937cc744a82cbf1a5adadf4'
26.5
52
0.886792
3
53
15.333333
1
0
0
0
0
0
0
0
0
0
0
0.34
0.056604
53
1
53
53
0.58
0
0
0
0
0
0.603774
0.603774
0
0
0
0
0
1
0
false
0
0
0
0
0
1
0
1
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
50809f88dc33547e89d180a206f1c7c5b1b4bb07
91
py
Python
bpy_speckle/callbacks/__init__.py
CyrilWaechter/SpeckleBlender
c3ab2e9055c225c08e84fabae7b76cd550b025e9
[ "MIT" ]
26
2018-05-02T13:44:28.000Z
2021-11-19T11:32:11.000Z
bpy_speckle/callbacks/__init__.py
CyrilWaechter/SpeckleBlender
c3ab2e9055c225c08e84fabae7b76cd550b025e9
[ "MIT" ]
14
2018-05-26T23:52:11.000Z
2020-10-05T07:57:50.000Z
bpy_speckle/callbacks/__init__.py
CyrilWaechter/SpeckleBlender
c3ab2e9055c225c08e84fabae7b76cd550b025e9
[ "MIT" ]
5
2019-05-16T07:16:46.000Z
2020-10-01T08:50:54.000Z
from .on_mesh_edit import scb_on_mesh_edit from .draw_speckle_info import draw_speckle_info
45.5
48
0.901099
17
91
4.294118
0.529412
0.164384
0.273973
0
0
0
0
0
0
0
0
0
0.076923
91
2
48
45.5
0.869048
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
50edd0ebfa0a09006bb1d53ade391f78487a5c82
255
py
Python
src/nlp_models/word_embedding/NgramLevelWordEmbedding.py
TeaKatz/NLP_Models
89e77bde464473c4f1bfad2e093763c66dfbaa04
[ "MIT" ]
null
null
null
src/nlp_models/word_embedding/NgramLevelWordEmbedding.py
TeaKatz/NLP_Models
89e77bde464473c4f1bfad2e093763c66dfbaa04
[ "MIT" ]
null
null
null
src/nlp_models/word_embedding/NgramLevelWordEmbedding.py
TeaKatz/NLP_Models
89e77bde464473c4f1bfad2e093763c66dfbaa04
[ "MIT" ]
null
null
null
from .CharacterLevelWordEmbedding import CharacterLevelWordEmbedding, CharacterLevelWordSparseEncoding class NgramLevelWordSparseEncoding(CharacterLevelWordSparseEncoding): pass class NgramLevelWordEmbedding(CharacterLevelWordEmbedding): pass
25.5
102
0.878431
13
255
17.230769
0.615385
0
0
0
0
0
0
0
0
0
0
0
0.090196
255
9
103
28.333333
0.965517
0
0
0.4
0
0
0
0
0
0
0
0
0
1
0
true
0.4
0.2
0
0.6
0
1
0
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
0
0
1
0
0
6
50f3d4ef4f30969157a76fb94de78e66b4e1372c
251
py
Python
swdata/__init__.py
tadmat/swdata
a4d87f3863714d0f9d10e4192b96b0abe60f4f2b
[ "MIT" ]
null
null
null
swdata/__init__.py
tadmat/swdata
a4d87f3863714d0f9d10e4192b96b0abe60f4f2b
[ "MIT" ]
null
null
null
swdata/__init__.py
tadmat/swdata
a4d87f3863714d0f9d10e4192b96b0abe60f4f2b
[ "MIT" ]
null
null
null
from .dataset import ( SWDataset, LabelStruct, Transcript, sign2tensor, print_max_nsymbols, ) __all__ = [ "SWDataset", "LabelStruct", "Transcript", "sign2tensor", "print_max_nsymbols", ] __version__ = '0.1.0'
13.944444
25
0.621514
22
251
6.545455
0.636364
0.277778
0.416667
0.569444
0.791667
0.791667
0.791667
0
0
0
0
0.026738
0.25498
251
17
26
14.764706
0.743316
0
0
0
0
0
0.25498
0
0
0
0
0
0
1
0
false
0
0.066667
0
0.066667
0.133333
1
0
0
null
1
1
1
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
ba0855748e824076c16aae09538ea22be0801e1a
128
py
Python
prism/modellink/tests/modellink/__init__.py
vishalbelsare/PRISM
9565508df8f7f7bba4119f4f523fc4635455a4db
[ "BSD-3-Clause" ]
43
2019-01-28T05:40:43.000Z
2022-03-29T20:46:57.000Z
prism/modellink/tests/modellink/__init__.py
vishalbelsare/PRISM
9565508df8f7f7bba4119f4f523fc4635455a4db
[ "BSD-3-Clause" ]
30
2019-01-28T10:55:27.000Z
2021-02-01T04:06:55.000Z
prism/modellink/tests/modellink/__init__.py
vishalbelsare/PRISM
9565508df8f7f7bba4119f4f523fc4635455a4db
[ "BSD-3-Clause" ]
7
2020-01-10T15:54:55.000Z
2021-02-01T04:46:17.000Z
# -*- coding: utf-8 -*- from .extreme_link import ExtremeLink from .simple_gaussian_link import GaussianLink2D, GaussianLink3D
25.6
64
0.789063
15
128
6.533333
0.8
0.204082
0
0
0
0
0
0
0
0
0
0.026549
0.117188
128
4
65
32
0.840708
0.164063
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
ba2d5bf59505096e97fab86a0ca1a75612caa7fa
805
py
Python
bms_controller_test.py
clean-code-craft-tcq-1/function-ext-python-Aruna1396
2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1
[ "MIT" ]
null
null
null
bms_controller_test.py
clean-code-craft-tcq-1/function-ext-python-Aruna1396
2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1
[ "MIT" ]
null
null
null
bms_controller_test.py
clean-code-craft-tcq-1/function-ext-python-Aruna1396
2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1
[ "MIT" ]
null
null
null
import check_battery_limits as checker if __name__ == '__main__': 'Test for upper limit breaches' assert (checker.is_battery_overall_health_ok({'charging_temperature': 125, 'state_of_charge': 90, 'charge_rate': 6.8}, "English", 'Celsius') is False) 'Test for lower limit breaches' assert (checker.is_battery_overall_health_ok({'charging_temperature': -125, 'state_of_charge': -170, 'charge_rate': -0.8}, "English", 'Celsius') is False) 'Test for upper & lower limit breaches' assert (checker.is_battery_overall_health_ok({'charging_temperature': 125, 'state_of_charge': -20, 'charge_rate': 0.8}, "English", 'Celsius') is False)
53.666667
104
0.595031
91
805
4.89011
0.395604
0.047191
0.12809
0.175281
0.824719
0.824719
0.824719
0.74382
0.595506
0.595506
0
0.038596
0.291925
805
14
105
57.5
0.742105
0
0
0
0
0
0.351553
0
0
0
0
0
0.272727
1
0
true
0
0.090909
0
0.090909
0
0
0
0
null
0
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
6
e8aceadd2b1dfa290b5cac5d1315d89b8af8753b
1,088
py
Python
folders/project1_Dice/dice.py
angelopassaro/Hacktoberfest-1
21f90f5d49efba9b1a27f4d9b923f5017ab43f0e
[ "Apache-2.0" ]
1
2020-10-06T01:20:07.000Z
2020-10-06T01:20:07.000Z
folders/project1_Dice/dice.py
angelopassaro/Hacktoberfest-1
21f90f5d49efba9b1a27f4d9b923f5017ab43f0e
[ "Apache-2.0" ]
null
null
null
folders/project1_Dice/dice.py
angelopassaro/Hacktoberfest-1
21f90f5d49efba9b1a27f4d9b923f5017ab43f0e
[ "Apache-2.0" ]
null
null
null
import random x="y" while x=="y": number=random.randint(1,6) if number == 1: print(" -------- ") print("| |") print("| 0 |") print("| |") print(" -------- ") if number == 2: print(" -------- ") print("| |") print("| 0 0 |") print("| |") print(" -------- ") if number == 3: print(" -------- ") print("| 0 |") print("| 0 |") print("| 0 |") print(" -------- ") if number == 4: print(" -------- ") print("| 0 0 |") print("| |") print("| 0 0 |") print(" -------- ") if number == 5: print(" -------- ") print("| 0 0 |") print("| 0 |") print("| 0 0 |") print(" -------- ") if number == 6: print(" -------- ") print("| 0 0 |") print("| 0 0 |") print("| 0 0 |") print(" -------- ") x=input("do u want to throw again press y if not then n")
25.302326
61
0.283088
95
1,088
3.242105
0.284211
0.253247
0.181818
0.311688
0.577922
0.415584
0.084416
0
0
0
0
0.048658
0.452206
1,088
42
62
25.904762
0.468121
0
0
0.731707
0
0
0.319853
0
0
0
0
0
0
1
0
false
0
0.02439
0
0.02439
0.731707
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
1
0
6
fa0ebc0918c8deee22997bd253bcaa47f563e165
259,298
py
Python
vulnerability-impact-categorization/classifier_tests.py
CSIRT-MU/VulnerabilityCategorization
24bd578c45c6cc9534566ffc4c69baff324b4b45
[ "MIT" ]
4
2018-05-05T07:30:45.000Z
2021-01-05T06:51:21.000Z
vulnerability-impact-categorization/classifier_tests.py
CSIRT-MU/VulnerabilityCategorization
24bd578c45c6cc9534566ffc4c69baff324b4b45
[ "MIT" ]
null
null
null
vulnerability-impact-categorization/classifier_tests.py
CSIRT-MU/VulnerabilityCategorization
24bd578c45c6cc9534566ffc4c69baff324b4b45
[ "MIT" ]
1
2019-04-20T08:06:18.000Z
2019-04-20T08:06:18.000Z
import unittest import CVE_parser import classifier result_impacts = { 'CVE-2017-0001': ['Privilege escalation on system'], 'CVE-2017-0002': ['Gain privileges on application'], 'CVE-2017-0003': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0004': ['System availability loss'], 'CVE-2017-0005': ['Privilege escalation on system'], 'CVE-2017-0006': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0010': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0014': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0015': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0018': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0019': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0020': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0021': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0023': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0024': ['Privilege escalation on system'], 'CVE-2017-0026': ['Privilege escalation on system'], 'CVE-2017-0030': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0031': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0032': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0034': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0035': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0037': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0039': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0040': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0047': ['Privilege escalation on system'], 'CVE-2017-0050': ['Privilege escalation on system'], 'CVE-2017-0052': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0053': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0056': ['Privilege escalation on system'], 'CVE-2017-0067': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0070': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0071': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0072': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0075': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0077': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-0078': ['Privilege escalation on system'], 'CVE-2017-0079': ['Privilege escalation on system'], 'CVE-2017-0080': ['Privilege escalation on system'], 'CVE-2017-0081': ['Privilege escalation on system'], 'CVE-2017-0082': ['Privilege escalation on system'], 'CVE-2017-0083': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0084': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0086': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0087': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0088': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0089': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0090': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0093': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0094': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0095': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0100': ['Gain user privileges on system'], 'CVE-2017-0101': ['Gain user privileges on system'], 'CVE-2017-0102': ['Gain user privileges on system'], 'CVE-2017-0103': ['Gain user privileges on system'], 'CVE-2017-0104': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-0106': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0108': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0109': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0129': ['Application integrity loss'], 'CVE-2017-0130': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0131': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0132': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0133': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0134': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0136': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0137': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0138': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0141': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0143': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0144': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0145': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0146': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0148': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0149': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0150': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0151': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0152': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0155': ['Privilege escalation on system'], 'CVE-2017-0156': ['Privilege escalation on system'], 'CVE-2017-0158': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0160': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0162': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0163': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0165': ['Privilege escalation on system'], 'CVE-2017-0166': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0176': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0180': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0181': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0189': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0193': ['Gain user privileges on system'], 'CVE-2017-0197': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0199': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0200': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0201': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0202': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0205': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0212': ['Gain user privileges on system'], 'CVE-2017-0214': ['Gain user privileges on system'], 'CVE-2017-0221': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-0222': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0223': ['Arbitrary code execution as user of application'], 'CVE-2017-0224': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0226': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0227': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0228': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0229': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0230': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0233': ['Gain privileges on application'], 'CVE-2017-0234': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0235': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0236': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0238': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0240': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0243': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0246': ['Privilege escalation on system'], # 'CVE-2017-0247': ['Application availability loss'], incorrect data 'CVE-2017-0248': ['Application integrity loss'], 'CVE-2017-0249': ['Gain privileges on application'], 'CVE-2017-0252': ['Arbitrary code execution as user of application'], 'CVE-2017-0254': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0260': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0261': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0262': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0263': ['Privilege escalation on system'], 'CVE-2017-0264': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0265': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0266': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0272': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0277': ['Arbitrary code execution as user of application'], 'CVE-2017-0278': ['Arbitrary code execution as user of application'], 'CVE-2017-0279': ['Arbitrary code execution as user of application'], 'CVE-2017-0281': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0283': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0290': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0291': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0292': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0294': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0296': ['Privilege escalation on system'], 'CVE-2017-0298': ['Gain user privileges on system'], 'CVE-2017-0305': ['Arbitrary code execution as user of application'], 'CVE-2017-0306': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0307': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0308': ['Privilege escalation on system'], 'CVE-2017-0309': ['Privilege escalation on system'], 'CVE-2017-0311': ['Privilege escalation on system'], 'CVE-2017-0312': ['Privilege escalation on system'], 'CVE-2017-0313': ['Privilege escalation on system'], 'CVE-2017-0314': ['Privilege escalation on system'], 'CVE-2017-0315': ['Privilege escalation on system'], 'CVE-2017-0317': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0321': ['Privilege escalation on system'], 'CVE-2017-0322': ['Privilege escalation on system'], 'CVE-2017-0323': ['Privilege escalation on system'], 'CVE-2017-0324': ['Privilege escalation on system'], 'CVE-2017-0325': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0327': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0329': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0331': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0332': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0333': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0335': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0337': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0338': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0339': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0340': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0341': ['Privilege escalation on system'], 'CVE-2017-0342': ['Privilege escalation on system'], 'CVE-2017-0343': ['Privilege escalation on system'], 'CVE-2017-0344': ['Privilege escalation on system'], 'CVE-2017-0345': ['Privilege escalation on system'], 'CVE-2017-0346': ['Privilege escalation on system'], 'CVE-2017-0347': ['Privilege escalation on system'], 'CVE-2017-0348': ['Privilege escalation on system'], 'CVE-2017-0349': ['Privilege escalation on system'], 'CVE-2017-0350': ['Privilege escalation on system'], 'CVE-2017-0351': ['Privilege escalation on system'], 'CVE-2017-0352': ['Privilege escalation on system'], 'CVE-2017-0373': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-0374': ['Gain privileges on application'], 'CVE-2017-0375': ['Application availability loss'], 'CVE-2017-0376': ['Application availability loss'], 'CVE-2017-0377': ['Application confidentiality loss'], 'CVE-2017-0381': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-0382': ['Arbitrary code execution as user of application'], 'CVE-2017-0383': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0384': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0385': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0386': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0387': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0389': ['System availability loss'], 'CVE-2017-0394': ['System availability loss'], 'CVE-2017-0403': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0404': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0405': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0406': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0407': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0408': ['Arbitrary code execution as user of application'], 'CVE-2017-0409': ['Arbitrary code execution as user of application'], 'CVE-2017-0410': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0411': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0412': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0415': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0416': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0417': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0418': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0419': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0422': ['System availability loss'], 'CVE-2017-0427': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0428': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0429': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0430': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0432': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0433': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0434': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0435': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0436': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0437': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0438': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0439': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0440': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0441': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0442': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0443': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0444': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0445': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0446': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0447': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0449': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0450': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0453': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0454': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0455': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0456': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0457': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0458': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0460': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0462': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0463': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0464': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0465': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0466': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0467': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0468': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0469': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0470': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0471': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0472': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0473': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0474': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0475': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0476': ['Arbitrary code execution as user of application'], 'CVE-2017-0477': ['Arbitrary code execution as user of application'], 'CVE-2017-0478': ['Arbitrary code execution as user of application'], 'CVE-2017-0479': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0480': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0481': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0500': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0501': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0502': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0503': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0504': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0505': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0506': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0507': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0508': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0509': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0510': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0516': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0517': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0518': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0519': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0520': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0521': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0522': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0523': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0524': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0525': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0526': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0527': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0528': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0538': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0539': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0540': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0541': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0542': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0543': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0544': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0545': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0546': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0553': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0554': ['Gain user privileges on system'], 'CVE-2017-0561': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0562': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0563': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0564': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0565': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0566': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0567': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0568': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0569': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0570': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0571': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0572': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0573': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0574': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0575': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0576': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0577': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0578': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0579': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0580': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0581': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0582': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0583': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0587': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0588': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0589': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0590': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0591': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0592': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0593': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0594': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0595': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0596': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0597': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0604': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0605': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0606': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0607': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0608': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0609': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0610': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0611': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0612': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0613': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0614': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0615': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0616': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0617': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0618': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0619': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0620': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0621': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0622': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0623': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0636': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0637': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0638': ['Arbitrary code execution as user of application'], 'CVE-2017-0648': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0649': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0663': ['Arbitrary code execution as user of application'], 'CVE-2017-0664': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0665': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0666': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0667': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0671': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0673': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0674': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0675': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0676': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0677': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0678': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0679': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0680': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0681': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0682': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0683': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0684': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0700': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0701': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0702': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-0703': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0704': ['Gain user privileges on system'], 'CVE-2017-0707': ['Gain user privileges on system'], 'CVE-2017-0710': ['Gain user privileges on system'], 'CVE-2017-0711': ['Gain root/system/administrator privileges on system'], 'CVE-2017-0897': ['Arbitrary code execution as user of application'], 'CVE-2017-1000001': ['Application integrity loss'], 'CVE-2017-1000002': ['Arbitrary code execution as user of application'], 'CVE-2017-1000003': ['Gain privileges on application'], 'CVE-2017-1000010': ['Arbitrary code execution as user of application'], 'CVE-2017-1000014': ['Application availability loss'], 'CVE-2017-1000016': ['Application integrity loss'], 'CVE-2017-1000017': ['Application integrity loss', 'Application availability loss', 'Application confidentiality loss'], 'CVE-2017-1000018': ['Application availability loss'], 'CVE-2017-1000021': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000022': ['Gain privileges on application'], 'CVE-2017-1000026': ['Application integrity loss'], 'CVE-2017-1000028': ['Application confidentiality loss'], 'CVE-2017-1000029': ['Application confidentiality loss'], 'CVE-2017-1000030': ['Gain privileges on application'], 'CVE-2017-1000031': ['Arbitrary code execution as user of application'], 'CVE-2017-1000039': ['Arbitrary code execution as user of application'], 'CVE-2017-1000044': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000045': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000046': ['Application integrity loss'], 'CVE-2017-1000047': ['Arbitrary code execution as user of application'], 'CVE-2017-1000050': ['Application availability loss'], 'CVE-2017-1000060': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1000062': ['Arbitrary code execution as user of application'], 'CVE-2017-1000064': ['Application availability loss'], 'CVE-2017-1000066': ['Application confidentiality loss'], 'CVE-2017-1000067': ['Gain privileges on application'], 'CVE-2017-1000069': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000072': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000073': ['Arbitrary code execution as user of application'], 'CVE-2017-1000074': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000075': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000079': ['System availability loss'], 'CVE-2017-1000080': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-1000081': ['Arbitrary code execution as user of application'], 'CVE-2017-1000082': ['Gain root/system/administrator privileges on system'], 'CVE-2017-1000357': ['Application availability loss'], 'CVE-2017-1000361': ['Application availability loss'], 'CVE-2017-1000362': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1000363': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-1000364': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-1000365': ['Privilege escalation on system'], 'CVE-2017-1000366': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1000368': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1000370': ['Privilege escalation on system'], 'CVE-2017-1000371': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-1000372': ['Arbitrary code execution as user of application'], 'CVE-2017-1000374': ['Arbitrary code execution as user of application'], 'CVE-2017-1000375': ['Arbitrary code execution as user of application'], 'CVE-2017-1000376': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1000378': ['Arbitrary code execution as user of application'], 'CVE-2017-1000379': ['Privilege escalation on system'], 'CVE-2017-1000381': ['Application confidentiality loss'], 'CVE-2017-1001000': ['Application integrity loss'], 'CVE-2017-10601': ['Gain root/system/administrator privileges on system'], 'CVE-2017-10602': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-10603': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-10605': ['System availability loss'], 'CVE-2017-10670': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10671': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10672': ['Arbitrary code execution as user of application'], 'CVE-2017-10678': ['Gain privileges on application'], 'CVE-2017-10679': ['Application confidentiality loss'], 'CVE-2017-10680': ['Gain privileges on application'], 'CVE-2017-10681': ['Gain privileges on application'], 'CVE-2017-10682': ['Arbitrary code execution as user of application'], 'CVE-2017-10683': ['Application availability loss'], 'CVE-2017-10684': ['Arbitrary code execution as user of application'], 'CVE-2017-10685': ['Arbitrary code execution as user of application'], 'CVE-2017-10686': ['Arbitrary code execution as user of application'], 'CVE-2017-10687': ['Application availability loss'], 'CVE-2017-10688': ['Application availability loss'], 'CVE-2017-10699': ['Arbitrary code execution as user of application'], 'CVE-2017-10725': ['Arbitrary code execution as user of application'], 'CVE-2017-10726': ['Arbitrary code execution as user of application'], 'CVE-2017-10727': ['Arbitrary code execution as user of application'], 'CVE-2017-10728': ['Arbitrary code execution as user of application'], 'CVE-2017-10729': ['Arbitrary code execution as user of application'], 'CVE-2017-10730': ['Arbitrary code execution as user of application'], 'CVE-2017-10731': ['Arbitrary code execution as user of application'], 'CVE-2017-10732': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10733': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10734': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10735': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10736': ['Arbitrary code execution as user of application'], 'CVE-2017-10737': ['Arbitrary code execution as user of application'], 'CVE-2017-10738': ['Arbitrary code execution as user of application'], 'CVE-2017-10739': ['Arbitrary code execution as user of application'], 'CVE-2017-10740': ['Arbitrary code execution as user of application'], 'CVE-2017-10741': ['Arbitrary code execution as user of application'], 'CVE-2017-10742': ['Arbitrary code execution as user of application'], 'CVE-2017-10743': ['Arbitrary code execution as user of application'], 'CVE-2017-10744': ['Arbitrary code execution as user of application'], 'CVE-2017-10745': ['Arbitrary code execution as user of application'], 'CVE-2017-10746': ['Arbitrary code execution as user of application'], 'CVE-2017-10747': ['Arbitrary code execution as user of application'], 'CVE-2017-10748': ['Arbitrary code execution as user of application'], 'CVE-2017-10749': ['Arbitrary code execution as user of application'], 'CVE-2017-10750': ['Arbitrary code execution as user of application'], 'CVE-2017-10751': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10752': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10753': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10754': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10755': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10756': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10757': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10758': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10759': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10760': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10761': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10762': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10763': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10764': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10765': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10766': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10767': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10768': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10769': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10770': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10771': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10772': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10773': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10774': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10775': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10776': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10777': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10778': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10779': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10780': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10781': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10782': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10783': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10788': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10790': ['Application availability loss'], 'CVE-2017-10804': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10805': ['Gain privileges on application'], 'CVE-2017-10807': ['Gain privileges on application'], 'CVE-2017-10810': ['System availability loss'], 'CVE-2017-10912': ['Gain root/system/administrator privileges on system'], 'CVE-2017-10913': ['Gain user privileges on system'], 'CVE-2017-10914': ['Gain user privileges on system'], 'CVE-2017-10915': ['Gain user privileges on system'], 'CVE-2017-10916': ['System confidentiality loss'], 'CVE-2017-10917': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-10918': ['Gain root/system/administrator privileges on system'], 'CVE-2017-1092': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-10920': ['Gain root/system/administrator privileges on system'], 'CVE-2017-10921': ['Gain root/system/administrator privileges on system'], 'CVE-2017-10922': ['System availability loss'], 'CVE-2017-10924': ['Arbitrary code execution as user of application'], 'CVE-2017-10925': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10926': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10928': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-10929': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-1093': ['Privilege escalation on system'], 'CVE-2017-10961': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10965': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10966': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10968': ['Arbitrary code execution as user of application'], 'CVE-2017-10971': ['Arbitrary code execution as user of application'], 'CVE-2017-10974': ['Application confidentiality loss'], 'CVE-2017-10976': ['Application availability loss'], 'CVE-2017-10978': ['Application availability loss'], 'CVE-2017-10979': ['Arbitrary code execution as user of application'], 'CVE-2017-10980': ['Application availability loss'], 'CVE-2017-10981': ['Application availability loss'], 'CVE-2017-10982': ['Application availability loss'], 'CVE-2017-10983': ['Application availability loss'], 'CVE-2017-10984': ['Arbitrary code execution as user of application'], 'CVE-2017-10985': ['System availability loss'], 'CVE-2017-10986': ['Application availability loss'], 'CVE-2017-10987': ['Application availability loss'], 'CVE-2017-10989': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-10993': ['Arbitrary code execution as user of application'], 'CVE-2017-10994': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1103': ['System availability loss', 'System confidentiality loss'], 'CVE-2017-1105': ['Application availability loss', 'Application integrity loss'], 'CVE-2017-11096': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11097': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11098': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11099': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11100': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11101': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11102': ['Application availability loss'], 'CVE-2017-11103': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11108': ['Application availability loss'], 'CVE-2017-11109': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11110': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11111': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11112': ['Application availability loss'], 'CVE-2017-11113': ['Application availability loss'], 'CVE-2017-11124': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11125': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11139': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11142': ['System availability loss'], 'CVE-2017-11143': ['Application availability loss'], 'CVE-2017-11144': ['Application availability loss'], 'CVE-2017-11145': ['Application confidentiality loss'], 'CVE-2017-11147': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-11164': ['System availability loss'], 'CVE-2017-11165': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11167': ['Arbitrary code execution as user of application'], 'CVE-2017-11170': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11173': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11174': ['Arbitrary code execution as user of application'], 'CVE-2017-11176': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-11187': ['Gain privileges on application'], 'CVE-2017-11188': ['System availability loss'], 'CVE-2017-11190': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11193': ['Arbitrary code execution as user of application'], 'CVE-2017-11196': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11200': ['Arbitrary code execution as user of application'], 'CVE-2017-1122': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11310': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11311': ['Arbitrary code execution as user of application'], 'CVE-2017-11324': ['Arbitrary code execution as user of application'], 'CVE-2017-11325': ['Application confidentiality loss'], 'CVE-2017-11326': ['Application integrity loss'], 'CVE-2017-11329': ['Arbitrary code execution as user of application'], 'CVE-2017-11335': ['Arbitrary code execution as user of application'], 'CVE-2017-1134': ['Privilege escalation on system'], 'CVE-2017-11341': ['Application availability loss'], 'CVE-2017-11342': ['Application availability loss'], 'CVE-2017-11343': ['Application integrity loss'], 'CVE-2017-11344': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11345': ['Arbitrary code execution as user of application'], 'CVE-2017-11346': ['Arbitrary code execution as user of application'], 'CVE-2017-11349': ['System confidentiality loss'], 'CVE-2017-11354': ['Arbitrary code execution as user of application'], 'CVE-2017-11361': ['Privilege escalation on system'], 'CVE-2017-11362': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-1137': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11399': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11403': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11406': ['System availability loss'], 'CVE-2017-11407': ['Application availability loss'], 'CVE-2017-11408': ['Application availability loss'], 'CVE-2017-11409': ['System availability loss'], 'CVE-2017-11410': ['System availability loss'], 'CVE-2017-11411': ['System availability loss'], 'CVE-2017-11412': ['Arbitrary code execution as user of application'], 'CVE-2017-11413': ['Arbitrary code execution as user of application'], 'CVE-2017-11414': ['Arbitrary code execution as user of application'], 'CVE-2017-11415': ['Arbitrary code execution as user of application'], 'CVE-2017-11416': ['Arbitrary code execution as user of application'], 'CVE-2017-11417': ['Arbitrary code execution as user of application'], 'CVE-2017-11418': ['Arbitrary code execution as user of application'], 'CVE-2017-11419': ['Arbitrary code execution as user of application'], 'CVE-2017-11420': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11421': ['Arbitrary code execution as user of application'], 'CVE-2017-11435': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-11444': ['Arbitrary code execution as user of application'], 'CVE-2017-11445': ['Arbitrary code execution as user of application'], 'CVE-2017-11449': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-1145': ['System availability loss'], 'CVE-2017-11450': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11456': ['System confidentiality loss'], 'CVE-2017-11459': ['Arbitrary code execution as user of application'], 'CVE-2017-11464': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11465': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-11466': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11467': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11468': ['Application availability loss'], 'CVE-2017-11469': ['Application confidentiality loss'], 'CVE-2017-11470': ['Arbitrary code execution as user of application'], 'CVE-2017-11471': ['Arbitrary code execution as user of application'], 'CVE-2017-11472': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-11473': ['Privilege escalation on system'], 'CVE-2017-11474': ['Arbitrary code execution as user of application'], 'CVE-2017-11475': ['Arbitrary code execution as user of application'], 'CVE-2017-1149': ['System availability loss', 'System confidentiality loss'], 'CVE-2017-11499': ['Application availability loss'], 'CVE-2017-11500': ['Application integrity loss'], 'CVE-2017-11502': ['System confidentiality loss'], 'CVE-2017-1151': ['Gain user privileges on system'], 'CVE-2017-11517': ['Arbitrary code execution as user of application'], 'CVE-2017-11519': ['Gain user privileges on system'], 'CVE-2017-1153': ['Gain privileges on application'], 'CVE-2017-11541': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11542': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11543': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11544': ['Application availability loss'], 'CVE-2017-11545': ['Application availability loss'], 'CVE-2017-11553': ['Application availability loss'], 'CVE-2017-11554': ['Application availability loss'], 'CVE-2017-11555': ['Application availability loss'], 'CVE-2017-11556': ['Application availability loss'], 'CVE-2017-1156': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11565': ['Application integrity loss'], 'CVE-2017-11566': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-11568': ['Arbitrary code execution as user of application'], 'CVE-2017-11569': ['Arbitrary code execution as user of application'], 'CVE-2017-11570': ['Arbitrary code execution as user of application'], 'CVE-2017-11571': ['Arbitrary code execution as user of application'], 'CVE-2017-11572': ['Arbitrary code execution as user of application'], 'CVE-2017-11573': ['Arbitrary code execution as user of application'], 'CVE-2017-11574': ['Arbitrary code execution as user of application'], 'CVE-2017-11575': ['Arbitrary code execution as user of application'], 'CVE-2017-11577': ['Arbitrary code execution as user of application'], 'CVE-2017-11582': ['Arbitrary code execution as user of application'], 'CVE-2017-11583': ['Arbitrary code execution as user of application'], 'CVE-2017-11584': ['Arbitrary code execution as user of application'], 'CVE-2017-11585': ['Arbitrary code execution as user of application'], 'CVE-2017-11590': ['Application availability loss'], 'CVE-2017-11591': ['Application availability loss'], 'CVE-2017-11592': ['Application availability loss'], 'CVE-2017-11600': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-1161': ['Arbitrary code execution as user of application'], 'CVE-2017-11630': ['Application integrity loss'], 'CVE-2017-11631': ['Arbitrary code execution as user of application'], 'CVE-2017-11636': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11637': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11638': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11641': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11642': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11643': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-11655': ['Application availability loss'], 'CVE-2017-1175': ['Arbitrary code execution as user of application'], 'CVE-2017-1181': ['Gain privileges on application'], 'CVE-2017-1182': ['Arbitrary code execution as user of application'], 'CVE-2017-1183': ['Arbitrary code execution as user of application'], 'CVE-2017-1194': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1196': ['Gain privileges on application'], 'CVE-2017-1197': ['Gain privileges on application'], 'CVE-2017-1205': ['Privilege escalation on system'], 'CVE-2017-1218': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1224': ['Application confidentiality loss'], 'CVE-2017-1253': ['Arbitrary code execution as user of application'], 'CVE-2017-1254': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-1264': ['Application confidentiality loss'], 'CVE-2017-1267': ['Application integrity loss'], 'CVE-2017-1269': ['Arbitrary code execution as user of application'], 'CVE-2017-1274': ['Arbitrary code execution as user of application'], 'CVE-2017-1289': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-1297': ['Arbitrary code execution as user of application'], 'CVE-2017-1309': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-1318': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-1319': ['Application confidentiality loss'], 'CVE-2017-1322': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-1337': ['Gain privileges on application'], 'CVE-2017-1347': ['Arbitrary code execution as user of application'], 'CVE-2017-1371': ['Gain privileges on application'], 'CVE-2017-1373': ['Gain privileges on application'], 'CVE-2017-1379': ['Application confidentiality loss'], 'CVE-2017-1382': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2096': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2097': ['Gain privileges on application'], 'CVE-2017-2101': ['Application integrity loss', 'Application availability loss', 'Application confidentiality loss'], 'CVE-2017-2102': ['Gain privileges on application'], 'CVE-2017-2107': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2108': ['Privilege escalation on system'], 'CVE-2017-2112': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2113': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2119': ['Application confidentiality loss'], 'CVE-2017-2120': ['Arbitrary code execution as user of application'], 'CVE-2017-2125': ['Gain user privileges on system'], 'CVE-2017-2126': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-2128': ['Arbitrary code execution as user of application'], 'CVE-2017-2130': ['Gain privileges on application'], 'CVE-2017-2140': ['Arbitrary code execution as user of application'], 'CVE-2017-2141': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2142': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2149': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2153': ['System availability loss'], 'CVE-2017-2154': ['Gain privileges on application'], 'CVE-2017-2155': ['Arbitrary code execution as user of application'], 'CVE-2017-2156': ['Arbitrary code execution as user of application'], 'CVE-2017-2157': ['Gain privileges on application'], 'CVE-2017-2163': ['Application confidentiality loss'], 'CVE-2017-2167': ['Arbitrary code execution as user of application'], 'CVE-2017-2175': ['Gain privileges on application'], 'CVE-2017-2176': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2177': ['Gain privileges on application'], 'CVE-2017-2178': ['Gain privileges on application'], 'CVE-2017-2179': ['Arbitrary code execution as user of application'], 'CVE-2017-2181': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2182': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2183': ['Arbitrary code execution as user of application'], 'CVE-2017-2184': ['Arbitrary code execution as user of application'], 'CVE-2017-2185': ['Arbitrary code execution as user of application'], 'CVE-2017-2186': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2188': ['Gain privileges on application'], 'CVE-2017-2189': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2190': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2191': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2192': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2193': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2195': ['Arbitrary code execution as user of application'], 'CVE-2017-2206': ['Gain privileges on application'], 'CVE-2017-2207': ['Gain privileges on application'], 'CVE-2017-2208': ['Arbitrary code execution as user of application'], 'CVE-2017-2209': ['Gain privileges on application'], 'CVE-2017-2210': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2211': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2212': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2213': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2214': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2215': ['Gain privileges on application'], 'CVE-2017-2218': ['Gain privileges on application'], 'CVE-2017-2219': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2220': ['Gain privileges on application'], 'CVE-2017-2223': ['Gain user privileges on system'], 'CVE-2017-2225': ['Gain privileges on application'], 'CVE-2017-2226': ['Gain privileges on application'], 'CVE-2017-2227': ['Gain privileges on application'], 'CVE-2017-2229': ['Gain privileges on application'], 'CVE-2017-2230': ['Gain privileges on application'], 'CVE-2017-2231': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2232': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2233': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2234': ['Gain user privileges on system'], 'CVE-2017-2235': ['Gain user privileges on system'], 'CVE-2017-2236': ['Gain user privileges on system'], 'CVE-2017-2237': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2238': ['Gain user privileges on system'], 'CVE-2017-2244': ['Gain user privileges on system'], 'CVE-2017-2246': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2247': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2248': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2249': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2252': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2253': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2265': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2266': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2267': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2268': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2269': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2270': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2271': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2272': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2275': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2276': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2290': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2292': ['Arbitrary code execution as user of application'], 'CVE-2017-2294': ['Application confidentiality loss'], 'CVE-2017-2295': ['Arbitrary code execution as user of application'], 'CVE-2017-2300': ['System availability loss'], 'CVE-2017-2301': ['System availability loss'], 'CVE-2017-2302': ['System availability loss'], 'CVE-2017-2303': ['System availability loss'], 'CVE-2017-2304': ['System confidentiality loss'], 'CVE-2017-2305': ['Gain privileges on application'], 'CVE-2017-2306': ['Arbitrary code execution as user of application'], 'CVE-2017-2313': ['System availability loss'], 'CVE-2017-2315': ['System availability loss'], 'CVE-2017-2317': ['System integrity loss', 'System availability loss', 'System confidentiality loss'], 'CVE-2017-2319': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2320': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-2321': ['System integrity loss', 'System availability loss', 'System confidentiality loss'], 'CVE-2017-2323': ['Application availability loss'], 'CVE-2017-2331': ['System integrity loss', 'System availability loss', 'System confidentiality loss'], 'CVE-2017-2332': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2334': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2341': ['Privilege escalation on system'], 'CVE-2017-2343': ['Gain root/system/administrator privileges on system'], 'CVE-2017-2349': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2353': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2354': ['Arbitrary code execution as user of application'], 'CVE-2017-2355': ['Arbitrary code execution as user of application'], 'CVE-2017-2356': ['Arbitrary code execution as user of application'], 'CVE-2017-2358': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2360': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2362': ['Arbitrary code execution as user of application'], 'CVE-2017-2366': ['Arbitrary code execution as user of application'], 'CVE-2017-2369': ['Arbitrary code execution as user of application'], 'CVE-2017-2370': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2372': ['Arbitrary code execution as user of application'], 'CVE-2017-2373': ['Arbitrary code execution as user of application'], 'CVE-2017-2374': ['Arbitrary code execution as user of application'], 'CVE-2017-2376': ['Application integrity loss'], 'CVE-2017-2377': ['Application availability loss'], 'CVE-2017-2378': ['Arbitrary code execution as user of application'], 'CVE-2017-2379': ['Arbitrary code execution as user of application'], 'CVE-2017-2380': ['System confidentiality loss'], 'CVE-2017-2381': ['Gain user privileges on system'], 'CVE-2017-2382': ['System confidentiality loss'], 'CVE-2017-2389': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-2392': ['Arbitrary code execution as user of application'], 'CVE-2017-2394': ['Arbitrary code execution as user of application'], 'CVE-2017-2395': ['Arbitrary code execution as user of application'], 'CVE-2017-2396': ['Arbitrary code execution as user of application'], 'CVE-2017-2398': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2401': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2402': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2403': ['Arbitrary code execution as user of application'], 'CVE-2017-2404': ['System integrity loss'], 'CVE-2017-2405': ['Arbitrary code execution as user of application'], 'CVE-2017-2406': ['Arbitrary code execution as user of application'], 'CVE-2017-2407': ['Arbitrary code execution as user of application'], 'CVE-2017-2408': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2409': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-2410': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2413': ['Arbitrary code execution as user of application'], 'CVE-2017-2415': ['Arbitrary code execution as user of application'], 'CVE-2017-2416': ['Arbitrary code execution as user of application'], 'CVE-2017-2419': ['Application integrity loss'], 'CVE-2017-2420': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2421': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2422': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2423': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2425': ['Arbitrary code execution as user of application'], 'CVE-2017-2427': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2428': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-2429': ['System integrity loss'], 'CVE-2017-2430': ['Arbitrary code execution as user of application'], 'CVE-2017-2431': ['Arbitrary code execution as user of application'], 'CVE-2017-2432': ['Arbitrary code execution as user of application'], 'CVE-2017-2433': ['Arbitrary code execution as user of application'], 'CVE-2017-2434': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-2435': ['Arbitrary code execution as user of application'], 'CVE-2017-2436': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2437': ['Privilege escalation on system'], 'CVE-2017-2438': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2439': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-2440': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2441': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2443': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2444': ['Arbitrary code execution as user of application'], 'CVE-2017-2446': ['Arbitrary code execution as user of application'], 'CVE-2017-2447': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-2449': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2450': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-2451': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2454': ['Arbitrary code execution as user of application'], 'CVE-2017-2455': ['Arbitrary code execution as user of application'], 'CVE-2017-2456': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2457': ['Arbitrary code execution as user of application'], 'CVE-2017-2458': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2459': ['Arbitrary code execution as user of application'], 'CVE-2017-2460': ['Arbitrary code execution as user of application'], 'CVE-2017-2461': ['Application availability loss'], 'CVE-2017-2462': ['Arbitrary code execution as user of application'], 'CVE-2017-2463': ['Arbitrary code execution as user of application'], 'CVE-2017-2464': ['Arbitrary code execution as user of application'], 'CVE-2017-2465': ['Arbitrary code execution as user of application'], 'CVE-2017-2466': ['Arbitrary code execution as user of application'], 'CVE-2017-2467': ['Arbitrary code execution as user of application'], 'CVE-2017-2468': ['Arbitrary code execution as user of application'], 'CVE-2017-2469': ['Arbitrary code execution as user of application'], 'CVE-2017-2470': ['Arbitrary code execution as user of application'], 'CVE-2017-2471': ['Arbitrary code execution as user of application'], 'CVE-2017-2472': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2473': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2474': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2476': ['Arbitrary code execution as user of application'], 'CVE-2017-2477': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2478': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2481': ['Arbitrary code execution as user of application'], 'CVE-2017-2482': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2483': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2484': ['System integrity loss'], 'CVE-2017-2485': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2487': ['Arbitrary code execution as user of application'], 'CVE-2017-2490': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2491': ['Arbitrary code execution as user of application'], 'CVE-2017-2494': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2496': ['Arbitrary code execution as user of application'], 'CVE-2017-2498': ['System integrity loss'], 'CVE-2017-2499': ['Arbitrary code execution as user of application'], 'CVE-2017-2501': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2503': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2505': ['Arbitrary code execution as user of application'], 'CVE-2017-2506': ['Arbitrary code execution as user of application'], 'CVE-2017-2512': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2513': ['Arbitrary code execution as user of application'], 'CVE-2017-2514': ['Arbitrary code execution as user of application'], 'CVE-2017-2515': ['Arbitrary code execution as user of application'], 'CVE-2017-2518': ['Arbitrary code execution as user of application'], 'CVE-2017-2519': ['Arbitrary code execution as user of application'], 'CVE-2017-2520': ['Arbitrary code execution as user of application'], 'CVE-2017-2521': ['Arbitrary code execution as user of application'], 'CVE-2017-2522': ['Arbitrary code execution as user of application'], 'CVE-2017-2523': ['Arbitrary code execution as user of application'], 'CVE-2017-2524': ['Arbitrary code execution as user of application'], 'CVE-2017-2525': ['Arbitrary code execution as user of application'], 'CVE-2017-2526': ['Arbitrary code execution as user of application'], 'CVE-2017-2527': ['Arbitrary code execution as user of application'], 'CVE-2017-2530': ['Arbitrary code execution as user of application'], 'CVE-2017-2531': ['Arbitrary code execution as user of application'], 'CVE-2017-2533': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2534': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2535': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2536': ['Arbitrary code execution as user of application'], 'CVE-2017-2537': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2538': ['Arbitrary code execution as user of application'], 'CVE-2017-2539': ['Arbitrary code execution as user of application'], 'CVE-2017-2541': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2542': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2543': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2544': ['Arbitrary code execution as user of application'], 'CVE-2017-2545': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2546': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2547': ['Arbitrary code execution as user of application'], 'CVE-2017-2548': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2583': ['Gain user privileges on system'], 'CVE-2017-2584': ['System availability loss', 'System confidentiality loss'], 'CVE-2017-2636': ['Privilege escalation on system'], 'CVE-2017-2641': ['Arbitrary code execution as user of application'], 'CVE-2017-2647': ['Privilege escalation on system'], 'CVE-2017-2675': ['Gain privileges on application'], 'CVE-2017-2682': ['Arbitrary code execution as user of application'], 'CVE-2017-2683': ['Gain privileges on application'], 'CVE-2017-2684': ['Gain privileges on application'], 'CVE-2017-2685': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2688': ['Gain user privileges on system'], 'CVE-2017-2689': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2765': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-2766': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-2767': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2768': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2773': ['Gain privileges on application'], 'CVE-2017-2775': ['Arbitrary code execution as user of application'], 'CVE-2017-2780': ['Arbitrary code execution as user of application'], 'CVE-2017-2781': ['Arbitrary code execution as user of application'], 'CVE-2017-2782': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-2783': ['Arbitrary code execution as user of application'], 'CVE-2017-2784': ['Arbitrary code execution as user of application'], 'CVE-2017-2785': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2786': ['Application availability loss'], 'CVE-2017-2787': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2788': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2789': ['Arbitrary code execution as user of application'], 'CVE-2017-2790': ['Arbitrary code execution as user of application'], 'CVE-2017-2791': ['Arbitrary code execution as user of application'], 'CVE-2017-2793': ['Arbitrary code execution as user of application'], 'CVE-2017-2794': ['Arbitrary code execution as user of application'], 'CVE-2017-2797': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2798': ['Arbitrary code execution as user of application'], 'CVE-2017-2799': ['Arbitrary code execution as user of application'], 'CVE-2017-2800': ['Arbitrary code execution as user of application'], 'CVE-2017-2801': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2805': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2810': ['Arbitrary code execution as user of application'], 'CVE-2017-2813': ['Arbitrary code execution as user of application'], 'CVE-2017-2814': ['Arbitrary code execution as user of application'], 'CVE-2017-2817': ['Arbitrary code execution as user of application'], 'CVE-2017-2818': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2819': ['Arbitrary code execution as user of application'], 'CVE-2017-2820': ['Arbitrary code execution as user of application'], 'CVE-2017-2823': ['Arbitrary code execution as user of application'], 'CVE-2017-2824': ['Arbitrary code execution as user of application'], 'CVE-2017-2827': ['Arbitrary code execution as user of application'], 'CVE-2017-2828': ['Arbitrary code execution as user of application'], 'CVE-2017-2830': ['System integrity loss'], 'CVE-2017-2831': ['System integrity loss'], 'CVE-2017-2841': ['Arbitrary code execution as user of application'], 'CVE-2017-2842': ['Arbitrary code execution as user of application'], 'CVE-2017-2843': ['Arbitrary code execution as user of application'], 'CVE-2017-2844': ['Arbitrary code execution as user of application'], 'CVE-2017-2845': ['Arbitrary code execution as user of application'], 'CVE-2017-2846': ['Arbitrary code execution as user of application'], 'CVE-2017-2847': ['Arbitrary code execution as user of application'], 'CVE-2017-2848': ['Arbitrary code execution as user of application'], 'CVE-2017-2849': ['Arbitrary code execution as user of application'], 'CVE-2017-2850': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2851': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-2863': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2925': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2926': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2927': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2928': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2930': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2931': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2932': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2933': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2934': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2935': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2936': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2937': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2938': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2939': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2940': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2941': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2942': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2943': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2944': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2945': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2946': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2948': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2949': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2950': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2951': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2952': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2953': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2954': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2955': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2956': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2957': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2958': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2959': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2960': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2961': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2962': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2963': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2964': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2965': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2966': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2967': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2968': ['Arbitrary code execution as user of application'], 'CVE-2017-2970': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2971': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2972': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2973': ['Arbitrary code execution as root/administrator/system'], # 'CVE-2017-2974': ['Application availability loss'], incorrect data # 'CVE-2017-2975': ['Arbitrary code execution as user of application'], incorrect data # 'CVE-2017-2976': ['Arbitrary code execution as user of application'], incorrect data # 'CVE-2017-2977': ['Arbitrary code execution as user of application'], incorrect data # 'CVE-2017-2978': ['Arbitrary code execution as user of application'], incorrect data # 'CVE-2017-2979': ['Application confidentiality loss'], incorrect data # 'CVE-2017-2980': ['Application confidentiality loss'], incorrect data # 'CVE-2017-2981': ['Application confidentiality loss'], incorrect data 'CVE-2017-2982': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2983': ['Gain privileges on application'], 'CVE-2017-2984': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2985': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2986': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2987': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2988': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2989': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-2990': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2991': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2992': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2993': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2994': ['Arbitrary code execution as user of application'], 'CVE-2017-2995': ['Arbitrary code execution as user of application'], 'CVE-2017-2996': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2997': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2998': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-2999': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3000': ['Application confidentiality loss'], 'CVE-2017-3001': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3002': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3003': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3004': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3005': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3006': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3007': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3009': ['Application confidentiality loss'], 'CVE-2017-3010': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3011': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3012': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3013': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3014': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3015': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3017': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3018': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3019': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3023': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3024': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3025': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3026': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3027': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3028': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3030': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3034': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3035': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3036': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3037': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3038': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3039': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3040': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3041': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3042': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3044': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3047': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3048': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3049': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3050': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3051': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3054': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3055': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3056': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3057': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3058': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3059': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3060': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3061': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3062': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3063': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3064': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3065': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3066': ['Arbitrary code execution as user of application'], 'CVE-2017-3067': ['Application confidentiality loss'], 'CVE-2017-3068': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3069': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3070': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3071': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3072': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3073': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3074': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3075': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3076': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3077': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3078': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3079': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3081': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3082': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3083': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3084': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3086': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3087': ['Application confidentiality loss'], 'CVE-2017-3088': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3089': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3090': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3092': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3093': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3094': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3095': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3096': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3097': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3098': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3101': ['Application integrity loss'], 'CVE-2017-3134': ['Privilege escalation on system'], 'CVE-2017-3159': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3162': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3167': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3169': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3204': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3214': ['Application confidentiality loss'], 'CVE-2017-3216': ['Gain root/system/administrator privileges on system'], 'CVE-2017-3218': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-3219': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3221': ['Gain privileges on application'], 'CVE-2017-3222': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3230': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3233': ['System integrity loss'], 'CVE-2017-3234': ['Gain privileges on application'], 'CVE-2017-3237': ['Privilege escalation on system'], 'CVE-2017-3241': ['Gain privileges on application'], 'CVE-2017-3248': ['Gain privileges on application'], 'CVE-2017-3249': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3250': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3253': ['Application availability loss'], 'CVE-2017-3254': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3260': ['Arbitrary code execution as user of application'], 'CVE-2017-3263': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3266': ['Gain privileges on application'], 'CVE-2017-3267': ['Application availability loss'], 'CVE-2017-3268': ['Application availability loss'], 'CVE-2017-3269': ['Application availability loss'], 'CVE-2017-3270': ['Application availability loss'], 'CVE-2017-3271': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3272': ['Arbitrary code execution as user of application'], 'CVE-2017-3274': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3275': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3278': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3279': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3284': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3285': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3287': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3289': ['Arbitrary code execution as user of application'], 'CVE-2017-3290': ['Application availability loss', 'Application integrity loss'], 'CVE-2017-3293': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3294': ['Application availability loss'], 'CVE-2017-3295': ['Application availability loss'], 'CVE-2017-3302': ['Application availability loss'], 'CVE-2017-3303': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3306': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3308': ['Application availability loss'], 'CVE-2017-3309': ['Application availability loss'], 'CVE-2017-3310': ['Gain privileges on application'], 'CVE-2017-3316': ['Gain privileges on application'], 'CVE-2017-3324': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3325': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3326': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3327': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3328': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3329': ['Application availability loss'], 'CVE-2017-3330': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3332': ['Application availability loss', 'Application integrity loss'], 'CVE-2017-3333': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3334': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3335': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3336': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3337': ['System integrity loss', 'System confidentiality loss'], 'CVE-2017-3338': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3339': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3340': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3341': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3342': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3343': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3344': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3345': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3346': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3347': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3348': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3349': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3350': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3351': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3352': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3353': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3354': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3355': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3356': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3357': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3358': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3359': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3360': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3361': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3362': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3363': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3364': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3365': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3366': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3367': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3368': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3369': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3370': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3371': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3372': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3373': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3374': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3375': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3376': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3377': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3378': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3379': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3380': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3381': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3382': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3383': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3384': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3385': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3386': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3387': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3388': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3389': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3390': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3391': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3392': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3393': ['System integrity loss', 'System confidentiality loss'], 'CVE-2017-3394': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3395': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3396': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3397': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3398': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3399': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3400': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3401': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3402': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3403': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3404': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3405': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3406': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3407': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3408': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3409': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3410': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3411': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3412': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3413': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3414': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3415': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3416': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3417': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3418': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3419': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3420': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3421': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3422': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3423': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3424': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3425': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3426': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3427': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3428': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3429': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3430': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3431': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3432': ['System integrity loss', 'System confidentiality loss'], 'CVE-2017-3433': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3434': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3435': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3436': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3437': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3438': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3439': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3440': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3441': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3442': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3443': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3450': ['Application availability loss'], 'CVE-2017-3472': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3476': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3486': ['Gain privileges on application'], 'CVE-2017-3493': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3497': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3499': ['System confidentiality loss'], 'CVE-2017-3500': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3503': ['Gain privileges on application'], 'CVE-2017-3506': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3507': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3508': ['Gain privileges on application'], 'CVE-2017-3510': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3511': ['Gain privileges on application'], 'CVE-2017-3512': ['Arbitrary code execution as user of application'], 'CVE-2017-3514': ['Arbitrary code execution as user of application'], 'CVE-2017-3516': ['System availability loss'], 'CVE-2017-3518': ['Application availability loss'], 'CVE-2017-3519': ['System confidentiality loss'], 'CVE-2017-3523': ['Gain privileges on application'], 'CVE-2017-3531': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-3538': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3540': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3541': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3542': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3543': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3545': ['System integrity loss', 'System confidentiality loss'], 'CVE-2017-3547': ['System integrity loss'], 'CVE-2017-3549': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3550': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3553': ['Gain privileges on application'], 'CVE-2017-3554': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3555': ['Application availability loss'], 'CVE-2017-3557': ['System integrity loss', 'System confidentiality loss'], 'CVE-2017-3558': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3559': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3561': ['Gain privileges on application'], 'CVE-2017-3563': ['Gain privileges on application'], 'CVE-2017-3564': ['Privilege escalation on system'], 'CVE-2017-3565': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-3572': ['Application availability loss'], 'CVE-2017-3574': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3575': ['Application availability loss', 'Application integrity loss'], 'CVE-2017-3576': ['Gain privileges on application'], 'CVE-2017-3578': ['Gain privileges on application'], 'CVE-2017-3580': ['Gain privileges on application'], 'CVE-2017-3581': ['Gain privileges on application'], 'CVE-2017-3582': ['Gain privileges on application'], 'CVE-2017-3583': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3584': ['Gain privileges on application'], 'CVE-2017-3587': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-3591': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3593': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3595': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3596': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3599': ['System availability loss'], 'CVE-2017-3601': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3602': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3604': ['Gain privileges on application'], 'CVE-2017-3605': ['Gain privileges on application'], 'CVE-2017-3606': ['Gain privileges on application'], 'CVE-2017-3607': ['Gain privileges on application'], 'CVE-2017-3608': ['Gain privileges on application'], 'CVE-2017-3609': ['Gain privileges on application'], 'CVE-2017-3610': ['Gain privileges on application'], 'CVE-2017-3611': ['Gain privileges on application'], 'CVE-2017-3612': ['Gain privileges on application'], 'CVE-2017-3613': ['Gain privileges on application'], 'CVE-2017-3614': ['Gain privileges on application'], 'CVE-2017-3615': ['Gain privileges on application'], 'CVE-2017-3616': ['Gain privileges on application'], 'CVE-2017-3617': ['Gain privileges on application'], 'CVE-2017-3618': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-3620': ['Gain privileges on application'], 'CVE-2017-3621': ['Application availability loss'], 'CVE-2017-3622': ['Privilege escalation on system'], 'CVE-2017-3623': ['Gain root/system/administrator privileges on system'], 'CVE-2017-3625': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-3629': ['Privilege escalation on system'], 'CVE-2017-3730': ['Application availability loss'], 'CVE-2017-3731': ['Application availability loss'], 'CVE-2017-3733': ['Application availability loss'], 'CVE-2017-3743': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3745': ['Gain privileges on application'], 'CVE-2017-3748': ['Privilege escalation on system'], 'CVE-2017-3790': ['System availability loss'], 'CVE-2017-3791': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3792': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3794': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-3796': ['Arbitrary code execution as user of application'], 'CVE-2017-3801': ['Gain privileges on application'], 'CVE-2017-3807': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-3808': ['System availability loss'], 'CVE-2017-3813': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3819': ['Privilege escalation on system'], 'CVE-2017-3823': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3825': ['Application availability loss'], 'CVE-2017-3826': ['System availability loss'], 'CVE-2017-3830': ['System availability loss'], 'CVE-2017-3831': ['Gain root/system/administrator privileges on system'], 'CVE-2017-3832': ['System availability loss', ], 'CVE-2017-3834': ['Gain root/system/administrator privileges on system'], 'CVE-2017-3835': ['Arbitrary code execution as user of application'], 'CVE-2017-3837': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-3841': ['Application confidentiality loss'], 'CVE-2017-3846': ['Application confidentiality loss'], 'CVE-2017-3849': ['System availability loss'], 'CVE-2017-3851': ['Application confidentiality loss'], 'CVE-2017-3852': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-3853': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3854': ['Gain root/system/administrator privileges on system'], 'CVE-2017-3856': ['System availability loss'], 'CVE-2017-3857': ['System availability loss'], 'CVE-2017-3858': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3859': ['System availability loss'], 'CVE-2017-3860': ['System availability loss'], 'CVE-2017-3861': ['System availability loss'], 'CVE-2017-3862': ['System availability loss'], 'CVE-2017-3863': ['System availability loss'], 'CVE-2017-3864': ['System availability loss'], 'CVE-2017-3873': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3876': ['System availability loss'], 'CVE-2017-3881': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3882': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-3980': ['Arbitrary code execution as user of application'], 'CVE-2017-4014': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-4052': ['Gain privileges on application'], 'CVE-2017-4053': ['Arbitrary code execution as user of application'], 'CVE-2017-4054': ['Arbitrary code execution as user of application'], 'CVE-2017-4055': ['Application integrity loss'], 'CVE-2017-4057': ['Gain privileges on application'], 'CVE-2017-4895': ['Gain privileges on application'], 'CVE-2017-4898': ['Privilege escalation on system'], 'CVE-2017-4901': ['Arbitrary code execution as user of application'], 'CVE-2017-4902': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4903': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4904': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4907': ['Arbitrary code execution as user of application'], 'CVE-2017-4908': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4909': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4910': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4911': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4912': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4913': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4914': ['Arbitrary code execution as user of application'], 'CVE-2017-4915': ['Privilege escalation on system'], 'CVE-2017-4917': ['Gain privileges on application'], 'CVE-2017-4918': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4955': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-4959': ['Gain privileges on application'], 'CVE-2017-4960': ['Application availability loss'], 'CVE-2017-4961': ['Gain privileges on application'], 'CVE-2017-4963': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-4964': ['Arbitrary code execution as user of application'], 'CVE-2017-4966': ['Gain privileges on application'], 'CVE-2017-4972': ['Application confidentiality loss'], 'CVE-2017-4973': ['Gain privileges on application'], 'CVE-2017-4975': ['Application integrity loss'], 'CVE-2017-4976': ['Gain user privileges on system'], 'CVE-2017-4977': ['System confidentiality loss'], 'CVE-2017-4979': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-4980': ['System confidentiality loss'], 'CVE-2017-4981': ['Application availability loss'], 'CVE-2017-4982': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-4984': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4985': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4987': ['Arbitrary code execution as user of application'], 'CVE-2017-4988': ['Privilege escalation on system'], 'CVE-2017-4989': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-4990': ['Arbitrary code execution as user of application'], 'CVE-2017-4991': ['Gain privileges on application'], 'CVE-2017-4992': ['Gain privileges on application'], 'CVE-2017-4994': ['Application integrity loss'], 'CVE-2017-4997': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-4998': ['Gain privileges on application'], 'CVE-2017-5005': ['Arbitrary code execution as user of application'], 'CVE-2017-5009': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5012': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5029': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5030': ['Arbitrary code execution as user of application'], 'CVE-2017-5031': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5032': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5034': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5035': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5036': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5037': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5039': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5043': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5047': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5048': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5049': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5050': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5051': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5135': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-5136': ['System availability loss'], 'CVE-2017-5139': ['Gain user privileges on system'], 'CVE-2017-5140': ['Gain user privileges on system'], 'CVE-2017-5142': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5143': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5144': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5145': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5146': ['System confidentiality loss'], 'CVE-2017-5149': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5151': ['Arbitrary code execution as user of application'], 'CVE-2017-5152': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5153': ['Gain privileges on application'], 'CVE-2017-5154': ['Arbitrary code execution as user of application'], 'CVE-2017-5155': ['Gain privileges on application'], 'CVE-2017-5156': ['Gain privileges on application'], 'CVE-2017-5158': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5159': ['Gain privileges on application'], 'CVE-2017-5161': ['Privilege escalation on system'], 'CVE-2017-5162': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5165': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5166': ['Gain user privileges on system'], 'CVE-2017-5167': ['Gain user privileges on system'], 'CVE-2017-5168': ['Arbitrary code execution as user of application'], 'CVE-2017-5169': ['Gain root/system/administrator privileges on system'], 'CVE-2017-5173': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5174': ['Arbitrary code execution as user of application'], 'CVE-2017-5176': ['Gain root/system/administrator privileges on system'], 'CVE-2017-5177': ['Arbitrary code execution as user of application'], 'CVE-2017-5178': ['Gain root/system/administrator privileges on system'], 'CVE-2017-5180': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5182': ['System confidentiality loss'], 'CVE-2017-5184': ['Application confidentiality loss'], 'CVE-2017-5185': ['Application availability loss'], 'CVE-2017-5186': ['Application availability loss'], 'CVE-2017-5193': ['Application availability loss'], 'CVE-2017-5194': ['Application availability loss'], 'CVE-2017-5195': ['Application availability loss'], 'CVE-2017-5196': ['Application availability loss'], 'CVE-2017-5198': ['Privilege escalation on system'], 'CVE-2017-5199': ['Arbitrary code execution as user of application'], 'CVE-2017-5202': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5203': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5204': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5205': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5206': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5207': ['Privilege escalation on system'], 'CVE-2017-5209': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-5214': ['Application confidentiality loss'], 'CVE-2017-5215': ['Arbitrary code execution as user of application'], 'CVE-2017-5218': ['Arbitrary code execution as user of application'], 'CVE-2017-5219': ['Gain root/system/administrator privileges on system'], 'CVE-2017-5225': ['Arbitrary code execution as user of application'], 'CVE-2017-5226': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5227': ['Gain user privileges on system'], 'CVE-2017-5228': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5229': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5230': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5231': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5232': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5233': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5234': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5235': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5236': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5237': ['System availability loss'], 'CVE-2017-5239': ['System confidentiality loss'], 'CVE-2017-5240': ['Application availability loss'], 'CVE-2017-5243': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5328': ['Application integrity loss'], 'CVE-2017-5329': ['Gain privileges on application'], 'CVE-2017-5330': ['Arbitrary code execution as user of application'], 'CVE-2017-5334': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5335': ['Application availability loss'], 'CVE-2017-5336': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5337': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5340': ['Arbitrary code execution as user of application'], 'CVE-2017-5341': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5342': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5344': ['Arbitrary code execution as user of application'], 'CVE-2017-5345': ['Arbitrary code execution as user of application'], 'CVE-2017-5346': ['Arbitrary code execution as user of application'], 'CVE-2017-5347': ['Arbitrary code execution as user of application'], 'CVE-2017-5350': ['System availability loss'], 'CVE-2017-5351': ['System availability loss'], 'CVE-2017-5356': ['Application availability loss'], 'CVE-2017-5357': ['Application availability loss'], 'CVE-2017-5358': ['Arbitrary code execution as user of application'], 'CVE-2017-5359': ['Application availability loss'], 'CVE-2017-5364': ['Arbitrary code execution as user of application'], 'CVE-2017-5368': ['Gain privileges on application'], 'CVE-2017-5371': ['Application availability loss'], 'CVE-2017-5372': ['System confidentiality loss'], 'CVE-2017-5461': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5473': ['Gain privileges on application'], 'CVE-2017-5475': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5476': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5480': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5481': ['Gain privileges on application'], 'CVE-2017-5482': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5483': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5484': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5485': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5486': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5489': ['Gain privileges on application'], 'CVE-2017-5492': ['Gain privileges on application'], 'CVE-2017-5493': ['Application integrity loss'], 'CVE-2017-5495': ['System availability loss'], 'CVE-2017-5496': ['Gain privileges on application'], 'CVE-2017-5506': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5507': ['System availability loss'], 'CVE-2017-5509': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5510': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5511': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5517': ['Arbitrary code execution as user of application'], 'CVE-2017-5518': ['Application integrity loss'], 'CVE-2017-5519': ['Arbitrary code execution as user of application'], 'CVE-2017-5520': ['Arbitrary code execution as user of application'], 'CVE-2017-5521': ['Gain user privileges on system'], 'CVE-2017-5522': ['Arbitrary code execution as user of application'], 'CVE-2017-5528': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5538': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5539': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5543': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5545': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-5546': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5547': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5548': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5554': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5556': ['Arbitrary code execution as user of application'], 'CVE-2017-5563': ['Arbitrary code execution as user of application'], 'CVE-2017-5569': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5570': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-5574': ['Arbitrary code execution as user of application'], 'CVE-2017-5575': ['Arbitrary code execution as user of application'], 'CVE-2017-5576': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5580': ['Application availability loss'], 'CVE-2017-5581': ['Arbitrary code execution as user of application'], 'CVE-2017-5585': ['Arbitrary code execution as user of application'], 'CVE-2017-5586': ['Arbitrary code execution as user of application'], 'CVE-2017-5594': ['Gain privileges on application'], 'CVE-2017-5596': ['Application availability loss'], 'CVE-2017-5597': ['Application availability loss'], 'CVE-2017-5598': ['Application confidentiality loss'], 'CVE-2017-5600': ['Gain privileges on application'], 'CVE-2017-5601': ['Application availability loss'], 'CVE-2017-5609': ['Arbitrary code execution as user of application'], 'CVE-2017-5611': ['Arbitrary code execution as user of application'], 'CVE-2017-5613': ['Arbitrary code execution as user of application'], 'CVE-2017-5617': ['Application integrity loss'], 'CVE-2017-5618': ['Privilege escalation on system'], 'CVE-2017-5619': ['Gain privileges on application'], 'CVE-2017-5624': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5626': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5627': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5628': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5630': ['Application integrity loss'], 'CVE-2017-5633': ['Privilege escalation on system'], 'CVE-2017-5638': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5640': ['Gain privileges on application'], 'CVE-2017-5642': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5643': ['Application integrity loss'], 'CVE-2017-5645': ['Arbitrary code execution as user of application'], 'CVE-2017-5647': ['Application confidentiality loss'], 'CVE-2017-5648': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5649': ['Application confidentiality loss'], 'CVE-2017-5650': ['Application availability loss'], 'CVE-2017-5651': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5652': ['Application confidentiality loss'], 'CVE-2017-5654': ['System confidentiality loss'], 'CVE-2017-5656': ['Application confidentiality loss'], 'CVE-2017-5657': ['Arbitrary code execution as user of application'], 'CVE-2017-5659': ['Application availability loss'], 'CVE-2017-5661': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-5662': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-5664': ['Application integrity loss'], 'CVE-2017-5668': ['Arbitrary code execution as user of application'], 'CVE-2017-5669': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5671': ['Privilege escalation on system'], 'CVE-2017-5674': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5675': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5677': ['Arbitrary code execution as user of application'], 'CVE-2017-5681': ['Application confidentiality loss'], 'CVE-2017-5682': ['Privilege escalation on system'], 'CVE-2017-5683': ['Privilege escalation on system'], 'CVE-2017-5689': ['Gain root/system/administrator privileges on system'], 'CVE-2017-5830': ['Arbitrary code execution as user of application'], 'CVE-2017-5835': ['Application availability loss'], 'CVE-2017-5836': ['Application availability loss'], 'CVE-2017-5838': ['Application availability loss'], 'CVE-2017-5839': ['Application availability loss'], 'CVE-2017-5840': ['Application availability loss'], 'CVE-2017-5841': ['Application availability loss'], 'CVE-2017-5843': ['Application availability loss'], 'CVE-2017-5845': ['Application availability loss'], 'CVE-2017-5847': ['Application availability loss'], 'CVE-2017-5848': ['Application availability loss'], 'CVE-2017-5850': ['System availability loss'], 'CVE-2017-5853': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5859': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5869': ['Arbitrary code execution as user of application'], 'CVE-2017-5872': ['Application availability loss'], 'CVE-2017-5874': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5878': ['Arbitrary code execution as user of application'], 'CVE-2017-5879': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5881': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5884': ['Arbitrary code execution as user of application'], 'CVE-2017-5885': ['Arbitrary code execution as user of application'], 'CVE-2017-5886': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5887': ['Application integrity loss'], 'CVE-2017-5891': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-5892': ['System confidentiality loss'], 'CVE-2017-5897': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-5899': ['Privilege escalation on system'], 'CVE-2017-5923': ['Application availability loss'], 'CVE-2017-5924': ['Application availability loss'], 'CVE-2017-5925': ['System confidentiality loss'], 'CVE-2017-5926': ['System confidentiality loss'], 'CVE-2017-5927': ['System confidentiality loss'], 'CVE-2017-5929': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5931': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-5932': ['Gain privileges on application'], 'CVE-2017-5936': ['Application integrity loss'], 'CVE-2017-5940': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5941': ['Arbitrary code execution as user of application'], 'CVE-2017-5943': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5944': ['Arbitrary code execution as user of application'], 'CVE-2017-5946': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5949': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5953': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-5954': ['Arbitrary code execution as user of application'], 'CVE-2017-5959': ['Gain privileges on application'], 'CVE-2017-5970': ['System availability loss'], 'CVE-2017-5972': ['System availability loss'], 'CVE-2017-5982': ['Application confidentiality loss'], 'CVE-2017-5983': ['Arbitrary code execution as user of application'], 'CVE-2017-5988': ['Application availability loss'], 'CVE-2017-5991': ['Application availability loss'], 'CVE-2017-5992': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-5995': ['Application confidentiality loss'], 'CVE-2017-5997': ['Application availability loss'], 'CVE-2017-5999': ['System confidentiality loss'], 'CVE-2017-6001': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6002': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6004': ['Application availability loss'], 'CVE-2017-6013': ['Arbitrary code execution as user of application'], 'CVE-2017-6014': ['System availability loss'], 'CVE-2017-6016': ['Gain privileges on application'], 'CVE-2017-6017': ['System availability loss'], 'CVE-2017-6019': ['System availability loss'], 'CVE-2017-6022': ['Gain privileges on application'], 'CVE-2017-6023': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6025': ['Arbitrary code execution as user of application'], 'CVE-2017-6026': ['System confidentiality loss', 'System integrity loss'], 'CVE-2017-6027': ['Arbitrary code execution as user of application'], 'CVE-2017-6028': ['System confidentiality loss'], 'CVE-2017-6030': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-6031': ['Arbitrary code execution as user of application'], 'CVE-2017-6033': ['Arbitrary code execution as user of application'], 'CVE-2017-6034': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6035': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6037': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6038': ['System integrity loss', 'System availability loss'], 'CVE-2017-6041': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6042': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6043': ['System availability loss'], 'CVE-2017-6044': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6045': ['Application confidentiality loss'], 'CVE-2017-6046': ['System confidentiality loss'], 'CVE-2017-6048': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6050': ['Arbitrary code execution as user of application'], 'CVE-2017-6051': ['Arbitrary code execution as user of application'], 'CVE-2017-6054': ['Application confidentiality loss'], 'CVE-2017-6055': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6056': ['Application availability loss'], 'CVE-2017-6058': ['Application availability loss'], 'CVE-2017-6059': ['Application integrity loss'], 'CVE-2017-6060': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6062': ['Application integrity loss'], 'CVE-2017-6065': ['Arbitrary code execution as user of application'], 'CVE-2017-6066': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6068': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6069': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6070': ['Arbitrary code execution as user of application'], 'CVE-2017-6074': ['Privilege escalation on system'], 'CVE-2017-6077': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6079': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6080': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6081': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6086': ['Gain privileges on application'], 'CVE-2017-6087': ['Arbitrary code execution as user of application'], 'CVE-2017-6088': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6095': ['Arbitrary code execution as user of application'], 'CVE-2017-6096': ['Arbitrary code execution as user of application'], 'CVE-2017-6097': ['Arbitrary code execution as user of application'], 'CVE-2017-6098': ['Arbitrary code execution as user of application'], 'CVE-2017-6100': ['Application confidentiality loss'], 'CVE-2017-6104': ['Application integrity loss'], 'CVE-2017-6127': ['Gain user privileges on system'], 'CVE-2017-6128': ['Application availability loss'], 'CVE-2017-6130': ['Application integrity loss'], 'CVE-2017-6131': ['Gain privileges on application'], 'CVE-2017-6178': ['Gain privileges on application'], 'CVE-2017-6180': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6181': ['Application availability loss'], 'CVE-2017-6182': ['Arbitrary code execution as user of application'], 'CVE-2017-6183': ['Arbitrary code execution as user of application'], 'CVE-2017-6187': ['Arbitrary code execution as user of application'], 'CVE-2017-6189': ['Arbitrary code execution as user of application'], 'CVE-2017-6190': ['System confidentiality loss'], 'CVE-2017-6191': ['Arbitrary code execution as user of application'], 'CVE-2017-6194': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6195': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6196': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6205': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6206': ['System confidentiality loss'], 'CVE-2017-6214': ['System availability loss'], 'CVE-2017-6247': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6248': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6249': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6250': ['Arbitrary code execution as user of application'], 'CVE-2017-6298': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6300': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6301': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6302': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6303': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6304': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6305': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6306': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6307': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6308': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6309': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6310': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6311': ['Application availability loss'], 'CVE-2017-6316': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6318': ['Application confidentiality loss'], 'CVE-2017-6319': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6324': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6326': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6334': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6342': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6343': ['System availability loss', 'System integrity loss', 'System confidentiality loss'], 'CVE-2017-6345': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6346': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6347': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6349': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6350': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6351': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6359': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6360': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6361': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6366': ['Gain user privileges on system'], 'CVE-2017-6367': ['Application availability loss'], 'CVE-2017-6369': ['Arbitrary code execution as user of application'], 'CVE-2017-6377': ['Application integrity loss'], 'CVE-2017-6379': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6381': ['Arbitrary code execution as user of application'], 'CVE-2017-6384': ['System availability loss'], 'CVE-2017-6398': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6399': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6400': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6401': ['Arbitrary code execution as user of application'], 'CVE-2017-6403': ['Gain privileges on application'], 'CVE-2017-6405': ['Application integrity loss'], 'CVE-2017-6406': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6407': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6408': ['Gain privileges on application'], 'CVE-2017-6409': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6411': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-6412': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6413': ['Application integrity loss'], 'CVE-2017-6416': ['Arbitrary code execution as user of application'], 'CVE-2017-6427': ['Application availability loss'], 'CVE-2017-6429': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6432': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6438': ['Arbitrary code execution as user of application'], 'CVE-2017-6441': ['Application availability loss'], 'CVE-2017-6444': ['System availability loss'], 'CVE-2017-6445': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6448': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6451': ['Arbitrary code execution as user of application'], 'CVE-2017-6452': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6455': ['Gain privileges on application'], 'CVE-2017-6458': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6460': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6462': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6465': ['Arbitrary code execution as user of application'], 'CVE-2017-6466': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6467': ['Application availability loss'], 'CVE-2017-6468': ['Application availability loss'], 'CVE-2017-6469': ['Application availability loss'], 'CVE-2017-6470': ['System availability loss'], 'CVE-2017-6471': ['Application availability loss'], 'CVE-2017-6472': ['Application availability loss'], 'CVE-2017-6473': ['Application availability loss'], 'CVE-2017-6474': ['Application availability loss'], 'CVE-2017-6492': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6497': ['Application availability loss'], 'CVE-2017-6506': ['Arbitrary code execution as user of application'], 'CVE-2017-6510': ['Application confidentiality loss'], 'CVE-2017-6513': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6517': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6519': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-6520': ['System availability loss', 'System confidentiality loss'], 'CVE-2017-6526': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6527': ['System confidentiality loss'], 'CVE-2017-6528': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6529': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6530': ['Gain user privileges on system'], 'CVE-2017-6531': ['System confidentiality loss'], 'CVE-2017-6532': ['System confidentiality loss'], 'CVE-2017-6542': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6543': ['Gain user privileges on system'], 'CVE-2017-6548': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6549': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6550': ['Arbitrary code execution as user of application'], 'CVE-2017-6551': ['Arbitrary code execution as user of application'], 'CVE-2017-6552': ['System availability loss'], 'CVE-2017-6553': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6554': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6557': ['Arbitrary code execution as user of application'], 'CVE-2017-6558': ['System confidentiality loss'], 'CVE-2017-6565': ['Arbitrary code execution as user of application'], 'CVE-2017-6570': ['Arbitrary code execution as user of application'], 'CVE-2017-6571': ['Arbitrary code execution as user of application'], 'CVE-2017-6572': ['Arbitrary code execution as user of application'], 'CVE-2017-6573': ['Arbitrary code execution as user of application'], 'CVE-2017-6574': ['Arbitrary code execution as user of application'], 'CVE-2017-6575': ['Arbitrary code execution as user of application'], 'CVE-2017-6576': ['Arbitrary code execution as user of application'], 'CVE-2017-6577': ['Arbitrary code execution as user of application'], 'CVE-2017-6578': ['Arbitrary code execution as user of application'], 'CVE-2017-6597': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6600': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6601': ['Arbitrary code execution as user of application'], 'CVE-2017-6607': ['System availability loss', 'System integrity loss'], 'CVE-2017-6608': ['System availability loss'], 'CVE-2017-6609': ['System availability loss'], 'CVE-2017-6610': ['System availability loss'], 'CVE-2017-6616': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6619': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6621': ['Gain privileges on application'], 'CVE-2017-6622': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6623': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6625': ['System availability loss', 'System integrity loss'], 'CVE-2017-6632': ['System availability loss'], 'CVE-2017-6633': ['System availability loss'], 'CVE-2017-6634': ['Gain user privileges on system'], 'CVE-2017-6638': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6639': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6640': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6641': ['System availability loss'], 'CVE-2017-6648': ['System availability loss'], 'CVE-2017-6649': ['Arbitrary code execution as user of application'], 'CVE-2017-6650': ['Arbitrary code execution as user of application'], 'CVE-2017-6651': ['Application confidentiality loss'], 'CVE-2017-6652': ['System confidentiality loss'], 'CVE-2017-6653': ['System availability loss'], 'CVE-2017-6657': ['Application availability loss'], 'CVE-2017-6658': ['Application availability loss'], 'CVE-2017-6659': ['Arbitrary code execution as user of application'], 'CVE-2017-6662': ['Arbitrary code execution as user of application'], 'CVE-2017-6667': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6669': ['Arbitrary code execution as user of application'], 'CVE-2017-6671': ['System integrity loss'], 'CVE-2017-6674': ['System integrity loss'], 'CVE-2017-6678': ['System availability loss'], 'CVE-2017-6680': ['System integrity loss'], 'CVE-2017-6681': ['System confidentiality loss'], 'CVE-2017-6682': ['Arbitrary code execution as user of application'], 'CVE-2017-6683': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6684': ['Privilege escalation on system'], 'CVE-2017-6685': ['Gain user privileges on system'], 'CVE-2017-6686': ['Gain user privileges on system'], 'CVE-2017-6687': ['Gain user privileges on system'], 'CVE-2017-6688': ['Privilege escalation on system'], 'CVE-2017-6689': ['Gain user privileges on system'], 'CVE-2017-6692': ['Privilege escalation on system'], 'CVE-2017-6707': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6708': ['Arbitrary code execution as user of application'], 'CVE-2017-6709': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-6711': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-6712': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6713': ['Gain root/system/administrator privileges on system'], 'CVE-2017-6714': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6728': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6729': ['Application availability loss'], 'CVE-2017-6731': ['System availability loss'], 'CVE-2017-6736': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6737': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6738': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6739': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6740': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6741': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6742': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6743': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6744': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6750': ['Gain user privileges on system'], 'CVE-2017-6751': ['Application integrity loss'], 'CVE-2017-6753': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6798': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6800': ['Application availability loss'], 'CVE-2017-6801': ['Application availability loss'], 'CVE-2017-6802': ['Application availability loss'], 'CVE-2017-6803': ['Arbitrary code execution as user of application'], 'CVE-2017-6813': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6821': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6823': ['Gain privileges on application'], 'CVE-2017-6827': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6828': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6843': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6844': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6852': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6862': ['Arbitrary code execution as user of application'], 'CVE-2017-6868': ['Gain privileges on application'], 'CVE-2017-6874': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6880': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6884': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6885': ['Gain privileges on application'], 'CVE-2017-6886': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6887': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6889': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6890': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6891': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6892': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6895': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6896': ['Gain user privileges on system'], 'CVE-2017-6903': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6914': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-6919': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6949': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6950': ['Arbitrary code execution as user of application'], 'CVE-2017-6952': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-6953': ['Arbitrary code execution as user of application'], 'CVE-2017-6956': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6957': ['Arbitrary code execution as user of application'], 'CVE-2017-6960': ['Application availability loss'], 'CVE-2017-6962': ['Application availability loss'], 'CVE-2017-6964': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6967': ['Gain privileges on application'], 'CVE-2017-6968': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6969': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-6970': ['Arbitrary code execution as user of application'], 'CVE-2017-6971': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6972': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6977': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6978': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6979': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6980': ['Arbitrary code execution as user of application'], 'CVE-2017-6981': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6983': ['Arbitrary code execution as user of application'], 'CVE-2017-6984': ['Arbitrary code execution as user of application'], 'CVE-2017-6985': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6986': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-6989': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6991': ['Arbitrary code execution as user of application'], 'CVE-2017-6994': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6995': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6996': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6997': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6998': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-6999': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7007': ['System availability loss'], 'CVE-2017-7008': ['Arbitrary code execution as user of application'], 'CVE-2017-7009': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7010': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7012': ['Arbitrary code execution as user of application'], 'CVE-2017-7013': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7014': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7015': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7016': ['Arbitrary code execution as user of application'], 'CVE-2017-7017': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7018': ['Arbitrary code execution as user of application'], 'CVE-2017-7019': ['Arbitrary code execution as user of application'], 'CVE-2017-7020': ['Arbitrary code execution as user of application'], 'CVE-2017-7021': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7022': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7023': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7024': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7025': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7026': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7027': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7030': ['Arbitrary code execution as user of application'], 'CVE-2017-7031': ['Arbitrary code execution as user of application'], 'CVE-2017-7032': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7033': ['Arbitrary code execution as user of application'], 'CVE-2017-7034': ['Arbitrary code execution as user of application'], 'CVE-2017-7035': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7037': ['Arbitrary code execution as user of application'], 'CVE-2017-7039': ['Arbitrary code execution as user of application'], 'CVE-2017-7040': ['Arbitrary code execution as user of application'], 'CVE-2017-7041': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7042': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7043': ['Arbitrary code execution as user of application'], 'CVE-2017-7044': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7046': ['Arbitrary code execution as user of application'], 'CVE-2017-7047': ['Arbitrary code execution as user of application'], 'CVE-2017-7048': ['Arbitrary code execution as user of application'], 'CVE-2017-7049': ['Arbitrary code execution as user of application'], 'CVE-2017-7050': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7051': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7052': ['Arbitrary code execution as user of application'], 'CVE-2017-7053': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7054': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7055': ['Arbitrary code execution as user of application'], 'CVE-2017-7056': ['Arbitrary code execution as user of application'], 'CVE-2017-7061': ['Arbitrary code execution as user of application'], 'CVE-2017-7062': ['Arbitrary code execution as user of application'], 'CVE-2017-7063': ['System availability loss'], 'CVE-2017-7068': ['Arbitrary code execution as user of application'], 'CVE-2017-7069': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7174': ['Arbitrary code execution as user of application'], 'CVE-2017-7175': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7177': ['Application integrity loss'], 'CVE-2017-7178': ['Arbitrary code execution as user of application'], 'CVE-2017-7180': ['Privilege escalation on system'], 'CVE-2017-7183': ['Application availability loss'], 'CVE-2017-7184': ['Privilege escalation on system'], 'CVE-2017-7185': ['Application availability loss'], 'CVE-2017-7186': ['Application availability loss'], 'CVE-2017-7187': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7191': ['Arbitrary code execution as user of application'], 'CVE-2017-7192': ['Application integrity loss'], 'CVE-2017-7199': ['Privilege escalation on system'], 'CVE-2017-7206': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7208': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7213': ['Gain root/system/administrator privileges on system'], 'CVE-2017-7214': ['Gain privileges on application'], 'CVE-2017-7218': ['Gain user privileges on system'], 'CVE-2017-7219': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7220': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7221': ['Arbitrary code execution as user of application'], 'CVE-2017-7223': ['Application availability loss'], 'CVE-2017-7225': ['Application availability loss'], 'CVE-2017-7226': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7227': ['Application availability loss'], 'CVE-2017-7228': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7229': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7230': ['Arbitrary code execution as user of application'], 'CVE-2017-7231': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7235': ['Arbitrary code execution as user of application'], 'CVE-2017-7236': ['Arbitrary code execution as user of application'], 'CVE-2017-7237': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7239': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7240': ['System confidentiality loss'], 'CVE-2017-7243': ['Application availability loss'], 'CVE-2017-7245': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7246': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7253': ['Privilege escalation on system'], 'CVE-2017-7258': ['Arbitrary code execution as user of application'], 'CVE-2017-7263': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7264': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7269': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7272': ['Application integrity loss'], 'CVE-2017-7277': ['System confidentiality loss', 'System availability loss'], 'CVE-2017-7279': ['Gain root/system/administrator privileges on system'], 'CVE-2017-7280': ['Arbitrary code execution as user of application'], 'CVE-2017-7281': ['Arbitrary code execution as user of application'], 'CVE-2017-7283': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7284': ['Gain privileges on application'], 'CVE-2017-7285': ['System availability loss'], 'CVE-2017-7290': ['Arbitrary code execution as user of application'], 'CVE-2017-7293': ['Privilege escalation on system'], 'CVE-2017-7294': ['Privilege escalation on system'], 'CVE-2017-7295': ['System availability loss'], 'CVE-2017-7297': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7300': ['Application availability loss'], 'CVE-2017-7301': ['Application availability loss'], 'CVE-2017-7302': ['Application availability loss'], 'CVE-2017-7303': ['Application availability loss'], 'CVE-2017-7304': ['Application availability loss'], 'CVE-2017-7308': ['Privilege escalation on system'], 'CVE-2017-7310': ['Arbitrary code execution as user of application'], 'CVE-2017-7312': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7313': ['Application confidentiality loss'], 'CVE-2017-7314': ['Application confidentiality loss'], 'CVE-2017-7315': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7317': ['Gain root/system/administrator privileges on system'], 'CVE-2017-7318': ['Arbitrary code execution as user of application'], 'CVE-2017-7321': ['Arbitrary code execution as user of application'], 'CVE-2017-7322': ['Arbitrary code execution as user of application'], 'CVE-2017-7323': ['Arbitrary code execution as user of application'], 'CVE-2017-7324': ['Arbitrary code execution as user of application'], 'CVE-2017-7336': ['Arbitrary code execution as user of application', ], 'CVE-2017-7337': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7338': ['Application confidentiality loss'], 'CVE-2017-7357': ['Arbitrary code execution as user of application'], 'CVE-2017-7358': ['Privilege escalation on system'], 'CVE-2017-7365': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7367': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7368': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7369': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7370': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7371': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7372': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7373': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7374': ['Privilege escalation on system'], 'CVE-2017-7392': ['Application availability loss'], 'CVE-2017-7393': ['Arbitrary code execution as user of application'], 'CVE-2017-7394': ['Application availability loss'], 'CVE-2017-7396': ['Application availability loss'], 'CVE-2017-7397': ['System availability loss'], 'CVE-2017-7398': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7401': ['Application availability loss'], 'CVE-2017-7402': ['Arbitrary code execution as user of application'], 'CVE-2017-7404': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7405': ['Gain user privileges on system'], 'CVE-2017-7406': ['Gain user privileges on system'], 'CVE-2017-7408': ['Application availability loss'], 'CVE-2017-7410': ['Arbitrary code execution as user of application'], 'CVE-2017-7412': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7413': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7414': ['Arbitrary code execution as user of application'], 'CVE-2017-7415': ['Application confidentiality loss'], 'CVE-2017-7431': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7432': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7439': ['Application confidentiality loss'], 'CVE-2017-7444': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7446': ['Gain privileges on application'], 'CVE-2017-7447': ['Arbitrary code execution as user of application'], 'CVE-2017-7450': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7455': ['Application confidentiality loss'], 'CVE-2017-7456': ['Application availability loss'], 'CVE-2017-7458': ['Application availability loss'], 'CVE-2017-7459': ['Application integrity loss'], 'CVE-2017-7462': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7473': ['Application confidentiality loss'], 'CVE-2017-7474': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7476': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7477': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7478': ['Application availability loss'], 'CVE-2017-7480': ['Arbitrary code execution as user of application'], 'CVE-2017-7483': ['Application availability loss'], 'CVE-2017-7484': ['Application confidentiality loss'], 'CVE-2017-7486': ['Gain privileges on application'], 'CVE-2017-7487': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7493': ['Gain privileges on application'], 'CVE-2017-7494': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7496': ['Gain privileges on application'], 'CVE-2017-7502': ['Application availability loss'], 'CVE-2017-7503': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7504': ['Arbitrary code execution as user of application'], 'CVE-2017-7505': ['Gain privileges on application'], 'CVE-2017-7507': ['Application availability loss'], 'CVE-2017-7508': ['Application availability loss'], 'CVE-2017-7512': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7520': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7523': ['Application availability loss'], 'CVE-2017-7524': ['Gain privileges on application'], 'CVE-2017-7529': ['Application confidentiality loss'], 'CVE-2017-7541': ['Privilege escalation on system'], 'CVE-2017-7563': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7564': ['Application availability loss'], 'CVE-2017-7565': ['Arbitrary code execution as user of application'], 'CVE-2017-7566': ['Application confidentiality loss'], 'CVE-2017-7569': ['Application integrity loss'], 'CVE-2017-7570': ['Arbitrary code execution as user of application'], 'CVE-2017-7571': ['Gain privileges on application'], 'CVE-2017-7572': ['Gain root/system/administrator privileges on system'], 'CVE-2017-7574': ['Gain user privileges on system'], 'CVE-2017-7575': ['System confidentiality loss'], 'CVE-2017-7576': ['Gain user privileges on system'], 'CVE-2017-7577': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7578': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7581': ['Arbitrary code execution as user of application'], 'CVE-2017-7584': ['Arbitrary code execution as user of application'], 'CVE-2017-7588': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7592': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7596': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7597': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7598': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7599': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7600': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7601': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7602': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7603': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7604': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7605': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7614': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-7615': ['Gain privileges on application'], 'CVE-2017-7617': ['Arbitrary code execution as user of application'], 'CVE-2017-7618': ['System availability loss'], 'CVE-2017-7619': ['Application availability loss'], 'CVE-2017-7622': ['Privilege escalation on system'], 'CVE-2017-7625': ['Arbitrary code execution as user of application'], 'CVE-2017-7628': ['Arbitrary code execution as user of application'], 'CVE-2017-7629': ['System integrity loss'], 'CVE-2017-7643': ['Privilege escalation on system'], 'CVE-2017-7645': ['System availability loss'], 'CVE-2017-7647': ['Arbitrary code execution as user of application'], 'CVE-2017-7648': ['System confidentiality loss'], 'CVE-2017-7660': ['Application integrity loss'], 'CVE-2017-7661': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7662': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7664': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7666': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7667': ['Application integrity loss'], 'CVE-2017-7668': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7669': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7670': ['Application availability loss'], 'CVE-2017-7673': ['Gain privileges on application'], 'CVE-2017-7676': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7679': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7680': ['Application integrity loss'], 'CVE-2017-7681': ['Arbitrary code execution as user of application'], 'CVE-2017-7682': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7683': ['Application confidentiality loss'], 'CVE-2017-7684': ['Application availability loss'], 'CVE-2017-7686': ['Application confidentiality loss'], 'CVE-2017-7688': ['Application confidentiality loss'], 'CVE-2017-7689': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7690': ['Privilege escalation on system'], 'CVE-2017-7691': ['Arbitrary code execution as user of application'], 'CVE-2017-7692': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7694': ['Arbitrary code execution as user of application'], 'CVE-2017-7695': ['Arbitrary code execution as user of application'], 'CVE-2017-7696': ['Application availability loss'], 'CVE-2017-7698': ['Arbitrary code execution as user of application'], 'CVE-2017-7701': ['System availability loss'], 'CVE-2017-7702': ['System availability loss'], 'CVE-2017-7703': ['Application availability loss'], 'CVE-2017-7704': ['System availability loss'], 'CVE-2017-7705': ['System availability loss'], 'CVE-2017-7717': ['Arbitrary code execution as user of application'], 'CVE-2017-7719': ['Arbitrary code execution as user of application'], 'CVE-2017-7720': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7721': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7722': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7726': ['System integrity loss'], 'CVE-2017-7728': ['Arbitrary code execution as user of application'], 'CVE-2017-7729': ['System integrity loss'], 'CVE-2017-7730': ['System availability loss'], 'CVE-2017-7731': ['Application confidentiality loss'], 'CVE-2017-7745': ['System availability loss'], 'CVE-2017-7746': ['System availability loss'], 'CVE-2017-7747': ['Application availability loss'], 'CVE-2017-7748': ['System availability loss'], 'CVE-2017-7850': ['Privilege escalation on system'], 'CVE-2017-7852': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7853': ['Application availability loss'], 'CVE-2017-7856': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7857': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7858': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7859': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7860': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7861': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7862': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7863': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7864': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7865': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7866': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7867': ['Application availability loss'], 'CVE-2017-7868': ['Application availability loss'], 'CVE-2017-7869': ['Application availability loss'], 'CVE-2017-7870': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7875': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7876': ['Arbitrary code execution as user of application'], 'CVE-2017-7877': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7878': ['Arbitrary code execution as user of application'], 'CVE-2017-7879': ['Application confidentiality loss'], 'CVE-2017-7881': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7882': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7884': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7885': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-7886': ['Arbitrary code execution as user of application'], 'CVE-2017-7888': ['Gain privileges on application'], 'CVE-2017-7889': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7892': ['Application availability loss'], 'CVE-2017-7894': ['Arbitrary code execution as user of application'], 'CVE-2017-7895': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7898': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7899': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7901': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7902': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7903': ['Gain privileges on application'], 'CVE-2017-7905': ['Gain user privileges on system'], 'CVE-2017-7909': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7910': ['Arbitrary code execution as user of application'], 'CVE-2017-7911': ['Arbitrary code execution as user of application'], 'CVE-2017-7913': ['Gain user privileges on system'], 'CVE-2017-7914': ['Gain user privileges on system'], 'CVE-2017-7915': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-7917': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7919': ['Gain user privileges on system'], 'CVE-2017-7921': ['Gain user privileges on system'], 'CVE-2017-7922': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7923': ['Gain user privileges on system'], 'CVE-2017-7925': ['Gain user privileges on system'], 'CVE-2017-7927': ['Gain user privileges on system'], 'CVE-2017-7929': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7935': ['System availability loss'], 'CVE-2017-7938': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7945': ['System confidentiality loss'], 'CVE-2017-7948': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7951': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7952': ['Arbitrary code execution as user of application'], 'CVE-2017-7957': ['Application availability loss'], 'CVE-2017-7961': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7963': ['Application availability loss'], 'CVE-2017-7964': ['Gain root/system/administrator privileges on system'], 'CVE-2017-7965': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7966': ['Arbitrary code execution as user of application'], 'CVE-2017-7968': ['Privilege escalation on system'], 'CVE-2017-7975': ['Arbitrary code execution as user of application'], 'CVE-2017-7976': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-7978': ['System confidentiality loss'], 'CVE-2017-7979': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-7980': ['Arbitrary code execution as user of application'], 'CVE-2017-7981': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-7990': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-7991': ['Arbitrary code execution as user of application'], 'CVE-2017-8002': ['Arbitrary code execution as user of application'], 'CVE-2017-8004': ['Arbitrary code execution as user of application'], 'CVE-2017-8011': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8033': ['Gain privileges on application'], 'CVE-2017-8035': ['Application confidentiality loss'], 'CVE-2017-8036': ['Arbitrary code execution as user of application'], 'CVE-2017-8050': ['Application integrity loss'], 'CVE-2017-8051': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8059': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8061': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8062': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8063': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8064': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8065': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8066': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8067': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8068': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8069': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8070': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8072': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8073': ['Application availability loss'], 'CVE-2017-8074': ['Gain user privileges on system'], 'CVE-2017-8075': ['Gain user privileges on system'], 'CVE-2017-8076': ['System confidentiality loss'], 'CVE-2017-8077': ['System confidentiality loss'], 'CVE-2017-8080': ['Arbitrary code execution as user of application'], 'CVE-2017-8081': ['Gain privileges on application'], 'CVE-2017-8099': ['Application availability loss', 'Application integrity loss'], 'CVE-2017-8101': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8105': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8108': ['Gain privileges on application'], 'CVE-2017-8109': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8110': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8114': ['Gain privileges on application'], 'CVE-2017-8116': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8218': ['Gain root/system/administrator privileges on system'], 'CVE-2017-8220': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8221': ['System confidentiality loss'], 'CVE-2017-8222': ['System confidentiality loss'], 'CVE-2017-8223': ['System confidentiality loss'], 'CVE-2017-8224': ['Gain root/system/administrator privileges on system'], 'CVE-2017-8225': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8233': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8234': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8236': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8237': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8238': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8240': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8241': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8244': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8245': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8246': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8282': ['Arbitrary code execution as user of application'], 'CVE-2017-8283': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8284': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8287': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8288': ['Arbitrary code execution as user of application'], 'CVE-2017-8289': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8290': ['Application availability loss'], 'CVE-2017-8291': ['Arbitrary code execution as user of application'], 'CVE-2017-8294': ['Application availability loss'], 'CVE-2017-8296': ['Gain privileges on application'], 'CVE-2017-8297': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8303': ['Arbitrary code execution as user of application'], 'CVE-2017-8305': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8307': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8308': ['Application integrity loss'], 'CVE-2017-8309': ['System availability loss'], 'CVE-2017-8311': ['Arbitrary code execution as user of application'], 'CVE-2017-8325': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8326': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8338': ['System availability loss'], 'CVE-2017-8342': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8358': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8359': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8364': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8366': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8367': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8368': ['Arbitrary code execution as user of application'], 'CVE-2017-8369': ['Arbitrary code execution as user of application'], 'CVE-2017-8370': ['Arbitrary code execution as user of application'], 'CVE-2017-8373': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8377': ['Arbitrary code execution as user of application'], 'CVE-2017-8378': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8381': ['Arbitrary code execution as user of application'], 'CVE-2017-8386': ['Gain privileges on application'], 'CVE-2017-8392': ['Application availability loss'], 'CVE-2017-8393': ['Application availability loss'], 'CVE-2017-8394': ['Application availability loss'], 'CVE-2017-8395': ['Application availability loss'], 'CVE-2017-8396': ['Application availability loss'], 'CVE-2017-8397': ['Application availability loss'], 'CVE-2017-8398': ['Application availability loss'], 'CVE-2017-8399': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8400': ['Arbitrary code execution as user of application'], 'CVE-2017-8402': ['Arbitrary code execution as user of application'], 'CVE-2017-8403': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-8419': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8422': ['Privilege escalation on system'], 'CVE-2017-8438': ['Gain privileges on application'], 'CVE-2017-8450': ['Application confidentiality loss'], 'CVE-2017-8452': ['Application availability loss'], 'CVE-2017-8453': ['Arbitrary code execution as user of application'], 'CVE-2017-8454': ['Arbitrary code execution as user of application'], 'CVE-2017-8455': ['Arbitrary code execution as user of application'], 'CVE-2017-8460': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8461': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8463': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8464': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8465': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8466': ['Privilege escalation on system'], 'CVE-2017-8467': ['Privilege escalation on system'], 'CVE-2017-8468': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8487': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8494': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8495': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8496': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8497': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8499': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8501': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8502': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8506': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8507': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8509': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8510': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8511': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8512': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8513': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8517': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8519': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8520': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8521': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8522': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8524': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8527': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8528': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8538': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8540': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8541': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8543': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8547': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8548': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8549': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8550': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8552': ['Privilege escalation on system'], 'CVE-2017-8556': ['Privilege escalation on system'], 'CVE-2017-8558': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8561': ['Privilege escalation on system'], 'CVE-2017-8562': ['Privilege escalation on system'], 'CVE-2017-8563': ['Gain user privileges on system'], 'CVE-2017-8565': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8566': ['Gain user privileges on system'], 'CVE-2017-8569': ['Gain privileges on application'], 'CVE-2017-8570': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8573': ['Privilege escalation on system'], 'CVE-2017-8574': ['Privilege escalation on system'], 'CVE-2017-8576': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8577': ['Privilege escalation on system'], 'CVE-2017-8578': ['Gain root/system/administrator privileges on system'], 'CVE-2017-8579': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8580': ['Privilege escalation on system'], 'CVE-2017-8581': ['Gain user privileges on system'], 'CVE-2017-8584': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8585': ['Application availability loss'], 'CVE-2017-8588': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8589': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8590': ['Gain user privileges on system'], 'CVE-2017-8594': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8595': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8596': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8598': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8601': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8603': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8604': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8605': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8606': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8607': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8608': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8609': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8610': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8613': ['Gain privileges on application'], 'CVE-2017-8617': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8618': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8619': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8766': ['Arbitrary code execution as user of application'], 'CVE-2017-8768': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8769': ['Application confidentiality loss'], 'CVE-2017-8773': ['Arbitrary code execution as user of application'], 'CVE-2017-8774': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8775': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8776': ['Application integrity loss'], 'CVE-2017-8779': ['System availability loss'], 'CVE-2017-8781': ['Arbitrary code execution as user of application'], 'CVE-2017-8785': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8786': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8787': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8789': ['Arbitrary code execution as user of application'], 'CVE-2017-8790': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8793': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8794': ['Application integrity loss', 'Application confidentiality loss'], 'CVE-2017-8796': ['Arbitrary code execution as user of application'], 'CVE-2017-8797': ['System availability loss'], 'CVE-2017-8798': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8799': ['Arbitrary code execution as user of application'], 'CVE-2017-8803': ['Arbitrary code execution as user of application'], 'CVE-2017-8804': ['System availability loss'], 'CVE-2017-8825': ['Application availability loss'], 'CVE-2017-8826': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8827': ['Application integrity loss', 'Application availability loss'], 'CVE-2017-8829': ['Arbitrary code execution as user of application'], 'CVE-2017-8831': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8835': ['Arbitrary code execution as user of application'], 'CVE-2017-8836': ['Arbitrary code execution as user of application'], 'CVE-2017-8837': ['Gain user privileges on system'], 'CVE-2017-8841': ['System availability loss', 'System integrity loss'], 'CVE-2017-8844': ['Application integrity loss', 'Application confidentiality loss', 'Application availability loss'], 'CVE-2017-8849': ['Privilege escalation on system'], 'CVE-2017-8852': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8853': ['Application integrity loss'], 'CVE-2017-8854': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8855': ['Application integrity loss'], 'CVE-2017-8856': ['Arbitrary code execution as user of application'], 'CVE-2017-8857': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8858': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8859': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8868': ['Application availability loss'], 'CVE-2017-8872': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-8874': ['Gain privileges on application'], 'CVE-2017-8890': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-8891': ['Application availability loss'], 'CVE-2017-8893': ['Application availability loss'], 'CVE-2017-8894': ['Arbitrary code execution as user of application'], 'CVE-2017-8895': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8898': ['Gain privileges on application'], 'CVE-2017-8899': ['Gain privileges on application'], 'CVE-2017-8903': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8904': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8905': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-8907': ['Arbitrary code execution as user of application'], 'CVE-2017-8911': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8912': ['Arbitrary code execution as user of application'], 'CVE-2017-8913': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8914': ['System integrity loss', 'System confidentiality loss', 'System availability loss'], 'CVE-2017-8915': ['Application availability loss'], 'CVE-2017-8917': ['Arbitrary code execution as user of application'], 'CVE-2017-8921': ['Application integrity loss'], 'CVE-2017-8923': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8926': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8927': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8928': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-8929': ['Application availability loss'], 'CVE-2017-8930': ['Gain privileges on application'], 'CVE-2017-9022': ['Application availability loss'], 'CVE-2017-9023': ['Application availability loss'], 'CVE-2017-9024': ['Application confidentiality loss'], 'CVE-2017-9026': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9030': ['Application confidentiality loss'], 'CVE-2017-9031': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9033': ['Gain privileges on application'], 'CVE-2017-9034': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9036': ['Privilege escalation on system'], 'CVE-2017-9035': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9042': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9043': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9046': ['Arbitrary code execution as user of application'], 'CVE-2017-9047': ['Application availability loss'], 'CVE-2017-9048': ['Application availability loss'], 'CVE-2017-9049': ['Application availability loss'], 'CVE-2017-9050': ['Application availability loss'], 'CVE-2017-9051': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9052': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9053': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9054': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9055': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9058': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9062': ['Application integrity loss'], 'CVE-2017-9064': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9065': ['Application integrity loss'], 'CVE-2017-9066': ['Application integrity loss'], 'CVE-2017-9067': ['Arbitrary code execution as user of application'], 'CVE-2017-9069': ['Arbitrary code execution as user of application'], 'CVE-2017-9074': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9075': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9076': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9077': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9078': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9080': ['Arbitrary code execution as user of application'], 'CVE-2017-9090': ['Application integrity loss'], 'CVE-2017-9091': ['Application integrity loss'], 'CVE-2017-9097': ['Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9098': ['Application confidentiality loss'], 'CVE-2017-9100': ['Gain root/system/administrator privileges on system'], 'CVE-2017-9101': ['Arbitrary code execution as user of application'], 'CVE-2017-9111': ['Arbitrary code execution as user of application'], 'CVE-2017-9113': ['Arbitrary code execution as user of application'], 'CVE-2017-9115': ['Arbitrary code execution as user of application'], 'CVE-2017-9117': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9119': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9131': ['Arbitrary code execution as user of application'], 'CVE-2017-9132': ['System confidentiality loss'], 'CVE-2017-9133': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9134': ['System confidentiality loss'], 'CVE-2017-9135': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9136': ['System confidentiality loss'], 'CVE-2017-9137': ['Gain user privileges on system'], 'CVE-2017-9138': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9146': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9148': ['Gain privileges on application'], 'CVE-2017-9149': ['Application confidentiality loss'], 'CVE-2017-9151': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9152': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9153': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9154': ['Application availability loss'], 'CVE-2017-9155': ['Application availability loss'], 'CVE-2017-9156': ['Application availability loss'], 'CVE-2017-9157': ['Application availability loss'], 'CVE-2017-9158': ['Application availability loss'], 'CVE-2017-9159': ['Application availability loss'], 'CVE-2017-9160': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9161': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9162': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9163': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9164': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9165': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9166': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9167': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9168': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9169': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9170': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9171': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9172': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9173': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9174': ['Application availability loss'], 'CVE-2017-9175': ['Application availability loss'], 'CVE-2017-9176': ['Application availability loss'], 'CVE-2017-9177': ['Application availability loss'], 'CVE-2017-9178': ['Application availability loss'], 'CVE-2017-9179': ['Application availability loss'], 'CVE-2017-9180': ['Application availability loss'], 'CVE-2017-9181': ['Application availability loss'], 'CVE-2017-9182': ['Application availability loss'], 'CVE-2017-9183': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9184': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9185': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9186': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9187': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9188': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9189': ['Application availability loss'], 'CVE-2017-9190': ['Application availability loss'], 'CVE-2017-9191': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9192': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9193': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9194': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9195': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9196': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9197': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9198': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9199': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9200': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9212': ['System availability loss'], 'CVE-2017-9214': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9217': ['Application availability loss'], 'CVE-2017-9224': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9225': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9226': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9227': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9228': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9229': ['Application availability loss'], 'CVE-2017-9230': ['Application confidentiality loss'], 'CVE-2017-9231': ['System confidentiality loss'], 'CVE-2017-9232': ['Gain root/system/administrator privileges on system'], 'CVE-2017-9233': ['Application availability loss'], 'CVE-2017-9246': ['Arbitrary code execution as user of application'], 'CVE-2017-9248': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9250': ['Application availability loss'], 'CVE-2017-9264': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9265': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9294': ['Arbitrary code execution as user of application'], 'CVE-2017-9300': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9301': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9304': ['Application availability loss'], 'CVE-2017-9324': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9334': ['Application availability loss'], 'CVE-2017-9343': ['Application availability loss'], 'CVE-2017-9344': ['Application availability loss'], 'CVE-2017-9345': ['System availability loss'], 'CVE-2017-9346': ['System availability loss'], 'CVE-2017-9347': ['Application availability loss'], 'CVE-2017-9348': ['Application availability loss'], 'CVE-2017-9349': ['System availability loss'], 'CVE-2017-9350': ['System availability loss'], 'CVE-2017-9351': ['Application availability loss'], 'CVE-2017-9352': ['System availability loss'], 'CVE-2017-9353': ['Application availability loss'], 'CVE-2017-9354': ['Application availability loss'], 'CVE-2017-9355': ['Application integrity loss'], 'CVE-2017-9358': ['Application availability loss'], 'CVE-2017-9359': ['Application availability loss'], 'CVE-2017-9360': ['Arbitrary code execution as user of application'], 'CVE-2017-9363': ['Arbitrary code execution as user of application'], 'CVE-2017-9364': ['Arbitrary code execution as user of application'], 'CVE-2017-9365': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9372': ['Application availability loss'], 'CVE-2017-9379': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9380': ['Arbitrary code execution as user of application'], 'CVE-2017-9413': ['Gain privileges on application'], 'CVE-2017-9415': ['Gain privileges on application'], 'CVE-2017-9417': ['Arbitrary code execution as user of application'], 'CVE-2017-9418': ['Arbitrary code execution as user of application'], 'CVE-2017-9424': ['Arbitrary code execution as user of application'], 'CVE-2017-9427': ['Arbitrary code execution as user of application'], 'CVE-2017-9428': ['Application confidentiality loss'], 'CVE-2017-9429': ['Arbitrary code execution as user of application'], 'CVE-2017-9430': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9431': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9432': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9433': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9435': ['Arbitrary code execution as user of application'], 'CVE-2017-9436': ['Arbitrary code execution as user of application'], 'CVE-2017-9437': ['Arbitrary code execution as user of application'], 'CVE-2017-9438': ['Application availability loss'], 'CVE-2017-9442': ['Arbitrary code execution as user of application'], 'CVE-2017-9443': ['Arbitrary code execution as user of application'], 'CVE-2017-9444': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9445': ['Application availability loss'], 'CVE-2017-9449': ['Arbitrary code execution as user of application'], 'CVE-2017-9461': ['System availability loss'], 'CVE-2017-9462': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9465': ['Application availability loss', 'Application confidentiality loss'], 'CVE-2017-9466': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-9468': ['Application availability loss'], 'CVE-2017-9469': ['Application availability loss'], 'CVE-2017-9517': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9518': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9519': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9524': ['Application availability loss'], 'CVE-2017-9527': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9528': ['Arbitrary code execution as user of application'], 'CVE-2017-9529': ['Arbitrary code execution as user of application'], 'CVE-2017-9530': ['Arbitrary code execution as user of application'], 'CVE-2017-9531': ['Arbitrary code execution as user of application'], 'CVE-2017-9532': ['Arbitrary code execution as user of application'], 'CVE-2017-9533': ['Arbitrary code execution as user of application'], 'CVE-2017-9534': ['Arbitrary code execution as user of application'], 'CVE-2017-9535': ['Arbitrary code execution as user of application'], 'CVE-2017-9536': ['Arbitrary code execution as user of application'], 'CVE-2017-9542': ['Gain root/system/administrator privileges on system'], 'CVE-2017-9543': ['Application integrity loss'], 'CVE-2017-9544': ['Arbitrary code execution as user of application'], 'CVE-2017-9552': ['Gain privileges on application'], 'CVE-2017-9557': ['Application confidentiality loss'], 'CVE-2017-9602': ['Arbitrary code execution as user of application'], 'CVE-2017-9603': ['Arbitrary code execution as user of application'], 'CVE-2017-9604': ['Application confidentiality loss'], 'CVE-2017-9606': ['Gain privileges on application'], 'CVE-2017-9615': ['Gain privileges on application'], 'CVE-2017-9617': ['Application availability loss'], 'CVE-2017-9627': ['System availability loss'], 'CVE-2017-9629': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9631': ['Application availability loss'], 'CVE-2017-9639': ['Arbitrary code execution as user of application'], 'CVE-2017-9669': ['Arbitrary code execution as user of application'], 'CVE-2017-9670': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9671': ['Arbitrary code execution as user of application'], 'CVE-2017-9673': ['Gain privileges on application'], 'CVE-2017-9675': ['System availability loss'], 'CVE-2017-9728': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9729': ['Application availability loss'], 'CVE-2017-9730': ['Arbitrary code execution as user of application'], 'CVE-2017-9731': ['Application confidentiality loss'], 'CVE-2017-9735': ['Application confidentiality loss'], 'CVE-2017-9736': ['Arbitrary code execution as user of application'], 'CVE-2017-9741': ['Arbitrary code execution as user of application'], 'CVE-2017-9742': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9743': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9744': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9745': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9746': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9747': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9748': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9749': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9750': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9751': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9752': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9753': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9754': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9755': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9756': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9757': ['Arbitrary code execution as user of application'], 'CVE-2017-9759': ['Arbitrary code execution as user of application'], 'CVE-2017-9763': ['Application availability loss'], 'CVE-2017-9765': ['Arbitrary code execution as user of application'], 'CVE-2017-9766': ['Application availability loss'], 'CVE-2017-9771': ['Arbitrary code execution as user of application'], 'CVE-2017-9772': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9774': ['Arbitrary code execution as user of application'], 'CVE-2017-9776': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9780': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9785': ['Arbitrary code execution as user of application'], 'CVE-2017-9788': ['Application confidentiality loss', 'Application availability loss'], 'CVE-2017-9789': ['Application availability loss'], 'CVE-2017-9791': ['Arbitrary code execution as user of application'], 'CVE-2017-9807': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9810': ['Gain privileges on application'], 'CVE-2017-9811': ['Gain root/system/administrator privileges on system', ], 'CVE-2017-9812': ['Application confidentiality loss'], 'CVE-2017-9814': ['Application availability loss'], 'CVE-2017-9822': ['Arbitrary code execution as user of application'], 'CVE-2017-9828': ['Arbitrary code execution as root/administrator/system'], 'CVE-2017-9829': ['System confidentiality loss'], 'CVE-2017-9830': ['Arbitrary code execution as user of application'], 'CVE-2017-9833': ['Application confidentiality loss'], 'CVE-2017-9837': ['Gain privileges on application'], 'CVE-2017-9840': ['Arbitrary code execution as user of application'], 'CVE-2017-9841': ['Arbitrary code execution as user of application'], 'CVE-2017-9844': ['Arbitrary code execution as user of application'], 'CVE-2017-9845': ['System availability loss'], 'CVE-2017-9846': ['Arbitrary code execution as user of application'], 'CVE-2017-9848': ['Arbitrary code execution as user of application'], 'CVE-2017-9871': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9872': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9873': ['Arbitrary code execution as user of application'], 'CVE-2017-9874': ['Arbitrary code execution as user of application'], 'CVE-2017-9875': ['Arbitrary code execution as user of application'], 'CVE-2017-9876': ['Arbitrary code execution as user of application'], 'CVE-2017-9877': ['Arbitrary code execution as user of application'], 'CVE-2017-9878': ['Arbitrary code execution as user of application'], 'CVE-2017-9879': ['Arbitrary code execution as user of application'], 'CVE-2017-9880': ['Arbitrary code execution as user of application'], 'CVE-2017-9881': ['Arbitrary code execution as user of application'], 'CVE-2017-9882': ['Arbitrary code execution as user of application'], 'CVE-2017-9883': ['Arbitrary code execution as user of application'], 'CVE-2017-9884': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9885': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9886': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9887': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9888': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9889': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9890': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9891': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9892': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9893': ['Arbitrary code execution as user of application'], 'CVE-2017-9894': ['Arbitrary code execution as user of application'], 'CVE-2017-9895': ['Arbitrary code execution as user of application'], 'CVE-2017-9896': ['Arbitrary code execution as user of application'], 'CVE-2017-9897': ['Arbitrary code execution as user of application'], 'CVE-2017-9898': ['Arbitrary code execution as user of application'], 'CVE-2017-9899': ['Arbitrary code execution as user of application'], 'CVE-2017-9900': ['Arbitrary code execution as user of application'], 'CVE-2017-9901': ['Arbitrary code execution as user of application'], 'CVE-2017-9902': ['Arbitrary code execution as user of application'], 'CVE-2017-9903': ['Arbitrary code execution as user of application'], 'CVE-2017-9904': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9905': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9906': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9907': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9908': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9909': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9910': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9911': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9912': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9913': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9914': ['Arbitrary code execution as user of application'], 'CVE-2017-9915': ['Arbitrary code execution as user of application'], 'CVE-2017-9916': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9917': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9918': ['Arbitrary code execution as user of application'], 'CVE-2017-9919': ['Arbitrary code execution as user of application'], 'CVE-2017-9920': ['Arbitrary code execution as user of application'], 'CVE-2017-9921': ['Arbitrary code execution as user of application'], 'CVE-2017-9922': ['Arbitrary code execution as user of application'], 'CVE-2017-9923': ['Arbitrary code execution as user of application'], 'CVE-2017-9924': ['Arbitrary code execution as user of application'], 'CVE-2017-9925': ['Arbitrary code execution as user of application'], 'CVE-2017-9926': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9927': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9930': ['System availability loss', 'System confidentiality loss', 'System integrity loss'], 'CVE-2017-9932': ['Gain user privileges on system'], 'CVE-2017-9933': ['Application confidentiality loss'], 'CVE-2017-9935': ['Arbitrary code execution as user of application'], 'CVE-2017-9948': ['Application availability loss', 'Application confidentiality loss', 'Application integrity loss'], 'CVE-2017-9949': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9953': ['Application availability loss'], 'CVE-2017-9977': ['Application integrity loss'], 'CVE-2017-9980': ['Arbitrary code execution as user of application'], 'CVE-2017-9982': ['Application availability loss'], 'CVE-2017-9984': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-9985': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-9986': ['System confidentiality loss', 'System integrity loss', 'System availability loss'], 'CVE-2017-9987': ['Application availability loss'], 'CVE-2017-9988': ['Application availability loss'], 'CVE-2017-9989': ['Application availability loss'], 'CVE-2017-9990': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9991': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9992': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9993': ['Application confidentiality loss'], 'CVE-2017-9994': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9995': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'], 'CVE-2017-9996': ['Application confidentiality loss', 'Application integrity loss', 'Application availability loss'] } class MyTestCase(unittest.TestCase): def test_classifier(self): dict_of_vulner = CVE_parser.parse('cve-data/nvdcve-1.0-2017.json') for key in sorted(result_impacts): print(key + ':') print(classifier.classifier(dict_of_vulner[key])) self.assertCountEqual(result_impacts[key], classifier.classifier(dict_of_vulner[key]), msg=key) if __name__ == '__main__': unittest.main()
71.649074
107
0.683854
28,660
259,298
6.186392
0.108549
0.120771
0.085927
0.169609
0.927158
0.82884
0.777013
0.763167
0.691013
0.305417
0
0.116291
0.174672
259,298
3,618
108
71.668878
0.7122
0.002634
0
0.149279
0
0
0.763311
0.074357
0
0
0
0
0.000277
1
0.000277
false
0
0.000832
0
0.001387
0.000555
0
0
0
null
0
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
fa561e9d912c93d1fef140ea3e30060366f77314
30
py
Python
AutoTinderAzure/sample.py
tafseerahmed/Auto-Tinder
9110637c209eb78f4fb715069b9b153ca87d719e
[ "MIT" ]
null
null
null
AutoTinderAzure/sample.py
tafseerahmed/Auto-Tinder
9110637c209eb78f4fb715069b9b153ca87d719e
[ "MIT" ]
1
2021-12-13T19:53:00.000Z
2021-12-13T19:53:00.000Z
AutoTinderAzure/sample.py
tafseerahmed/Auto-Tinder
9110637c209eb78f4fb715069b9b153ca87d719e
[ "MIT" ]
null
null
null
import sys print(sys.version)
10
18
0.8
5
30
4.8
0.8
0
0
0
0
0
0
0
0
0
0
0
0.1
30
3
18
10
0.888889
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0.5
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
1
0
6
d7000db598534b0f485450adc4c98e46c7cd267b
154
py
Python
yalul/parsers/parse_errors.py
OtavioHenrique/yalul
ce99e32365ed5607527b9f2f39705ad5d9e20ba2
[ "MIT" ]
1
2021-04-01T20:22:36.000Z
2021-04-01T20:22:36.000Z
yalul/parsers/parse_errors.py
OtavioHenrique/yalul
ce99e32365ed5607527b9f2f39705ad5d9e20ba2
[ "MIT" ]
1
2020-11-20T22:24:38.000Z
2020-11-20T22:24:38.000Z
yalul/parsers/parse_errors.py
OtavioHenrique/yalul
ce99e32365ed5607527b9f2f39705ad5d9e20ba2
[ "MIT" ]
null
null
null
class ParseErrors: def __init__(self, errors): self.errors = errors def add_error(self, error): return self.errors.append(error)
22
40
0.655844
19
154
5.052632
0.526316
0.3125
0
0
0
0
0
0
0
0
0
0
0.246753
154
6
41
25.666667
0.827586
0
0
0
0
0
0
0
0
0
0
0
0
1
0.4
false
0
0
0.2
0.8
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
1
1
0
0
6
d7128e34e62f372129ff894858ec967a0d38bef6
25
py
Python
voilarm/__init__.py
ansarowsky/voilarm
0ac5469b0613538dad1996f9a3057967fa7f4a07
[ "MIT" ]
1
2022-01-27T21:28:51.000Z
2022-01-27T21:28:51.000Z
voilarm/__init__.py
ansarowsky/voilarm
0ac5469b0613538dad1996f9a3057967fa7f4a07
[ "MIT" ]
null
null
null
voilarm/__init__.py
ansarowsky/voilarm
0ac5469b0613538dad1996f9a3057967fa7f4a07
[ "MIT" ]
null
null
null
from .alarm import Alarm
12.5
24
0.8
4
25
5
0.75
0
0
0
0
0
0
0
0
0
0
0
0.16
25
1
25
25
0.952381
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
d72d434c29aabcdc3a9c6cdaa4b21bb5f9192e14
1,048
py
Python
molecule/default/files/selenium-tests/test_platform.py
marvel-nccr/ansible-role-jupyter
9031913c8c6064ddba054242480ee28a81d07a50
[ "MIT" ]
null
null
null
molecule/default/files/selenium-tests/test_platform.py
marvel-nccr/ansible-role-jupyter
9031913c8c6064ddba054242480ee28a81d07a50
[ "MIT" ]
9
2018-12-16T22:58:33.000Z
2021-09-24T08:30:48.000Z
molecule/default/files/selenium-tests/test_platform.py
marvel-nccr/ansible-role-jupyter
9031913c8c6064ddba054242480ee28a81d07a50
[ "MIT" ]
1
2019-05-01T14:18:22.000Z
2019-05-01T14:18:22.000Z
#!/usr/bin/env python from selenium.webdriver.common.by import By def test_login(selenium, url): selenium.get(url()) selenium.find_element(By.ID, 'ipython-main-app') # selenium.find_element(By.ID, 'notebook-container') # selenium.find_element(By.CLASS_NAME, 'jupyter-widgets-view') # selenium.get_screenshot_as_file('screenshots/login.png') def test_tree(selenium, url): selenium.get(url('tree/')) selenium.find_element(By.ID, 'ipython-main-app') def test_tree_apps(selenium, url): selenium.get(url('tree/apps')) selenium.find_element(By.ID, 'ipython-main-app') def test_apps(selenium, url): selenium.get(url('apps/')) selenium.find_element(By.ID, 'ipython-main-app') def test_apps_home(selenium, url): selenium.get(url('apps/apps/home/start.ipynb')) selenium.find_element(By.ID, 'ipython-main-app') # selenium.find_element(By.ID, 'notebook-container') # selenium.find_element(By.CLASS_NAME, 'jupyter-widgets-view') # selenium.get_screenshot_as_file('screenshots/home.png')
30.823529
66
0.72042
150
1,048
4.873333
0.253333
0.147743
0.233926
0.25855
0.841313
0.807114
0.648427
0.648427
0.648427
0.648427
0
0
0.120229
1,048
33
67
31.757576
0.792842
0.340649
0
0.3125
0
0
0.182749
0.038012
0
0
0
0
0
1
0.3125
false
0
0.0625
0
0.375
0
0
0
0
null
0
1
1
1
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
0
0
0
0
6
d77a2afc37f185f5a00039056bd5398d4870262f
5,818
py
Python
tests/test_migrate_logos.py
patymori/document-store-migracao
1320ef58de1484ca8383c29c1fea55c4b2d89e67
[ "BSD-2-Clause" ]
1
2019-11-21T12:35:36.000Z
2019-11-21T12:35:36.000Z
tests/test_migrate_logos.py
patymori/document-store-migracao
1320ef58de1484ca8383c29c1fea55c4b2d89e67
[ "BSD-2-Clause" ]
336
2019-04-01T14:06:37.000Z
2022-03-21T22:16:55.000Z
tests/test_migrate_logos.py
patymori/document-store-migracao
1320ef58de1484ca8383c29c1fea55c4b2d89e67
[ "BSD-2-Clause" ]
4
2019-03-28T13:32:04.000Z
2020-04-17T18:03:19.000Z
from unittest import TestCase, mock from documentstore_migracao.main.migrate_logos import migrate_logos_parser """ migrate_logos --uri mongodb://0.0.0.0:27017/ --db document-store --websitedb ../data-webapp usage: migrate_logos [-h] --uri URI --db DB --websitedb path optional arguments: -h, --help show this help message and exit --uri URI URI to connect at MongoDB where the import will be done, e.g: "mongodb://user:password@mongodb- host/?authSource=admin" --db DB Database name to import registers --websitedb path Path to SQLite Database from new website """ class TestMigrateLogosParser(TestCase): @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.base_parser") @mock.patch("documentstore_migracao.main.migrate_logos.mongodb_parser") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser") def test_argument_parser_description_and_mongodb_parser( self, MockArgumentParser, mk_mongodb_parser, mk_base_parser, mk_migrate_logos_to_website, mk_connect_to_databases, ): command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split() MockArgumentParser.return_value.parse_args.return_value.loglevel = "INFO" migrate_logos_parser(command_args) mk_mongodb_parser.assert_called_once_with(command_args) MockArgumentParser.assert_called_once_with( description="Journal Logos migration tool", parents=[mk_base_parser.return_value, mk_mongodb_parser.return_value] ) @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser") def test_calls_parser_parse_args_with_command_args( self, MockArgumentParser, migrate_logos_to_website, mk_connect_to_databases ): mk_parser = mock.MagicMock(name="MockArgParser") mk_parser.parse_args.return_value.loglevel = "INFO" MockArgumentParser.return_value = mk_parser command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split() migrate_logos_parser(command_args) mk_parser.parse_args.assert_called_once_with(command_args) @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser") def test_adds_website_db_argument( self, MockArgumentParser, mk_migrate_logos_to_website, mk_connect_to_databases ): mk_parser = mock.MagicMock(name="MockArgParser") mk_parser.parse_args.return_value.loglevel = "INFO" MockArgumentParser.return_value = mk_parser command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split() migrate_logos_parser(command_args) mk_parser.add_argument.assert_any_call( "--websitedb", help='URI to connect at SQLite database of new website. e.g: "sqlite:////path/to/database.db"', required=True, ) @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser") def test_adds_website_img_dir_argument( self, MockArgumentParser, mk_migrate_logos_to_website, mk_connect_to_databases ): mk_parser = mock.MagicMock(name="MockArgParser") mk_parser.parse_args.return_value.loglevel = "INFO" MockArgumentParser.return_value = mk_parser command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split() migrate_logos_parser(command_args) mk_parser.add_argument.assert_any_call( "--website_img_dir", help='Path to website images media directory', required=True, ) @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser.error") def test_no_mongodb_parser_args( self, mk_parser_error, mk_migrate_logos_to_website, mk_connect_to_databases ): command_args = "--websitedb ../data-webapp --website_img_dir ../data-webapp/images".split() migrate_logos_parser(command_args) mk_parser_error.assert_any_call( "the following arguments are required: --uri, --db" ) @mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases") @mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website") @mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser.error") def test_no_website_args( self, mk_parser_error, mk_migrate_logos_to_website, mk_connect_to_databases ): command_args = "--uri mongodb://0.0.0.0:27017/ --db opac".split() migrate_logos_parser(command_args) mk_parser_error.assert_any_call( "the following arguments are required: --websitedb, --website_img_dir" )
51.035088
140
0.723444
719
5,818
5.503477
0.141864
0.127369
0.132676
0.169826
0.766237
0.756887
0.725297
0.725297
0.705332
0.705332
0
0.011236
0.173943
5,818
113
141
51.486726
0.81211
0
0
0.588889
0
0.055556
0.402592
0.282501
0
0
0
0
0.077778
1
0.066667
false
0
0.022222
0
0.1
0
0
0
0
null
0
0
1
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
d7968e9a44b3fce497c523a0fcaa106f72f944e5
23
py
Python
src/pydex/__init__.py
waikato-datamining/pydex
a7a9090d6e618e54d969cb3539d9c8d12acd7f4f
[ "MIT" ]
null
null
null
src/pydex/__init__.py
waikato-datamining/pydex
a7a9090d6e618e54d969cb3539d9c8d12acd7f4f
[ "MIT" ]
null
null
null
src/pydex/__init__.py
waikato-datamining/pydex
a7a9090d6e618e54d969cb3539d9c8d12acd7f4f
[ "MIT" ]
null
null
null
from ._client import *
11.5
22
0.73913
3
23
5.333333
1
0
0
0
0
0
0
0
0
0
0
0
0.173913
23
1
23
23
0.842105
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
ad085b310d8e8ac1452909dabf3079b8c7d802db
159
py
Python
costor_server/manager/admin.py
rphi/costor
081de65778d404cf7a22c5524bf89a146fa8326b
[ "CNRI-Python" ]
2
2019-12-31T16:49:36.000Z
2021-02-17T09:47:41.000Z
costor_server/manager/admin.py
rphi/costor
081de65778d404cf7a22c5524bf89a146fa8326b
[ "CNRI-Python" ]
null
null
null
costor_server/manager/admin.py
rphi/costor
081de65778d404cf7a22c5524bf89a146fa8326b
[ "CNRI-Python" ]
null
null
null
from django.contrib import admin from .models import Agent # Register your models here. @admin.register(Agent) class AgentAdmin(admin.ModelAdmin): pass
15.9
35
0.773585
21
159
5.857143
0.666667
0
0
0
0
0
0
0
0
0
0
0
0.150943
159
9
36
17.666667
0.911111
0.163522
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0.2
0.4
0
0.6
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
6
ad138cdb9a9209cee34bbdd3f19ba87b7d62d4de
57
py
Python
libswitch/device/endpoint.py
liuyenting/libswitch
38ed7debd7631a8d5deccef6a7165ffddd6e4a60
[ "MIT" ]
null
null
null
libswitch/device/endpoint.py
liuyenting/libswitch
38ed7debd7631a8d5deccef6a7165ffddd6e4a60
[ "MIT" ]
null
null
null
libswitch/device/endpoint.py
liuyenting/libswitch
38ed7debd7631a8d5deccef6a7165ffddd6e4a60
[ "MIT" ]
null
null
null
class Endpoint(object): def __init__(): pass
14.25
23
0.596491
6
57
5
1
0
0
0
0
0
0
0
0
0
0
0
0.298246
57
3
24
19
0.75
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0.333333
0
0
0.666667
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
1
0
0
1
0
0
6
ad4186ad3d29e1ade9436744abe41746871e3270
1,280
py
Python
pygame_menu/widgets/widget/__init__.py
dcartman/pygame-menu
52a823b9121aadd6893fb878150d613ab516fcac
[ "MIT" ]
null
null
null
pygame_menu/widgets/widget/__init__.py
dcartman/pygame-menu
52a823b9121aadd6893fb878150d613ab516fcac
[ "MIT" ]
null
null
null
pygame_menu/widgets/widget/__init__.py
dcartman/pygame-menu
52a823b9121aadd6893fb878150d613ab516fcac
[ "MIT" ]
null
null
null
""" pygame-menu https://github.com/ppizarror/pygame-menu WIDGET This module contains the widgets of pygame-menu. """ from pygame_menu.widgets.widget.button import Button from pygame_menu.widgets.widget.colorinput import ColorInput from pygame_menu.widgets.widget.dropselect import DropSelect from pygame_menu.widgets.widget.dropselect_multiple import DropSelectMultiple from pygame_menu.widgets.widget.frame import Frame from pygame_menu.widgets.widget.hmargin import HMargin from pygame_menu.widgets.widget.image import Image from pygame_menu.widgets.widget.label import Label from pygame_menu.widgets.widget.menubar import MenuBar from pygame_menu.widgets.widget.menulink import MenuLink from pygame_menu.widgets.widget.none import NoneWidget from pygame_menu.widgets.widget.progressbar import ProgressBar from pygame_menu.widgets.widget.rangeslider import RangeSlider from pygame_menu.widgets.widget.scrollbar import ScrollBar from pygame_menu.widgets.widget.selector import Selector from pygame_menu.widgets.widget.surface import SurfaceWidget from pygame_menu.widgets.widget.table import Table from pygame_menu.widgets.widget.textinput import TextInput from pygame_menu.widgets.widget.toggleswitch import ToggleSwitch from pygame_menu.widgets.widget.vmargin import VMargin
44.137931
77
0.867188
178
1,280
6.117978
0.213483
0.211203
0.257117
0.385675
0.514233
0.067952
0
0
0
0
0
0
0.073438
1,280
28
78
45.714286
0.918212
0.085156
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
ad85934bc26ebfd68d34882e9c02e1d5b6128096
44,708
py
Python
lorabot/lorabot.py
aleksspevak/lorabot
fe13535289a7ddf73f9fa302d3a6809b9cc3df97
[ "MIT" ]
4
2022-03-09T15:57:50.000Z
2022-03-30T04:24:33.000Z
lorabot/lorabot.py
aleksspevak/lorabot
fe13535289a7ddf73f9fa302d3a6809b9cc3df97
[ "MIT" ]
null
null
null
lorabot/lorabot.py
aleksspevak/lorabot
fe13535289a7ddf73f9fa302d3a6809b9cc3df97
[ "MIT" ]
1
2022-03-09T20:21:12.000Z
2022-03-09T20:21:12.000Z
import pandas as pd import psycopg2 import os from dotenv import load_dotenv import plotly.express as px from .lorabot_sql import * from PIL import Image, ImageDraw class LoraBot: def __init__(self, bot_id): """ LoraBot is a tool for complex analyze users, messages and events in chatbots. Parameters ---------- bot_id: str the name of the bot that you specify in the code Returns ------- LoraBot object. """ load_dotenv() self.conn = psycopg2.connect( database=os.getenv('POSTGRES_DB'), user=os.getenv('POSTGRES_USER'), password=os.getenv('POSTGRES_PASSWORD'), host=os.getenv('POSTGRES_HOST'), port=os.getenv('POSTGRES_PORT')) self.conn.autocommit = True self.sql = sql_queries self.check_db() self.conn.autocommit = True self.password = os.getenv('ANALYTICS_PASSWORD') self.bot_id = bot_id def check_db(self): try: cursor = self.conn.cursor() cursor.execute(self.sql['check_schema_and_tables']) value = cursor.fetchone() if value[0] != 4: cursor.execute(sql_ddl['create']) cursor.close() except Exception as error: print("There are some problems in check_db function: ", error) def check_password(self, password): """ Compare entered password with password that set in ".env" file. Parameters ---------- password: str entered password Returns ------- Return True if password is correct and False if not. """ if password == self.password: return True else: return False def _get_correct_database_query(self, query_name, add_date=False, message_type=None, event_type=None, events_for_funnel=None, messages_for_funnel=None): query = self.sql[query_name] if add_date: query = query.replace('''FROM lorabot.users WHERE bot_id = %(bot_id)s''', '''FROM lorabot.users WHERE bot_id = %(bot_id)s and user_time between %(period_start)s and %(period_end)s''') query = query.replace('''FROM lorabot.messages WHERE bot_id = %(bot_id)s''', '''FROM lorabot.messages WHERE bot_id = %(bot_id)s and message_time between %(period_start)s and %(period_end)s''') query = query.replace('''FROM lorabot.events WHERE bot_id = %(bot_id)s''', '''FROM lorabot.events WHERE bot_id = %(bot_id)s and event_time between %(period_start)s and %(period_end)s''') query = query.replace('''FROM lorabot.bot_rating WHERE bot_id = %(bot_id)s''', '''FROM lorabot.bot_rating WHERE bot_id = %(bot_id)s and rate_time between %(period_start)s and %(period_end)s''') if message_type is not None: query = query.replace('bot_id = %(bot_id)s', 'bot_id = %(bot_id)s and message_type = %(message_type)s ') if event_type is not None: query = query.replace('bot_id = %(bot_id)s', 'bot_id = %(bot_id)s and event_type = %(event_type)s ') if events_for_funnel is not None: query = query.replace('bot_id = %(bot_id)s', f'''bot_id = %(bot_id)s and event in ({"'" + "','".join(events_for_funnel) + "'"}) ''') if messages_for_funnel is not None: query = query.replace('bot_id = %(bot_id)s', f'''bot_id = %(bot_id)s and message in ({"'" + "','".join(messages_for_funnel) + "'"} )''') return query def user(self, user_id, language_code): """ Insert new user to database. Parameters ---------- user_id: str unique telegram user ID language_code: str user's language_code Returns ------- Nothing. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('user_check') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id}) if cursor.fetchone() is None: query = self._get_correct_database_query('user_insert') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'language_code': language_code}) cursor.close() except Exception as error: print("There are some problems in user function: ", error) def message(self, message, message_type, user_id): """ Insert new message to database. Parameters ---------- message: str message from user message_type: str type of message from the user user_id: str unique telegram user ID Returns ------- Nothing. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('message') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'message': message, 'message_type': message_type}) cursor.close() except Exception as error: print("There are some problems in message function: ", error) def event(self, event, event_type, user_id): """ Insert new event to database. Parameters ---------- event: str event from user event_type: str type of event from the user user_id: str unique telegram user ID Returns ------- Nothing. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('event') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'event': event, 'event_type': event_type}) cursor.close() except Exception as error: print("There are some problems in event function: ", error) def assessment(self, assessment, user_id): """ Insert new assessment to database. Parameters ---------- assessment: int assessment from user to bot user_id: str unique telegram user ID Returns ------- Nothing. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('assessment') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'assessment': assessment}) cursor.close() except Exception as error: print("There are some problems in assessment function: ", error) def review(self, review, user_id): """ Insert new review to database. Parameters ---------- review: int review from user to bot user_id: str unique telegram user ID Returns ------- Nothing. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('review') cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'review': review}) cursor.close() except Exception as error: print("There are some problems in review function: ", error) def analyze_total(self, period_start=None, period_end=None): """ Analyze total users, messages, events. Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Head metrics about chatbot. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_total', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) cursor.close() text = 'Total information:\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return text except Exception as error: print("There are some problems in analyze_total function: ", error) return 'Error(maybe in varaibles)' def analyze_user_number_accumulation(self, period_start=None, period_end=None): """ Analyze number of users with accumulation Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_user_number_accumulation', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Number of users with accumulation") photo = fig.to_image(format="png") cursor.close() text = 'Number of users with accumulation:\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_user_number_accumulation function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_new_user(self, period_start=None, period_end=None): """ Analyze number of new registered users Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_new_user', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="New users") photo = fig.to_image(format="png") cursor.close() text = 'New users\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_new_user function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_hour_activity(self, period_start=None, period_end=None): """ Analyze number of message by hours activity Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_hour_activity', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' data['hour'] = data['hour'].astype(str) data = data.set_index('hour') fig = px.imshow(data, text_auto=True, aspect="auto", title="Hour Activity") photo = fig.to_image(format="png") cursor.close() return photo except Exception as error: print("There are some problems in analyze_hour_activity function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img def analyze_dau(self, period_start=None, period_end=None): """ Analyze number of active users by days Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_dau', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily active users") photo = fig.to_image(format="png") cursor.close() text = 'Daily active users\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_dau function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_wau(self, period_start=None, period_end=None): """ Analyze number of active users by weeks Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_wau', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Weekly active users") photo = fig.to_image(format="png") cursor.close() text = 'Weekly active users\n' for i in range(len(data)): text += f'Week #{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_wau function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_mau(self, period_start=None, period_end=None): """ Analyze number of active users by month Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_mau', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Monthly active users") photo = fig.to_image(format="png") cursor.close() text = 'Monthly active users\n' for i in range(len(data)): text += f'Month #{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_mau function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_yau(self, period_start=None, period_end=None): """ Analyze number of active users by year Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_yau', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Yearly active users") photo = fig.to_image(format="png") cursor.close() text = 'Yearly active users\n' for i in range(len(data)): text += f'Year #{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_yau function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_messages_number(self, period_start=None, period_end=None, message_type=None): """ Analyze number of messages by days Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period message_type: str type of message Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_messages_number', add_date, message_type=message_type) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end, 'message_type': message_type}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily messages") photo = fig.to_image(format="png") cursor.close() if message_type is None: text = 'Daily messages\n' else: text = f'Daily messages with type {message_type}\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_messages_number function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_messages(self, period_start=None, period_end=None, message_type=None, volume=100): """ Analyze messages Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period message_type: str type of message volume: number of messages to show Returns ------- Information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_messages', add_date, message_type=message_type) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end, 'message_type': message_type}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) cursor.close() data = data[:volume] if message_type is None: text = 'Messages\n' else: text = f'Messages with type {message_type}\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return text except Exception as error: print("There are some problems in analyze_messages function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_messages_type(self, period_start=None, period_end=None): """ Analyze messages by types Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_messages_type', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.pie(data, values='amount', names='type', title="Types of messages") photo = fig.to_image(format="png") cursor.close() text = f'Types of messages\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_messages_type function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_messages_funnel(self, messages_for_funnel, period_start=None, period_end=None): """ Create funnel for messages Parameters ---------- messages_for_funnel: list of str array of messages in right order for funnel period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False if messages_for_funnel is None: return "You didn't set events for funnel" query = self._get_correct_database_query('analyze_messages_funnel', add_date, messages_for_funnel=messages_for_funnel) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = cursor.fetchall() if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' sort_data = [] message_funnel = [] for message_for_position in messages_for_funnel: for values in data: if message_for_position == values[0]: message_funnel.append(values[0]) sort_data.append(values[1]) data = dict( number=sort_data, message=message_funnel) fig = px.funnel(data, x='number', y='message', title='Funnel of messages') photo = fig.to_image(format="png") cursor.close() text = f'Funnel of messages\n' for message, number in zip(message_funnel, sort_data): text += f'{message} {number}\n' return photo, text except Exception as error: print("There are some problems in analyze_messages_funnel function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_events_number(self, period_start=None, period_end=None, event_type=None): """ Analyze number of events by days Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period event_type: str type of event Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_events_number', add_date, event_type=event_type) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end, 'event_type': event_type}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily events with type") photo = fig.to_image(format="png") cursor.close() if event_type is None: text = 'Daily events\n' else: text = f'Daily events with type {event_type}\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_events_number function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_events(self, period_start=None, period_end=None, event_type=None, volume=100): """ Analyze events Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period event_type: str type of events volume: number of messages to show Returns ------- Information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_events', add_date, event_type=event_type) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end, 'event_type': event_type}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) data = data[:volume] cursor.close() if event_type is None: text = 'Events\n' else: text = f'Events with type {event_type}\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return text except Exception as error: print("There are some problems in analyze_events function: ", error) return 'Error(maybe in varaibles)' def analyze_events_type(self, period_start=None, period_end=None): """ Analyze events by types Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_events_type', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.pie(data, values='amount', names='type', title='Types of events') photo = fig.to_image(format="png") cursor.close() text = f'Types of events\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_events_type function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_events_funnel(self, events_for_funnel=None, period_start=None, period_end=None): """ Create funnel for events Parameters ---------- events_for_funnel: list of str array of events in right order for funnel period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False if events_for_funnel is None: return "You didn't set events for funnel" query = self._get_correct_database_query('analyze_events_funnel', add_date, events_for_funnel=events_for_funnel) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = cursor.fetchall() if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' sort_data = [] event_funnel = [] for event_for_position in events_for_funnel: for values in data: if event_for_position == values[0]: event_funnel.append(values[0]) sort_data.append(values[1]) data = dict( number=sort_data, event=event_funnel) fig = px.funnel(data, x='number', y='event', title='Funnel of events') photo = fig.to_image(format="png") cursor.close() text = f'Funnel of events\n' for event, number in zip(event_funnel, sort_data): text += f'{event} {number}\n' return photo, text except Exception as error: print("There are some problems in analyze_events_funnel function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_assessment(self, period_start=None, period_end=None): """ Analyze assessment Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_assessment', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.pie(data, values='amount', names='assessment', title='Assessment') photo = fig.to_image(format="png") cursor.close() text = f'Assessment\n' for i in range(len(data)): text += f'Rate {data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_assessment function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_review(self, period_start=None, period_end=None, volume=5): """ Analyze review Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period volume: number of review to show Returns ------- Information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_review', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) cursor.close() text = f'Review\n' data = data[:volume] for i in range(len(data)): text += f'#{i+1} {data.iloc[i, 0]}\n' return text except Exception as error: print("There are some problems in analyze_review function: ", error) return 'Error(maybe in varaibles)' def analyze_language(self, period_start=None, period_end=None): """ Analyze what language users use Parameters ---------- period_start: str beginning of the analysis period period_end: str end of the analysis period Returns ------- Photo in bytes format and information in string format. """ try: cursor = self.conn.cursor() if period_start is not None and period_end is not None: add_date = True else: add_date = False query = self._get_correct_database_query('analyze_language', add_date) cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,'period_end': period_end}) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) if len(data) == 0: img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Nothing") return img, 'No data' fig = px.pie(data, values='amount', names='type', title='Language') photo = fig.to_image(format="png") cursor.close() text = 'Language\n' for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return photo, text except Exception as error: print("There are some problems in analyze_language function: ", error) img = Image.new('RGB', (100, 100)) d = ImageDraw.Draw(img) d.text((40, 45), "Error") return img, 'Error(maybe in varaibles)' def analyze_bots_users(self): """ Analyze number of users in all bots Returns ------- Information in string format. """ try: cursor = self.conn.cursor() query = self._get_correct_database_query('analyze_bots_users') cursor.execute(query) data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description]) text = "Bot's users\n" for i in range(len(data)): text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n' return text except Exception as error: print("There are some problems in analyze_bots_users function: ", error) return 'Error' def sql_query(self, query): """ Run SQL queries in database. Parameters ---------- query: str query for analysis Returns ------- Information in string format. """ try: cursor = self.conn.cursor() cursor.execute(query) data = cursor.fetchall() columns = [desc[0] for desc in cursor.description] text = 'Answer:\n' text = text + " ".join(columns) + "\n" for i in data: row = '' for j in i: row += f'{str(j)} ' text += f"{row}\n" cursor.close() return text except Exception as error: print("There are some problems in sql function: ", error)
39.634752
125
0.520421
5,109
44,708
4.407908
0.043061
0.048357
0.016785
0.03206
0.851776
0.832327
0.827931
0.814032
0.800266
0.768295
0
0.014111
0.37387
44,708
1,127
126
39.66992
0.790376
0.149213
0
0.691751
0
0
0.164674
0.011725
0
0
0
0
0
1
0.043415
false
0.005789
0.01013
0
0.143271
0.039074
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
a8e5b8ea023a379a8155b7d5446f567030b899fa
20,582
py
Python
Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py
SergeBakharev/content
d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf
[ "MIT" ]
1
2020-11-25T00:42:27.000Z
2020-11-25T00:42:27.000Z
Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py
SergeBakharev/content
d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf
[ "MIT" ]
35
2022-03-14T12:40:27.000Z
2022-03-31T01:50:51.000Z
Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py
SergeBakharev/content
d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf
[ "MIT" ]
2
2021-12-13T13:07:21.000Z
2022-03-05T02:23:34.000Z
import json import io def util_load_json(path): with io.open(path, mode='r', encoding='utf-8') as f: return json.loads(f.read()) def test_gra_fetch_users(requests_mock): """Unit test Given - fetch gra users - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-users.json') requests_mock.get('https://test.com/api/users', json=mock_response) api_url = '/users' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Users', 'employeeId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Users' assert response.outputs_key_field == 'employeeId' def test_gra_fetch_accounts(requests_mock): """Unit test Given - fetch gra accounts - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-accounts.json') requests_mock.get('https://test.com/api/accounts', json=mock_response) api_url = '/accounts' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Accounts' assert response.outputs_key_field == 'id' def test_gra_fetch_active_resource_accounts(requests_mock): """Unit test Given - fetch gra active resource accounts - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-active-resource-accounts.json') requests_mock.get('https://test.com/api/resources/Linux/accounts', json=mock_response) api_url = '/resources/Linux/accounts' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Active.Resource.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Active.Resource.Accounts' assert response.outputs_key_field == 'id' def test_gra_fetch_user_accounts(requests_mock): """Unit test Given - fetch gra users accounts - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-user-accounts.json') requests_mock.get('https://test.com/api/users/AB1234/accounts', json=mock_response) api_url = '/users/AB1234/accounts' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.User.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.User.Accounts' assert response.outputs_key_field == 'id' def test_gra_fetch_resource_highrisk_accounts(requests_mock): """Unit test Given - fetch gra resource high risk accounts - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-resource-highrisk-accounts.json') requests_mock.get('https://test.com/api/resources/Linux/accounts/highrisk', json=mock_response) api_url = '/resources/Linux/accounts/highrisk' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Resource.Highrisk.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Resource.Highrisk.Accounts' assert response.outputs_key_field == 'id' def test_gra_fetch_hpa(requests_mock): """Unit test Given - fetch high privileged accounts - command args page , max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-hpa.json') requests_mock.get('https://test.com/api/accounts/highprivileged', json=mock_response) api_url = '/accounts/highprivileged' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Hpa', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Hpa' assert response.outputs_key_field == 'id' def test_gra_fetch_resource_hpa(requests_mock): """Unit test Given - fetch high privileged accounts for resource - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-resource-hpa.json') requests_mock.get('https://test.com/api/resources/Linux/accounts/highprivileged', json=mock_response) api_url = '/resources/Linux/accounts/highprivileged' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Resource.Hpa', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Resource.Hpa' assert response.outputs_key_field == 'id' def test_gra_fetch_orphan_accounts(requests_mock): """Unit test Given - fetch orphan accounts - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-orphan-accounts.json') requests_mock.get('https://test.com/api/accounts/orphan', json=mock_response) api_url = '/accounts/orphan' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Orphan.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Orphan.Accounts' assert response.outputs_key_field == 'id' def test_gra_fetch_resource_orphan_accounts(requests_mock): """Unit test Given - fetch orphan accounts for resource - command args page, max, resource - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-resource-orphan-accounts.json') requests_mock.get('https://test.com/api/resources/Linux/accounts/orphan', json=mock_response) api_url = '/resources/Linux/accounts/orphan' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Resource.Orphan.Accounts', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Resource.Orphan.Accounts' assert response.outputs_key_field == 'id' def test_gra_user_activities(requests_mock): """Unit test Given - fetch gra user activities - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-user-activities.json') requests_mock.get('https://test.com/api/user/AB1234/activity', json=mock_response) api_url = '/user/AB1234/activity' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.User.Activity', 'id', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.User.Activity' assert response.outputs_key_field == 'id' def test_fetch_gra_users_details(requests_mock): """Unit test Given - fetch gra user details - command args page, max, employeeId - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-fetch-users-details.json') requests_mock.get('https://test.com/api/users/AB1234', json=mock_response) api_url = '/users/AB1234' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.User', 'employeeId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.User' assert response.outputs_key_field == 'employeeId' def test_gra_highRisk_users(requests_mock): """Unit test Given - fetch gra high risk users - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-highRisk-users.json') requests_mock.get('https://test.com/api/users/highrisk', json=mock_response) api_url = '/users/highrisk' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Highrisk.Users', 'employeeId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Highrisk.Users' assert response.outputs_key_field == 'employeeId' def test_gra_cases(requests_mock): """Unit test Given - fetch gra cases as per status - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-cases.json') requests_mock.get('https://test.com/api/cases/OPEN', json=mock_response) api_url = '/cases/OPEN' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, api_url, 'Gra.Cases', 'caseId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Cases' assert response.outputs_key_field == 'caseId' def test_fetch_user_anomalies(requests_mock): """Unit test Given - fetch gra user anomalies - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra fetch users command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-user-anomalies.json') requests_mock.get('https://test.com/api/users/AB1234/anomalies/', json=mock_response) anomaly_url = '/users/AB1234/anomalies/' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, anomaly_url, 'Gra.User.Anomalies', 'anomaly_name', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.User.Anomalies' assert response.outputs_key_field == 'anomaly_name' def test_module(mocker): """ Given - Gurucul GRA test application When - mock the demisto params. - mock the Client's generate_token Then - run the test_module command using the Client Validate The response is ok. """ from GuruculGRA import Client, test_module_command client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) mocker.patch.object(client, 'validate_api_key') result = test_module_command(client) assert result == 'ok' def test_gra_case_action(requests_mock): """Unit test Given - gra case action - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra case action command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-case-action.json') requests_mock.get('https://test.com/api/cases/closeCase', json=mock_response) cases_url = '/cases/closeCase' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, cases_url, 'Gra.Case.Action', 'caseId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Case.Action' assert response.outputs_key_field == 'caseId' def test_gra_case_action_anomaly(requests_mock): """Unit test Given - gra case action - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra case action anomaly command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-case-action-anomaly.json') requests_mock.get('https://test.com/api/cases/closeCaseAnomaly', json=mock_response) cases_url = '/cases/closeCaseAnomaly' params = {'page': 1, 'max': 10} client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, cases_url, 'Gra.Cases.Action.Anomaly', 'caseId', params) assert response.outputs == mock_response assert response.outputs_prefix == 'Gra.Cases.Action.Anomaly' assert response.outputs_key_field == 'caseId' def test_gra_investigate_anomaly_summary(requests_mock): """Unit test Given - gra investigate anomaly summary - command args page, max - command raw response When - mock the Client's send_request. Then - run the gra investigate anomaly summary command using the Client Validate the output with mock response Validate the output prefix Validate key field """ from GuruculGRA import Client, fetch_record_command mock_response = util_load_json('test_data/gra-investigate-anomaly-summary.json') requests_mock.get('https://test.com/api/investigateAnomaly/anomalySummary/ModelName', json=mock_response) investigateAnomaly_url = '/investigateAnomaly/anomalySummary/ModelName' client = Client( base_url='https://test.com/api', verify=False, headers={ 'Authentication': 'Bearer some_api_key' } ) response = fetch_record_command(client, investigateAnomaly_url, 'Gra.Investigate.Anomaly.Summary', 'modelId', None) mock_response_array = [] mock_response_array.append(mock_response) assert response.outputs == mock_response_array assert response.outputs_prefix == 'Gra.Investigate.Anomaly.Summary' assert response.outputs_key_field == 'modelId'
34.649832
119
0.643426
2,464
20,582
5.195617
0.048701
0.066552
0.083659
0.041009
0.901265
0.877753
0.860725
0.843306
0.792064
0.767693
0
0.005347
0.263969
20,582
593
120
34.708263
0.839725
0.236955
0
0.527778
0
0
0.256735
0.085888
0
0
0
0
0.160494
1
0.058642
false
0
0.061728
0
0.123457
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
0f0b2c5617016da3c2538d18397a8d81cf590084
54
py
Python
playground2.py
cjdjr/cosp_nas
f54243176e8398d79df25d295704f24238f24cc7
[ "MIT" ]
3
2021-12-09T18:59:40.000Z
2021-12-09T19:00:08.000Z
playground2.py
cjdjr/cosp_nas
f54243176e8398d79df25d295704f24238f24cc7
[ "MIT" ]
null
null
null
playground2.py
cjdjr/cosp_nas
f54243176e8398d79df25d295704f24238f24cc7
[ "MIT" ]
null
null
null
from playground1 import * def work(): print(get())
18
25
0.666667
7
54
5.142857
1
0
0
0
0
0
0
0
0
0
0
0.022727
0.185185
54
3
26
18
0.795455
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0
0.333333
0
0.666667
0.333333
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
0
1
0
0
6
0f0ee4c088d03aef743e69f1952dcbac96a88a7e
115
py
Python
tests/__init__.py
burninghelix123/sequences
0ab976de94b23a2ce8b0880092dcd0e930543756
[ "0BSD" ]
null
null
null
tests/__init__.py
burninghelix123/sequences
0ab976de94b23a2ce8b0880092dcd0e930543756
[ "0BSD" ]
1
2017-01-23T18:01:27.000Z
2017-06-13T20:48:58.000Z
tests/__init__.py
burninghelix123/sequences
0ab976de94b23a2ce8b0880092dcd0e930543756
[ "0BSD" ]
null
null
null
# -*- coding: utf-8 -*- import test_filestructure # NOQA import test_sequences # NOQA
23
44
0.53913
11
115
5.454545
0.727273
0.333333
0
0
0
0
0
0
0
0
0
0.013699
0.365217
115
4
45
28.75
0.808219
0.269565
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
7e1d03af38b8db1d42e68ac4633056f2567696f7
169
py
Python
avb/__init__.py
markreidvfx/pyavb
48b05a84ff9752703a9218d5ca157ee672b020ab
[ "MIT" ]
21
2019-02-05T22:08:32.000Z
2022-03-07T03:37:59.000Z
avb/__init__.py
markreidvfx/pyavb
48b05a84ff9752703a9218d5ca157ee672b020ab
[ "MIT" ]
10
2019-07-25T04:03:44.000Z
2021-08-12T21:31:37.000Z
avb/__init__.py
markreidvfx/pyavb
48b05a84ff9752703a9218d5ca157ee672b020ab
[ "MIT" ]
1
2020-02-20T15:08:40.000Z
2020-02-20T15:08:40.000Z
from .file import AVBFile as open from . import bin from . import attributes from . import components from . import trackgroups from . import essence from . import misc
21.125
33
0.781065
24
169
5.5
0.5
0.454545
0
0
0
0
0
0
0
0
0
0
0.177515
169
7
34
24.142857
0.94964
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
7e424aee1346568b8dd267806e9fea0528e9a986
128
py
Python
database/db.py
Kaneki1416/kenKaneki
cdd59c18b74d559d277b736e5e536884ce4e9499
[ "MIT" ]
1
2022-01-11T21:59:34.000Z
2022-01-11T21:59:34.000Z
database/db.py
Kaneki1416/kenKaneki
cdd59c18b74d559d277b736e5e536884ce4e9499
[ "MIT" ]
1
2022-01-22T14:40:01.000Z
2022-01-22T14:40:59.000Z
database/db.py
Kaneki1416/kenKaneki
cdd59c18b74d559d277b736e5e536884ce4e9499
[ "MIT" ]
4
2021-11-19T12:45:56.000Z
2022-02-12T03:28:44.000Z
from .chat_database import ChatDB from .sudo_database import SudoDB class Methods(ChatDB, SudoDB): pass dbs = Methods()
12.8
33
0.75
17
128
5.529412
0.647059
0.297872
0
0
0
0
0
0
0
0
0
0
0.179688
128
9
34
14.222222
0.895238
0
0
0
0
0
0
0
0
0
0
0
0
1
0
false
0.2
0.4
0
0.6
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
1
0
1
0
0
6
0e4d89d423e8516b79dbd1f1e5179e17ac0a8ef9
50
py
Python
snippets/python-version.py
district10/snippet-manager
bebe45a601368947168e3ee6e6ab8c1fc2ee2055
[ "MIT" ]
7
2018-08-04T09:28:19.000Z
2020-10-19T17:46:34.000Z
snippets/python-version.py
district10/snippet-manager
bebe45a601368947168e3ee6e6ab8c1fc2ee2055
[ "MIT" ]
null
null
null
snippets/python-version.py
district10/snippet-manager
bebe45a601368947168e3ee6e6ab8c1fc2ee2055
[ "MIT" ]
2
2018-07-31T04:14:55.000Z
2020-04-02T01:22:39.000Z
# python sys version import sys print sys.version
12.5
20
0.8
8
50
5
0.625
0.5
0
0
0
0
0
0
0
0
0
0
0.16
50
3
21
16.666667
0.952381
0.36
0
0
0
0
0
0
0
0
0
0
0
0
null
null
0
0.5
null
null
0.5
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
1
0
0
1
0
6
0e655c4d101a95eeabef2ce9e5997f268ef321ca
171
py
Python
openmldefaults/symbolic/__init__.py
pfistfl/openml-defaults
0678167f807512bd0c957f82a83ff8181461090c
[ "BSD-3-Clause" ]
1
2019-08-01T13:44:47.000Z
2019-08-01T13:44:47.000Z
openmldefaults/symbolic/__init__.py
pfistfl/openml-defaults
0678167f807512bd0c957f82a83ff8181461090c
[ "BSD-3-Clause" ]
null
null
null
openmldefaults/symbolic/__init__.py
pfistfl/openml-defaults
0678167f807512bd0c957f82a83ff8181461090c
[ "BSD-3-Clause" ]
1
2019-08-29T15:54:38.000Z
2019-08-29T15:54:38.000Z
from .transform import ABCTransformer, all_transform_fns from .configuration_wrapper import ConfigurationSampler, VanillaConfigurationSpaceSampler, SymbolicConfiguration
42.75
112
0.900585
14
171
10.785714
0.785714
0
0
0
0
0
0
0
0
0
0
0
0.070175
171
3
113
57
0.949686
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
7d4f60590780fc7d15147fd78c32817e8e258cc0
21,385
py
Python
src/genie/libs/parser/ios/tests/test_show_lisp.py
nujo/genieparser
083b01efc46afc32abe1a1858729578beab50cd3
[ "Apache-2.0" ]
2
2021-01-27T03:37:39.000Z
2021-01-27T03:40:50.000Z
src/genie/libs/parser/ios/tests/test_show_lisp.py
nujo/genieparser
083b01efc46afc32abe1a1858729578beab50cd3
[ "Apache-2.0" ]
1
2020-08-01T00:23:31.000Z
2020-08-01T00:40:05.000Z
src/genie/libs/parser/ios/tests/test_show_lisp.py
nujo/genieparser
083b01efc46afc32abe1a1858729578beab50cd3
[ "Apache-2.0" ]
null
null
null
# Python import unittest from unittest.mock import Mock # ATS from pyats.topology import Device from pyats.topology import loader # Metaparser from genie.metaparser.util.exceptions import SchemaEmptyParserError, SchemaMissingKeyError # ios show_lisp from genie.libs.parser.ios.show_lisp import ShowLispSession,\ ShowLispPlatform,\ ShowLispExtranet,\ ShowLispDynamicEidDetail,\ ShowLispService,\ ShowLispServiceMapCache,\ ShowLispServiceRlocMembers,\ ShowLispServiceSmr,\ ShowLispServiceSummary,\ ShowLispServiceDatabase,\ ShowLispServiceServerSummary,\ ShowLispServiceServerDetailInternal,\ ShowLispServiceStatistics # iosxe tests/test_show_lisp from genie.libs.parser.iosxe.tests.test_show_lisp import \ test_show_lisp_session as test_show_lisp_session_iosxe,\ test_show_lisp_platform as test_show_lisp_platform_iosxe,\ test_show_lisp_extranet as test_show_lisp_extranet_iosxe,\ test_show_lisp_dynamic_eid_detail as test_show_lisp_dynamic_eid_detail_iosxe,\ test_show_lisp_service as test_show_lisp_service_iosxe,\ test_show_lisp_service_map_cache as test_show_lisp_service_map_cache_iosxe,\ test_show_lisp_service_rloc_members as test_show_lisp_service_rloc_members_iosxe,\ test_show_lisp_service_smr as test_show_lisp_service_smr_iosxe,\ test_show_lisp_service_summary as test_show_lisp_service_summary_iosxe,\ test_show_lisp_service_database as test_show_lisp_service_database_iosxe,\ test_show_lisp_service_server_summary as test_show_lisp_service_server_summary_iosxe,\ test_show_lisp_service_server_detail_internal as test_show_lisp_service_server_detail_internal_iosxe,\ test_show_lisp_service_statistics as test_show_lisp_service_statistics_iosxe # ================================= # Unit test for 'show lisp session' # ================================= class test_show_lisp_session(test_show_lisp_session_iosxe): def test_show_lisp_session_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispSession(device=self.device) parsed_output = obj.parse() self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_session_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispSession(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse() # ================================== # Unit test for 'show lisp platform' # ================================== class test_show_lisp_platform(test_show_lisp_platform_iosxe): def test_show_lisp_platform_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispPlatform(device=self.device) parsed_output = obj.parse() self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_platform_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispPlatform(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse() # =========================================================================== # Unit test for 'show lisp all extranet <extranet> instance-id <instance_id>' # =========================================================================== class test_show_lisp_extranet(test_show_lisp_extranet_iosxe): def test_show_lisp_extranet_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispExtranet(device=self.device) parsed_output = obj.parse(extranet='ext1', instance_id='103') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_extranet_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispExtranet(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(extranet='ext1', instance_id='103') # ========================================================================== # Unit test for 'show lisp all instance-id <instance_id> dynamic-eid detail' # ========================================================================== class test_show_lisp_dynamic_eid_detail(test_show_lisp_dynamic_eid_detail_iosxe): def test_show_lisp_dynamic_eid_detail_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispDynamicEidDetail(device=self.device) parsed_output = obj.parse(instance_id=101) self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_dynamic_eid_detail_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispDynamicEidDetail(device=self.device) parsed_output = obj.parse(instance_id=101) self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_dynamic_eid_detail_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispDynamicEidDetail(device=self.device) parsed_output = obj.parse(instance_id=101) self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_dynamic_eid_detail_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispDynamicEidDetail(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(instance_id=101) # ================================================================= # Unit test for 'show lisp all instance-id <instance_id> <service>' # ================================================================= class test_show_lisp_service(test_show_lisp_service_iosxe): def test_show_lisp_service_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id='*', service='ethernet') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_full4(self): self.maxDiff = None self.device = Mock(**self.golden_output4) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id='*', service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output4) def test_show_lisp_service_full5(self): self.maxDiff = None self.device = Mock(**self.golden_output5) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id='*', service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output5) def test_show_lisp_service_full6(self): self.maxDiff = None self.device = Mock(**self.golden_output6) obj = ShowLispService(device=self.device) parsed_output = obj.parse(instance_id='*', service='ethernet') self.assertEqual(parsed_output, self.golden_parsed_output6) def test_show_lisp_service_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispService(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(instance_id='*', service='ipv4') # =========================================================================== # Unit test for 'show lisp all instance-id <instance_id> <service> map-cache' # =========================================================================== class test_show_lisp_service_map_cache(test_show_lisp_service_map_cache_iosxe): def test_show_lisp_service_map_cache_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceMapCache(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_map_cache_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceMapCache(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_map_cache_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceMapCache(device=self.device) parsed_output = obj.parse(instance_id='*', service='ethernet') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_map_cache_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceMapCache(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(instance_id='*', service='ipv4') # ============================================================================== # Unit test for 'show lisp all instance-id <instance_id> <service> rloc members' # ============================================================================== class test_show_lisp_service_rloc_members(test_show_lisp_service_rloc_members_iosxe): def test_show_lisp_service_rloc_members_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceRlocMembers(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_rloc_members_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceRlocMembers(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_rloc_members_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceRlocMembers(device=self.device) parsed_output = obj.parse(instance_id='*', service='ethernet') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_rloc_members_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceRlocMembers(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(instance_id='*', service='ipv4') # ===================================================================== # Unit test for 'show lisp all instance-id <instance_id> <service> smr' # ===================================================================== class test_show_lisp_service_smr(test_show_lisp_service_smr_iosxe): def test_show_lisp_service_smr_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceSmr(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_smr_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceSmr(device=self.device) parsed_output = obj.parse(instance_id=101, service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_smr_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceSmr(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(instance_id='*', service='ipv4') # ======================================================= # Unit test for 'show lisp all service <service> summary' # ======================================================= class test_show_lisp_service_summary(test_show_lisp_service_summary_iosxe): def test_show_lisp_service_summary_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceSummary(device=self.device) parsed_output = obj.parse(service='ipv4') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_summary_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceSummary(device=self.device) parsed_output = obj.parse(service='ipv6') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_summary_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceSummary(device=self.device) parsed_output = obj.parse(service='ethernet') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_summary_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceSummary(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(service='ipv4') # ========================================================================== # Unit test for 'show lisp all instance-id <instance_id> <service> dabatase' # ========================================================================== class test_show_lisp_service_database(test_show_lisp_service_database_iosxe): def test_show_lisp_service_database_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceDatabase(device=self.device) parsed_output = obj.parse(service='ipv4', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_database_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceDatabase(device=self.device) parsed_output = obj.parse(service='ipv6', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_database_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceDatabase(device=self.device) parsed_output = obj.parse(service='ethernet', instance_id='*') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_database_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceDatabase(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(service='ipv4', instance_id='*') # ================================================================================ # Unit test for 'show lisp all instance-id <instance_id> <service> server summary' # ================================================================================ class test_show_lisp_service_server_summary(test_show_lisp_service_server_summary_iosxe): def test_show_lisp_service_server_summary_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceServerSummary(device=self.device) parsed_output = obj.parse(service='ipv4', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_server_summary_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceServerSummary(device=self.device) parsed_output = obj.parse(service='ipv6', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_server_summary_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceServerSummary(device=self.device) parsed_output = obj.parse(service='ethernet', instance_id='*') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_server_summary_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceServerSummary(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(service='ipv4', instance_id='*') # ======================================================================================== # Unit test for 'show lisp all instance-id <instance_id> <service> server detail internal' # ======================================================================================== class test_show_lisp_service_server_detail_internal(test_show_lisp_service_server_detail_internal_iosxe): def test_show_lisp_service_server_detail_internal_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceServerDetailInternal(device=self.device) parsed_output = obj.parse(service='ipv4', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_server_detail_internal_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceServerDetailInternal(device=self.device) parsed_output = obj.parse(service='ipv6', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_server_detail_internal_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceServerDetailInternal(device=self.device) parsed_output = obj.parse(service='ethernet', instance_id='*') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_server_detail_internal_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceServerDetailInternal(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(service='ipv4', instance_id='*') # ============================================================================ # Unit test for 'show lisp all instance-id <instance_id> <service> statistics' # ============================================================================ class test_show_lisp_service_statistics(test_show_lisp_service_statistics_iosxe): def test_show_lisp_service_statistics_full1(self): self.maxDiff = None self.device = Mock(**self.golden_output1) obj = ShowLispServiceStatistics(device=self.device) parsed_output = obj.parse(service='ipv4', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output1) def test_show_lisp_service_statistics_full2(self): self.maxDiff = None self.device = Mock(**self.golden_output2) obj = ShowLispServiceStatistics(device=self.device) parsed_output = obj.parse(service='ipv6', instance_id='101') self.assertEqual(parsed_output, self.golden_parsed_output2) def test_show_lisp_service_statistics_full3(self): self.maxDiff = None self.device = Mock(**self.golden_output3) obj = ShowLispServiceStatistics(device=self.device) parsed_output = obj.parse(service='ethernet', instance_id='*') self.assertEqual(parsed_output, self.golden_parsed_output3) def test_show_lisp_service_statistics_empty(self): self.maxDiff = None self.device = Mock(**self.empty_output) obj = ShowLispServiceStatistics(device=self.device) with self.assertRaises(SchemaEmptyParserError): parsed_output = obj.parse(service='ipv4', instance_id='*') if __name__ == '__main__': unittest.main()
46.48913
114
0.64751
2,311
21,385
5.663782
0.04154
0.07151
0.093514
0.107418
0.933456
0.85866
0.798992
0.750707
0.737566
0.715181
0
0.01165
0.189198
21,385
459
115
46.590414
0.743238
0.127613
0
0.689552
0
0
0.013541
0
0
0
0
0
0.143284
1
0.143284
false
0
0.020896
0
0.202985
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
adadee060c56372e8908adb4d528845f3dfccedb
179
py
Python
gql/schemas/scalars/__init__.py
apoveda25/graphql-python-server
eb7b911aa1116327120b857beb17da3e30523e74
[ "Apache-2.0" ]
4
2020-06-20T11:54:04.000Z
2021-09-07T11:41:32.000Z
gql/schemas/scalars/__init__.py
apoveda25/graphql-python-server
eb7b911aa1116327120b857beb17da3e30523e74
[ "Apache-2.0" ]
null
null
null
gql/schemas/scalars/__init__.py
apoveda25/graphql-python-server
eb7b911aa1116327120b857beb17da3e30523e74
[ "Apache-2.0" ]
null
null
null
import os from ariadne.load_schema import load_schema_from_path scalars = load_schema_from_path(os.getcwd() + "/gql/schemas/scalars/schema.graphql") scalars_defs = f"{scalars}"
25.571429
84
0.798883
27
179
5
0.518519
0.222222
0.207407
0.266667
0
0
0
0
0
0
0
0
0.089385
179
6
85
29.833333
0.828221
0
0
0
0
0
0.24581
0.195531
0
0
0
0
0
1
0
false
0
0.5
0
0.5
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
1
0
0
0
0
6
adc6d49974e683241ebec9d6c0b4e30fc2f26d97
25
py
Python
vkcoinapi/__init__.py
bixnel/vkcoinapi
1e16afa4c4378665d1915454674b4cad7c154020
[ "MIT" ]
7
2019-04-16T16:34:05.000Z
2019-07-09T06:51:14.000Z
vkcoinapi/__init__.py
bixnel/vkcoinapi
1e16afa4c4378665d1915454674b4cad7c154020
[ "MIT" ]
null
null
null
vkcoinapi/__init__.py
bixnel/vkcoinapi
1e16afa4c4378665d1915454674b4cad7c154020
[ "MIT" ]
3
2019-05-01T03:22:04.000Z
2019-07-09T08:36:42.000Z
from .vkcoinapi import *
12.5
24
0.76
3
25
6.333333
1
0
0
0
0
0
0
0
0
0
0
0
0.16
25
1
25
25
0.904762
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
70b532935ce9b8ae992ed1ab8452249612def5a4
77
py
Python
TransparencyIntImporter/data/__data__.py
weso/landportal-importers
6edfa3c301422bbe8c09cb877b1cbddbcd902463
[ "Unlicense" ]
null
null
null
TransparencyIntImporter/data/__data__.py
weso/landportal-importers
6edfa3c301422bbe8c09cb877b1cbddbcd902463
[ "Unlicense" ]
8
2016-02-16T13:05:37.000Z
2017-01-04T14:38:03.000Z
old-importers/TransparencyIntImporter/data/__data__.py
landportal/landbook-importers
f0e246f493329b9c5741c50f3a0495d27ee5c54b
[ "MIT" ]
null
null
null
"""__data__.py""" import os def path(): return os.path.dirname(__file__)
15.4
36
0.675325
11
77
4
0.818182
0
0
0
0
0
0
0
0
0
0
0
0.142857
77
5
36
15.4
0.666667
0.142857
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0
0.333333
0.333333
1
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
1
0
0
0
6
70f46ba4a0a4bca6ce6da3623cdc12049041a491
22,789
py
Python
test/test_interface.py
timercrack/pydatacoll
fa5c221e8071ec8222eff9e11573d91cdc4b80d4
[ "Apache-2.0" ]
22
2015-12-08T07:29:03.000Z
2022-02-08T06:22:29.000Z
test/test_interface.py
timercrack/pydatacoll
fa5c221e8071ec8222eff9e11573d91cdc4b80d4
[ "Apache-2.0" ]
12
2015-12-11T03:27:13.000Z
2018-04-23T13:09:32.000Z
test/test_interface.py
timercrack/pydatacoll
fa5c221e8071ec8222eff9e11573d91cdc4b80d4
[ "Apache-2.0" ]
10
2015-12-08T09:31:43.000Z
2022-02-08T06:22:37.000Z
import asyncio import aiohttp import aioredis import asynctest import redis try: import ujson as json except ImportError: import json import pydatacoll.utils.logger as my_logger from pydatacoll.resources.protocol import * from pydatacoll.resources.redis_key import * from test.mock_device import mock_data, iec104device from pydatacoll import api_server from pydatacoll.utils.read_config import * logger = my_logger.get_logger('TestInterface') class RedisTest(asynctest.TestCase): async def test_connect_timeout(self): try: loop = asyncio.get_event_loop() reader, writer = await asyncio.open_connection(config.get('REDIS', 'host', fallback='127.0.0.1'), config.getint('REDIS', 'port', fallback=6379), loop=loop) loop.call_later(1, lambda w: w.close(), writer) data = await reader.readexactly(100) logger.debug('Received: %r', data.decode()) # print("data={}".format(data)) self.assertEqual(len(data), 0) except asyncio.IncompleteReadError: logger.debug('stream closed!') except Exception as e: logger.error('e=', repr(e)) async def test_redis_listen(self): pub_client = await aioredis.create_redis((config.get('REDIS', 'host', fallback='127.0.0.1'), config.getint('REDIS', 'port', fallback=6379)), db=config.getint('REDIS', 'db', fallback=1)) sub_client = await aioredis.create_redis((config.get('REDIS', 'host', fallback='127.0.0.1'), config.getint('REDIS', 'port', fallback=6379)), db=config.getint('REDIS', 'db', fallback=1)) res = await sub_client.subscribe('channel:foo') ch1 = res[0] async def reader(ch): while await ch.wait_message(): msg = await ch.get_json() logger.debug("channel[%s] Got Message:%s", ch.name.decode(), msg) logger.debug('quit reader!') tsk = asyncio.ensure_future(reader(ch1)) res = await pub_client.publish_json('channel:foo', ["Hello", "world"]) self.assertEqual(res, 1) await sub_client.unsubscribe('channel:foo') await tsk sub_client.close() pub_client.close() class InterfaceTest(asynctest.TestCase): loop = None # make pycharm happy def setUp(self): self.redis_client = redis.StrictRedis(db=1, decode_responses=True) mock_data.generate() self.server_list = list() self.server_list = iec104device.create_servers(self.loop) self.api_server = api_server.APIServer(io_loop=self.loop, port=8080) def tearDown(self): self.api_server.stop_server() for server in self.server_list: server.close() self.loop.run_until_complete(server.wait_closed()) async def test_get_redis_key(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/redis_key') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst['channel'], REDIS_KEY['channel']) async def test_get_protocol_list(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/device_protocols') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, DEVICE_PROTOCOLS) async with aiohttp.get('http://127.0.0.1:8080/api/v1/term_protocols') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, TERM_PROTOCOLS) async def test_formula_CRUD(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSequenceEqual(rst, ['1']) async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas/1') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.formula1) async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas/99') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'formula_id not found!') async with aiohttp.post('http://127.0.0.1:8080/api/v1/formulas', data=json.dumps(mock_data.test_formula)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.hgetall('HS:FORMULA:9') self.assertEqual(rst['formula'], mock_data.test_formula['formula']) rst = self.redis_client.sismember('SET:FORMULA', 9) self.assertTrue(rst) async with aiohttp.post('http://127.0.0.1:8080/api/v1/formulas', data=json.dumps(mock_data.test_formula)) as r: self.assertEqual(r.status, 409) rst = await r.text() self.assertEqual(rst, 'formula already exists!') mock_data.test_formula['formula'] = '2+2' mock_data.test_formula['id'] = 5 async with aiohttp.put('http://127.0.0.1:8080/api/v1/formulas/9', data=json.dumps(mock_data.test_formula)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:FORMULA:9') self.assertFalse(rst) rst = self.redis_client.sismember('SET:FORMULA', 9) self.assertFalse(rst) rst = self.redis_client.hgetall('HS:FORMULA:5') self.assertEqual(rst['formula'], '2+2') rst = self.redis_client.sismember('SET:FORMULA', 5) self.assertTrue(rst) async with aiohttp.put('http://127.0.0.1:8080/api/v1/formulas/99', data=json.dumps(mock_data.test_formula)) as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'formula_id not found!') async with aiohttp.delete('http://127.0.0.1:8080/api/v1/formulas/5') as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:FORMULA:5') self.assertFalse(rst) rst = self.redis_client.sismember('SET:FORMULA', 5) self.assertFalse(rst) formula_check = {'formula': 'p1[-1]+10', 'p1': '1:10:1000'} async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r: self.assertEqual(r.status, 200) rst = await r.text() self.assertEqual(rst, 'OK') formula_check['formula'] = 'p1[-1]+p2[-2]' async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r: self.assertEqual(r.status, 200) rst = await r.text() self.assertEqual(rst, """NameError p1[-1]+p2[-2] ^^^ name 'p2' is not defined """) formula_check['p1'] = '123:45:6' async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r: self.assertEqual(r.status, 200) rst = await r.text() self.assertEqual(rst, "parameter not found: p1=123:45:6") formulas = [1] async with aiohttp.post('http://127.0.0.1:8080/api/v2/formulas/del', data=json.dumps(formulas)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.smembers('SET:FORMULA') self.assertEqual(len(rst), 0) async def test_device_CRUD(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSetEqual(set(rst), {'1', '2', '3'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.device1) async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'device_id not found!') async with aiohttp.post('http://127.0.0.1:8080/api/v1/devices', data=json.dumps(mock_data.test_device)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.hgetall('HS:DEVICE:4') self.assertEqual(rst['name'], '测试集中器4') rst = self.redis_client.sismember('SET:DEVICE', 4) self.assertTrue(rst) async with aiohttp.post('http://127.0.0.1:8080/api/v1/devices', data=json.dumps(mock_data.test_device)) as r: self.assertEqual(r.status, 409) rst = await r.text() self.assertEqual(rst, 'device already exists!') mock_data.test_device['name'] = '测试集中器5' mock_data.test_device['id'] = 5 async with aiohttp.put('http://127.0.0.1:8080/api/v1/devices/4', data=json.dumps(mock_data.test_device)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:DEVICE:4') self.assertFalse(rst) rst = self.redis_client.sismember('SET:DEVICE', 4) self.assertFalse(rst) rst = self.redis_client.hgetall('HS:DEVICE:5') self.assertEqual(rst['name'], '测试集中器5') rst = self.redis_client.sismember('SET:DEVICE', 5) self.assertTrue(rst) async with aiohttp.put('http://127.0.0.1:8080/api/v1/devices/99', data=json.dumps(mock_data.test_device)) as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'device_id not found!') async with aiohttp.delete('http://127.0.0.1:8080/api/v1/devices/5') as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:DEVICE:5') self.assertFalse(rst) rst = self.redis_client.sismember('SET:DEVICE', 5) self.assertFalse(rst) devices = [1, 2, 3] async with aiohttp.post('http://127.0.0.1:8080/api/v2/devices/del', data=json.dumps(devices)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.smembers('SET:DEVICE') self.assertEqual(len(rst), 0) async def test_term_CRUD(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSetEqual(set(rst), {'10', '20', '30', '40'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.term10) async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_id not found!') async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSetEqual(set(rst), {'10', '20'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99/terms') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'device_id not found!') async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms', data=json.dumps(mock_data.test_term)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.hgetall('HS:TERM:90') self.assertEqual(rst['name'], '测试终端9') rst = self.redis_client.sismember('SET:TERM', 90) self.assertTrue(rst) rst = self.redis_client.sismember('SET:DEVICE_TERM:1', 90) self.assertEqual(rst, True) async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms', data=json.dumps(mock_data.test_term)) as r: self.assertEqual(r.status, 409) rst = await r.text() self.assertEqual(rst, 'term already exists!') mock_data.test_term['name'] = '测试终端5' mock_data.test_term['id'] = 50 mock_data.test_term['device_id'] = 2 async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/90', data=json.dumps(mock_data.test_term)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:TERM:90') self.assertFalse(rst) rst = self.redis_client.sismember('SET:TERM', 90) self.assertFalse(rst) rst = self.redis_client.sismember('SET:DEVICE_TERM:1', 90) self.assertFalse(rst) rst = self.redis_client.hgetall('HS:TERM:50') self.assertEqual(rst['name'], '测试终端5') rst = self.redis_client.sismember('SET:TERM', 50) self.assertTrue(rst) rst = self.redis_client.sismember('SET:DEVICE_TERM:2', 50) self.assertTrue(rst) async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/99', data=json.dumps(mock_data.test_term)) as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_id not found!') async with aiohttp.delete('http://127.0.0.1:8080/api/v1/terms/50') as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:TERM:50') self.assertFalse(rst) rst = self.redis_client.sismember('SET:TERM', 50) self.assertFalse(rst) terms = [10, 20, 30, 40] async with aiohttp.post('http://127.0.0.1:8080/api/v2/terms/del', data=json.dumps(terms)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.smembers('SET:TERM') self.assertEqual(len(rst), 0) async def test_item_CRUD(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/items') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSetEqual(set(rst), {'1000', '2000'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/items/1000') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.item1000) async with aiohttp.get('http://127.0.0.1:8080/api/v1/items/99') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'item_id not found!') async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertSetEqual(set(rst), {'1000', '2000'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99/items') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_id not found!') async with aiohttp.post('http://127.0.0.1:8080/api/v1/items', data=json.dumps(mock_data.test_item)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.hgetall('HS:ITEM:3000') self.assertEqual(rst['name'], 'C相电压') rst = self.redis_client.sismember('SET:ITEM', 3000) self.assertTrue(rst) async with aiohttp.post('http://127.0.0.1:8080/api/v1/items', data=json.dumps(mock_data.test_item)) as r: self.assertEqual(r.status, 409) rst = await r.text() self.assertEqual(rst, 'item already exists!') mock_data.test_item['name'] = '功率因数' mock_data.test_item['id'] = 4000 async with aiohttp.put('http://127.0.0.1:8080/api/v1/items/3000', data=json.dumps(mock_data.test_item)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:ITEM:3000') self.assertFalse(rst) rst = self.redis_client.sismember('SET:ITEM', 3000) self.assertFalse(rst) rst = self.redis_client.hgetall('HS:ITEM:4000') self.assertEqual(rst['name'], '功率因数') rst = self.redis_client.sismember('SET:ITEM', 4000) self.assertTrue(rst) async with aiohttp.put('http://127.0.0.1:8080/api/v1/items/99', data=json.dumps(mock_data.test_item)) as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'item_id not found!') async with aiohttp.delete('http://127.0.0.1:8080/api/v1/items/4000') as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:ITEM:4000') self.assertFalse(rst) rst = self.redis_client.sismember('SET:ITEM', 4000) self.assertFalse(rst) items = [1000, 2000] async with aiohttp.post('http://127.0.0.1:8080/api/v2/items/del', data=json.dumps(items)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.smembers('SET:ITEM') self.assertEqual(len(rst), 0) async def test_get_data(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms/10/items/1000/datas') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.device1_term10_item1000) async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms/10/items/1000/datas/-1') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, {'2015-12-01T08:50:15.000003': '102.0'}) async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99/terms/99/items/99/datas') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertEqual(len(rst), 0) async def test_term_item_CRUD(self): async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items/1000') as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertDictEqual(rst, mock_data.term10_item1000) async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99/items/1000') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_id not found!') async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items/99') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'item_id not found!') async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/20/items/2000') as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_item not found!') async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms/20/items', data=json.dumps(mock_data.test_term_item)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.hgetall('HS:TERM_ITEM:20:2000') mock_data.test_term_item.update({'device_id': '1'}) self.assertDictEqual(rst, mock_data.test_term_item) rst = self.redis_client.hgetall('HS:MAPPING:IEC104:1:400') self.assertDictEqual(rst, mock_data.test_term_item) rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000) self.assertTrue(rst) async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms/20/items', data=json.dumps(mock_data.test_term_item)) as r: self.assertEqual(r.status, 409) rst = await r.text() self.assertEqual(rst, 'term_item already exists!') mock_data.test_term_item['protocol_code'] = '401' async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/20/items/2000', data=json.dumps(mock_data.test_term_item)) as r: self.assertEqual(r.status, 200) rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000) self.assertTrue(rst) rst = self.redis_client.exists('HS:MAPPING:IEC104:1:400') self.assertFalse(rst) rst = self.redis_client.hgetall('HS:TERM_ITEM:20:2000') self.assertEqual(rst['protocol_code'], '401') rst = self.redis_client.hgetall('HS:MAPPING:IEC104:1:401') self.assertDictEqual(rst, mock_data.test_term_item) async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/30/items/2000', data=json.dumps(mock_data.test_term_item)) as r: self.assertEqual(r.status, 404) rst = await r.text() self.assertEqual(rst, 'term_item not found!') async with aiohttp.delete('http://127.0.0.1:8080/api/v1/terms/20/items/2000') as r: self.assertEqual(r.status, 200) rst = self.redis_client.exists('HS:TERM_ITEM:20:2000') self.assertFalse(rst) rst = self.redis_client.exists('HS:MAPPING:IEC104:1:401') self.assertFalse(rst) rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000) self.assertFalse(rst) del mock_data.test_term_item['device_id'] async with aiohttp.post('http://127.0.0.1:8080/api/v2/term_items/del', data=json.dumps(mock_data.term_item_list)) as r: self.assertEqual(r.status, 200) rst = list(self.redis_client.scan_iter('HS:TERM_ITEMS:*')) self.assertEqual(len(rst), 0) async def test_device_call(self): call_dict = {'device_id': '1', 'term_id': '10', 'item_id': 1000} async with aiohttp.post('http://127.0.0.1:8080/api/v1/device_call', data=json.dumps(call_dict)) as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertAlmostEqual(rst['value'], 102, delta=0.0001) async def test_device_ctrl(self): ctrl_dict = {'device_id': '2', 'term_id': '30', 'item_id': '1000', 'value': 123.4} async with aiohttp.post('http://127.0.0.1:8080/api/v1/device_ctrl', data=json.dumps(ctrl_dict)) as r: self.assertEqual(r.status, 200) rst = await r.json() self.assertAlmostEqual(rst['value'], 123.4, delta=0.0001) async def test_sql_check(self): async with aiohttp.post('http://127.0.0.1:8080/api/v1/sql_check', data=json.dumps(mock_data.term10_item1000)) as r: self.assertEqual(r.status, 200) rst = await r.text() self.assertEqual(rst, 'not found sql to check')
49.32684
121
0.59362
3,175
22,789
4.174173
0.070551
0.116577
0.024523
0.029427
0.803516
0.779446
0.768203
0.76179
0.749566
0.693881
0
0.081345
0.258809
22,789
461
122
49.433839
0.703274
0.002106
0
0.5
0
0.038647
0.188407
0.00519
0
0
0
0
0.376812
1
0.004831
false
0
0.033816
0
0.045894
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
cb34d3c85b786c92ab8e60553979400dc0dabad6
5,921
py
Python
tests/test_prototype_jpeg.py
GLaDOS1105/prototype-jpeg
15c04980d103e9158cd958fe6d65111b1ef582a6
[ "MIT" ]
8
2019-08-25T02:38:39.000Z
2021-01-09T07:17:46.000Z
tests/test_prototype_jpeg.py
GLaDOS1105/prototype-jpeg
15c04980d103e9158cd958fe6d65111b1ef582a6
[ "MIT" ]
38
2020-08-14T15:03:21.000Z
2021-06-01T16:26:47.000Z
tests/test_prototype_jpeg.py
GLaDOS1105/prototype-jpeg
15c04980d103e9158cd958fe6d65111b1ef582a6
[ "MIT" ]
2
2021-02-26T07:54:41.000Z
2021-09-14T10:12:59.000Z
import tempfile import unittest from prototype_jpeg import __version__, compress, extract def test_version(): assert __version__ == '0.1.0' class TestCompressAndExtract(unittest.TestCase): def test_rgb(self): compress_and_extract({ 'fn': 'tests/images/rgb/Baboon.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/rgb/Lena.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 1 }) def test_rgb_quality_95(self): compress_and_extract({ 'fn': 'tests/images/rgb/Baboon.raw', 'size': (512, 512), 'grey_level': False, 'quality': 95, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/rgb/Lena.raw', 'size': (512, 512), 'grey_level': False, 'quality': 95, 'subsampling_mode': 1 }) def test_rgb_quality_1(self): compress_and_extract({ 'fn': 'tests/images/rgb/Baboon.raw', 'size': (512, 512), 'grey_level': False, 'quality': 1, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/rgb/Lena.raw', 'size': (512, 512), 'grey_level': False, 'quality': 1, 'subsampling_mode': 1 }) def test_rgb_subsampling_mode_2(self): compress_and_extract({ 'fn': 'tests/images/rgb/Baboon.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 2 }) compress_and_extract({ 'fn': 'tests/images/rgb/Lena.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 2 }) def test_rgb_subsampling_mode_4(self): compress_and_extract({ 'fn': 'tests/images/rgb/Baboon.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 4 }) compress_and_extract({ 'fn': 'tests/images/rgb/Lena.raw', 'size': (512, 512), 'grey_level': False, 'quality': 50, 'subsampling_mode': 4 }) def test_grey_level(self): compress_and_extract({ 'fn': 'tests/images/grey_level/Baboon.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/grey_level/Lena.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 1 }) def test_grey_level_quality_95(self): compress_and_extract({ 'fn': 'tests/images/grey_level/Baboon.raw', 'size': (512, 512), 'grey_level': True, 'quality': 95, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/grey_level/Lena.raw', 'size': (512, 512), 'grey_level': True, 'quality': 95, 'subsampling_mode': 1 }) def test_grey_level_quality_1(self): compress_and_extract({ 'fn': 'tests/images/grey_level/Baboon.raw', 'size': (512, 512), 'grey_level': True, 'quality': 1, 'subsampling_mode': 1 }) compress_and_extract({ 'fn': 'tests/images/grey_level/Lena.raw', 'size': (512, 512), 'grey_level': True, 'quality': 1, 'subsampling_mode': 1 }) def test_grey_level_subsampling_mode_2(self): compress_and_extract({ 'fn': 'tests/images/grey_level/Baboon.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 2 }) compress_and_extract({ 'fn': 'tests/images/grey_level/Lena.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 2 }) def test_grey_level_subsampling_mode_4(self): compress_and_extract({ 'fn': 'tests/images/grey_level/Baboon.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 4 }) compress_and_extract({ 'fn': 'tests/images/grey_level/Lena.raw', 'size': (512, 512), 'grey_level': True, 'quality': 50, 'subsampling_mode': 4 }) def compress_and_extract(spec): with open(spec['fn'], 'rb') as raw_file: compressed = compress( raw_file, size=spec['size'], grey_level=spec['grey_level'], quality=spec['quality'], subsampling_mode=spec['subsampling_mode'] ) header = compressed['header'] with tempfile.TemporaryFile() as compressed_file: compressed['data'].tofile(compressed_file) compressed_file.seek(0) extracted = extract( compressed_file, header={ 'size': header['size'], 'grey_level': header['grey_level'], 'quality': header['quality'], 'subsampling_mode': header['subsampling_mode'], 'remaining_bits_length': header['remaining_bits_length'], 'data_slice_lengths': header['data_slice_lengths'] } ) return extracted
29.90404
73
0.497044
586
5,921
4.750853
0.098976
0.126078
0.135776
0.143678
0.759339
0.758261
0.751796
0.731322
0.719828
0.707615
0
0.050789
0.368181
5,921
197
74
30.055838
0.693397
0
0
0.773481
0
0
0.266509
0.106739
0
0
0
0
0.005525
1
0.066298
false
0
0.016575
0
0.093923
0
0
0
0
null
0
0
0
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
cb5211c406515fbc8318d9668055bf83c9a0d73d
8,514
py
Python
app/__init__.py
YassineElbouchaibi/medica-vue-backend
b01012f40cbb611fbaa2ca27f35e771535d375af
[ "MIT" ]
null
null
null
app/__init__.py
YassineElbouchaibi/medica-vue-backend
b01012f40cbb611fbaa2ca27f35e771535d375af
[ "MIT" ]
null
null
null
app/__init__.py
YassineElbouchaibi/medica-vue-backend
b01012f40cbb611fbaa2ca27f35e771535d375af
[ "MIT" ]
null
null
null
import math from flask import Flask, request, jsonify, send_file, make_response from flask_cors import CORS import os from app.core_utils import * app = Flask(__name__) CORS(app) STORAGE_ROOT = os.environ['STORAGE_ROOT'] THUMBNAILS_DIR = os.path.join(STORAGE_ROOT, "thumbnails") IMAGES_DIR = os.path.join(STORAGE_ROOT, "datasets") DATASETS = ["CVC", "ETIS", "ISIC"] EXCLUDED_DIRS = ["CVC", "ISIC"] model = load_model_weight(os.path.join(STORAGE_ROOT, "models", "CVC", "model.h5")) @app.route('/') def hello_world(): return 'MedicaVue' @app.route('/storage') def list_thumbnails(): files = [] for (dirpath, dirnames, filenames) in os.walk(STORAGE_ROOT): if any(folder in dirpath for folder in EXCLUDED_DIRS): continue dataset = "" for _dataset in DATASETS: if _dataset in dirpath: dataset = _dataset _files = [ dict( thumbnail = os.path.join(request.base_url, "thumbnail", dataset, filename), image = os.path.join(request.base_url, "image", dataset, filename), mask=os.path.join(request.url_root, 'detect', "mask", dataset, filename), highlight=os.path.join(request.url_root, 'detect', "highlight", dataset, filename), annotation=os.path.join(request.url_root, 'detect', "annotation", dataset, filename), ) for filename in filenames if filename.endswith(".jpg") ] files.extend(_files) return jsonify(files) @app.route('/storage/thumbnail/<dataset>/<filename>') def get_thumbnail(dataset: str, filename: str): if dataset not in DATASETS: return 'bad request!', 400 return send_file(os.path.join(THUMBNAILS_DIR, dataset, "image", filename), mimetype='image/jpeg') @app.route('/storage/image/<dataset>/<filename>') def get_image(dataset: str, filename: str): if dataset not in DATASETS: return 'bad request!', 400 return send_file(os.path.join(IMAGES_DIR, dataset, "image", filename), mimetype='image/jpeg') # Endpoint for known images : MASK @app.route('/detect/mask/<dataset>/<filename>') def predict_mask_for_db_image(dataset: str, filename: str): if dataset not in DATASETS: return 'bad request!', 400 # Get original Mask if requested, otherwise run prediction if "groundTruth" in request.args: return send_file(os.path.join(IMAGES_DIR, dataset, "mask", filename), mimetype='image/jpeg') # Get image file_path = os.path.join(IMAGES_DIR, dataset, "image", filename) image = read_image(file_path) # Run prediction mask = predict(image, model) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', mask.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response # Endpoint for known images : HIGHLIGHT @app.route('/detect/highlight/<dataset>/<filename>') def predict_highlight_for_db_image(dataset: str, filename: str): if dataset not in DATASETS: return 'bad request!', 400 alpha = 0.4 # Get original Mask if requested, otherwise run prediction if "groundTruth" in request.args: image_path = os.path.join(IMAGES_DIR, dataset, "image", filename) mask_path = os.path.join(IMAGES_DIR, dataset, "mask", filename) image = cv2.imread(image_path, cv2.IMREAD_COLOR) mask = cv2.imread(mask_path, cv2.IMREAD_COLOR) else: # Get image file_path = os.path.join(IMAGES_DIR, dataset, "image", filename) image = read_image(file_path) # Run prediction mask = predict(image, model) image = image[0] * 255.0 highlight = cv2.addWeighted(image, alpha, mask, 1 - alpha, 0) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', highlight.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response # Endpoint for known images : ANNOTATION @app.route('/detect/annotation/<dataset>/<filename>') def predict_annotation_for_db_image(dataset: str, filename: str): if dataset not in DATASETS: return 'bad request!', 400 alpha = 0.4 # Get original Mask if requested, otherwise run prediction if "groundTruth" in request.args: image_path = os.path.join(IMAGES_DIR, dataset, "image", filename) mask_path = os.path.join(IMAGES_DIR, dataset, "mask", filename) image = cv2.imread(image_path, cv2.IMREAD_COLOR) mask = cv2.imread(mask_path, cv2.IMREAD_COLOR) else: # Get image file_path = os.path.join(IMAGES_DIR, dataset, "image", filename) image = read_image(file_path) # Run prediction mask = predict(image, model).astype(np.uint8) image = image[0] * 255.0 # Convert it to grayscale mask = cv2.cvtColor(mask, cv2.COLOR_BGR2GRAY) annotation = image.copy() # Apply cv2.threshold() to get a binary image ret, thresh = cv2.threshold(mask, 50, 255, cv2.THRESH_BINARY) # Find contours contours, hierarchy = cv2.findContours(thresh, cv2.RETR_EXTERNAL, cv2.CHAIN_APPROX_NONE) # Scale contours scaled_contours = [] for contour in contours: scaled_contours.append(scale_contour(contour, 1.075)) h, w, _ = image.shape # Draw contours cv2.drawContours(annotation, scaled_contours, -1, (38, 166, 154, 0.1), math.floor(20 / (1225 / 966) * (h / w)), cv2.LINE_AA) # Make contours a bit transparent annotation = cv2.addWeighted(image, alpha, annotation, 1 - alpha, 0) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', annotation.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response # Endpoint for custom images : MASK @app.route('/detect/mask/custom') def predict_mask_for_custom_image(): image_url = request.args.get('url') if image_url is None: return 'bad request!', 400 # Get image image = read_image(image_url, isUrl=True) # Run prediction mask = predict(image, model) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', mask.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response # Endpoint for custom images : HIGHLIGHT @app.route('/detect/highlight/custom') def predict_highlight_for_custom_image(): image_url = request.args.get('url') if image_url is None: return 'bad request!', 400 alpha = 0.4 # Get image image = read_image(image_url, isUrl=True) # Run prediction mask = predict(image, model) image = image[0] * 255.0 highlight = cv2.addWeighted(image, alpha, mask, 1 - alpha, 0) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', highlight.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response # Endpoint for custom images : ANNOTATION @app.route('/detect/annotation/custom') def predict_annotation_for_custom_image(): image_url = request.args.get('url') if image_url is None: return 'bad request!', 400 alpha = 0.4 # Get image image = read_image(image_url, isUrl=True) # Run prediction mask = predict(image, model).astype(np.uint8) image = image[0] * 255.0 # Convert it to grayscale mask = cv2.cvtColor(mask, cv2.COLOR_BGR2GRAY) annotation = image.copy() # Apply cv2.threshold() to get a binary image ret, thresh = cv2.threshold(mask, 50, 255, cv2.THRESH_BINARY) # Find contours contours, hierarchy = cv2.findContours(thresh, cv2.RETR_EXTERNAL, cv2.CHAIN_APPROX_NONE) # Scale contours scaled_contours = [] for contour in contours: scaled_contours.append(scale_contour(contour, 1.075)) h, w, _ = image.shape # Draw contours cv2.drawContours(annotation, scaled_contours, -1, (38, 166, 154, 0.1), math.floor(20 / (1225 / 966) * (h / w)), cv2.LINE_AA) # Make contours a bit transparent annotation = cv2.addWeighted(image, alpha, annotation, 1 - alpha, 0) # Send prediction as JPEG retval, buffer = cv2.imencode('.jpg', annotation.astype(np.uint8)) response = make_response(buffer.tobytes()) response.headers['Content-Type'] = 'image/jpeg' return response if __name__ == '__main__': app.run()
30.736462
128
0.667019
1,105
8,514
5.01267
0.141176
0.019498
0.032497
0.025997
0.808269
0.804477
0.754288
0.727749
0.723235
0.713125
0
0.024836
0.210242
8,514
276
129
30.847826
0.798929
0.114282
0
0.63522
0
0
0.103053
0.031063
0
0
0
0
0
1
0.062893
false
0
0.031447
0.006289
0.213836
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
cbb02b0b9ca714a4bd8ab426a8acd632bc92dc8a
57
py
Python
cfb-cursos/keyboardkeys.py
joseluizbrits/sobre-python
316143c341e5a44070a3b13877419082774bd730
[ "MIT" ]
null
null
null
cfb-cursos/keyboardkeys.py
joseluizbrits/sobre-python
316143c341e5a44070a3b13877419082774bd730
[ "MIT" ]
null
null
null
cfb-cursos/keyboardkeys.py
joseluizbrits/sobre-python
316143c341e5a44070a3b13877419082774bd730
[ "MIT" ]
null
null
null
from pyautogui import KEYBOARD_KEYS print(KEYBOARD_KEYS)
19
35
0.877193
8
57
6
0.75
0.5
0
0
0
0
0
0
0
0
0
0
0.087719
57
2
36
28.5
0.923077
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0.5
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
1
0
6
cbb5cab4a094c3eed1543e6836b462afaa806049
135
py
Python
baseline/datasets/__init__.py
eugene-choi/ml4healthcare
f4b60fc58edd314e6ab803482cc17537d4488ace
[ "MIT" ]
1
2022-02-22T05:12:13.000Z
2022-02-22T05:12:13.000Z
baseline/datasets/__init__.py
eugene-choi/ml4healthcare
f4b60fc58edd314e6ab803482cc17537d4488ace
[ "MIT" ]
null
null
null
baseline/datasets/__init__.py
eugene-choi/ml4healthcare
f4b60fc58edd314e6ab803482cc17537d4488ace
[ "MIT" ]
null
null
null
from .lits17 import lits17, lits17_no_slice from .brats20 import brats20, brats20_no_slice from .kits21 import kits21, kits21_no_slice
33.75
46
0.844444
21
135
5.142857
0.333333
0.194444
0.203704
0
0
0
0
0
0
0
0
0.15
0.111111
135
3
47
45
0.75
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
cbcd4f4fc223065b83b18449902c6f0d91eff2ff
24
py
Python
jhu2016_labs/__init__.py
yiboyang/JHU2016Lab
5575a4e797ce57ed3a033b662ded996b9d79d8a6
[ "BSD-2-Clause" ]
2
2021-04-07T09:26:21.000Z
2021-04-07T09:26:46.000Z
jhu2016_labs/__init__.py
yiboyang/JHU2016Lab
5575a4e797ce57ed3a033b662ded996b9d79d8a6
[ "BSD-2-Clause" ]
null
null
null
jhu2016_labs/__init__.py
yiboyang/JHU2016Lab
5575a4e797ce57ed3a033b662ded996b9d79d8a6
[ "BSD-2-Clause" ]
2
2016-07-07T23:21:59.000Z
2016-07-13T20:22:51.000Z
from . import plotting
8
22
0.75
3
24
6
1
0
0
0
0
0
0
0
0
0
0
0
0.208333
24
2
23
12
0.947368
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
cbd3a61e9e0aa269ef11ada2e1ad1d6fca5d6f6f
53
py
Python
demo/config.py
FanRegan/FlashBank
bba26b28ae83a77526824a05f45725f70cb8b6a1
[ "MIT" ]
1
2019-08-18T12:26:14.000Z
2019-08-18T12:26:14.000Z
demo/config.py
FanRegan/FlashBank
bba26b28ae83a77526824a05f45725f70cb8b6a1
[ "MIT" ]
null
null
null
demo/config.py
FanRegan/FlashBank
bba26b28ae83a77526824a05f45725f70cb8b6a1
[ "MIT" ]
null
null
null
config = { 'host': '0.0.0.0', 'port': 5000 }
10.6
22
0.415094
8
53
2.75
0.625
0.272727
0.272727
0
0
0
0
0
0
0
0
0.216216
0.301887
53
4
23
13.25
0.378378
0
0
0
0
0
0.283019
0
0
0
0
0
0
1
0
false
0
0
0
0
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
1db025d8acc1a082d0dc5d6480acf019ea83c38e
238
py
Python
app/controllers/row.py
StaySWEG/SWEGTwit
4f2a8402e0db78e742ce91209d3add6d93348674
[ "MIT" ]
null
null
null
app/controllers/row.py
StaySWEG/SWEGTwit
4f2a8402e0db78e742ce91209d3add6d93348674
[ "MIT" ]
4
2020-02-06T11:13:36.000Z
2020-02-06T11:17:26.000Z
app/controllers/row.py
StaySWEG/SWEGTwit
4f2a8402e0db78e742ce91209d3add6d93348674
[ "MIT" ]
null
null
null
class Row: def toString(self): return self.user + " - " + self.location + " - " + self.text def __init__(self, user, location, text): self.user = user self.location = location self.text = text
26.444444
68
0.554622
27
238
4.740741
0.37037
0.1875
0.25
0
0
0
0
0
0
0
0
0
0.323529
238
9
69
26.444444
0.795031
0
0
0
0
0
0.025105
0
0
0
0
0
0
1
0.285714
false
0
0
0.142857
0.571429
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
1
1
0
0
6
1dbbdff910ae3ad5cfb441b1c8dc9ad480b84134
34
py
Python
src/core/events/__init__.py
c6h3un/kube-hunter
4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd
[ "Apache-2.0" ]
1
2019-05-23T09:28:47.000Z
2019-05-23T09:28:47.000Z
src/core/events/__init__.py
c6h3un/kube-hunter
4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd
[ "Apache-2.0" ]
null
null
null
src/core/events/__init__.py
c6h3un/kube-hunter
4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd
[ "Apache-2.0" ]
null
null
null
from handler import * import types
17
21
0.823529
5
34
5.6
0.8
0
0
0
0
0
0
0
0
0
0
0
0.147059
34
2
22
17
0.965517
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
1debf36b7d78c2e92825f82ccb49b8512cbaa7fb
28,084
py
Python
benchmark/graph_generater.py
zanderhavgaard/thesis-code
d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc
[ "MIT" ]
null
null
null
benchmark/graph_generater.py
zanderhavgaard/thesis-code
d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc
[ "MIT" ]
2
2020-04-28T07:59:30.000Z
2020-05-17T15:36:04.000Z
benchmark/graph_generater.py
zanderhavgaard/thesis-code
d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc
[ "MIT" ]
null
null
null
import pandas as pd import numpy as np import seaborn as sns import matplotlib.pyplot as plt import os from datetime import datetime from pprint import pprint from warnings import filterwarnings # default context values for dark grid # {'font.size': 12.0, # 'axes.labelsize': 12.0, # 'axes.titlesize': 12.0, # 'xtick.labelsize': 11.0, # 'ytick.labelsize': 11.0, # 'legend.fontsize': 11.0, # 'axes.linewidth': 1.25, # 'grid.linewidth': 1.0, # 'lines.linewidth': 1.5, # 'lines.markersize': 6.0, # 'patch.linewidth': 1.0, # 'xtick.major.width': 1.25, # 'ytick.major.width': 1.25, # 'xtick.minor.width': 1.0, # 'ytick.minor.width': 1.0, # 'xtick.major.size': 6.0, # 'ytick.major.size': 6.0, # 'xtick.minor.size': 4.0, # 'ytick.minor.size': 4.0, # 'legend.title_fontsize': 12.0} class GraphGenerater(): def __init__(self, dir_name: str, dev_mode:bool=False): self.dev_mode = dev_mode env_path = os.getenv('fbrd') + '/graphs' # timestampStr = datetime.now().strftime("%d-%b-%Y_%H_%M") if (not dev_mode) and (not os.path.exists(env_path)): os.mkdir(env_path) self.report_dir = f'{dir_name}' self.dir_path = f'{env_path}/{dir_name}' if (not dev_mode) and (not os.path.exists(self.dir_path)): os.mkdir(self.dir_path) def gen_fig_tex(self, path, caption, label): with open(f'{self.dir_path}/fig_tex.txt', 'a+') as f: f.write(""" \\FloatBarrier \\begin{figure}[!htb] \\begin{center} \\includegraphics[width=1\\textwidth]{%s} \\caption{%s} \\label{%s} \\end{center} \\end{figure} \\FloatBarrier """ % ( path, caption, label, )) def save_figure(self,config: dict, plot, name:str, ndir:str, typep:str='placeholder', legend:bool=True): if self.dev_mode: if legend: plt.legend(loc='center left', bbox_to_anchor=(1, 0.5)) plt.show() else: if not os.path.exists(f'{self.dir_path}/{ndir}'): os.mkdir(f'{self.dir_path}/{ndir}') name_no_colon = name.replace(':','') path = f'graphs/{self.report_dir}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png' caption = name.replace('_','\\_') label = f'figure:{ndir}:{"_".join([typep]+name_no_colon.split())}' self.gen_fig_tex(path, caption, label) if legend: plt.legend(loc='center left', bbox_to_anchor=(1, 0.5)) print(self.dir_path,ndir,typep,) plot.figure.savefig(f'{self.dir_path}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png',bbox_inches='tight') else: plot.savefig(f'{self.dir_path}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png') plt.clf() def save_table(self,df, description, ndir): if self.dev_mode: print(df.to_latex(index=False)) print(df) else: with open(f'{self.dir_path}/{ndir}-tables.txt', 'a+') as f: f.write(f'\n -- New table --\n') f.write(f'\n{description}\n') f.write(df.to_latex(index=False)) f.write('\n') ######################### ## Graphs and plots ## ######################## # --> Relational plots <-- def line_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(1) plot = sns.lineplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, style= config['style'] if 'style' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name,size=h_size) # self.save_figure(config,plot,name,f'{self.dir_path}/{ndir}') self.save_figure(config,plot,name,ndir,'lineplot') def scatter_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(2) plot = sns.scatterplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, style= config['style'] if 'style' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, alpha= config['alpha'] if 'alpha' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name,size=h_size) self.save_figure(config,plot,name,ndir,'scatterplot') def rel_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.clf() plot = sns.relplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size= h_size) self.save_figure(config,plot,name,ndir,'relplot',legend=False) ########################### # --> Categorial plots <--# ########################### def cat_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(3) # plt.clf() plot = sns.catplot(x=config['x'], y= config['y'], row= config['row'] if 'row' in config else None, col= config['col'] if 'col' in config else None, hue= config['hue'] if 'hue' in config else None, kind= config['kind'] if 'kind' in config else 'strip', jitter= config['jitter'] if 'jitter' in config else False, height= config['height'] if 'height' in config else 5, aspect= config['aspect'] if 'aspect' in config else 1, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) # plt.title(name, size=h_size) self.save_figure(config, plot,name, ndir, 'catplot', legend=False) def strip_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) # plt.figure(4) plt.clf() plot = sns.stripplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, jitter= config['jitter'] if 'jitter' in config else False, hue_order= config['hue_order'] if 'hue_order' in config else None, alpha= config['alpha'] if 'alpha' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'stripplot') def swarm_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.swarmplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'swarmplot') def box_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(6) plot = sns.boxplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, data= data) if 'strip' in config: sns.stripplot(x=config['x_strip'], y=config['y_strip'], color='black', size=10, alpha=0.3, data=data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'boxplot') def violin_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.violinplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name, ndir, 'violinplot') def boxen_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.boxenplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'boxenplot') def point_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.pointplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir, 'pointplot') def bar_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.barplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir, 'barplot') def count_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.countplot(x=config['x'] if 'x' in config else None, y= config['y'] if 'y' in config else None, hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'countplot') ############################# # --> Distibrution plots <--# ############################# def dist_plot(self, data:list, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.distplot(a= data, hist=config['hist'], kde= config['kde'], color= config['color'] if 'color' in config else None, bins= config['bins'] if 'bins' in config else None) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'distplot') def rug_plot(self, data:list, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.rugplot(a= data, axis='x' if 'x' in config else 'y', height= config['height'] if 'height' in config else None, color= config['color'] if 'color' in config else None, ) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir, 'rugplot') ############################# # --> Regression plots <-- # ############################# def lm_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.lmplot(x=config['x'], y= config['y'], hue= config['hue'] if 'hue' in config else None, fit_reg= False if 'fit_reg' in config else True, scatter= False if 'scatter' in config else True, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, markers= config['markers'] if 'markers' in config else None, height= config['height'] if 'height' in config else 5, aspect= config['aspect'] if 'aspect' in config else 1, col= config['col'] if 'col' in config else None, row= config['row'] if 'row' in config else None, x_jitter= config['x_jitter'] if 'x_jitter' in config else None, y_jitter= config['y_jitter'] if 'y_jitter' in config else None, line_kws= config['line_kws'] if 'line_kws' in config else None, data= data) if 'row' not in config and 'col' not in config: if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir, 'lmplot',legend=False) ############################# # --> Multi plots <-- # ############################# def joint_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.jointplot(x=config['x'], y= config['y'], kind= config['kind'], dropna= True if 'dropna' in config else False, color= config['color'] if 'color' in config else None, height= config['height'] if 'height' in config else 5, # line_kws= config['line_kws'] if 'line_kws' in config else None, data= data) if 'xlabel' in config: plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) if 'ylabel' in config: plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) self.save_figure(config,plot,name,ndir,'jointplot',legend=False) def pair_plot(self, data, config:dict, name:str, ndir:str, h_size=20): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') if 'meta_style' in config: sns.set(style=config['meta_style'], color_codes= True if 'color_codes' in config else False) else: sns.set(style= "darkgrid", color_codes= True) plt.figure(5) plot = sns.pairplot(hue= config['hue'] if 'hue' in config else None, palette= config['palette'] if 'palette' in config else None, hue_order= config['hue_order'] if 'hue_order' in config else None, kind= config['kind'], markers= config['markers'] if 'markers' in config else None, height= config['height'] if 'height' in config else 5, aspect= config['aspect'] if 'aspect' in config else 1, vars= config['vars'] if 'vars' in config else None, x_vars= config['x_vars'] if 'x_vars' in config else None, y_vars= config['y_vars'] if 'y_vars' in config else None, dropna= True if 'dropna' in config else False, # line_kws= config['line_kws'] if 'line_kws' in config else None, data= data) # if 'xlabel' in config: # plt.xlabel(config['xlabel'][0], size=config['xlabel'][1]) # if 'ylabel' in config: # plt.ylabel(config['ylabel'][0], size=config['ylabel'][1]) # plt.title(name, size=h_size) self.save_figure(config,plot,name,ndir,'pairplot',legend=False) # overlay plots by giving list of lambda's def dynamic_multi_plot(self, data, config:dict, name:str, ndir:str, plots:list, h_size=20, ): # if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')): # os.mkdir(f'{self.dir_path}/{ndir}') meta_style = config.pop('meta_style') if 'meta_style' in config else None if meta_style != None: sns.set(style=meta_style, color_codes= True) else: sns.set(style= "darkgrid", color_codes= True) xlabel = config.pop('xlabel') if 'xlabel' in config else None ylabel = config.pop('ylabel') if 'ylabel' in config else None args = list(config.values())+[data] plt.figure(99) for xlambda in plots: plot = xlambda(args) if xlabel != None: plt.xlabel(xlabel[0], size=xlabel[1]) if ylabel != None: plt.ylabel(ylabel[0], size=ylabel[1]) plt.title(name,size=h_size) self.save_figure(config,plot,name,ndir,'dynamicplot')
39.835461
128
0.518195
3,529
28,084
4.024653
0.062907
0.091248
0.091248
0.085616
0.815462
0.797508
0.788355
0.779835
0.767373
0.740407
0
0.010352
0.332681
28,084
705
129
39.835461
0.747505
0.118502
0
0.67462
0
0
0.129986
0.018651
0
0
0
0
0
1
0.047722
false
0
0.017354
0
0.067245
0.008677
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
38300bb6d9e052f07b076e19b3c6576f34328a1a
27
py
Python
metrics/meteor/__init__.py
Renovamen/Image-Captioning
de8d4f553a22e967fa56a01d5b4a2206b9431771
[ "MIT" ]
5
2020-11-03T16:08:18.000Z
2022-01-17T03:56:15.000Z
metrics/meteor/__init__.py
Renovamen/Image-Caption
de8d4f553a22e967fa56a01d5b4a2206b9431771
[ "MIT" ]
null
null
null
metrics/meteor/__init__.py
Renovamen/Image-Caption
de8d4f553a22e967fa56a01d5b4a2206b9431771
[ "MIT" ]
1
2020-11-03T11:29:36.000Z
2020-11-03T11:29:36.000Z
from .meteor import Meteor
13.5
26
0.814815
4
27
5.5
0.75
0
0
0
0
0
0
0
0
0
0
0
0.148148
27
1
27
27
0.956522
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
38352b24e420c81d5c23a782c353df6897f21775
22,046
py
Python
tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py
ryanloney/openvino-1
4e0a740eb3ee31062ba0df88fcf438564f67edb7
[ "Apache-2.0" ]
1,127
2018-10-15T14:36:58.000Z
2020-04-20T09:29:44.000Z
tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py
ryanloney/openvino-1
4e0a740eb3ee31062ba0df88fcf438564f67edb7
[ "Apache-2.0" ]
439
2018-10-20T04:40:35.000Z
2020-04-19T05:56:25.000Z
tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py
ryanloney/openvino-1
4e0a740eb3ee31062ba0df88fcf438564f67edb7
[ "Apache-2.0" ]
414
2018-10-17T05:53:46.000Z
2020-04-16T17:29:53.000Z
# Copyright (C) 2018-2022 Intel Corporation # SPDX-License-Identifier: Apache-2.0 import unittest import numpy as np from openvino.tools.mo.middle.quantize_linear_resolver import QuantizeLinearResolver from openvino.tools.mo.front.common.partial_infer.utils import int64_array from openvino.tools.mo.utils.ir_engine.compare_graphs import compare_graphs from unit_tests.utils.graph import build_graph from generator import generator, generate nodes1_attributes = { 'input': {'kind': 'op', 'op': 'AnyOp'}, 'input_data': {'kind': 'data', 'shape': None}, 'quantize': {'kind': 'op', 'op': 'QuantizeLinear', 'axis': 1}, 'quantize_data': {'kind': 'data', 'shape': None}, 'scale_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'scale_param_q_data': {'kind': 'data', 'shape': None}, 'zerop_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'zerop_param_q_data': {'kind': 'data', 'shape': None}, 'out': {'kind': 'op', 'op': 'AnyOp'}, 'out_data': {'kind': 'data', 'shape': None}, 'result': {'kind': 'op', 'op': 'Result'}, } nodes_ref_attributes = { 'input': {'kind': 'op', 'op': 'AnyOp'}, 'input_data': {'kind': 'data', 'shape': None}, 'cast': {'kind': 'op', 'op': 'Cast', 'type': 'Convert'}, 'cast_data': {'kind': 'data', 'shape': None}, 'f_quantize': {'kind': 'op', 'op': 'FakeQuantize', 'type': 'FakeQuantize'}, 'f_quantize_data': {'kind': 'data', 'shape': None}, 'mul1': {'kind': 'op', 'op': 'Mul', 'type': 'Multiply'}, 'mul1_data': {'kind': 'data', 'shape': None}, 'mul2': {'kind': 'op', 'op': 'Mul', 'type': 'Multiply'}, 'mul2_data': {'kind': 'data', 'shape': None}, 'scale_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'scale_param_q_data': {'kind': 'data', 'shape': None}, 'in_low': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'in_low_data': {'kind': 'data', 'shape': None}, 'in_high': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'in_high_data': {'kind': 'data', 'shape': None}, 'out_low': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'out_low_data': {'kind': 'data', 'shape': None}, 'out_high': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'out_high_data': {'kind': 'data', 'shape': None}, 'out': {'kind': 'op', 'op': 'AnyOp'}, 'out_data': {'kind': 'data', 'shape': None}, 'result': {'kind': 'op', 'op': 'Result'}, 'high_reshape_const': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'high_reshape_const_data': {'kind': 'data', 'shape': None}, 'high_reshape': {'kind': 'op', 'type': 'Reshape', 'op': 'Reshape'}, 'high_reshape_data': {'kind': 'data', 'shape': None}, 'low_reshape_const': {'kind': 'op', 'type': 'Const', 'op': 'Const'}, 'low_reshape_const_data': {'kind': 'data', 'shape': None}, 'low_reshape': {'kind': 'op', 'type': 'Reshape', 'op': 'Reshape'}, 'low_reshape_data': {'kind': 'data', 'shape': None}, } class TestQuantizeLinearResolver(unittest.TestCase): def test_quantize_uint8(self): graph = build_graph(nodes1_attributes, [('input', 'input_data'), ('input_data', 'quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'quantize'), ('zerop_param_q', 'zerop_param_q_data'), ('zerop_param_q_data', 'quantize'), ('quantize', 'quantize_data'), ('quantize_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], { 'quantize': {'axis': 2}, 'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, 'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, 'zerop_param_q': {'shape': np.array([]), 'value': np.uint8(128)}, 'zerop_param_q_data': {'shape': np.array([]), 'value': np.uint8(128)}, }, nodes_with_edges_only=True) graph_ref = build_graph(nodes_ref_attributes, [('input', 'input_data'), ('input_data', 'f_quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'mul1', {'out': 0}), ('in_low', 'in_low_data'), ('in_low_data', 'mul1'), ('mul1', 'mul1_data'), ('mul1_data', 'f_quantize'), ('f_quantize', 'f_quantize_data'), ('scale_param_q_data', 'mul2', {'out': 0}), ('in_high', 'in_high_data'), ('in_high_data', 'mul2'), ('mul2', 'mul2_data'), ('mul2_data', 'f_quantize'), ('out_low', 'out_low_data'), ('out_low_data', 'f_quantize'), ('out_high', 'out_high_data'), ('out_high_data', 'f_quantize'), ('f_quantize_data', 'cast'), ('cast', 'cast_data'), ('cast_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'in_low': {'shape': np.array([]), 'value': -128}, 'in_low_data': {'shape': np.array([]), 'value': -128}, 'in_high': {'shape': np.array([]), 'value': 127}, 'in_high_data': {'shape': np.array([]), 'value': 127}, 'out_low': {'shape': np.array([]), 'value': 0}, 'out_low_data': {'shape': np.array([]), 'value': 0}, 'out_high': {'shape': np.array([]), 'value': 255}, 'out_high_data': {'shape': np.array([]), 'value': 255}, 'cast': {'dst_type': np.uint8} }, nodes_with_edges_only=True) graph.stage = 'middle' QuantizeLinearResolver().find_and_replace_pattern(graph) (flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True) self.assertTrue(flag, resp) def test_quantize_int8(self): graph = build_graph(nodes1_attributes, [('input', 'input_data'), ('input_data', 'quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'quantize'), ('zerop_param_q', 'zerop_param_q_data'), ('zerop_param_q_data', 'quantize'), ('quantize', 'quantize_data'), ('quantize_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, 'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, 'zerop_param_q': {'shape': np.array([]), 'value': np.int8(0)}, 'zerop_param_q_data': {'shape': np.array([]), 'value': np.int8(0)}, }, nodes_with_edges_only=True) graph_ref = build_graph(nodes_ref_attributes, [('input', 'input_data'), ('input_data', 'f_quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'mul1', {'out': 0}), ('in_low', 'in_low_data'), ('in_low_data', 'mul1'), ('mul1', 'mul1_data'), ('mul1_data', 'f_quantize'), ('f_quantize', 'f_quantize_data'), ('scale_param_q_data', 'mul2', {'out': 0}), ('in_high', 'in_high_data'), ('in_high_data', 'mul2'), ('mul2', 'mul2_data'), ('mul2_data', 'f_quantize'), ('out_low', 'out_low_data'), ('out_low_data', 'f_quantize'), ('out_high', 'out_high_data'), ('out_high_data', 'f_quantize'), ('f_quantize_data', 'cast'), ('cast', 'cast_data'), ('cast_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'in_low': {'shape': np.array([]), 'value': -128}, 'in_low_data': {'shape': np.array([]), 'value': -128}, 'in_high': {'shape': np.array([]), 'value': 127}, 'in_high_data': {'shape': np.array([]), 'value': 127}, 'out_low': {'shape': np.array([]), 'value': -128}, 'out_low_data': {'shape': np.array([]), 'value': -128}, 'out_high': {'shape': np.array([]), 'value': 127}, 'out_high_data': {'shape': np.array([]), 'value': 127}, 'cast': {'dst_type': np.int8} }, nodes_with_edges_only=True) graph.stage = 'middle' QuantizeLinearResolver().find_and_replace_pattern(graph) (flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True) self.assertTrue(flag, resp) def test_quantize_no_zerop(self): graph = build_graph(nodes1_attributes, [('input', 'input_data'), ('input_data', 'quantize'), ('quantize', 'quantize_data'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'quantize'), ('quantize', 'quantize_data'), ('quantize_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, 'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)}, }, nodes_with_edges_only=True) graph_ref = build_graph(nodes_ref_attributes, [('input', 'input_data'), ('input_data', 'f_quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'mul1', {'out': 0}), ('in_low', 'in_low_data'), ('in_low_data', 'mul1'), ('mul1', 'mul1_data'), ('mul1_data', 'f_quantize'), ('f_quantize', 'f_quantize_data'), ('scale_param_q_data', 'mul2', {'out': 0}), ('in_high', 'in_high_data'), ('in_high_data', 'mul2'), ('mul2', 'mul2_data'), ('mul2_data', 'f_quantize'), ('out_low', 'out_low_data'), ('out_low_data', 'f_quantize'), ('out_high', 'out_high_data'), ('out_high_data', 'f_quantize'), ('f_quantize_data', 'cast'), ('cast', 'cast_data'), ('cast_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'in_low': {'shape': np.array([]), 'value': 0}, 'in_low_data': {'shape': np.array([]), 'value': 0}, 'in_high': {'shape': np.array([]), 'value': 255}, 'in_high_data': {'shape': np.array([]), 'value': 255}, 'out_low': {'shape': np.array([]), 'value': 0}, 'out_low_data': {'shape': np.array([]), 'value': 0}, 'out_high': {'shape': np.array([]), 'value': 255}, 'out_high_data': {'shape': np.array([]), 'value': 255}, 'cast': {'dst_type': np.uint8} }, nodes_with_edges_only=True) graph.stage = 'middle' QuantizeLinearResolver().find_and_replace_pattern(graph) (flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True) self.assertTrue(flag, resp) @generator class TestQuantizeWithAxis(unittest.TestCase): @generate(*[(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 4, 1]), np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]), 0, 255, 2), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 3, 1, 1]), np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]), 0, 255, 1), (int64_array([2, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([2, 1, 1, 1]), np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]), 0, 255, 0), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 1, 4]), np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]), 0, 255, -1), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 4, 1]), np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]), 0, 255, -2), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 4, 1]), np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]), -128.0, 127.0, 2), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 3, 1, 1]), np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]), -128.0, 127.0, 1), (int64_array([2, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.int8), int64_array([2, 1, 1, 1]), np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]), -128.0, 127.0, 0), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 1, 4]), np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]), -128.0, 127.0, -1), (int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32), np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 4, 1]), np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]), -128.0, 127.0, -2), ]) def test_quantize_with_axis(self, input_shape, scale_param_value, zero_param_value, target_shape, in_low, in_high, out_low, out_high, axis): graph = build_graph(nodes1_attributes, [('input', 'input_data'), ('input_data', 'quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'quantize'), ('zerop_param_q', 'zerop_param_q_data'), ('zerop_param_q_data', 'quantize'), ('quantize', 'quantize_data'), ('quantize_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], { 'quantize': {'axis': axis}, 'input': {'shape': input_shape}, 'input_data': {'shape': input_shape}, 'scale_param_q': {'shape': scale_param_value.shape, 'value': scale_param_value}, 'scale_param_q_data': {'shape': scale_param_value.shape, 'value': scale_param_value}, 'zerop_param_q': {'shape': zero_param_value.shape, 'value': zero_param_value}, 'zerop_param_q_data': {'shape': zero_param_value.shape, 'value': zero_param_value}, }, nodes_with_edges_only=True) graph_ref = build_graph(nodes_ref_attributes, [('input', 'input_data'), ('input_data', 'f_quantize'), ('scale_param_q', 'scale_param_q_data'), ('scale_param_q_data', 'mul1', {'out': 0}), ('in_low', 'in_low_data'), ('in_low_data', 'mul1'), ('mul1', 'mul1_data'), ('mul1_data', 'high_reshape'), ('high_reshape_const', 'high_reshape_const_data'), ('high_reshape_const_data', 'high_reshape'), ('high_reshape', 'high_reshape_data'), ('high_reshape_data', 'f_quantize'), ('f_quantize', 'f_quantize_data'), ('scale_param_q_data', 'mul2', {'out': 0}), ('in_high', 'in_high_data'), ('in_high_data', 'mul2'), ('mul2', 'mul2_data'), ('mul2_data', 'low_reshape'), ('low_reshape', 'low_reshape_data'), ('low_reshape_data', 'f_quantize'), ('low_reshape_const', 'low_reshape_const_data'), ('low_reshape_const_data', 'low_reshape'), ('out_low', 'out_low_data'), ('out_low_data', 'f_quantize'), ('out_high', 'out_high_data'), ('out_high_data', 'f_quantize'), ('f_quantize_data', 'cast'), ('cast', 'cast_data'), ('cast_data', 'out'), ('out', 'out_data'), ('out_data', 'result'), ], {'in_low': {'shape': in_low.shape, 'value': in_low}, 'in_low_data': {'shape': in_low.shape, 'value': in_low}, 'in_high': {'shape': in_high.shape, 'value': in_high}, 'in_high_data': {'shape': in_high.shape, 'value': in_high}, 'out_low': {'shape': np.array([]), 'value': out_low}, 'out_low_data': {'shape': np.array([]), 'value': out_low}, 'out_high': {'shape': np.array([]), 'value': out_high}, 'out_high_data': {'shape': np.array([]), 'value': out_high}, 'cast': {'dst_type': zero_param_value.dtype}, 'low_reshape_const_data': {'shape': target_shape.shape, 'value': target_shape}, 'high_reshape_const_data': {'shape': target_shape.shape, 'value': target_shape}, }, nodes_with_edges_only=True) graph.stage = 'middle' QuantizeLinearResolver().find_and_replace_pattern(graph) (flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True) self.assertTrue(flag, resp)
59.583784
117
0.407602
2,152
22,046
3.884294
0.058086
0.065319
0.052638
0.077282
0.881804
0.861467
0.817203
0.746142
0.727599
0.698409
0
0.053546
0.415495
22,046
369
118
59.745257
0.595142
0.003493
0
0.675516
0
0
0.233543
0.008194
0
0
0
0
0.011799
1
0.011799
false
0
0.020649
0
0.038348
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
69930d7c61f5ee1aadd7a6868dffbeb58bfae76c
16,597
py
Python
tests/unit/modules/test_netweavermod.py
diegoakechi/salt-saphana
22ae5a350487a14ed4fbed218652cd45123a4238
[ "Apache-2.0" ]
null
null
null
tests/unit/modules/test_netweavermod.py
diegoakechi/salt-saphana
22ae5a350487a14ed4fbed218652cd45123a4238
[ "Apache-2.0" ]
null
null
null
tests/unit/modules/test_netweavermod.py
diegoakechi/salt-saphana
22ae5a350487a14ed4fbed218652cd45123a4238
[ "Apache-2.0" ]
null
null
null
# -*- coding: utf-8 -*- ''' :codeauthor: Xabier Arbulu Insausti <xarbulu@suse.com> ''' # Import Python Libs from __future__ import absolute_import, print_function, unicode_literals import pytest from salt import exceptions # Import Salt Testing Libs from tests.support.mixins import LoaderModuleMockMixin from tests.support.unit import TestCase, skipIf from tests.support import mock from tests.support.mock import ( MagicMock, patch, NO_MOCK, NO_MOCK_REASON ) # Import Salt Libs import salt.modules.netweavermod as netweavermod @skipIf(NO_MOCK, NO_MOCK_REASON) class NetweaverModuleTest(TestCase, LoaderModuleMockMixin): ''' This class contains a set of functions that test salt.modules.netweavermod. ''' def setup_loader_modules(self): return {netweavermod: {}} @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_init_return(self, mock_netweaver): ''' Test _init method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst netweaver_inst = netweavermod._init('prd', '00', 'pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') assert mock_netweaver_inst == netweaver_inst @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_init_return_conf(self, mock_netweaver): ''' Test _init method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst mock_config = MagicMock(side_effect=[ 'conf_sid', 'conf_inst', 'conf_password' ]) with patch.dict(netweavermod.__salt__, {'config.option': mock_config}): netweaver_inst = netweavermod._init() mock_netweaver.assert_called_once_with( 'conf_sid', 'conf_inst', 'conf_password') assert mock_netweaver_inst == netweaver_inst mock_config.assert_has_calls([ mock.call('netweaver.sid', None), mock.call('netweaver.inst', None), mock.call('netweaver.password', None) ]) @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_init_raise(self, mock_netweaver): ''' Test _init method ''' mock_netweaver.side_effect = TypeError('error') with pytest.raises(exceptions.SaltInvocationError) as err: netweavermod._init('prd', '00', 'pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') assert 'error' in str(err.value) @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_execute_sapcontrol(self, mock_netweaver): ''' Test execute_sapcontrol method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst return_data = MagicMock(output='output') mock_netweaver_inst._execute_sapcontrol.return_value = return_data output = netweavermod.execute_sapcontrol('function', 'prd', '00', 'pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst._execute_sapcontrol.assert_called_once_with('function') assert output == 'output' @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_execute_sapcontrol_raise(self, mock_netweaver): ''' Test execute_sapcontrol method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst mock_netweaver_inst._execute_sapcontrol.side_effect = \ netweavermod.netweaver.NetweaverError('error') with pytest.raises(exceptions.CommandExecutionError) as err: netweavermod.execute_sapcontrol('function', 'prd', '00', 'pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst._execute_sapcontrol.assert_called_once_with('function') assert 'error' in str(err.value) def test_is_installed_return_true(self): ''' Test is_installed method ''' mock_netweaver_inst = MagicMock() mock_netweaver_inst.is_installed.return_value = True mock_netweaver = MagicMock(return_value=mock_netweaver_inst) with patch.object(netweavermod, '_init', mock_netweaver): assert netweavermod.is_installed('prd', '00', 'pass', 'ascs') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst.is_installed.assert_called_once_with('ascs') def test_is_installed_return_false(self): ''' Test is_installed method ''' mock_netweaver_inst = MagicMock() mock_netweaver_inst.is_installed.return_value = False mock_netweaver = MagicMock(return_value=mock_netweaver_inst) with patch.object(netweavermod, '_init', mock_netweaver): assert not netweavermod.is_installed('prd', '00', 'pass', 'ascs') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst.is_installed.assert_called_once_with('ascs') def test_is_db_installed_return_true(self): ''' Test is_db_installed method ''' mock_wait = MagicMock(return_value=True) with patch.dict(netweavermod.__salt__, {'hana.wait_for_connection': mock_wait}): assert netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass') mock_wait.assert_called_once_with( host='192.168.10.15', port=30015, user='SYSTEM', password='pass', timeout=0, interval=0 ) def test_is_db_installed_return_false(self): ''' Test is_db_installed method ''' mock_wait = MagicMock(side_effect=exceptions.CommandExecutionError) with patch.dict(netweavermod.__salt__, {'hana.wait_for_connection': mock_wait}): assert not netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass') mock_wait.assert_called_once_with( host='192.168.10.15', port=30015, user='SYSTEM', password='pass', timeout=0, interval=0 ) def test_is_db_installed_raise_error(self): ''' Test is_db_installed method ''' with pytest.raises(exceptions.CommandExecutionError) as err: netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass') assert 'hana.wait_for_connection not available. hanamod must be installed' in str(err.value) @patch('salt.modules.netweavermod.netweaver.shell.find_pattern') @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_is_instance_installed(self, mock_netweaver, mock_find_pattern): ''' Test is_instance_installed method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst instances_data = MagicMock(output='output') mock_netweaver_inst.get_system_instances.return_value = instances_data found = MagicMock() found.group.return_value = 'sapha1er, 10, 51013, 51014, 3, ENQREP, GREEN' mock_find_pattern.return_value = found data = netweavermod.is_instance_installed( 'MESSAGESERVER', 'GREEN', 'virtual', 'prd', '00', 'pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst.get_system_instances.assert_called_once_with() mock_find_pattern.assert_called_once_with('virtual.*MESSAGESERVER.*GREEN.*', 'output') found.group.assert_called_once_with(0) assert data['hostname'] == 'sapha1er' assert data['instance'] == '10' assert data['http_port'] == '51013' assert data['https_port'] == '51014' assert data['start_priority'] == '3' assert data['features'] == 'ENQREP' assert data['dispstatus'] == 'GREEN' @patch('salt.modules.netweavermod.netweaver.shell.find_pattern') @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_is_instance_installed_not_found(self, mock_netweaver, mock_find_pattern): ''' Test is_instance_installed method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst instances_data = MagicMock(output='output') mock_netweaver_inst.get_system_instances.return_value = instances_data mock_find_pattern.return_value = None data = netweavermod.is_instance_installed( 'MESSAGESERVER', sid='prd', inst='00', password='pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst.get_system_instances.assert_called_once_with() mock_find_pattern.assert_called_once_with('.*MESSAGESERVER.*.*', 'output') assert data == False @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_is_instance_installed_error(self, mock_netweaver): ''' Test is_instance_installed method ''' mock_netweaver_inst = MagicMock() mock_netweaver.return_value = mock_netweaver_inst instances_data = MagicMock(output='output') mock_netweaver_inst.get_system_instances.side_effect = \ netweavermod.netweaver.NetweaverError('errpr') data = netweavermod.is_instance_installed( 'MESSAGESERVER', sid='prd', inst='00', password='pass') mock_netweaver.assert_called_once_with('prd', '00', 'pass') mock_netweaver_inst.get_system_instances.assert_called_once_with() assert data == False def test_attach_virtual_host(self): mock_get_ip = MagicMock() mock_get_ip.return_value = '192.168.15.1' mock_retcode = MagicMock() mock_retcode.return_value = 1 mock_run = MagicMock() mock_run.return_value = 0 with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip, 'cmd.retcode': mock_retcode, 'cmd.run': mock_run}): ip_address = netweavermod.attach_virtual_host('vhost', 'eth1') mock_get_ip.assert_called_once_with('vhost') mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True) mock_run.assert_called_once_with('ip address add 192.168.15.1/24 dev eth1') assert ip_address == '192.168.15.1' def test_attach_virtual_host_not_ip(self): mock_get_ip = MagicMock() mock_get_ip.return_value = None with pytest.raises(exceptions.CommandExecutionError) as err: with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip}): netweavermod.attach_virtual_host('vhost') mock_get_ip.assert_called_once_with('vhost') assert 'virtual host vhost not available' in str(err.value) def test_attach_virtual_host_ip_found(self): mock_get_ip = MagicMock() mock_get_ip.return_value = '192.168.15.1' mock_retcode = MagicMock() mock_retcode.return_value = 0 with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip, 'cmd.retcode': mock_retcode}): ip_address = netweavermod.attach_virtual_host('vhost') mock_get_ip.assert_called_once_with('vhost') mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True) assert ip_address == '192.168.15.1' def test_attach_virtual_host_ip_not_found(self): mock_get_ip = MagicMock() mock_get_ip.return_value = '192.168.15.1' mock_retcode = MagicMock() mock_retcode.return_value = 1 mock_run = MagicMock() mock_run.return_value = 1 with pytest.raises(exceptions.CommandExecutionError) as err: with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip, 'cmd.retcode': mock_retcode, 'cmd.run': mock_run}): netweavermod.attach_virtual_host('vhost') mock_get_ip.assert_called_once_with('vhost') mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True) mock_run.assert_called_once_with('ip address add 192.168.15.1/24 dev eth0') assert 'error running "ip address" command' in str(err.value) @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_install(self, mock_netweaver): ''' Test install method - return ''' netweavermod.install( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp') mock_netweaver.install.assert_called_once_with( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp') @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_install_raise(self, mock_netweaver): ''' Test install method - raise ''' mock_netweaver.install.side_effect = netweavermod.netweaver.NetweaverError( 'netweaver error' ) with pytest.raises(exceptions.CommandExecutionError) as err: netweavermod.install('software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root') mock_netweaver.install.assert_called_once_with( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd=None) assert 'netweaver error' in str(err.value) @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_install_ers(self, mock_netweaver): ''' Test install method - return ''' netweavermod.install_ers( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp', ascs_password='ascs', timeout=15, interval=2) mock_netweaver.install_ers.assert_called_once_with( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp', ascs_password='ascs', timeout=15, interval=2) @patch('salt.modules.netweavermod.netweaver.NetweaverInstance') def test_install_ers_raise(self, mock_netweaver): ''' Test install method - raise ''' mock_netweaver.install_ers.side_effect = netweavermod.netweaver.NetweaverError( 'netweaver error' ) with pytest.raises(exceptions.CommandExecutionError) as err: netweavermod.install_ers('software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root') mock_netweaver.install_ers.assert_called_once_with( 'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', ascs_password=None, timeout=0, interval=5, cwd=None) assert 'netweaver error' in str(err.value) def test_setup_cwd(self): mock_remove = mock.MagicMock() mock_mkdir = mock.MagicMock() mock_touch = mock.MagicMock() mock_chown = mock.MagicMock() mock_set_mode = mock.MagicMock() mock_append = mock.MagicMock() with patch.dict(netweavermod.__salt__, {'file.remove': mock_remove, 'file.mkdir': mock_mkdir, 'file.touch': mock_touch, 'file.chown': mock_chown, 'file.set_mode': mock_set_mode, 'file.append': mock_append}): netweavermod.setup_cwd('/software', '/tmp', ['/path/dvd1', '/path/dvd2']) mock_remove.assert_called_once_with('/tmp') mock_mkdir.assert_called_once_with('/tmp', user='root', group='sapinst', mode=775) mock_touch.assert_called_once_with('/tmp/start_dir.cd') mock_chown.assert_called_once_with('/tmp/start_dir.cd', 'root', 'sapinst') mock_set_mode.assert_called_once_with('/tmp/start_dir.cd', 775) mock_append.assert_has_calls([ mock.call('/tmp/start_dir.cd', args='/software'), mock.call('/tmp/start_dir.cd', args=['/path/dvd1', '/path/dvd2']) ])
42.44757
109
0.642948
1,861
16,597
5.402472
0.099946
0.095683
0.063656
0.07957
0.81112
0.765268
0.73145
0.713945
0.694549
0.65178
0
0.021687
0.247093
16,597
390
110
42.55641
0.782891
0.040971
0
0.496324
0
0
0.178304
0.054659
0
0
0
0
0.246324
1
0.084559
false
0.106618
0.029412
0.003676
0.121324
0.003676
0
0
0
null
0
0
0
1
1
1
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
0
0
0
0
0
6
69a5e2ebb5ec5b80c09dc925c8ea11f2b59ed164
33
py
Python
cn_v2/parser/__init__.py
Larryun/coursenotify_v2
e82794ba83d42c2cca9b2dc7c6e6108dcecaba54
[ "MIT" ]
1
2021-03-25T22:16:07.000Z
2021-03-25T22:16:07.000Z
cn_v2/parser/__init__.py
Larryun/coursenotify_v2
e82794ba83d42c2cca9b2dc7c6e6108dcecaba54
[ "MIT" ]
null
null
null
cn_v2/parser/__init__.py
Larryun/coursenotify_v2
e82794ba83d42c2cca9b2dc7c6e6108dcecaba54
[ "MIT" ]
null
null
null
from .course import CourseParser
16.5
32
0.848485
4
33
7
1
0
0
0
0
0
0
0
0
0
0
0
0.121212
33
1
33
33
0.965517
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
69ceb254944b7f733ad34ef3368c75bbb26a9d3f
72
py
Python
fastai/set_spawn.py
royalbhati/fastai
745ddabcf9301b0078a16ac6333cd41684df149b
[ "Apache-2.0" ]
67
2019-05-29T18:55:20.000Z
2022-03-14T10:03:24.000Z
fastai/set_spawn.py
royalbhati/fastai
745ddabcf9301b0078a16ac6333cd41684df149b
[ "Apache-2.0" ]
17
2020-08-25T14:15:32.000Z
2022-03-27T02:12:19.000Z
fastai/set_spawn.py
royalbhati/fastai
745ddabcf9301b0078a16ac6333cd41684df149b
[ "Apache-2.0" ]
89
2020-08-17T23:45:42.000Z
2022-03-27T20:53:43.000Z
from multiprocessing import set_start_method set_start_method('spawn')
18
44
0.861111
10
72
5.8
0.7
0.275862
0.482759
0
0
0
0
0
0
0
0
0
0.083333
72
3
45
24
0.878788
0
0
0
0
0
0.070423
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
0
0
6
69d4c9689a3d4d5d42eaaa7a6092d727217f24cd
41
py
Python
python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py
jnthn/intellij-community
8fa7c8a3ace62400c838e0d5926a7be106aa8557
[ "Apache-2.0" ]
2
2019-04-28T07:48:50.000Z
2020-12-11T14:18:08.000Z
python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py
Cyril-lamirand/intellij-community
60ab6c61b82fc761dd68363eca7d9d69663cfa39
[ "Apache-2.0" ]
173
2018-07-05T13:59:39.000Z
2018-08-09T01:12:03.000Z
python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py
Cyril-lamirand/intellij-community
60ab6c61b82fc761dd68363eca7d9d69663cfa39
[ "Apache-2.0" ]
2
2020-03-15T08:57:37.000Z
2020-04-07T04:48:14.000Z
def f(y, x, *args): pass f(1, x=42)
8.2
19
0.463415
10
41
1.9
0.8
0
0
0
0
0
0
0
0
0
0
0.103448
0.292683
41
5
20
8.2
0.551724
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
false
0.333333
0
0
0.333333
0
1
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
1
0
0
0
0
0
6
386f47e20a37828d2987d111065970cd41e38254
29
py
Python
strudel/__init__.py
XIAOKAOBO/strudel-exploration
8e9502ea1319566997e91f8a461c78a8db7ff891
[ "Apache-2.0" ]
1
2021-11-18T17:13:37.000Z
2021-11-18T17:13:37.000Z
strudel/__init__.py
XIAOKAOBO/strudel
4c14246d08e7d8fc15c3182a6c15efd5456dd571
[ "Apache-2.0" ]
null
null
null
strudel/__init__.py
XIAOKAOBO/strudel
4c14246d08e7d8fc15c3182a6c15efd5456dd571
[ "Apache-2.0" ]
2
2021-11-18T17:13:36.000Z
2022-01-27T20:52:44.000Z
# Created by lan at 2021/1/2
14.5
28
0.689655
7
29
2.857143
1
0
0
0
0
0
0
0
0
0
0
0.26087
0.206897
29
1
29
29
0.608696
0.896552
0
null
0
null
0
0
null
0
0
0
null
1
null
true
0
0
null
null
null
1
1
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
6
387ca1ee68142daace5a85c5b19195037120372b
72
py
Python
tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py
hawkhai/pyinstaller
016a24479b34de161792c72dde455a81ad4c78ae
[ "Apache-2.0" ]
9,267
2015-01-01T04:08:45.000Z
2022-03-31T11:42:38.000Z
tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py
hawkhai/pyinstaller
016a24479b34de161792c72dde455a81ad4c78ae
[ "Apache-2.0" ]
5,150
2015-01-01T12:09:56.000Z
2022-03-31T18:06:12.000Z
tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py
hawkhai/pyinstaller
016a24479b34de161792c72dde455a81ad4c78ae
[ "Apache-2.0" ]
2,101
2015-01-03T10:25:27.000Z
2022-03-30T11:04:42.000Z
from . import subsubpkg21 # noqa: F401 from . import mod # noqa: F401
24
39
0.694444
10
72
5
0.6
0.4
0
0
0
0
0
0
0
0
0
0.142857
0.222222
72
2
40
36
0.75
0.291667
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
38c104fbf0c0ddc0cbebb07c83bddf6299c0bcdd
222
py
Python
pyperator/__init__.py
baffelli/pyperator
4b4d176db993708dc1f7d8cec048d490910213b7
[ "MIT" ]
60
2017-03-18T10:01:16.000Z
2021-12-07T02:55:43.000Z
pyperator/__init__.py
baffelli/pyperator
4b4d176db993708dc1f7d8cec048d490910213b7
[ "MIT" ]
14
2017-04-11T06:10:02.000Z
2018-03-16T12:40:20.000Z
pyperator/__init__.py
baffelli/pyperator
4b4d176db993708dc1f7d8cec048d490910213b7
[ "MIT" ]
8
2017-11-01T11:33:34.000Z
2019-12-01T22:58:38.000Z
from pyperator.decorators import inport, outport, component, run_once from pyperator.nodes import Component from pyperator.DAG import Multigraph from pyperator.utils import InputPort, OutputPort import pyperator.components
44.4
69
0.864865
28
222
6.821429
0.571429
0.272251
0
0
0
0
0
0
0
0
0
0
0.094595
222
5
70
44.4
0.950249
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
38dace778a60ef15c674019b799386e41e752233
42
py
Python
nlpete/models/__init__.py
kstats/nlp-models
0ae6ea31a52509f9a1c8289e8ecfed643f254e30
[ "MIT" ]
95
2018-10-21T19:54:47.000Z
2021-09-28T16:16:26.000Z
nlpete/models/__init__.py
kstats/nlp-models
0ae6ea31a52509f9a1c8289e8ecfed643f254e30
[ "MIT" ]
30
2018-10-09T18:47:18.000Z
2021-04-12T20:23:39.000Z
nlpete/models/__init__.py
kstats/nlp-models
0ae6ea31a52509f9a1c8289e8ecfed643f254e30
[ "MIT" ]
12
2018-11-09T17:38:41.000Z
2020-07-10T15:46:33.000Z
from nlpete.models.copynet import CopyNet
21
41
0.857143
6
42
6
0.833333
0
0
0
0
0
0
0
0
0
0
0
0.095238
42
1
42
42
0.947368
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
2a0fb91e95f43a756d8e2d8ae360b5b62b81ba88
224
py
Python
aplus_client/django/apps.py
apluslms/a-plus-client
21cf1575ef70baf6ece70d6ae99f7bcee554e9b1
[ "MIT" ]
1
2019-10-13T10:21:51.000Z
2019-10-13T10:21:51.000Z
aplus_client/django/apps.py
apluslms/a-plus-client
21cf1575ef70baf6ece70d6ae99f7bcee554e9b1
[ "MIT" ]
null
null
null
aplus_client/django/apps.py
apluslms/a-plus-client
21cf1575ef70baf6ece70d6ae99f7bcee554e9b1
[ "MIT" ]
1
2018-08-28T18:32:20.000Z
2018-08-28T18:32:20.000Z
from django.apps import AppConfig from django.utils.translation import gettext_lazy as _ class AplusClientConfig(AppConfig): name = 'aplus_client.django' label = 'aplus_client' verbose_name = _("Aplus client")
24.888889
54
0.758929
27
224
6.074074
0.62963
0.20122
0.182927
0
0
0
0
0
0
0
0
0
0.160714
224
8
55
28
0.87234
0
0
0
0
0
0.191964
0
0
0
0
0
0
1
0
false
0
0.333333
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
1
0
1
0
0
6
2a2c49f7a43904587471aecb73a899dc46879da9
60
py
Python
api/v2/models/parties.py
Davidodari/POLITICO-API
479560f7accc3a6e46a8cec34c4f435ae9284138
[ "MIT" ]
1
2019-09-05T23:20:21.000Z
2019-09-05T23:20:21.000Z
api/v2/models/parties.py
Davidodari/POLITICO-API
479560f7accc3a6e46a8cec34c4f435ae9284138
[ "MIT" ]
4
2019-02-12T10:06:12.000Z
2019-02-20T05:00:40.000Z
api/v2/models/parties.py
Davidodari/POLITICO-API
479560f7accc3a6e46a8cec34c4f435ae9284138
[ "MIT" ]
4
2019-02-08T23:54:24.000Z
2019-02-19T16:26:59.000Z
from . import Model class PartiesModelDb(Model): pass
10
28
0.716667
7
60
6.142857
0.857143
0
0
0
0
0
0
0
0
0
0
0
0.216667
60
5
29
12
0.914894
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0.333333
0.333333
0
0.666667
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
6
2a6fcd5410449d2f19d4ab46be35ecf078c9daa3
42
py
Python
core/preprocess/__init__.py
BarryZM/KnowYouAI
8c9d96238090fa8fd70b8581ac536bb1b0691eb5
[ "MIT" ]
null
null
null
core/preprocess/__init__.py
BarryZM/KnowYouAI
8c9d96238090fa8fd70b8581ac536bb1b0691eb5
[ "MIT" ]
null
null
null
core/preprocess/__init__.py
BarryZM/KnowYouAI
8c9d96238090fa8fd70b8581ac536bb1b0691eb5
[ "MIT" ]
1
2020-12-31T11:13:30.000Z
2020-12-31T11:13:30.000Z
from .v1 import PreProcessV1 as PreProcess
42
42
0.857143
6
42
6
1
0
0
0
0
0
0
0
0
0
0
0.054054
0.119048
42
1
42
42
0.918919
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
aaa42e4e4b42a3c58d19fa755851b9b66301d88b
150
py
Python
interface/__init__.py
jeremiahmarks/todo2017
a81e9a2b2a016654305bfacdc8c92bc72da92294
[ "MIT" ]
null
null
null
interface/__init__.py
jeremiahmarks/todo2017
a81e9a2b2a016654305bfacdc8c92bc72da92294
[ "MIT" ]
null
null
null
interface/__init__.py
jeremiahmarks/todo2017
a81e9a2b2a016654305bfacdc8c92bc72da92294
[ "MIT" ]
null
null
null
# -*- coding: utf-8 -*- # @Author: Jeremiah # @Date: 2017-04-22 15:18:17 # @Last Modified by: Jeremiah # @Last Modified time: 2017-04-22 15:18:17
25
42
0.626667
25
150
3.76
0.64
0.12766
0.170213
0.212766
0.297872
0.297872
0
0
0
0
0
0.235772
0.18
150
5
43
30
0.528455
0.926667
0
null
0
null
0
0
null
0
0
0
null
1
null
true
0
0
null
null
null
1
0
0
null
0
0
1
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
6
6303f0cc54c3316ef3e92c69d099da8a0466d80c
9,500
py
Python
sociallink.py
nepalese-noob/sociallink
89ea75f960003731ff34bd4f38c17d11bea116d0
[ "MIT" ]
2
2022-03-26T04:06:29.000Z
2022-03-29T14:59:02.000Z
sociallink.py
nepalese-noob/sociallink
89ea75f960003731ff34bd4f38c17d11bea116d0
[ "MIT" ]
null
null
null
sociallink.py
nepalese-noob/sociallink
89ea75f960003731ff34bd4f38c17d11bea116d0
[ "MIT" ]
null
null
null
from tkinter import * import os def sites(): def fishinsta(): link = os.system("cd assets/sites/instagram; hostit -f cloudflare 8080 --silent> ../../../process/link.txt 2>&1; grep -o 'https://[-0-9a-z]*\.trycloudflare.com' '../../../process/link.txt' > ../../../process/new.txt; rm ../../../process/link.txt") def capture(): file_size = os.path.getsize('assets/sites/instagram/log.txt') while True: new_size=os.path.getsize('assets/sites/instagram/log.txt') if (new_size > file_size): os.system("bash assets/bashscript.sh instagram") break def uname(): g= open('process/username.txt', 'r') unameplace.delete(0, END) unameplace.insert(INSERT, g.read()) def pwget(): h = open("process/password.txt") pwarea.delete(0, END) pwarea.insert(INSERT, h.read()) def copying(event): copybutton.config(text="copied link",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN) copier = Tk() r = open("process/new.txt") copier.withdraw() copier.clipboard_clear() copier.clipboard_append(r.read()) copier.update() copier.destroy() def destroy(): root.destroy() root1.destroy() root4.destroy() def otpget(): i = open("process/otp.txt") otparea.delete(0, END) otparea.insert(INSERT, i.read()) def ipfinder(): j = open("process/ip.txt") ipplace.delete(0, END) ipplace.insert(INSERT, j.read()) root4 = Tk() root4.title("Instagram link") copyplace = Entry(root4, width=60, font="Calibri 10") copyplace.grid(row=0,column=2) copyplace.insert(INSERT, "click copy link to get link") copybutton = Button(root4,text="copy button",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN) copybutton.bind('<Enter>', copying) copybutton.grid(row=0, column=0) listener = Button(root4, text="start capturing",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=capture).grid(row=1,column=0) ip = Button(root4,text="ip",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= ipfinder) ip.grid(row=2, column=0) ipplace= Entry(root4, width=60, font="Calibri 10") ipplace.grid(row=2, column=2) ipplace.insert(INSERT, "click ip to update") username = Button(root4,text="username",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= uname) username.grid(row=3, column=0) unameplace= Entry(root4, width=60, font="Calibri 10") unameplace.grid(row=3, column=2) unameplace.insert(INSERT, "click username to update") pw = Button(root4,text="password",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= pwget) pw.grid(row=4, column=0) pwarea = Entry(root4, width=60, font="Calibri 10") pwarea.grid(row=4,column=2) pwarea.insert(INSERT, "click password to update") otp = Button(root4,text="OTP",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= otpget) otp.grid(row=5, column=0) otparea = Entry(root4, width=60, font="Calibri 10") otparea.grid(row=5,column=2) otparea.insert(INSERT, "click OTP to update") closeall=Button(root4, text="Exit all",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= destroy).grid(row=6, column=2), root4.mainloop() def fishfacebook(): link = os.system("cd assets/sites/facebook; hostit -f cloudflare 8080 --silent> ../../../process/link.txt 2>&1; grep -o 'https://[-0-9a-z]*\.trycloudflare.com' '../../../process/link.txt' > ../../../process/new.txt; rm ../../../process/link.txt") def capture(): file_size = os.path.getsize('assets/sites/facebook/log.txt') while True: new_size=os.path.getsize('assets/sites/facebook/log.txt') if (new_size > file_size): os.system("bash assets/bashscript.sh facebook") break def uname(): g= open('process/username.txt', 'r') unameplace.delete(0, END) unameplace.insert(INSERT, g.read()) def pwget(): h = open("process/password.txt") pwarea.delete(0, END) pwarea.insert(INSERT, h.read()) def copying(event): copybutton.config(text="copied link",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN) copier = Tk() r = open("process/new.txt") copier.withdraw() copier.clipboard_clear() copier.clipboard_append(r.read()) copier.update() copier.destroy() def destroy(): root.destroy() root1.destroy() root3.destroy() def otpget(): i = open("process/otp.txt") otparea.delete(0, END) otparea.insert(INSERT, i.read()) def ipfinder(): j = open("process/ip.txt") ipplace.delete(0, END) ipplace.insert(INSERT, j.read()) root3 = Tk() root3.title("facebook link") copyplace = Entry(root3, width=60, font="Calibri 10") copyplace.grid(row=0,column=2) copyplace.insert(INSERT, "click copy link to get link") copybutton = Button(root3,text="copy button",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN) copybutton.bind('<Enter>', copying) copybutton.grid(row=0, column=0) listener = Button(root3, text="start capturing",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=capture).grid(row=1,column=0) ip = Button(root3,text="ip",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= ipfinder) ip.grid(row=2, column=0) ipplace= Entry(root3, width=60, font="Calibri 10") ipplace.grid(row=2, column=2) ipplace.insert(INSERT, "click ip to update") username = Button(root3,text="username",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= uname) username.grid(row=3, column=0) unameplace= Entry(root3, width=60, font="Calibri 10") unameplace.grid(row=3, column=2) unameplace.insert(INSERT, "click username to update") pw = Button(root3,text="password",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= pwget) pw.grid(row=4, column=0) pwarea = Entry(root3, width=60, font="Calibri 10") pwarea.grid(row=4,column=2) pwarea.insert(INSERT, "click password to update") otp = Button(root3,text="OTP",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= otpget) otp.grid(row=5, column=0) otparea = Entry(root3, width=60, font="Calibri 10") otparea.grid(row=5,column=2) otparea.insert(INSERT, "click OTP to update") closeall=Button(root3, text="Exit all",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= destroy).grid(row=6, column=2), root3.mainloop() root1 = Tk() root1.geometry('500x100+500+760') root1.title("coose option") option1 = Button(root1, text = 'Facebook',font=('Times New Roman', 18,'bold'), bg="blue", fg="white", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command = fishfacebook).grid(row = 0, column = 0) option1 = Button(root1, text = 'instagram',font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="pink", activeforeground="red", cursor="hand2", relief=SUNKEN,command = fishinsta).grid(row = 0, column = 1) toolcloser = Button(root1, text = 'Quit !',font=('Times New Roman', 18,'bold'), bg="red", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command = root1.destroy).grid(row = 0, column = 3) root1.mainloop() os.system(""" #!/bin/bash if [ -f process/new.txt ]; then rm process/new.txt fi """) os.system("""if [ ! -d process ]; then mkdir -p process; fi""") root=Tk() root.title("practise") root.geometry("300x100+600+900") button1=Button(root, text="Start!", font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=sites).grid(row=0, column=3) button2=Button(root, text="exit", font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=root.destroy).grid(row=0, column=4) root.mainloop()
54.285714
250
0.683895
1,309
9,500
4.954163
0.120703
0.031303
0.038859
0.05505
0.891596
0.880339
0.872629
0.848111
0.848111
0.842868
0
0.030448
0.118421
9,500
174
251
54.597701
0.743881
0
0
0.596273
0
0.012422
0.266
0.038632
0
0
0
0
0
1
0.10559
false
0.037267
0.012422
0
0.118012
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
2d6d95ebb8b86219e60c3decc8d65488963ca2e1
33
py
Python
VAEs/SimpleVAE/__init__.py
TeaKatz/Models_Corpus
6d9e91eb97829e73d88ecfc4754492f6324ef383
[ "MIT" ]
null
null
null
VAEs/SimpleVAE/__init__.py
TeaKatz/Models_Corpus
6d9e91eb97829e73d88ecfc4754492f6324ef383
[ "MIT" ]
null
null
null
VAEs/SimpleVAE/__init__.py
TeaKatz/Models_Corpus
6d9e91eb97829e73d88ecfc4754492f6324ef383
[ "MIT" ]
null
null
null
from .SimpleVAE import SimpleVAE
16.5
32
0.848485
4
33
7
0.75
0
0
0
0
0
0
0
0
0
0
0
0.121212
33
1
33
33
0.965517
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
2da303fcee860450dca491d65e249220141e7f21
57,910
py
Python
ghostwriter/reporting/forms.py
bbhunter/Ghostwriter
1b684ddd119feed9891e83b39c9b314b41d086ca
[ "BSD-3-Clause" ]
null
null
null
ghostwriter/reporting/forms.py
bbhunter/Ghostwriter
1b684ddd119feed9891e83b39c9b314b41d086ca
[ "BSD-3-Clause" ]
null
null
null
ghostwriter/reporting/forms.py
bbhunter/Ghostwriter
1b684ddd119feed9891e83b39c9b314b41d086ca
[ "BSD-3-Clause" ]
null
null
null
"""This contains all of the forms used by the Reporting application.""" # Django Imports from django import forms from django.core.exceptions import ValidationError from django.urls import reverse from django.utils.translation import gettext_lazy as _ # 3rd Party Libraries from crispy_forms.bootstrap import Accordion, AccordionGroup, FieldWithButtons from crispy_forms.helper import FormHelper from crispy_forms.layout import ( HTML, ButtonHolder, Column, Div, Field, Layout, Row, Submit, ) # Ghostwriter Libraries from ghostwriter.modules.custom_layout_object import SwitchToggle from ghostwriter.reporting.models import ( Evidence, Finding, FindingNote, LocalFindingNote, Report, ReportFindingLink, ReportTemplate, ) from ghostwriter.rolodex.models import Project class FindingForm(forms.ModelForm): """ Save an individual :model:`reporting.Finding`. """ class Meta: model = Finding fields = "__all__" def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) for field in self.fields: self.fields[field].widget.attrs["autocomplete"] = "off" self.fields["title"].widget.attrs["placeholder"] = "Finding Title" self.fields["description"].widget.attrs["placeholder"] = "What is this ..." self.fields["impact"].widget.attrs["placeholder"] = "What is the impact ..." self.fields["cvss_score"].widget.attrs["placeholder"] = "What is the CVSS score ..." self.fields["cvss_vector"].widget.attrs["placeholder"] = "What is the CVSS vector ..." self.fields["mitigation"].widget.attrs[ "placeholder" ] = "What needs to be done ..." self.fields["replication_steps"].widget.attrs[ "placeholder" ] = "How to reproduce/find this issue ..." self.fields["host_detection_techniques"].widget.attrs[ "placeholder" ] = "How to detect it on an endpoint ..." self.fields["network_detection_techniques"].widget.attrs[ "placeholder" ] = "How to detect it on a network ..." self.fields["references"].widget.attrs[ "placeholder" ] = "Some useful links and references ..." self.fields["finding_guidance"].widget.attrs[ "placeholder" ] = "When using this finding in a report be sure to include ..." # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_labels = True self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.layout = Layout( HTML( """ <h4 class="icon search-icon">Categorization</h4> <hr /> """ ), "title", Row( Column("finding_type", css_class="form-group col-md-6 mb-0"), Column("severity", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), Row( Column("cvss_score", css_class="form-group col-md-6 mb-0"), Column("cvss_vector", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), Accordion( AccordionGroup( "CVSS Calculator", HTML( """ <!-- CVSS --> <!-- Copyright (c) 2015, FIRST.ORG, INC. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <div class="form-row" style="text-align:center;display:inline-block"> <fieldset id="baseMetricGroup"> <legend id="baseMetricGroup_Legend" title="The Base Metric group represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Determine the vulnerable component and score Attack Vector, Attack Complexity, Privileges Required and User Interaction relative to this.">Base Score</legend> <div class="column column-left"> <div class="metric"> <h3 id="AV_Heading" title="This metric reflects the context by which vulnerability exploitation is possible. The Base Score increases the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component.">Attack Vector (AV)</h3> <input name="AV" value="N" id="AV_N" type="radio" onclick="CVSSAutoCalc()"><label for="AV_N" id="AV_N_Label" title="A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed &quot;remotely exploitable” and can be thought of as an attack being exploitable one or more network hops away.">Network (N)</label> <input name="AV" value="A" id="AV_A" type="radio" onclick="CVSSAutoCalc()"><label for="AV_A" id="AV_A_Label" title="A vulnerability exploitable with adjacent network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent (A)</label> <input name="AV" value="L" id="AV_L" type="radio" onclick="CVSSAutoCalc()"><label for="AV_L" id="AV_L_Label" title="A vulnerability exploitable with local access means that the vulnerable component is not bound to the network stack, and the attacker’s path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file.">Local (L)</label> <input name="AV" value="P" id="AV_P" type="radio" onclick="CVSSAutoCalc()"><label for="AV_P" id="AV_P_Label" title="A vulnerability exploitable with physical access requires the attacker to physically touch or manipulate the vulnerable component. Physical interaction may be brief or persistent.">Physical (P)</label> </div> <div class="metric"> <h3 id="AC_Heading" title="This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Such conditions may require the collection of more information about the target, the presence of certain system configuration settings, or computational exceptions.">Attack Complexity (AC)</h3> <input name="AC" value="L" id="AC_L" type="radio" onclick="CVSSAutoCalc()"><label for="AC_L" id="AC_L_Label" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low (L)</label> <input name="AC" value="H" id="AC_H" type="radio" onclick="CVSSAutoCalc()"><label for="AC_H" id="AC_H_Label" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. For example, a successful attack may require the attacker: to perform target-specific reconnaissance; to prepare the target environment to improve exploit reliability; or to inject herself into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g. a man in the middle attack).">High (H)</label> </div> <div class="metric"> <h3 id="PR_Heading" title="This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. This Base Score increases as fewer privileges are required.">Privileges Required (PR)</h3> <input name="PR" value="N" id="PR_N" type="radio" onclick="CVSSAutoCalc()"><label for="PR_N" id="PR_N_Label" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None (N)</label> <input name="PR" value="L" id="PR_L" type="radio" onclick="CVSSAutoCalc()"><label for="PR_L" id="PR_L_Label" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low (L)</label> <input name="PR" value="H" id="PR_H" type="radio" onclick="CVSSAutoCalc()"><label for="PR_H" id="PR_H_Label" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High (H)</label> </div> <div class="metric"> <h3 id="UI_Heading" title="This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner. The Base Score is highest when no user interaction is required.">User Interaction (UI)</h3> <input name="UI" value="N" id="UI_N" type="radio" onclick="CVSSAutoCalc()"><label for="UI_N" id="UI_N_Label" title="The vulnerable system can be exploited without any interaction from any user.">None (N)</label> <input name="UI" value="R" id="UI_R" type="radio" onclick="CVSSAutoCalc()"><label for="UI_R" id="UI_R_Label" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited.">Required (R)</label> </div> </div> <div class="column column-right"> <div class="metric"> <h3 id="S_Heading" title="Does a successful attack impact a component other than the vulnerable component? If so, the Base Score increases and the Confidentiality, Integrity and Authentication metrics should be scored relative to the impacted component.">Scope (S)</h3> <input name="S" value="U" id="S_U" type="radio" onclick="CVSSAutoCalc()"><label for="S_U" id="S_U_Label" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged (U)</label> <input name="S" value="C" id="S_C" type="radio" onclick="CVSSAutoCalc()"><label for="S_C" id="S_C_Label" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed (C)</label> </div> <div class="metric"> <h3 id="C_Heading" title="This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.">Confidentiality (C)</h3> <input name="C" value="N" id="C_N" type="radio" onclick="CVSSAutoCalc()"><label for="C_N" id="C_N_Label" title="There is no loss of confidentiality within the impacted component.">None (N)</label> <input name="C" value="L" id="C_L" type="radio" onclick="CVSSAutoCalc()"><label for="C_L" id="C_L_Label" title="There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.">Low (L)</label> <input name="C" value="H" id="C_H" type="radio" onclick="CVSSAutoCalc()"><label for="C_H" id="C_H_Label" title="There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact.">High (H)</label> </div> <div class="metric"> <h3 id="I_Heading" title="This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.">Integrity (I)</h3> <input name="I" value="N" id="I_N" type="radio" onclick="CVSSAutoCalc()"><label for="I_N" id="I_N_Label" title="There is no loss of integrity within the impacted component.">None (N)</label> <input name="I" value="L" id="I_L" type="radio" onclick="CVSSAutoCalc()"><label for="I_L" id="I_L_Label" title="Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.">Low (L)</label> <input name="I" value="H" id="I_H" type="radio" onclick="CVSSAutoCalc()"><label for="I_H" id="I_H_Label" title="There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.">High (H)</label> </div> <div class="metric"> <h3 id="A_Heading" title="This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.">Availability (A)</h3> <input name="A" value="N" id="A_N" type="radio" onclick="CVSSAutoCalc()"><label for="A_N" id="A_N_Label" title="There is no impact to availability within the impacted component.">None (N)</label> <input name="A" value="L" id="A_L" type="radio" onclick="CVSSAutoCalc()"><label for="A_L" id="A_L_Label" title="There is reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the impacted component.">Low (L)</label> <input name="A" value="H" id="A_H" type="radio" onclick="CVSSAutoCalc()"><label for="A_H" id="A_H_Label" title="There is total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).">High (H)</label> </div> </div> <div id="scoreRating" class="scoreRating"> <span id="baseMetricScore"></span> <span id="baseSeverity">Select values for all base metrics</span> </div> </fieldset> </div> """ ), active=False, template="accordion_group.html", ), ), HTML( """ <h4 class="icon pencil-icon">General Information</h4> <hr /> """ ), Field("description"), Field("impact"), HTML( """ <h4 class="icon shield-icon">Defense</h4> <hr /> """ ), Field("mitigation"), Field("replication_steps"), Field("host_detection_techniques"), Field( "network_detection_techniques", ), HTML( """ <h4 class="icon link-icon">Reference Links</h4> <hr /> """ ), "references", "finding_guidance", ButtonHolder( Submit("submit_btn", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) class ReportForm(forms.ModelForm): """ Save an individual :model:`reporting.Report` associated with an indivudal :model:`rolodex.Project`. """ class Meta: model = Report exclude = ("creation", "last_update", "created_by", "complete") def __init__(self, project=None, *args, **kwargs): super().__init__(*args, **kwargs) self.project_instance = project # Limit the list to just projects not marked as complete active_projects = Project.objects.filter(complete=False).order_by( "-start_date", "client", "project_type" ) if active_projects: self.fields["project"].empty_label = "-- Select an Active Project --" else: self.fields["project"].empty_label = "-- No Active Projects --" self.fields["project"].queryset = active_projects self.fields[ "project" ].label_from_instance = ( lambda obj: f"{obj.start_date} {obj.client.name} {obj.project_type} ({obj.codename})" ) self.fields["docx_template"].label = "DOCX Template" self.fields["pptx_template"].label = "PPTX Template" # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_labels = True self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.layout = Layout( "title", "project", HTML( """ <h4 class="icon file-icon">Assign Templates</h4> <hr /> """ ), Row( Column("docx_template", css_class="form-group col-md-6 mb-0"), Column("pptx_template", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), ButtonHolder( Submit("submit", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) class ReportFindingLinkUpdateForm(forms.ModelForm): """ Update an individual :model:`reporting.ReportFindingLink` associated with an individual :model:`reporting.Report`. """ class Meta: model = ReportFindingLink exclude = ("report", "position", "finding_guidance") def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) evidence_upload_url = reverse( "reporting:upload_evidence_modal", kwargs={"pk": self.instance.id, "modal": "modal"}, ) for field in self.fields: self.fields[field].widget.attrs["autocomplete"] = "off" self.fields["affected_entities"].widget.attrs[ "placeholder" ] = "List of Hostnames or IP Addresses" self.fields["title"].widget.attrs["placeholder"] = "Finding Title" self.fields["description"].widget.attrs["placeholder"] = "What is this ..." self.fields["impact"].widget.attrs["placeholder"] = "What is the impact ..." self.fields["cvss_score"].widget.attrs["placeholder"] = "What is the CVSS score ..." self.fields["cvss_vector"].widget.attrs["placeholder"] = "What is the CVSS vector ..." self.fields["mitigation"].widget.attrs[ "placeholder" ] = "What needs to be done ..." self.fields["replication_steps"].widget.attrs[ "placeholder" ] = "How to reproduce/find this issue ..." self.fields["host_detection_techniques"].widget.attrs[ "placeholder" ] = "How to detect it on an endpoint ..." self.fields["network_detection_techniques"].widget.attrs[ "placeholder" ] = "How to detect it on a network ..." self.fields["references"].widget.attrs[ "placeholder" ] = "Some useful links and references ..." # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_labels = True self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.form_id = "report-finding-form" self.helper.attrs = {"evidence-upload-modal-url": evidence_upload_url} self.helper.layout = Layout( HTML( """ <h4 class="icon search-icon">Categorization</h4> <hr /> """ ), Row( Column("title", css_class="form-group col-md-6 mb-0"), Column("assigned_to", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), Row( Column("finding_type", css_class="form-group col-md-6 mb-0"), Column("severity", css_class="form-group col-md-6 mb-0"), ), Row( Column("cvss_score", css_class="form-group col-md-6 mb-0"), Column("cvss_vector", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), Accordion( AccordionGroup( "CVSS Calculator", HTML( """ <!-- CVSS --> <!-- Copyright (c) 2015, FIRST.ORG, INC. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <div class="form-row" style="text-align:center;display:inline-block"> <fieldset id="baseMetricGroup"> <legend id="baseMetricGroup_Legend" title="The Base Metric group represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Determine the vulnerable component and score Attack Vector, Attack Complexity, Privileges Required and User Interaction relative to this.">Base Score</legend> <div class="column column-left"> <div class="metric"> <h3 id="AV_Heading" title="This metric reflects the context by which vulnerability exploitation is possible. The Base Score increases the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component.">Attack Vector (AV)</h3> <input name="AV" value="N" id="AV_N" type="radio" onclick="CVSSAutoCalc()"><label for="AV_N" id="AV_N_Label" title="A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed &quot;remotely exploitable” and can be thought of as an attack being exploitable one or more network hops away.">Network (N)</label> <input name="AV" value="A" id="AV_A" type="radio" onclick="CVSSAutoCalc()"><label for="AV_A" id="AV_A_Label" title="A vulnerability exploitable with adjacent network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent (A)</label> <input name="AV" value="L" id="AV_L" type="radio" onclick="CVSSAutoCalc()"><label for="AV_L" id="AV_L_Label" title="A vulnerability exploitable with local access means that the vulnerable component is not bound to the network stack, and the attacker’s path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file.">Local (L)</label> <input name="AV" value="P" id="AV_P" type="radio" onclick="CVSSAutoCalc()"><label for="AV_P" id="AV_P_Label" title="A vulnerability exploitable with physical access requires the attacker to physically touch or manipulate the vulnerable component. Physical interaction may be brief or persistent.">Physical (P)</label> </div> <div class="metric"> <h3 id="AC_Heading" title="This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Such conditions may require the collection of more information about the target, the presence of certain system configuration settings, or computational exceptions.">Attack Complexity (AC)</h3> <input name="AC" value="L" id="AC_L" type="radio" onclick="CVSSAutoCalc()"><label for="AC_L" id="AC_L_Label" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low (L)</label> <input name="AC" value="H" id="AC_H" type="radio" onclick="CVSSAutoCalc()"><label for="AC_H" id="AC_H_Label" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. For example, a successful attack may require the attacker: to perform target-specific reconnaissance; to prepare the target environment to improve exploit reliability; or to inject herself into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g. a man in the middle attack).">High (H)</label> </div> <div class="metric"> <h3 id="PR_Heading" title="This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. This Base Score increases as fewer privileges are required.">Privileges Required (PR)</h3> <input name="PR" value="N" id="PR_N" type="radio" onclick="CVSSAutoCalc()"><label for="PR_N" id="PR_N_Label" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None (N)</label> <input name="PR" value="L" id="PR_L" type="radio" onclick="CVSSAutoCalc()"><label for="PR_L" id="PR_L_Label" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low (L)</label> <input name="PR" value="H" id="PR_H" type="radio" onclick="CVSSAutoCalc()"><label for="PR_H" id="PR_H_Label" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High (H)</label> </div> <div class="metric"> <h3 id="UI_Heading" title="This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner. The Base Score is highest when no user interaction is required.">User Interaction (UI)</h3> <input name="UI" value="N" id="UI_N" type="radio" onclick="CVSSAutoCalc()"><label for="UI_N" id="UI_N_Label" title="The vulnerable system can be exploited without any interaction from any user.">None (N)</label> <input name="UI" value="R" id="UI_R" type="radio" onclick="CVSSAutoCalc()"><label for="UI_R" id="UI_R_Label" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited.">Required (R)</label> </div> </div> <div class="column column-right"> <div class="metric"> <h3 id="S_Heading" title="Does a successful attack impact a component other than the vulnerable component? If so, the Base Score increases and the Confidentiality, Integrity and Authentication metrics should be scored relative to the impacted component.">Scope (S)</h3> <input name="S" value="U" id="S_U" type="radio" onclick="CVSSAutoCalc()"><label for="S_U" id="S_U_Label" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged (U)</label> <input name="S" value="C" id="S_C" type="radio" onclick="CVSSAutoCalc()"><label for="S_C" id="S_C_Label" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed (C)</label> </div> <div class="metric"> <h3 id="C_Heading" title="This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.">Confidentiality (C)</h3> <input name="C" value="N" id="C_N" type="radio" onclick="CVSSAutoCalc()"><label for="C_N" id="C_N_Label" title="There is no loss of confidentiality within the impacted component.">None (N)</label> <input name="C" value="L" id="C_L" type="radio" onclick="CVSSAutoCalc()"><label for="C_L" id="C_L_Label" title="There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.">Low (L)</label> <input name="C" value="H" id="C_H" type="radio" onclick="CVSSAutoCalc()"><label for="C_H" id="C_H_Label" title="There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact.">High (H)</label> </div> <div class="metric"> <h3 id="I_Heading" title="This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.">Integrity (I)</h3> <input name="I" value="N" id="I_N" type="radio" onclick="CVSSAutoCalc()"><label for="I_N" id="I_N_Label" title="There is no loss of integrity within the impacted component.">None (N)</label> <input name="I" value="L" id="I_L" type="radio" onclick="CVSSAutoCalc()"><label for="I_L" id="I_L_Label" title="Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.">Low (L)</label> <input name="I" value="H" id="I_H" type="radio" onclick="CVSSAutoCalc()"><label for="I_H" id="I_H_Label" title="There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.">High (H)</label> </div> <div class="metric"> <h3 id="A_Heading" title="This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.">Availability (A)</h3> <input name="A" value="N" id="A_N" type="radio" onclick="CVSSAutoCalc()"><label for="A_N" id="A_N_Label" title="There is no impact to availability within the impacted component.">None (N)</label> <input name="A" value="L" id="A_L" type="radio" onclick="CVSSAutoCalc()"><label for="A_L" id="A_L_Label" title="There is reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the impacted component.">Low (L)</label> <input name="A" value="H" id="A_H" type="radio" onclick="CVSSAutoCalc()"><label for="A_H" id="A_H_Label" title="There is total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).">High (H)</label> </div> </div> <div id="scoreRating" class="scoreRating"> <span id="baseMetricScore"></span> <span id="baseSeverity">Select values for all base metrics</span> </div> </fieldset> </div> """ ), active=False, template="accordion_group.html", ), ), HTML( """ <h4 class="icon list-icon">Affected Entities</h4> <hr /> """ ), Field("affected_entities", css_class="enable-evidence-upload"), HTML( """ <h4 class="icon pencil-icon">General Information</h4> <hr /> """ ), Field("description", css_class="enable-evidence-upload"), Field("impact", css_class="enable-evidence-upload"), HTML( """ <h4 class="icon shield-icon">Defense</h4> <hr /> """ ), Field("mitigation", css_class="enable-evidence-upload"), Field("replication_steps", css_class="enable-evidence-upload"), Field("host_detection_techniques", css_class="enable-evidence-upload"), Field( "network_detection_techniques", css_class="enable-evidence-upload", ), HTML( """ <h4 class="icon link-icon">Reference Links</h4> <hr /> """ ), Field("references", css_class="enable-evidence-upload"), ButtonHolder( Submit("submit_btn", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) class EvidenceForm(forms.ModelForm): """ Save an individual :model:`reporting.Evidence` associated with an individual :model:`reporting.ReportFindingLink`. """ class Meta: model = Evidence fields = ( "friendly_name", "document", "description", "caption", ) widgets = { "document": forms.FileInput(attrs={"class": "form-control"}), } def __init__(self, *args, **kwargs): self.is_modal = kwargs.pop("is_modal", None) self.evidence_queryset = kwargs.pop("evidence_queryset", None) super().__init__(*args, **kwargs) self.fields["caption"].required = True self.fields["caption"].widget.attrs["autocomplete"] = "off" self.fields["caption"].widget.attrs["placeholder"] = "Report Caption" self.fields["friendly_name"].required = True self.fields["friendly_name"].widget.attrs["autocomplete"] = "off" self.fields["friendly_name"].widget.attrs["placeholder"] = "Friendly Name" self.fields["description"].widget.attrs[ "placeholder" ] = "Brief Description or Note" self.fields["document"].widget.attrs["class"] = "custom-file-input" # Don't set form buttons for a modal pop-up if self.is_modal: submit = None cancel_button = None else: submit = Submit( "submit-button", "Submit", css_class="btn btn-primary col-md-4" ) cancel_button = HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ) # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_errors = False self.helper.form_show_labels = False self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.attrs = {"enctype": "multipart/form-data"} self.helper.form_id = "evidence-upload-form" self.helper.layout = Layout( HTML( """ <h4 class="icon signature-icon">Report Information</h4> <hr> <p>The friendly name is used to reference this evidence in the report and the caption appears below the figures in the generated reports.</p> """ ), Row( Column("friendly_name", css_class="form-group col-md-6 mb-0"), Column("caption", css_class="form-group col-md-6 mb-0"), css_class="form-row", ), "description", HTML( """ <h4 class="icon upload-icon">Upload a File</h4> <hr> <p>Attach text evidence (*.txt, *.log, or *.md) or image evidence (*.png, *.jpg, or *.jpeg).</p> """ ), Div( Field( "document", id="id_document", ), HTML( """ <label id="filename" class="custom-file-label" for="customFile">Choose evidence file...</label> """ ), css_class="custom-file", ), ButtonHolder(submit, cancel_button, css_class="mt-3"), ) def clean_document(self): document = self.cleaned_data["document"] # Check if evidence file is missing if not document: raise ValidationError( _("You must provide an evidence file"), "incomplete", ) return document def clean_friendly_name(self): friendly_name = self.cleaned_data["friendly_name"] if self.evidence_queryset: # Check if provided name has already been used for another file for this report report_queryset = self.evidence_queryset.values_list("id", "friendly_name") for evidence in report_queryset: if friendly_name == evidence[1] and not self.instance.id == evidence[0]: raise ValidationError( _( "This friendly name has already been used for a file attached to this finding." ), "duplicate", ) return friendly_name class FindingNoteForm(forms.ModelForm): """ Save an individual :model:`reporting.FindingNote` associated with an individual :model:`reporting.Finding`. """ class Meta: model = FindingNote fields = ("note",) def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.helper = FormHelper() self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.form_show_labels = False self.helper.layout = Layout( Div("note"), ButtonHolder( Submit("submit", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) def clean_note(self): note = self.cleaned_data["note"] # Check if note is empty if not note: raise ValidationError( _("You must provide some content for the note"), code="required", ) return note class LocalFindingNoteForm(forms.ModelForm): """ Save an individual :model:`reporting.LocalFindingNote` associated with an individual :model:`ReportFindingLink. """ class Meta: model = LocalFindingNote fields = ("note",) def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.helper = FormHelper() self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.form_show_labels = False self.helper.layout = Layout( Div("note"), ButtonHolder( Submit("submit", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) def clean_note(self): note = self.cleaned_data["note"] # Check if note is empty if not note: raise ValidationError( _("You must provide some content for the note"), code="required", ) return note class ReportTemplateForm(forms.ModelForm): """ Save an individual :model:`reporting.ReportTemplate`. """ class Meta: model = ReportTemplate exclude = ("upload_date", "last_update", "lint_result", "uploaded_by") widgets = { "document": forms.FileInput(attrs={"class": "form-control"}), } def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.fields["document"].label = "" self.fields["document"].widget.attrs["class"] = "custom-file-input" self.fields["name"].widget.attrs["placeholder"] = "Descriptive Name" self.fields["description"].widget.attrs[ "placeholder" ] = "Brief Description on Template Usage" self.fields["changelog"].widget.attrs[ "placeholder" ] = "Track Template Modifications" self.fields["doc_type"].empty_label = "-- Select a Matching Filetype --" self.fields["client"].empty_label = "-- Attach to a Client (Optional) --" # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_labels = False self.helper.form_method = "post" self.helper.form_class = "newitem" self.helper.attrs = {"enctype": "multipart/form-data"} self.helper.layout = Layout( HTML( """ <h4 class="icon file-icon">Template Information</h4> <hr> <p>The name appears in the template dropdown menus in reports.</p> """ ), Row( Column("name", css_class="form-group col-md-7 mb-0"), Column("doc_type", css_class="form-group col-md-5 mb-0"), css_class="form-row", ), Row( Column("client", css_class="form-group col-md-7 mb-0"), Column( SwitchToggle( "protected", ), css_class="form-group col-md-5 mb-0", ), ), "description", HTML( """ <h4 class="icon upload-icon">Upload a File</h4> <hr> <p>Attach a document that matches your selected filetype to use as a report template</p> """ ), Div( "document", HTML( """ <label id="filename" class="custom-file-label" for="customFile">Choose template file...</label> """ ), css_class="custom-file", ), "changelog", ButtonHolder( Submit("submit", "Submit", css_class="btn btn-primary col-md-4"), HTML( """ <button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button> """ ), ), ) def clean_document(self): document = self.cleaned_data["document"] # Check if template file is missing if not document: raise ValidationError( _("You must provide a template file"), "incomplete", ) return document class SelectReportTemplateForm(forms.ModelForm): """ Modify the ``docx_template`` and ``pptx_template`` values of an individual :model:`reporting.Report`. """ class Meta: model = Report fields = ("docx_template", "pptx_template") def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.fields["docx_template"].help_text = None self.fields["pptx_template"].help_text = None self.fields["docx_template"].empty_label = "-- Select a DOCX Template --" self.fields["pptx_template"].empty_label = "-- Select a PPTX Template --" # Design form layout with Crispy FormHelper self.helper = FormHelper() self.helper.form_show_labels = False self.helper.form_method = "post" self.helper.form_id = "report-template-swap-form" self.helper.form_tag = True self.helper.form_action = reverse( "reporting:ajax_swap_report_template", kwargs={"pk": self.instance.id} ) self.helper.layout = Layout( Row( Column( HTML( """ <p class="text-left mt-1">Template for DOCX</p> """ ), css_class="col-md-2", ), Column( FieldWithButtons( "docx_template", HTML( """ <a class="btn btn-default word-btn js-generate-report" type="button" href="{% url 'reporting:generate_docx' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate a DOCX report" > </a> """ ), ), css_class="col-md-4", ), css_class="justify-content-md-center", ), Row( Column( HTML( """ <p class="text-left mt-1">Template for PPTX</p> """ ), css_class="col-md-2", ), Column( FieldWithButtons( "pptx_template", HTML( """ <a class="btn btn-default pptx-btn" type="button" href="{% url 'reporting:generate_pptx' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate a PPTX report" > </a> """ ), ), css_class="col-md-4", ), css_class="justify-content-md-center", ), HTML( """ <p class="mb-2">Other report types do not use templates:</p> <div class="btn-group"> <a class="btn btn-default excel-btn-icon" href="{% url 'reporting:generate_xlsx' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate an XLSX report"></i></a> <a class="btn btn-default json-btn-icon" href="{% url 'reporting:generate_json' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate exportable JSON"></a> <a class="btn btn-default archive-btn-icon js-generate-report" href="{% url 'reporting:generate_all' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate and package all report types and evidence in a Zip"></a> </div> """ ), )
63.777533
922
0.600967
6,839
57,910
5.015938
0.105863
0.014867
0.020522
0.035914
0.881472
0.868383
0.84649
0.834509
0.824365
0.810576
0
0.003669
0.298791
57,910
907
923
63.84785
0.841111
0.024469
0
0.656627
0
0.002008
0.233524
0.028502
0
0
0
0
0
1
0.026104
false
0
0.02008
0
0.088353
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
2db7fde821e3e5deded708cdcb4e97fcfa628215
5,358
py
Python
tests/test_segy/test_g.py
iod-ine/philoseismos
79240d11cf82c3552c4a49d4e19a79b003fa9929
[ "MIT" ]
3
2020-09-28T17:57:29.000Z
2021-08-18T03:54:46.000Z
tests/test_segy/test_g.py
iod-ine/philoseismos
79240d11cf82c3552c4a49d4e19a79b003fa9929
[ "MIT" ]
1
2021-04-12T15:18:28.000Z
2021-04-12T15:18:28.000Z
tests/test_segy/test_g.py
iod-ine/philoseismos
79240d11cf82c3552c4a49d4e19a79b003fa9929
[ "MIT" ]
1
2020-05-12T07:00:59.000Z
2020-05-12T07:00:59.000Z
""" philoseismos: engineering seismologist's toolbox. This file contains tests for the Geometry object. author: Ivan Dubrovin e-mail: io.dubrovin@icloud.com """ import numpy as np from philoseismos.segy.g import Geometry def test_loading_from_file(manually_crafted_segy_file): """ Test that Geometry object loads from file correctly. """ g = Geometry.load(manually_crafted_segy_file) # geometry should behave like a pd.DataFrame. # main way to access data is .loc property # check that all the headers are correctly loaded assert np.alltrue(g.loc[:, 'TRACENO'] == np.arange(1, 25, 1)) assert np.alltrue(g.loc[:, 'fTRACENO'] == np.arange(1, 25, 1)) assert np.alltrue(g.loc[:, 'FFID'] == 375) assert np.alltrue(g.loc[:, 'ELEVSC'] == -100) assert np.alltrue(g.loc[:, 'COORDSC'] == -100) assert np.alltrue(g.loc[:, 'NUMSMP'] == 512) assert np.alltrue(g.loc[:, 'DT'] == 500) assert np.alltrue(g.loc[:, 'YEAR'] == 1984) assert np.alltrue(g.loc[:, 'HOUR'] == 10) assert np.alltrue(g.loc[:, 'MINUTE'] == 51) # scalars to coordinates and elevations should be applied automatically assert np.alltrue(g.loc[:, 'SOU_X'] == 50) assert np.alltrue(g.loc[:, 'SOU_Y'] == 75) assert np.alltrue(g.loc[:, 'REC_X'] == np.arange(0, 48, 2)) assert np.alltrue(g.loc[:, 'REC_Y'] == -1) assert np.alltrue(g.loc[:, 'CDP_X'] == np.arange(25, 49, 1)) assert np.alltrue(g.loc[:, 'CDP_Y'] == 37) # there should be no NaN values in the Geometry assert np.all(g._df.notna()) def test_apply_coordinate_scalar_after_unpacking(geometry): """ Test that scalars for coordinates and elevations are applied correctly. """ # if positive, scalar is used as a multiplier geometry.loc[:, 'ELEVSC'] = 10 geometry.loc[:, 'COORDSC'] = 10 geometry._apply_scalars_after_unpacking() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000) # if negative, scalar is used as divisor geometry.loc[:, 'ELEVSC'] = -100 geometry.loc[:, 'COORDSC'] = -100 geometry._apply_scalars_after_unpacking() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70) # value of zero is assumed to be a scalar value of 1 geometry.loc[:, 'ELEVSC'] = 0 geometry.loc[:, 'COORDSC'] = 0 geometry._apply_scalars_after_unpacking() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70) def test_apply_coordinate_scalar_before_packing(geometry): """ Test that scalars are applied correctly before packing. """ # when unpacking: if positive, scalar is used as a multiplier # so we reverse it here geometry.loc[:, 'ELEVSC'] = 10 geometry.loc[:, 'COORDSC'] = 10 geometry._apply_scalars_before_packing() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70) # when unpacking: if negative, scalar is used as divisor # again reverse that geometry.loc[:, 'ELEVSC'] = -100 geometry.loc[:, 'COORDSC'] = -100 geometry._apply_scalars_before_packing() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000) # value of zero is assumed to be a scalar value of 1 geometry.loc[:, 'ELEVSC'] = 0 geometry.loc[:, 'COORDSC'] = 0 geometry._apply_scalars_before_packing() assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000) assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000) assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000) assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000) assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000) assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000) assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000)
40.900763
83
0.652482
745
5,358
4.577181
0.193289
0.138416
0.255132
0.283284
0.752786
0.702933
0.664223
0.632551
0.612023
0.612023
0
0.047802
0.176185
5,358
130
84
41.215385
0.724739
0.173572
0
0.722892
0
0
0.112047
0
0
0
0
0
0.710843
1
0.036145
false
0
0.024096
0
0.060241
0
0
0
0
null
0
1
1
0
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
1
0
0
0
0
0
0
0
0
0
6
9323cebc609cf72cde63b3160323dc25d139772f
33
py
Python
source/py/cmd/demo.py
shakfu/pymax
67dca5990581d91ffcedf800e585e87646ab94d4
[ "CC0-1.0" ]
25
2020-08-06T12:38:07.000Z
2022-03-23T17:35:09.000Z
source/py/cmd/demo.py
shakfu/pymax
67dca5990581d91ffcedf800e585e87646ab94d4
[ "CC0-1.0" ]
7
2021-04-02T02:58:56.000Z
2022-03-31T22:58:19.000Z
source/py/cmd/demo.py
shakfu/pymax
67dca5990581d91ffcedf800e585e87646ab94d4
[ "CC0-1.0" ]
3
2021-04-04T05:47:07.000Z
2021-06-26T03:30:02.000Z
def color(x): return 100*x
6.6
16
0.575758
6
33
3.166667
0.833333
0
0
0
0
0
0
0
0
0
0
0.130435
0.30303
33
4
17
8.25
0.695652
0
0
0
0
0
0
0
0
0
0
0
0
1
0.5
false
0
0
0.5
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
1
1
0
0
6
936c681b024c32764e8b1e469d2676121fb67697
189
py
Python
tests/test_main.py
MattBussing/DistancePi
23b8eca8b8e5cd9f619639cadd06e6f8b194fddb
[ "MIT" ]
null
null
null
tests/test_main.py
MattBussing/DistancePi
23b8eca8b8e5cd9f619639cadd06e6f8b194fddb
[ "MIT" ]
null
null
null
tests/test_main.py
MattBussing/DistancePi
23b8eca8b8e5cd9f619639cadd06e6f8b194fddb
[ "MIT" ]
null
null
null
# Author Matt Bussing from distancepi.__main__ import get_config_loc def test_get_config_loc(): list = ["asdf", "asf", "--config", "file"] assert get_config_loc(list) == "file"
18.9
46
0.687831
26
189
4.576923
0.653846
0.226891
0.302521
0.268908
0
0
0
0
0
0
0
0
0.169312
189
9
47
21
0.757962
0.100529
0
0
0
0
0.136905
0
0
0
0
0
0.25
1
0.25
false
0
0.25
0
0.5
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
0
0
0
0
6
fa8bd9004bc0470d037039ed457be35f3ef3c917
349
py
Python
toontown/rpc/AwardManagerUD.py
DankMickey/Project-Altis-Educational-Source
0a74999fb52d4e690a41b984703119f63c372d20
[ "Apache-2.0" ]
1
2021-06-25T02:56:32.000Z
2021-06-25T02:56:32.000Z
toontown/rpc/AwardManagerUD.py
kool601/Project-Altis-Educational-Source
0a74999fb52d4e690a41b984703119f63c372d20
[ "Apache-2.0" ]
null
null
null
toontown/rpc/AwardManagerUD.py
kool601/Project-Altis-Educational-Source
0a74999fb52d4e690a41b984703119f63c372d20
[ "Apache-2.0" ]
2
2017-12-20T17:46:56.000Z
2021-06-25T02:56:36.000Z
from direct.directnotify import DirectNotifyGlobal from direct.distributed.DistributedObjectGlobalUD import DistributedObjectGlobalUD class AwardManagerUD(DistributedObjectGlobalUD): notify = DirectNotifyGlobal.directNotify.newCategory("AwardManagerUD") def giveAwardToToon(self, rewardId, avId, rewardName, hours, seconds): pass
34.9
82
0.825215
28
349
10.285714
0.714286
0.069444
0
0
0
0
0
0
0
0
0
0
0.114613
349
9
83
38.777778
0.932039
0
0
0
0
0
0.04023
0
0
0
0
0
0
1
0.166667
false
0.166667
0.333333
0
0.833333
0
1
0
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
1
0
1
0
0
6
fab1014650ae3102d809d95ea6678c0317e5b256
98
py
Python
tests/unit/conftest.py
marcelometal/fastlane
829afd9a9b81110c47cab175cc40b892e0aebebd
[ "MIT" ]
32
2019-02-19T01:37:57.000Z
2022-03-19T22:12:23.000Z
tests/unit/conftest.py
marcelometal/fastlane
829afd9a9b81110c47cab175cc40b892e0aebebd
[ "MIT" ]
15
2019-02-18T17:51:57.000Z
2020-03-20T16:27:38.000Z
tests/unit/conftest.py
marcelometal/fastlane
829afd9a9b81110c47cab175cc40b892e0aebebd
[ "MIT" ]
26
2019-02-14T20:00:11.000Z
2020-01-24T18:12:57.000Z
# Fastlane # 3rd Party # 3rd Party from tests.fixtures import auth_client, client, worker # NOQA
19.6
62
0.755102
14
98
5.214286
0.785714
0.219178
0
0
0
0
0
0
0
0
0
0.024691
0.173469
98
4
63
24.5
0.876543
0.336735
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
87eafa52e94f7f3f432cbbfe311f4d4b89796f99
74
py
Python
msgr/__init__.py
cieplak/msgr
d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4
[ "Apache-2.0" ]
null
null
null
msgr/__init__.py
cieplak/msgr
d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4
[ "Apache-2.0" ]
null
null
null
msgr/__init__.py
cieplak/msgr
d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4
[ "Apache-2.0" ]
null
null
null
from . import brokers from . import settings from .message import Message
18.5
28
0.797297
10
74
5.9
0.5
0.338983
0
0
0
0
0
0
0
0
0
0
0.162162
74
3
29
24.666667
0.951613
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
e208c46eb93ae115803072949aa4119ecbea102b
229
py
Python
bfgame/generators/__init__.py
ChrisLR/BasicDungeonRL
b293d40bd9a0d3b7aec41b5e1d58441165997ff1
[ "MIT" ]
3
2017-10-28T11:28:38.000Z
2018-09-12T09:47:00.000Z
bfgame/generators/__init__.py
ChrisLR/BasicDungeonRL
b293d40bd9a0d3b7aec41b5e1d58441165997ff1
[ "MIT" ]
null
null
null
bfgame/generators/__init__.py
ChrisLR/BasicDungeonRL
b293d40bd9a0d3b7aec41b5e1d58441165997ff1
[ "MIT" ]
null
null
null
from bfgame.generators.skeletoncrypt import SkeletonCrypt from bfgame.generators.goblincamp import GoblinCampGenerator from bfgame.generators.testing import TestingGenerator from bfgame.generators.warzone import WarzoneGenerator
45.8
60
0.895197
24
229
8.541667
0.458333
0.195122
0.390244
0
0
0
0
0
0
0
0
0
0.069869
229
4
61
57.25
0.962441
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
e20a0f52df1eb14a8ed26a5dd5463407d9552cde
137
py
Python
menu.py
NinjaCats/split-exr
084c387fd6309533f6da56d5f16a11001c85f873
[ "MIT" ]
11
2017-12-30T10:12:21.000Z
2019-03-25T11:23:44.000Z
menu.py
NinjaCats/split-exr
084c387fd6309533f6da56d5f16a11001c85f873
[ "MIT" ]
2
2021-05-16T14:46:54.000Z
2021-12-02T08:43:19.000Z
menu.py
NinjaCats/split-exr
084c387fd6309533f6da56d5f16a11001c85f873
[ "MIT" ]
6
2018-01-13T23:29:58.000Z
2021-11-01T02:04:28.000Z
import nuke from split_layers import split_layers nuke.menu('Nuke').addCommand('Scripts/Split Layers', lambda: split_layers.main())
27.4
82
0.773723
19
137
5.421053
0.526316
0.427184
0
0
0
0
0
0
0
0
0
0
0.109489
137
4
83
34.25
0.844262
0
0
0
0
0
0.180451
0
0
0
0
0
0
1
0
true
0
0.666667
0
0.666667
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
e2128683968a7125243edfa86c29a3b38af1d955
4,498
py
Python
resources/dot_PyCharm/system/python_stubs/-762174762/PySide/QtCore/QBitArray.py
basepipe/developer_onboarding
05b6a776f8974c89517868131b201f11c6c2a5ad
[ "MIT" ]
1
2020-04-20T02:27:20.000Z
2020-04-20T02:27:20.000Z
resources/dot_PyCharm/system/python_stubs/cache/16012662ddca113c1f50140f9e0d3bd290a511015767475cf362e5267760f062/PySide/QtCore/QBitArray.py
basepipe/developer_onboarding
05b6a776f8974c89517868131b201f11c6c2a5ad
[ "MIT" ]
null
null
null
resources/dot_PyCharm/system/python_stubs/cache/16012662ddca113c1f50140f9e0d3bd290a511015767475cf362e5267760f062/PySide/QtCore/QBitArray.py
basepipe/developer_onboarding
05b6a776f8974c89517868131b201f11c6c2a5ad
[ "MIT" ]
null
null
null
# encoding: utf-8 # module PySide.QtCore # from C:\Python27\lib\site-packages\PySide\QtCore.pyd # by generator 1.147 # no doc # imports import Shiboken as __Shiboken class QBitArray(__Shiboken.Object): # no doc def at(self, *args, **kwargs): # real signature unknown pass def clear(self, *args, **kwargs): # real signature unknown pass def clearBit(self, *args, **kwargs): # real signature unknown pass def count(self, *args, **kwargs): # real signature unknown pass def fill(self, *args, **kwargs): # real signature unknown pass def isEmpty(self, *args, **kwargs): # real signature unknown pass def isNull(self, *args, **kwargs): # real signature unknown pass def resize(self, *args, **kwargs): # real signature unknown pass def setBit(self, *args, **kwargs): # real signature unknown pass def size(self, *args, **kwargs): # real signature unknown pass def swap(self, *args, **kwargs): # real signature unknown pass def testBit(self, *args, **kwargs): # real signature unknown pass def toggleBit(self, *args, **kwargs): # real signature unknown pass def truncate(self, *args, **kwargs): # real signature unknown pass def __and__(self, y): # real signature unknown; restored from __doc__ """ x.__and__(y) <==> x&y """ pass def __copy__(self, *args, **kwargs): # real signature unknown pass def __delitem__(self, y): # real signature unknown; restored from __doc__ """ x.__delitem__(y) <==> del x[y] """ pass def __eq__(self, y): # real signature unknown; restored from __doc__ """ x.__eq__(y) <==> x==y """ pass def __getitem__(self, y): # real signature unknown; restored from __doc__ """ x.__getitem__(y) <==> x[y] """ pass def __ge__(self, y): # real signature unknown; restored from __doc__ """ x.__ge__(y) <==> x>=y """ pass def __gt__(self, y): # real signature unknown; restored from __doc__ """ x.__gt__(y) <==> x>y """ pass def __hash__(self): # real signature unknown; restored from __doc__ """ x.__hash__() <==> hash(x) """ pass def __iand__(self, y): # real signature unknown; restored from __doc__ """ x.__iand__(y) <==> x&=y """ pass def __init__(self, *args, **kwargs): # real signature unknown pass def __invert__(self): # real signature unknown; restored from __doc__ """ x.__invert__() <==> ~x """ pass def __ior__(self, y): # real signature unknown; restored from __doc__ """ x.__ior__(y) <==> x|=y """ pass def __ixor__(self, y): # real signature unknown; restored from __doc__ """ x.__ixor__(y) <==> x^=y """ pass def __len__(self): # real signature unknown; restored from __doc__ """ x.__len__() <==> len(x) """ pass def __le__(self, y): # real signature unknown; restored from __doc__ """ x.__le__(y) <==> x<=y """ pass def __lt__(self, y): # real signature unknown; restored from __doc__ """ x.__lt__(y) <==> x<y """ pass @staticmethod # known case of __new__ def __new__(S, *more): # real signature unknown; restored from __doc__ """ T.__new__(S, ...) -> a new object with type S, a subtype of T """ pass def __ne__(self, y): # real signature unknown; restored from __doc__ """ x.__ne__(y) <==> x!=y """ pass def __nonzero__(self): # real signature unknown; restored from __doc__ """ x.__nonzero__() <==> x != 0 """ pass def __or__(self, y): # real signature unknown; restored from __doc__ """ x.__or__(y) <==> x|y """ pass def __rand__(self, y): # real signature unknown; restored from __doc__ """ x.__rand__(y) <==> y&x """ pass def __ror__(self, y): # real signature unknown; restored from __doc__ """ x.__ror__(y) <==> y|x """ pass def __rxor__(self, y): # real signature unknown; restored from __doc__ """ x.__rxor__(y) <==> y^x """ pass def __setitem__(self, i, y): # real signature unknown; restored from __doc__ """ x.__setitem__(i, y) <==> x[i]=y """ pass def __xor__(self, y): # real signature unknown; restored from __doc__ """ x.__xor__(y) <==> x^y """ pass
29.019355
80
0.576923
552
4,498
4.172101
0.163043
0.220148
0.338689
0.279635
0.749023
0.688233
0.673035
0.673035
0.302649
0
0
0.00247
0.279902
4,498
154
81
29.207792
0.708552
0.486661
0
0.481481
0
0
0
0
0
0
0
0
0
1
0.481481
false
0.481481
0.012346
0
0.506173
0
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
1
0
0
1
0
0
6
35570785d56fa014454d372355acb5cfdff8a1d6
13,621
py
Python
toyplex/components.py
yiyinglai/Solver
fdae9274447dc96bbb892be78d321dcb406a7f6c
[ "MIT" ]
null
null
null
toyplex/components.py
yiyinglai/Solver
fdae9274447dc96bbb892be78d321dcb406a7f6c
[ "MIT" ]
null
null
null
toyplex/components.py
yiyinglai/Solver
fdae9274447dc96bbb892be78d321dcb406a7f6c
[ "MIT" ]
null
null
null
from copy import deepcopy import unittest class Var: """Variables in a solver. """ def __init__(self, name, type='cont'): self.type = type self.name = name self.val = None def __neg__(self): return LinExpr({self.name: -1}) def __mul__(self, other): if isinstance(other, (int, float)): return LinExpr({self.name: other}) def __truediv__(self, other): if isinstance(other, (int, float)): return LinExpr({self.name: 1/other}) def __add__(self, other): # print('Var__add__') if isinstance(other, (int, float)): return LinExpr({self.name: 1, 'const': other}) elif isinstance(other, Var): if other.name == self.name: return LinExpr({self.name: 2}) else: return LinExpr({self.name: 1, other.name: 1}) elif isinstance(other, LinExpr): return other.__radd__(self) def __eq__(self, other): if isinstance(other, (int, float)): return LinConstr(1 * self, '==', LinExpr({'const': other})) elif isinstance(other, Var): if other.name == self.name: print('This is valid, but not necessary') return LinConstr(1 * self, '==', 1 * other) else: return LinConstr(1 * self, '==', 1 * other) def __le__(self, other): if isinstance(other, (int, float)): return LinConstr(1 * self, '<=', LinExpr({'const': other})) elif isinstance(other, Var): return LinConstr(1 * self, '<=', 1 * other) elif isinstance(other, LinExpr): return LinConstr(1 * self, '<=', other) def __ge__(self, other): if isinstance(other, (int, float)): return LinConstr(1 * self, '>=', LinExpr({'const': other})) elif isinstance(other, Var): return LinConstr(1 * self, '>=', 1 * other) elif isinstance(other, LinExpr): return LinConstr(1 * self, '>=', other) def __sub__(self, other): return self.__add__(-other) def __rsub__(self, other): return -self.__sub__(other) __rmul__ = __mul__ __radd__ = __add__ class LinExpr: """Linear expression. """ def __init__(self, coeffs): self.coeffs = coeffs def __neg__(self): for key in self.coeffs.keys(): self.coeffs[key] = -self.coeffs[key] return self def __mul__(self, other): if isinstance(other, (int, float)): selfkeys = self.coeffs.keys() for key in selfkeys: self.coeffs[key] *= other return self def __truediv__(self, other): if isinstance(other, (int, float)): selfkeys = self.coeffs.keys() for key in selfkeys: self.coeffs[key] /= other return self def __add__(self, other): if isinstance(other, (int, float)): if 'const' in self.coeffs.keys(): self.coeffs['const'] += other else: self.coeffs['const'] = other return self elif isinstance(other, Var): if other.name in self.coeffs.keys(): self.coeffs[other.name] += 1 else: self.coeffs[other.name] = 1 return self elif isinstance(other, LinExpr): selfkeys = self.coeffs.keys() otherkeys = other.coeffs.keys() for key in otherkeys: if key in selfkeys: self.coeffs[key] += other.coeffs[key] else: self.coeffs[key] = other.coeffs[key] return self def __sub__(self, other): if isinstance(other, (int, float)): if 'const' in self.coeffs.keys(): self.coeffs['const'] -= other else: self.coeffs['const'] = -other return self elif isinstance(other, Var): if other.name in self.coeffs.keys(): self.coeffs[other.name] -= 1 else: self.coeffs[other.name] = -1 return self elif isinstance(other, LinExpr): selfkeys = self.coeffs.keys() otherkeys = other.coeffs.keys() for key in otherkeys: if key in selfkeys: self.coeffs[key] -= other.coeffs[key] else: self.coeffs[key] = -other.coeffs[key] return self def __rsub__(self, other): return -self.__sub__(other) __rmul__ = __mul__ __radd__ = __add__ def __str__(self): _str = '' for idx, key in enumerate(self.coeffs.keys()): if key == 'const': if self.coeffs[key] == 0: if len(self.coeffs.keys()) == 1: _str += '0' elif self.coeffs[key] < 0: _str += str(self.coeffs[key]) elif self.coeffs[key] > 0: if idx == 0: _str += str(self.coeffs[key]) else: _str += '+' + str(self.coeffs[key]) else: if self.coeffs[key] == 1: if idx == 0: _str += key else: _str += '+' + key elif self.coeffs[key] == -1: _str += '-' + key elif self.coeffs[key] < 0: _str += str(self.coeffs[key]) + '*' + key else: if idx == 0: _str += str(self.coeffs[key]) + '*' + key else: _str += '+' + str(self.coeffs[key]) + '*' + key if _str[0] == '+': _str = _str[1:] _str = _str.replace('+', ' + ') _str = _str.replace('-', ' - ') _str = _str.replace('*', ' * ') _str = _str.replace('/', ' / ') _str = _str.replace(' ', ' ') return _str def __eq__(self, other): if isinstance(other, (int, float)): return LinConstr(self, '==', LinExpr({'const': other})) elif isinstance(other, Var): return LinConstr(self, '==', 1 * other) elif isinstance(other, LinExpr): return LinConstr(self, '==', rhs=other) def __le__(self, other): if isinstance(other, (int, float)): return LinConstr(self, '<=', LinExpr({'const': other})) elif isinstance(other, Var): return LinConstr(self, '<=', 1 * other) elif isinstance(other, LinExpr): return LinConstr(self, '<=', other) def __ge__(self, other): if isinstance(other, (int, float)): return LinConstr(self, '>=', LinExpr({'const': other})) elif isinstance(other, Var): return LinConstr(self, '>=', 1 * other) elif isinstance(other, LinExpr): return LinConstr(self, '>=', other) class LinConstr: """Linear constraint. """ def __init__(self, lhs: LinExpr, sense, rhs: LinExpr): self.lhs = lhs self.sense = sense self.rhs = rhs if 'const' not in lhs.coeffs.keys(): lhs.coeffs['const'] = 0 if 'const' not in rhs.coeffs.keys(): rhs.coeffs['const'] = 0 lhskeys = lhs.coeffs.keys() rhskeys = rhs.coeffs.keys() coeffs = deepcopy(lhs.coeffs) for key in rhskeys: if key in lhskeys: coeffs[key] -= rhs.coeffs[key] else: coeffs[key] = -rhs.coeffs[key] # final right hand side self.b = -coeffs['const'] del coeffs['const'] # final left hand side self.coeffs = coeffs def __str__(self): _str = str(self.lhs) + self.sense + str(self.rhs) _str = _str.replace('+', ' + ') _str = _str.replace('-', ' - ') _str = _str.replace('*', ' * ') _str = _str.replace('/', ' / ') _str = _str.replace('==', ' == ') _str = _str.replace('<=', ' <= ') _str = _str.replace('>=', ' >= ') _str = _str.replace(' ', ' ') return _str class Test(unittest.TestCase): def test_Var__neg__(self): x = Var('x', type='cont') self.assertEqual((-x).coeffs, {'x': -1}) def test_Var__mul__(self): x = Var('x', type='cont') self.assertEqual((x * 1).coeffs, {'x': 1}) def test_Var__rmul__(self): x = Var('x', type='cont') self.assertEqual((1 * x).coeffs, {'x': 1}) def test_Var__truediv__(self): x = Var('x', type='cont') self.assertEqual((x/2).coeffs, {'x': 1/2}) def test_Var__add__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((x + 1).coeffs, {'x': 1, 'const': 1}) self.assertEqual((x + x).coeffs, {'x': 2}) self.assertEqual((x + y).coeffs, {'x': 1, 'y': 1}) self.assertEqual((x + (x + 1)).coeffs, {'x': 2, 'const': 1}) def test_Var__radd__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((1 + x).coeffs, {'x': 1, 'const': 1}) self.assertEqual((x + x).coeffs, {'x': 2}) self.assertEqual((x + y).coeffs, {'x': 1, 'y': 1}) self.assertEqual(((x + 1) + x).coeffs, {'x': 2, 'const': 1}) def test_Var__sub__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((x - 1).coeffs, {'x': 1, 'const': -1}) self.assertEqual((x - x).coeffs, {'x': 0}) self.assertEqual((x - y).coeffs, {'x': 1, 'y': -1}) self.assertEqual((x - (x + 1)).coeffs, {'x': 0, 'const': -1}) def test_Var__rsub__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((1 - x).coeffs, {'x': -1, 'const': 1}) self.assertEqual((x - x).coeffs, {'x': 0}) self.assertEqual((x - y).coeffs, {'x': 1, 'y': -1}) self.assertEqual(((x + 1) - x).coeffs, {'x': 0, 'const': 1}) def test_LinExpr__neg__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((-(x + 1)).coeffs, {'x': -1, 'const': -1}) self.assertEqual((-(x + y)).coeffs, {'x': -1, 'y': -1}) def test_LinExpr__mul__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual(((x + 1) * 1).coeffs, {'x': 1, 'const': 1}) self.assertEqual(((x + y) * 1).coeffs, {'x': 1, 'y': 1}) def test_LinExpr__rmul__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((1 * (x + 1)).coeffs, {'x': 1, 'const': 1}) self.assertEqual((1 * (x + y)).coeffs, {'x': 1, 'y': 1}) def test_LinExpr__truediv__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual(((x + 1)/2).coeffs, {'x': 1/2, 'const': 1/2}) self.assertEqual(((x + y)/2).coeffs, {'x': 1/2, 'y': 1/2}) def test_LinExpr__add__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((x + 1 + 1).coeffs, {'x': 1, 'const': 2}) self.assertEqual((x + x + y).coeffs, {'x': 2, 'y': 1}) self.assertEqual((x + y + y).coeffs, {'x': 1, 'y': 2}) self.assertEqual(((x + 1) + x).coeffs, {'x': 2, 'const': 1}) def test_LinExpr__radd__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((x + 1 + 1).coeffs, {'x': 1, 'const': 2}) self.assertEqual((x + (x + y)).coeffs, {'x': 2, 'y': 1}) self.assertEqual((x + (y + y)).coeffs, {'x': 1, 'y': 2}) self.assertEqual((x + (1 + x)).coeffs, {'x': 2, 'const': 1}) def test_LinExpr__sub__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((x + 1 - 1).coeffs, {'x': 1, 'const': 0}) self.assertEqual((x + x - y).coeffs, {'x': 2, 'y': -1}) self.assertEqual((x + y - y).coeffs, {'x': 1, 'y': 0}) self.assertEqual(((x + 1) - x).coeffs, {'x': 0, 'const': 1}) def test_LinExpr__rsub__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual((1 - (x + 1)).coeffs, {'x': -1, 'const': 0}) self.assertEqual((x - (x - y)).coeffs, {'x': 0, 'y': 1}) self.assertEqual((x - (y - y)).coeffs, {'x': 1, 'y': 0}) self.assertEqual((x - (1 - x)).coeffs, {'x': 2, 'const': -1}) def test_LinConstr__eq__(self): x = Var('x', type='cont') y = Var('y', type='cont') self.assertEqual(str(x + y == 2), 'x + y == 2') self.assertEqual(str(1 * x + 2 * y == 2), 'x + 2 * y == 2') def test_Var__eq__(self): x = Var('x', type='cont') self.assertEqual(str(x == 2), 'x == 2') def test_Var__le__(self): x = Var('x', type='cont') self.assertEqual(str(x <= 2), 'x <= 2') def test_Var__ge__(self): x = Var('x', type='cont') self.assertEqual(str(x >= 2), 'x >= 2') if __name__ == '__main__': unittest.main()
36.226064
72
0.470597
1,587
13,621
3.853182
0.0523
0.120196
0.099428
0.029436
0.830417
0.800654
0.772363
0.752412
0.733279
0.702862
0
0.019548
0.354012
13,621
375
73
36.322667
0.675418
0.010205
0
0.536508
0
0
0.046757
0
0
0
0
0
0.155556
1
0.136508
false
0
0.006349
0.012698
0.292063
0.003175
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
3578b2762ca8526bed9b27488d0c03c351be7b6a
150
py
Python
examples/while_loop/py-src/base/__init__.py
magnolia-lang/magnolia-lang
ff29126a72c9f7bec7d098c25e74606fef5464e5
[ "BSD-3-Clause" ]
2
2021-12-16T14:43:28.000Z
2022-01-17T09:49:37.000Z
examples/while_loop/py-src/base/__init__.py
magnolia-lang/magnolia-lang
ff29126a72c9f7bec7d098c25e74606fef5464e5
[ "BSD-3-Clause" ]
11
2021-07-15T11:45:03.000Z
2022-01-13T16:43:22.000Z
examples/while_loop/py-src/base/__init__.py
magnolia-lang/magnolia-lang
ff29126a72c9f7bec7d098c25e74606fef5464e5
[ "BSD-3-Clause" ]
1
2021-07-13T15:02:36.000Z
2021-07-13T15:02:36.000Z
from .int16_utils import int16_utils as int16_utils from .int32_utils import int32_utils as int32_utils from .while_ops import while_ops as while_ops
37.5
51
0.86
27
150
4.444444
0.296296
0.25
0
0
0
0
0
0
0
0
0
0.090909
0.12
150
3
52
50
0.818182
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
35bd219821ac5e38adfaab038dac6b1c08d72ddf
6,914
py
Python
DP_framework/pydp_ana.py
aitsam12/GRAM-DP_and_DP-Framework
094c6369e43adb66ba9a0a02ee3227ca8edc1b53
[ "MIT" ]
null
null
null
DP_framework/pydp_ana.py
aitsam12/GRAM-DP_and_DP-Framework
094c6369e43adb66ba9a0a02ee3227ca8edc1b53
[ "MIT" ]
null
null
null
DP_framework/pydp_ana.py
aitsam12/GRAM-DP_and_DP-Framework
094c6369e43adb66ba9a0a02ee3227ca8edc1b53
[ "MIT" ]
null
null
null
import pandas as pd import numpy as np from pydp.algorithms import laplacian as dp import os ####### # OpenMined-PyDp ####### def pydp_analysis_count(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations): if query == 'count': dp_count_results = [] dp_MSE_results = [] dp_scaled_error_results = [] dp_percentage_error_results = [] true_count = len(dataset_column) for itr in range(iterations): x = dp.Count(epsilon=epsilon_value, dtype='float') dp_count = (x.quick_result(list(dataset_column))) dp_count_results.append(dp_count) dp_MSE_results.append(((true_count - dp_count)**2)/iterations) dp_scaled_error_results.append(abs(true_count - dp_count)/iterations) dp_percentage_error_results.append(np.square((true_count - dp_count)/true_count)) print('Report for PyDp (count query)') print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations)) print('Average DP: {dp}'.format(dp = np.mean(dp_count_results))) print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results))) print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results))) #print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_count_results))) print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100)) print('===========================') return (np.mean(dp_count_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100) def pydp_analysis_sum(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations): if query == 'sum': dp_sum_results = [] dp_MSE_results = [] dp_scaled_error_results = [] dp_percentage_error_results = [] true_sum = np.sum(dataset_column) for itr in range(iterations): x = dp.BoundedSum(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float') dp_sum = x.quick_result(list(dataset_column)) dp_sum_results.append(dp_sum) dp_MSE_results.append(((true_sum - dp_sum)**2)/iterations) dp_scaled_error_results.append(abs(true_sum - dp_sum)/iterations) dp_percentage_error_results.append(np.square((true_sum - dp_sum)/true_sum)) print('Report for PyDp (sum query)') print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations)) print('Average DP: {dp}'.format(dp = np.mean(dp_sum_results))) print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results))) print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results))) #print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_sum_results))) print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100)) print('===========================') return (np.mean(dp_sum_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100) def pydp_analysis_mean(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations): if query == 'mean': dp_mean_results = [] dp_MSE_results = [] dp_scaled_error_results = [] dp_percentage_error_results = [] true_mean = np.mean(dataset_column) for itr in range(iterations): x = dp.BoundedMean(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float') dp_mean = x.quick_result(list(dataset_column)) dp_mean_results.append(dp_mean) dp_MSE_results.append(((true_mean - dp_mean)**2)/iterations) dp_scaled_error_results.append(abs(true_mean - dp_mean)/iterations) dp_percentage_error_results.append(np.square((true_mean - dp_mean)/true_mean)) print('Report for PyDp (mean query)') print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations)) print('Average DP: {dp}'.format(dp = np.mean(dp_mean_results))) print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results))) print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results))) #print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_mean_results))) print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100)) print('===========================') return (np.mean(dp_mean_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100) def pydp_analysis_var(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations): if query == 'var': dp_var_results = [] dp_MSE_results = [] dp_scaled_error_results = [] dp_percentage_error_results = [] true_var = np.var(dataset_column) for itr in range(iterations): x = dp.BoundedVariance(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float') dp_var = x.quick_result(list(dataset_column)) dp_var_results.append(dp_var) dp_MSE_results.append(((true_var - dp_var)**2)/iterations) dp_scaled_error_results.append(abs(true_var - dp_var)/iterations) dp_percentage_error_results.append(np.square((true_var - dp_var)/true_var)) print('Report for PyDp (var query)') print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations)) print('Average DP: {dp}'.format(dp = np.mean(dp_var_results))) print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results))) print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results))) #print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_var_results))) print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100)) print('===========================') return (np.mean(dp_var_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100) #path = os.path.join('Living_Wage.csv') #df = pd.read_csv(path) #pydp_analysis_var(query='var', dataset_column=df.livingwage, epsilon_value=1.01, upper_bound=10.0, lower_bound=5.0, iterations=50)
60.649123
148
0.671681
938
6,914
4.656716
0.089552
0.056319
0.065934
0.07326
0.830128
0.806548
0.799679
0.771291
0.771291
0.647665
0
0.006775
0.188747
6,914
113
149
61.185841
0.771974
0.078826
0
0.391304
0
0
0.165459
0.017019
0
0
0
0
0
1
0.043478
false
0
0.043478
0
0.130435
0.304348
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
35d487af528998a227b1ac784b07bbc692b29f8d
214
py
Python
scripts/analysis/analysis_functions/__init__.py
phcanalytics/ibd_flare_model
78da4640ab5a3a5d174d604d764f46059ee66dce
[ "MIT" ]
null
null
null
scripts/analysis/analysis_functions/__init__.py
phcanalytics/ibd_flare_model
78da4640ab5a3a5d174d604d764f46059ee66dce
[ "MIT" ]
null
null
null
scripts/analysis/analysis_functions/__init__.py
phcanalytics/ibd_flare_model
78da4640ab5a3a5d174d604d764f46059ee66dce
[ "MIT" ]
1
2020-10-05T20:12:18.000Z
2020-10-05T20:12:18.000Z
""" __init__.py file Initializes modules used in custom utility functions for the project. """ # define custom functions from analysis_functions import custom_metrics from analysis_functions import transformers
21.4
69
0.82243
27
214
6.259259
0.703704
0.142012
0.248521
0.319527
0
0
0
0
0
0
0
0
0.135514
214
9
70
23.777778
0.913514
0.528037
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
0
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
0
0
6
ea08bc1b21ea32a55c12040465ee7773a0f2de13
115
py
Python
TkiWrapper/Positioner.py
Jakub21/Tki-Wrapper
a886cfa28c5c5956bc98aa51b8beb8864f628e2b
[ "MIT" ]
null
null
null
TkiWrapper/Positioner.py
Jakub21/Tki-Wrapper
a886cfa28c5c5956bc98aa51b8beb8864f628e2b
[ "MIT" ]
null
null
null
TkiWrapper/Positioner.py
Jakub21/Tki-Wrapper
a886cfa28c5c5956bc98aa51b8beb8864f628e2b
[ "MIT" ]
null
null
null
class Positioner: # @abstractmethod def __init__(self, frame): pass # @abstractmethod def get(self): pass
16.428571
33
0.704348
13
115
5.923077
0.692308
0.441558
0
0
0
0
0
0
0
0
0
0
0.191304
115
6
34
19.166667
0.827957
0.269565
0
0
0
0
0
0
0
0
0
0
0
1
0.666667
false
0.666667
0
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
1
0
0
1
0
0
6
ea6ffde932050c4e714b56f38466b4aafdd80c9f
29
py
Python
src/data/database/mysql_wrapper/__init__.py
super6liu/technical-analysis-julian
dd8868b65d80f78e536f3471d4dc09440de48e62
[ "MIT" ]
4
2022-03-23T09:22:54.000Z
2022-03-26T13:18:45.000Z
basisopt/wrappers/__init__.py
robashaw/basisopt
c02fd307bc72c576ed298ea14648818b237d2f30
[ "MIT" ]
null
null
null
basisopt/wrappers/__init__.py
robashaw/basisopt
c02fd307bc72c576ed298ea14648818b237d2f30
[ "MIT" ]
1
2022-03-23T09:22:54.000Z
2022-03-23T09:22:54.000Z
from .wrapper import Wrapper
14.5
28
0.827586
4
29
6
0.75
0
0
0
0
0
0
0
0
0
0
0
0.137931
29
1
29
29
0.96
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
ea7cfa38422740a6d8df8ab469aedc662caae04c
28,542
py
Python
cinder/tests/volume/drivers/netapp/eseries/test_library.py
tmenjo/cinder-2015.1.1
1c83a5daa8041cb99bc85dd0301786d8ca43055a
[ "Apache-2.0" ]
null
null
null
cinder/tests/volume/drivers/netapp/eseries/test_library.py
tmenjo/cinder-2015.1.1
1c83a5daa8041cb99bc85dd0301786d8ca43055a
[ "Apache-2.0" ]
null
null
null
cinder/tests/volume/drivers/netapp/eseries/test_library.py
tmenjo/cinder-2015.1.1
1c83a5daa8041cb99bc85dd0301786d8ca43055a
[ "Apache-2.0" ]
null
null
null
# Copyright (c) 2014 Andrew Kerr # Copyright (c) 2015 Alex Meade # Copyright (c) 2015 Rushil Chugh # Copyright (c) 2015 Yogesh Kshirsagar # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import copy import ddt import mock from cinder import exception from cinder import test from cinder.tests.volume.drivers.netapp.eseries import fakes as \ eseries_fake from cinder.tests.volume.drivers.netapp import fakes as na_fakes from cinder.volume.drivers.netapp.eseries import library from cinder.volume.drivers.netapp import utils as na_utils from cinder.zonemanager import utils as fczm_utils def get_fake_volume(): return { 'id': '114774fb-e15a-4fae-8ee2-c9723e3645ef', 'size': 1, 'volume_name': 'lun1', 'host': 'hostname@backend#DDP', 'os_type': 'linux', 'provider_location': 'lun1', 'name_id': '114774fb-e15a-4fae-8ee2-c9723e3645ef', 'provider_auth': 'provider a b', 'project_id': 'project', 'display_name': None, 'display_description': 'lun1', 'volume_type_id': None, 'migration_status': None, 'attach_status': "detached" } @ddt.ddt class NetAppEseriesLibraryTestCase(test.TestCase): def setUp(self): super(NetAppEseriesLibraryTestCase, self).setUp() kwargs = {'configuration': self.get_config_eseries()} self.library = library.NetAppESeriesLibrary('FAKE', **kwargs) self.library._client = mock.Mock() self.library.check_for_setup_error() def get_config_eseries(self): config = na_fakes.create_configuration_eseries() config.netapp_storage_protocol = 'iscsi' config.netapp_login = 'rw' config.netapp_password = 'rw' config.netapp_server_hostname = '127.0.0.1' config.netapp_transport_type = 'http' config.netapp_server_port = '8080' config.netapp_storage_pools = 'DDP' config.netapp_storage_family = 'eseries' config.netapp_sa_password = 'saPass' config.netapp_controller_ips = '10.11.12.13,10.11.12.14' config.netapp_webservice_path = '/devmgr/v2' return config def test_do_setup(self): self.mock_object(self.library, '_check_mode_get_or_register_storage_system') mock_check_flags = self.mock_object(na_utils, 'check_flags') self.library.do_setup(mock.Mock()) self.assertTrue(mock_check_flags.called) def test_update_ssc_info(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'driveMediaType': 'ssd'}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._get_storage_pools = mock.Mock(return_value=pools) self.library._client.list_storage_pools = mock.Mock(return_value=[]) self.library._client.list_drives = mock.Mock(return_value=drives) self.library._update_ssc_info() self.assertEqual({'test_vg1': {'netapp_disk_type': 'SSD', 'netapp_disk_encryption': 'true'}}, self.library._ssc_stats) def test_update_ssc_disk_types_ssd(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'driveMediaType': 'ssd'}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'SSD'}}, ssc_stats) def test_update_ssc_disk_types_scsi(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': 'scsi'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'SCSI'}}, ssc_stats) def test_update_ssc_disk_types_fcal(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': 'fibre'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'FCAL'}}, ssc_stats) def test_update_ssc_disk_types_sata(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': 'sata'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'SATA'}}, ssc_stats) def test_update_ssc_disk_types_sas(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': 'sas'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'SAS'}}, ssc_stats) def test_update_ssc_disk_types_unknown(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': 'unknown'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'unknown'}}, ssc_stats) def test_update_ssc_disk_types_undefined(self): drives = [{'currentVolumeGroupRef': 'test_vg1', 'interfaceType': {'driveType': '__UNDEFINED'}}] pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] self.library._client.list_drives = mock.Mock(return_value=drives) ssc_stats = self.library._update_ssc_disk_types(pools) self.assertEqual({'test_vg1': {'netapp_disk_type': 'unknown'}}, ssc_stats) def test_update_ssc_disk_encryption_SecType_enabled(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'true'}}, ssc_stats) def test_update_ssc_disk_encryption_SecType_unknown(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'unknown'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}}, ssc_stats) def test_update_ssc_disk_encryption_SecType_none(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'none'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}}, ssc_stats) def test_update_ssc_disk_encryption_SecType_capable(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'capable'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}}, ssc_stats) def test_update_ssc_disk_encryption_SecType_garbage(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'garbage'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertRaises(TypeError, 'test_vg1', {'netapp_disk_encryption': 'false'}, ssc_stats) def test_update_ssc_disk_encryption_multiple(self): pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'none'}, {'volumeGroupRef': 'test_vg2', 'securityType': 'enabled'}] ssc_stats = self.library._update_ssc_disk_encryption(pools) self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}, 'test_vg2': {'netapp_disk_encryption': 'true'}}, ssc_stats) def test_terminate_connection_iscsi_no_hosts(self): connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.assertRaises(exception.NotFound, self.library.terminate_connection_iscsi, get_fake_volume(), connector) def test_terminate_connection_iscsi_volume_not_mapped(self): connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.assertRaises(exception.NotFound, self.library.terminate_connection_iscsi, get_fake_volume(), connector) def test_terminate_connection_iscsi_volume_mapped(self): connector = {'initiator': eseries_fake.INITIATOR_NAME} fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME) fake_eseries_volume['listOfMappings'] = [ eseries_fake.VOLUME_MAPPING ] self.mock_object(self.library._client, 'delete_volume_mapping') self.mock_object(self.library._client, 'get_volume_mappings', mock.Mock(return_value=[eseries_fake.VOLUME_MAPPING])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[fake_eseries_volume])) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST])) self.library.terminate_connection_iscsi(get_fake_volume(), connector) self.assertTrue(self.library._client.delete_volume_mapping.called) def test_terminate_connection_iscsi_not_mapped_initiator_does_not_exist( self): connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST_2])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_hardware_inventory', mock.Mock( return_value=eseries_fake.HARDWARE_INVENTORY)) self.assertRaises(exception.NotFound, self.library.terminate_connection_iscsi, get_fake_volume(), connector) def test_initialize_connection_iscsi_volume_not_mapped(self): connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock(return_value=eseries_fake.VOLUME_MAPPING)) self.mock_object(self.library._client, 'list_hardware_inventory', mock.Mock( return_value=eseries_fake.HARDWARE_INVENTORY)) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST])) self.mock_object(self.library._client, 'list_host_types', mock.Mock(return_value=eseries_fake.HOST_TYPES)) self.library.initialize_connection_iscsi(get_fake_volume(), connector) self.assertTrue(self.library._map_volume_to_host.called) def test_initialize_connection_iscsi_volume_not_mapped_host_does_not_exist( self): connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'get_volume_mappings', mock.Mock(return_value=[])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock(return_value=eseries_fake.VOLUME_MAPPING)) self.mock_object(self.library._client, 'list_hardware_inventory', mock.Mock( return_value=eseries_fake.HARDWARE_INVENTORY)) self.mock_object(self.library._client, 'list_host_types', mock.Mock(return_value=eseries_fake.HOST_TYPES)) self.library.initialize_connection_iscsi(get_fake_volume(), connector) self.assertTrue(self.library._map_volume_to_host.called) def test_initialize_connection_iscsi_volume_already_mapped_to_target_host( self): """Should be a no-op""" connector = {'initiator': eseries_fake.INITIATOR_NAME} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_hardware_inventory', mock.Mock( return_value=eseries_fake.HARDWARE_INVENTORY)) self.mock_object(self.library._client, 'get_volume_mappings', mock.Mock(return_value=[eseries_fake.VOLUME_MAPPING])) self.mock_object(self.library._client, 'create_volume_mapping') self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST])) self.mock_object(self.library._client, 'list_host_types', mock.Mock(return_value=eseries_fake.HOST_TYPES)) self.library.initialize_connection_iscsi(get_fake_volume(), connector) self.assertFalse(self.library._client.create_volume_mapping.called) @ddt.data(eseries_fake.WWPN, fczm_utils.get_formatted_wwn(eseries_fake.WWPN)) def test_get_host_with_matching_port_wwpn(self, port_id): port_ids = [port_id] host = copy.deepcopy(eseries_fake.HOST) host.update( { 'hostSidePorts': [{'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN}] } ) host_2 = copy.deepcopy(eseries_fake.HOST_2) host_2.update( { 'hostSidePorts': [{'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN_2}] } ) host_list = [host, host_2] self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=host_list)) actual_host = self.library._get_host_with_matching_port( port_ids) self.assertEqual(host, actual_host) def test_get_host_with_matching_port_iqn(self): port_ids = [eseries_fake.INITIATOR_NAME] host = copy.deepcopy(eseries_fake.HOST) host.update( { 'hostSidePorts': [{'label': 'NewStore', 'type': 'iscsi', 'address': eseries_fake.INITIATOR_NAME}] } ) host_2 = copy.deepcopy(eseries_fake.HOST_2) host_2.update( { 'hostSidePorts': [{'label': 'NewStore', 'type': 'iscsi', 'address': eseries_fake.INITIATOR_NAME_2}] } ) host_list = [host, host_2] self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=host_list)) actual_host = self.library._get_host_with_matching_port( port_ids) self.assertEqual(host, actual_host) def test_terminate_connection_fc_no_hosts(self): connector = {'wwpns': [eseries_fake.WWPN]} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[])) self.assertRaises(exception.NotFound, self.library.terminate_connection_fc, get_fake_volume(), connector) def test_terminate_connection_fc_volume_not_mapped(self): connector = {'wwpns': [eseries_fake.WWPN]} fake_host = copy.deepcopy(eseries_fake.HOST) fake_host['hostSidePorts'] = [{ 'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN }] self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[fake_host])) self.mock_object(self.library._client, 'get_volume_mappings_for_host', mock.Mock(return_value=[])) self.assertRaises(exception.NotFound, self.library.terminate_connection_fc, get_fake_volume(), connector) def test_terminate_connection_fc_volume_mapped(self): connector = {'wwpns': [eseries_fake.WWPN]} fake_host = copy.deepcopy(eseries_fake.HOST) fake_host['hostSidePorts'] = [{ 'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN }] fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME) fake_eseries_volume['listOfMappings'] = [ copy.deepcopy(eseries_fake.VOLUME_MAPPING) ] self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[fake_host])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[fake_eseries_volume])) self.mock_object(self.library._client, 'get_volume_mappings_for_host', mock.Mock(return_value=[ copy.deepcopy(eseries_fake.VOLUME_MAPPING)])) self.mock_object(self.library._client, 'delete_volume_mapping') self.library.terminate_connection_fc(get_fake_volume(), connector) self.assertTrue(self.library._client.delete_volume_mapping.called) def test_terminate_connection_fc_volume_mapped_no_cleanup_zone(self): connector = {'wwpns': [eseries_fake.WWPN]} fake_host = copy.deepcopy(eseries_fake.HOST) fake_host['hostSidePorts'] = [{ 'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN }] expected_target_info = { 'driver_volume_type': 'fibre_channel', 'data': {}, } fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME) fake_eseries_volume['listOfMappings'] = [ copy.deepcopy(eseries_fake.VOLUME_MAPPING) ] self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[fake_host])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[fake_eseries_volume])) self.mock_object(self.library._client, 'delete_volume_mapping') self.mock_object(self.library._client, 'get_volume_mappings_for_host', mock.Mock(return_value=[ copy.deepcopy(eseries_fake.VOLUME_MAPPING)])) target_info = self.library.terminate_connection_fc(get_fake_volume(), connector) self.assertDictEqual(expected_target_info, target_info) self.assertTrue(self.library._client.delete_volume_mapping.called) def test_terminate_connection_fc_volume_mapped_cleanup_zone(self): connector = {'wwpns': [eseries_fake.WWPN]} fake_host = copy.deepcopy(eseries_fake.HOST) fake_host['hostSidePorts'] = [{ 'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN }] expected_target_info = { 'driver_volume_type': 'fibre_channel', 'data': { 'target_wwn': [eseries_fake.WWPN_2], 'initiator_target_map': { eseries_fake.WWPN: [eseries_fake.WWPN_2] }, }, } fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME) fake_eseries_volume['listOfMappings'] = [ copy.deepcopy(eseries_fake.VOLUME_MAPPING) ] self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[fake_host])) self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[fake_eseries_volume])) self.mock_object(self.library._client, 'delete_volume_mapping') self.mock_object(self.library._client, 'get_volume_mappings_for_host', mock.Mock(return_value=[])) self.mock_object(self.library._client, 'list_target_wwpns', mock.Mock(return_value=[eseries_fake.WWPN_2])) target_info = self.library.terminate_connection_fc(get_fake_volume(), connector) self.assertDictEqual(expected_target_info, target_info) self.assertTrue(self.library._client.delete_volume_mapping.called) def test_terminate_connection_fc_not_mapped_host_with_wwpn_does_not_exist( self): connector = {'wwpns': [eseries_fake.WWPN]} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[eseries_fake.HOST_2])) self.assertRaises(exception.NotFound, self.library.terminate_connection_fc, get_fake_volume(), connector) def test_initialize_connection_fc_volume_not_mapped(self): connector = {'wwpns': [eseries_fake.WWPN]} fake_host = copy.deepcopy(eseries_fake.HOST) fake_host['hostSidePorts'] = [{'label': 'NewStore', 'type': 'fc', 'address': eseries_fake.WWPN}] self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock(return_value=eseries_fake.VOLUME_MAPPING)) self.mock_object(self.library._client, 'list_hosts', mock.Mock(return_value=[fake_host])) self.mock_object(self.library._client, 'list_host_types', mock.Mock(return_value=eseries_fake.HOST_TYPES)) self.mock_object(self.library._client, 'list_target_wwpns', mock.Mock(return_value=[eseries_fake.WWPN_2])) expected_target_info = { 'driver_volume_type': 'fibre_channel', 'data': { 'target_discovered': True, 'target_lun': 0, 'target_wwn': [eseries_fake.WWPN_2], 'access_mode': 'rw', 'initiator_target_map': { eseries_fake.WWPN: [eseries_fake.WWPN_2] } }, } target_info = self.library.initialize_connection_fc(get_fake_volume(), connector) self.assertDictEqual(expected_target_info, target_info) def test_initialize_connection_fc_volume_already_mapped_to_target_host( self): """Should be a no-op""" connector = {'wwpns': [eseries_fake.WWPN]} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library._client, 'list_target_wwpns', mock.Mock(return_value=[ eseries_fake.FC_TARGET_WWPNS])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock(return_value=eseries_fake.VOLUME_MAPPING)) self.library.initialize_connection_fc(get_fake_volume(), connector) self.assertTrue(self.library._map_volume_to_host.called) def test_initialize_connection_fc_volume_mapped_to_another_host(self): """Should raise error saying multiattach not enabled""" connector = {'wwpns': [eseries_fake.WWPN]} fake_mapping_to_other_host = copy.deepcopy( eseries_fake.VOLUME_MAPPING) fake_mapping_to_other_host['mapRef'] = eseries_fake.HOST_2[ 'hostRef'] self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock( side_effect=exception.NetAppDriverException)) self.assertRaises(exception.NetAppDriverException, self.library.initialize_connection_fc, get_fake_volume(), connector) self.assertTrue(self.library._map_volume_to_host.called) def test_initialize_connection_fc_no_target_wwpns(self): """Should be a no-op""" connector = {'wwpns': [eseries_fake.WWPN]} self.mock_object(self.library._client, 'list_volumes', mock.Mock(return_value=[eseries_fake.VOLUME])) self.mock_object(self.library, '_map_volume_to_host', mock.Mock(return_value=eseries_fake.VOLUME_MAPPING)) self.mock_object(self.library._client, 'list_target_wwpns', mock.Mock(return_value=[])) self.assertRaises(exception.VolumeBackendAPIException, self.library.initialize_connection_fc, get_fake_volume(), connector) self.assertTrue(self.library._map_volume_to_host.called) def test_build_initiator_target_map_fc_with_lookup_service( self): connector = {'wwpns': [eseries_fake.WWPN, eseries_fake.WWPN_2]} self.library.lookup_service = mock.Mock() self.library.lookup_service.get_device_mapping_from_network = ( mock.Mock(return_value=eseries_fake.FC_FABRIC_MAP)) self.mock_object(self.library._client, 'list_target_wwpns', mock.Mock(return_value=[ eseries_fake.FC_TARGET_WWPNS])) (target_wwpns, initiator_target_map, num_paths) = ( self.library._build_initiator_target_map_fc(connector)) self.assertSetEqual(set(eseries_fake.FC_TARGET_WWPNS), set(target_wwpns)) self.assertDictEqual(eseries_fake.FC_I_T_MAP, initiator_target_map) self.assertEqual(4, num_paths)
45.161392
79
0.620104
3,053
28,542
5.418932
0.092368
0.083112
0.073985
0.078095
0.833353
0.814676
0.780706
0.744862
0.721954
0.717239
0
0.00718
0.272966
28,542
631
80
45.232964
0.790082
0.028204
0
0.659363
0
0
0.133394
0.02852
0
0
0
0
0.081673
1
0.075697
false
0.003984
0.01992
0.001992
0.101594
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
5766d5886431297864eee1d46184c038ecaa6e58
36
py
Python
Aula12/Aula12.py
diegocolombo1989/Trabalho-Python
4603117bebfb6e801c3289e108b4e8f29442ab6f
[ "MIT" ]
null
null
null
Aula12/Aula12.py
diegocolombo1989/Trabalho-Python
4603117bebfb6e801c3289e108b4e8f29442ab6f
[ "MIT" ]
null
null
null
Aula12/Aula12.py
diegocolombo1989/Trabalho-Python
4603117bebfb6e801c3289e108b4e8f29442ab6f
[ "MIT" ]
null
null
null
# Aula 12 - 22-11-2019 # Dicionários
18
22
0.694444
6
36
4.166667
1
0
0
0
0
0
0
0
0
0
0
0.333333
0.166667
36
2
23
18
0.5
0.888889
0
null
0
null
0
0
null
0
0
0
null
1
null
true
0
0
null
null
null
1
1
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
6
5775a88576c635d3fc3ab3abea0240440dcce5ad
4,198
py
Python
CHIMA/chimaclient.py
ANTLab-polimi/CHIMA
368602b1555ac46a005b9111446c3a7e0952e72d
[ "Apache-2.0" ]
1
2021-12-16T14:50:50.000Z
2021-12-16T14:50:50.000Z
CHIMA/chimaclient.py
ANTLab-polimi/CHIMA
368602b1555ac46a005b9111446c3a7e0952e72d
[ "Apache-2.0" ]
null
null
null
CHIMA/chimaclient.py
ANTLab-polimi/CHIMA
368602b1555ac46a005b9111446c3a7e0952e72d
[ "Apache-2.0" ]
null
null
null
import requests CLIENT_PORT = 4243 class ClientRules: route = 0 path = 1 arp = 2 ip = 3 class CHIMAclient: def __init__(self, ip): self.ip = ip def add_path(self, srcIP, dstIP, stack) -> bool: try: code = requests.post("http://%s:%s/path" % (self.ip, CLIENT_PORT), json={"src": srcIP, "dst": dstIP, "stack" : stack }, timeout=5).status_code if code == 200: return True else: raise Exception("Bad return code %d" % code) except Exception as ex: print("ERROR: request to the client %s failed (path)\n->%s" % (self.ip, ex) ) return False def del_path(self, srcIP, dstIP) -> bool: try: code = requests.delete("http://%s:%s/path" % (self.ip, CLIENT_PORT), json={"src": srcIP, "dst": dstIP}, timeout=5).status_code if code == 200: return True else: raise Exception("Bad return code %d" % code) except Exception as ex: print("ERROR: request to the client %s failed (path)\n->%s" % (self.ip, ex) ) return False ###################################################################################################################################### Deprecated # def add_route(self, subnet) -> bool: # try: # code = requests.post("http://%s:%s/route" % (self.ip, CLIENT_PORT), json={"subnet": subnet}, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (route)\n->%s" % (self.ip, ex) ) # return False # def del_route(self, subnet) -> bool: # try: # code = requests.delete("http://%s:%s/route" % (self.ip, CLIENT_PORT), json={"subnet": subnet}, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (route)\n->%s" % (self.ip, ex) ) # return False # def add_arp(self, ip, mac) -> bool: # try: # code = requests.post("http://%s:%s/arp" % (self.ip, CLIENT_PORT), json={"ip": ip, "mac" : mac }, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (arp)\n->%s" % (self.ip, ex) ) # return False # def del_arp(self, ip) -> bool: # try: # code = requests.delete("http://%s:%s/arp" % (self.ip, CLIENT_PORT), json={"ip": ip }, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (arp)\n->%s" % (self.ip, ex) ) # return False # def add_ip(self, ip) -> bool: # try: # code = requests.post("http://%s:%s/ip" % (self.ip, CLIENT_PORT), json={"ip": ip}, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (ip)\n->%s" % (self.ip, ex) ) # return False # def del_ip(self, ip) -> bool: # try: # code = requests.delete("http://%s:%s/ip" % (self.ip, CLIENT_PORT), json={"ip": ip }, timeout=5).status_code # if code == 200: # return True # else: # raise Exception("Bad return code %d" % code) # except Exception as ex: # print("ERROR: request to the client %s failed (ip)\n->%s" % (self.ip, ex) ) # return False
41.156863
154
0.481658
501
4,198
3.978044
0.11976
0.066232
0.044155
0.076267
0.903161
0.903161
0.903161
0.883091
0.811841
0.799799
0
0.01453
0.344212
4,198
102
155
41.156863
0.709408
0.597666
0
0.533333
0
0
0.126421
0
0
0
0
0
0
1
0.1
false
0
0.033333
0
0.466667
0.066667
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
5784f972cfbf743ca76ad495f277800ad3188030
29,163
py
Python
src/the_tale/the_tale/game/emissaries/tests/test_requests.py
al-arz/the-tale
542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5
[ "BSD-3-Clause" ]
85
2017-11-21T12:22:02.000Z
2022-03-27T23:07:17.000Z
src/the_tale/the_tale/game/emissaries/tests/test_requests.py
al-arz/the-tale
542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5
[ "BSD-3-Clause" ]
545
2017-11-04T14:15:04.000Z
2022-03-27T14:19:27.000Z
src/the_tale/the_tale/game/emissaries/tests/test_requests.py
al-arz/the-tale
542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5
[ "BSD-3-Clause" ]
45
2017-11-11T12:36:30.000Z
2022-02-25T06:10:44.000Z
import smart_imports smart_imports.all() class BaseRequestsTests(utils_testcase.TestCase, clans_helpers.ClansTestsMixin, helpers.EmissariesTestsMixin): def setUp(self): super().setUp() self.places = game_logic.create_test_map() self.prepair_forum_for_clans() clans_tt_services.currencies.cmd_debug_clear_service() self.account_1 = self.accounts_factory.create_account() self.clan_1 = self.create_clan(owner=self.account_1, uid=1) @contextlib.contextmanager def check_no_changes_in_emissaries(self, clan): with self.check_not_changed(lambda: logic.load_emissaries_for_clan(clan.id)): with self.check_not_changed(lambda: clans_tt_services.currencies.cmd_balance(clan.id)): yield class ShowTests(BaseRequestsTests): def setUp(self): super().setUp() clans_tt_services.chronicle.cmd_debug_clear_service() self.emissary = self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) concrete_event = events.Rest(raw_ability_power=100500) self.event = logic.create_event(initiator=self.account_1, emissary=self.emissary, concrete_event=concrete_event, days=7) self.url = utils_urls.url('game:emissaries:show', self.emissary.id) def test_success__unauthorized(self): self.request_logout() self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)]) def test_success__authorized_clan_member__no_permission(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) self.request_login(self.account_1.email) self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)]) def test_success__authorized_clan_member__has_permission(self): self.request_login(self.account_1.email) self.check_html_ok(self.request_html(self.url), texts=['pgf-event-operation']) def test_success__other_clan_member(self): account_2 = self.accounts_factory.create_account() self.create_clan(owner=account_2, uid=2) self.request_login(account_2.email) self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)]) def test_success__authorized_not_clan_member(self): account_2 = self.accounts_factory.create_account() self.request_login(account_2.email) self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)]) class CreateDialogTests(BaseRequestsTests): def setUp(self): super().setUp() self.url = utils_urls.url('game:emissaries:create-dialog') self.request_login(self.account_1.email) def test_not_authenticated(self): self.request_logout() self.check_html_ok(self.request_ajax_html(self.url), texts=['common.login_required']) def test_has_no_rights__not_member(self): account = self.accounts_factory.create_account() self.request_login(account.email) self.check_html_ok(self.request_ajax_html(self.url), texts=['clans.no_rights']) def test_has_no_rights__wrong_role(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) self.check_html_ok(self.request_ajax_html(self.url), texts=['clans.no_rights']) def test_maximum_emissaries_reached(self): clan_attributes = clans_logic.load_attributes(self.clan_1.id) for i in range(clan_attributes.emissary_maximum): self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.maximum_emissaries']) def test_success(self): self.check_html_ok(self.request_ajax_html(self.url), texts=[('clans.no_rights', 0), 'form']) def test_banned(self): self.account_1.ban_game(1) self.check_html_ok(self.request_ajax_html(self.url), texts=['common.ban_game']) class CreateTests(BaseRequestsTests): def setUp(self): super().setUp() self.url = utils_urls.url('game:emissaries:create') clans_tt_services.currencies.cmd_debug_clear_service() game_tt_services.debug_clear_service() clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id, type='test', autocommit=True, amount=tt_clans_constants.PRICE_CREATE_EMISSARY + 1) self.request_login(self.account_1.email) def get_post_data(self): return {'gender': game_relations.GENDER.MALE, 'race': game_relations.RACE.DWARF, 'place': self.places[0].id} def test_not_authenticated(self): self.request_logout() with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.login_required') def test_has_no_rights__not_member(self): account = self.accounts_factory.create_account() self.request_login(account.email) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_rights') def test_has_no_rights__wrong_role(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_rights') def test_wrong_form(self): with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, {}), 'form_errors') def test_no_points(self): balance = clans_tt_services.currencies.cmd_balance(account_id=self.clan_1.id, currency=clans_relations.CURRENCY.ACTION_POINTS) clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id, type='test', autocommit=True, amount=-balance) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_enought_clan_points') def test_maximum_emissaries_reached(self): clan_attributes = clans_logic.load_attributes(self.clan_1.id) for i in range(clan_attributes.emissary_maximum): self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.maximum_emissaries') def test_maximum_combat_personnel_reached(self): clan_attributes = clans_logic.load_attributes(self.clan_1.id) for i in range(clan_attributes.fighters_maximum): account = self.accounts_factory.create_account() clans_logic._add_member(clan=self.clan_1, account=account, role=clans_relations.MEMBER_ROLE.FIGHTER) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.maximum_fighters') def test_success(self): with self.check_changed(lambda: logic.load_emissaries_for_clan(self.clan_1.id)): with self.check_delta(lambda: clans_tt_services.currencies.cmd_balance(self.clan_1.id, currency=clans_relations.CURRENCY.ACTION_POINTS), -tt_clans_constants.PRICE_CREATE_EMISSARY): self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data())) emissaries = logic.load_emissaries_for_clan(self.clan_1.id) self.assertEqual(len(emissaries), 1) self.assertTrue(emissaries[0].state.is_IN_GAME) self.assertTrue(emissaries[0].gender.is_MALE) self.assertTrue(emissaries[0].race.is_DWARF) self.assertEqual(emissaries[0].place_id, self.places[0].id) def test_banned(self): self.account_1.ban_game(1) with self.check_no_changes_in_emissaries(self.clan_1): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.ban_game') class StartEventDialogTests(BaseRequestsTests): def setUp(self): super().setUp() self.emissary = self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) self.url = utils_urls.url('game:emissaries:start-event-dialog', self.emissary.id, event_type=relations.EVENT_TYPE.REST.value) self.request_login(self.account_1.email) def test_no_event_type(self): url = utils_urls.url('game:emissaries:start-event-dialog', self.emissary.id) self.check_html_ok(self.request_ajax_html(url), texts=['event_type.not_specified']) def test_not_authenticated(self): self.request_logout() self.check_html_ok(self.request_ajax_html(self.url), texts=['common.login_required']) def test_has_no_rights__not_member(self): account = self.accounts_factory.create_account() self.request_login(account.email) self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights']) def test_has_no_rights__wrong_role(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights']) def test_has_no_rights__wrong_clan(self): account_2 = self.accounts_factory.create_account() self.create_clan(owner=account_2, uid=2) self.request_login(account_2.email) self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights']) def test_success(self): self.check_html_ok(self.request_ajax_html(self.url), texts=[('emissaries.no_rights', 0), 'form']) def test_success__power_warnging(self): game_tt_services.emissary_impacts.cmd_debug_clear_service() max_power_to_spend = events.Rest.power_cost(self.emissary, days=events.Rest.max_event_length()) current_power = politic_power_logic.get_emissaries_power(emissaries_ids=[self.emissary.id])[self.emissary.id] power_delta = max_power_to_spend + conf.settings.SHOW_START_EVENT_WARNING_BARRIER - current_power politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER, actor_type=tt_api_impacts.OBJECT_TYPE.HERO, actor_id=self.account_1.id, target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY, target_id=self.emissary.id, amount=power_delta - 1)]) self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 1), 'form']) politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER, actor_type=tt_api_impacts.OBJECT_TYPE.HERO, actor_id=self.account_1.id, target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY, target_id=self.emissary.id, amount=1)]) self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 1), 'form']) politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER, actor_type=tt_api_impacts.OBJECT_TYPE.HERO, actor_id=self.account_1.id, target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY, target_id=self.emissary.id, amount=1)]) self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 0), 'form']) def test_banned(self): self.account_1.ban_game(1) self.check_html_ok(self.request_ajax_html(self.url), texts=['common.ban_game']) class StartEventTests(BaseRequestsTests): def setUp(self): super().setUp() self.emissary = self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) self.url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.REST.value) self.request_login(self.account_1.email) clans_tt_services.currencies.cmd_debug_clear_service() game_tt_services.debug_clear_service() clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id, type='test', autocommit=True, amount=tt_clans_constants.MAXIMUM_POINTS) self.power = 10005000 politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER, actor_type=tt_api_impacts.OBJECT_TYPE.HERO, actor_id=self.account_1.id, target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY, target_id=self.emissary.id, amount=self.power)]) @contextlib.contextmanager def check_no_actions_applied(self): def get_points(): return clans_tt_services.currencies.cmd_balance(self.clan_1.id, currency=clans_relations.CURRENCY.ACTION_POINTS) with self.check_not_changed(models.Event.objects.count): with self.check_not_changed(lambda: politic_power_logic.get_emissaries_power([self.emissary.id])): with self.check_not_changed(get_points): yield def get_post_data(self): return {'period': 7} def test_no_authenticated(self): self.request_logout() with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.login_required') def test_no_rights__wrong_role(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights') def test_no_rights__member_of_other_clan(self): account_2 = self.accounts_factory.create_account() self.create_clan(owner=account_2, uid=2) self.request_login(account_2.email) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights') def test_no_rights__not_member(self): account_2 = self.accounts_factory.create_account() self.request_login(account_2.email) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights') def test_no_action_points(self): clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id, type='test', autocommit=True, amount=-tt_clans_constants.MAXIMUM_POINTS) clan_points = clans_tt_services.currencies.cmd_balance(self.clan_1.id, currency=clans_relations.CURRENCY.ACTION_POINTS) self.assertEqual(clan_points, 0) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_enought_clan_points') def test_no_power(self): politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER, actor_type=tt_api_impacts.OBJECT_TYPE.HERO, actor_id=self.account_1.id, target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY, target_id=self.emissary.id, amount=-self.power * 10)]) self.assertTrue(politic_power_logic.get_emissaries_power([self.emissary.id])[self.emissary.id] < 0) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.no_enough_power') def test_success(self): def get_points(): return clans_tt_services.currencies.cmd_balance(self.clan_1.id, currency=clans_relations.CURRENCY.ACTION_POINTS) with self.check_delta(models.Event.objects.count, 1): with self.check_decreased(lambda: politic_power_logic.get_emissaries_power([self.emissary.id])[self.emissary.id]): with self.check_decreased(get_points): self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data())) def test_success__event_saved(self): self.emissary.place_rating_position = 0 logic.save_emissary(self.emissary) url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.ARTISANS_SUPPORT.value) self.check_ajax_ok(self.post_ajax_json(url, self.get_post_data())) emissary_events = storage.events.emissary_events(self.emissary.id) self.assertEqual(len(emissary_events), 1) new_event = emissary_events[0] effect = places_storage.effects[new_event.concrete_event.effect_id] self.assertTrue(effect.attribute.is_PRODUCTION) loaded_event = logic.load_event(new_event.id) self.assertEqual(loaded_event.concrete_event.effect_id, new_event.concrete_event.effect_id) def test_banned(self): self.account_1.ban_game(1) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.ban_game') def test_dublicate_event(self): self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data())) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.dublicate_event') def test_maximum_simultaneously_events(self): logic.create_event(initiator=self.account_1, emissary=self.emissary, concrete_event=events.Rest(raw_ability_power=100500), days=7) logic.create_event(initiator=self.account_1, emissary=self.emissary, concrete_event=events.Dismiss(raw_ability_power=100500), days=7) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.maximum_simultaneously_events') def test_on_create_failed(self): @contextlib.contextmanager def on_create(event, emissary): raise exceptions.OnEventCreateError(message='test error') yield with mock.patch('the_tale.game.emissaries.events.EventBase.on_create', on_create): with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.on_create_error') def test_event_not_available(self): @classmethod def is_available(event_class, emissary, active_events): return False with mock.patch('the_tale.game.emissaries.events.EventBase.is_available', is_available): with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.event_not_available') def test_success__after_create_called(self): places_tt_services.effects.cmd_debug_clear_service() url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.ARTISANS_SUPPORT.value) self.emissary.place_rating_position = 0 with self.check_delta(lambda: len(places_storage.effects.all()), 1): self.check_ajax_ok(self.post_ajax_json(url, self.get_post_data())) def check_event_rights(self, event_type): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.OFFICER) rights = clans_logic.operations_rights(initiator=self.account_1, clan=self.clan_1, is_moderator=False) self.assertTrue(rights.can_emissaries_planing()) self.assertFalse(rights.can_emissaries_relocation()) places_tt_services.effects.cmd_debug_clear_service() url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=event_type.value) self.emissary.place_rating_position = 0 with self.check_not_changed(lambda: len(places_storage.effects.all())): self.check_ajax_error(self.post_ajax_json(url, self.get_post_data()), 'emissaries.no_rights') def test_restricted_move_event(self): self.check_event_rights(relations.EVENT_TYPE.RELOCATION) def test_restricted_dismiss_event(self): self.check_event_rights(relations.EVENT_TYPE.DISMISS) class StopEventTests(BaseRequestsTests): def setUp(self): super().setUp() self.emissary = self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) concrete_event = events.Rest(raw_ability_power=100500) self.event = logic.create_event(initiator=self.account_1, emissary=self.emissary, concrete_event=concrete_event, days=7) self.url = utils_urls.url('game:emissaries:stop-event', self.emissary.id, event=self.event.id) self.request_login(self.account_1.email) clans_tt_services.currencies.cmd_debug_clear_service() game_tt_services.debug_clear_service() @contextlib.contextmanager def check_no_actions_applied(self): with self.check_not_changed(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count): yield def test_no_authenticated(self): self.request_logout() with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url), 'common.login_required') def test_no_rights__wrong_role(self): clans_logic.change_role(self.clan_1, initiator=self.account_1, member=self.account_1, new_role=clans_relations.MEMBER_ROLE.RECRUIT) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights') def test_no_rights__member_of_other_clan(self): account_2 = self.accounts_factory.create_account() self.create_clan(owner=account_2, uid=2) self.request_login(account_2.email) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights') def test_no_rights__not_member(self): account_2 = self.accounts_factory.create_account() self.request_login(account_2.email) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights') def test_success(self): with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count, -1): with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.STOPPED).count, 1): self.check_ajax_ok(self.post_ajax_json(self.url)) event = logic.load_event(self.event.id) self.assertTrue(event.state.is_STOPPED) def test_banned(self): self.account_1.ban_game(1) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(self.url), 'common.ban_game') def test_success__already_stopped(self): with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count, -1): with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.STOPPED).count, 1): self.check_ajax_ok(self.post_ajax_json(self.url)) with self.check_no_actions_applied(): self.check_ajax_ok(self.post_ajax_json(self.url)) event = logic.load_event(self.event.id) self.assertTrue(event.state.is_STOPPED) def test_wrong_emissary(self): wrong_emissary = self.create_emissary(clan=self.clan_1, initiator=self.account_1, place_id=self.places[0].id) url = utils_urls.url('game:emissaries:stop-event', wrong_emissary.id, event=self.event.id) with self.check_no_actions_applied(): self.check_ajax_error(self.post_ajax_json(url), 'emissaries.wrong_emissary')
44.591743
133
0.606556
3,395
29,163
4.84595
0.067452
0.054705
0.032823
0.033066
0.856552
0.842572
0.798201
0.785436
0.766351
0.739545
0
0.009405
0.303604
29,163
653
134
44.660031
0.80068
0
0
0.68552
0
0
0.049311
0.028256
0
0
0
0
0.031674
1
0.156109
false
0
0.004525
0.011312
0.187783
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
578e048a0e5e11fff8508555af9fec47fdb52e63
56
py
Python
code/config.py
Artvin2001/db_course_work
cacfcb21a9faa000baa088dedebdea2541e84f61
[ "MIT" ]
null
null
null
code/config.py
Artvin2001/db_course_work
cacfcb21a9faa000baa088dedebdea2541e84f61
[ "MIT" ]
null
null
null
code/config.py
Artvin2001/db_course_work
cacfcb21a9faa000baa088dedebdea2541e84f61
[ "MIT" ]
null
null
null
TOKEN = '5245424575:AAGkWW6TaTA5bxg5bFzBxuFaV5-Q2zL1L1U'
56
56
0.875
4
56
12.25
1
0
0
0
0
0
0
0
0
0
0
0.314815
0.035714
56
1
56
56
0.592593
0
0
0
0
0
0.807018
0.807018
0
0
0
0
0
1
0
false
0
0
0
0
0
1
0
1
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
57a16a2a6bc99e0c3d7f97f2d71a1983e2611798
220
py
Python
trove/tests/__init__.py
zhujzhuo/openstack-trove
e9d073762732ba405828fd54c86a27dcac95cd25
[ "Apache-2.0" ]
1
2015-02-26T03:24:38.000Z
2015-02-26T03:24:38.000Z
trove/tests/__init__.py
zhujzhuo/openstack-trove
e9d073762732ba405828fd54c86a27dcac95cd25
[ "Apache-2.0" ]
null
null
null
trove/tests/__init__.py
zhujzhuo/openstack-trove
e9d073762732ba405828fd54c86a27dcac95cd25
[ "Apache-2.0" ]
null
null
null
DBAAS_API = "dbaas.api" PRE_INSTANCES = "dbaas.api.pre_instances" INSTANCES = "dbaas.api.instances" POST_INSTANCES = "dbaas.api.post_instances" SSH_CMD = 'ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no'
36.666667
75
0.786364
30
220
5.566667
0.433333
0.239521
0.305389
0.239521
0
0
0
0
0
0
0
0
0.086364
220
5
76
44
0.830846
0
0
0
0
0
0.627273
0.45
0
0
0
0
0
1
0
false
0
0
0
0
0
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6
57b5176d56c591614905e40454b9e0350d6e03f6
96
py
Python
muLAn/__init__.py
muLAn-project/muLAn
6144b315f6109715001c22b6a2ae74c1e2803cae
[ "MIT" ]
8
2017-10-17T14:37:42.000Z
2020-10-27T20:39:20.000Z
muLAn/__init__.py
muLAn-project/muLAn
6144b315f6109715001c22b6a2ae74c1e2803cae
[ "MIT" ]
3
2018-01-28T22:03:53.000Z
2022-03-30T20:18:19.000Z
muLAn/__init__.py
muLAn-project/muLAn
6144b315f6109715001c22b6a2ae74c1e2803cae
[ "MIT" ]
1
2017-09-15T19:20:10.000Z
2017-09-15T19:20:10.000Z
from __future__ import division, print_function from ._version import version_info, __version__
32
47
0.864583
12
96
6
0.666667
0
0
0
0
0
0
0
0
0
0
0
0.104167
96
2
48
48
0.837209
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0.5
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
1
0
6
57d3006cd48e1a108217ba82f54b2f2de0e5fde4
189
py
Python
app.py
AhmedOzil10/python-docs-hello-world
4b31a842a8b69cbd79676f830754a3048984575d
[ "MIT" ]
null
null
null
app.py
AhmedOzil10/python-docs-hello-world
4b31a842a8b69cbd79676f830754a3048984575d
[ "MIT" ]
null
null
null
app.py
AhmedOzil10/python-docs-hello-world
4b31a842a8b69cbd79676f830754a3048984575d
[ "MIT" ]
null
null
null
from flask import Flask app = Flask(__name__) @app.route("/") def hello(): return "POC by Ahmed Ismail (<a href=https://bugcrowd.com/AhmedOzil10>https://bugcrowd.com/AhmedOzil10</a>)"
27
112
0.708995
27
189
4.814815
0.703704
0.2
0.246154
0.415385
0
0
0
0
0
0
0
0.023952
0.116402
189
6
113
31.5
0.754491
0
0
0
0
0.2
0.529101
0
0
0
0
0
0
1
0.2
false
0
0.2
0.2
0.6
0
1
0
0
null
0
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
1
1
0
0
6
57dd6e125dd7160b2682ed3745551f477b06c2bf
34
py
Python
rapidpro_webhooks/apps/ureport/__init__.py
unicef/rapidpro-webhooks
773004eaae3a91ec6ac4653318bf8eff1c4b642d
[ "MIT" ]
null
null
null
rapidpro_webhooks/apps/ureport/__init__.py
unicef/rapidpro-webhooks
773004eaae3a91ec6ac4653318bf8eff1c4b642d
[ "MIT" ]
null
null
null
rapidpro_webhooks/apps/ureport/__init__.py
unicef/rapidpro-webhooks
773004eaae3a91ec6ac4653318bf8eff1c4b642d
[ "MIT" ]
null
null
null
from .birth_year import * # noqa
17
33
0.705882
5
34
4.6
1
0
0
0
0
0
0
0
0
0
0
0
0.205882
34
1
34
34
0.851852
0.117647
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
17bc36eda023a50a702d91f434fc8949ecf430ed
123
py
Python
web/transiq/api/management/data_sync.py
manibhushan05/transiq
763fafb271ce07d13ac8ce575f2fee653cf39343
[ "Apache-2.0" ]
null
null
null
web/transiq/api/management/data_sync.py
manibhushan05/transiq
763fafb271ce07d13ac8ce575f2fee653cf39343
[ "Apache-2.0" ]
14
2020-06-05T23:06:45.000Z
2022-03-12T00:00:18.000Z
web/transiq/api/management/data_sync.py
manibhushan05/transiq
763fafb271ce07d13ac8ce575f2fee653cf39343
[ "Apache-2.0" ]
null
null
null
from api.models import S3Upload def update_is_verified_data(): S3Upload.objects.update(verified=True, is_valid=True)
20.5
57
0.796748
18
123
5.222222
0.722222
0
0
0
0
0
0
0
0
0
0
0.018349
0.113821
123
5
58
24.6
0.844037
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0
0.333333
0
0.666667
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
0
1
0
0
6
aa420a0fcb108601a375f18778cdb0d9dd61aea1
72
py
Python
src/py_starter/__main__.py
jameskabbes/py_starter
0638d5835d58f889314f0afe273a628444c494f7
[ "MIT" ]
null
null
null
src/py_starter/__main__.py
jameskabbes/py_starter
0638d5835d58f889314f0afe273a628444c494f7
[ "MIT" ]
null
null
null
src/py_starter/__main__.py
jameskabbes/py_starter
0638d5835d58f889314f0afe273a628444c494f7
[ "MIT" ]
null
null
null
import py_starter as ps ps.print_for_loop( ['Test','For','py_starter'] )
36
48
0.736111
13
72
3.769231
0.692308
0.367347
0
0
0
0
0
0
0
0
0
0
0.083333
72
2
48
36
0.742424
0
0
0
0
0
0.232877
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0.5
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
1
0
6
352ddb36271bc653facccd7da752d95962c43244
27
py
Python
python/8Kyu/Function 2 - squaring an argument.py
athasv/Codewars-data
5e106466e709fd776f23585ad9f652d0d65b48d3
[ "MIT" ]
null
null
null
python/8Kyu/Function 2 - squaring an argument.py
athasv/Codewars-data
5e106466e709fd776f23585ad9f652d0d65b48d3
[ "MIT" ]
null
null
null
python/8Kyu/Function 2 - squaring an argument.py
athasv/Codewars-data
5e106466e709fd776f23585ad9f652d0d65b48d3
[ "MIT" ]
null
null
null
def square(n): return n * n
27
27
0.666667
6
27
3
0.666667
0
0
0
0
0
0
0
0
0
0
0
0.185185
27
1
27
27
0.818182
0
0
0
0
0
0
0
0
0
0
0
0
1
1
false
0
0
1
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
1
1
0
0
6
1023a9a0bb43f5562968eae8dd9745e845501d62
56,978
py
Python
book/models.py
Felix-Raj/library
c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce
[ "Unlicense" ]
1
2018-05-18T17:37:02.000Z
2018-05-18T17:37:02.000Z
book/models.py
Felix-Raj/library
c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce
[ "Unlicense" ]
null
null
null
book/models.py
Felix-Raj/library
c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce
[ "Unlicense" ]
null
null
null
import logging from django.contrib.postgres.fields import JSONField from django.db import models logger = logging.getLogger(__name__) class Book(models.Model): MAGAZINE = 'magazine' COMICS = 'comics' BOOKS = 'books' EDUCATIONAL = 'educational' BOOK_CATEGORIES = ( (MAGAZINE, MAGAZINE.capitalize()), (COMICS, COMICS.capitalize()), (EDUCATIONAL, EDUCATIONAL.capitalize()), (BOOKS, BOOKS.capitalize()) ) book_id = models.CharField(null=False, blank=False, max_length=100, default=0, unique=True) title = models.TextField() author = models.TextField() copies = models.IntegerField(default=1) notes = models.TextField() copies_on_lent = models.IntegerField(default=0) category = models.CharField(choices=BOOK_CATEGORIES, default=BOOKS, max_length=10) price = models.FloatField(default=0) locked = models.BooleanField(default=False) preview = JSONField(default={ "value": "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", "filename": "Church Library logo final.jpg", "filetype": "image/jpeg" }, null=True, blank=True) def __str__(self): return '{book} by {author}'.format(book=self.title, author=self.author) def add_tag(self, tag_list): tag_list = filter(lambda tag: not self.has_tag(tag), tag_list) for tag in tag_list: BookTag(book=self, tag=tag.strip().lower()).save() def has_tag(self, tag): return self.booktag_set.all().filter(tag__iexact=tag.lower()).count() > 0 def _toggle_lock_state(self): self.locked = not self.locked self.save() def lock(self): if not self.locked: self._toggle_lock_state() def unlock(self): if self.locked: self._toggle_lock_state() def return_book(self, count=1): self.copies_on_lent -= count self.save() def lent_book(self, count=1): """ Increases the copies_on_lent by one, only if book is available to lent. :param count: count of book to lent out :return: """ if self.is_available: self.copies_on_lent += count self.save() else: logger.warning(msg='Book Not available') @property def is_available(self): return not self.locked and (self.copies > self.copies_on_lent) class BookTag(models.Model): book = models.ForeignKey(Book, on_delete=models.CASCADE) tag = models.CharField(max_length=100)
678.309524
54,516
0.947594
2,349
56,978
22.964666
0.868455
0.000742
0.001112
0.00089
0.002262
0.002262
0.002262
0
0
0
0
0.110898
0.010565
56,978
83
54,517
686.481928
0.845963
0.002124
0
0.081967
0
0.016393
0.961367
0.95915
0
1
0
0
0
1
0.147541
false
0
0.04918
0.04918
0.557377
0
0
0
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
1
1
null
1
0
0
0
0
0
0
0
0
0
0
0
0
6
102629de7034a14113a4ed5f61f03c25f6dd788a
113
py
Python
dinuq/__init__.py
spyros-lytras/dinuq
7a3b637ba6f6cec6211ec9784cdbbfe3029d3544
[ "MIT" ]
11
2020-07-07T12:37:06.000Z
2022-03-24T15:49:06.000Z
dinuq/__init__.py
spyros-lytras/dinuq
7a3b637ba6f6cec6211ec9784cdbbfe3029d3544
[ "MIT" ]
4
2020-03-18T19:34:51.000Z
2020-10-30T11:32:07.000Z
build/lib/dinuq/__init__.py
spyros-lytras/dinuq
7a3b637ba6f6cec6211ec9784cdbbfe3029d3544
[ "MIT" ]
2
2020-03-27T10:11:32.000Z
2022-03-23T13:11:50.000Z
from .rscu import * from .rda import * from .sduc import * from .make_ntcont import * from .thedicts import *
22.6
27
0.707965
16
113
4.9375
0.5
0.506329
0
0
0
0
0
0
0
0
0
0
0.20354
113
5
28
22.6
0.877778
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
1035509c3dd9abf92a9000a4056f447f71130ba8
150
py
Python
Curso de Cisco/Actividades/Funcion de multiplicacion.py
tomasfriz/Curso-de-Cisco
a50ee5fa96bd86d468403e29ccdc3565a181af60
[ "MIT" ]
null
null
null
Curso de Cisco/Actividades/Funcion de multiplicacion.py
tomasfriz/Curso-de-Cisco
a50ee5fa96bd86d468403e29ccdc3565a181af60
[ "MIT" ]
null
null
null
Curso de Cisco/Actividades/Funcion de multiplicacion.py
tomasfriz/Curso-de-Cisco
a50ee5fa96bd86d468403e29ccdc3565a181af60
[ "MIT" ]
null
null
null
def multiply(a, b): return a * b print(multiply(3, 4)) # salida: 12 def multiply(a, b): return print(multiply(3, 4)) # salida: None
16.666667
40
0.586667
25
150
3.56
0.48
0.067416
0.269663
0.292135
0.898876
0
0
0
0
0
0
0.053571
0.253333
150
9
40
16.666667
0.732143
0.153333
0
0.666667
0
0
0
0
0
0
0
0
0
0
null
null
0
0
null
null
0.333333
1
0
0
null
0
1
1
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
0
0
6
107bdd04ca2e58284b614f79ffb00b7fee01a7e4
217
py
Python
autokeras/tuners/random_search.py
thwang1231/autokeras
2b8a1c5506896102ed49a3e82db811ada44a1d6c
[ "MIT" ]
1
2020-05-17T23:47:00.000Z
2020-05-17T23:47:00.000Z
autokeras/tuners/random_search.py
thwang1231/autokeras
2b8a1c5506896102ed49a3e82db811ada44a1d6c
[ "MIT" ]
null
null
null
autokeras/tuners/random_search.py
thwang1231/autokeras
2b8a1c5506896102ed49a3e82db811ada44a1d6c
[ "MIT" ]
null
null
null
import kerastuner from autokeras.engine import tuner as tuner_module class RandomSearch(tuner_module.AutoTuner, kerastuner.RandomSearch): """KerasTuner RandomSearch with preprocessing layer tuning.""" pass
24.111111
68
0.801843
24
217
7.166667
0.666667
0.127907
0
0
0
0
0
0
0
0
0
0
0.133641
217
8
69
27.125
0.914894
0.258065
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0.25
0.5
0
0.75
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
6
52ee40982803b7e607062d1f0cf68786a33cba49
42
py
Python
__main__.py
daveh566/Nelly
c890721fa593c519643d53f66caa24299a02d21f
[ "MIT" ]
null
null
null
__main__.py
daveh566/Nelly
c890721fa593c519643d53f66caa24299a02d21f
[ "MIT" ]
null
null
null
__main__.py
daveh566/Nelly
c890721fa593c519643d53f66caa24299a02d21f
[ "MIT" ]
null
null
null
import start from pyrogram import filters
14
28
0.857143
6
42
6
0.833333
0
0
0
0
0
0
0
0
0
0
0
0.142857
42
2
29
21
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
6
5e264f2d739fe0df88f233e6f414a950ec3f49ed
198
py
Python
pyramda/logic/and_func_test.py
sergiors/pyramda
5bf200888809b1bc946e813e29460f204bccd13e
[ "MIT" ]
124
2015-07-30T21:34:25.000Z
2022-02-19T08:45:50.000Z
pyramda/logic/and_func_test.py
sergiors/pyramda
5bf200888809b1bc946e813e29460f204bccd13e
[ "MIT" ]
37
2015-08-31T23:02:20.000Z
2022-02-04T04:45:28.000Z
ramda/and_func_test.py
slavaGanzin/pyramda
4fa7fe28d5eaa798b702d28bdd3948515cb88f48
[ "MIT" ]
20
2015-08-04T18:59:09.000Z
2021-12-13T08:08:59.000Z
from .and_func import and_func def and_func_test(): assert and_func(True, True) assert not and_func(True, False) assert not and_func(False, True) assert not and_func(False, False)
22
37
0.722222
33
198
4.090909
0.30303
0.362963
0.266667
0.355556
0.488889
0
0
0
0
0
0
0
0.19697
198
8
38
24.75
0.849057
0
0
0
0
0
0
0
0
0
0
0
0.666667
1
0.166667
true
0
0.166667
0
0.333333
0
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
1
0
0
1
0
0
0
0
0
0
6
5e2b124d64daa9e7d69cb3433cdddac5ec4943dd
31,700
py
Python
tests/components/energy/test_websocket_api.py
jheddings/hass-core
4270b7535b3cc4d35dc485c4b3d6c5cb61a95768
[ "Apache-2.0" ]
null
null
null
tests/components/energy/test_websocket_api.py
jheddings/hass-core
4270b7535b3cc4d35dc485c4b3d6c5cb61a95768
[ "Apache-2.0" ]
null
null
null
tests/components/energy/test_websocket_api.py
jheddings/hass-core
4270b7535b3cc4d35dc485c4b3d6c5cb61a95768
[ "Apache-2.0" ]
null
null
null
"""Test the Energy websocket API.""" from unittest.mock import AsyncMock, Mock import pytest from homeassistant.components.energy import data, is_configured from homeassistant.components.recorder.statistics import async_add_external_statistics from homeassistant.setup import async_setup_component from homeassistant.util import dt as dt_util from tests.common import ( MockConfigEntry, flush_store, init_recorder_component, mock_platform, ) from tests.components.recorder.common import async_wait_recording_done @pytest.fixture(autouse=True) async def setup_integration(hass, recorder_mock): """Set up the integration.""" assert await async_setup_component(hass, "energy", {}) @pytest.fixture def mock_energy_platform(hass): """Mock an energy platform.""" hass.config.components.add("some_domain") mock_platform( hass, "some_domain.energy", Mock( async_get_solar_forecast=AsyncMock( return_value={ "wh_hours": { "2021-06-27T13:00:00+00:00": 12, "2021-06-27T14:00:00+00:00": 8, } } ) ), ) async def test_get_preferences_no_data(hass, hass_ws_client) -> None: """Test we get error if no preferences set.""" client = await hass_ws_client(hass) await client.send_json({"id": 5, "type": "energy/get_prefs"}) msg = await client.receive_json() assert msg["id"] == 5 assert not msg["success"] assert msg["error"] == {"code": "not_found", "message": "No prefs"} async def test_get_preferences_default(hass, hass_ws_client, hass_storage) -> None: """Test we get preferences.""" assert not await is_configured(hass) manager = await data.async_get_manager(hass) manager.data = data.EnergyManager.default_preferences() client = await hass_ws_client(hass) assert not await is_configured(hass) await client.send_json({"id": 5, "type": "energy/get_prefs"}) msg = await client.receive_json() assert msg["id"] == 5 assert msg["success"] assert msg["result"] == data.EnergyManager.default_preferences() async def test_save_preferences( hass, hass_ws_client, hass_storage, mock_energy_platform ) -> None: """Test we can save preferences.""" client = await hass_ws_client(hass) # Test saving default prefs is also valid. default_prefs = data.EnergyManager.default_preferences() await client.send_json({"id": 5, "type": "energy/save_prefs", **default_prefs}) msg = await client.receive_json() assert msg["id"] == 5 assert msg["success"] assert msg["result"] == default_prefs new_prefs = { "energy_sources": [ { "type": "grid", "flow_from": [ { "stat_energy_from": "sensor.heat_pump_meter", "stat_cost": "heat_pump_kwh_cost", "entity_energy_from": None, "entity_energy_price": None, "number_energy_price": None, }, { "stat_energy_from": "sensor.heat_pump_meter_2", "stat_cost": None, "entity_energy_from": "sensor.heat_pump_meter_2", "entity_energy_price": None, "number_energy_price": 0.20, }, ], "flow_to": [ { "stat_energy_to": "sensor.return_to_grid_peak", "stat_compensation": None, "entity_energy_to": None, "entity_energy_price": None, "number_energy_price": None, }, { "stat_energy_to": "sensor.return_to_grid_offpeak", "stat_compensation": None, "entity_energy_to": "sensor.return_to_grid_offpeak", "entity_energy_price": None, "number_energy_price": 0.20, }, ], "cost_adjustment_day": 1.2, }, { "type": "solar", "stat_energy_from": "my_solar_production", "config_entry_solar_forecast": ["predicted_config_entry"], }, { "type": "battery", "stat_energy_from": "my_battery_draining", "stat_energy_to": "my_battery_charging", }, ], "device_consumption": [{"stat_consumption": "some_device_usage"}], } await client.send_json({"id": 6, "type": "energy/save_prefs", **new_prefs}) msg = await client.receive_json() assert msg["id"] == 6 assert msg["success"] assert msg["result"] == new_prefs assert data.STORAGE_KEY not in hass_storage, "expected not to be written yet" await flush_store((await data.async_get_manager(hass))._store) assert hass_storage[data.STORAGE_KEY]["data"] == new_prefs assert await is_configured(hass) # Verify info reflects data. await client.send_json({"id": 7, "type": "energy/info"}) msg = await client.receive_json() assert msg["id"] == 7 assert msg["success"] assert msg["result"] == { "cost_sensors": { "sensor.heat_pump_meter_2": "sensor.heat_pump_meter_2_cost", "sensor.return_to_grid_offpeak": "sensor.return_to_grid_offpeak_compensation", }, "solar_forecast_domains": ["some_domain"], } # Prefs with limited options new_prefs_2 = { "energy_sources": [ { "type": "grid", "flow_from": [ { "stat_energy_from": "sensor.heat_pump_meter", "stat_cost": None, "entity_energy_from": None, "entity_energy_price": None, "number_energy_price": None, } ], "flow_to": [], "cost_adjustment_day": 1.2, }, { "type": "solar", "stat_energy_from": "my_solar_production", "config_entry_solar_forecast": None, }, ], } await client.send_json({"id": 8, "type": "energy/save_prefs", **new_prefs_2}) msg = await client.receive_json() assert msg["id"] == 8 assert msg["success"] assert msg["result"] == {**new_prefs, **new_prefs_2} async def test_handle_duplicate_from_stat(hass, hass_ws_client) -> None: """Test we handle duplicate from stats.""" client = await hass_ws_client(hass) await client.send_json( { "id": 5, "type": "energy/save_prefs", "energy_sources": [ { "type": "grid", "flow_from": [ { "stat_energy_from": "sensor.heat_pump_meter", "stat_cost": None, "entity_energy_from": None, "entity_energy_price": None, "number_energy_price": None, }, { "stat_energy_from": "sensor.heat_pump_meter", "stat_cost": None, "entity_energy_from": None, "entity_energy_price": None, "number_energy_price": None, }, ], "flow_to": [], "cost_adjustment_day": 0, }, ], } ) msg = await client.receive_json() assert msg["id"] == 5 assert not msg["success"] assert msg["error"]["code"] == "invalid_format" async def test_validate(hass, hass_ws_client) -> None: """Test we can validate the preferences.""" client = await hass_ws_client(hass) await client.send_json({"id": 5, "type": "energy/validate"}) msg = await client.receive_json() assert msg["id"] == 5 assert msg["success"] assert msg["result"] == { "energy_sources": [], "device_consumption": [], } async def test_get_solar_forecast(hass, hass_ws_client, mock_energy_platform) -> None: """Test we get preferences.""" entry = MockConfigEntry(domain="some_domain") entry.add_to_hass(hass) manager = await data.async_get_manager(hass) manager.data = data.EnergyManager.default_preferences() manager.data["energy_sources"].append( { "type": "solar", "stat_energy_from": "my_solar_production", "config_entry_solar_forecast": [entry.entry_id], } ) client = await hass_ws_client(hass) await client.send_json({"id": 5, "type": "energy/solar_forecast"}) msg = await client.receive_json() assert msg["id"] == 5 assert msg["success"] assert msg["result"] == { entry.entry_id: { "wh_hours": { "2021-06-27T13:00:00+00:00": 12, "2021-06-27T14:00:00+00:00": 8, } } } @pytest.mark.freeze_time("2021-08-01 00:00:00+00:00") async def test_fossil_energy_consumption_no_co2(hass, hass_ws_client): """Test fossil_energy_consumption when co2 data is missing.""" now = dt_util.utcnow() later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00")) await hass.async_add_executor_job(init_recorder_component, hass) await async_setup_component(hass, "history", {}) await async_setup_component(hass, "sensor", {}) period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00")) period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00")) period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00")) period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00")) period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00")) period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00")) external_energy_statistics_1 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 2, }, { "start": period2, "last_reset": None, "state": 1, "sum": 3, }, { "start": period3, "last_reset": None, "state": 2, "sum": 5, }, { "start": period4, "last_reset": None, "state": 3, "sum": 8, }, ) external_energy_metadata_1 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_1", "unit_of_measurement": "kWh", } external_energy_statistics_2 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 20, }, { "start": period2, "last_reset": None, "state": 1, "sum": 30, }, { "start": period3, "last_reset": None, "state": 2, "sum": 50, }, { "start": period4, "last_reset": None, "state": 3, "sum": 80, }, ) external_energy_metadata_2 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_2", "unit_of_measurement": "kWh", } async_add_external_statistics( hass, external_energy_metadata_1, external_energy_statistics_1 ) async_add_external_statistics( hass, external_energy_metadata_2, external_energy_statistics_2 ) await async_wait_recording_done(hass) client = await hass_ws_client() await client.send_json( { "id": 1, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "hour", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2.isoformat(): pytest.approx(33.0 - 22.0), period3.isoformat(): pytest.approx(55.0 - 33.0), period4.isoformat(): pytest.approx(88.0 - 55.0), } await client.send_json( { "id": 2, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "day", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2_day_start.isoformat(): pytest.approx(33.0 - 22.0), period3.isoformat(): pytest.approx(55.0 - 33.0), period4_day_start.isoformat(): pytest.approx(88.0 - 55.0), } await client.send_json( { "id": 3, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "month", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period1.isoformat(): pytest.approx(33.0 - 22.0), period3.isoformat(): pytest.approx((55.0 - 33.0) + (88.0 - 55.0)), } @pytest.mark.freeze_time("2021-08-01 00:00:00+00:00") async def test_fossil_energy_consumption_hole(hass, hass_ws_client): """Test fossil_energy_consumption when some data points lack sum.""" now = dt_util.utcnow() later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00")) await hass.async_add_executor_job(init_recorder_component, hass) await async_setup_component(hass, "history", {}) await async_setup_component(hass, "sensor", {}) period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00")) period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00")) period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00")) period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00")) period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00")) period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00")) external_energy_statistics_1 = ( { "start": period1, "last_reset": None, "state": 0, "sum": None, }, { "start": period2, "last_reset": None, "state": 1, "sum": 3, }, { "start": period3, "last_reset": None, "state": 2, "sum": 5, }, { "start": period4, "last_reset": None, "state": 3, "sum": 8, }, ) external_energy_metadata_1 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_1", "unit_of_measurement": "kWh", } external_energy_statistics_2 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 20, }, { "start": period2, "last_reset": None, "state": 1, "sum": None, }, { "start": period3, "last_reset": None, "state": 2, "sum": 50, }, { "start": period4, "last_reset": None, "state": 3, "sum": 80, }, ) external_energy_metadata_2 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_2", "unit_of_measurement": "kWh", } async_add_external_statistics( hass, external_energy_metadata_1, external_energy_statistics_1 ) async_add_external_statistics( hass, external_energy_metadata_2, external_energy_statistics_2 ) await async_wait_recording_done(hass) client = await hass_ws_client() await client.send_json( { "id": 1, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "hour", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2.isoformat(): pytest.approx(3.0 - 20.0), period3.isoformat(): pytest.approx(55.0 - 3.0), period4.isoformat(): pytest.approx(88.0 - 55.0), } await client.send_json( { "id": 2, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "day", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2_day_start.isoformat(): pytest.approx(3.0 - 20.0), period3.isoformat(): pytest.approx(55.0 - 3.0), period4_day_start.isoformat(): pytest.approx(88.0 - 55.0), } await client.send_json( { "id": 3, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "month", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period1.isoformat(): pytest.approx(3.0 - 20.0), period3.isoformat(): pytest.approx((55.0 - 3.0) + (88.0 - 55.0)), } @pytest.mark.freeze_time("2021-08-01 00:00:00+00:00") async def test_fossil_energy_consumption_no_data(hass, hass_ws_client): """Test fossil_energy_consumption when there is no data.""" now = dt_util.utcnow() later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00")) await hass.async_add_executor_job(init_recorder_component, hass) await async_setup_component(hass, "history", {}) await async_setup_component(hass, "sensor", {}) period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00")) period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00")) period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00")) period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00")) external_energy_statistics_1 = ( { "start": period1, "last_reset": None, "state": 0, "sum": None, }, { "start": period2, "last_reset": None, "state": 1, "sum": 3, }, { "start": period3, "last_reset": None, "state": 2, "sum": 5, }, { "start": period4, "last_reset": None, "state": 3, "sum": 8, }, ) external_energy_metadata_1 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_1", "unit_of_measurement": "kWh", } external_energy_statistics_2 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 20, }, { "start": period2, "last_reset": None, "state": 1, "sum": None, }, { "start": period3, "last_reset": None, "state": 2, "sum": 50, }, { "start": period4, "last_reset": None, "state": 3, "sum": 80, }, ) external_energy_metadata_2 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_2", "unit_of_measurement": "kWh", } async_add_external_statistics( hass, external_energy_metadata_1, external_energy_statistics_1 ) async_add_external_statistics( hass, external_energy_metadata_2, external_energy_statistics_2 ) await async_wait_recording_done(hass) client = await hass_ws_client() await client.send_json( { "id": 1, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1_missing", "test:total_energy_import_tariff_2_missing", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "hour", } ) response = await client.receive_json() assert response["success"] assert response["result"] == {} await client.send_json( { "id": 2, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1_missing", "test:total_energy_import_tariff_2_missing", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "day", } ) response = await client.receive_json() assert response["success"] assert response["result"] == {} await client.send_json( { "id": 3, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1_missing", "test:total_energy_import_tariff_2_missing", ], "co2_statistic_id": "test:co2_ratio_missing", "period": "month", } ) response = await client.receive_json() assert response["success"] assert response["result"] == {} @pytest.mark.freeze_time("2021-08-01 00:00:00+00:00") async def test_fossil_energy_consumption(hass, hass_ws_client): """Test fossil_energy_consumption with co2 sensor data.""" now = dt_util.utcnow() later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00")) await hass.async_add_executor_job(init_recorder_component, hass) await async_setup_component(hass, "history", {}) await async_setup_component(hass, "sensor", {}) period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00")) period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00")) period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00")) period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00")) period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00")) period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00")) external_energy_statistics_1 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 2, }, { "start": period2, "last_reset": None, "state": 1, "sum": 3, }, { "start": period3, "last_reset": None, "state": 2, "sum": 4, }, { "start": period4, "last_reset": None, "state": 3, "sum": 5, }, ) external_energy_metadata_1 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_1", "unit_of_measurement": "kWh", } external_energy_statistics_2 = ( { "start": period1, "last_reset": None, "state": 0, "sum": 20, }, { "start": period2, "last_reset": None, "state": 1, "sum": 30, }, { "start": period3, "last_reset": None, "state": 2, "sum": 40, }, { "start": period4, "last_reset": None, "state": 3, "sum": 50, }, ) external_energy_metadata_2 = { "has_mean": False, "has_sum": True, "name": "Total imported energy", "source": "test", "statistic_id": "test:total_energy_import_tariff_2", "unit_of_measurement": "kWh", } external_co2_statistics = ( { "start": period1, "last_reset": None, "mean": 10, }, { "start": period2, "last_reset": None, "mean": 30, }, { "start": period3, "last_reset": None, "mean": 60, }, { "start": period4, "last_reset": None, "mean": 90, }, ) external_co2_metadata = { "has_mean": True, "has_sum": False, "name": "Fossil percentage", "source": "test", "statistic_id": "test:fossil_percentage", "unit_of_measurement": "%", } async_add_external_statistics( hass, external_energy_metadata_1, external_energy_statistics_1 ) async_add_external_statistics( hass, external_energy_metadata_2, external_energy_statistics_2 ) async_add_external_statistics(hass, external_co2_metadata, external_co2_statistics) await async_wait_recording_done(hass) client = await hass_ws_client() await client.send_json( { "id": 1, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:fossil_percentage", "period": "hour", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2.isoformat(): pytest.approx((33.0 - 22.0) * 0.3), period3.isoformat(): pytest.approx((44.0 - 33.0) * 0.6), period4.isoformat(): pytest.approx((55.0 - 44.0) * 0.9), } await client.send_json( { "id": 2, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:fossil_percentage", "period": "day", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period2_day_start.isoformat(): pytest.approx((33.0 - 22.0) * 0.3), period3.isoformat(): pytest.approx((44.0 - 33.0) * 0.6), period4_day_start.isoformat(): pytest.approx((55.0 - 44.0) * 0.9), } await client.send_json( { "id": 3, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": later.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:fossil_percentage", "period": "month", } ) response = await client.receive_json() assert response["success"] assert response["result"] == { period1.isoformat(): pytest.approx((33.0 - 22.0) * 0.3), period3.isoformat(): pytest.approx( ((44.0 - 33.0) * 0.6) + ((55.0 - 44.0) * 0.9) ), } async def test_fossil_energy_consumption_checks(hass, hass_ws_client): """Test fossil_energy_consumption parameter validation.""" client = await hass_ws_client(hass) now = dt_util.utcnow() await client.send_json( { "id": 1, "type": "energy/fossil_energy_consumption", "start_time": "donald_duck", "end_time": now.isoformat(), "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:fossil_percentage", "period": "hour", } ) msg = await client.receive_json() assert msg["id"] == 1 assert not msg["success"] assert msg["error"] == { "code": "invalid_start_time", "message": "Invalid start_time", } await client.send_json( { "id": 2, "type": "energy/fossil_energy_consumption", "start_time": now.isoformat(), "end_time": "donald_duck", "energy_statistic_ids": [ "test:total_energy_import_tariff_1", "test:total_energy_import_tariff_2", ], "co2_statistic_id": "test:fossil_percentage", "period": "hour", } ) msg = await client.receive_json() assert msg["id"] == 2 assert not msg["success"] assert msg["error"] == {"code": "invalid_end_time", "message": "Invalid end_time"}
31.293189
90
0.538013
3,415
31,700
4.680527
0.06735
0.018018
0.014264
0.047297
0.873373
0.848661
0.817317
0.800113
0.781094
0.758634
0
0.047345
0.332366
31,700
1,012
91
31.324111
0.7079
0.004763
0
0.642857
0
0
0.246578
0.084065
0
0
0
0
0.070313
1
0.001116
false
0
0.058036
0
0.059152
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
6