hexsha string | size int64 | ext string | lang string | max_stars_repo_path string | max_stars_repo_name string | max_stars_repo_head_hexsha string | max_stars_repo_licenses list | max_stars_count int64 | max_stars_repo_stars_event_min_datetime string | max_stars_repo_stars_event_max_datetime string | max_issues_repo_path string | max_issues_repo_name string | max_issues_repo_head_hexsha string | max_issues_repo_licenses list | max_issues_count int64 | max_issues_repo_issues_event_min_datetime string | max_issues_repo_issues_event_max_datetime string | max_forks_repo_path string | max_forks_repo_name string | max_forks_repo_head_hexsha string | max_forks_repo_licenses list | max_forks_count int64 | max_forks_repo_forks_event_min_datetime string | max_forks_repo_forks_event_max_datetime string | content string | avg_line_length float64 | max_line_length int64 | alphanum_fraction float64 | qsc_code_num_words_quality_signal int64 | qsc_code_num_chars_quality_signal float64 | qsc_code_mean_word_length_quality_signal float64 | qsc_code_frac_words_unique_quality_signal float64 | qsc_code_frac_chars_top_2grams_quality_signal float64 | qsc_code_frac_chars_top_3grams_quality_signal float64 | qsc_code_frac_chars_top_4grams_quality_signal float64 | qsc_code_frac_chars_dupe_5grams_quality_signal float64 | qsc_code_frac_chars_dupe_6grams_quality_signal float64 | qsc_code_frac_chars_dupe_7grams_quality_signal float64 | qsc_code_frac_chars_dupe_8grams_quality_signal float64 | qsc_code_frac_chars_dupe_9grams_quality_signal float64 | qsc_code_frac_chars_dupe_10grams_quality_signal float64 | qsc_code_frac_chars_replacement_symbols_quality_signal float64 | qsc_code_frac_chars_digital_quality_signal float64 | qsc_code_frac_chars_whitespace_quality_signal float64 | qsc_code_size_file_byte_quality_signal float64 | qsc_code_num_lines_quality_signal float64 | qsc_code_num_chars_line_max_quality_signal float64 | qsc_code_num_chars_line_mean_quality_signal float64 | qsc_code_frac_chars_alphabet_quality_signal float64 | qsc_code_frac_chars_comments_quality_signal float64 | qsc_code_cate_xml_start_quality_signal float64 | qsc_code_frac_lines_dupe_lines_quality_signal float64 | qsc_code_cate_autogen_quality_signal float64 | qsc_code_frac_lines_long_string_quality_signal float64 | qsc_code_frac_chars_string_length_quality_signal float64 | qsc_code_frac_chars_long_word_length_quality_signal float64 | qsc_code_frac_lines_string_concat_quality_signal float64 | qsc_code_cate_encoded_data_quality_signal float64 | qsc_code_frac_chars_hex_words_quality_signal float64 | qsc_code_frac_lines_prompt_comments_quality_signal float64 | qsc_code_frac_lines_assert_quality_signal float64 | qsc_codepython_cate_ast_quality_signal float64 | qsc_codepython_frac_lines_func_ratio_quality_signal float64 | qsc_codepython_cate_var_zero_quality_signal bool | qsc_codepython_frac_lines_pass_quality_signal float64 | qsc_codepython_frac_lines_import_quality_signal float64 | qsc_codepython_frac_lines_simplefunc_quality_signal float64 | qsc_codepython_score_lines_no_logic_quality_signal float64 | qsc_codepython_frac_lines_print_quality_signal float64 | qsc_code_num_words int64 | qsc_code_num_chars int64 | qsc_code_mean_word_length int64 | qsc_code_frac_words_unique null | qsc_code_frac_chars_top_2grams int64 | qsc_code_frac_chars_top_3grams int64 | qsc_code_frac_chars_top_4grams int64 | qsc_code_frac_chars_dupe_5grams int64 | qsc_code_frac_chars_dupe_6grams int64 | qsc_code_frac_chars_dupe_7grams int64 | qsc_code_frac_chars_dupe_8grams int64 | qsc_code_frac_chars_dupe_9grams int64 | qsc_code_frac_chars_dupe_10grams int64 | qsc_code_frac_chars_replacement_symbols int64 | qsc_code_frac_chars_digital int64 | qsc_code_frac_chars_whitespace int64 | qsc_code_size_file_byte int64 | qsc_code_num_lines int64 | qsc_code_num_chars_line_max int64 | qsc_code_num_chars_line_mean int64 | qsc_code_frac_chars_alphabet int64 | qsc_code_frac_chars_comments int64 | qsc_code_cate_xml_start int64 | qsc_code_frac_lines_dupe_lines int64 | qsc_code_cate_autogen int64 | qsc_code_frac_lines_long_string int64 | qsc_code_frac_chars_string_length int64 | qsc_code_frac_chars_long_word_length int64 | qsc_code_frac_lines_string_concat null | qsc_code_cate_encoded_data int64 | qsc_code_frac_chars_hex_words int64 | qsc_code_frac_lines_prompt_comments int64 | qsc_code_frac_lines_assert int64 | qsc_codepython_cate_ast int64 | qsc_codepython_frac_lines_func_ratio int64 | qsc_codepython_cate_var_zero int64 | qsc_codepython_frac_lines_pass int64 | qsc_codepython_frac_lines_import int64 | qsc_codepython_frac_lines_simplefunc int64 | qsc_codepython_score_lines_no_logic int64 | qsc_codepython_frac_lines_print int64 | effective string | hits int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
8c08481604ffc4f9b4bebd59aabd54a2d704be24 | 2,192 | py | Python | tests/system/InitFile/createInitFiles.py | nih23/MRIDrivenHeatSimulation | de6d16853df1faf44c700d1fc06584351bf6c816 | [
"BSL-1.0",
"BSD-3-Clause"
] | null | null | null | tests/system/InitFile/createInitFiles.py | nih23/MRIDrivenHeatSimulation | de6d16853df1faf44c700d1fc06584351bf6c816 | [
"BSL-1.0",
"BSD-3-Clause"
] | null | null | null | tests/system/InitFile/createInitFiles.py | nih23/MRIDrivenHeatSimulation | de6d16853df1faf44c700d1fc06584351bf6c816 | [
"BSL-1.0",
"BSD-3-Clause"
] | null | null | null | import netCDF4 as nc
import numpy as np
dim = 8
file_name = "init"
def create_nc_file_1D():
global dim
global file_name
nc_file_name = file_name + "1D.nc"
nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC")
nNodes_0 = nc_file.createDimension("nNodes_0", dim)
time = nc_file.createDimension("time")
init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_0"))
num_elem = dim
a = np.ones(num_elem).reshape(dim)
init_values[0,:] = a
init_values[0,0] = 100.0
init_values[0,(dim-1)] = 100.0
nc_file.close()
def create_nc_file_2D():
global dim
global file_name
nc_file_name = file_name + "2D.nc"
nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC")
nNodes_0 = nc_file.createDimension("nNodes_0", dim)
nNodes_1 = nc_file.createDimension("nNodes_1", dim)
time = nc_file.createDimension("time")
init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_1", "nNodes_0"))
num_elem = dim * dim
a = np.ones(num_elem).reshape(dim, dim)
init_values[0,:,:] = a
init_values[0,0,:] = 100.0
init_values[0,:,0] = 100.0
init_values[0,(dim-1),:] = 100.0
init_values[0,:,(dim-1)] = 100.0
nc_file.close()
def create_nc_file_3D():
global dim
global file_name
nc_file_name = file_name + "3D.nc"
nc_file = nc.Dataset(nc_file_name, "w", format="NETCDF3_CLASSIC")
nNodes_0 = nc_file.createDimension("nNodes_0", dim)
nNodes_1 = nc_file.createDimension("nNodes_1", dim)
nNodes_2 = nc_file.createDimension("nNodes_2", dim)
time = nc_file.createDimension("time")
init_values = nc_file.createVariable("U", "f8", ("time", "nNodes_2", "nNodes_1", "nNodes_0"))
num_elem = dim * dim * dim
a = np.ones(num_elem).reshape(dim, dim, dim)
init_values[0,:,:,:] = a
init_values[0,0,:,:] = 100.0
init_values[0,:,0,:] = 100.0
init_values[0,:,:,0] = 100.0
init_values[0,(dim-1),:,:] = 100.0
init_values[0,:,(dim-1),:] = 100.0
init_values[0,:,:,(dim-1)] = 100.0
nc_file.close()
def main():
create_nc_file_1D()
create_nc_file_2D()
create_nc_file_3D()
if __name__ == '__main__':
main()
| 32.235294 | 97 | 0.643248 | 349 | 2,192 | 3.730659 | 0.117479 | 0.138249 | 0.126728 | 0.096774 | 0.868664 | 0.862519 | 0.862519 | 0.862519 | 0.814132 | 0.814132 | 0 | 0.061902 | 0.189325 | 2,192 | 67 | 98 | 32.716418 | 0.670793 | 0 | 0 | 0.327869 | 0 | 0 | 0.093066 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.065574 | false | 0 | 0.032787 | 0 | 0.098361 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
8c0ab98c56e291a74619205d2570edced9ce690c | 36 | py | Python | examples/read_channel.py | dovedevic/twitch.py | 685dc893e4cf5daa9abd9571b6415acd9215b0bb | [
"MIT"
] | 3 | 2019-11-20T01:08:35.000Z | 2020-10-26T14:49:54.000Z | examples/read_channel.py | dovedevic/twitch.py | 685dc893e4cf5daa9abd9571b6415acd9215b0bb | [
"MIT"
] | 25 | 2019-11-19T22:57:44.000Z | 2019-11-20T06:37:52.000Z | examples/read_channel.py | dovedevic/twitch.py | 685dc893e4cf5daa9abd9571b6415acd9215b0bb | [
"MIT"
] | 1 | 2019-11-20T01:00:35.000Z | 2019-11-20T01:00:35.000Z | # TODO::Finish when API is finished
| 18 | 35 | 0.75 | 6 | 36 | 4.5 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.166667 | 36 | 1 | 36 | 36 | 0.9 | 0.916667 | 0 | null | 0 | null | 0 | 0 | null | 0 | 0 | 1 | null | 1 | null | true | 0 | 0 | null | null | null | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
8c11463421cdf81febf23fb6192971e02a88fcc8 | 2,344 | py | Python | serialmon/clitools/tools.py | cuhk-gw-suspension/serial-monitor | 6f44b3e5223aa1ee71e2d49637463a436ec7e072 | [
"MIT"
] | null | null | null | serialmon/clitools/tools.py | cuhk-gw-suspension/serial-monitor | 6f44b3e5223aa1ee71e2d49637463a436ec7e072 | [
"MIT"
] | 2 | 2021-06-24T18:28:43.000Z | 2021-07-09T17:52:58.000Z | serialmon/clitools/tools.py | cuhk-gw-suspension/serial-monitor | 6f44b3e5223aa1ee71e2d49637463a436ec7e072 | [
"MIT"
] | null | null | null | import click
# __package__ = "serialmon"
from ..utils.adaptUSBport import get_serial_device
from ..utils.log import print_serial_info, print_int
from ..monitor import app
@click.group()
def cli():
pass
@cli.command()
def list():
"""list all ports not with description 'n/a'."""
try:
title = "Available serial ports:"
click.echo(title)
for i, p in enumerate(get_serial_device()):
click.echo("%d: %s\t\t%s" % (i, p.device, p.description))
except IOError as e:
click.echo(e)
@cli.command()
@click.option('-p','--port', help='port path to the serial device,\n \
can be path string or number from serial list')
@click.option('-b', '--baud', type=int, help='baud rate of the serial communication')
@click.option('--timeout', default=1, required=False, help='timeout of the connection')
def read(port, baud, timeout):
"""Read and print information from a serial port indefinitely."""
click.echo("start reading...")
click.echo("Press ctrl C to escape.")
try:
port = int(port)
except Exception:
pass
if type(port) is str:
print_serial_info(port, baud, timeout)
elif type(port) is int:
p = get_serial_device()
print_serial_info(p[port].device, baud, timeout)
else:
raise TypeError("wrong instruction of --port option.")
@cli.command()
@click.option('-p','--port', help='port path to the serial device,\n \
can be path string or number from serial list')
@click.option('-b', '--baud', type=int, help='baud rate of the serial communication')
@click.option('--timeout', default=1, required=False, help='timeout of the connection')
def readInt(port, baud, timeout):
"""Read and print information from a serial port indefinitely."""
click.echo("start reading...")
click.echo("Press ctrl C to escape.")
try:
port = int(port)
except Exception:
pass
if type(port) is str:
print_serial_info(port, baud, timeout)
elif type(port) is int:
p = get_serial_device()
print_int(p[port].device, baud, timeout)
else:
raise TypeError("wrong instruction of --port option.")
@cli.command()
def gui():
"""open gui with live plots of serial data (if data)"""
app()
| 32.109589 | 87 | 0.626706 | 322 | 2,344 | 4.493789 | 0.291925 | 0.043538 | 0.041465 | 0.029026 | 0.721493 | 0.721493 | 0.721493 | 0.721493 | 0.721493 | 0.721493 | 0 | 0.001117 | 0.235922 | 2,344 | 72 | 88 | 32.555556 | 0.806812 | 0.101962 | 0 | 0.666667 | 0 | 0 | 0.171387 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.087719 | false | 0.052632 | 0.070175 | 0 | 0.157895 | 0.087719 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 6 |
8c1b4616eb0add7fc113193a78e373acf0a5c093 | 813 | py | Python | apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py | gtfarng/Odoo_migrade | 9cc28fae4c379e407645248a29d22139925eafe7 | [
"Apache-2.0"
] | 1 | 2019-12-19T01:53:13.000Z | 2019-12-19T01:53:13.000Z | apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py | gtfarng/Odoo_migrade | 9cc28fae4c379e407645248a29d22139925eafe7 | [
"Apache-2.0"
] | null | null | null | apps/odoo/lib/odoo-10.0.post20170615-py2.7.egg/odoo/addons/survey/tests/test_survey_ui.py | gtfarng/Odoo_migrade | 9cc28fae4c379e407645248a29d22139925eafe7 | [
"Apache-2.0"
] | null | null | null | import odoo.tests
# Part of Odoo. See LICENSE file for full copyright and licensing details.
class TestUi(odoo.tests.HttpCase):
post_install = True
at_install = False
def test_01_admin_survey_tour(self):
self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready", login="admin")
def test_02_demo_survey_tour(self):
self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready", login="demo")
def test_03_public_survey_tour(self):
self.phantom_js("/", "odoo.__DEBUG__.services['web_tour.tour'].run('test_survey')", "odoo.__DEBUG__.services['web_tour.tour'].tours.test_survey.ready")
| 45.166667 | 174 | 0.729397 | 117 | 813 | 4.615385 | 0.358974 | 0.1 | 0.188889 | 0.222222 | 0.662963 | 0.662963 | 0.662963 | 0.662963 | 0.662963 | 0.662963 | 0 | 0.008299 | 0.110701 | 813 | 17 | 175 | 47.823529 | 0.738589 | 0.088561 | 0 | 0 | 0 | 0 | 0.515562 | 0.499323 | 0 | 0 | 0 | 0 | 0 | 1 | 0.3 | false | 0 | 0.1 | 0 | 0.7 | 0 | 0 | 0 | 0 | null | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 6 |
8c3a4ca6ed2cfd8a19fee29410d812da43b6f69c | 231 | py | Python | tests/markers.py | vyahello/async-weather-api | 03edabb9c1d29b2fe9b478d2751361d6dc1d4a08 | [
"MIT"
] | 2 | 2020-01-06T19:10:22.000Z | 2020-05-27T03:41:59.000Z | tests/markers.py | vyahello/async-weather-api | 03edabb9c1d29b2fe9b478d2751361d6dc1d4a08 | [
"MIT"
] | 3 | 2020-10-30T19:34:54.000Z | 2021-08-14T07:20:43.000Z | tests/markers.py | vyahello/async-weather-api | 03edabb9c1d29b2fe9b478d2751361d6dc1d4a08 | [
"MIT"
] | null | null | null | import pytest
from _pytest.mark import MarkDecorator
unit: MarkDecorator = pytest.mark.unit
smoke: MarkDecorator = pytest.mark.smoke
async_: MarkDecorator = pytest.mark.asyncio
parametrize: MarkDecorator = pytest.mark.parametrize
| 28.875 | 52 | 0.82684 | 27 | 231 | 7 | 0.37037 | 0.26455 | 0.486772 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.099567 | 231 | 7 | 53 | 33 | 0.908654 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.333333 | 0 | 0.333333 | 0 | 1 | 0 | 0 | null | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 6 |
8c41d1e8437812c606c41522ba8eea93f37695fa | 148 | py | Python | deployment/utils/__init__.py | Damehou/FaceParsing | 2cb0d8aa8b698826ec56052c69bab7bb3f732fa5 | [
"MIT"
] | 138 | 2020-01-10T17:54:30.000Z | 2022-03-17T04:05:38.000Z | deployment/utils/__init__.py | Damehou/FaceParsing | 2cb0d8aa8b698826ec56052c69bab7bb3f732fa5 | [
"MIT"
] | 21 | 2020-02-07T12:27:41.000Z | 2022-02-05T14:50:15.000Z | deployment/utils/__init__.py | Damehou/FaceParsing | 2cb0d8aa8b698826ec56052c69bab7bb3f732fa5 | [
"MIT"
] | 28 | 2020-01-10T10:27:19.000Z | 2022-03-10T07:52:25.000Z | # -*- coding: utf-8 -*-
# @Author: luoling
# @Date: 2019-10-29 18:32:28
# @Last Modified by: luoling
# @Last Modified time: 2019-12-02 16:41:48
| 24.666667 | 42 | 0.621622 | 25 | 148 | 3.68 | 0.84 | 0.26087 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.239669 | 0.182432 | 148 | 5 | 43 | 29.6 | 0.520661 | 0.925676 | 0 | null | 0 | null | 0 | 0 | null | 0 | 0 | 0 | null | 1 | null | true | 0 | 0 | null | null | null | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
8c4af7b529a066d2c65836b18d5f1cc3d8504d33 | 145 | py | Python | robinhoodbot/utils/print.py | nikunjshanti/RobinhoodBot | edfd06192af59f51a19ff495d2dae34e282f4c4b | [
"MIT"
] | null | null | null | robinhoodbot/utils/print.py | nikunjshanti/RobinhoodBot | edfd06192af59f51a19ff495d2dae34e282f4c4b | [
"MIT"
] | null | null | null | robinhoodbot/utils/print.py | nikunjshanti/RobinhoodBot | edfd06192af59f51a19ff495d2dae34e282f4c4b | [
"MIT"
] | null | null | null | import os, sys
# Disable
def blockPrint():
sys.stdout = open(os.devnull, 'w')
# Restore
def enablePrint():
sys.stdout = sys.__stdout__
| 14.5 | 38 | 0.668966 | 19 | 145 | 4.894737 | 0.631579 | 0.290323 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.193103 | 145 | 9 | 39 | 16.111111 | 0.794872 | 0.103448 | 0 | 0 | 0 | 0 | 0.007874 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.4 | true | 0 | 0.2 | 0 | 0.6 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 6 |
4fc45afd790794daa78b174321f6caa83723a4a5 | 102 | py | Python | forum_modules/pgfulltext/settings.py | Stackato-Apps/osqa | 728bb43ae913e33769c52f40cadb26721faaf2b2 | [
"Naumen",
"Condor-1.1",
"MS-PL"
] | 1 | 2017-07-14T09:58:07.000Z | 2017-07-14T09:58:07.000Z | forum_modules/pgfulltext/settings.py | Stackato-Apps/osqa | 728bb43ae913e33769c52f40cadb26721faaf2b2 | [
"Naumen",
"Condor-1.1",
"MS-PL"
] | null | null | null | forum_modules/pgfulltext/settings.py | Stackato-Apps/osqa | 728bb43ae913e33769c52f40cadb26721faaf2b2 | [
"Naumen",
"Condor-1.1",
"MS-PL"
] | null | null | null | from forum.settings.base import Setting
PG_FTSTRIGGERS_VERSION = Setting('PG_FTSTRIGGERS_VERSION', 0) | 34 | 61 | 0.843137 | 14 | 102 | 5.857143 | 0.714286 | 0.219512 | 0.487805 | 0.658537 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.010638 | 0.078431 | 102 | 3 | 61 | 34 | 0.861702 | 0 | 0 | 0 | 0 | 0 | 0.213592 | 0.213592 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0.5 | 0 | 0.5 | 0 | 1 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 6 |
8b1a181d4a80ff9c87202f8428948e308af0ac1c | 38 | py | Python | savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py | Octoberr/swm0920 | 8f05a6b91fc205960edd57f9076facec04f49a1a | [
"Apache-2.0"
] | 2 | 2019-05-19T11:54:26.000Z | 2019-05-19T12:03:49.000Z | savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py | Octoberr/swm0920 | 8f05a6b91fc205960edd57f9076facec04f49a1a | [
"Apache-2.0"
] | 1 | 2020-11-27T07:55:15.000Z | 2020-11-27T07:55:15.000Z | savecode/threeyears/idownclient/scout/plugin/searchengine/google/__init__.py | Octoberr/swm0920 | 8f05a6b91fc205960edd57f9076facec04f49a1a | [
"Apache-2.0"
] | 2 | 2021-09-06T18:06:12.000Z | 2021-12-31T07:44:43.000Z | from .googlesearch import GoogleSearch | 38 | 38 | 0.894737 | 4 | 38 | 8.5 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.078947 | 38 | 1 | 38 | 38 | 0.971429 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
8b4006429c201e86c45981f7862c0d01fef92855 | 24 | py | Python | core/clip/__init__.py | ollietb/VQGAN-CLIP-Docker | f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce | [
"MIT"
] | 57 | 2021-08-06T19:23:06.000Z | 2022-03-30T04:20:11.000Z | core/clip/__init__.py | ollietb/VQGAN-CLIP-Docker | f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce | [
"MIT"
] | 3 | 2021-09-01T00:31:10.000Z | 2021-11-13T11:27:42.000Z | core/clip/__init__.py | ollietb/VQGAN-CLIP-Docker | f3c6bd44bd1948dd9a5a4fd75d8d43910c9267ce | [
"MIT"
] | 12 | 2021-08-08T05:18:38.000Z | 2022-03-24T20:12:56.000Z | from core.clip import *
| 12 | 23 | 0.75 | 4 | 24 | 4.5 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.166667 | 24 | 1 | 24 | 24 | 0.9 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
8c96709cc74e79fd1ae17bc35a57366229b8e015 | 53 | py | Python | config/secrets.py | pcraig3/super | 8ab30a456355ee2c7b7ea7368f254cacee1b1fef | [
"MIT"
] | null | null | null | config/secrets.py | pcraig3/super | 8ab30a456355ee2c7b7ea7368f254cacee1b1fef | [
"MIT"
] | null | null | null | config/secrets.py | pcraig3/super | 8ab30a456355ee2c7b7ea7368f254cacee1b1fef | [
"MIT"
] | null | null | null | OPENWEATHER_KEY = '354e5f35b937cc744a82cbf1a5adadf4'
| 26.5 | 52 | 0.886792 | 3 | 53 | 15.333333 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.34 | 0.056604 | 53 | 1 | 53 | 53 | 0.58 | 0 | 0 | 0 | 0 | 0 | 0.603774 | 0.603774 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
50809f88dc33547e89d180a206f1c7c5b1b4bb07 | 91 | py | Python | bpy_speckle/callbacks/__init__.py | CyrilWaechter/SpeckleBlender | c3ab2e9055c225c08e84fabae7b76cd550b025e9 | [
"MIT"
] | 26 | 2018-05-02T13:44:28.000Z | 2021-11-19T11:32:11.000Z | bpy_speckle/callbacks/__init__.py | CyrilWaechter/SpeckleBlender | c3ab2e9055c225c08e84fabae7b76cd550b025e9 | [
"MIT"
] | 14 | 2018-05-26T23:52:11.000Z | 2020-10-05T07:57:50.000Z | bpy_speckle/callbacks/__init__.py | CyrilWaechter/SpeckleBlender | c3ab2e9055c225c08e84fabae7b76cd550b025e9 | [
"MIT"
] | 5 | 2019-05-16T07:16:46.000Z | 2020-10-01T08:50:54.000Z | from .on_mesh_edit import scb_on_mesh_edit
from .draw_speckle_info import draw_speckle_info | 45.5 | 48 | 0.901099 | 17 | 91 | 4.294118 | 0.529412 | 0.164384 | 0.273973 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.076923 | 91 | 2 | 48 | 45.5 | 0.869048 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
50edd0ebfa0a09006bb1d53ade391f78487a5c82 | 255 | py | Python | src/nlp_models/word_embedding/NgramLevelWordEmbedding.py | TeaKatz/NLP_Models | 89e77bde464473c4f1bfad2e093763c66dfbaa04 | [
"MIT"
] | null | null | null | src/nlp_models/word_embedding/NgramLevelWordEmbedding.py | TeaKatz/NLP_Models | 89e77bde464473c4f1bfad2e093763c66dfbaa04 | [
"MIT"
] | null | null | null | src/nlp_models/word_embedding/NgramLevelWordEmbedding.py | TeaKatz/NLP_Models | 89e77bde464473c4f1bfad2e093763c66dfbaa04 | [
"MIT"
] | null | null | null | from .CharacterLevelWordEmbedding import CharacterLevelWordEmbedding, CharacterLevelWordSparseEncoding
class NgramLevelWordSparseEncoding(CharacterLevelWordSparseEncoding):
pass
class NgramLevelWordEmbedding(CharacterLevelWordEmbedding):
pass
| 25.5 | 102 | 0.878431 | 13 | 255 | 17.230769 | 0.615385 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.090196 | 255 | 9 | 103 | 28.333333 | 0.965517 | 0 | 0 | 0.4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0.4 | 0.2 | 0 | 0.6 | 0 | 1 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 6 |
50f3d4ef4f30969157a76fb94de78e66b4e1372c | 251 | py | Python | swdata/__init__.py | tadmat/swdata | a4d87f3863714d0f9d10e4192b96b0abe60f4f2b | [
"MIT"
] | null | null | null | swdata/__init__.py | tadmat/swdata | a4d87f3863714d0f9d10e4192b96b0abe60f4f2b | [
"MIT"
] | null | null | null | swdata/__init__.py | tadmat/swdata | a4d87f3863714d0f9d10e4192b96b0abe60f4f2b | [
"MIT"
] | null | null | null | from .dataset import (
SWDataset,
LabelStruct,
Transcript,
sign2tensor,
print_max_nsymbols,
)
__all__ = [
"SWDataset",
"LabelStruct",
"Transcript",
"sign2tensor",
"print_max_nsymbols",
]
__version__ = '0.1.0'
| 13.944444 | 25 | 0.621514 | 22 | 251 | 6.545455 | 0.636364 | 0.277778 | 0.416667 | 0.569444 | 0.791667 | 0.791667 | 0.791667 | 0 | 0 | 0 | 0 | 0.026738 | 0.25498 | 251 | 17 | 26 | 14.764706 | 0.743316 | 0 | 0 | 0 | 0 | 0 | 0.25498 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0.066667 | 0 | 0.066667 | 0.133333 | 1 | 0 | 0 | null | 1 | 1 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
ba0855748e824076c16aae09538ea22be0801e1a | 128 | py | Python | prism/modellink/tests/modellink/__init__.py | vishalbelsare/PRISM | 9565508df8f7f7bba4119f4f523fc4635455a4db | [
"BSD-3-Clause"
] | 43 | 2019-01-28T05:40:43.000Z | 2022-03-29T20:46:57.000Z | prism/modellink/tests/modellink/__init__.py | vishalbelsare/PRISM | 9565508df8f7f7bba4119f4f523fc4635455a4db | [
"BSD-3-Clause"
] | 30 | 2019-01-28T10:55:27.000Z | 2021-02-01T04:06:55.000Z | prism/modellink/tests/modellink/__init__.py | vishalbelsare/PRISM | 9565508df8f7f7bba4119f4f523fc4635455a4db | [
"BSD-3-Clause"
] | 7 | 2020-01-10T15:54:55.000Z | 2021-02-01T04:46:17.000Z | # -*- coding: utf-8 -*-
from .extreme_link import ExtremeLink
from .simple_gaussian_link import GaussianLink2D, GaussianLink3D
| 25.6 | 64 | 0.789063 | 15 | 128 | 6.533333 | 0.8 | 0.204082 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.026549 | 0.117188 | 128 | 4 | 65 | 32 | 0.840708 | 0.164063 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
ba2d5bf59505096e97fab86a0ca1a75612caa7fa | 805 | py | Python | bms_controller_test.py | clean-code-craft-tcq-1/function-ext-python-Aruna1396 | 2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1 | [
"MIT"
] | null | null | null | bms_controller_test.py | clean-code-craft-tcq-1/function-ext-python-Aruna1396 | 2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1 | [
"MIT"
] | null | null | null | bms_controller_test.py | clean-code-craft-tcq-1/function-ext-python-Aruna1396 | 2b32dbd24aa94c69b17f199ee1bf12ea3d72bce1 | [
"MIT"
] | null | null | null | import check_battery_limits as checker
if __name__ == '__main__':
'Test for upper limit breaches'
assert (checker.is_battery_overall_health_ok({'charging_temperature': 125, 'state_of_charge': 90,
'charge_rate': 6.8}, "English", 'Celsius') is False)
'Test for lower limit breaches'
assert (checker.is_battery_overall_health_ok({'charging_temperature': -125, 'state_of_charge': -170,
'charge_rate': -0.8}, "English", 'Celsius') is False)
'Test for upper & lower limit breaches'
assert (checker.is_battery_overall_health_ok({'charging_temperature': 125, 'state_of_charge': -20,
'charge_rate': 0.8}, "English", 'Celsius') is False)
| 53.666667 | 104 | 0.595031 | 91 | 805 | 4.89011 | 0.395604 | 0.047191 | 0.12809 | 0.175281 | 0.824719 | 0.824719 | 0.824719 | 0.74382 | 0.595506 | 0.595506 | 0 | 0.038596 | 0.291925 | 805 | 14 | 105 | 57.5 | 0.742105 | 0 | 0 | 0 | 0 | 0 | 0.351553 | 0 | 0 | 0 | 0 | 0 | 0.272727 | 1 | 0 | true | 0 | 0.090909 | 0 | 0.090909 | 0 | 0 | 0 | 0 | null | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
e8aceadd2b1dfa290b5cac5d1315d89b8af8753b | 1,088 | py | Python | folders/project1_Dice/dice.py | angelopassaro/Hacktoberfest-1 | 21f90f5d49efba9b1a27f4d9b923f5017ab43f0e | [
"Apache-2.0"
] | 1 | 2020-10-06T01:20:07.000Z | 2020-10-06T01:20:07.000Z | folders/project1_Dice/dice.py | angelopassaro/Hacktoberfest-1 | 21f90f5d49efba9b1a27f4d9b923f5017ab43f0e | [
"Apache-2.0"
] | null | null | null | folders/project1_Dice/dice.py | angelopassaro/Hacktoberfest-1 | 21f90f5d49efba9b1a27f4d9b923f5017ab43f0e | [
"Apache-2.0"
] | null | null | null | import random
x="y"
while x=="y":
number=random.randint(1,6)
if number == 1:
print(" -------- ")
print("| |")
print("| 0 |")
print("| |")
print(" -------- ")
if number == 2:
print(" -------- ")
print("| |")
print("| 0 0 |")
print("| |")
print(" -------- ")
if number == 3:
print(" -------- ")
print("| 0 |")
print("| 0 |")
print("| 0 |")
print(" -------- ")
if number == 4:
print(" -------- ")
print("| 0 0 |")
print("| |")
print("| 0 0 |")
print(" -------- ")
if number == 5:
print(" -------- ")
print("| 0 0 |")
print("| 0 |")
print("| 0 0 |")
print(" -------- ")
if number == 6:
print(" -------- ")
print("| 0 0 |")
print("| 0 0 |")
print("| 0 0 |")
print(" -------- ")
x=input("do u want to throw again press y if not then n")
| 25.302326 | 61 | 0.283088 | 95 | 1,088 | 3.242105 | 0.284211 | 0.253247 | 0.181818 | 0.311688 | 0.577922 | 0.415584 | 0.084416 | 0 | 0 | 0 | 0 | 0.048658 | 0.452206 | 1,088 | 42 | 62 | 25.904762 | 0.468121 | 0 | 0 | 0.731707 | 0 | 0 | 0.319853 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0.02439 | 0 | 0.02439 | 0.731707 | 0 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 6 |
fa0ebc0918c8deee22997bd253bcaa47f563e165 | 259,298 | py | Python | vulnerability-impact-categorization/classifier_tests.py | CSIRT-MU/VulnerabilityCategorization | 24bd578c45c6cc9534566ffc4c69baff324b4b45 | [
"MIT"
] | 4 | 2018-05-05T07:30:45.000Z | 2021-01-05T06:51:21.000Z | vulnerability-impact-categorization/classifier_tests.py | CSIRT-MU/VulnerabilityCategorization | 24bd578c45c6cc9534566ffc4c69baff324b4b45 | [
"MIT"
] | null | null | null | vulnerability-impact-categorization/classifier_tests.py | CSIRT-MU/VulnerabilityCategorization | 24bd578c45c6cc9534566ffc4c69baff324b4b45 | [
"MIT"
] | 1 | 2019-04-20T08:06:18.000Z | 2019-04-20T08:06:18.000Z | import unittest
import CVE_parser
import classifier
result_impacts = {
'CVE-2017-0001': ['Privilege escalation on system'],
'CVE-2017-0002': ['Gain privileges on application'],
'CVE-2017-0003': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0004': ['System availability loss'],
'CVE-2017-0005': ['Privilege escalation on system'],
'CVE-2017-0006': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0010': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0014': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0015': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0018': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0019': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0020': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0021': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0023': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0024': ['Privilege escalation on system'],
'CVE-2017-0026': ['Privilege escalation on system'],
'CVE-2017-0030': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0031': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0032': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0034': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0035': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0037': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0039': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0040': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0047': ['Privilege escalation on system'],
'CVE-2017-0050': ['Privilege escalation on system'],
'CVE-2017-0052': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0053': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0056': ['Privilege escalation on system'],
'CVE-2017-0067': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0070': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0071': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0072': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0075': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0077': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-0078': ['Privilege escalation on system'],
'CVE-2017-0079': ['Privilege escalation on system'],
'CVE-2017-0080': ['Privilege escalation on system'],
'CVE-2017-0081': ['Privilege escalation on system'],
'CVE-2017-0082': ['Privilege escalation on system'],
'CVE-2017-0083': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0084': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0086': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0087': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0088': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0089': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0090': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0093': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0094': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0095': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0100': ['Gain user privileges on system'],
'CVE-2017-0101': ['Gain user privileges on system'],
'CVE-2017-0102': ['Gain user privileges on system'],
'CVE-2017-0103': ['Gain user privileges on system'],
'CVE-2017-0104': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-0106': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0108': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0109': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0129': ['Application integrity loss'],
'CVE-2017-0130': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0131': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0132': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0133': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0134': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0136': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0137': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0138': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0141': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0143': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0144': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0145': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0146': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0148': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0149': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0150': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0151': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0152': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0155': ['Privilege escalation on system'],
'CVE-2017-0156': ['Privilege escalation on system'],
'CVE-2017-0158': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0160': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0162': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0163': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0165': ['Privilege escalation on system'],
'CVE-2017-0166': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0176': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0180': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0181': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0189': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0193': ['Gain user privileges on system'],
'CVE-2017-0197': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0199': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0200': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0201': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0202': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0205': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0212': ['Gain user privileges on system'],
'CVE-2017-0214': ['Gain user privileges on system'],
'CVE-2017-0221': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-0222': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0223': ['Arbitrary code execution as user of application'],
'CVE-2017-0224': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0226': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0227': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0228': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0229': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0230': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0233': ['Gain privileges on application'],
'CVE-2017-0234': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0235': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0236': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0238': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0240': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0243': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0246': ['Privilege escalation on system'],
# 'CVE-2017-0247': ['Application availability loss'], incorrect data
'CVE-2017-0248': ['Application integrity loss'],
'CVE-2017-0249': ['Gain privileges on application'],
'CVE-2017-0252': ['Arbitrary code execution as user of application'],
'CVE-2017-0254': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0260': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0261': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0262': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0263': ['Privilege escalation on system'],
'CVE-2017-0264': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0265': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0266': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0272': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0277': ['Arbitrary code execution as user of application'],
'CVE-2017-0278': ['Arbitrary code execution as user of application'],
'CVE-2017-0279': ['Arbitrary code execution as user of application'],
'CVE-2017-0281': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0283': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0290': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0291': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0292': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0294': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0296': ['Privilege escalation on system'],
'CVE-2017-0298': ['Gain user privileges on system'],
'CVE-2017-0305': ['Arbitrary code execution as user of application'],
'CVE-2017-0306': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0307': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0308': ['Privilege escalation on system'],
'CVE-2017-0309': ['Privilege escalation on system'],
'CVE-2017-0311': ['Privilege escalation on system'],
'CVE-2017-0312': ['Privilege escalation on system'],
'CVE-2017-0313': ['Privilege escalation on system'],
'CVE-2017-0314': ['Privilege escalation on system'],
'CVE-2017-0315': ['Privilege escalation on system'],
'CVE-2017-0317': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0321': ['Privilege escalation on system'],
'CVE-2017-0322': ['Privilege escalation on system'],
'CVE-2017-0323': ['Privilege escalation on system'],
'CVE-2017-0324': ['Privilege escalation on system'],
'CVE-2017-0325': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0327': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0329': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0331': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0332': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0333': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0335': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0337': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0338': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0339': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0340': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0341': ['Privilege escalation on system'],
'CVE-2017-0342': ['Privilege escalation on system'],
'CVE-2017-0343': ['Privilege escalation on system'],
'CVE-2017-0344': ['Privilege escalation on system'],
'CVE-2017-0345': ['Privilege escalation on system'],
'CVE-2017-0346': ['Privilege escalation on system'],
'CVE-2017-0347': ['Privilege escalation on system'],
'CVE-2017-0348': ['Privilege escalation on system'],
'CVE-2017-0349': ['Privilege escalation on system'],
'CVE-2017-0350': ['Privilege escalation on system'],
'CVE-2017-0351': ['Privilege escalation on system'],
'CVE-2017-0352': ['Privilege escalation on system'],
'CVE-2017-0373': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-0374': ['Gain privileges on application'],
'CVE-2017-0375': ['Application availability loss'],
'CVE-2017-0376': ['Application availability loss'],
'CVE-2017-0377': ['Application confidentiality loss'],
'CVE-2017-0381': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-0382': ['Arbitrary code execution as user of application'],
'CVE-2017-0383': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0384': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0385': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0386': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0387': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0389': ['System availability loss'],
'CVE-2017-0394': ['System availability loss'],
'CVE-2017-0403': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0404': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0405': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0406': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0407': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0408': ['Arbitrary code execution as user of application'],
'CVE-2017-0409': ['Arbitrary code execution as user of application'],
'CVE-2017-0410': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0411': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0412': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0415': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0416': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0417': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0418': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0419': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0422': ['System availability loss'],
'CVE-2017-0427': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0428': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0429': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0430': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0432': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0433': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0434': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0435': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0436': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0437': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0438': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0439': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0440': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0441': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0442': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0443': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0444': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0445': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0446': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0447': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0449': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0450': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0453': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0454': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0455': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0456': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0457': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0458': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0460': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0462': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0463': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0464': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0465': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0466': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0467': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0468': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0469': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0470': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0471': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0472': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0473': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0474': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0475': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0476': ['Arbitrary code execution as user of application'],
'CVE-2017-0477': ['Arbitrary code execution as user of application'],
'CVE-2017-0478': ['Arbitrary code execution as user of application'],
'CVE-2017-0479': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0480': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0481': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0500': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0501': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0502': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0503': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0504': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0505': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0506': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0507': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0508': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0509': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0510': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0516': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0517': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0518': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0519': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0520': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0521': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0522': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0523': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0524': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0525': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0526': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0527': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0528': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0538': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0539': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0540': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0541': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0542': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0543': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0544': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0545': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0546': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0553': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0554': ['Gain user privileges on system'],
'CVE-2017-0561': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0562': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0563': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0564': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0565': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0566': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0567': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0568': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0569': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0570': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0571': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0572': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0573': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0574': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0575': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0576': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0577': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0578': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0579': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0580': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0581': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0582': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0583': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0587': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0588': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0589': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0590': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0591': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0592': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0593': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0594': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0595': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0596': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0597': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0604': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0605': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0606': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0607': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0608': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0609': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0610': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0611': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0612': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0613': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0614': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0615': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0616': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0617': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0618': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0619': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0620': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0621': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0622': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0623': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0636': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0637': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0638': ['Arbitrary code execution as user of application'],
'CVE-2017-0648': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0649': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0663': ['Arbitrary code execution as user of application'],
'CVE-2017-0664': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0665': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0666': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0667': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0671': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0673': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0674': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0675': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0676': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0677': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0678': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0679': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0680': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0681': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0682': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0683': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0684': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0700': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0701': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0702': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-0703': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0704': ['Gain user privileges on system'],
'CVE-2017-0707': ['Gain user privileges on system'],
'CVE-2017-0710': ['Gain user privileges on system'],
'CVE-2017-0711': ['Gain root/system/administrator privileges on system'],
'CVE-2017-0897': ['Arbitrary code execution as user of application'],
'CVE-2017-1000001': ['Application integrity loss'],
'CVE-2017-1000002': ['Arbitrary code execution as user of application'],
'CVE-2017-1000003': ['Gain privileges on application'],
'CVE-2017-1000010': ['Arbitrary code execution as user of application'],
'CVE-2017-1000014': ['Application availability loss'],
'CVE-2017-1000016': ['Application integrity loss'],
'CVE-2017-1000017': ['Application integrity loss', 'Application availability loss',
'Application confidentiality loss'],
'CVE-2017-1000018': ['Application availability loss'],
'CVE-2017-1000021': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000022': ['Gain privileges on application'],
'CVE-2017-1000026': ['Application integrity loss'],
'CVE-2017-1000028': ['Application confidentiality loss'],
'CVE-2017-1000029': ['Application confidentiality loss'],
'CVE-2017-1000030': ['Gain privileges on application'],
'CVE-2017-1000031': ['Arbitrary code execution as user of application'],
'CVE-2017-1000039': ['Arbitrary code execution as user of application'],
'CVE-2017-1000044': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000045': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000046': ['Application integrity loss'],
'CVE-2017-1000047': ['Arbitrary code execution as user of application'],
'CVE-2017-1000050': ['Application availability loss'],
'CVE-2017-1000060': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1000062': ['Arbitrary code execution as user of application'],
'CVE-2017-1000064': ['Application availability loss'],
'CVE-2017-1000066': ['Application confidentiality loss'],
'CVE-2017-1000067': ['Gain privileges on application'],
'CVE-2017-1000069': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000072': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000073': ['Arbitrary code execution as user of application'],
'CVE-2017-1000074': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000075': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000079': ['System availability loss'],
'CVE-2017-1000080': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-1000081': ['Arbitrary code execution as user of application'],
'CVE-2017-1000082': ['Gain root/system/administrator privileges on system'],
'CVE-2017-1000357': ['Application availability loss'],
'CVE-2017-1000361': ['Application availability loss'],
'CVE-2017-1000362': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1000363': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-1000364': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-1000365': ['Privilege escalation on system'],
'CVE-2017-1000366': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1000368': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1000370': ['Privilege escalation on system'],
'CVE-2017-1000371': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-1000372': ['Arbitrary code execution as user of application'],
'CVE-2017-1000374': ['Arbitrary code execution as user of application'],
'CVE-2017-1000375': ['Arbitrary code execution as user of application'],
'CVE-2017-1000376': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1000378': ['Arbitrary code execution as user of application'],
'CVE-2017-1000379': ['Privilege escalation on system'],
'CVE-2017-1000381': ['Application confidentiality loss'],
'CVE-2017-1001000': ['Application integrity loss'],
'CVE-2017-10601': ['Gain root/system/administrator privileges on system'],
'CVE-2017-10602': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-10603': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-10605': ['System availability loss'],
'CVE-2017-10670': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10671': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10672': ['Arbitrary code execution as user of application'],
'CVE-2017-10678': ['Gain privileges on application'],
'CVE-2017-10679': ['Application confidentiality loss'],
'CVE-2017-10680': ['Gain privileges on application'],
'CVE-2017-10681': ['Gain privileges on application'],
'CVE-2017-10682': ['Arbitrary code execution as user of application'],
'CVE-2017-10683': ['Application availability loss'],
'CVE-2017-10684': ['Arbitrary code execution as user of application'],
'CVE-2017-10685': ['Arbitrary code execution as user of application'],
'CVE-2017-10686': ['Arbitrary code execution as user of application'],
'CVE-2017-10687': ['Application availability loss'],
'CVE-2017-10688': ['Application availability loss'],
'CVE-2017-10699': ['Arbitrary code execution as user of application'],
'CVE-2017-10725': ['Arbitrary code execution as user of application'],
'CVE-2017-10726': ['Arbitrary code execution as user of application'],
'CVE-2017-10727': ['Arbitrary code execution as user of application'],
'CVE-2017-10728': ['Arbitrary code execution as user of application'],
'CVE-2017-10729': ['Arbitrary code execution as user of application'],
'CVE-2017-10730': ['Arbitrary code execution as user of application'],
'CVE-2017-10731': ['Arbitrary code execution as user of application'],
'CVE-2017-10732': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10733': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10734': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10735': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10736': ['Arbitrary code execution as user of application'],
'CVE-2017-10737': ['Arbitrary code execution as user of application'],
'CVE-2017-10738': ['Arbitrary code execution as user of application'],
'CVE-2017-10739': ['Arbitrary code execution as user of application'],
'CVE-2017-10740': ['Arbitrary code execution as user of application'],
'CVE-2017-10741': ['Arbitrary code execution as user of application'],
'CVE-2017-10742': ['Arbitrary code execution as user of application'],
'CVE-2017-10743': ['Arbitrary code execution as user of application'],
'CVE-2017-10744': ['Arbitrary code execution as user of application'],
'CVE-2017-10745': ['Arbitrary code execution as user of application'],
'CVE-2017-10746': ['Arbitrary code execution as user of application'],
'CVE-2017-10747': ['Arbitrary code execution as user of application'],
'CVE-2017-10748': ['Arbitrary code execution as user of application'],
'CVE-2017-10749': ['Arbitrary code execution as user of application'],
'CVE-2017-10750': ['Arbitrary code execution as user of application'],
'CVE-2017-10751': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10752': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10753': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10754': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10755': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10756': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10757': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10758': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10759': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10760': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10761': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10762': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10763': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10764': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10765': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10766': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10767': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10768': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10769': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10770': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10771': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10772': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10773': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10774': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10775': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10776': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10777': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10778': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10779': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10780': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10781': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10782': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10783': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10788': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10790': ['Application availability loss'],
'CVE-2017-10804': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10805': ['Gain privileges on application'],
'CVE-2017-10807': ['Gain privileges on application'],
'CVE-2017-10810': ['System availability loss'],
'CVE-2017-10912': ['Gain root/system/administrator privileges on system'],
'CVE-2017-10913': ['Gain user privileges on system'],
'CVE-2017-10914': ['Gain user privileges on system'],
'CVE-2017-10915': ['Gain user privileges on system'],
'CVE-2017-10916': ['System confidentiality loss'],
'CVE-2017-10917': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-10918': ['Gain root/system/administrator privileges on system'],
'CVE-2017-1092': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-10920': ['Gain root/system/administrator privileges on system'],
'CVE-2017-10921': ['Gain root/system/administrator privileges on system'],
'CVE-2017-10922': ['System availability loss'],
'CVE-2017-10924': ['Arbitrary code execution as user of application'],
'CVE-2017-10925': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10926': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10928': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-10929': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-1093': ['Privilege escalation on system'],
'CVE-2017-10961': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10965': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10966': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10968': ['Arbitrary code execution as user of application'],
'CVE-2017-10971': ['Arbitrary code execution as user of application'],
'CVE-2017-10974': ['Application confidentiality loss'],
'CVE-2017-10976': ['Application availability loss'],
'CVE-2017-10978': ['Application availability loss'],
'CVE-2017-10979': ['Arbitrary code execution as user of application'],
'CVE-2017-10980': ['Application availability loss'],
'CVE-2017-10981': ['Application availability loss'],
'CVE-2017-10982': ['Application availability loss'],
'CVE-2017-10983': ['Application availability loss'],
'CVE-2017-10984': ['Arbitrary code execution as user of application'],
'CVE-2017-10985': ['System availability loss'],
'CVE-2017-10986': ['Application availability loss'],
'CVE-2017-10987': ['Application availability loss'],
'CVE-2017-10989': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-10993': ['Arbitrary code execution as user of application'],
'CVE-2017-10994': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1103': ['System availability loss', 'System confidentiality loss'],
'CVE-2017-1105': ['Application availability loss', 'Application integrity loss'],
'CVE-2017-11096': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11097': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11098': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11099': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11100': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11101': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11102': ['Application availability loss'],
'CVE-2017-11103': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11108': ['Application availability loss'],
'CVE-2017-11109': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11110': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11111': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11112': ['Application availability loss'],
'CVE-2017-11113': ['Application availability loss'],
'CVE-2017-11124': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11125': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11139': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11142': ['System availability loss'],
'CVE-2017-11143': ['Application availability loss'],
'CVE-2017-11144': ['Application availability loss'],
'CVE-2017-11145': ['Application confidentiality loss'],
'CVE-2017-11147': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-11164': ['System availability loss'],
'CVE-2017-11165': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11167': ['Arbitrary code execution as user of application'],
'CVE-2017-11170': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11173': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11174': ['Arbitrary code execution as user of application'],
'CVE-2017-11176': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-11187': ['Gain privileges on application'],
'CVE-2017-11188': ['System availability loss'],
'CVE-2017-11190': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11193': ['Arbitrary code execution as user of application'],
'CVE-2017-11196': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11200': ['Arbitrary code execution as user of application'],
'CVE-2017-1122': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11310': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11311': ['Arbitrary code execution as user of application'],
'CVE-2017-11324': ['Arbitrary code execution as user of application'],
'CVE-2017-11325': ['Application confidentiality loss'],
'CVE-2017-11326': ['Application integrity loss'],
'CVE-2017-11329': ['Arbitrary code execution as user of application'],
'CVE-2017-11335': ['Arbitrary code execution as user of application'],
'CVE-2017-1134': ['Privilege escalation on system'],
'CVE-2017-11341': ['Application availability loss'],
'CVE-2017-11342': ['Application availability loss'],
'CVE-2017-11343': ['Application integrity loss'],
'CVE-2017-11344': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11345': ['Arbitrary code execution as user of application'],
'CVE-2017-11346': ['Arbitrary code execution as user of application'],
'CVE-2017-11349': ['System confidentiality loss'],
'CVE-2017-11354': ['Arbitrary code execution as user of application'],
'CVE-2017-11361': ['Privilege escalation on system'],
'CVE-2017-11362': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-1137': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11399': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11403': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11406': ['System availability loss'],
'CVE-2017-11407': ['Application availability loss'],
'CVE-2017-11408': ['Application availability loss'],
'CVE-2017-11409': ['System availability loss'],
'CVE-2017-11410': ['System availability loss'],
'CVE-2017-11411': ['System availability loss'],
'CVE-2017-11412': ['Arbitrary code execution as user of application'],
'CVE-2017-11413': ['Arbitrary code execution as user of application'],
'CVE-2017-11414': ['Arbitrary code execution as user of application'],
'CVE-2017-11415': ['Arbitrary code execution as user of application'],
'CVE-2017-11416': ['Arbitrary code execution as user of application'],
'CVE-2017-11417': ['Arbitrary code execution as user of application'],
'CVE-2017-11418': ['Arbitrary code execution as user of application'],
'CVE-2017-11419': ['Arbitrary code execution as user of application'],
'CVE-2017-11420': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11421': ['Arbitrary code execution as user of application'],
'CVE-2017-11435': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-11444': ['Arbitrary code execution as user of application'],
'CVE-2017-11445': ['Arbitrary code execution as user of application'],
'CVE-2017-11449': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-1145': ['System availability loss'],
'CVE-2017-11450': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11456': ['System confidentiality loss'],
'CVE-2017-11459': ['Arbitrary code execution as user of application'],
'CVE-2017-11464': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11465': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-11466': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11467': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11468': ['Application availability loss'],
'CVE-2017-11469': ['Application confidentiality loss'],
'CVE-2017-11470': ['Arbitrary code execution as user of application'],
'CVE-2017-11471': ['Arbitrary code execution as user of application'],
'CVE-2017-11472': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-11473': ['Privilege escalation on system'],
'CVE-2017-11474': ['Arbitrary code execution as user of application'],
'CVE-2017-11475': ['Arbitrary code execution as user of application'],
'CVE-2017-1149': ['System availability loss', 'System confidentiality loss'],
'CVE-2017-11499': ['Application availability loss'],
'CVE-2017-11500': ['Application integrity loss'],
'CVE-2017-11502': ['System confidentiality loss'],
'CVE-2017-1151': ['Gain user privileges on system'],
'CVE-2017-11517': ['Arbitrary code execution as user of application'],
'CVE-2017-11519': ['Gain user privileges on system'],
'CVE-2017-1153': ['Gain privileges on application'],
'CVE-2017-11541': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11542': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11543': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11544': ['Application availability loss'],
'CVE-2017-11545': ['Application availability loss'],
'CVE-2017-11553': ['Application availability loss'],
'CVE-2017-11554': ['Application availability loss'],
'CVE-2017-11555': ['Application availability loss'],
'CVE-2017-11556': ['Application availability loss'],
'CVE-2017-1156': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11565': ['Application integrity loss'],
'CVE-2017-11566': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-11568': ['Arbitrary code execution as user of application'],
'CVE-2017-11569': ['Arbitrary code execution as user of application'],
'CVE-2017-11570': ['Arbitrary code execution as user of application'],
'CVE-2017-11571': ['Arbitrary code execution as user of application'],
'CVE-2017-11572': ['Arbitrary code execution as user of application'],
'CVE-2017-11573': ['Arbitrary code execution as user of application'],
'CVE-2017-11574': ['Arbitrary code execution as user of application'],
'CVE-2017-11575': ['Arbitrary code execution as user of application'],
'CVE-2017-11577': ['Arbitrary code execution as user of application'],
'CVE-2017-11582': ['Arbitrary code execution as user of application'],
'CVE-2017-11583': ['Arbitrary code execution as user of application'],
'CVE-2017-11584': ['Arbitrary code execution as user of application'],
'CVE-2017-11585': ['Arbitrary code execution as user of application'],
'CVE-2017-11590': ['Application availability loss'],
'CVE-2017-11591': ['Application availability loss'],
'CVE-2017-11592': ['Application availability loss'],
'CVE-2017-11600': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-1161': ['Arbitrary code execution as user of application'],
'CVE-2017-11630': ['Application integrity loss'],
'CVE-2017-11631': ['Arbitrary code execution as user of application'],
'CVE-2017-11636': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11637': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11638': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11641': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11642': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11643': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-11655': ['Application availability loss'],
'CVE-2017-1175': ['Arbitrary code execution as user of application'],
'CVE-2017-1181': ['Gain privileges on application'],
'CVE-2017-1182': ['Arbitrary code execution as user of application'],
'CVE-2017-1183': ['Arbitrary code execution as user of application'],
'CVE-2017-1194': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1196': ['Gain privileges on application'],
'CVE-2017-1197': ['Gain privileges on application'],
'CVE-2017-1205': ['Privilege escalation on system'],
'CVE-2017-1218': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1224': ['Application confidentiality loss'],
'CVE-2017-1253': ['Arbitrary code execution as user of application'],
'CVE-2017-1254': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-1264': ['Application confidentiality loss'],
'CVE-2017-1267': ['Application integrity loss'],
'CVE-2017-1269': ['Arbitrary code execution as user of application'],
'CVE-2017-1274': ['Arbitrary code execution as user of application'],
'CVE-2017-1289': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-1297': ['Arbitrary code execution as user of application'],
'CVE-2017-1309': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-1318': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-1319': ['Application confidentiality loss'],
'CVE-2017-1322': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-1337': ['Gain privileges on application'],
'CVE-2017-1347': ['Arbitrary code execution as user of application'],
'CVE-2017-1371': ['Gain privileges on application'],
'CVE-2017-1373': ['Gain privileges on application'],
'CVE-2017-1379': ['Application confidentiality loss'],
'CVE-2017-1382': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-2096': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2097': ['Gain privileges on application'],
'CVE-2017-2101': ['Application integrity loss', 'Application availability loss',
'Application confidentiality loss'],
'CVE-2017-2102': ['Gain privileges on application'],
'CVE-2017-2107': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2108': ['Privilege escalation on system'],
'CVE-2017-2112': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2113': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2119': ['Application confidentiality loss'],
'CVE-2017-2120': ['Arbitrary code execution as user of application'],
'CVE-2017-2125': ['Gain user privileges on system'],
'CVE-2017-2126': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-2128': ['Arbitrary code execution as user of application'],
'CVE-2017-2130': ['Gain privileges on application'],
'CVE-2017-2140': ['Arbitrary code execution as user of application'],
'CVE-2017-2141': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2142': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2149': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2153': ['System availability loss'],
'CVE-2017-2154': ['Gain privileges on application'],
'CVE-2017-2155': ['Arbitrary code execution as user of application'],
'CVE-2017-2156': ['Arbitrary code execution as user of application'],
'CVE-2017-2157': ['Gain privileges on application'],
'CVE-2017-2163': ['Application confidentiality loss'],
'CVE-2017-2167': ['Arbitrary code execution as user of application'],
'CVE-2017-2175': ['Gain privileges on application'],
'CVE-2017-2176': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2177': ['Gain privileges on application'],
'CVE-2017-2178': ['Gain privileges on application'],
'CVE-2017-2179': ['Arbitrary code execution as user of application'],
'CVE-2017-2181': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2182': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2183': ['Arbitrary code execution as user of application'],
'CVE-2017-2184': ['Arbitrary code execution as user of application'],
'CVE-2017-2185': ['Arbitrary code execution as user of application'],
'CVE-2017-2186': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2188': ['Gain privileges on application'],
'CVE-2017-2189': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2190': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2191': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2192': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2193': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2195': ['Arbitrary code execution as user of application'],
'CVE-2017-2206': ['Gain privileges on application'],
'CVE-2017-2207': ['Gain privileges on application'],
'CVE-2017-2208': ['Arbitrary code execution as user of application'],
'CVE-2017-2209': ['Gain privileges on application'],
'CVE-2017-2210': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2211': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2212': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2213': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2214': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2215': ['Gain privileges on application'],
'CVE-2017-2218': ['Gain privileges on application'],
'CVE-2017-2219': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2220': ['Gain privileges on application'],
'CVE-2017-2223': ['Gain user privileges on system'],
'CVE-2017-2225': ['Gain privileges on application'],
'CVE-2017-2226': ['Gain privileges on application'],
'CVE-2017-2227': ['Gain privileges on application'],
'CVE-2017-2229': ['Gain privileges on application'],
'CVE-2017-2230': ['Gain privileges on application'],
'CVE-2017-2231': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2232': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2233': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2234': ['Gain user privileges on system'],
'CVE-2017-2235': ['Gain user privileges on system'],
'CVE-2017-2236': ['Gain user privileges on system'],
'CVE-2017-2237': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2238': ['Gain user privileges on system'],
'CVE-2017-2244': ['Gain user privileges on system'],
'CVE-2017-2246': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2247': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2248': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2249': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2252': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2253': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2265': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2266': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2267': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2268': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2269': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2270': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2271': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2272': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2275': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2276': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2290': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2292': ['Arbitrary code execution as user of application'],
'CVE-2017-2294': ['Application confidentiality loss'],
'CVE-2017-2295': ['Arbitrary code execution as user of application'],
'CVE-2017-2300': ['System availability loss'],
'CVE-2017-2301': ['System availability loss'],
'CVE-2017-2302': ['System availability loss'],
'CVE-2017-2303': ['System availability loss'],
'CVE-2017-2304': ['System confidentiality loss'],
'CVE-2017-2305': ['Gain privileges on application'],
'CVE-2017-2306': ['Arbitrary code execution as user of application'],
'CVE-2017-2313': ['System availability loss'],
'CVE-2017-2315': ['System availability loss'],
'CVE-2017-2317': ['System integrity loss', 'System availability loss', 'System confidentiality loss'],
'CVE-2017-2319': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2320': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-2321': ['System integrity loss', 'System availability loss', 'System confidentiality loss'],
'CVE-2017-2323': ['Application availability loss'],
'CVE-2017-2331': ['System integrity loss', 'System availability loss', 'System confidentiality loss'],
'CVE-2017-2332': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2334': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2341': ['Privilege escalation on system'],
'CVE-2017-2343': ['Gain root/system/administrator privileges on system'],
'CVE-2017-2349': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2353': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2354': ['Arbitrary code execution as user of application'],
'CVE-2017-2355': ['Arbitrary code execution as user of application'],
'CVE-2017-2356': ['Arbitrary code execution as user of application'],
'CVE-2017-2358': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2360': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2362': ['Arbitrary code execution as user of application'],
'CVE-2017-2366': ['Arbitrary code execution as user of application'],
'CVE-2017-2369': ['Arbitrary code execution as user of application'],
'CVE-2017-2370': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2372': ['Arbitrary code execution as user of application'],
'CVE-2017-2373': ['Arbitrary code execution as user of application'],
'CVE-2017-2374': ['Arbitrary code execution as user of application'],
'CVE-2017-2376': ['Application integrity loss'],
'CVE-2017-2377': ['Application availability loss'],
'CVE-2017-2378': ['Arbitrary code execution as user of application'],
'CVE-2017-2379': ['Arbitrary code execution as user of application'],
'CVE-2017-2380': ['System confidentiality loss'],
'CVE-2017-2381': ['Gain user privileges on system'],
'CVE-2017-2382': ['System confidentiality loss'],
'CVE-2017-2389': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-2392': ['Arbitrary code execution as user of application'],
'CVE-2017-2394': ['Arbitrary code execution as user of application'],
'CVE-2017-2395': ['Arbitrary code execution as user of application'],
'CVE-2017-2396': ['Arbitrary code execution as user of application'],
'CVE-2017-2398': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2401': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2402': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2403': ['Arbitrary code execution as user of application'],
'CVE-2017-2404': ['System integrity loss'],
'CVE-2017-2405': ['Arbitrary code execution as user of application'],
'CVE-2017-2406': ['Arbitrary code execution as user of application'],
'CVE-2017-2407': ['Arbitrary code execution as user of application'],
'CVE-2017-2408': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2409': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-2410': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2413': ['Arbitrary code execution as user of application'],
'CVE-2017-2415': ['Arbitrary code execution as user of application'],
'CVE-2017-2416': ['Arbitrary code execution as user of application'],
'CVE-2017-2419': ['Application integrity loss'],
'CVE-2017-2420': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2421': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2422': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2423': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2425': ['Arbitrary code execution as user of application'],
'CVE-2017-2427': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2428': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-2429': ['System integrity loss'],
'CVE-2017-2430': ['Arbitrary code execution as user of application'],
'CVE-2017-2431': ['Arbitrary code execution as user of application'],
'CVE-2017-2432': ['Arbitrary code execution as user of application'],
'CVE-2017-2433': ['Arbitrary code execution as user of application'],
'CVE-2017-2434': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-2435': ['Arbitrary code execution as user of application'],
'CVE-2017-2436': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2437': ['Privilege escalation on system'],
'CVE-2017-2438': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2439': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-2440': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2441': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2443': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2444': ['Arbitrary code execution as user of application'],
'CVE-2017-2446': ['Arbitrary code execution as user of application'],
'CVE-2017-2447': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-2449': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2450': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-2451': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2454': ['Arbitrary code execution as user of application'],
'CVE-2017-2455': ['Arbitrary code execution as user of application'],
'CVE-2017-2456': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2457': ['Arbitrary code execution as user of application'],
'CVE-2017-2458': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2459': ['Arbitrary code execution as user of application'],
'CVE-2017-2460': ['Arbitrary code execution as user of application'],
'CVE-2017-2461': ['Application availability loss'],
'CVE-2017-2462': ['Arbitrary code execution as user of application'],
'CVE-2017-2463': ['Arbitrary code execution as user of application'],
'CVE-2017-2464': ['Arbitrary code execution as user of application'],
'CVE-2017-2465': ['Arbitrary code execution as user of application'],
'CVE-2017-2466': ['Arbitrary code execution as user of application'],
'CVE-2017-2467': ['Arbitrary code execution as user of application'],
'CVE-2017-2468': ['Arbitrary code execution as user of application'],
'CVE-2017-2469': ['Arbitrary code execution as user of application'],
'CVE-2017-2470': ['Arbitrary code execution as user of application'],
'CVE-2017-2471': ['Arbitrary code execution as user of application'],
'CVE-2017-2472': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2473': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2474': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2476': ['Arbitrary code execution as user of application'],
'CVE-2017-2477': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2478': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2481': ['Arbitrary code execution as user of application'],
'CVE-2017-2482': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2483': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2484': ['System integrity loss'],
'CVE-2017-2485': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2487': ['Arbitrary code execution as user of application'],
'CVE-2017-2490': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2491': ['Arbitrary code execution as user of application'],
'CVE-2017-2494': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2496': ['Arbitrary code execution as user of application'],
'CVE-2017-2498': ['System integrity loss'],
'CVE-2017-2499': ['Arbitrary code execution as user of application'],
'CVE-2017-2501': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2503': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2505': ['Arbitrary code execution as user of application'],
'CVE-2017-2506': ['Arbitrary code execution as user of application'],
'CVE-2017-2512': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2513': ['Arbitrary code execution as user of application'],
'CVE-2017-2514': ['Arbitrary code execution as user of application'],
'CVE-2017-2515': ['Arbitrary code execution as user of application'],
'CVE-2017-2518': ['Arbitrary code execution as user of application'],
'CVE-2017-2519': ['Arbitrary code execution as user of application'],
'CVE-2017-2520': ['Arbitrary code execution as user of application'],
'CVE-2017-2521': ['Arbitrary code execution as user of application'],
'CVE-2017-2522': ['Arbitrary code execution as user of application'],
'CVE-2017-2523': ['Arbitrary code execution as user of application'],
'CVE-2017-2524': ['Arbitrary code execution as user of application'],
'CVE-2017-2525': ['Arbitrary code execution as user of application'],
'CVE-2017-2526': ['Arbitrary code execution as user of application'],
'CVE-2017-2527': ['Arbitrary code execution as user of application'],
'CVE-2017-2530': ['Arbitrary code execution as user of application'],
'CVE-2017-2531': ['Arbitrary code execution as user of application'],
'CVE-2017-2533': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2534': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2535': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2536': ['Arbitrary code execution as user of application'],
'CVE-2017-2537': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2538': ['Arbitrary code execution as user of application'],
'CVE-2017-2539': ['Arbitrary code execution as user of application'],
'CVE-2017-2541': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2542': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2543': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2544': ['Arbitrary code execution as user of application'],
'CVE-2017-2545': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2546': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2547': ['Arbitrary code execution as user of application'],
'CVE-2017-2548': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2583': ['Gain user privileges on system'],
'CVE-2017-2584': ['System availability loss', 'System confidentiality loss'],
'CVE-2017-2636': ['Privilege escalation on system'],
'CVE-2017-2641': ['Arbitrary code execution as user of application'],
'CVE-2017-2647': ['Privilege escalation on system'],
'CVE-2017-2675': ['Gain privileges on application'],
'CVE-2017-2682': ['Arbitrary code execution as user of application'],
'CVE-2017-2683': ['Gain privileges on application'],
'CVE-2017-2684': ['Gain privileges on application'],
'CVE-2017-2685': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-2688': ['Gain user privileges on system'],
'CVE-2017-2689': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2765': ['System availability loss',
'System confidentiality loss', 'System integrity loss'],
'CVE-2017-2766': ['System availability loss',
'System confidentiality loss', 'System integrity loss'],
'CVE-2017-2767': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2768': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2773': ['Gain privileges on application'],
'CVE-2017-2775': ['Arbitrary code execution as user of application'],
'CVE-2017-2780': ['Arbitrary code execution as user of application'],
'CVE-2017-2781': ['Arbitrary code execution as user of application'],
'CVE-2017-2782': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-2783': ['Arbitrary code execution as user of application'],
'CVE-2017-2784': ['Arbitrary code execution as user of application'],
'CVE-2017-2785': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2786': ['Application availability loss'],
'CVE-2017-2787': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2788': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2789': ['Arbitrary code execution as user of application'],
'CVE-2017-2790': ['Arbitrary code execution as user of application'],
'CVE-2017-2791': ['Arbitrary code execution as user of application'],
'CVE-2017-2793': ['Arbitrary code execution as user of application'],
'CVE-2017-2794': ['Arbitrary code execution as user of application'],
'CVE-2017-2797': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2798': ['Arbitrary code execution as user of application'],
'CVE-2017-2799': ['Arbitrary code execution as user of application'],
'CVE-2017-2800': ['Arbitrary code execution as user of application'],
'CVE-2017-2801': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2805': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2810': ['Arbitrary code execution as user of application'],
'CVE-2017-2813': ['Arbitrary code execution as user of application'],
'CVE-2017-2814': ['Arbitrary code execution as user of application'],
'CVE-2017-2817': ['Arbitrary code execution as user of application'],
'CVE-2017-2818': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2819': ['Arbitrary code execution as user of application'],
'CVE-2017-2820': ['Arbitrary code execution as user of application'],
'CVE-2017-2823': ['Arbitrary code execution as user of application'],
'CVE-2017-2824': ['Arbitrary code execution as user of application'],
'CVE-2017-2827': ['Arbitrary code execution as user of application'],
'CVE-2017-2828': ['Arbitrary code execution as user of application'],
'CVE-2017-2830': ['System integrity loss'],
'CVE-2017-2831': ['System integrity loss'],
'CVE-2017-2841': ['Arbitrary code execution as user of application'],
'CVE-2017-2842': ['Arbitrary code execution as user of application'],
'CVE-2017-2843': ['Arbitrary code execution as user of application'],
'CVE-2017-2844': ['Arbitrary code execution as user of application'],
'CVE-2017-2845': ['Arbitrary code execution as user of application'],
'CVE-2017-2846': ['Arbitrary code execution as user of application'],
'CVE-2017-2847': ['Arbitrary code execution as user of application'],
'CVE-2017-2848': ['Arbitrary code execution as user of application'],
'CVE-2017-2849': ['Arbitrary code execution as user of application'],
'CVE-2017-2850': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2851': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-2863': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2925': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2926': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2927': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2928': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2930': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2931': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2932': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2933': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2934': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2935': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2936': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2937': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2938': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-2939': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2940': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2941': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2942': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2943': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2944': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2945': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2946': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2948': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2949': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2950': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2951': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2952': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2953': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2954': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2955': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2956': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2957': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2958': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2959': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2960': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2961': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2962': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2963': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2964': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2965': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2966': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2967': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2968': ['Arbitrary code execution as user of application'],
'CVE-2017-2970': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2971': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2972': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2973': ['Arbitrary code execution as root/administrator/system'],
# 'CVE-2017-2974': ['Application availability loss'], incorrect data
# 'CVE-2017-2975': ['Arbitrary code execution as user of application'], incorrect data
# 'CVE-2017-2976': ['Arbitrary code execution as user of application'], incorrect data
# 'CVE-2017-2977': ['Arbitrary code execution as user of application'], incorrect data
# 'CVE-2017-2978': ['Arbitrary code execution as user of application'], incorrect data
# 'CVE-2017-2979': ['Application confidentiality loss'], incorrect data
# 'CVE-2017-2980': ['Application confidentiality loss'], incorrect data
# 'CVE-2017-2981': ['Application confidentiality loss'], incorrect data
'CVE-2017-2982': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2983': ['Gain privileges on application'],
'CVE-2017-2984': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2985': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2986': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2987': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2988': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2989': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-2990': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2991': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2992': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2993': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2994': ['Arbitrary code execution as user of application'],
'CVE-2017-2995': ['Arbitrary code execution as user of application'],
'CVE-2017-2996': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2997': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2998': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-2999': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3000': ['Application confidentiality loss'],
'CVE-2017-3001': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3002': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3003': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3004': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3005': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3006': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3007': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3009': ['Application confidentiality loss'],
'CVE-2017-3010': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3011': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3012': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3013': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3014': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3015': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3017': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3018': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3019': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3023': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3024': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3025': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3026': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3027': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3028': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3030': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3034': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3035': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3036': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3037': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3038': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3039': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3040': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3041': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3042': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3044': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3047': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3048': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3049': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3050': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3051': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3054': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3055': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3056': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3057': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3058': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3059': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3060': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3061': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3062': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3063': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3064': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3065': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3066': ['Arbitrary code execution as user of application'],
'CVE-2017-3067': ['Application confidentiality loss'],
'CVE-2017-3068': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3069': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3070': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3071': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3072': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3073': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3074': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3075': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3076': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3077': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3078': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3079': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3081': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3082': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3083': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3084': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3086': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3087': ['Application confidentiality loss'],
'CVE-2017-3088': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3089': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3090': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3092': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3093': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3094': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3095': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3096': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3097': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3098': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3101': ['Application integrity loss'],
'CVE-2017-3134': ['Privilege escalation on system'],
'CVE-2017-3159': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3162': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3167': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3169': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3204': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3214': ['Application confidentiality loss'],
'CVE-2017-3216': ['Gain root/system/administrator privileges on system'],
'CVE-2017-3218': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-3219': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3221': ['Gain privileges on application'],
'CVE-2017-3222': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3230': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3233': ['System integrity loss'],
'CVE-2017-3234': ['Gain privileges on application'],
'CVE-2017-3237': ['Privilege escalation on system'],
'CVE-2017-3241': ['Gain privileges on application'],
'CVE-2017-3248': ['Gain privileges on application'],
'CVE-2017-3249': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3250': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3253': ['Application availability loss'],
'CVE-2017-3254': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3260': ['Arbitrary code execution as user of application'],
'CVE-2017-3263': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3266': ['Gain privileges on application'],
'CVE-2017-3267': ['Application availability loss'],
'CVE-2017-3268': ['Application availability loss'],
'CVE-2017-3269': ['Application availability loss'],
'CVE-2017-3270': ['Application availability loss'],
'CVE-2017-3271': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3272': ['Arbitrary code execution as user of application'],
'CVE-2017-3274': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3275': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3278': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3279': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3284': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3285': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3287': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-3289': ['Arbitrary code execution as user of application'],
'CVE-2017-3290': ['Application availability loss', 'Application integrity loss'],
'CVE-2017-3293': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3294': ['Application availability loss'],
'CVE-2017-3295': ['Application availability loss'],
'CVE-2017-3302': ['Application availability loss'],
'CVE-2017-3303': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3306': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3308': ['Application availability loss'],
'CVE-2017-3309': ['Application availability loss'],
'CVE-2017-3310': ['Gain privileges on application'],
'CVE-2017-3316': ['Gain privileges on application'],
'CVE-2017-3324': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3325': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3326': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3327': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3328': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3329': ['Application availability loss'],
'CVE-2017-3330': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3332': ['Application availability loss', 'Application integrity loss'],
'CVE-2017-3333': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3334': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3335': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3336': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3337': ['System integrity loss', 'System confidentiality loss'],
'CVE-2017-3338': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3339': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3340': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3341': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3342': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3343': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3344': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3345': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3346': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3347': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3348': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3349': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3350': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3351': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3352': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3353': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3354': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3355': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3356': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3357': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3358': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3359': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3360': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3361': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3362': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3363': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3364': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3365': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3366': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3367': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3368': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3369': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3370': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3371': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3372': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3373': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3374': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3375': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3376': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3377': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3378': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3379': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3380': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3381': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3382': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3383': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3384': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3385': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3386': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3387': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3388': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3389': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3390': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3391': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3392': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3393': ['System integrity loss', 'System confidentiality loss'],
'CVE-2017-3394': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3395': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3396': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3397': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3398': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3399': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3400': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3401': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3402': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3403': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3404': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3405': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3406': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3407': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3408': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3409': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3410': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3411': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3412': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3413': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3414': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3415': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3416': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3417': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3418': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3419': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3420': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3421': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3422': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3423': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3424': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3425': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3426': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3427': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3428': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3429': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3430': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3431': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3432': ['System integrity loss', 'System confidentiality loss'],
'CVE-2017-3433': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3434': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3435': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3436': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3437': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3438': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3439': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3440': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3441': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3442': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3443': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3450': ['Application availability loss'],
'CVE-2017-3472': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3476': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3486': ['Gain privileges on application'],
'CVE-2017-3493': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-3497': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3499': ['System confidentiality loss'],
'CVE-2017-3500': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-3503': ['Gain privileges on application'],
'CVE-2017-3506': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3507': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3508': ['Gain privileges on application'],
'CVE-2017-3510': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3511': ['Gain privileges on application'],
'CVE-2017-3512': ['Arbitrary code execution as user of application'],
'CVE-2017-3514': ['Arbitrary code execution as user of application'],
'CVE-2017-3516': ['System availability loss'],
'CVE-2017-3518': ['Application availability loss'],
'CVE-2017-3519': ['System confidentiality loss'],
'CVE-2017-3523': ['Gain privileges on application'],
'CVE-2017-3531': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-3538': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3540': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3541': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3542': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3543': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3545': ['System integrity loss', 'System confidentiality loss'],
'CVE-2017-3547': ['System integrity loss'],
'CVE-2017-3549': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3550': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3553': ['Gain privileges on application'],
'CVE-2017-3554': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3555': ['Application availability loss'],
'CVE-2017-3557': ['System integrity loss', 'System confidentiality loss'],
'CVE-2017-3558': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3559': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3561': ['Gain privileges on application'],
'CVE-2017-3563': ['Gain privileges on application'],
'CVE-2017-3564': ['Privilege escalation on system'],
'CVE-2017-3565': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-3572': ['Application availability loss'],
'CVE-2017-3574': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3575': ['Application availability loss', 'Application integrity loss'],
'CVE-2017-3576': ['Gain privileges on application'],
'CVE-2017-3578': ['Gain privileges on application'],
'CVE-2017-3580': ['Gain privileges on application'],
'CVE-2017-3581': ['Gain privileges on application'],
'CVE-2017-3582': ['Gain privileges on application'],
'CVE-2017-3583': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3584': ['Gain privileges on application'],
'CVE-2017-3587': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-3591': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3593': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3595': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3596': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-3599': ['System availability loss'],
'CVE-2017-3601': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3602': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3604': ['Gain privileges on application'],
'CVE-2017-3605': ['Gain privileges on application'],
'CVE-2017-3606': ['Gain privileges on application'],
'CVE-2017-3607': ['Gain privileges on application'],
'CVE-2017-3608': ['Gain privileges on application'],
'CVE-2017-3609': ['Gain privileges on application'],
'CVE-2017-3610': ['Gain privileges on application'],
'CVE-2017-3611': ['Gain privileges on application'],
'CVE-2017-3612': ['Gain privileges on application'],
'CVE-2017-3613': ['Gain privileges on application'],
'CVE-2017-3614': ['Gain privileges on application'],
'CVE-2017-3615': ['Gain privileges on application'],
'CVE-2017-3616': ['Gain privileges on application'],
'CVE-2017-3617': ['Gain privileges on application'],
'CVE-2017-3618': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-3620': ['Gain privileges on application'],
'CVE-2017-3621': ['Application availability loss'],
'CVE-2017-3622': ['Privilege escalation on system'],
'CVE-2017-3623': ['Gain root/system/administrator privileges on system'],
'CVE-2017-3625': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-3629': ['Privilege escalation on system'],
'CVE-2017-3730': ['Application availability loss'],
'CVE-2017-3731': ['Application availability loss'],
'CVE-2017-3733': ['Application availability loss'],
'CVE-2017-3743': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3745': ['Gain privileges on application'],
'CVE-2017-3748': ['Privilege escalation on system'],
'CVE-2017-3790': ['System availability loss'],
'CVE-2017-3791': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3792': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3794': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-3796': ['Arbitrary code execution as user of application'],
'CVE-2017-3801': ['Gain privileges on application'],
'CVE-2017-3807': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-3808': ['System availability loss'],
'CVE-2017-3813': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3819': ['Privilege escalation on system'],
'CVE-2017-3823': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3825': ['Application availability loss'],
'CVE-2017-3826': ['System availability loss'],
'CVE-2017-3830': ['System availability loss'],
'CVE-2017-3831': ['Gain root/system/administrator privileges on system'],
'CVE-2017-3832': ['System availability loss', ],
'CVE-2017-3834': ['Gain root/system/administrator privileges on system'],
'CVE-2017-3835': ['Arbitrary code execution as user of application'],
'CVE-2017-3837': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-3841': ['Application confidentiality loss'],
'CVE-2017-3846': ['Application confidentiality loss'],
'CVE-2017-3849': ['System availability loss'],
'CVE-2017-3851': ['Application confidentiality loss'],
'CVE-2017-3852': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-3853': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3854': ['Gain root/system/administrator privileges on system'],
'CVE-2017-3856': ['System availability loss'],
'CVE-2017-3857': ['System availability loss'],
'CVE-2017-3858': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3859': ['System availability loss'],
'CVE-2017-3860': ['System availability loss'],
'CVE-2017-3861': ['System availability loss'],
'CVE-2017-3862': ['System availability loss'],
'CVE-2017-3863': ['System availability loss'],
'CVE-2017-3864': ['System availability loss'],
'CVE-2017-3873': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3876': ['System availability loss'],
'CVE-2017-3881': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3882': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-3980': ['Arbitrary code execution as user of application'],
'CVE-2017-4014': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-4052': ['Gain privileges on application'],
'CVE-2017-4053': ['Arbitrary code execution as user of application'],
'CVE-2017-4054': ['Arbitrary code execution as user of application'],
'CVE-2017-4055': ['Application integrity loss'],
'CVE-2017-4057': ['Gain privileges on application'],
'CVE-2017-4895': ['Gain privileges on application'],
'CVE-2017-4898': ['Privilege escalation on system'],
'CVE-2017-4901': ['Arbitrary code execution as user of application'],
'CVE-2017-4902': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4903': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4904': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4907': ['Arbitrary code execution as user of application'],
'CVE-2017-4908': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4909': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4910': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4911': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4912': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4913': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4914': ['Arbitrary code execution as user of application'],
'CVE-2017-4915': ['Privilege escalation on system'],
'CVE-2017-4917': ['Gain privileges on application'],
'CVE-2017-4918': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4955': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-4959': ['Gain privileges on application'],
'CVE-2017-4960': ['Application availability loss'],
'CVE-2017-4961': ['Gain privileges on application'],
'CVE-2017-4963': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-4964': ['Arbitrary code execution as user of application'],
'CVE-2017-4966': ['Gain privileges on application'],
'CVE-2017-4972': ['Application confidentiality loss'],
'CVE-2017-4973': ['Gain privileges on application'],
'CVE-2017-4975': ['Application integrity loss'],
'CVE-2017-4976': ['Gain user privileges on system'],
'CVE-2017-4977': ['System confidentiality loss'],
'CVE-2017-4979': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-4980': ['System confidentiality loss'],
'CVE-2017-4981': ['Application availability loss'],
'CVE-2017-4982': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-4984': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4985': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4987': ['Arbitrary code execution as user of application'],
'CVE-2017-4988': ['Privilege escalation on system'],
'CVE-2017-4989': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-4990': ['Arbitrary code execution as user of application'],
'CVE-2017-4991': ['Gain privileges on application'],
'CVE-2017-4992': ['Gain privileges on application'],
'CVE-2017-4994': ['Application integrity loss'],
'CVE-2017-4997': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-4998': ['Gain privileges on application'],
'CVE-2017-5005': ['Arbitrary code execution as user of application'],
'CVE-2017-5009': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5012': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5029': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5030': ['Arbitrary code execution as user of application'],
'CVE-2017-5031': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5032': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5034': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5035': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5036': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5037': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5039': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5043': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5047': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5048': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5049': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5050': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5051': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5135': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-5136': ['System availability loss'],
'CVE-2017-5139': ['Gain user privileges on system'],
'CVE-2017-5140': ['Gain user privileges on system'],
'CVE-2017-5142': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5143': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5144': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5145': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5146': ['System confidentiality loss'],
'CVE-2017-5149': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5151': ['Arbitrary code execution as user of application'],
'CVE-2017-5152': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-5153': ['Gain privileges on application'],
'CVE-2017-5154': ['Arbitrary code execution as user of application'],
'CVE-2017-5155': ['Gain privileges on application'],
'CVE-2017-5156': ['Gain privileges on application'],
'CVE-2017-5158': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5159': ['Gain privileges on application'],
'CVE-2017-5161': ['Privilege escalation on system'],
'CVE-2017-5162': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5165': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-5166': ['Gain user privileges on system'],
'CVE-2017-5167': ['Gain user privileges on system'],
'CVE-2017-5168': ['Arbitrary code execution as user of application'],
'CVE-2017-5169': ['Gain root/system/administrator privileges on system'],
'CVE-2017-5173': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5174': ['Arbitrary code execution as user of application'],
'CVE-2017-5176': ['Gain root/system/administrator privileges on system'],
'CVE-2017-5177': ['Arbitrary code execution as user of application'],
'CVE-2017-5178': ['Gain root/system/administrator privileges on system'],
'CVE-2017-5180': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5182': ['System confidentiality loss'],
'CVE-2017-5184': ['Application confidentiality loss'],
'CVE-2017-5185': ['Application availability loss'],
'CVE-2017-5186': ['Application availability loss'],
'CVE-2017-5193': ['Application availability loss'],
'CVE-2017-5194': ['Application availability loss'],
'CVE-2017-5195': ['Application availability loss'],
'CVE-2017-5196': ['Application availability loss'],
'CVE-2017-5198': ['Privilege escalation on system'],
'CVE-2017-5199': ['Arbitrary code execution as user of application'],
'CVE-2017-5202': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5203': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5204': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5205': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5206': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5207': ['Privilege escalation on system'],
'CVE-2017-5209': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-5214': ['Application confidentiality loss'],
'CVE-2017-5215': ['Arbitrary code execution as user of application'],
'CVE-2017-5218': ['Arbitrary code execution as user of application'],
'CVE-2017-5219': ['Gain root/system/administrator privileges on system'],
'CVE-2017-5225': ['Arbitrary code execution as user of application'],
'CVE-2017-5226': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5227': ['Gain user privileges on system'],
'CVE-2017-5228': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5229': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5230': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5231': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5232': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5233': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5234': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5235': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5236': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5237': ['System availability loss'],
'CVE-2017-5239': ['System confidentiality loss'],
'CVE-2017-5240': ['Application availability loss'],
'CVE-2017-5243': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5328': ['Application integrity loss'],
'CVE-2017-5329': ['Gain privileges on application'],
'CVE-2017-5330': ['Arbitrary code execution as user of application'],
'CVE-2017-5334': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5335': ['Application availability loss'],
'CVE-2017-5336': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5337': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5340': ['Arbitrary code execution as user of application'],
'CVE-2017-5341': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5342': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5344': ['Arbitrary code execution as user of application'],
'CVE-2017-5345': ['Arbitrary code execution as user of application'],
'CVE-2017-5346': ['Arbitrary code execution as user of application'],
'CVE-2017-5347': ['Arbitrary code execution as user of application'],
'CVE-2017-5350': ['System availability loss'],
'CVE-2017-5351': ['System availability loss'],
'CVE-2017-5356': ['Application availability loss'],
'CVE-2017-5357': ['Application availability loss'],
'CVE-2017-5358': ['Arbitrary code execution as user of application'],
'CVE-2017-5359': ['Application availability loss'],
'CVE-2017-5364': ['Arbitrary code execution as user of application'],
'CVE-2017-5368': ['Gain privileges on application'],
'CVE-2017-5371': ['Application availability loss'],
'CVE-2017-5372': ['System confidentiality loss'],
'CVE-2017-5461': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5473': ['Gain privileges on application'],
'CVE-2017-5475': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5476': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5480': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-5481': ['Gain privileges on application'],
'CVE-2017-5482': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5483': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5484': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5485': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5486': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5489': ['Gain privileges on application'],
'CVE-2017-5492': ['Gain privileges on application'],
'CVE-2017-5493': ['Application integrity loss'],
'CVE-2017-5495': ['System availability loss'],
'CVE-2017-5496': ['Gain privileges on application'],
'CVE-2017-5506': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5507': ['System availability loss'],
'CVE-2017-5509': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5510': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5511': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5517': ['Arbitrary code execution as user of application'],
'CVE-2017-5518': ['Application integrity loss'],
'CVE-2017-5519': ['Arbitrary code execution as user of application'],
'CVE-2017-5520': ['Arbitrary code execution as user of application'],
'CVE-2017-5521': ['Gain user privileges on system'],
'CVE-2017-5522': ['Arbitrary code execution as user of application'],
'CVE-2017-5528': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5538': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5539': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5543': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5545': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-5546': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5547': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5548': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5554': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5556': ['Arbitrary code execution as user of application'],
'CVE-2017-5563': ['Arbitrary code execution as user of application'],
'CVE-2017-5569': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5570': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-5574': ['Arbitrary code execution as user of application'],
'CVE-2017-5575': ['Arbitrary code execution as user of application'],
'CVE-2017-5576': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5580': ['Application availability loss'],
'CVE-2017-5581': ['Arbitrary code execution as user of application'],
'CVE-2017-5585': ['Arbitrary code execution as user of application'],
'CVE-2017-5586': ['Arbitrary code execution as user of application'],
'CVE-2017-5594': ['Gain privileges on application'],
'CVE-2017-5596': ['Application availability loss'],
'CVE-2017-5597': ['Application availability loss'],
'CVE-2017-5598': ['Application confidentiality loss'],
'CVE-2017-5600': ['Gain privileges on application'],
'CVE-2017-5601': ['Application availability loss'],
'CVE-2017-5609': ['Arbitrary code execution as user of application'],
'CVE-2017-5611': ['Arbitrary code execution as user of application'],
'CVE-2017-5613': ['Arbitrary code execution as user of application'],
'CVE-2017-5617': ['Application integrity loss'],
'CVE-2017-5618': ['Privilege escalation on system'],
'CVE-2017-5619': ['Gain privileges on application'],
'CVE-2017-5624': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5626': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5627': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5628': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5630': ['Application integrity loss'],
'CVE-2017-5633': ['Privilege escalation on system'],
'CVE-2017-5638': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5640': ['Gain privileges on application'],
'CVE-2017-5642': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5643': ['Application integrity loss'],
'CVE-2017-5645': ['Arbitrary code execution as user of application'],
'CVE-2017-5647': ['Application confidentiality loss'],
'CVE-2017-5648': ['Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5649': ['Application confidentiality loss'],
'CVE-2017-5650': ['Application availability loss'],
'CVE-2017-5651': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5652': ['Application confidentiality loss'],
'CVE-2017-5654': ['System confidentiality loss'],
'CVE-2017-5656': ['Application confidentiality loss'],
'CVE-2017-5657': ['Arbitrary code execution as user of application'],
'CVE-2017-5659': ['Application availability loss'],
'CVE-2017-5661': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-5662': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-5664': ['Application integrity loss'],
'CVE-2017-5668': ['Arbitrary code execution as user of application'],
'CVE-2017-5669': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5671': ['Privilege escalation on system'],
'CVE-2017-5674': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5675': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5677': ['Arbitrary code execution as user of application'],
'CVE-2017-5681': ['Application confidentiality loss'],
'CVE-2017-5682': ['Privilege escalation on system'],
'CVE-2017-5683': ['Privilege escalation on system'],
'CVE-2017-5689': ['Gain root/system/administrator privileges on system'],
'CVE-2017-5830': ['Arbitrary code execution as user of application'],
'CVE-2017-5835': ['Application availability loss'],
'CVE-2017-5836': ['Application availability loss'],
'CVE-2017-5838': ['Application availability loss'],
'CVE-2017-5839': ['Application availability loss'],
'CVE-2017-5840': ['Application availability loss'],
'CVE-2017-5841': ['Application availability loss'],
'CVE-2017-5843': ['Application availability loss'],
'CVE-2017-5845': ['Application availability loss'],
'CVE-2017-5847': ['Application availability loss'],
'CVE-2017-5848': ['Application availability loss'],
'CVE-2017-5850': ['System availability loss'],
'CVE-2017-5853': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5859': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5869': ['Arbitrary code execution as user of application'],
'CVE-2017-5872': ['Application availability loss'],
'CVE-2017-5874': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5878': ['Arbitrary code execution as user of application'],
'CVE-2017-5879': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5881': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5884': ['Arbitrary code execution as user of application'],
'CVE-2017-5885': ['Arbitrary code execution as user of application'],
'CVE-2017-5886': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5887': ['Application integrity loss'],
'CVE-2017-5891': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-5892': ['System confidentiality loss'],
'CVE-2017-5897': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-5899': ['Privilege escalation on system'],
'CVE-2017-5923': ['Application availability loss'],
'CVE-2017-5924': ['Application availability loss'],
'CVE-2017-5925': ['System confidentiality loss'],
'CVE-2017-5926': ['System confidentiality loss'],
'CVE-2017-5927': ['System confidentiality loss'],
'CVE-2017-5929': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5931': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-5932': ['Gain privileges on application'],
'CVE-2017-5936': ['Application integrity loss'],
'CVE-2017-5940': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5941': ['Arbitrary code execution as user of application'],
'CVE-2017-5943': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5944': ['Arbitrary code execution as user of application'],
'CVE-2017-5946': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5949': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5953': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-5954': ['Arbitrary code execution as user of application'],
'CVE-2017-5959': ['Gain privileges on application'],
'CVE-2017-5970': ['System availability loss'],
'CVE-2017-5972': ['System availability loss'],
'CVE-2017-5982': ['Application confidentiality loss'],
'CVE-2017-5983': ['Arbitrary code execution as user of application'],
'CVE-2017-5988': ['Application availability loss'],
'CVE-2017-5991': ['Application availability loss'],
'CVE-2017-5992': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-5995': ['Application confidentiality loss'],
'CVE-2017-5997': ['Application availability loss'],
'CVE-2017-5999': ['System confidentiality loss'],
'CVE-2017-6001': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6002': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6004': ['Application availability loss'],
'CVE-2017-6013': ['Arbitrary code execution as user of application'],
'CVE-2017-6014': ['System availability loss'],
'CVE-2017-6016': ['Gain privileges on application'],
'CVE-2017-6017': ['System availability loss'],
'CVE-2017-6019': ['System availability loss'],
'CVE-2017-6022': ['Gain privileges on application'],
'CVE-2017-6023': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-6025': ['Arbitrary code execution as user of application'],
'CVE-2017-6026': ['System confidentiality loss', 'System integrity loss'],
'CVE-2017-6027': ['Arbitrary code execution as user of application'],
'CVE-2017-6028': ['System confidentiality loss'],
'CVE-2017-6030': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-6031': ['Arbitrary code execution as user of application'],
'CVE-2017-6033': ['Arbitrary code execution as user of application'],
'CVE-2017-6034': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-6035': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6037': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6038': ['System integrity loss', 'System availability loss'],
'CVE-2017-6041': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6042': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-6043': ['System availability loss'],
'CVE-2017-6044': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6045': ['Application confidentiality loss'],
'CVE-2017-6046': ['System confidentiality loss'],
'CVE-2017-6048': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6050': ['Arbitrary code execution as user of application'],
'CVE-2017-6051': ['Arbitrary code execution as user of application'],
'CVE-2017-6054': ['Application confidentiality loss'],
'CVE-2017-6055': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6056': ['Application availability loss'],
'CVE-2017-6058': ['Application availability loss'],
'CVE-2017-6059': ['Application integrity loss'],
'CVE-2017-6060': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6062': ['Application integrity loss'],
'CVE-2017-6065': ['Arbitrary code execution as user of application'],
'CVE-2017-6066': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6068': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6069': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6070': ['Arbitrary code execution as user of application'],
'CVE-2017-6074': ['Privilege escalation on system'],
'CVE-2017-6077': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6079': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6080': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6081': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6086': ['Gain privileges on application'],
'CVE-2017-6087': ['Arbitrary code execution as user of application'],
'CVE-2017-6088': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6095': ['Arbitrary code execution as user of application'],
'CVE-2017-6096': ['Arbitrary code execution as user of application'],
'CVE-2017-6097': ['Arbitrary code execution as user of application'],
'CVE-2017-6098': ['Arbitrary code execution as user of application'],
'CVE-2017-6100': ['Application confidentiality loss'],
'CVE-2017-6104': ['Application integrity loss'],
'CVE-2017-6127': ['Gain user privileges on system'],
'CVE-2017-6128': ['Application availability loss'],
'CVE-2017-6130': ['Application integrity loss'],
'CVE-2017-6131': ['Gain privileges on application'],
'CVE-2017-6178': ['Gain privileges on application'],
'CVE-2017-6180': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-6181': ['Application availability loss'],
'CVE-2017-6182': ['Arbitrary code execution as user of application'],
'CVE-2017-6183': ['Arbitrary code execution as user of application'],
'CVE-2017-6187': ['Arbitrary code execution as user of application'],
'CVE-2017-6189': ['Arbitrary code execution as user of application'],
'CVE-2017-6190': ['System confidentiality loss'],
'CVE-2017-6191': ['Arbitrary code execution as user of application'],
'CVE-2017-6194': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6195': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6196': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6205': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-6206': ['System confidentiality loss'],
'CVE-2017-6214': ['System availability loss'],
'CVE-2017-6247': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6248': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6249': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6250': ['Arbitrary code execution as user of application'],
'CVE-2017-6298': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6300': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6301': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6302': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6303': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6304': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6305': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6306': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6307': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6308': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6309': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6310': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6311': ['Application availability loss'],
'CVE-2017-6316': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6318': ['Application confidentiality loss'],
'CVE-2017-6319': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6324': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6326': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6334': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6342': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6343': ['System availability loss', 'System integrity loss',
'System confidentiality loss'],
'CVE-2017-6345': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6346': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6347': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6349': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6350': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6351': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6359': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6360': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6361': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6366': ['Gain user privileges on system'],
'CVE-2017-6367': ['Application availability loss'],
'CVE-2017-6369': ['Arbitrary code execution as user of application'],
'CVE-2017-6377': ['Application integrity loss'],
'CVE-2017-6379': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6381': ['Arbitrary code execution as user of application'],
'CVE-2017-6384': ['System availability loss'],
'CVE-2017-6398': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6399': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6400': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6401': ['Arbitrary code execution as user of application'],
'CVE-2017-6403': ['Gain privileges on application'],
'CVE-2017-6405': ['Application integrity loss'],
'CVE-2017-6406': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6407': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6408': ['Gain privileges on application'],
'CVE-2017-6409': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6411': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-6412': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6413': ['Application integrity loss'],
'CVE-2017-6416': ['Arbitrary code execution as user of application'],
'CVE-2017-6427': ['Application availability loss'],
'CVE-2017-6429': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6432': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6438': ['Arbitrary code execution as user of application'],
'CVE-2017-6441': ['Application availability loss'],
'CVE-2017-6444': ['System availability loss'],
'CVE-2017-6445': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6448': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6451': ['Arbitrary code execution as user of application'],
'CVE-2017-6452': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6455': ['Gain privileges on application'],
'CVE-2017-6458': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6460': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6462': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6465': ['Arbitrary code execution as user of application'],
'CVE-2017-6466': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6467': ['Application availability loss'],
'CVE-2017-6468': ['Application availability loss'],
'CVE-2017-6469': ['Application availability loss'],
'CVE-2017-6470': ['System availability loss'],
'CVE-2017-6471': ['Application availability loss'],
'CVE-2017-6472': ['Application availability loss'],
'CVE-2017-6473': ['Application availability loss'],
'CVE-2017-6474': ['Application availability loss'],
'CVE-2017-6492': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6497': ['Application availability loss'],
'CVE-2017-6506': ['Arbitrary code execution as user of application'],
'CVE-2017-6510': ['Application confidentiality loss'],
'CVE-2017-6513': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6517': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6519': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-6520': ['System availability loss', 'System confidentiality loss'],
'CVE-2017-6526': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6527': ['System confidentiality loss'],
'CVE-2017-6528': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6529': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6530': ['Gain user privileges on system'],
'CVE-2017-6531': ['System confidentiality loss'],
'CVE-2017-6532': ['System confidentiality loss'],
'CVE-2017-6542': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6543': ['Gain user privileges on system'],
'CVE-2017-6548': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6549': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6550': ['Arbitrary code execution as user of application'],
'CVE-2017-6551': ['Arbitrary code execution as user of application'],
'CVE-2017-6552': ['System availability loss'],
'CVE-2017-6553': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6554': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6557': ['Arbitrary code execution as user of application'],
'CVE-2017-6558': ['System confidentiality loss'],
'CVE-2017-6565': ['Arbitrary code execution as user of application'],
'CVE-2017-6570': ['Arbitrary code execution as user of application'],
'CVE-2017-6571': ['Arbitrary code execution as user of application'],
'CVE-2017-6572': ['Arbitrary code execution as user of application'],
'CVE-2017-6573': ['Arbitrary code execution as user of application'],
'CVE-2017-6574': ['Arbitrary code execution as user of application'],
'CVE-2017-6575': ['Arbitrary code execution as user of application'],
'CVE-2017-6576': ['Arbitrary code execution as user of application'],
'CVE-2017-6577': ['Arbitrary code execution as user of application'],
'CVE-2017-6578': ['Arbitrary code execution as user of application'],
'CVE-2017-6597': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6600': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6601': ['Arbitrary code execution as user of application'],
'CVE-2017-6607': ['System availability loss', 'System integrity loss'],
'CVE-2017-6608': ['System availability loss'],
'CVE-2017-6609': ['System availability loss'],
'CVE-2017-6610': ['System availability loss'],
'CVE-2017-6616': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6619': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6621': ['Gain privileges on application'],
'CVE-2017-6622': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6623': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6625': ['System availability loss', 'System integrity loss'],
'CVE-2017-6632': ['System availability loss'],
'CVE-2017-6633': ['System availability loss'],
'CVE-2017-6634': ['Gain user privileges on system'],
'CVE-2017-6638': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6639': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6640': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6641': ['System availability loss'],
'CVE-2017-6648': ['System availability loss'],
'CVE-2017-6649': ['Arbitrary code execution as user of application'],
'CVE-2017-6650': ['Arbitrary code execution as user of application'],
'CVE-2017-6651': ['Application confidentiality loss'],
'CVE-2017-6652': ['System confidentiality loss'],
'CVE-2017-6653': ['System availability loss'],
'CVE-2017-6657': ['Application availability loss'],
'CVE-2017-6658': ['Application availability loss'],
'CVE-2017-6659': ['Arbitrary code execution as user of application'],
'CVE-2017-6662': ['Arbitrary code execution as user of application'],
'CVE-2017-6667': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6669': ['Arbitrary code execution as user of application'],
'CVE-2017-6671': ['System integrity loss'],
'CVE-2017-6674': ['System integrity loss'],
'CVE-2017-6678': ['System availability loss'],
'CVE-2017-6680': ['System integrity loss'],
'CVE-2017-6681': ['System confidentiality loss'],
'CVE-2017-6682': ['Arbitrary code execution as user of application'],
'CVE-2017-6683': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6684': ['Privilege escalation on system'],
'CVE-2017-6685': ['Gain user privileges on system'],
'CVE-2017-6686': ['Gain user privileges on system'],
'CVE-2017-6687': ['Gain user privileges on system'],
'CVE-2017-6688': ['Privilege escalation on system'],
'CVE-2017-6689': ['Gain user privileges on system'],
'CVE-2017-6692': ['Privilege escalation on system'],
'CVE-2017-6707': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6708': ['Arbitrary code execution as user of application'],
'CVE-2017-6709': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-6711': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-6712': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6713': ['Gain root/system/administrator privileges on system'],
'CVE-2017-6714': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6728': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6729': ['Application availability loss'],
'CVE-2017-6731': ['System availability loss'],
'CVE-2017-6736': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6737': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6738': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6739': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6740': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6741': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6742': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6743': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6744': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6750': ['Gain user privileges on system'],
'CVE-2017-6751': ['Application integrity loss'],
'CVE-2017-6753': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6798': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6800': ['Application availability loss'],
'CVE-2017-6801': ['Application availability loss'],
'CVE-2017-6802': ['Application availability loss'],
'CVE-2017-6803': ['Arbitrary code execution as user of application'],
'CVE-2017-6813': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6821': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6823': ['Gain privileges on application'],
'CVE-2017-6827': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6828': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6843': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6844': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6852': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6862': ['Arbitrary code execution as user of application'],
'CVE-2017-6868': ['Gain privileges on application'],
'CVE-2017-6874': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6880': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6884': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6885': ['Gain privileges on application'],
'CVE-2017-6886': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6887': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6889': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6890': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6891': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6892': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6895': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6896': ['Gain user privileges on system'],
'CVE-2017-6903': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6914': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-6919': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6949': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6950': ['Arbitrary code execution as user of application'],
'CVE-2017-6952': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-6953': ['Arbitrary code execution as user of application'],
'CVE-2017-6956': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6957': ['Arbitrary code execution as user of application'],
'CVE-2017-6960': ['Application availability loss'],
'CVE-2017-6962': ['Application availability loss'],
'CVE-2017-6964': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6967': ['Gain privileges on application'],
'CVE-2017-6968': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6969': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-6970': ['Arbitrary code execution as user of application'],
'CVE-2017-6971': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6972': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6977': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6978': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6979': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6980': ['Arbitrary code execution as user of application'],
'CVE-2017-6981': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6983': ['Arbitrary code execution as user of application'],
'CVE-2017-6984': ['Arbitrary code execution as user of application'],
'CVE-2017-6985': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6986': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-6989': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6991': ['Arbitrary code execution as user of application'],
'CVE-2017-6994': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6995': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6996': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6997': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6998': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-6999': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7007': ['System availability loss'],
'CVE-2017-7008': ['Arbitrary code execution as user of application'],
'CVE-2017-7009': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7010': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7012': ['Arbitrary code execution as user of application'],
'CVE-2017-7013': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7014': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7015': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7016': ['Arbitrary code execution as user of application'],
'CVE-2017-7017': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7018': ['Arbitrary code execution as user of application'],
'CVE-2017-7019': ['Arbitrary code execution as user of application'],
'CVE-2017-7020': ['Arbitrary code execution as user of application'],
'CVE-2017-7021': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7022': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7023': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7024': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7025': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7026': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7027': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7030': ['Arbitrary code execution as user of application'],
'CVE-2017-7031': ['Arbitrary code execution as user of application'],
'CVE-2017-7032': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7033': ['Arbitrary code execution as user of application'],
'CVE-2017-7034': ['Arbitrary code execution as user of application'],
'CVE-2017-7035': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7037': ['Arbitrary code execution as user of application'],
'CVE-2017-7039': ['Arbitrary code execution as user of application'],
'CVE-2017-7040': ['Arbitrary code execution as user of application'],
'CVE-2017-7041': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7042': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7043': ['Arbitrary code execution as user of application'],
'CVE-2017-7044': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7046': ['Arbitrary code execution as user of application'],
'CVE-2017-7047': ['Arbitrary code execution as user of application'],
'CVE-2017-7048': ['Arbitrary code execution as user of application'],
'CVE-2017-7049': ['Arbitrary code execution as user of application'],
'CVE-2017-7050': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7051': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7052': ['Arbitrary code execution as user of application'],
'CVE-2017-7053': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7054': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7055': ['Arbitrary code execution as user of application'],
'CVE-2017-7056': ['Arbitrary code execution as user of application'],
'CVE-2017-7061': ['Arbitrary code execution as user of application'],
'CVE-2017-7062': ['Arbitrary code execution as user of application'],
'CVE-2017-7063': ['System availability loss'],
'CVE-2017-7068': ['Arbitrary code execution as user of application'],
'CVE-2017-7069': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7174': ['Arbitrary code execution as user of application'],
'CVE-2017-7175': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7177': ['Application integrity loss'],
'CVE-2017-7178': ['Arbitrary code execution as user of application'],
'CVE-2017-7180': ['Privilege escalation on system'],
'CVE-2017-7183': ['Application availability loss'],
'CVE-2017-7184': ['Privilege escalation on system'],
'CVE-2017-7185': ['Application availability loss'],
'CVE-2017-7186': ['Application availability loss'],
'CVE-2017-7187': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7191': ['Arbitrary code execution as user of application'],
'CVE-2017-7192': ['Application integrity loss'],
'CVE-2017-7199': ['Privilege escalation on system'],
'CVE-2017-7206': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7208': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7213': ['Gain root/system/administrator privileges on system'],
'CVE-2017-7214': ['Gain privileges on application'],
'CVE-2017-7218': ['Gain user privileges on system'],
'CVE-2017-7219': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7220': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7221': ['Arbitrary code execution as user of application'],
'CVE-2017-7223': ['Application availability loss'],
'CVE-2017-7225': ['Application availability loss'],
'CVE-2017-7226': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7227': ['Application availability loss'],
'CVE-2017-7228': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7229': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7230': ['Arbitrary code execution as user of application'],
'CVE-2017-7231': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7235': ['Arbitrary code execution as user of application'],
'CVE-2017-7236': ['Arbitrary code execution as user of application'],
'CVE-2017-7237': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-7239': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-7240': ['System confidentiality loss'],
'CVE-2017-7243': ['Application availability loss'],
'CVE-2017-7245': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7246': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7253': ['Privilege escalation on system'],
'CVE-2017-7258': ['Arbitrary code execution as user of application'],
'CVE-2017-7263': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7264': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7269': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7272': ['Application integrity loss'],
'CVE-2017-7277': ['System confidentiality loss', 'System availability loss'],
'CVE-2017-7279': ['Gain root/system/administrator privileges on system'],
'CVE-2017-7280': ['Arbitrary code execution as user of application'],
'CVE-2017-7281': ['Arbitrary code execution as user of application'],
'CVE-2017-7283': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7284': ['Gain privileges on application'],
'CVE-2017-7285': ['System availability loss'],
'CVE-2017-7290': ['Arbitrary code execution as user of application'],
'CVE-2017-7293': ['Privilege escalation on system'],
'CVE-2017-7294': ['Privilege escalation on system'],
'CVE-2017-7295': ['System availability loss'],
'CVE-2017-7297': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-7300': ['Application availability loss'],
'CVE-2017-7301': ['Application availability loss'],
'CVE-2017-7302': ['Application availability loss'],
'CVE-2017-7303': ['Application availability loss'],
'CVE-2017-7304': ['Application availability loss'],
'CVE-2017-7308': ['Privilege escalation on system'],
'CVE-2017-7310': ['Arbitrary code execution as user of application'],
'CVE-2017-7312': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-7313': ['Application confidentiality loss'],
'CVE-2017-7314': ['Application confidentiality loss'],
'CVE-2017-7315': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7317': ['Gain root/system/administrator privileges on system'],
'CVE-2017-7318': ['Arbitrary code execution as user of application'],
'CVE-2017-7321': ['Arbitrary code execution as user of application'],
'CVE-2017-7322': ['Arbitrary code execution as user of application'],
'CVE-2017-7323': ['Arbitrary code execution as user of application'],
'CVE-2017-7324': ['Arbitrary code execution as user of application'],
'CVE-2017-7336': ['Arbitrary code execution as user of application', ],
'CVE-2017-7337': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-7338': ['Application confidentiality loss'],
'CVE-2017-7357': ['Arbitrary code execution as user of application'],
'CVE-2017-7358': ['Privilege escalation on system'],
'CVE-2017-7365': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7367': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7368': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7369': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7370': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7371': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7372': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7373': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7374': ['Privilege escalation on system'],
'CVE-2017-7392': ['Application availability loss'],
'CVE-2017-7393': ['Arbitrary code execution as user of application'],
'CVE-2017-7394': ['Application availability loss'],
'CVE-2017-7396': ['Application availability loss'],
'CVE-2017-7397': ['System availability loss'],
'CVE-2017-7398': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7401': ['Application availability loss'],
'CVE-2017-7402': ['Arbitrary code execution as user of application'],
'CVE-2017-7404': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7405': ['Gain user privileges on system'],
'CVE-2017-7406': ['Gain user privileges on system'],
'CVE-2017-7408': ['Application availability loss'],
'CVE-2017-7410': ['Arbitrary code execution as user of application'],
'CVE-2017-7412': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7413': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7414': ['Arbitrary code execution as user of application'],
'CVE-2017-7415': ['Application confidentiality loss'],
'CVE-2017-7431': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7432': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7439': ['Application confidentiality loss'],
'CVE-2017-7444': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7446': ['Gain privileges on application'],
'CVE-2017-7447': ['Arbitrary code execution as user of application'],
'CVE-2017-7450': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7455': ['Application confidentiality loss'],
'CVE-2017-7456': ['Application availability loss'],
'CVE-2017-7458': ['Application availability loss'],
'CVE-2017-7459': ['Application integrity loss'],
'CVE-2017-7462': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7473': ['Application confidentiality loss'],
'CVE-2017-7474': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7476': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7477': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7478': ['Application availability loss'],
'CVE-2017-7480': ['Arbitrary code execution as user of application'],
'CVE-2017-7483': ['Application availability loss'],
'CVE-2017-7484': ['Application confidentiality loss'],
'CVE-2017-7486': ['Gain privileges on application'],
'CVE-2017-7487': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7493': ['Gain privileges on application'],
'CVE-2017-7494': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7496': ['Gain privileges on application'],
'CVE-2017-7502': ['Application availability loss'],
'CVE-2017-7503': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7504': ['Arbitrary code execution as user of application'],
'CVE-2017-7505': ['Gain privileges on application'],
'CVE-2017-7507': ['Application availability loss'],
'CVE-2017-7508': ['Application availability loss'],
'CVE-2017-7512': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7520': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7523': ['Application availability loss'],
'CVE-2017-7524': ['Gain privileges on application'],
'CVE-2017-7529': ['Application confidentiality loss'],
'CVE-2017-7541': ['Privilege escalation on system'],
'CVE-2017-7563': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7564': ['Application availability loss'],
'CVE-2017-7565': ['Arbitrary code execution as user of application'],
'CVE-2017-7566': ['Application confidentiality loss'],
'CVE-2017-7569': ['Application integrity loss'],
'CVE-2017-7570': ['Arbitrary code execution as user of application'],
'CVE-2017-7571': ['Gain privileges on application'],
'CVE-2017-7572': ['Gain root/system/administrator privileges on system'],
'CVE-2017-7574': ['Gain user privileges on system'],
'CVE-2017-7575': ['System confidentiality loss'],
'CVE-2017-7576': ['Gain user privileges on system'],
'CVE-2017-7577': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7578': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7581': ['Arbitrary code execution as user of application'],
'CVE-2017-7584': ['Arbitrary code execution as user of application'],
'CVE-2017-7588': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7592': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7596': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7597': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7598': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7599': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7600': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7601': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7602': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7603': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7604': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7605': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7614': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-7615': ['Gain privileges on application'],
'CVE-2017-7617': ['Arbitrary code execution as user of application'],
'CVE-2017-7618': ['System availability loss'],
'CVE-2017-7619': ['Application availability loss'],
'CVE-2017-7622': ['Privilege escalation on system'],
'CVE-2017-7625': ['Arbitrary code execution as user of application'],
'CVE-2017-7628': ['Arbitrary code execution as user of application'],
'CVE-2017-7629': ['System integrity loss'],
'CVE-2017-7643': ['Privilege escalation on system'],
'CVE-2017-7645': ['System availability loss'],
'CVE-2017-7647': ['Arbitrary code execution as user of application'],
'CVE-2017-7648': ['System confidentiality loss'],
'CVE-2017-7660': ['Application integrity loss'],
'CVE-2017-7661': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7662': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7664': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7666': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7667': ['Application integrity loss'],
'CVE-2017-7668': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7669': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7670': ['Application availability loss'],
'CVE-2017-7673': ['Gain privileges on application'],
'CVE-2017-7676': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7679': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7680': ['Application integrity loss'],
'CVE-2017-7681': ['Arbitrary code execution as user of application'],
'CVE-2017-7682': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-7683': ['Application confidentiality loss'],
'CVE-2017-7684': ['Application availability loss'],
'CVE-2017-7686': ['Application confidentiality loss'],
'CVE-2017-7688': ['Application confidentiality loss'],
'CVE-2017-7689': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7690': ['Privilege escalation on system'],
'CVE-2017-7691': ['Arbitrary code execution as user of application'],
'CVE-2017-7692': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7694': ['Arbitrary code execution as user of application'],
'CVE-2017-7695': ['Arbitrary code execution as user of application'],
'CVE-2017-7696': ['Application availability loss'],
'CVE-2017-7698': ['Arbitrary code execution as user of application'],
'CVE-2017-7701': ['System availability loss'],
'CVE-2017-7702': ['System availability loss'],
'CVE-2017-7703': ['Application availability loss'],
'CVE-2017-7704': ['System availability loss'],
'CVE-2017-7705': ['System availability loss'],
'CVE-2017-7717': ['Arbitrary code execution as user of application'],
'CVE-2017-7719': ['Arbitrary code execution as user of application'],
'CVE-2017-7720': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7721': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7722': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7726': ['System integrity loss'],
'CVE-2017-7728': ['Arbitrary code execution as user of application'],
'CVE-2017-7729': ['System integrity loss'],
'CVE-2017-7730': ['System availability loss'],
'CVE-2017-7731': ['Application confidentiality loss'],
'CVE-2017-7745': ['System availability loss'],
'CVE-2017-7746': ['System availability loss'],
'CVE-2017-7747': ['Application availability loss'],
'CVE-2017-7748': ['System availability loss'],
'CVE-2017-7850': ['Privilege escalation on system'],
'CVE-2017-7852': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7853': ['Application availability loss'],
'CVE-2017-7856': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7857': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7858': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7859': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7860': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7861': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7862': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7863': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7864': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7865': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7866': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7867': ['Application availability loss'],
'CVE-2017-7868': ['Application availability loss'],
'CVE-2017-7869': ['Application availability loss'],
'CVE-2017-7870': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7875': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7876': ['Arbitrary code execution as user of application'],
'CVE-2017-7877': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7878': ['Arbitrary code execution as user of application'],
'CVE-2017-7879': ['Application confidentiality loss'],
'CVE-2017-7881': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7882': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7884': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7885': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-7886': ['Arbitrary code execution as user of application'],
'CVE-2017-7888': ['Gain privileges on application'],
'CVE-2017-7889': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7892': ['Application availability loss'],
'CVE-2017-7894': ['Arbitrary code execution as user of application'],
'CVE-2017-7895': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7898': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7899': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7901': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-7902': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7903': ['Gain privileges on application'],
'CVE-2017-7905': ['Gain user privileges on system'],
'CVE-2017-7909': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7910': ['Arbitrary code execution as user of application'],
'CVE-2017-7911': ['Arbitrary code execution as user of application'],
'CVE-2017-7913': ['Gain user privileges on system'],
'CVE-2017-7914': ['Gain user privileges on system'],
'CVE-2017-7915': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-7917': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7919': ['Gain user privileges on system'],
'CVE-2017-7921': ['Gain user privileges on system'],
'CVE-2017-7922': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7923': ['Gain user privileges on system'],
'CVE-2017-7925': ['Gain user privileges on system'],
'CVE-2017-7927': ['Gain user privileges on system'],
'CVE-2017-7929': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-7935': ['System availability loss'],
'CVE-2017-7938': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7945': ['System confidentiality loss'],
'CVE-2017-7948': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7951': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7952': ['Arbitrary code execution as user of application'],
'CVE-2017-7957': ['Application availability loss'],
'CVE-2017-7961': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7963': ['Application availability loss'],
'CVE-2017-7964': ['Gain root/system/administrator privileges on system'],
'CVE-2017-7965': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7966': ['Arbitrary code execution as user of application'],
'CVE-2017-7968': ['Privilege escalation on system'],
'CVE-2017-7975': ['Arbitrary code execution as user of application'],
'CVE-2017-7976': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-7978': ['System confidentiality loss'],
'CVE-2017-7979': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-7980': ['Arbitrary code execution as user of application'],
'CVE-2017-7981': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-7990': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-7991': ['Arbitrary code execution as user of application'],
'CVE-2017-8002': ['Arbitrary code execution as user of application'],
'CVE-2017-8004': ['Arbitrary code execution as user of application'],
'CVE-2017-8011': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8033': ['Gain privileges on application'],
'CVE-2017-8035': ['Application confidentiality loss'],
'CVE-2017-8036': ['Arbitrary code execution as user of application'],
'CVE-2017-8050': ['Application integrity loss'],
'CVE-2017-8051': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8059': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8061': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8062': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8063': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8064': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8065': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8066': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8067': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8068': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8069': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8070': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8072': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8073': ['Application availability loss'],
'CVE-2017-8074': ['Gain user privileges on system'],
'CVE-2017-8075': ['Gain user privileges on system'],
'CVE-2017-8076': ['System confidentiality loss'],
'CVE-2017-8077': ['System confidentiality loss'],
'CVE-2017-8080': ['Arbitrary code execution as user of application'],
'CVE-2017-8081': ['Gain privileges on application'],
'CVE-2017-8099': ['Application availability loss', 'Application integrity loss'],
'CVE-2017-8101': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8105': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8108': ['Gain privileges on application'],
'CVE-2017-8109': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8110': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8114': ['Gain privileges on application'],
'CVE-2017-8116': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8218': ['Gain root/system/administrator privileges on system'],
'CVE-2017-8220': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8221': ['System confidentiality loss'],
'CVE-2017-8222': ['System confidentiality loss'],
'CVE-2017-8223': ['System confidentiality loss'],
'CVE-2017-8224': ['Gain root/system/administrator privileges on system'],
'CVE-2017-8225': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8233': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8234': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8236': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8237': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8238': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8240': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8241': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8244': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8245': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8246': ['System availability loss', 'System confidentiality loss',
'System integrity loss'],
'CVE-2017-8282': ['Arbitrary code execution as user of application'],
'CVE-2017-8283': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8284': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8287': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8288': ['Arbitrary code execution as user of application'],
'CVE-2017-8289': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8290': ['Application availability loss'],
'CVE-2017-8291': ['Arbitrary code execution as user of application'],
'CVE-2017-8294': ['Application availability loss'],
'CVE-2017-8296': ['Gain privileges on application'],
'CVE-2017-8297': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8303': ['Arbitrary code execution as user of application'],
'CVE-2017-8305': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8307': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8308': ['Application integrity loss'],
'CVE-2017-8309': ['System availability loss'],
'CVE-2017-8311': ['Arbitrary code execution as user of application'],
'CVE-2017-8325': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8326': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8338': ['System availability loss'],
'CVE-2017-8342': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8358': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8359': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8364': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8366': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8367': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8368': ['Arbitrary code execution as user of application'],
'CVE-2017-8369': ['Arbitrary code execution as user of application'],
'CVE-2017-8370': ['Arbitrary code execution as user of application'],
'CVE-2017-8373': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8377': ['Arbitrary code execution as user of application'],
'CVE-2017-8378': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8381': ['Arbitrary code execution as user of application'],
'CVE-2017-8386': ['Gain privileges on application'],
'CVE-2017-8392': ['Application availability loss'],
'CVE-2017-8393': ['Application availability loss'],
'CVE-2017-8394': ['Application availability loss'],
'CVE-2017-8395': ['Application availability loss'],
'CVE-2017-8396': ['Application availability loss'],
'CVE-2017-8397': ['Application availability loss'],
'CVE-2017-8398': ['Application availability loss'],
'CVE-2017-8399': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8400': ['Arbitrary code execution as user of application'],
'CVE-2017-8402': ['Arbitrary code execution as user of application'],
'CVE-2017-8403': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-8419': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8422': ['Privilege escalation on system'],
'CVE-2017-8438': ['Gain privileges on application'],
'CVE-2017-8450': ['Application confidentiality loss'],
'CVE-2017-8452': ['Application availability loss'],
'CVE-2017-8453': ['Arbitrary code execution as user of application'],
'CVE-2017-8454': ['Arbitrary code execution as user of application'],
'CVE-2017-8455': ['Arbitrary code execution as user of application'],
'CVE-2017-8460': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8461': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8463': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8464': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8465': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8466': ['Privilege escalation on system'],
'CVE-2017-8467': ['Privilege escalation on system'],
'CVE-2017-8468': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8487': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8494': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8495': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8496': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8497': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8499': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8501': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8502': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8506': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8507': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8509': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8510': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8511': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8512': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8513': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8517': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8519': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8520': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8521': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8522': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8524': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8527': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8528': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8538': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8540': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8541': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8543': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8547': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8548': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8549': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8550': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8552': ['Privilege escalation on system'],
'CVE-2017-8556': ['Privilege escalation on system'],
'CVE-2017-8558': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8561': ['Privilege escalation on system'],
'CVE-2017-8562': ['Privilege escalation on system'],
'CVE-2017-8563': ['Gain user privileges on system'],
'CVE-2017-8565': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8566': ['Gain user privileges on system'],
'CVE-2017-8569': ['Gain privileges on application'],
'CVE-2017-8570': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8573': ['Privilege escalation on system'],
'CVE-2017-8574': ['Privilege escalation on system'],
'CVE-2017-8576': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8577': ['Privilege escalation on system'],
'CVE-2017-8578': ['Gain root/system/administrator privileges on system'],
'CVE-2017-8579': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8580': ['Privilege escalation on system'],
'CVE-2017-8581': ['Gain user privileges on system'],
'CVE-2017-8584': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8585': ['Application availability loss'],
'CVE-2017-8588': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8589': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8590': ['Gain user privileges on system'],
'CVE-2017-8594': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8595': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8596': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8598': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8601': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8603': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8604': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8605': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8606': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8607': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8608': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8609': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8610': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8613': ['Gain privileges on application'],
'CVE-2017-8617': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8618': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8619': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8766': ['Arbitrary code execution as user of application'],
'CVE-2017-8768': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8769': ['Application confidentiality loss'],
'CVE-2017-8773': ['Arbitrary code execution as user of application'],
'CVE-2017-8774': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8775': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8776': ['Application integrity loss'],
'CVE-2017-8779': ['System availability loss'],
'CVE-2017-8781': ['Arbitrary code execution as user of application'],
'CVE-2017-8785': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8786': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8787': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8789': ['Arbitrary code execution as user of application'],
'CVE-2017-8790': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8793': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8794': ['Application integrity loss', 'Application confidentiality loss'],
'CVE-2017-8796': ['Arbitrary code execution as user of application'],
'CVE-2017-8797': ['System availability loss'],
'CVE-2017-8798': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8799': ['Arbitrary code execution as user of application'],
'CVE-2017-8803': ['Arbitrary code execution as user of application'],
'CVE-2017-8804': ['System availability loss'],
'CVE-2017-8825': ['Application availability loss'],
'CVE-2017-8826': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8827': ['Application integrity loss', 'Application availability loss'],
'CVE-2017-8829': ['Arbitrary code execution as user of application'],
'CVE-2017-8831': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8835': ['Arbitrary code execution as user of application'],
'CVE-2017-8836': ['Arbitrary code execution as user of application'],
'CVE-2017-8837': ['Gain user privileges on system'],
'CVE-2017-8841': ['System availability loss', 'System integrity loss'],
'CVE-2017-8844': ['Application integrity loss', 'Application confidentiality loss',
'Application availability loss'],
'CVE-2017-8849': ['Privilege escalation on system'],
'CVE-2017-8852': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8853': ['Application integrity loss'],
'CVE-2017-8854': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8855': ['Application integrity loss'],
'CVE-2017-8856': ['Arbitrary code execution as user of application'],
'CVE-2017-8857': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8858': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8859': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8868': ['Application availability loss'],
'CVE-2017-8872': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-8874': ['Gain privileges on application'],
'CVE-2017-8890': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-8891': ['Application availability loss'],
'CVE-2017-8893': ['Application availability loss'],
'CVE-2017-8894': ['Arbitrary code execution as user of application'],
'CVE-2017-8895': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8898': ['Gain privileges on application'],
'CVE-2017-8899': ['Gain privileges on application'],
'CVE-2017-8903': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8904': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8905': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-8907': ['Arbitrary code execution as user of application'],
'CVE-2017-8911': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8912': ['Arbitrary code execution as user of application'],
'CVE-2017-8913': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8914': ['System integrity loss', 'System confidentiality loss', 'System availability loss'],
'CVE-2017-8915': ['Application availability loss'],
'CVE-2017-8917': ['Arbitrary code execution as user of application'],
'CVE-2017-8921': ['Application integrity loss'],
'CVE-2017-8923': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8926': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8927': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8928': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-8929': ['Application availability loss'],
'CVE-2017-8930': ['Gain privileges on application'],
'CVE-2017-9022': ['Application availability loss'],
'CVE-2017-9023': ['Application availability loss'],
'CVE-2017-9024': ['Application confidentiality loss'],
'CVE-2017-9026': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9030': ['Application confidentiality loss'],
'CVE-2017-9031': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9033': ['Gain privileges on application'],
'CVE-2017-9034': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9036': ['Privilege escalation on system'],
'CVE-2017-9035': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-9042': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9043': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9046': ['Arbitrary code execution as user of application'],
'CVE-2017-9047': ['Application availability loss'],
'CVE-2017-9048': ['Application availability loss'],
'CVE-2017-9049': ['Application availability loss'],
'CVE-2017-9050': ['Application availability loss'],
'CVE-2017-9051': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9052': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9053': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9054': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9055': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9058': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9062': ['Application integrity loss'],
'CVE-2017-9064': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9065': ['Application integrity loss'],
'CVE-2017-9066': ['Application integrity loss'],
'CVE-2017-9067': ['Arbitrary code execution as user of application'],
'CVE-2017-9069': ['Arbitrary code execution as user of application'],
'CVE-2017-9074': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9075': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9076': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9077': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9078': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9080': ['Arbitrary code execution as user of application'],
'CVE-2017-9090': ['Application integrity loss'],
'CVE-2017-9091': ['Application integrity loss'],
'CVE-2017-9097': ['Application confidentiality loss', 'Application integrity loss'],
'CVE-2017-9098': ['Application confidentiality loss'],
'CVE-2017-9100': ['Gain root/system/administrator privileges on system'],
'CVE-2017-9101': ['Arbitrary code execution as user of application'],
'CVE-2017-9111': ['Arbitrary code execution as user of application'],
'CVE-2017-9113': ['Arbitrary code execution as user of application'],
'CVE-2017-9115': ['Arbitrary code execution as user of application'],
'CVE-2017-9117': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9119': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9131': ['Arbitrary code execution as user of application'],
'CVE-2017-9132': ['System confidentiality loss'],
'CVE-2017-9133': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9134': ['System confidentiality loss'],
'CVE-2017-9135': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9136': ['System confidentiality loss'],
'CVE-2017-9137': ['Gain user privileges on system'],
'CVE-2017-9138': ['System availability loss',
'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9146': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9148': ['Gain privileges on application'],
'CVE-2017-9149': ['Application confidentiality loss'],
'CVE-2017-9151': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9152': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9153': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9154': ['Application availability loss'],
'CVE-2017-9155': ['Application availability loss'],
'CVE-2017-9156': ['Application availability loss'],
'CVE-2017-9157': ['Application availability loss'],
'CVE-2017-9158': ['Application availability loss'],
'CVE-2017-9159': ['Application availability loss'],
'CVE-2017-9160': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9161': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9162': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9163': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9164': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9165': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9166': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9167': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9168': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9169': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9170': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9171': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9172': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9173': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9174': ['Application availability loss'],
'CVE-2017-9175': ['Application availability loss'],
'CVE-2017-9176': ['Application availability loss'],
'CVE-2017-9177': ['Application availability loss'],
'CVE-2017-9178': ['Application availability loss'],
'CVE-2017-9179': ['Application availability loss'],
'CVE-2017-9180': ['Application availability loss'],
'CVE-2017-9181': ['Application availability loss'],
'CVE-2017-9182': ['Application availability loss'],
'CVE-2017-9183': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9184': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9185': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9186': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9187': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9188': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9189': ['Application availability loss'],
'CVE-2017-9190': ['Application availability loss'],
'CVE-2017-9191': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9192': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9193': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9194': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9195': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9196': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9197': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9198': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9199': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9200': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9212': ['System availability loss'],
'CVE-2017-9214': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9217': ['Application availability loss'],
'CVE-2017-9224': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9225': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9226': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9227': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9228': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9229': ['Application availability loss'],
'CVE-2017-9230': ['Application confidentiality loss'],
'CVE-2017-9231': ['System confidentiality loss'],
'CVE-2017-9232': ['Gain root/system/administrator privileges on system'],
'CVE-2017-9233': ['Application availability loss'],
'CVE-2017-9246': ['Arbitrary code execution as user of application'],
'CVE-2017-9248': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9250': ['Application availability loss'],
'CVE-2017-9264': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9265': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9294': ['Arbitrary code execution as user of application'],
'CVE-2017-9300': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9301': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9304': ['Application availability loss'],
'CVE-2017-9324': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9334': ['Application availability loss'],
'CVE-2017-9343': ['Application availability loss'],
'CVE-2017-9344': ['Application availability loss'],
'CVE-2017-9345': ['System availability loss'],
'CVE-2017-9346': ['System availability loss'],
'CVE-2017-9347': ['Application availability loss'],
'CVE-2017-9348': ['Application availability loss'],
'CVE-2017-9349': ['System availability loss'],
'CVE-2017-9350': ['System availability loss'],
'CVE-2017-9351': ['Application availability loss'],
'CVE-2017-9352': ['System availability loss'],
'CVE-2017-9353': ['Application availability loss'],
'CVE-2017-9354': ['Application availability loss'],
'CVE-2017-9355': ['Application integrity loss'],
'CVE-2017-9358': ['Application availability loss'],
'CVE-2017-9359': ['Application availability loss'],
'CVE-2017-9360': ['Arbitrary code execution as user of application'],
'CVE-2017-9363': ['Arbitrary code execution as user of application'],
'CVE-2017-9364': ['Arbitrary code execution as user of application'],
'CVE-2017-9365': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9372': ['Application availability loss'],
'CVE-2017-9379': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9380': ['Arbitrary code execution as user of application'],
'CVE-2017-9413': ['Gain privileges on application'],
'CVE-2017-9415': ['Gain privileges on application'],
'CVE-2017-9417': ['Arbitrary code execution as user of application'],
'CVE-2017-9418': ['Arbitrary code execution as user of application'],
'CVE-2017-9424': ['Arbitrary code execution as user of application'],
'CVE-2017-9427': ['Arbitrary code execution as user of application'],
'CVE-2017-9428': ['Application confidentiality loss'],
'CVE-2017-9429': ['Arbitrary code execution as user of application'],
'CVE-2017-9430': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9431': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9432': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9433': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9435': ['Arbitrary code execution as user of application'],
'CVE-2017-9436': ['Arbitrary code execution as user of application'],
'CVE-2017-9437': ['Arbitrary code execution as user of application'],
'CVE-2017-9438': ['Application availability loss'],
'CVE-2017-9442': ['Arbitrary code execution as user of application'],
'CVE-2017-9443': ['Arbitrary code execution as user of application'],
'CVE-2017-9444': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9445': ['Application availability loss'],
'CVE-2017-9449': ['Arbitrary code execution as user of application'],
'CVE-2017-9461': ['System availability loss'],
'CVE-2017-9462': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9465': ['Application availability loss', 'Application confidentiality loss'],
'CVE-2017-9466': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-9468': ['Application availability loss'],
'CVE-2017-9469': ['Application availability loss'],
'CVE-2017-9517': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9518': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9519': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9524': ['Application availability loss'],
'CVE-2017-9527': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9528': ['Arbitrary code execution as user of application'],
'CVE-2017-9529': ['Arbitrary code execution as user of application'],
'CVE-2017-9530': ['Arbitrary code execution as user of application'],
'CVE-2017-9531': ['Arbitrary code execution as user of application'],
'CVE-2017-9532': ['Arbitrary code execution as user of application'],
'CVE-2017-9533': ['Arbitrary code execution as user of application'],
'CVE-2017-9534': ['Arbitrary code execution as user of application'],
'CVE-2017-9535': ['Arbitrary code execution as user of application'],
'CVE-2017-9536': ['Arbitrary code execution as user of application'],
'CVE-2017-9542': ['Gain root/system/administrator privileges on system'],
'CVE-2017-9543': ['Application integrity loss'],
'CVE-2017-9544': ['Arbitrary code execution as user of application'],
'CVE-2017-9552': ['Gain privileges on application'],
'CVE-2017-9557': ['Application confidentiality loss'],
'CVE-2017-9602': ['Arbitrary code execution as user of application'],
'CVE-2017-9603': ['Arbitrary code execution as user of application'],
'CVE-2017-9604': ['Application confidentiality loss'],
'CVE-2017-9606': ['Gain privileges on application'],
'CVE-2017-9615': ['Gain privileges on application'],
'CVE-2017-9617': ['Application availability loss'],
'CVE-2017-9627': ['System availability loss'],
'CVE-2017-9629': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9631': ['Application availability loss'],
'CVE-2017-9639': ['Arbitrary code execution as user of application'],
'CVE-2017-9669': ['Arbitrary code execution as user of application'],
'CVE-2017-9670': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9671': ['Arbitrary code execution as user of application'],
'CVE-2017-9673': ['Gain privileges on application'],
'CVE-2017-9675': ['System availability loss'],
'CVE-2017-9728': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9729': ['Application availability loss'],
'CVE-2017-9730': ['Arbitrary code execution as user of application'],
'CVE-2017-9731': ['Application confidentiality loss'],
'CVE-2017-9735': ['Application confidentiality loss'],
'CVE-2017-9736': ['Arbitrary code execution as user of application'],
'CVE-2017-9741': ['Arbitrary code execution as user of application'],
'CVE-2017-9742': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9743': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9744': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9745': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9746': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9747': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9748': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9749': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9750': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9751': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9752': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9753': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9754': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9755': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9756': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9757': ['Arbitrary code execution as user of application'],
'CVE-2017-9759': ['Arbitrary code execution as user of application'],
'CVE-2017-9763': ['Application availability loss'],
'CVE-2017-9765': ['Arbitrary code execution as user of application'],
'CVE-2017-9766': ['Application availability loss'],
'CVE-2017-9771': ['Arbitrary code execution as user of application'],
'CVE-2017-9772': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9774': ['Arbitrary code execution as user of application'],
'CVE-2017-9776': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9780': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9785': ['Arbitrary code execution as user of application'],
'CVE-2017-9788': ['Application confidentiality loss', 'Application availability loss'],
'CVE-2017-9789': ['Application availability loss'],
'CVE-2017-9791': ['Arbitrary code execution as user of application'],
'CVE-2017-9807': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9810': ['Gain privileges on application'],
'CVE-2017-9811': ['Gain root/system/administrator privileges on system', ],
'CVE-2017-9812': ['Application confidentiality loss'],
'CVE-2017-9814': ['Application availability loss'],
'CVE-2017-9822': ['Arbitrary code execution as user of application'],
'CVE-2017-9828': ['Arbitrary code execution as root/administrator/system'],
'CVE-2017-9829': ['System confidentiality loss'],
'CVE-2017-9830': ['Arbitrary code execution as user of application'],
'CVE-2017-9833': ['Application confidentiality loss'],
'CVE-2017-9837': ['Gain privileges on application'],
'CVE-2017-9840': ['Arbitrary code execution as user of application'],
'CVE-2017-9841': ['Arbitrary code execution as user of application'],
'CVE-2017-9844': ['Arbitrary code execution as user of application'],
'CVE-2017-9845': ['System availability loss'],
'CVE-2017-9846': ['Arbitrary code execution as user of application'],
'CVE-2017-9848': ['Arbitrary code execution as user of application'],
'CVE-2017-9871': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9872': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9873': ['Arbitrary code execution as user of application'],
'CVE-2017-9874': ['Arbitrary code execution as user of application'],
'CVE-2017-9875': ['Arbitrary code execution as user of application'],
'CVE-2017-9876': ['Arbitrary code execution as user of application'],
'CVE-2017-9877': ['Arbitrary code execution as user of application'],
'CVE-2017-9878': ['Arbitrary code execution as user of application'],
'CVE-2017-9879': ['Arbitrary code execution as user of application'],
'CVE-2017-9880': ['Arbitrary code execution as user of application'],
'CVE-2017-9881': ['Arbitrary code execution as user of application'],
'CVE-2017-9882': ['Arbitrary code execution as user of application'],
'CVE-2017-9883': ['Arbitrary code execution as user of application'],
'CVE-2017-9884': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9885': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9886': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9887': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9888': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9889': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9890': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9891': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9892': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9893': ['Arbitrary code execution as user of application'],
'CVE-2017-9894': ['Arbitrary code execution as user of application'],
'CVE-2017-9895': ['Arbitrary code execution as user of application'],
'CVE-2017-9896': ['Arbitrary code execution as user of application'],
'CVE-2017-9897': ['Arbitrary code execution as user of application'],
'CVE-2017-9898': ['Arbitrary code execution as user of application'],
'CVE-2017-9899': ['Arbitrary code execution as user of application'],
'CVE-2017-9900': ['Arbitrary code execution as user of application'],
'CVE-2017-9901': ['Arbitrary code execution as user of application'],
'CVE-2017-9902': ['Arbitrary code execution as user of application'],
'CVE-2017-9903': ['Arbitrary code execution as user of application'],
'CVE-2017-9904': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9905': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9906': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9907': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9908': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9909': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9910': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9911': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9912': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9913': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9914': ['Arbitrary code execution as user of application'],
'CVE-2017-9915': ['Arbitrary code execution as user of application'],
'CVE-2017-9916': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9917': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9918': ['Arbitrary code execution as user of application'],
'CVE-2017-9919': ['Arbitrary code execution as user of application'],
'CVE-2017-9920': ['Arbitrary code execution as user of application'],
'CVE-2017-9921': ['Arbitrary code execution as user of application'],
'CVE-2017-9922': ['Arbitrary code execution as user of application'],
'CVE-2017-9923': ['Arbitrary code execution as user of application'],
'CVE-2017-9924': ['Arbitrary code execution as user of application'],
'CVE-2017-9925': ['Arbitrary code execution as user of application'],
'CVE-2017-9926': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9927': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9930': ['System availability loss', 'System confidentiality loss', 'System integrity loss'],
'CVE-2017-9932': ['Gain user privileges on system'],
'CVE-2017-9933': ['Application confidentiality loss'],
'CVE-2017-9935': ['Arbitrary code execution as user of application'],
'CVE-2017-9948': ['Application availability loss', 'Application confidentiality loss',
'Application integrity loss'],
'CVE-2017-9949': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9953': ['Application availability loss'],
'CVE-2017-9977': ['Application integrity loss'],
'CVE-2017-9980': ['Arbitrary code execution as user of application'],
'CVE-2017-9982': ['Application availability loss'],
'CVE-2017-9984': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-9985': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-9986': ['System confidentiality loss', 'System integrity loss', 'System availability loss'],
'CVE-2017-9987': ['Application availability loss'],
'CVE-2017-9988': ['Application availability loss'],
'CVE-2017-9989': ['Application availability loss'],
'CVE-2017-9990': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9991': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9992': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9993': ['Application confidentiality loss'],
'CVE-2017-9994': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9995': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss'],
'CVE-2017-9996': ['Application confidentiality loss', 'Application integrity loss',
'Application availability loss']
}
class MyTestCase(unittest.TestCase):
def test_classifier(self):
dict_of_vulner = CVE_parser.parse('cve-data/nvdcve-1.0-2017.json')
for key in sorted(result_impacts):
print(key + ':')
print(classifier.classifier(dict_of_vulner[key]))
self.assertCountEqual(result_impacts[key], classifier.classifier(dict_of_vulner[key]), msg=key)
if __name__ == '__main__':
unittest.main()
| 71.649074 | 107 | 0.683854 | 28,660 | 259,298 | 6.186392 | 0.108549 | 0.120771 | 0.085927 | 0.169609 | 0.927158 | 0.82884 | 0.777013 | 0.763167 | 0.691013 | 0.305417 | 0 | 0.116291 | 0.174672 | 259,298 | 3,618 | 108 | 71.668878 | 0.7122 | 0.002634 | 0 | 0.149279 | 0 | 0 | 0.763311 | 0.074357 | 0 | 0 | 0 | 0 | 0.000277 | 1 | 0.000277 | false | 0 | 0.000832 | 0 | 0.001387 | 0.000555 | 0 | 0 | 0 | null | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
fa561e9d912c93d1fef140ea3e30060366f77314 | 30 | py | Python | AutoTinderAzure/sample.py | tafseerahmed/Auto-Tinder | 9110637c209eb78f4fb715069b9b153ca87d719e | [
"MIT"
] | null | null | null | AutoTinderAzure/sample.py | tafseerahmed/Auto-Tinder | 9110637c209eb78f4fb715069b9b153ca87d719e | [
"MIT"
] | 1 | 2021-12-13T19:53:00.000Z | 2021-12-13T19:53:00.000Z | AutoTinderAzure/sample.py | tafseerahmed/Auto-Tinder | 9110637c209eb78f4fb715069b9b153ca87d719e | [
"MIT"
] | null | null | null |
import sys
print(sys.version) | 10 | 18 | 0.8 | 5 | 30 | 4.8 | 0.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.1 | 30 | 3 | 18 | 10 | 0.888889 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.5 | 0 | 0.5 | 0.5 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 6 |
d7000db598534b0f485450adc4c98e46c7cd267b | 154 | py | Python | yalul/parsers/parse_errors.py | OtavioHenrique/yalul | ce99e32365ed5607527b9f2f39705ad5d9e20ba2 | [
"MIT"
] | 1 | 2021-04-01T20:22:36.000Z | 2021-04-01T20:22:36.000Z | yalul/parsers/parse_errors.py | OtavioHenrique/yalul | ce99e32365ed5607527b9f2f39705ad5d9e20ba2 | [
"MIT"
] | 1 | 2020-11-20T22:24:38.000Z | 2020-11-20T22:24:38.000Z | yalul/parsers/parse_errors.py | OtavioHenrique/yalul | ce99e32365ed5607527b9f2f39705ad5d9e20ba2 | [
"MIT"
] | null | null | null | class ParseErrors:
def __init__(self, errors):
self.errors = errors
def add_error(self, error):
return self.errors.append(error)
| 22 | 40 | 0.655844 | 19 | 154 | 5.052632 | 0.526316 | 0.3125 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.246753 | 154 | 6 | 41 | 25.666667 | 0.827586 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.4 | false | 0 | 0 | 0.2 | 0.8 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 6 |
d7128e34e62f372129ff894858ec967a0d38bef6 | 25 | py | Python | voilarm/__init__.py | ansarowsky/voilarm | 0ac5469b0613538dad1996f9a3057967fa7f4a07 | [
"MIT"
] | 1 | 2022-01-27T21:28:51.000Z | 2022-01-27T21:28:51.000Z | voilarm/__init__.py | ansarowsky/voilarm | 0ac5469b0613538dad1996f9a3057967fa7f4a07 | [
"MIT"
] | null | null | null | voilarm/__init__.py | ansarowsky/voilarm | 0ac5469b0613538dad1996f9a3057967fa7f4a07 | [
"MIT"
] | null | null | null | from .alarm import Alarm
| 12.5 | 24 | 0.8 | 4 | 25 | 5 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.16 | 25 | 1 | 25 | 25 | 0.952381 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
d72d434c29aabcdc3a9c6cdaa4b21bb5f9192e14 | 1,048 | py | Python | molecule/default/files/selenium-tests/test_platform.py | marvel-nccr/ansible-role-jupyter | 9031913c8c6064ddba054242480ee28a81d07a50 | [
"MIT"
] | null | null | null | molecule/default/files/selenium-tests/test_platform.py | marvel-nccr/ansible-role-jupyter | 9031913c8c6064ddba054242480ee28a81d07a50 | [
"MIT"
] | 9 | 2018-12-16T22:58:33.000Z | 2021-09-24T08:30:48.000Z | molecule/default/files/selenium-tests/test_platform.py | marvel-nccr/ansible-role-jupyter | 9031913c8c6064ddba054242480ee28a81d07a50 | [
"MIT"
] | 1 | 2019-05-01T14:18:22.000Z | 2019-05-01T14:18:22.000Z | #!/usr/bin/env python
from selenium.webdriver.common.by import By
def test_login(selenium, url):
selenium.get(url())
selenium.find_element(By.ID, 'ipython-main-app')
# selenium.find_element(By.ID, 'notebook-container')
# selenium.find_element(By.CLASS_NAME, 'jupyter-widgets-view')
# selenium.get_screenshot_as_file('screenshots/login.png')
def test_tree(selenium, url):
selenium.get(url('tree/'))
selenium.find_element(By.ID, 'ipython-main-app')
def test_tree_apps(selenium, url):
selenium.get(url('tree/apps'))
selenium.find_element(By.ID, 'ipython-main-app')
def test_apps(selenium, url):
selenium.get(url('apps/'))
selenium.find_element(By.ID, 'ipython-main-app')
def test_apps_home(selenium, url):
selenium.get(url('apps/apps/home/start.ipynb'))
selenium.find_element(By.ID, 'ipython-main-app')
# selenium.find_element(By.ID, 'notebook-container')
# selenium.find_element(By.CLASS_NAME, 'jupyter-widgets-view')
# selenium.get_screenshot_as_file('screenshots/home.png')
| 30.823529 | 66 | 0.72042 | 150 | 1,048 | 4.873333 | 0.253333 | 0.147743 | 0.233926 | 0.25855 | 0.841313 | 0.807114 | 0.648427 | 0.648427 | 0.648427 | 0.648427 | 0 | 0 | 0.120229 | 1,048 | 33 | 67 | 31.757576 | 0.792842 | 0.340649 | 0 | 0.3125 | 0 | 0 | 0.182749 | 0.038012 | 0 | 0 | 0 | 0 | 0 | 1 | 0.3125 | false | 0 | 0.0625 | 0 | 0.375 | 0 | 0 | 0 | 0 | null | 0 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
d77a2afc37f185f5a00039056bd5398d4870262f | 5,818 | py | Python | tests/test_migrate_logos.py | patymori/document-store-migracao | 1320ef58de1484ca8383c29c1fea55c4b2d89e67 | [
"BSD-2-Clause"
] | 1 | 2019-11-21T12:35:36.000Z | 2019-11-21T12:35:36.000Z | tests/test_migrate_logos.py | patymori/document-store-migracao | 1320ef58de1484ca8383c29c1fea55c4b2d89e67 | [
"BSD-2-Clause"
] | 336 | 2019-04-01T14:06:37.000Z | 2022-03-21T22:16:55.000Z | tests/test_migrate_logos.py | patymori/document-store-migracao | 1320ef58de1484ca8383c29c1fea55c4b2d89e67 | [
"BSD-2-Clause"
] | 4 | 2019-03-28T13:32:04.000Z | 2020-04-17T18:03:19.000Z | from unittest import TestCase, mock
from documentstore_migracao.main.migrate_logos import migrate_logos_parser
"""
migrate_logos --uri mongodb://0.0.0.0:27017/ --db document-store --websitedb ../data-webapp
usage: migrate_logos [-h] --uri URI --db DB --websitedb path
optional arguments:
-h, --help show this help message and exit
--uri URI URI to connect at MongoDB where the import will be
done, e.g: "mongodb://user:password@mongodb-
host/?authSource=admin"
--db DB Database name to import registers
--websitedb path
Path to SQLite Database from new website
"""
class TestMigrateLogosParser(TestCase):
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.base_parser")
@mock.patch("documentstore_migracao.main.migrate_logos.mongodb_parser")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser")
def test_argument_parser_description_and_mongodb_parser(
self,
MockArgumentParser,
mk_mongodb_parser,
mk_base_parser,
mk_migrate_logos_to_website,
mk_connect_to_databases,
):
command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split()
MockArgumentParser.return_value.parse_args.return_value.loglevel = "INFO"
migrate_logos_parser(command_args)
mk_mongodb_parser.assert_called_once_with(command_args)
MockArgumentParser.assert_called_once_with(
description="Journal Logos migration tool",
parents=[mk_base_parser.return_value, mk_mongodb_parser.return_value]
)
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser")
def test_calls_parser_parse_args_with_command_args(
self, MockArgumentParser, migrate_logos_to_website, mk_connect_to_databases
):
mk_parser = mock.MagicMock(name="MockArgParser")
mk_parser.parse_args.return_value.loglevel = "INFO"
MockArgumentParser.return_value = mk_parser
command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split()
migrate_logos_parser(command_args)
mk_parser.parse_args.assert_called_once_with(command_args)
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser")
def test_adds_website_db_argument(
self, MockArgumentParser, mk_migrate_logos_to_website, mk_connect_to_databases
):
mk_parser = mock.MagicMock(name="MockArgParser")
mk_parser.parse_args.return_value.loglevel = "INFO"
MockArgumentParser.return_value = mk_parser
command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split()
migrate_logos_parser(command_args)
mk_parser.add_argument.assert_any_call(
"--websitedb",
help='URI to connect at SQLite database of new website. e.g: "sqlite:////path/to/database.db"',
required=True,
)
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser")
def test_adds_website_img_dir_argument(
self, MockArgumentParser, mk_migrate_logos_to_website, mk_connect_to_databases
):
mk_parser = mock.MagicMock(name="MockArgParser")
mk_parser.parse_args.return_value.loglevel = "INFO"
MockArgumentParser.return_value = mk_parser
command_args = "--uri mongodb://0.0.0.0:27017/ --db opac --websitedb ../data-webapp --website_img_dir ../data-webapp/images".split()
migrate_logos_parser(command_args)
mk_parser.add_argument.assert_any_call(
"--website_img_dir",
help='Path to website images media directory',
required=True,
)
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser.error")
def test_no_mongodb_parser_args(
self, mk_parser_error, mk_migrate_logos_to_website, mk_connect_to_databases
):
command_args = "--websitedb ../data-webapp --website_img_dir ../data-webapp/images".split()
migrate_logos_parser(command_args)
mk_parser_error.assert_any_call(
"the following arguments are required: --uri, --db"
)
@mock.patch("documentstore_migracao.main.migrate_logos.connect_to_databases")
@mock.patch("documentstore_migracao.main.migrate_logos.migrate_logos_to_website")
@mock.patch("documentstore_migracao.main.migrate_logos.ArgumentParser.error")
def test_no_website_args(
self, mk_parser_error, mk_migrate_logos_to_website, mk_connect_to_databases
):
command_args = "--uri mongodb://0.0.0.0:27017/ --db opac".split()
migrate_logos_parser(command_args)
mk_parser_error.assert_any_call(
"the following arguments are required: --websitedb, --website_img_dir"
)
| 51.035088 | 140 | 0.723444 | 719 | 5,818 | 5.503477 | 0.141864 | 0.127369 | 0.132676 | 0.169826 | 0.766237 | 0.756887 | 0.725297 | 0.725297 | 0.705332 | 0.705332 | 0 | 0.011236 | 0.173943 | 5,818 | 113 | 141 | 51.486726 | 0.81211 | 0 | 0 | 0.588889 | 0 | 0.055556 | 0.402592 | 0.282501 | 0 | 0 | 0 | 0 | 0.077778 | 1 | 0.066667 | false | 0 | 0.022222 | 0 | 0.1 | 0 | 0 | 0 | 0 | null | 0 | 0 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
d7968e9a44b3fce497c523a0fcaa106f72f944e5 | 23 | py | Python | src/pydex/__init__.py | waikato-datamining/pydex | a7a9090d6e618e54d969cb3539d9c8d12acd7f4f | [
"MIT"
] | null | null | null | src/pydex/__init__.py | waikato-datamining/pydex | a7a9090d6e618e54d969cb3539d9c8d12acd7f4f | [
"MIT"
] | null | null | null | src/pydex/__init__.py | waikato-datamining/pydex | a7a9090d6e618e54d969cb3539d9c8d12acd7f4f | [
"MIT"
] | null | null | null | from ._client import *
| 11.5 | 22 | 0.73913 | 3 | 23 | 5.333333 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.173913 | 23 | 1 | 23 | 23 | 0.842105 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
ad085b310d8e8ac1452909dabf3079b8c7d802db | 159 | py | Python | costor_server/manager/admin.py | rphi/costor | 081de65778d404cf7a22c5524bf89a146fa8326b | [
"CNRI-Python"
] | 2 | 2019-12-31T16:49:36.000Z | 2021-02-17T09:47:41.000Z | costor_server/manager/admin.py | rphi/costor | 081de65778d404cf7a22c5524bf89a146fa8326b | [
"CNRI-Python"
] | null | null | null | costor_server/manager/admin.py | rphi/costor | 081de65778d404cf7a22c5524bf89a146fa8326b | [
"CNRI-Python"
] | null | null | null | from django.contrib import admin
from .models import Agent
# Register your models here.
@admin.register(Agent)
class AgentAdmin(admin.ModelAdmin):
pass
| 15.9 | 35 | 0.773585 | 21 | 159 | 5.857143 | 0.666667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.150943 | 159 | 9 | 36 | 17.666667 | 0.911111 | 0.163522 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0.2 | 0.4 | 0 | 0.6 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 1 | 0 | 0 | 6 |
ad138cdb9a9209cee34bbdd3f19ba87b7d62d4de | 57 | py | Python | libswitch/device/endpoint.py | liuyenting/libswitch | 38ed7debd7631a8d5deccef6a7165ffddd6e4a60 | [
"MIT"
] | null | null | null | libswitch/device/endpoint.py | liuyenting/libswitch | 38ed7debd7631a8d5deccef6a7165ffddd6e4a60 | [
"MIT"
] | null | null | null | libswitch/device/endpoint.py | liuyenting/libswitch | 38ed7debd7631a8d5deccef6a7165ffddd6e4a60 | [
"MIT"
] | null | null | null | class Endpoint(object):
def __init__():
pass
| 14.25 | 23 | 0.596491 | 6 | 57 | 5 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.298246 | 57 | 3 | 24 | 19 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.333333 | true | 0.333333 | 0 | 0 | 0.666667 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 6 |
ad4186ad3d29e1ade9436744abe41746871e3270 | 1,280 | py | Python | pygame_menu/widgets/widget/__init__.py | dcartman/pygame-menu | 52a823b9121aadd6893fb878150d613ab516fcac | [
"MIT"
] | null | null | null | pygame_menu/widgets/widget/__init__.py | dcartman/pygame-menu | 52a823b9121aadd6893fb878150d613ab516fcac | [
"MIT"
] | null | null | null | pygame_menu/widgets/widget/__init__.py | dcartman/pygame-menu | 52a823b9121aadd6893fb878150d613ab516fcac | [
"MIT"
] | null | null | null | """
pygame-menu
https://github.com/ppizarror/pygame-menu
WIDGET
This module contains the widgets of pygame-menu.
"""
from pygame_menu.widgets.widget.button import Button
from pygame_menu.widgets.widget.colorinput import ColorInput
from pygame_menu.widgets.widget.dropselect import DropSelect
from pygame_menu.widgets.widget.dropselect_multiple import DropSelectMultiple
from pygame_menu.widgets.widget.frame import Frame
from pygame_menu.widgets.widget.hmargin import HMargin
from pygame_menu.widgets.widget.image import Image
from pygame_menu.widgets.widget.label import Label
from pygame_menu.widgets.widget.menubar import MenuBar
from pygame_menu.widgets.widget.menulink import MenuLink
from pygame_menu.widgets.widget.none import NoneWidget
from pygame_menu.widgets.widget.progressbar import ProgressBar
from pygame_menu.widgets.widget.rangeslider import RangeSlider
from pygame_menu.widgets.widget.scrollbar import ScrollBar
from pygame_menu.widgets.widget.selector import Selector
from pygame_menu.widgets.widget.surface import SurfaceWidget
from pygame_menu.widgets.widget.table import Table
from pygame_menu.widgets.widget.textinput import TextInput
from pygame_menu.widgets.widget.toggleswitch import ToggleSwitch
from pygame_menu.widgets.widget.vmargin import VMargin
| 44.137931 | 77 | 0.867188 | 178 | 1,280 | 6.117978 | 0.213483 | 0.211203 | 0.257117 | 0.385675 | 0.514233 | 0.067952 | 0 | 0 | 0 | 0 | 0 | 0 | 0.073438 | 1,280 | 28 | 78 | 45.714286 | 0.918212 | 0.085156 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
ad85934bc26ebfd68d34882e9c02e1d5b6128096 | 44,708 | py | Python | lorabot/lorabot.py | aleksspevak/lorabot | fe13535289a7ddf73f9fa302d3a6809b9cc3df97 | [
"MIT"
] | 4 | 2022-03-09T15:57:50.000Z | 2022-03-30T04:24:33.000Z | lorabot/lorabot.py | aleksspevak/lorabot | fe13535289a7ddf73f9fa302d3a6809b9cc3df97 | [
"MIT"
] | null | null | null | lorabot/lorabot.py | aleksspevak/lorabot | fe13535289a7ddf73f9fa302d3a6809b9cc3df97 | [
"MIT"
] | 1 | 2022-03-09T20:21:12.000Z | 2022-03-09T20:21:12.000Z | import pandas as pd
import psycopg2
import os
from dotenv import load_dotenv
import plotly.express as px
from .lorabot_sql import *
from PIL import Image, ImageDraw
class LoraBot:
def __init__(self, bot_id):
"""
LoraBot is a tool for complex analyze users, messages and events in chatbots.
Parameters
----------
bot_id: str
the name of the bot that you specify in the code
Returns
-------
LoraBot object.
"""
load_dotenv()
self.conn = psycopg2.connect(
database=os.getenv('POSTGRES_DB'),
user=os.getenv('POSTGRES_USER'),
password=os.getenv('POSTGRES_PASSWORD'),
host=os.getenv('POSTGRES_HOST'),
port=os.getenv('POSTGRES_PORT'))
self.conn.autocommit = True
self.sql = sql_queries
self.check_db()
self.conn.autocommit = True
self.password = os.getenv('ANALYTICS_PASSWORD')
self.bot_id = bot_id
def check_db(self):
try:
cursor = self.conn.cursor()
cursor.execute(self.sql['check_schema_and_tables'])
value = cursor.fetchone()
if value[0] != 4:
cursor.execute(sql_ddl['create'])
cursor.close()
except Exception as error:
print("There are some problems in check_db function: ", error)
def check_password(self, password):
"""
Compare entered password with password that set in ".env" file.
Parameters
----------
password: str
entered password
Returns
-------
Return True if password is correct and False if not.
"""
if password == self.password:
return True
else:
return False
def _get_correct_database_query(self, query_name, add_date=False, message_type=None, event_type=None,
events_for_funnel=None, messages_for_funnel=None):
query = self.sql[query_name]
if add_date:
query = query.replace('''FROM lorabot.users WHERE bot_id = %(bot_id)s''',
'''FROM lorabot.users WHERE bot_id = %(bot_id)s
and user_time between %(period_start)s and %(period_end)s''')
query = query.replace('''FROM lorabot.messages WHERE bot_id = %(bot_id)s''',
'''FROM lorabot.messages WHERE bot_id = %(bot_id)s
and message_time between %(period_start)s and %(period_end)s''')
query = query.replace('''FROM lorabot.events WHERE bot_id = %(bot_id)s''',
'''FROM lorabot.events WHERE bot_id = %(bot_id)s
and event_time between %(period_start)s and %(period_end)s''')
query = query.replace('''FROM lorabot.bot_rating WHERE bot_id = %(bot_id)s''',
'''FROM lorabot.bot_rating WHERE bot_id = %(bot_id)s
and rate_time between %(period_start)s and %(period_end)s''')
if message_type is not None:
query = query.replace('bot_id = %(bot_id)s', 'bot_id = %(bot_id)s and message_type = %(message_type)s ')
if event_type is not None:
query = query.replace('bot_id = %(bot_id)s', 'bot_id = %(bot_id)s and event_type = %(event_type)s ')
if events_for_funnel is not None:
query = query.replace('bot_id = %(bot_id)s',
f'''bot_id = %(bot_id)s and event in ({"'" + "','".join(events_for_funnel) + "'"}) ''')
if messages_for_funnel is not None:
query = query.replace('bot_id = %(bot_id)s',
f'''bot_id = %(bot_id)s and message in ({"'" + "','".join(messages_for_funnel) + "'"} )''')
return query
def user(self, user_id, language_code):
"""
Insert new user to database.
Parameters
----------
user_id: str
unique telegram user ID
language_code: str
user's language_code
Returns
-------
Nothing.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('user_check')
cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id})
if cursor.fetchone() is None:
query = self._get_correct_database_query('user_insert')
cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'language_code': language_code})
cursor.close()
except Exception as error:
print("There are some problems in user function: ", error)
def message(self, message, message_type, user_id):
"""
Insert new message to database.
Parameters
----------
message: str
message from user
message_type: str
type of message from the user
user_id: str
unique telegram user ID
Returns
-------
Nothing.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('message')
cursor.execute(query,
{'user_id': user_id, 'bot_id': self.bot_id, 'message': message,
'message_type': message_type})
cursor.close()
except Exception as error:
print("There are some problems in message function: ", error)
def event(self, event, event_type, user_id):
"""
Insert new event to database.
Parameters
----------
event: str
event from user
event_type: str
type of event from the user
user_id: str
unique telegram user ID
Returns
-------
Nothing.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('event')
cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'event': event, 'event_type': event_type})
cursor.close()
except Exception as error:
print("There are some problems in event function: ", error)
def assessment(self, assessment, user_id):
"""
Insert new assessment to database.
Parameters
----------
assessment: int
assessment from user to bot
user_id: str
unique telegram user ID
Returns
-------
Nothing.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('assessment')
cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'assessment': assessment})
cursor.close()
except Exception as error:
print("There are some problems in assessment function: ", error)
def review(self, review, user_id):
"""
Insert new review to database.
Parameters
----------
review: int
review from user to bot
user_id: str
unique telegram user ID
Returns
-------
Nothing.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('review')
cursor.execute(query, {'user_id': user_id, 'bot_id': self.bot_id, 'review': review})
cursor.close()
except Exception as error:
print("There are some problems in review function: ", error)
def analyze_total(self, period_start=None, period_end=None):
"""
Analyze total users, messages, events.
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Head metrics about chatbot.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_total', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(), columns=[desc[0] for desc in cursor.description])
cursor.close()
text = 'Total information:\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return text
except Exception as error:
print("There are some problems in analyze_total function: ", error)
return 'Error(maybe in varaibles)'
def analyze_user_number_accumulation(self, period_start=None, period_end=None):
"""
Analyze number of users with accumulation
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_user_number_accumulation', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Number of users with accumulation")
photo = fig.to_image(format="png")
cursor.close()
text = 'Number of users with accumulation:\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_user_number_accumulation function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_new_user(self, period_start=None, period_end=None):
"""
Analyze number of new registered users
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_new_user', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="New users")
photo = fig.to_image(format="png")
cursor.close()
text = 'New users\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_new_user function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_hour_activity(self, period_start=None, period_end=None):
"""
Analyze number of message by hours activity
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_hour_activity', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
data['hour'] = data['hour'].astype(str)
data = data.set_index('hour')
fig = px.imshow(data, text_auto=True, aspect="auto", title="Hour Activity")
photo = fig.to_image(format="png")
cursor.close()
return photo
except Exception as error:
print("There are some problems in analyze_hour_activity function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img
def analyze_dau(self, period_start=None, period_end=None):
"""
Analyze number of active users by days
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_dau', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily active users")
photo = fig.to_image(format="png")
cursor.close()
text = 'Daily active users\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_dau function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_wau(self, period_start=None, period_end=None):
"""
Analyze number of active users by weeks
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_wau', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Weekly active users")
photo = fig.to_image(format="png")
cursor.close()
text = 'Weekly active users\n'
for i in range(len(data)):
text += f'Week #{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_wau function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_mau(self, period_start=None, period_end=None):
"""
Analyze number of active users by month
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_mau', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Monthly active users")
photo = fig.to_image(format="png")
cursor.close()
text = 'Monthly active users\n'
for i in range(len(data)):
text += f'Month #{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_mau function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_yau(self, period_start=None, period_end=None):
"""
Analyze number of active users by year
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_yau', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Yearly active users")
photo = fig.to_image(format="png")
cursor.close()
text = 'Yearly active users\n'
for i in range(len(data)):
text += f'Year #{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_yau function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_messages_number(self, period_start=None, period_end=None, message_type=None):
"""
Analyze number of messages by days
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
message_type: str
type of message
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_messages_number', add_date, message_type=message_type)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,
'period_end': period_end, 'message_type': message_type})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily messages")
photo = fig.to_image(format="png")
cursor.close()
if message_type is None:
text = 'Daily messages\n'
else:
text = f'Daily messages with type {message_type}\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_messages_number function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_messages(self, period_start=None, period_end=None, message_type=None, volume=100):
"""
Analyze messages
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
message_type: str
type of message
volume:
number of messages to show
Returns
-------
Information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_messages', add_date, message_type=message_type)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,
'period_end': period_end, 'message_type': message_type})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
cursor.close()
data = data[:volume]
if message_type is None:
text = 'Messages\n'
else:
text = f'Messages with type {message_type}\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return text
except Exception as error:
print("There are some problems in analyze_messages function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_messages_type(self, period_start=None, period_end=None):
"""
Analyze messages by types
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_messages_type', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.pie(data, values='amount', names='type', title="Types of messages")
photo = fig.to_image(format="png")
cursor.close()
text = f'Types of messages\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_messages_type function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_messages_funnel(self, messages_for_funnel, period_start=None, period_end=None):
"""
Create funnel for messages
Parameters
----------
messages_for_funnel: list of str
array of messages in right order for funnel
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
if messages_for_funnel is None:
return "You didn't set events for funnel"
query = self._get_correct_database_query('analyze_messages_funnel', add_date,
messages_for_funnel=messages_for_funnel)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = cursor.fetchall()
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
sort_data = []
message_funnel = []
for message_for_position in messages_for_funnel:
for values in data:
if message_for_position == values[0]:
message_funnel.append(values[0])
sort_data.append(values[1])
data = dict(
number=sort_data,
message=message_funnel)
fig = px.funnel(data, x='number', y='message', title='Funnel of messages')
photo = fig.to_image(format="png")
cursor.close()
text = f'Funnel of messages\n'
for message, number in zip(message_funnel, sort_data):
text += f'{message} {number}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_messages_funnel function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_events_number(self, period_start=None, period_end=None, event_type=None):
"""
Analyze number of events by days
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
event_type: str
type of event
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_events_number', add_date, event_type=event_type)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,
'period_end': period_end, 'event_type': event_type})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.bar(data, x=data['date'], y=data['amount'], title="Daily events with type")
photo = fig.to_image(format="png")
cursor.close()
if event_type is None:
text = 'Daily events\n'
else:
text = f'Daily events with type {event_type}\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_events_number function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_events(self, period_start=None, period_end=None, event_type=None, volume=100):
"""
Analyze events
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
event_type: str
type of events
volume:
number of messages to show
Returns
-------
Information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_events', add_date, event_type=event_type)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,
'period_end': period_end, 'event_type': event_type})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
data = data[:volume]
cursor.close()
if event_type is None:
text = 'Events\n'
else:
text = f'Events with type {event_type}\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return text
except Exception as error:
print("There are some problems in analyze_events function: ", error)
return 'Error(maybe in varaibles)'
def analyze_events_type(self, period_start=None, period_end=None):
"""
Analyze events by types
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_events_type', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.pie(data, values='amount', names='type', title='Types of events')
photo = fig.to_image(format="png")
cursor.close()
text = f'Types of events\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_events_type function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_events_funnel(self, events_for_funnel=None, period_start=None, period_end=None):
"""
Create funnel for events
Parameters
----------
events_for_funnel: list of str
array of events in right order for funnel
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
if events_for_funnel is None:
return "You didn't set events for funnel"
query = self._get_correct_database_query('analyze_events_funnel', add_date,
events_for_funnel=events_for_funnel)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = cursor.fetchall()
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
sort_data = []
event_funnel = []
for event_for_position in events_for_funnel:
for values in data:
if event_for_position == values[0]:
event_funnel.append(values[0])
sort_data.append(values[1])
data = dict(
number=sort_data,
event=event_funnel)
fig = px.funnel(data, x='number', y='event', title='Funnel of events')
photo = fig.to_image(format="png")
cursor.close()
text = f'Funnel of events\n'
for event, number in zip(event_funnel, sort_data):
text += f'{event} {number}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_events_funnel function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_assessment(self, period_start=None, period_end=None):
"""
Analyze assessment
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_assessment', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.pie(data, values='amount', names='assessment', title='Assessment')
photo = fig.to_image(format="png")
cursor.close()
text = f'Assessment\n'
for i in range(len(data)):
text += f'Rate {data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_assessment function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_review(self, period_start=None, period_end=None, volume=5):
"""
Analyze review
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
volume:
number of review to show
Returns
-------
Information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_review', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start, 'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
cursor.close()
text = f'Review\n'
data = data[:volume]
for i in range(len(data)):
text += f'#{i+1} {data.iloc[i, 0]}\n'
return text
except Exception as error:
print("There are some problems in analyze_review function: ", error)
return 'Error(maybe in varaibles)'
def analyze_language(self, period_start=None, period_end=None):
"""
Analyze what language users use
Parameters
----------
period_start: str
beginning of the analysis period
period_end: str
end of the analysis period
Returns
-------
Photo in bytes format and information in string format.
"""
try:
cursor = self.conn.cursor()
if period_start is not None and period_end is not None:
add_date = True
else:
add_date = False
query = self._get_correct_database_query('analyze_language', add_date)
cursor.execute(query, {'bot_id': self.bot_id, 'period_start': period_start,'period_end': period_end})
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
if len(data) == 0:
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Nothing")
return img, 'No data'
fig = px.pie(data, values='amount', names='type', title='Language')
photo = fig.to_image(format="png")
cursor.close()
text = 'Language\n'
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return photo, text
except Exception as error:
print("There are some problems in analyze_language function: ", error)
img = Image.new('RGB', (100, 100))
d = ImageDraw.Draw(img)
d.text((40, 45), "Error")
return img, 'Error(maybe in varaibles)'
def analyze_bots_users(self):
"""
Analyze number of users in all bots
Returns
-------
Information in string format.
"""
try:
cursor = self.conn.cursor()
query = self._get_correct_database_query('analyze_bots_users')
cursor.execute(query)
data = pd.DataFrame.from_records(cursor.fetchall(),
columns=[desc[0] for desc in cursor.description])
text = "Bot's users\n"
for i in range(len(data)):
text += f'{data.iloc[i, 0]} {data.iloc[i, 1]}\n'
return text
except Exception as error:
print("There are some problems in analyze_bots_users function: ", error)
return 'Error'
def sql_query(self, query):
"""
Run SQL queries in database.
Parameters
----------
query: str
query for analysis
Returns
-------
Information in string format.
"""
try:
cursor = self.conn.cursor()
cursor.execute(query)
data = cursor.fetchall()
columns = [desc[0] for desc in cursor.description]
text = 'Answer:\n'
text = text + " ".join(columns) + "\n"
for i in data:
row = ''
for j in i:
row += f'{str(j)} '
text += f"{row}\n"
cursor.close()
return text
except Exception as error:
print("There are some problems in sql function: ", error)
| 39.634752 | 125 | 0.520421 | 5,109 | 44,708 | 4.407908 | 0.043061 | 0.048357 | 0.016785 | 0.03206 | 0.851776 | 0.832327 | 0.827931 | 0.814032 | 0.800266 | 0.768295 | 0 | 0.014111 | 0.37387 | 44,708 | 1,127 | 126 | 39.66992 | 0.790376 | 0.149213 | 0 | 0.691751 | 0 | 0 | 0.164674 | 0.011725 | 0 | 0 | 0 | 0 | 0 | 1 | 0.043415 | false | 0.005789 | 0.01013 | 0 | 0.143271 | 0.039074 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
a8e5b8ea023a379a8155b7d5446f567030b899fa | 20,582 | py | Python | Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py | SergeBakharev/content | d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf | [
"MIT"
] | 1 | 2020-11-25T00:42:27.000Z | 2020-11-25T00:42:27.000Z | Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py | SergeBakharev/content | d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf | [
"MIT"
] | 35 | 2022-03-14T12:40:27.000Z | 2022-03-31T01:50:51.000Z | Packs/Gurucul/Integrations/GuruculGRA/GuruculGRA_test.py | SergeBakharev/content | d66cc274f5bf6f9f0e9ed7e4df1af7b6f305aacf | [
"MIT"
] | 2 | 2021-12-13T13:07:21.000Z | 2022-03-05T02:23:34.000Z | import json
import io
def util_load_json(path):
with io.open(path, mode='r', encoding='utf-8') as f:
return json.loads(f.read())
def test_gra_fetch_users(requests_mock):
"""Unit test
Given
- fetch gra users
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-users.json')
requests_mock.get('https://test.com/api/users',
json=mock_response)
api_url = '/users'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Users', 'employeeId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Users'
assert response.outputs_key_field == 'employeeId'
def test_gra_fetch_accounts(requests_mock):
"""Unit test
Given
- fetch gra accounts
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-accounts.json')
requests_mock.get('https://test.com/api/accounts',
json=mock_response)
api_url = '/accounts'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_fetch_active_resource_accounts(requests_mock):
"""Unit test
Given
- fetch gra active resource accounts
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-active-resource-accounts.json')
requests_mock.get('https://test.com/api/resources/Linux/accounts',
json=mock_response)
api_url = '/resources/Linux/accounts'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Active.Resource.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Active.Resource.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_fetch_user_accounts(requests_mock):
"""Unit test
Given
- fetch gra users accounts
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-user-accounts.json')
requests_mock.get('https://test.com/api/users/AB1234/accounts',
json=mock_response)
api_url = '/users/AB1234/accounts'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.User.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.User.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_fetch_resource_highrisk_accounts(requests_mock):
"""Unit test
Given
- fetch gra resource high risk accounts
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-resource-highrisk-accounts.json')
requests_mock.get('https://test.com/api/resources/Linux/accounts/highrisk',
json=mock_response)
api_url = '/resources/Linux/accounts/highrisk'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Resource.Highrisk.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Resource.Highrisk.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_fetch_hpa(requests_mock):
"""Unit test
Given
- fetch high privileged accounts
- command args page , max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-hpa.json')
requests_mock.get('https://test.com/api/accounts/highprivileged',
json=mock_response)
api_url = '/accounts/highprivileged'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Hpa', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Hpa'
assert response.outputs_key_field == 'id'
def test_gra_fetch_resource_hpa(requests_mock):
"""Unit test
Given
- fetch high privileged accounts for resource
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-resource-hpa.json')
requests_mock.get('https://test.com/api/resources/Linux/accounts/highprivileged',
json=mock_response)
api_url = '/resources/Linux/accounts/highprivileged'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Resource.Hpa', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Resource.Hpa'
assert response.outputs_key_field == 'id'
def test_gra_fetch_orphan_accounts(requests_mock):
"""Unit test
Given
- fetch orphan accounts
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-orphan-accounts.json')
requests_mock.get('https://test.com/api/accounts/orphan',
json=mock_response)
api_url = '/accounts/orphan'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Orphan.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Orphan.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_fetch_resource_orphan_accounts(requests_mock):
"""Unit test
Given
- fetch orphan accounts for resource
- command args page, max, resource
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-resource-orphan-accounts.json')
requests_mock.get('https://test.com/api/resources/Linux/accounts/orphan',
json=mock_response)
api_url = '/resources/Linux/accounts/orphan'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Resource.Orphan.Accounts', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Resource.Orphan.Accounts'
assert response.outputs_key_field == 'id'
def test_gra_user_activities(requests_mock):
"""Unit test
Given
- fetch gra user activities
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-user-activities.json')
requests_mock.get('https://test.com/api/user/AB1234/activity',
json=mock_response)
api_url = '/user/AB1234/activity'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.User.Activity', 'id', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.User.Activity'
assert response.outputs_key_field == 'id'
def test_fetch_gra_users_details(requests_mock):
"""Unit test
Given
- fetch gra user details
- command args page, max, employeeId
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-fetch-users-details.json')
requests_mock.get('https://test.com/api/users/AB1234',
json=mock_response)
api_url = '/users/AB1234'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.User', 'employeeId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.User'
assert response.outputs_key_field == 'employeeId'
def test_gra_highRisk_users(requests_mock):
"""Unit test
Given
- fetch gra high risk users
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-highRisk-users.json')
requests_mock.get('https://test.com/api/users/highrisk',
json=mock_response)
api_url = '/users/highrisk'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Highrisk.Users', 'employeeId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Highrisk.Users'
assert response.outputs_key_field == 'employeeId'
def test_gra_cases(requests_mock):
"""Unit test
Given
- fetch gra cases as per status
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-cases.json')
requests_mock.get('https://test.com/api/cases/OPEN',
json=mock_response)
api_url = '/cases/OPEN'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, api_url, 'Gra.Cases', 'caseId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Cases'
assert response.outputs_key_field == 'caseId'
def test_fetch_user_anomalies(requests_mock):
"""Unit test
Given
- fetch gra user anomalies
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra fetch users command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-user-anomalies.json')
requests_mock.get('https://test.com/api/users/AB1234/anomalies/',
json=mock_response)
anomaly_url = '/users/AB1234/anomalies/'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, anomaly_url, 'Gra.User.Anomalies', 'anomaly_name', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.User.Anomalies'
assert response.outputs_key_field == 'anomaly_name'
def test_module(mocker):
"""
Given
- Gurucul GRA test application
When
- mock the demisto params.
- mock the Client's generate_token
Then
- run the test_module command using the Client
Validate The response is ok.
"""
from GuruculGRA import Client, test_module_command
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
mocker.patch.object(client, 'validate_api_key')
result = test_module_command(client)
assert result == 'ok'
def test_gra_case_action(requests_mock):
"""Unit test
Given
- gra case action
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra case action command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-case-action.json')
requests_mock.get('https://test.com/api/cases/closeCase',
json=mock_response)
cases_url = '/cases/closeCase'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, cases_url, 'Gra.Case.Action', 'caseId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Case.Action'
assert response.outputs_key_field == 'caseId'
def test_gra_case_action_anomaly(requests_mock):
"""Unit test
Given
- gra case action
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra case action anomaly command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-case-action-anomaly.json')
requests_mock.get('https://test.com/api/cases/closeCaseAnomaly',
json=mock_response)
cases_url = '/cases/closeCaseAnomaly'
params = {'page': 1, 'max': 10}
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, cases_url, 'Gra.Cases.Action.Anomaly', 'caseId', params)
assert response.outputs == mock_response
assert response.outputs_prefix == 'Gra.Cases.Action.Anomaly'
assert response.outputs_key_field == 'caseId'
def test_gra_investigate_anomaly_summary(requests_mock):
"""Unit test
Given
- gra investigate anomaly summary
- command args page, max
- command raw response
When
- mock the Client's send_request.
Then
- run the gra investigate anomaly summary command using the Client
Validate the output with mock response
Validate the output prefix
Validate key field
"""
from GuruculGRA import Client, fetch_record_command
mock_response = util_load_json('test_data/gra-investigate-anomaly-summary.json')
requests_mock.get('https://test.com/api/investigateAnomaly/anomalySummary/ModelName',
json=mock_response)
investigateAnomaly_url = '/investigateAnomaly/anomalySummary/ModelName'
client = Client(
base_url='https://test.com/api',
verify=False,
headers={
'Authentication': 'Bearer some_api_key'
}
)
response = fetch_record_command(client, investigateAnomaly_url, 'Gra.Investigate.Anomaly.Summary', 'modelId', None)
mock_response_array = []
mock_response_array.append(mock_response)
assert response.outputs == mock_response_array
assert response.outputs_prefix == 'Gra.Investigate.Anomaly.Summary'
assert response.outputs_key_field == 'modelId'
| 34.649832 | 119 | 0.643426 | 2,464 | 20,582 | 5.195617 | 0.048701 | 0.066552 | 0.083659 | 0.041009 | 0.901265 | 0.877753 | 0.860725 | 0.843306 | 0.792064 | 0.767693 | 0 | 0.005347 | 0.263969 | 20,582 | 593 | 120 | 34.708263 | 0.839725 | 0.236955 | 0 | 0.527778 | 0 | 0 | 0.256735 | 0.085888 | 0 | 0 | 0 | 0 | 0.160494 | 1 | 0.058642 | false | 0 | 0.061728 | 0 | 0.123457 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
0f0b2c5617016da3c2538d18397a8d81cf590084 | 54 | py | Python | playground2.py | cjdjr/cosp_nas | f54243176e8398d79df25d295704f24238f24cc7 | [
"MIT"
] | 3 | 2021-12-09T18:59:40.000Z | 2021-12-09T19:00:08.000Z | playground2.py | cjdjr/cosp_nas | f54243176e8398d79df25d295704f24238f24cc7 | [
"MIT"
] | null | null | null | playground2.py | cjdjr/cosp_nas | f54243176e8398d79df25d295704f24238f24cc7 | [
"MIT"
] | null | null | null | from playground1 import *
def work():
print(get()) | 18 | 25 | 0.666667 | 7 | 54 | 5.142857 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.022727 | 0.185185 | 54 | 3 | 26 | 18 | 0.795455 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.333333 | true | 0 | 0.333333 | 0 | 0.666667 | 0.333333 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
0f0ee4c088d03aef743e69f1952dcbac96a88a7e | 115 | py | Python | tests/__init__.py | burninghelix123/sequences | 0ab976de94b23a2ce8b0880092dcd0e930543756 | [
"0BSD"
] | null | null | null | tests/__init__.py | burninghelix123/sequences | 0ab976de94b23a2ce8b0880092dcd0e930543756 | [
"0BSD"
] | 1 | 2017-01-23T18:01:27.000Z | 2017-06-13T20:48:58.000Z | tests/__init__.py | burninghelix123/sequences | 0ab976de94b23a2ce8b0880092dcd0e930543756 | [
"0BSD"
] | null | null | null | # -*- coding: utf-8 -*-
import test_filestructure # NOQA
import test_sequences # NOQA
| 23 | 44 | 0.53913 | 11 | 115 | 5.454545 | 0.727273 | 0.333333 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.013699 | 0.365217 | 115 | 4 | 45 | 28.75 | 0.808219 | 0.269565 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
7e1d03af38b8db1d42e68ac4633056f2567696f7 | 169 | py | Python | avb/__init__.py | markreidvfx/pyavb | 48b05a84ff9752703a9218d5ca157ee672b020ab | [
"MIT"
] | 21 | 2019-02-05T22:08:32.000Z | 2022-03-07T03:37:59.000Z | avb/__init__.py | markreidvfx/pyavb | 48b05a84ff9752703a9218d5ca157ee672b020ab | [
"MIT"
] | 10 | 2019-07-25T04:03:44.000Z | 2021-08-12T21:31:37.000Z | avb/__init__.py | markreidvfx/pyavb | 48b05a84ff9752703a9218d5ca157ee672b020ab | [
"MIT"
] | 1 | 2020-02-20T15:08:40.000Z | 2020-02-20T15:08:40.000Z | from .file import AVBFile as open
from . import bin
from . import attributes
from . import components
from . import trackgroups
from . import essence
from . import misc
| 21.125 | 33 | 0.781065 | 24 | 169 | 5.5 | 0.5 | 0.454545 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.177515 | 169 | 7 | 34 | 24.142857 | 0.94964 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
7e424aee1346568b8dd267806e9fea0528e9a986 | 128 | py | Python | database/db.py | Kaneki1416/kenKaneki | cdd59c18b74d559d277b736e5e536884ce4e9499 | [
"MIT"
] | 1 | 2022-01-11T21:59:34.000Z | 2022-01-11T21:59:34.000Z | database/db.py | Kaneki1416/kenKaneki | cdd59c18b74d559d277b736e5e536884ce4e9499 | [
"MIT"
] | 1 | 2022-01-22T14:40:01.000Z | 2022-01-22T14:40:59.000Z | database/db.py | Kaneki1416/kenKaneki | cdd59c18b74d559d277b736e5e536884ce4e9499 | [
"MIT"
] | 4 | 2021-11-19T12:45:56.000Z | 2022-02-12T03:28:44.000Z | from .chat_database import ChatDB
from .sudo_database import SudoDB
class Methods(ChatDB, SudoDB):
pass
dbs = Methods()
| 12.8 | 33 | 0.75 | 17 | 128 | 5.529412 | 0.647059 | 0.297872 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.179688 | 128 | 9 | 34 | 14.222222 | 0.895238 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0.2 | 0.4 | 0 | 0.6 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 6 |
0e4d89d423e8516b79dbd1f1e5179e17ac0a8ef9 | 50 | py | Python | snippets/python-version.py | district10/snippet-manager | bebe45a601368947168e3ee6e6ab8c1fc2ee2055 | [
"MIT"
] | 7 | 2018-08-04T09:28:19.000Z | 2020-10-19T17:46:34.000Z | snippets/python-version.py | district10/snippet-manager | bebe45a601368947168e3ee6e6ab8c1fc2ee2055 | [
"MIT"
] | null | null | null | snippets/python-version.py | district10/snippet-manager | bebe45a601368947168e3ee6e6ab8c1fc2ee2055 | [
"MIT"
] | 2 | 2018-07-31T04:14:55.000Z | 2020-04-02T01:22:39.000Z | # python sys version
import sys
print sys.version
| 12.5 | 20 | 0.8 | 8 | 50 | 5 | 0.625 | 0.5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.16 | 50 | 3 | 21 | 16.666667 | 0.952381 | 0.36 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | null | 0 | 0.5 | null | null | 0.5 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 6 |
0e655c4d101a95eeabef2ce9e5997f268ef321ca | 171 | py | Python | openmldefaults/symbolic/__init__.py | pfistfl/openml-defaults | 0678167f807512bd0c957f82a83ff8181461090c | [
"BSD-3-Clause"
] | 1 | 2019-08-01T13:44:47.000Z | 2019-08-01T13:44:47.000Z | openmldefaults/symbolic/__init__.py | pfistfl/openml-defaults | 0678167f807512bd0c957f82a83ff8181461090c | [
"BSD-3-Clause"
] | null | null | null | openmldefaults/symbolic/__init__.py | pfistfl/openml-defaults | 0678167f807512bd0c957f82a83ff8181461090c | [
"BSD-3-Clause"
] | 1 | 2019-08-29T15:54:38.000Z | 2019-08-29T15:54:38.000Z |
from .transform import ABCTransformer, all_transform_fns
from .configuration_wrapper import ConfigurationSampler, VanillaConfigurationSpaceSampler, SymbolicConfiguration
| 42.75 | 112 | 0.900585 | 14 | 171 | 10.785714 | 0.785714 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.070175 | 171 | 3 | 113 | 57 | 0.949686 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
7d4f60590780fc7d15147fd78c32817e8e258cc0 | 21,385 | py | Python | src/genie/libs/parser/ios/tests/test_show_lisp.py | nujo/genieparser | 083b01efc46afc32abe1a1858729578beab50cd3 | [
"Apache-2.0"
] | 2 | 2021-01-27T03:37:39.000Z | 2021-01-27T03:40:50.000Z | src/genie/libs/parser/ios/tests/test_show_lisp.py | nujo/genieparser | 083b01efc46afc32abe1a1858729578beab50cd3 | [
"Apache-2.0"
] | 1 | 2020-08-01T00:23:31.000Z | 2020-08-01T00:40:05.000Z | src/genie/libs/parser/ios/tests/test_show_lisp.py | nujo/genieparser | 083b01efc46afc32abe1a1858729578beab50cd3 | [
"Apache-2.0"
] | null | null | null |
# Python
import unittest
from unittest.mock import Mock
# ATS
from pyats.topology import Device
from pyats.topology import loader
# Metaparser
from genie.metaparser.util.exceptions import SchemaEmptyParserError, SchemaMissingKeyError
# ios show_lisp
from genie.libs.parser.ios.show_lisp import ShowLispSession,\
ShowLispPlatform,\
ShowLispExtranet,\
ShowLispDynamicEidDetail,\
ShowLispService,\
ShowLispServiceMapCache,\
ShowLispServiceRlocMembers,\
ShowLispServiceSmr,\
ShowLispServiceSummary,\
ShowLispServiceDatabase,\
ShowLispServiceServerSummary,\
ShowLispServiceServerDetailInternal,\
ShowLispServiceStatistics
# iosxe tests/test_show_lisp
from genie.libs.parser.iosxe.tests.test_show_lisp import \
test_show_lisp_session as test_show_lisp_session_iosxe,\
test_show_lisp_platform as test_show_lisp_platform_iosxe,\
test_show_lisp_extranet as test_show_lisp_extranet_iosxe,\
test_show_lisp_dynamic_eid_detail as test_show_lisp_dynamic_eid_detail_iosxe,\
test_show_lisp_service as test_show_lisp_service_iosxe,\
test_show_lisp_service_map_cache as test_show_lisp_service_map_cache_iosxe,\
test_show_lisp_service_rloc_members as test_show_lisp_service_rloc_members_iosxe,\
test_show_lisp_service_smr as test_show_lisp_service_smr_iosxe,\
test_show_lisp_service_summary as test_show_lisp_service_summary_iosxe,\
test_show_lisp_service_database as test_show_lisp_service_database_iosxe,\
test_show_lisp_service_server_summary as test_show_lisp_service_server_summary_iosxe,\
test_show_lisp_service_server_detail_internal as test_show_lisp_service_server_detail_internal_iosxe,\
test_show_lisp_service_statistics as test_show_lisp_service_statistics_iosxe
# =================================
# Unit test for 'show lisp session'
# =================================
class test_show_lisp_session(test_show_lisp_session_iosxe):
def test_show_lisp_session_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispSession(device=self.device)
parsed_output = obj.parse()
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_session_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispSession(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse()
# ==================================
# Unit test for 'show lisp platform'
# ==================================
class test_show_lisp_platform(test_show_lisp_platform_iosxe):
def test_show_lisp_platform_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispPlatform(device=self.device)
parsed_output = obj.parse()
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_platform_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispPlatform(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse()
# ===========================================================================
# Unit test for 'show lisp all extranet <extranet> instance-id <instance_id>'
# ===========================================================================
class test_show_lisp_extranet(test_show_lisp_extranet_iosxe):
def test_show_lisp_extranet_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispExtranet(device=self.device)
parsed_output = obj.parse(extranet='ext1', instance_id='103')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_extranet_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispExtranet(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(extranet='ext1', instance_id='103')
# ==========================================================================
# Unit test for 'show lisp all instance-id <instance_id> dynamic-eid detail'
# ==========================================================================
class test_show_lisp_dynamic_eid_detail(test_show_lisp_dynamic_eid_detail_iosxe):
def test_show_lisp_dynamic_eid_detail_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispDynamicEidDetail(device=self.device)
parsed_output = obj.parse(instance_id=101)
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_dynamic_eid_detail_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispDynamicEidDetail(device=self.device)
parsed_output = obj.parse(instance_id=101)
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_dynamic_eid_detail_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispDynamicEidDetail(device=self.device)
parsed_output = obj.parse(instance_id=101)
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_dynamic_eid_detail_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispDynamicEidDetail(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(instance_id=101)
# =================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service>'
# =================================================================
class test_show_lisp_service(test_show_lisp_service_iosxe):
def test_show_lisp_service_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ethernet')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_full4(self):
self.maxDiff = None
self.device = Mock(**self.golden_output4)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output4)
def test_show_lisp_service_full5(self):
self.maxDiff = None
self.device = Mock(**self.golden_output5)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output5)
def test_show_lisp_service_full6(self):
self.maxDiff = None
self.device = Mock(**self.golden_output6)
obj = ShowLispService(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ethernet')
self.assertEqual(parsed_output, self.golden_parsed_output6)
def test_show_lisp_service_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispService(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(instance_id='*', service='ipv4')
# ===========================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> map-cache'
# ===========================================================================
class test_show_lisp_service_map_cache(test_show_lisp_service_map_cache_iosxe):
def test_show_lisp_service_map_cache_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceMapCache(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_map_cache_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceMapCache(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_map_cache_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceMapCache(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ethernet')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_map_cache_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceMapCache(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(instance_id='*', service='ipv4')
# ==============================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> rloc members'
# ==============================================================================
class test_show_lisp_service_rloc_members(test_show_lisp_service_rloc_members_iosxe):
def test_show_lisp_service_rloc_members_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceRlocMembers(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_rloc_members_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceRlocMembers(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_rloc_members_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceRlocMembers(device=self.device)
parsed_output = obj.parse(instance_id='*', service='ethernet')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_rloc_members_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceRlocMembers(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(instance_id='*', service='ipv4')
# =====================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> smr'
# =====================================================================
class test_show_lisp_service_smr(test_show_lisp_service_smr_iosxe):
def test_show_lisp_service_smr_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceSmr(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_smr_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceSmr(device=self.device)
parsed_output = obj.parse(instance_id=101, service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_smr_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceSmr(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(instance_id='*', service='ipv4')
# =======================================================
# Unit test for 'show lisp all service <service> summary'
# =======================================================
class test_show_lisp_service_summary(test_show_lisp_service_summary_iosxe):
def test_show_lisp_service_summary_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceSummary(device=self.device)
parsed_output = obj.parse(service='ipv4')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_summary_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceSummary(device=self.device)
parsed_output = obj.parse(service='ipv6')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_summary_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceSummary(device=self.device)
parsed_output = obj.parse(service='ethernet')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_summary_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceSummary(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(service='ipv4')
# ==========================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> dabatase'
# ==========================================================================
class test_show_lisp_service_database(test_show_lisp_service_database_iosxe):
def test_show_lisp_service_database_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceDatabase(device=self.device)
parsed_output = obj.parse(service='ipv4', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_database_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceDatabase(device=self.device)
parsed_output = obj.parse(service='ipv6', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_database_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceDatabase(device=self.device)
parsed_output = obj.parse(service='ethernet', instance_id='*')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_database_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceDatabase(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(service='ipv4', instance_id='*')
# ================================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> server summary'
# ================================================================================
class test_show_lisp_service_server_summary(test_show_lisp_service_server_summary_iosxe):
def test_show_lisp_service_server_summary_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceServerSummary(device=self.device)
parsed_output = obj.parse(service='ipv4', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_server_summary_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceServerSummary(device=self.device)
parsed_output = obj.parse(service='ipv6', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_server_summary_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceServerSummary(device=self.device)
parsed_output = obj.parse(service='ethernet', instance_id='*')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_server_summary_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceServerSummary(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(service='ipv4', instance_id='*')
# ========================================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> server detail internal'
# ========================================================================================
class test_show_lisp_service_server_detail_internal(test_show_lisp_service_server_detail_internal_iosxe):
def test_show_lisp_service_server_detail_internal_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceServerDetailInternal(device=self.device)
parsed_output = obj.parse(service='ipv4', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_server_detail_internal_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceServerDetailInternal(device=self.device)
parsed_output = obj.parse(service='ipv6', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_server_detail_internal_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceServerDetailInternal(device=self.device)
parsed_output = obj.parse(service='ethernet', instance_id='*')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_server_detail_internal_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceServerDetailInternal(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(service='ipv4', instance_id='*')
# ============================================================================
# Unit test for 'show lisp all instance-id <instance_id> <service> statistics'
# ============================================================================
class test_show_lisp_service_statistics(test_show_lisp_service_statistics_iosxe):
def test_show_lisp_service_statistics_full1(self):
self.maxDiff = None
self.device = Mock(**self.golden_output1)
obj = ShowLispServiceStatistics(device=self.device)
parsed_output = obj.parse(service='ipv4', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output1)
def test_show_lisp_service_statistics_full2(self):
self.maxDiff = None
self.device = Mock(**self.golden_output2)
obj = ShowLispServiceStatistics(device=self.device)
parsed_output = obj.parse(service='ipv6', instance_id='101')
self.assertEqual(parsed_output, self.golden_parsed_output2)
def test_show_lisp_service_statistics_full3(self):
self.maxDiff = None
self.device = Mock(**self.golden_output3)
obj = ShowLispServiceStatistics(device=self.device)
parsed_output = obj.parse(service='ethernet', instance_id='*')
self.assertEqual(parsed_output, self.golden_parsed_output3)
def test_show_lisp_service_statistics_empty(self):
self.maxDiff = None
self.device = Mock(**self.empty_output)
obj = ShowLispServiceStatistics(device=self.device)
with self.assertRaises(SchemaEmptyParserError):
parsed_output = obj.parse(service='ipv4', instance_id='*')
if __name__ == '__main__':
unittest.main()
| 46.48913 | 114 | 0.64751 | 2,311 | 21,385 | 5.663782 | 0.04154 | 0.07151 | 0.093514 | 0.107418 | 0.933456 | 0.85866 | 0.798992 | 0.750707 | 0.737566 | 0.715181 | 0 | 0.01165 | 0.189198 | 21,385 | 459 | 115 | 46.590414 | 0.743238 | 0.127613 | 0 | 0.689552 | 0 | 0 | 0.013541 | 0 | 0 | 0 | 0 | 0 | 0.143284 | 1 | 0.143284 | false | 0 | 0.020896 | 0 | 0.202985 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
adadee060c56372e8908adb4d528845f3dfccedb | 179 | py | Python | gql/schemas/scalars/__init__.py | apoveda25/graphql-python-server | eb7b911aa1116327120b857beb17da3e30523e74 | [
"Apache-2.0"
] | 4 | 2020-06-20T11:54:04.000Z | 2021-09-07T11:41:32.000Z | gql/schemas/scalars/__init__.py | apoveda25/graphql-python-server | eb7b911aa1116327120b857beb17da3e30523e74 | [
"Apache-2.0"
] | null | null | null | gql/schemas/scalars/__init__.py | apoveda25/graphql-python-server | eb7b911aa1116327120b857beb17da3e30523e74 | [
"Apache-2.0"
] | null | null | null | import os
from ariadne.load_schema import load_schema_from_path
scalars = load_schema_from_path(os.getcwd() + "/gql/schemas/scalars/schema.graphql")
scalars_defs = f"{scalars}"
| 25.571429 | 84 | 0.798883 | 27 | 179 | 5 | 0.518519 | 0.222222 | 0.207407 | 0.266667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.089385 | 179 | 6 | 85 | 29.833333 | 0.828221 | 0 | 0 | 0 | 0 | 0 | 0.24581 | 0.195531 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0.5 | 0 | 0.5 | 0 | 1 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 6 |
adc6d49974e683241ebec9d6c0b4e30fc2f26d97 | 25 | py | Python | vkcoinapi/__init__.py | bixnel/vkcoinapi | 1e16afa4c4378665d1915454674b4cad7c154020 | [
"MIT"
] | 7 | 2019-04-16T16:34:05.000Z | 2019-07-09T06:51:14.000Z | vkcoinapi/__init__.py | bixnel/vkcoinapi | 1e16afa4c4378665d1915454674b4cad7c154020 | [
"MIT"
] | null | null | null | vkcoinapi/__init__.py | bixnel/vkcoinapi | 1e16afa4c4378665d1915454674b4cad7c154020 | [
"MIT"
] | 3 | 2019-05-01T03:22:04.000Z | 2019-07-09T08:36:42.000Z | from .vkcoinapi import *
| 12.5 | 24 | 0.76 | 3 | 25 | 6.333333 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.16 | 25 | 1 | 25 | 25 | 0.904762 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
70b532935ce9b8ae992ed1ab8452249612def5a4 | 77 | py | Python | TransparencyIntImporter/data/__data__.py | weso/landportal-importers | 6edfa3c301422bbe8c09cb877b1cbddbcd902463 | [
"Unlicense"
] | null | null | null | TransparencyIntImporter/data/__data__.py | weso/landportal-importers | 6edfa3c301422bbe8c09cb877b1cbddbcd902463 | [
"Unlicense"
] | 8 | 2016-02-16T13:05:37.000Z | 2017-01-04T14:38:03.000Z | old-importers/TransparencyIntImporter/data/__data__.py | landportal/landbook-importers | f0e246f493329b9c5741c50f3a0495d27ee5c54b | [
"MIT"
] | null | null | null | """__data__.py"""
import os
def path():
return os.path.dirname(__file__) | 15.4 | 36 | 0.675325 | 11 | 77 | 4 | 0.818182 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.142857 | 77 | 5 | 36 | 15.4 | 0.666667 | 0.142857 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.333333 | true | 0 | 0.333333 | 0.333333 | 1 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 6 |
70f46ba4a0a4bca6ce6da3623cdc12049041a491 | 22,789 | py | Python | test/test_interface.py | timercrack/pydatacoll | fa5c221e8071ec8222eff9e11573d91cdc4b80d4 | [
"Apache-2.0"
] | 22 | 2015-12-08T07:29:03.000Z | 2022-02-08T06:22:29.000Z | test/test_interface.py | timercrack/pydatacoll | fa5c221e8071ec8222eff9e11573d91cdc4b80d4 | [
"Apache-2.0"
] | 12 | 2015-12-11T03:27:13.000Z | 2018-04-23T13:09:32.000Z | test/test_interface.py | timercrack/pydatacoll | fa5c221e8071ec8222eff9e11573d91cdc4b80d4 | [
"Apache-2.0"
] | 10 | 2015-12-08T09:31:43.000Z | 2022-02-08T06:22:37.000Z | import asyncio
import aiohttp
import aioredis
import asynctest
import redis
try:
import ujson as json
except ImportError:
import json
import pydatacoll.utils.logger as my_logger
from pydatacoll.resources.protocol import *
from pydatacoll.resources.redis_key import *
from test.mock_device import mock_data, iec104device
from pydatacoll import api_server
from pydatacoll.utils.read_config import *
logger = my_logger.get_logger('TestInterface')
class RedisTest(asynctest.TestCase):
async def test_connect_timeout(self):
try:
loop = asyncio.get_event_loop()
reader, writer = await asyncio.open_connection(config.get('REDIS', 'host', fallback='127.0.0.1'),
config.getint('REDIS', 'port', fallback=6379), loop=loop)
loop.call_later(1, lambda w: w.close(), writer)
data = await reader.readexactly(100)
logger.debug('Received: %r', data.decode())
# print("data={}".format(data))
self.assertEqual(len(data), 0)
except asyncio.IncompleteReadError:
logger.debug('stream closed!')
except Exception as e:
logger.error('e=', repr(e))
async def test_redis_listen(self):
pub_client = await aioredis.create_redis((config.get('REDIS', 'host', fallback='127.0.0.1'),
config.getint('REDIS', 'port', fallback=6379)),
db=config.getint('REDIS', 'db', fallback=1))
sub_client = await aioredis.create_redis((config.get('REDIS', 'host', fallback='127.0.0.1'),
config.getint('REDIS', 'port', fallback=6379)),
db=config.getint('REDIS', 'db', fallback=1))
res = await sub_client.subscribe('channel:foo')
ch1 = res[0]
async def reader(ch):
while await ch.wait_message():
msg = await ch.get_json()
logger.debug("channel[%s] Got Message:%s", ch.name.decode(), msg)
logger.debug('quit reader!')
tsk = asyncio.ensure_future(reader(ch1))
res = await pub_client.publish_json('channel:foo', ["Hello", "world"])
self.assertEqual(res, 1)
await sub_client.unsubscribe('channel:foo')
await tsk
sub_client.close()
pub_client.close()
class InterfaceTest(asynctest.TestCase):
loop = None # make pycharm happy
def setUp(self):
self.redis_client = redis.StrictRedis(db=1, decode_responses=True)
mock_data.generate()
self.server_list = list()
self.server_list = iec104device.create_servers(self.loop)
self.api_server = api_server.APIServer(io_loop=self.loop, port=8080)
def tearDown(self):
self.api_server.stop_server()
for server in self.server_list:
server.close()
self.loop.run_until_complete(server.wait_closed())
async def test_get_redis_key(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/redis_key') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst['channel'], REDIS_KEY['channel'])
async def test_get_protocol_list(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/device_protocols') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, DEVICE_PROTOCOLS)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/term_protocols') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, TERM_PROTOCOLS)
async def test_formula_CRUD(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSequenceEqual(rst, ['1'])
async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas/1') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.formula1)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/formulas/99') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'formula_id not found!')
async with aiohttp.post('http://127.0.0.1:8080/api/v1/formulas', data=json.dumps(mock_data.test_formula)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.hgetall('HS:FORMULA:9')
self.assertEqual(rst['formula'], mock_data.test_formula['formula'])
rst = self.redis_client.sismember('SET:FORMULA', 9)
self.assertTrue(rst)
async with aiohttp.post('http://127.0.0.1:8080/api/v1/formulas', data=json.dumps(mock_data.test_formula)) as r:
self.assertEqual(r.status, 409)
rst = await r.text()
self.assertEqual(rst, 'formula already exists!')
mock_data.test_formula['formula'] = '2+2'
mock_data.test_formula['id'] = 5
async with aiohttp.put('http://127.0.0.1:8080/api/v1/formulas/9', data=json.dumps(mock_data.test_formula)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:FORMULA:9')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:FORMULA', 9)
self.assertFalse(rst)
rst = self.redis_client.hgetall('HS:FORMULA:5')
self.assertEqual(rst['formula'], '2+2')
rst = self.redis_client.sismember('SET:FORMULA', 5)
self.assertTrue(rst)
async with aiohttp.put('http://127.0.0.1:8080/api/v1/formulas/99', data=json.dumps(mock_data.test_formula)) as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'formula_id not found!')
async with aiohttp.delete('http://127.0.0.1:8080/api/v1/formulas/5') as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:FORMULA:5')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:FORMULA', 5)
self.assertFalse(rst)
formula_check = {'formula': 'p1[-1]+10', 'p1': '1:10:1000'}
async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r:
self.assertEqual(r.status, 200)
rst = await r.text()
self.assertEqual(rst, 'OK')
formula_check['formula'] = 'p1[-1]+p2[-2]'
async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r:
self.assertEqual(r.status, 200)
rst = await r.text()
self.assertEqual(rst, """NameError
p1[-1]+p2[-2]
^^^
name 'p2' is not defined
""")
formula_check['p1'] = '123:45:6'
async with aiohttp.post('http://127.0.0.1:8080/api/v1/formula_check', data=json.dumps(formula_check)) as r:
self.assertEqual(r.status, 200)
rst = await r.text()
self.assertEqual(rst, "parameter not found: p1=123:45:6")
formulas = [1]
async with aiohttp.post('http://127.0.0.1:8080/api/v2/formulas/del', data=json.dumps(formulas)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.smembers('SET:FORMULA')
self.assertEqual(len(rst), 0)
async def test_device_CRUD(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSetEqual(set(rst), {'1', '2', '3'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.device1)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'device_id not found!')
async with aiohttp.post('http://127.0.0.1:8080/api/v1/devices', data=json.dumps(mock_data.test_device)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.hgetall('HS:DEVICE:4')
self.assertEqual(rst['name'], '测试集中器4')
rst = self.redis_client.sismember('SET:DEVICE', 4)
self.assertTrue(rst)
async with aiohttp.post('http://127.0.0.1:8080/api/v1/devices', data=json.dumps(mock_data.test_device)) as r:
self.assertEqual(r.status, 409)
rst = await r.text()
self.assertEqual(rst, 'device already exists!')
mock_data.test_device['name'] = '测试集中器5'
mock_data.test_device['id'] = 5
async with aiohttp.put('http://127.0.0.1:8080/api/v1/devices/4', data=json.dumps(mock_data.test_device)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:DEVICE:4')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:DEVICE', 4)
self.assertFalse(rst)
rst = self.redis_client.hgetall('HS:DEVICE:5')
self.assertEqual(rst['name'], '测试集中器5')
rst = self.redis_client.sismember('SET:DEVICE', 5)
self.assertTrue(rst)
async with aiohttp.put('http://127.0.0.1:8080/api/v1/devices/99', data=json.dumps(mock_data.test_device)) as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'device_id not found!')
async with aiohttp.delete('http://127.0.0.1:8080/api/v1/devices/5') as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:DEVICE:5')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:DEVICE', 5)
self.assertFalse(rst)
devices = [1, 2, 3]
async with aiohttp.post('http://127.0.0.1:8080/api/v2/devices/del', data=json.dumps(devices)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.smembers('SET:DEVICE')
self.assertEqual(len(rst), 0)
async def test_term_CRUD(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSetEqual(set(rst), {'10', '20', '30', '40'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.term10)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_id not found!')
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSetEqual(set(rst), {'10', '20'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99/terms') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'device_id not found!')
async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms', data=json.dumps(mock_data.test_term)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.hgetall('HS:TERM:90')
self.assertEqual(rst['name'], '测试终端9')
rst = self.redis_client.sismember('SET:TERM', 90)
self.assertTrue(rst)
rst = self.redis_client.sismember('SET:DEVICE_TERM:1', 90)
self.assertEqual(rst, True)
async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms', data=json.dumps(mock_data.test_term)) as r:
self.assertEqual(r.status, 409)
rst = await r.text()
self.assertEqual(rst, 'term already exists!')
mock_data.test_term['name'] = '测试终端5'
mock_data.test_term['id'] = 50
mock_data.test_term['device_id'] = 2
async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/90', data=json.dumps(mock_data.test_term)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:TERM:90')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:TERM', 90)
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:DEVICE_TERM:1', 90)
self.assertFalse(rst)
rst = self.redis_client.hgetall('HS:TERM:50')
self.assertEqual(rst['name'], '测试终端5')
rst = self.redis_client.sismember('SET:TERM', 50)
self.assertTrue(rst)
rst = self.redis_client.sismember('SET:DEVICE_TERM:2', 50)
self.assertTrue(rst)
async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/99', data=json.dumps(mock_data.test_term)) as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_id not found!')
async with aiohttp.delete('http://127.0.0.1:8080/api/v1/terms/50') as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:TERM:50')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:TERM', 50)
self.assertFalse(rst)
terms = [10, 20, 30, 40]
async with aiohttp.post('http://127.0.0.1:8080/api/v2/terms/del', data=json.dumps(terms)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.smembers('SET:TERM')
self.assertEqual(len(rst), 0)
async def test_item_CRUD(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/items') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSetEqual(set(rst), {'1000', '2000'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/items/1000') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.item1000)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/items/99') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'item_id not found!')
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertSetEqual(set(rst), {'1000', '2000'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99/items') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_id not found!')
async with aiohttp.post('http://127.0.0.1:8080/api/v1/items', data=json.dumps(mock_data.test_item)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.hgetall('HS:ITEM:3000')
self.assertEqual(rst['name'], 'C相电压')
rst = self.redis_client.sismember('SET:ITEM', 3000)
self.assertTrue(rst)
async with aiohttp.post('http://127.0.0.1:8080/api/v1/items', data=json.dumps(mock_data.test_item)) as r:
self.assertEqual(r.status, 409)
rst = await r.text()
self.assertEqual(rst, 'item already exists!')
mock_data.test_item['name'] = '功率因数'
mock_data.test_item['id'] = 4000
async with aiohttp.put('http://127.0.0.1:8080/api/v1/items/3000', data=json.dumps(mock_data.test_item)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:ITEM:3000')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:ITEM', 3000)
self.assertFalse(rst)
rst = self.redis_client.hgetall('HS:ITEM:4000')
self.assertEqual(rst['name'], '功率因数')
rst = self.redis_client.sismember('SET:ITEM', 4000)
self.assertTrue(rst)
async with aiohttp.put('http://127.0.0.1:8080/api/v1/items/99', data=json.dumps(mock_data.test_item)) as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'item_id not found!')
async with aiohttp.delete('http://127.0.0.1:8080/api/v1/items/4000') as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:ITEM:4000')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:ITEM', 4000)
self.assertFalse(rst)
items = [1000, 2000]
async with aiohttp.post('http://127.0.0.1:8080/api/v2/items/del', data=json.dumps(items)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.smembers('SET:ITEM')
self.assertEqual(len(rst), 0)
async def test_get_data(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms/10/items/1000/datas') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.device1_term10_item1000)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/1/terms/10/items/1000/datas/-1') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, {'2015-12-01T08:50:15.000003': '102.0'})
async with aiohttp.get('http://127.0.0.1:8080/api/v1/devices/99/terms/99/items/99/datas') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertEqual(len(rst), 0)
async def test_term_item_CRUD(self):
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items/1000') as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertDictEqual(rst, mock_data.term10_item1000)
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/99/items/1000') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_id not found!')
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/10/items/99') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'item_id not found!')
async with aiohttp.get('http://127.0.0.1:8080/api/v1/terms/20/items/2000') as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_item not found!')
async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms/20/items',
data=json.dumps(mock_data.test_term_item)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.hgetall('HS:TERM_ITEM:20:2000')
mock_data.test_term_item.update({'device_id': '1'})
self.assertDictEqual(rst, mock_data.test_term_item)
rst = self.redis_client.hgetall('HS:MAPPING:IEC104:1:400')
self.assertDictEqual(rst, mock_data.test_term_item)
rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000)
self.assertTrue(rst)
async with aiohttp.post('http://127.0.0.1:8080/api/v1/terms/20/items',
data=json.dumps(mock_data.test_term_item)) as r:
self.assertEqual(r.status, 409)
rst = await r.text()
self.assertEqual(rst, 'term_item already exists!')
mock_data.test_term_item['protocol_code'] = '401'
async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/20/items/2000',
data=json.dumps(mock_data.test_term_item)) as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000)
self.assertTrue(rst)
rst = self.redis_client.exists('HS:MAPPING:IEC104:1:400')
self.assertFalse(rst)
rst = self.redis_client.hgetall('HS:TERM_ITEM:20:2000')
self.assertEqual(rst['protocol_code'], '401')
rst = self.redis_client.hgetall('HS:MAPPING:IEC104:1:401')
self.assertDictEqual(rst, mock_data.test_term_item)
async with aiohttp.put('http://127.0.0.1:8080/api/v1/terms/30/items/2000',
data=json.dumps(mock_data.test_term_item)) as r:
self.assertEqual(r.status, 404)
rst = await r.text()
self.assertEqual(rst, 'term_item not found!')
async with aiohttp.delete('http://127.0.0.1:8080/api/v1/terms/20/items/2000') as r:
self.assertEqual(r.status, 200)
rst = self.redis_client.exists('HS:TERM_ITEM:20:2000')
self.assertFalse(rst)
rst = self.redis_client.exists('HS:MAPPING:IEC104:1:401')
self.assertFalse(rst)
rst = self.redis_client.sismember('SET:TERM_ITEM:20', 2000)
self.assertFalse(rst)
del mock_data.test_term_item['device_id']
async with aiohttp.post('http://127.0.0.1:8080/api/v2/term_items/del',
data=json.dumps(mock_data.term_item_list)) as r:
self.assertEqual(r.status, 200)
rst = list(self.redis_client.scan_iter('HS:TERM_ITEMS:*'))
self.assertEqual(len(rst), 0)
async def test_device_call(self):
call_dict = {'device_id': '1', 'term_id': '10', 'item_id': 1000}
async with aiohttp.post('http://127.0.0.1:8080/api/v1/device_call', data=json.dumps(call_dict)) as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertAlmostEqual(rst['value'], 102, delta=0.0001)
async def test_device_ctrl(self):
ctrl_dict = {'device_id': '2', 'term_id': '30', 'item_id': '1000', 'value': 123.4}
async with aiohttp.post('http://127.0.0.1:8080/api/v1/device_ctrl', data=json.dumps(ctrl_dict)) as r:
self.assertEqual(r.status, 200)
rst = await r.json()
self.assertAlmostEqual(rst['value'], 123.4, delta=0.0001)
async def test_sql_check(self):
async with aiohttp.post('http://127.0.0.1:8080/api/v1/sql_check',
data=json.dumps(mock_data.term10_item1000)) as r:
self.assertEqual(r.status, 200)
rst = await r.text()
self.assertEqual(rst, 'not found sql to check')
| 49.32684 | 121 | 0.59362 | 3,175 | 22,789 | 4.174173 | 0.070551 | 0.116577 | 0.024523 | 0.029427 | 0.803516 | 0.779446 | 0.768203 | 0.76179 | 0.749566 | 0.693881 | 0 | 0.081345 | 0.258809 | 22,789 | 461 | 122 | 49.433839 | 0.703274 | 0.002106 | 0 | 0.5 | 0 | 0.038647 | 0.188407 | 0.00519 | 0 | 0 | 0 | 0 | 0.376812 | 1 | 0.004831 | false | 0 | 0.033816 | 0 | 0.045894 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
cb34d3c85b786c92ab8e60553979400dc0dabad6 | 5,921 | py | Python | tests/test_prototype_jpeg.py | GLaDOS1105/prototype-jpeg | 15c04980d103e9158cd958fe6d65111b1ef582a6 | [
"MIT"
] | 8 | 2019-08-25T02:38:39.000Z | 2021-01-09T07:17:46.000Z | tests/test_prototype_jpeg.py | GLaDOS1105/prototype-jpeg | 15c04980d103e9158cd958fe6d65111b1ef582a6 | [
"MIT"
] | 38 | 2020-08-14T15:03:21.000Z | 2021-06-01T16:26:47.000Z | tests/test_prototype_jpeg.py | GLaDOS1105/prototype-jpeg | 15c04980d103e9158cd958fe6d65111b1ef582a6 | [
"MIT"
] | 2 | 2021-02-26T07:54:41.000Z | 2021-09-14T10:12:59.000Z | import tempfile
import unittest
from prototype_jpeg import __version__, compress, extract
def test_version():
assert __version__ == '0.1.0'
class TestCompressAndExtract(unittest.TestCase):
def test_rgb(self):
compress_and_extract({
'fn': 'tests/images/rgb/Baboon.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/rgb/Lena.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 1
})
def test_rgb_quality_95(self):
compress_and_extract({
'fn': 'tests/images/rgb/Baboon.raw',
'size': (512, 512),
'grey_level': False,
'quality': 95,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/rgb/Lena.raw',
'size': (512, 512),
'grey_level': False,
'quality': 95,
'subsampling_mode': 1
})
def test_rgb_quality_1(self):
compress_and_extract({
'fn': 'tests/images/rgb/Baboon.raw',
'size': (512, 512),
'grey_level': False,
'quality': 1,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/rgb/Lena.raw',
'size': (512, 512),
'grey_level': False,
'quality': 1,
'subsampling_mode': 1
})
def test_rgb_subsampling_mode_2(self):
compress_and_extract({
'fn': 'tests/images/rgb/Baboon.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 2
})
compress_and_extract({
'fn': 'tests/images/rgb/Lena.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 2
})
def test_rgb_subsampling_mode_4(self):
compress_and_extract({
'fn': 'tests/images/rgb/Baboon.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 4
})
compress_and_extract({
'fn': 'tests/images/rgb/Lena.raw',
'size': (512, 512),
'grey_level': False,
'quality': 50,
'subsampling_mode': 4
})
def test_grey_level(self):
compress_and_extract({
'fn': 'tests/images/grey_level/Baboon.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/grey_level/Lena.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 1
})
def test_grey_level_quality_95(self):
compress_and_extract({
'fn': 'tests/images/grey_level/Baboon.raw',
'size': (512, 512),
'grey_level': True,
'quality': 95,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/grey_level/Lena.raw',
'size': (512, 512),
'grey_level': True,
'quality': 95,
'subsampling_mode': 1
})
def test_grey_level_quality_1(self):
compress_and_extract({
'fn': 'tests/images/grey_level/Baboon.raw',
'size': (512, 512),
'grey_level': True,
'quality': 1,
'subsampling_mode': 1
})
compress_and_extract({
'fn': 'tests/images/grey_level/Lena.raw',
'size': (512, 512),
'grey_level': True,
'quality': 1,
'subsampling_mode': 1
})
def test_grey_level_subsampling_mode_2(self):
compress_and_extract({
'fn': 'tests/images/grey_level/Baboon.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 2
})
compress_and_extract({
'fn': 'tests/images/grey_level/Lena.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 2
})
def test_grey_level_subsampling_mode_4(self):
compress_and_extract({
'fn': 'tests/images/grey_level/Baboon.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 4
})
compress_and_extract({
'fn': 'tests/images/grey_level/Lena.raw',
'size': (512, 512),
'grey_level': True,
'quality': 50,
'subsampling_mode': 4
})
def compress_and_extract(spec):
with open(spec['fn'], 'rb') as raw_file:
compressed = compress(
raw_file,
size=spec['size'],
grey_level=spec['grey_level'],
quality=spec['quality'],
subsampling_mode=spec['subsampling_mode']
)
header = compressed['header']
with tempfile.TemporaryFile() as compressed_file:
compressed['data'].tofile(compressed_file)
compressed_file.seek(0)
extracted = extract(
compressed_file,
header={
'size': header['size'],
'grey_level': header['grey_level'],
'quality': header['quality'],
'subsampling_mode': header['subsampling_mode'],
'remaining_bits_length': header['remaining_bits_length'],
'data_slice_lengths': header['data_slice_lengths']
}
)
return extracted
| 29.90404 | 73 | 0.497044 | 586 | 5,921 | 4.750853 | 0.098976 | 0.126078 | 0.135776 | 0.143678 | 0.759339 | 0.758261 | 0.751796 | 0.731322 | 0.719828 | 0.707615 | 0 | 0.050789 | 0.368181 | 5,921 | 197 | 74 | 30.055838 | 0.693397 | 0 | 0 | 0.773481 | 0 | 0 | 0.266509 | 0.106739 | 0 | 0 | 0 | 0 | 0.005525 | 1 | 0.066298 | false | 0 | 0.016575 | 0 | 0.093923 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
cb5211c406515fbc8318d9668055bf83c9a0d73d | 8,514 | py | Python | app/__init__.py | YassineElbouchaibi/medica-vue-backend | b01012f40cbb611fbaa2ca27f35e771535d375af | [
"MIT"
] | null | null | null | app/__init__.py | YassineElbouchaibi/medica-vue-backend | b01012f40cbb611fbaa2ca27f35e771535d375af | [
"MIT"
] | null | null | null | app/__init__.py | YassineElbouchaibi/medica-vue-backend | b01012f40cbb611fbaa2ca27f35e771535d375af | [
"MIT"
] | null | null | null | import math
from flask import Flask, request, jsonify, send_file, make_response
from flask_cors import CORS
import os
from app.core_utils import *
app = Flask(__name__)
CORS(app)
STORAGE_ROOT = os.environ['STORAGE_ROOT']
THUMBNAILS_DIR = os.path.join(STORAGE_ROOT, "thumbnails")
IMAGES_DIR = os.path.join(STORAGE_ROOT, "datasets")
DATASETS = ["CVC", "ETIS", "ISIC"]
EXCLUDED_DIRS = ["CVC", "ISIC"]
model = load_model_weight(os.path.join(STORAGE_ROOT, "models", "CVC", "model.h5"))
@app.route('/')
def hello_world():
return 'MedicaVue'
@app.route('/storage')
def list_thumbnails():
files = []
for (dirpath, dirnames, filenames) in os.walk(STORAGE_ROOT):
if any(folder in dirpath for folder in EXCLUDED_DIRS):
continue
dataset = ""
for _dataset in DATASETS:
if _dataset in dirpath:
dataset = _dataset
_files = [
dict(
thumbnail = os.path.join(request.base_url, "thumbnail", dataset, filename),
image = os.path.join(request.base_url, "image", dataset, filename),
mask=os.path.join(request.url_root, 'detect', "mask", dataset, filename),
highlight=os.path.join(request.url_root, 'detect', "highlight", dataset, filename),
annotation=os.path.join(request.url_root, 'detect', "annotation", dataset, filename),
) for filename in filenames if filename.endswith(".jpg")
]
files.extend(_files)
return jsonify(files)
@app.route('/storage/thumbnail/<dataset>/<filename>')
def get_thumbnail(dataset: str, filename: str):
if dataset not in DATASETS:
return 'bad request!', 400
return send_file(os.path.join(THUMBNAILS_DIR, dataset, "image", filename), mimetype='image/jpeg')
@app.route('/storage/image/<dataset>/<filename>')
def get_image(dataset: str, filename: str):
if dataset not in DATASETS:
return 'bad request!', 400
return send_file(os.path.join(IMAGES_DIR, dataset, "image", filename), mimetype='image/jpeg')
# Endpoint for known images : MASK
@app.route('/detect/mask/<dataset>/<filename>')
def predict_mask_for_db_image(dataset: str, filename: str):
if dataset not in DATASETS:
return 'bad request!', 400
# Get original Mask if requested, otherwise run prediction
if "groundTruth" in request.args:
return send_file(os.path.join(IMAGES_DIR, dataset, "mask", filename), mimetype='image/jpeg')
# Get image
file_path = os.path.join(IMAGES_DIR, dataset, "image", filename)
image = read_image(file_path)
# Run prediction
mask = predict(image, model)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', mask.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
# Endpoint for known images : HIGHLIGHT
@app.route('/detect/highlight/<dataset>/<filename>')
def predict_highlight_for_db_image(dataset: str, filename: str):
if dataset not in DATASETS:
return 'bad request!', 400
alpha = 0.4
# Get original Mask if requested, otherwise run prediction
if "groundTruth" in request.args:
image_path = os.path.join(IMAGES_DIR, dataset, "image", filename)
mask_path = os.path.join(IMAGES_DIR, dataset, "mask", filename)
image = cv2.imread(image_path, cv2.IMREAD_COLOR)
mask = cv2.imread(mask_path, cv2.IMREAD_COLOR)
else:
# Get image
file_path = os.path.join(IMAGES_DIR, dataset, "image", filename)
image = read_image(file_path)
# Run prediction
mask = predict(image, model)
image = image[0] * 255.0
highlight = cv2.addWeighted(image, alpha, mask, 1 - alpha, 0)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', highlight.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
# Endpoint for known images : ANNOTATION
@app.route('/detect/annotation/<dataset>/<filename>')
def predict_annotation_for_db_image(dataset: str, filename: str):
if dataset not in DATASETS:
return 'bad request!', 400
alpha = 0.4
# Get original Mask if requested, otherwise run prediction
if "groundTruth" in request.args:
image_path = os.path.join(IMAGES_DIR, dataset, "image", filename)
mask_path = os.path.join(IMAGES_DIR, dataset, "mask", filename)
image = cv2.imread(image_path, cv2.IMREAD_COLOR)
mask = cv2.imread(mask_path, cv2.IMREAD_COLOR)
else:
# Get image
file_path = os.path.join(IMAGES_DIR, dataset, "image", filename)
image = read_image(file_path)
# Run prediction
mask = predict(image, model).astype(np.uint8)
image = image[0] * 255.0
# Convert it to grayscale
mask = cv2.cvtColor(mask, cv2.COLOR_BGR2GRAY)
annotation = image.copy()
# Apply cv2.threshold() to get a binary image
ret, thresh = cv2.threshold(mask, 50, 255, cv2.THRESH_BINARY)
# Find contours
contours, hierarchy = cv2.findContours(thresh, cv2.RETR_EXTERNAL, cv2.CHAIN_APPROX_NONE)
# Scale contours
scaled_contours = []
for contour in contours:
scaled_contours.append(scale_contour(contour, 1.075))
h, w, _ = image.shape
# Draw contours
cv2.drawContours(annotation, scaled_contours, -1, (38, 166, 154, 0.1), math.floor(20 / (1225 / 966) * (h / w)), cv2.LINE_AA)
# Make contours a bit transparent
annotation = cv2.addWeighted(image, alpha, annotation, 1 - alpha, 0)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', annotation.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
# Endpoint for custom images : MASK
@app.route('/detect/mask/custom')
def predict_mask_for_custom_image():
image_url = request.args.get('url')
if image_url is None:
return 'bad request!', 400
# Get image
image = read_image(image_url, isUrl=True)
# Run prediction
mask = predict(image, model)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', mask.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
# Endpoint for custom images : HIGHLIGHT
@app.route('/detect/highlight/custom')
def predict_highlight_for_custom_image():
image_url = request.args.get('url')
if image_url is None:
return 'bad request!', 400
alpha = 0.4
# Get image
image = read_image(image_url, isUrl=True)
# Run prediction
mask = predict(image, model)
image = image[0] * 255.0
highlight = cv2.addWeighted(image, alpha, mask, 1 - alpha, 0)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', highlight.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
# Endpoint for custom images : ANNOTATION
@app.route('/detect/annotation/custom')
def predict_annotation_for_custom_image():
image_url = request.args.get('url')
if image_url is None:
return 'bad request!', 400
alpha = 0.4
# Get image
image = read_image(image_url, isUrl=True)
# Run prediction
mask = predict(image, model).astype(np.uint8)
image = image[0] * 255.0
# Convert it to grayscale
mask = cv2.cvtColor(mask, cv2.COLOR_BGR2GRAY)
annotation = image.copy()
# Apply cv2.threshold() to get a binary image
ret, thresh = cv2.threshold(mask, 50, 255, cv2.THRESH_BINARY)
# Find contours
contours, hierarchy = cv2.findContours(thresh, cv2.RETR_EXTERNAL, cv2.CHAIN_APPROX_NONE)
# Scale contours
scaled_contours = []
for contour in contours:
scaled_contours.append(scale_contour(contour, 1.075))
h, w, _ = image.shape
# Draw contours
cv2.drawContours(annotation, scaled_contours, -1, (38, 166, 154, 0.1), math.floor(20 / (1225 / 966) * (h / w)), cv2.LINE_AA)
# Make contours a bit transparent
annotation = cv2.addWeighted(image, alpha, annotation, 1 - alpha, 0)
# Send prediction as JPEG
retval, buffer = cv2.imencode('.jpg', annotation.astype(np.uint8))
response = make_response(buffer.tobytes())
response.headers['Content-Type'] = 'image/jpeg'
return response
if __name__ == '__main__':
app.run()
| 30.736462 | 128 | 0.667019 | 1,105 | 8,514 | 5.01267 | 0.141176 | 0.019498 | 0.032497 | 0.025997 | 0.808269 | 0.804477 | 0.754288 | 0.727749 | 0.723235 | 0.713125 | 0 | 0.024836 | 0.210242 | 8,514 | 276 | 129 | 30.847826 | 0.798929 | 0.114282 | 0 | 0.63522 | 0 | 0 | 0.103053 | 0.031063 | 0 | 0 | 0 | 0 | 0 | 1 | 0.062893 | false | 0 | 0.031447 | 0.006289 | 0.213836 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
cbb02b0b9ca714a4bd8ab426a8acd632bc92dc8a | 57 | py | Python | cfb-cursos/keyboardkeys.py | joseluizbrits/sobre-python | 316143c341e5a44070a3b13877419082774bd730 | [
"MIT"
] | null | null | null | cfb-cursos/keyboardkeys.py | joseluizbrits/sobre-python | 316143c341e5a44070a3b13877419082774bd730 | [
"MIT"
] | null | null | null | cfb-cursos/keyboardkeys.py | joseluizbrits/sobre-python | 316143c341e5a44070a3b13877419082774bd730 | [
"MIT"
] | null | null | null | from pyautogui import KEYBOARD_KEYS
print(KEYBOARD_KEYS)
| 19 | 35 | 0.877193 | 8 | 57 | 6 | 0.75 | 0.5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.087719 | 57 | 2 | 36 | 28.5 | 0.923077 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.5 | 0 | 0.5 | 0.5 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 6 |
cbb5cab4a094c3eed1543e6836b462afaa806049 | 135 | py | Python | baseline/datasets/__init__.py | eugene-choi/ml4healthcare | f4b60fc58edd314e6ab803482cc17537d4488ace | [
"MIT"
] | 1 | 2022-02-22T05:12:13.000Z | 2022-02-22T05:12:13.000Z | baseline/datasets/__init__.py | eugene-choi/ml4healthcare | f4b60fc58edd314e6ab803482cc17537d4488ace | [
"MIT"
] | null | null | null | baseline/datasets/__init__.py | eugene-choi/ml4healthcare | f4b60fc58edd314e6ab803482cc17537d4488ace | [
"MIT"
] | null | null | null | from .lits17 import lits17, lits17_no_slice
from .brats20 import brats20, brats20_no_slice
from .kits21 import kits21, kits21_no_slice
| 33.75 | 46 | 0.844444 | 21 | 135 | 5.142857 | 0.333333 | 0.194444 | 0.203704 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.15 | 0.111111 | 135 | 3 | 47 | 45 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
cbcd4f4fc223065b83b18449902c6f0d91eff2ff | 24 | py | Python | jhu2016_labs/__init__.py | yiboyang/JHU2016Lab | 5575a4e797ce57ed3a033b662ded996b9d79d8a6 | [
"BSD-2-Clause"
] | 2 | 2021-04-07T09:26:21.000Z | 2021-04-07T09:26:46.000Z | jhu2016_labs/__init__.py | yiboyang/JHU2016Lab | 5575a4e797ce57ed3a033b662ded996b9d79d8a6 | [
"BSD-2-Clause"
] | null | null | null | jhu2016_labs/__init__.py | yiboyang/JHU2016Lab | 5575a4e797ce57ed3a033b662ded996b9d79d8a6 | [
"BSD-2-Clause"
] | 2 | 2016-07-07T23:21:59.000Z | 2016-07-13T20:22:51.000Z |
from . import plotting
| 8 | 22 | 0.75 | 3 | 24 | 6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.208333 | 24 | 2 | 23 | 12 | 0.947368 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
cbd3a61e9e0aa269ef11ada2e1ad1d6fca5d6f6f | 53 | py | Python | demo/config.py | FanRegan/FlashBank | bba26b28ae83a77526824a05f45725f70cb8b6a1 | [
"MIT"
] | 1 | 2019-08-18T12:26:14.000Z | 2019-08-18T12:26:14.000Z | demo/config.py | FanRegan/FlashBank | bba26b28ae83a77526824a05f45725f70cb8b6a1 | [
"MIT"
] | null | null | null | demo/config.py | FanRegan/FlashBank | bba26b28ae83a77526824a05f45725f70cb8b6a1 | [
"MIT"
] | null | null | null | config = {
'host': '0.0.0.0',
'port': 5000
}
| 10.6 | 22 | 0.415094 | 8 | 53 | 2.75 | 0.625 | 0.272727 | 0.272727 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.216216 | 0.301887 | 53 | 4 | 23 | 13.25 | 0.378378 | 0 | 0 | 0 | 0 | 0 | 0.283019 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | null | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
1db025d8acc1a082d0dc5d6480acf019ea83c38e | 238 | py | Python | app/controllers/row.py | StaySWEG/SWEGTwit | 4f2a8402e0db78e742ce91209d3add6d93348674 | [
"MIT"
] | null | null | null | app/controllers/row.py | StaySWEG/SWEGTwit | 4f2a8402e0db78e742ce91209d3add6d93348674 | [
"MIT"
] | 4 | 2020-02-06T11:13:36.000Z | 2020-02-06T11:17:26.000Z | app/controllers/row.py | StaySWEG/SWEGTwit | 4f2a8402e0db78e742ce91209d3add6d93348674 | [
"MIT"
] | null | null | null | class Row:
def toString(self):
return self.user + " - " + self.location + " - " + self.text
def __init__(self, user, location, text):
self.user = user
self.location = location
self.text = text | 26.444444 | 68 | 0.554622 | 27 | 238 | 4.740741 | 0.37037 | 0.1875 | 0.25 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.323529 | 238 | 9 | 69 | 26.444444 | 0.795031 | 0 | 0 | 0 | 0 | 0 | 0.025105 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.285714 | false | 0 | 0 | 0.142857 | 0.571429 | 0 | 1 | 0 | 0 | null | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 6 |
1dbbdff910ae3ad5cfb441b1c8dc9ad480b84134 | 34 | py | Python | src/core/events/__init__.py | c6h3un/kube-hunter | 4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd | [
"Apache-2.0"
] | 1 | 2019-05-23T09:28:47.000Z | 2019-05-23T09:28:47.000Z | src/core/events/__init__.py | c6h3un/kube-hunter | 4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd | [
"Apache-2.0"
] | null | null | null | src/core/events/__init__.py | c6h3un/kube-hunter | 4c14d8b78d1441ac7ada7c95a3ccbaf0b0e399bd | [
"Apache-2.0"
] | null | null | null | from handler import *
import types | 17 | 21 | 0.823529 | 5 | 34 | 5.6 | 0.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.147059 | 34 | 2 | 22 | 17 | 0.965517 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
1debf36b7d78c2e92825f82ccb49b8512cbaa7fb | 28,084 | py | Python | benchmark/graph_generater.py | zanderhavgaard/thesis-code | d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc | [
"MIT"
] | null | null | null | benchmark/graph_generater.py | zanderhavgaard/thesis-code | d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc | [
"MIT"
] | 2 | 2020-04-28T07:59:30.000Z | 2020-05-17T15:36:04.000Z | benchmark/graph_generater.py | zanderhavgaard/thesis-code | d9f193e622b8b98ec88c33006f8e0e1dbb3d17fc | [
"MIT"
] | null | null | null |
import pandas as pd
import numpy as np
import seaborn as sns
import matplotlib.pyplot as plt
import os
from datetime import datetime
from pprint import pprint
from warnings import filterwarnings
# default context values for dark grid
# {'font.size': 12.0,
# 'axes.labelsize': 12.0,
# 'axes.titlesize': 12.0,
# 'xtick.labelsize': 11.0,
# 'ytick.labelsize': 11.0,
# 'legend.fontsize': 11.0,
# 'axes.linewidth': 1.25,
# 'grid.linewidth': 1.0,
# 'lines.linewidth': 1.5,
# 'lines.markersize': 6.0,
# 'patch.linewidth': 1.0,
# 'xtick.major.width': 1.25,
# 'ytick.major.width': 1.25,
# 'xtick.minor.width': 1.0,
# 'ytick.minor.width': 1.0,
# 'xtick.major.size': 6.0,
# 'ytick.major.size': 6.0,
# 'xtick.minor.size': 4.0,
# 'ytick.minor.size': 4.0,
# 'legend.title_fontsize': 12.0}
class GraphGenerater():
def __init__(self, dir_name: str, dev_mode:bool=False):
self.dev_mode = dev_mode
env_path = os.getenv('fbrd') + '/graphs'
# timestampStr = datetime.now().strftime("%d-%b-%Y_%H_%M")
if (not dev_mode) and (not os.path.exists(env_path)):
os.mkdir(env_path)
self.report_dir = f'{dir_name}'
self.dir_path = f'{env_path}/{dir_name}'
if (not dev_mode) and (not os.path.exists(self.dir_path)):
os.mkdir(self.dir_path)
def gen_fig_tex(self, path, caption, label):
with open(f'{self.dir_path}/fig_tex.txt', 'a+') as f:
f.write("""
\\FloatBarrier
\\begin{figure}[!htb]
\\begin{center}
\\includegraphics[width=1\\textwidth]{%s}
\\caption{%s}
\\label{%s}
\\end{center}
\\end{figure}
\\FloatBarrier
""" % (
path,
caption,
label,
))
def save_figure(self,config: dict, plot, name:str, ndir:str, typep:str='placeholder', legend:bool=True):
if self.dev_mode:
if legend:
plt.legend(loc='center left', bbox_to_anchor=(1, 0.5))
plt.show()
else:
if not os.path.exists(f'{self.dir_path}/{ndir}'):
os.mkdir(f'{self.dir_path}/{ndir}')
name_no_colon = name.replace(':','')
path = f'graphs/{self.report_dir}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png'
caption = name.replace('_','\\_')
label = f'figure:{ndir}:{"_".join([typep]+name_no_colon.split())}'
self.gen_fig_tex(path, caption, label)
if legend:
plt.legend(loc='center left', bbox_to_anchor=(1, 0.5))
print(self.dir_path,ndir,typep,)
plot.figure.savefig(f'{self.dir_path}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png',bbox_inches='tight')
else:
plot.savefig(f'{self.dir_path}/{ndir}/{"_".join([typep]+name_no_colon.split())}.png')
plt.clf()
def save_table(self,df, description, ndir):
if self.dev_mode:
print(df.to_latex(index=False))
print(df)
else:
with open(f'{self.dir_path}/{ndir}-tables.txt', 'a+') as f:
f.write(f'\n -- New table --\n')
f.write(f'\n{description}\n')
f.write(df.to_latex(index=False))
f.write('\n')
#########################
## Graphs and plots ##
########################
# --> Relational plots <--
def line_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(1)
plot = sns.lineplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
style= config['style'] if 'style' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name,size=h_size)
# self.save_figure(config,plot,name,f'{self.dir_path}/{ndir}')
self.save_figure(config,plot,name,ndir,'lineplot')
def scatter_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(2)
plot = sns.scatterplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
style= config['style'] if 'style' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
alpha= config['alpha'] if 'alpha' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name,size=h_size)
self.save_figure(config,plot,name,ndir,'scatterplot')
def rel_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.clf()
plot = sns.relplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size= h_size)
self.save_figure(config,plot,name,ndir,'relplot',legend=False)
###########################
# --> Categorial plots <--#
###########################
def cat_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(3)
# plt.clf()
plot = sns.catplot(x=config['x'],
y= config['y'],
row= config['row'] if 'row' in config else None,
col= config['col'] if 'col' in config else None,
hue= config['hue'] if 'hue' in config else None,
kind= config['kind'] if 'kind' in config else 'strip',
jitter= config['jitter'] if 'jitter' in config else False,
height= config['height'] if 'height' in config else 5,
aspect= config['aspect'] if 'aspect' in config else 1,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
# plt.title(name, size=h_size)
self.save_figure(config, plot,name, ndir, 'catplot', legend=False)
def strip_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
# plt.figure(4)
plt.clf()
plot = sns.stripplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
jitter= config['jitter'] if 'jitter' in config else False,
hue_order= config['hue_order'] if 'hue_order' in config else None,
alpha= config['alpha'] if 'alpha' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'stripplot')
def swarm_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.swarmplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'swarmplot')
def box_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(6)
plot = sns.boxplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
data= data)
if 'strip' in config:
sns.stripplot(x=config['x_strip'], y=config['y_strip'], color='black',
size=10, alpha=0.3, data=data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'boxplot')
def violin_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.violinplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name, ndir, 'violinplot')
def boxen_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.boxenplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'boxenplot')
def point_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.pointplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir, 'pointplot')
def bar_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.barplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir, 'barplot')
def count_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.countplot(x=config['x'] if 'x' in config else None,
y= config['y'] if 'y' in config else None,
hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'countplot')
#############################
# --> Distibrution plots <--#
#############################
def dist_plot(self, data:list, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.distplot(a= data,
hist=config['hist'],
kde= config['kde'],
color= config['color'] if 'color' in config else None,
bins= config['bins'] if 'bins' in config else None)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'distplot')
def rug_plot(self, data:list, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.rugplot(a= data,
axis='x' if 'x' in config else 'y',
height= config['height'] if 'height' in config else None,
color= config['color'] if 'color' in config else None,
)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir, 'rugplot')
#############################
# --> Regression plots <-- #
#############################
def lm_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.lmplot(x=config['x'],
y= config['y'],
hue= config['hue'] if 'hue' in config else None,
fit_reg= False if 'fit_reg' in config else True,
scatter= False if 'scatter' in config else True,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
markers= config['markers'] if 'markers' in config else None,
height= config['height'] if 'height' in config else 5,
aspect= config['aspect'] if 'aspect' in config else 1,
col= config['col'] if 'col' in config else None,
row= config['row'] if 'row' in config else None,
x_jitter= config['x_jitter'] if 'x_jitter' in config else None,
y_jitter= config['y_jitter'] if 'y_jitter' in config else None,
line_kws= config['line_kws'] if 'line_kws' in config else None,
data= data)
if 'row' not in config and 'col' not in config:
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir, 'lmplot',legend=False)
#############################
# --> Multi plots <-- #
#############################
def joint_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.jointplot(x=config['x'],
y= config['y'],
kind= config['kind'],
dropna= True if 'dropna' in config else False,
color= config['color'] if 'color' in config else None,
height= config['height'] if 'height' in config else 5,
# line_kws= config['line_kws'] if 'line_kws' in config else None,
data= data)
if 'xlabel' in config:
plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
if 'ylabel' in config:
plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
self.save_figure(config,plot,name,ndir,'jointplot',legend=False)
def pair_plot(self, data, config:dict, name:str, ndir:str, h_size=20):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
if 'meta_style' in config:
sns.set(style=config['meta_style'],
color_codes= True if 'color_codes' in config else False)
else:
sns.set(style= "darkgrid",
color_codes= True)
plt.figure(5)
plot = sns.pairplot(hue= config['hue'] if 'hue' in config else None,
palette= config['palette'] if 'palette' in config else None,
hue_order= config['hue_order'] if 'hue_order' in config else None,
kind= config['kind'],
markers= config['markers'] if 'markers' in config else None,
height= config['height'] if 'height' in config else 5,
aspect= config['aspect'] if 'aspect' in config else 1,
vars= config['vars'] if 'vars' in config else None,
x_vars= config['x_vars'] if 'x_vars' in config else None,
y_vars= config['y_vars'] if 'y_vars' in config else None,
dropna= True if 'dropna' in config else False,
# line_kws= config['line_kws'] if 'line_kws' in config else None,
data= data)
# if 'xlabel' in config:
# plt.xlabel(config['xlabel'][0], size=config['xlabel'][1])
# if 'ylabel' in config:
# plt.ylabel(config['ylabel'][0], size=config['ylabel'][1])
# plt.title(name, size=h_size)
self.save_figure(config,plot,name,ndir,'pairplot',legend=False)
# overlay plots by giving list of lambda's
def dynamic_multi_plot(self,
data,
config:dict,
name:str,
ndir:str,
plots:list,
h_size=20,
):
# if (not self.dev_mode) and (not os.path.exists(f'{self.dir_path}/{ndir}')):
# os.mkdir(f'{self.dir_path}/{ndir}')
meta_style = config.pop('meta_style') if 'meta_style' in config else None
if meta_style != None:
sns.set(style=meta_style,
color_codes= True)
else:
sns.set(style= "darkgrid",
color_codes= True)
xlabel = config.pop('xlabel') if 'xlabel' in config else None
ylabel = config.pop('ylabel') if 'ylabel' in config else None
args = list(config.values())+[data]
plt.figure(99)
for xlambda in plots:
plot = xlambda(args)
if xlabel != None:
plt.xlabel(xlabel[0], size=xlabel[1])
if ylabel != None:
plt.ylabel(ylabel[0], size=ylabel[1])
plt.title(name,size=h_size)
self.save_figure(config,plot,name,ndir,'dynamicplot')
| 39.835461 | 128 | 0.518195 | 3,529 | 28,084 | 4.024653 | 0.062907 | 0.091248 | 0.091248 | 0.085616 | 0.815462 | 0.797508 | 0.788355 | 0.779835 | 0.767373 | 0.740407 | 0 | 0.010352 | 0.332681 | 28,084 | 705 | 129 | 39.835461 | 0.747505 | 0.118502 | 0 | 0.67462 | 0 | 0 | 0.129986 | 0.018651 | 0 | 0 | 0 | 0 | 0 | 1 | 0.047722 | false | 0 | 0.017354 | 0 | 0.067245 | 0.008677 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
38300bb6d9e052f07b076e19b3c6576f34328a1a | 27 | py | Python | metrics/meteor/__init__.py | Renovamen/Image-Captioning | de8d4f553a22e967fa56a01d5b4a2206b9431771 | [
"MIT"
] | 5 | 2020-11-03T16:08:18.000Z | 2022-01-17T03:56:15.000Z | metrics/meteor/__init__.py | Renovamen/Image-Caption | de8d4f553a22e967fa56a01d5b4a2206b9431771 | [
"MIT"
] | null | null | null | metrics/meteor/__init__.py | Renovamen/Image-Caption | de8d4f553a22e967fa56a01d5b4a2206b9431771 | [
"MIT"
] | 1 | 2020-11-03T11:29:36.000Z | 2020-11-03T11:29:36.000Z | from .meteor import Meteor
| 13.5 | 26 | 0.814815 | 4 | 27 | 5.5 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.148148 | 27 | 1 | 27 | 27 | 0.956522 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
38352b24e420c81d5c23a782c353df6897f21775 | 22,046 | py | Python | tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py | ryanloney/openvino-1 | 4e0a740eb3ee31062ba0df88fcf438564f67edb7 | [
"Apache-2.0"
] | 1,127 | 2018-10-15T14:36:58.000Z | 2020-04-20T09:29:44.000Z | tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py | ryanloney/openvino-1 | 4e0a740eb3ee31062ba0df88fcf438564f67edb7 | [
"Apache-2.0"
] | 439 | 2018-10-20T04:40:35.000Z | 2020-04-19T05:56:25.000Z | tools/mo/unit_tests/mo/middle/quantize_linear_resolver_test.py | ryanloney/openvino-1 | 4e0a740eb3ee31062ba0df88fcf438564f67edb7 | [
"Apache-2.0"
] | 414 | 2018-10-17T05:53:46.000Z | 2020-04-16T17:29:53.000Z | # Copyright (C) 2018-2022 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
import unittest
import numpy as np
from openvino.tools.mo.middle.quantize_linear_resolver import QuantizeLinearResolver
from openvino.tools.mo.front.common.partial_infer.utils import int64_array
from openvino.tools.mo.utils.ir_engine.compare_graphs import compare_graphs
from unit_tests.utils.graph import build_graph
from generator import generator, generate
nodes1_attributes = {
'input': {'kind': 'op', 'op': 'AnyOp'},
'input_data': {'kind': 'data', 'shape': None},
'quantize': {'kind': 'op', 'op': 'QuantizeLinear', 'axis': 1},
'quantize_data': {'kind': 'data', 'shape': None},
'scale_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'scale_param_q_data': {'kind': 'data', 'shape': None},
'zerop_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'zerop_param_q_data': {'kind': 'data', 'shape': None},
'out': {'kind': 'op', 'op': 'AnyOp'},
'out_data': {'kind': 'data', 'shape': None},
'result': {'kind': 'op', 'op': 'Result'},
}
nodes_ref_attributes = {
'input': {'kind': 'op', 'op': 'AnyOp'},
'input_data': {'kind': 'data', 'shape': None},
'cast': {'kind': 'op', 'op': 'Cast', 'type': 'Convert'},
'cast_data': {'kind': 'data', 'shape': None},
'f_quantize': {'kind': 'op', 'op': 'FakeQuantize', 'type': 'FakeQuantize'},
'f_quantize_data': {'kind': 'data', 'shape': None},
'mul1': {'kind': 'op', 'op': 'Mul', 'type': 'Multiply'},
'mul1_data': {'kind': 'data', 'shape': None},
'mul2': {'kind': 'op', 'op': 'Mul', 'type': 'Multiply'},
'mul2_data': {'kind': 'data', 'shape': None},
'scale_param_q': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'scale_param_q_data': {'kind': 'data', 'shape': None},
'in_low': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'in_low_data': {'kind': 'data', 'shape': None},
'in_high': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'in_high_data': {'kind': 'data', 'shape': None},
'out_low': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'out_low_data': {'kind': 'data', 'shape': None},
'out_high': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'out_high_data': {'kind': 'data', 'shape': None},
'out': {'kind': 'op', 'op': 'AnyOp'},
'out_data': {'kind': 'data', 'shape': None},
'result': {'kind': 'op', 'op': 'Result'},
'high_reshape_const': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'high_reshape_const_data': {'kind': 'data', 'shape': None},
'high_reshape': {'kind': 'op', 'type': 'Reshape', 'op': 'Reshape'},
'high_reshape_data': {'kind': 'data', 'shape': None},
'low_reshape_const': {'kind': 'op', 'type': 'Const', 'op': 'Const'},
'low_reshape_const_data': {'kind': 'data', 'shape': None},
'low_reshape': {'kind': 'op', 'type': 'Reshape', 'op': 'Reshape'},
'low_reshape_data': {'kind': 'data', 'shape': None},
}
class TestQuantizeLinearResolver(unittest.TestCase):
def test_quantize_uint8(self):
graph = build_graph(nodes1_attributes,
[('input', 'input_data'),
('input_data', 'quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'quantize'),
('zerop_param_q', 'zerop_param_q_data'),
('zerop_param_q_data', 'quantize'),
('quantize', 'quantize_data'),
('quantize_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{
'quantize': {'axis': 2},
'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
'zerop_param_q': {'shape': np.array([]), 'value': np.uint8(128)},
'zerop_param_q_data': {'shape': np.array([]), 'value': np.uint8(128)},
}, nodes_with_edges_only=True)
graph_ref = build_graph(nodes_ref_attributes,
[('input', 'input_data'),
('input_data', 'f_quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'mul1', {'out': 0}),
('in_low', 'in_low_data'),
('in_low_data', 'mul1'),
('mul1', 'mul1_data'),
('mul1_data', 'f_quantize'),
('f_quantize', 'f_quantize_data'),
('scale_param_q_data', 'mul2', {'out': 0}),
('in_high', 'in_high_data'),
('in_high_data', 'mul2'),
('mul2', 'mul2_data'),
('mul2_data', 'f_quantize'),
('out_low', 'out_low_data'),
('out_low_data', 'f_quantize'),
('out_high', 'out_high_data'),
('out_high_data', 'f_quantize'),
('f_quantize_data', 'cast'),
('cast', 'cast_data'),
('cast_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'in_low': {'shape': np.array([]), 'value': -128},
'in_low_data': {'shape': np.array([]), 'value': -128},
'in_high': {'shape': np.array([]), 'value': 127},
'in_high_data': {'shape': np.array([]), 'value': 127},
'out_low': {'shape': np.array([]), 'value': 0},
'out_low_data': {'shape': np.array([]), 'value': 0},
'out_high': {'shape': np.array([]), 'value': 255},
'out_high_data': {'shape': np.array([]), 'value': 255},
'cast': {'dst_type': np.uint8}
}, nodes_with_edges_only=True)
graph.stage = 'middle'
QuantizeLinearResolver().find_and_replace_pattern(graph)
(flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True)
self.assertTrue(flag, resp)
def test_quantize_int8(self):
graph = build_graph(nodes1_attributes,
[('input', 'input_data'),
('input_data', 'quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'quantize'),
('zerop_param_q', 'zerop_param_q_data'),
('zerop_param_q_data', 'quantize'),
('quantize', 'quantize_data'),
('quantize_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
'zerop_param_q': {'shape': np.array([]), 'value': np.int8(0)},
'zerop_param_q_data': {'shape': np.array([]), 'value': np.int8(0)},
}, nodes_with_edges_only=True)
graph_ref = build_graph(nodes_ref_attributes,
[('input', 'input_data'),
('input_data', 'f_quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'mul1', {'out': 0}),
('in_low', 'in_low_data'),
('in_low_data', 'mul1'),
('mul1', 'mul1_data'),
('mul1_data', 'f_quantize'),
('f_quantize', 'f_quantize_data'),
('scale_param_q_data', 'mul2', {'out': 0}),
('in_high', 'in_high_data'),
('in_high_data', 'mul2'),
('mul2', 'mul2_data'),
('mul2_data', 'f_quantize'),
('out_low', 'out_low_data'),
('out_low_data', 'f_quantize'),
('out_high', 'out_high_data'),
('out_high_data', 'f_quantize'),
('f_quantize_data', 'cast'),
('cast', 'cast_data'),
('cast_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'in_low': {'shape': np.array([]), 'value': -128},
'in_low_data': {'shape': np.array([]), 'value': -128},
'in_high': {'shape': np.array([]), 'value': 127},
'in_high_data': {'shape': np.array([]), 'value': 127},
'out_low': {'shape': np.array([]), 'value': -128},
'out_low_data': {'shape': np.array([]), 'value': -128},
'out_high': {'shape': np.array([]), 'value': 127},
'out_high_data': {'shape': np.array([]), 'value': 127},
'cast': {'dst_type': np.int8}
}, nodes_with_edges_only=True)
graph.stage = 'middle'
QuantizeLinearResolver().find_and_replace_pattern(graph)
(flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True)
self.assertTrue(flag, resp)
def test_quantize_no_zerop(self):
graph = build_graph(nodes1_attributes,
[('input', 'input_data'),
('input_data', 'quantize'),
('quantize', 'quantize_data'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'quantize'),
('quantize', 'quantize_data'),
('quantize_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'scale_param_q': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
'scale_param_q_data': {'shape': np.array([]), 'value': np.float32(1.0 / 255)},
}, nodes_with_edges_only=True)
graph_ref = build_graph(nodes_ref_attributes,
[('input', 'input_data'),
('input_data', 'f_quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'mul1', {'out': 0}),
('in_low', 'in_low_data'),
('in_low_data', 'mul1'),
('mul1', 'mul1_data'),
('mul1_data', 'f_quantize'),
('f_quantize', 'f_quantize_data'),
('scale_param_q_data', 'mul2', {'out': 0}),
('in_high', 'in_high_data'),
('in_high_data', 'mul2'),
('mul2', 'mul2_data'),
('mul2_data', 'f_quantize'),
('out_low', 'out_low_data'),
('out_low_data', 'f_quantize'),
('out_high', 'out_high_data'),
('out_high_data', 'f_quantize'),
('f_quantize_data', 'cast'),
('cast', 'cast_data'),
('cast_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'in_low': {'shape': np.array([]), 'value': 0},
'in_low_data': {'shape': np.array([]), 'value': 0},
'in_high': {'shape': np.array([]), 'value': 255},
'in_high_data': {'shape': np.array([]), 'value': 255},
'out_low': {'shape': np.array([]), 'value': 0},
'out_low_data': {'shape': np.array([]), 'value': 0},
'out_high': {'shape': np.array([]), 'value': 255},
'out_high_data': {'shape': np.array([]), 'value': 255},
'cast': {'dst_type': np.uint8}
}, nodes_with_edges_only=True)
graph.stage = 'middle'
QuantizeLinearResolver().find_and_replace_pattern(graph)
(flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True)
self.assertTrue(flag, resp)
@generator
class TestQuantizeWithAxis(unittest.TestCase):
@generate(*[(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 4, 1]),
np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]),
0, 255, 2),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 3, 1, 1]),
np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]),
0, 255, 1),
(int64_array([2, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([2, 1, 1, 1]),
np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]),
0, 255, 0),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 1, 4]),
np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]),
0, 255, -1),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.uint8), int64_array([1, 1, 4, 1]),
np.array([-2., -3., -4., -5.]), np.array([253., 252., 251., 250.]),
0, 255, -2),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 4, 1]),
np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]),
-128.0, 127.0, 2),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 3, 1, 1]),
np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]),
-128.0, 127.0, 1),
(int64_array([2, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.int8), int64_array([2, 1, 1, 1]),
np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]),
-128.0, 127.0, 0),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 1, 4]),
np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]),
-128.0, 127.0, -1),
(int64_array([1, 3, 4, 4]), np.array([2, 3, 4, 5], dtype=np.float32),
np.array([2, 3, 4, 5], dtype=np.int8), int64_array([1, 1, 4, 1]),
np.array([-130., -131., -132., -133.]), np.array([125., 124., 123., 122.]),
-128.0, 127.0, -2),
])
def test_quantize_with_axis(self, input_shape, scale_param_value, zero_param_value,
target_shape, in_low, in_high, out_low, out_high, axis):
graph = build_graph(nodes1_attributes,
[('input', 'input_data'),
('input_data', 'quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'quantize'),
('zerop_param_q', 'zerop_param_q_data'),
('zerop_param_q_data', 'quantize'),
('quantize', 'quantize_data'),
('quantize_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{
'quantize': {'axis': axis},
'input': {'shape': input_shape},
'input_data': {'shape': input_shape},
'scale_param_q': {'shape': scale_param_value.shape, 'value': scale_param_value},
'scale_param_q_data': {'shape': scale_param_value.shape, 'value': scale_param_value},
'zerop_param_q': {'shape': zero_param_value.shape, 'value': zero_param_value},
'zerop_param_q_data': {'shape': zero_param_value.shape, 'value': zero_param_value},
}, nodes_with_edges_only=True)
graph_ref = build_graph(nodes_ref_attributes,
[('input', 'input_data'),
('input_data', 'f_quantize'),
('scale_param_q', 'scale_param_q_data'),
('scale_param_q_data', 'mul1', {'out': 0}),
('in_low', 'in_low_data'),
('in_low_data', 'mul1'),
('mul1', 'mul1_data'),
('mul1_data', 'high_reshape'),
('high_reshape_const', 'high_reshape_const_data'),
('high_reshape_const_data', 'high_reshape'),
('high_reshape', 'high_reshape_data'),
('high_reshape_data', 'f_quantize'),
('f_quantize', 'f_quantize_data'),
('scale_param_q_data', 'mul2', {'out': 0}),
('in_high', 'in_high_data'),
('in_high_data', 'mul2'),
('mul2', 'mul2_data'),
('mul2_data', 'low_reshape'),
('low_reshape', 'low_reshape_data'),
('low_reshape_data', 'f_quantize'),
('low_reshape_const', 'low_reshape_const_data'),
('low_reshape_const_data', 'low_reshape'),
('out_low', 'out_low_data'),
('out_low_data', 'f_quantize'),
('out_high', 'out_high_data'),
('out_high_data', 'f_quantize'),
('f_quantize_data', 'cast'),
('cast', 'cast_data'),
('cast_data', 'out'),
('out', 'out_data'),
('out_data', 'result'),
],
{'in_low': {'shape': in_low.shape, 'value': in_low},
'in_low_data': {'shape': in_low.shape, 'value': in_low},
'in_high': {'shape': in_high.shape, 'value': in_high},
'in_high_data': {'shape': in_high.shape, 'value': in_high},
'out_low': {'shape': np.array([]), 'value': out_low},
'out_low_data': {'shape': np.array([]), 'value': out_low},
'out_high': {'shape': np.array([]), 'value': out_high},
'out_high_data': {'shape': np.array([]), 'value': out_high},
'cast': {'dst_type': zero_param_value.dtype},
'low_reshape_const_data': {'shape': target_shape.shape, 'value': target_shape},
'high_reshape_const_data': {'shape': target_shape.shape, 'value': target_shape},
}, nodes_with_edges_only=True)
graph.stage = 'middle'
QuantizeLinearResolver().find_and_replace_pattern(graph)
(flag, resp) = compare_graphs(graph, graph_ref, 'result', check_op_attrs=True)
self.assertTrue(flag, resp)
| 59.583784 | 117 | 0.407602 | 2,152 | 22,046 | 3.884294 | 0.058086 | 0.065319 | 0.052638 | 0.077282 | 0.881804 | 0.861467 | 0.817203 | 0.746142 | 0.727599 | 0.698409 | 0 | 0.053546 | 0.415495 | 22,046 | 369 | 118 | 59.745257 | 0.595142 | 0.003493 | 0 | 0.675516 | 0 | 0 | 0.233543 | 0.008194 | 0 | 0 | 0 | 0 | 0.011799 | 1 | 0.011799 | false | 0 | 0.020649 | 0 | 0.038348 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
69930d7c61f5ee1aadd7a6868dffbeb58bfae76c | 16,597 | py | Python | tests/unit/modules/test_netweavermod.py | diegoakechi/salt-saphana | 22ae5a350487a14ed4fbed218652cd45123a4238 | [
"Apache-2.0"
] | null | null | null | tests/unit/modules/test_netweavermod.py | diegoakechi/salt-saphana | 22ae5a350487a14ed4fbed218652cd45123a4238 | [
"Apache-2.0"
] | null | null | null | tests/unit/modules/test_netweavermod.py | diegoakechi/salt-saphana | 22ae5a350487a14ed4fbed218652cd45123a4238 | [
"Apache-2.0"
] | null | null | null | # -*- coding: utf-8 -*-
'''
:codeauthor: Xabier Arbulu Insausti <xarbulu@suse.com>
'''
# Import Python Libs
from __future__ import absolute_import, print_function, unicode_literals
import pytest
from salt import exceptions
# Import Salt Testing Libs
from tests.support.mixins import LoaderModuleMockMixin
from tests.support.unit import TestCase, skipIf
from tests.support import mock
from tests.support.mock import (
MagicMock,
patch,
NO_MOCK,
NO_MOCK_REASON
)
# Import Salt Libs
import salt.modules.netweavermod as netweavermod
@skipIf(NO_MOCK, NO_MOCK_REASON)
class NetweaverModuleTest(TestCase, LoaderModuleMockMixin):
'''
This class contains a set of functions that test salt.modules.netweavermod.
'''
def setup_loader_modules(self):
return {netweavermod: {}}
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_init_return(self, mock_netweaver):
'''
Test _init method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
netweaver_inst = netweavermod._init('prd', '00', 'pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
assert mock_netweaver_inst == netweaver_inst
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_init_return_conf(self, mock_netweaver):
'''
Test _init method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
mock_config = MagicMock(side_effect=[
'conf_sid',
'conf_inst',
'conf_password'
])
with patch.dict(netweavermod.__salt__, {'config.option': mock_config}):
netweaver_inst = netweavermod._init()
mock_netweaver.assert_called_once_with(
'conf_sid', 'conf_inst', 'conf_password')
assert mock_netweaver_inst == netweaver_inst
mock_config.assert_has_calls([
mock.call('netweaver.sid', None),
mock.call('netweaver.inst', None),
mock.call('netweaver.password', None)
])
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_init_raise(self, mock_netweaver):
'''
Test _init method
'''
mock_netweaver.side_effect = TypeError('error')
with pytest.raises(exceptions.SaltInvocationError) as err:
netweavermod._init('prd', '00', 'pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
assert 'error' in str(err.value)
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_execute_sapcontrol(self, mock_netweaver):
'''
Test execute_sapcontrol method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
return_data = MagicMock(output='output')
mock_netweaver_inst._execute_sapcontrol.return_value = return_data
output = netweavermod.execute_sapcontrol('function', 'prd', '00', 'pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst._execute_sapcontrol.assert_called_once_with('function')
assert output == 'output'
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_execute_sapcontrol_raise(self, mock_netweaver):
'''
Test execute_sapcontrol method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
mock_netweaver_inst._execute_sapcontrol.side_effect = \
netweavermod.netweaver.NetweaverError('error')
with pytest.raises(exceptions.CommandExecutionError) as err:
netweavermod.execute_sapcontrol('function', 'prd', '00', 'pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst._execute_sapcontrol.assert_called_once_with('function')
assert 'error' in str(err.value)
def test_is_installed_return_true(self):
'''
Test is_installed method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver_inst.is_installed.return_value = True
mock_netweaver = MagicMock(return_value=mock_netweaver_inst)
with patch.object(netweavermod, '_init', mock_netweaver):
assert netweavermod.is_installed('prd', '00', 'pass', 'ascs')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst.is_installed.assert_called_once_with('ascs')
def test_is_installed_return_false(self):
'''
Test is_installed method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver_inst.is_installed.return_value = False
mock_netweaver = MagicMock(return_value=mock_netweaver_inst)
with patch.object(netweavermod, '_init', mock_netweaver):
assert not netweavermod.is_installed('prd', '00', 'pass', 'ascs')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst.is_installed.assert_called_once_with('ascs')
def test_is_db_installed_return_true(self):
'''
Test is_db_installed method
'''
mock_wait = MagicMock(return_value=True)
with patch.dict(netweavermod.__salt__, {'hana.wait_for_connection': mock_wait}):
assert netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass')
mock_wait.assert_called_once_with(
host='192.168.10.15',
port=30015,
user='SYSTEM',
password='pass',
timeout=0,
interval=0
)
def test_is_db_installed_return_false(self):
'''
Test is_db_installed method
'''
mock_wait = MagicMock(side_effect=exceptions.CommandExecutionError)
with patch.dict(netweavermod.__salt__, {'hana.wait_for_connection': mock_wait}):
assert not netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass')
mock_wait.assert_called_once_with(
host='192.168.10.15',
port=30015,
user='SYSTEM',
password='pass',
timeout=0,
interval=0
)
def test_is_db_installed_raise_error(self):
'''
Test is_db_installed method
'''
with pytest.raises(exceptions.CommandExecutionError) as err:
netweavermod.is_db_installed('192.168.10.15', 30015, 'SYSTEM', 'pass')
assert 'hana.wait_for_connection not available. hanamod must be installed' in str(err.value)
@patch('salt.modules.netweavermod.netweaver.shell.find_pattern')
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_is_instance_installed(self, mock_netweaver, mock_find_pattern):
'''
Test is_instance_installed method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
instances_data = MagicMock(output='output')
mock_netweaver_inst.get_system_instances.return_value = instances_data
found = MagicMock()
found.group.return_value = 'sapha1er, 10, 51013, 51014, 3, ENQREP, GREEN'
mock_find_pattern.return_value = found
data = netweavermod.is_instance_installed(
'MESSAGESERVER', 'GREEN', 'virtual', 'prd', '00', 'pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst.get_system_instances.assert_called_once_with()
mock_find_pattern.assert_called_once_with('virtual.*MESSAGESERVER.*GREEN.*', 'output')
found.group.assert_called_once_with(0)
assert data['hostname'] == 'sapha1er'
assert data['instance'] == '10'
assert data['http_port'] == '51013'
assert data['https_port'] == '51014'
assert data['start_priority'] == '3'
assert data['features'] == 'ENQREP'
assert data['dispstatus'] == 'GREEN'
@patch('salt.modules.netweavermod.netweaver.shell.find_pattern')
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_is_instance_installed_not_found(self, mock_netweaver, mock_find_pattern):
'''
Test is_instance_installed method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
instances_data = MagicMock(output='output')
mock_netweaver_inst.get_system_instances.return_value = instances_data
mock_find_pattern.return_value = None
data = netweavermod.is_instance_installed(
'MESSAGESERVER', sid='prd', inst='00', password='pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst.get_system_instances.assert_called_once_with()
mock_find_pattern.assert_called_once_with('.*MESSAGESERVER.*.*', 'output')
assert data == False
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_is_instance_installed_error(self, mock_netweaver):
'''
Test is_instance_installed method
'''
mock_netweaver_inst = MagicMock()
mock_netweaver.return_value = mock_netweaver_inst
instances_data = MagicMock(output='output')
mock_netweaver_inst.get_system_instances.side_effect = \
netweavermod.netweaver.NetweaverError('errpr')
data = netweavermod.is_instance_installed(
'MESSAGESERVER', sid='prd', inst='00', password='pass')
mock_netweaver.assert_called_once_with('prd', '00', 'pass')
mock_netweaver_inst.get_system_instances.assert_called_once_with()
assert data == False
def test_attach_virtual_host(self):
mock_get_ip = MagicMock()
mock_get_ip.return_value = '192.168.15.1'
mock_retcode = MagicMock()
mock_retcode.return_value = 1
mock_run = MagicMock()
mock_run.return_value = 0
with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip,
'cmd.retcode': mock_retcode,
'cmd.run': mock_run}):
ip_address = netweavermod.attach_virtual_host('vhost', 'eth1')
mock_get_ip.assert_called_once_with('vhost')
mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True)
mock_run.assert_called_once_with('ip address add 192.168.15.1/24 dev eth1')
assert ip_address == '192.168.15.1'
def test_attach_virtual_host_not_ip(self):
mock_get_ip = MagicMock()
mock_get_ip.return_value = None
with pytest.raises(exceptions.CommandExecutionError) as err:
with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip}):
netweavermod.attach_virtual_host('vhost')
mock_get_ip.assert_called_once_with('vhost')
assert 'virtual host vhost not available' in str(err.value)
def test_attach_virtual_host_ip_found(self):
mock_get_ip = MagicMock()
mock_get_ip.return_value = '192.168.15.1'
mock_retcode = MagicMock()
mock_retcode.return_value = 0
with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip,
'cmd.retcode': mock_retcode}):
ip_address = netweavermod.attach_virtual_host('vhost')
mock_get_ip.assert_called_once_with('vhost')
mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True)
assert ip_address == '192.168.15.1'
def test_attach_virtual_host_ip_not_found(self):
mock_get_ip = MagicMock()
mock_get_ip.return_value = '192.168.15.1'
mock_retcode = MagicMock()
mock_retcode.return_value = 1
mock_run = MagicMock()
mock_run.return_value = 1
with pytest.raises(exceptions.CommandExecutionError) as err:
with patch.dict(netweavermod.__salt__, {'hosts.get_ip': mock_get_ip,
'cmd.retcode': mock_retcode,
'cmd.run': mock_run}):
netweavermod.attach_virtual_host('vhost')
mock_get_ip.assert_called_once_with('vhost')
mock_retcode.assert_called_once_with('ip a | grep 192.168.15.1/24', python_shell=True)
mock_run.assert_called_once_with('ip address add 192.168.15.1/24 dev eth0')
assert 'error running "ip address" command' in str(err.value)
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_install(self, mock_netweaver):
'''
Test install method - return
'''
netweavermod.install(
'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp')
mock_netweaver.install.assert_called_once_with(
'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd='/tmp')
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_install_raise(self, mock_netweaver):
'''
Test install method - raise
'''
mock_netweaver.install.side_effect = netweavermod.netweaver.NetweaverError(
'netweaver error'
)
with pytest.raises(exceptions.CommandExecutionError) as err:
netweavermod.install('software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root')
mock_netweaver.install.assert_called_once_with(
'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root', cwd=None)
assert 'netweaver error' in str(err.value)
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_install_ers(self, mock_netweaver):
'''
Test install method - return
'''
netweavermod.install_ers(
'software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root',
cwd='/tmp', ascs_password='ascs', timeout=15, interval=2)
mock_netweaver.install_ers.assert_called_once_with(
'software_path', 'vhost', 'productID', 'netweaver.conf',
'root', 'root', cwd='/tmp', ascs_password='ascs', timeout=15, interval=2)
@patch('salt.modules.netweavermod.netweaver.NetweaverInstance')
def test_install_ers_raise(self, mock_netweaver):
'''
Test install method - raise
'''
mock_netweaver.install_ers.side_effect = netweavermod.netweaver.NetweaverError(
'netweaver error'
)
with pytest.raises(exceptions.CommandExecutionError) as err:
netweavermod.install_ers('software_path', 'vhost', 'productID', 'netweaver.conf', 'root', 'root')
mock_netweaver.install_ers.assert_called_once_with(
'software_path', 'vhost', 'productID', 'netweaver.conf',
'root', 'root', ascs_password=None, timeout=0, interval=5, cwd=None)
assert 'netweaver error' in str(err.value)
def test_setup_cwd(self):
mock_remove = mock.MagicMock()
mock_mkdir = mock.MagicMock()
mock_touch = mock.MagicMock()
mock_chown = mock.MagicMock()
mock_set_mode = mock.MagicMock()
mock_append = mock.MagicMock()
with patch.dict(netweavermod.__salt__, {'file.remove': mock_remove,
'file.mkdir': mock_mkdir,
'file.touch': mock_touch,
'file.chown': mock_chown,
'file.set_mode': mock_set_mode,
'file.append': mock_append}):
netweavermod.setup_cwd('/software', '/tmp', ['/path/dvd1', '/path/dvd2'])
mock_remove.assert_called_once_with('/tmp')
mock_mkdir.assert_called_once_with('/tmp', user='root', group='sapinst', mode=775)
mock_touch.assert_called_once_with('/tmp/start_dir.cd')
mock_chown.assert_called_once_with('/tmp/start_dir.cd', 'root', 'sapinst')
mock_set_mode.assert_called_once_with('/tmp/start_dir.cd', 775)
mock_append.assert_has_calls([
mock.call('/tmp/start_dir.cd', args='/software'),
mock.call('/tmp/start_dir.cd', args=['/path/dvd1', '/path/dvd2'])
])
| 42.44757 | 109 | 0.642948 | 1,861 | 16,597 | 5.402472 | 0.099946 | 0.095683 | 0.063656 | 0.07957 | 0.81112 | 0.765268 | 0.73145 | 0.713945 | 0.694549 | 0.65178 | 0 | 0.021687 | 0.247093 | 16,597 | 390 | 110 | 42.55641 | 0.782891 | 0.040971 | 0 | 0.496324 | 0 | 0 | 0.178304 | 0.054659 | 0 | 0 | 0 | 0 | 0.246324 | 1 | 0.084559 | false | 0.106618 | 0.029412 | 0.003676 | 0.121324 | 0.003676 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 6 |
69a5e2ebb5ec5b80c09dc925c8ea11f2b59ed164 | 33 | py | Python | cn_v2/parser/__init__.py | Larryun/coursenotify_v2 | e82794ba83d42c2cca9b2dc7c6e6108dcecaba54 | [
"MIT"
] | 1 | 2021-03-25T22:16:07.000Z | 2021-03-25T22:16:07.000Z | cn_v2/parser/__init__.py | Larryun/coursenotify_v2 | e82794ba83d42c2cca9b2dc7c6e6108dcecaba54 | [
"MIT"
] | null | null | null | cn_v2/parser/__init__.py | Larryun/coursenotify_v2 | e82794ba83d42c2cca9b2dc7c6e6108dcecaba54 | [
"MIT"
] | null | null | null | from .course import CourseParser
| 16.5 | 32 | 0.848485 | 4 | 33 | 7 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.121212 | 33 | 1 | 33 | 33 | 0.965517 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
69ceb254944b7f733ad34ef3368c75bbb26a9d3f | 72 | py | Python | fastai/set_spawn.py | royalbhati/fastai | 745ddabcf9301b0078a16ac6333cd41684df149b | [
"Apache-2.0"
] | 67 | 2019-05-29T18:55:20.000Z | 2022-03-14T10:03:24.000Z | fastai/set_spawn.py | royalbhati/fastai | 745ddabcf9301b0078a16ac6333cd41684df149b | [
"Apache-2.0"
] | 17 | 2020-08-25T14:15:32.000Z | 2022-03-27T02:12:19.000Z | fastai/set_spawn.py | royalbhati/fastai | 745ddabcf9301b0078a16ac6333cd41684df149b | [
"Apache-2.0"
] | 89 | 2020-08-17T23:45:42.000Z | 2022-03-27T20:53:43.000Z | from multiprocessing import set_start_method
set_start_method('spawn')
| 18 | 44 | 0.861111 | 10 | 72 | 5.8 | 0.7 | 0.275862 | 0.482759 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.083333 | 72 | 3 | 45 | 24 | 0.878788 | 0 | 0 | 0 | 0 | 0 | 0.070423 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.5 | 0 | 0.5 | 0 | 1 | 0 | 0 | null | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 6 |
69d4c9689a3d4d5d42eaaa7a6092d727217f24cd | 41 | py | Python | python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py | jnthn/intellij-community | 8fa7c8a3ace62400c838e0d5926a7be106aa8557 | [
"Apache-2.0"
] | 2 | 2019-04-28T07:48:50.000Z | 2020-12-11T14:18:08.000Z | python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py | Cyril-lamirand/intellij-community | 60ab6c61b82fc761dd68363eca7d9d69663cfa39 | [
"Apache-2.0"
] | 173 | 2018-07-05T13:59:39.000Z | 2018-08-09T01:12:03.000Z | python/testData/refactoring/changeSignature/keepKeywordOfArgumentBeforeEmptyVararg.after.py | Cyril-lamirand/intellij-community | 60ab6c61b82fc761dd68363eca7d9d69663cfa39 | [
"Apache-2.0"
] | 2 | 2020-03-15T08:57:37.000Z | 2020-04-07T04:48:14.000Z | def f(y, x, *args):
pass
f(1, x=42) | 8.2 | 19 | 0.463415 | 10 | 41 | 1.9 | 0.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.103448 | 0.292683 | 41 | 5 | 20 | 8.2 | 0.551724 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.333333 | false | 0.333333 | 0 | 0 | 0.333333 | 0 | 1 | 1 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 6 |
386f47e20a37828d2987d111065970cd41e38254 | 29 | py | Python | strudel/__init__.py | XIAOKAOBO/strudel-exploration | 8e9502ea1319566997e91f8a461c78a8db7ff891 | [
"Apache-2.0"
] | 1 | 2021-11-18T17:13:37.000Z | 2021-11-18T17:13:37.000Z | strudel/__init__.py | XIAOKAOBO/strudel | 4c14246d08e7d8fc15c3182a6c15efd5456dd571 | [
"Apache-2.0"
] | null | null | null | strudel/__init__.py | XIAOKAOBO/strudel | 4c14246d08e7d8fc15c3182a6c15efd5456dd571 | [
"Apache-2.0"
] | 2 | 2021-11-18T17:13:36.000Z | 2022-01-27T20:52:44.000Z | # Created by lan at 2021/1/2
| 14.5 | 28 | 0.689655 | 7 | 29 | 2.857143 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.26087 | 0.206897 | 29 | 1 | 29 | 29 | 0.608696 | 0.896552 | 0 | null | 0 | null | 0 | 0 | null | 0 | 0 | 0 | null | 1 | null | true | 0 | 0 | null | null | null | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
387ca1ee68142daace5a85c5b19195037120372b | 72 | py | Python | tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py | hawkhai/pyinstaller | 016a24479b34de161792c72dde455a81ad4c78ae | [
"Apache-2.0"
] | 9,267 | 2015-01-01T04:08:45.000Z | 2022-03-31T11:42:38.000Z | tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py | hawkhai/pyinstaller | 016a24479b34de161792c72dde455a81ad4c78ae | [
"Apache-2.0"
] | 5,150 | 2015-01-01T12:09:56.000Z | 2022-03-31T18:06:12.000Z | tests/functional/modules/pyi_pkg_resources_provider/package/pyi_pkgres_testpkg/subpkg2/__init__.py | hawkhai/pyinstaller | 016a24479b34de161792c72dde455a81ad4c78ae | [
"Apache-2.0"
] | 2,101 | 2015-01-03T10:25:27.000Z | 2022-03-30T11:04:42.000Z | from . import subsubpkg21 # noqa: F401
from . import mod # noqa: F401
| 24 | 39 | 0.694444 | 10 | 72 | 5 | 0.6 | 0.4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.142857 | 0.222222 | 72 | 2 | 40 | 36 | 0.75 | 0.291667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
38c104fbf0c0ddc0cbebb07c83bddf6299c0bcdd | 222 | py | Python | pyperator/__init__.py | baffelli/pyperator | 4b4d176db993708dc1f7d8cec048d490910213b7 | [
"MIT"
] | 60 | 2017-03-18T10:01:16.000Z | 2021-12-07T02:55:43.000Z | pyperator/__init__.py | baffelli/pyperator | 4b4d176db993708dc1f7d8cec048d490910213b7 | [
"MIT"
] | 14 | 2017-04-11T06:10:02.000Z | 2018-03-16T12:40:20.000Z | pyperator/__init__.py | baffelli/pyperator | 4b4d176db993708dc1f7d8cec048d490910213b7 | [
"MIT"
] | 8 | 2017-11-01T11:33:34.000Z | 2019-12-01T22:58:38.000Z | from pyperator.decorators import inport, outport, component, run_once
from pyperator.nodes import Component
from pyperator.DAG import Multigraph
from pyperator.utils import InputPort, OutputPort
import pyperator.components | 44.4 | 69 | 0.864865 | 28 | 222 | 6.821429 | 0.571429 | 0.272251 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.094595 | 222 | 5 | 70 | 44.4 | 0.950249 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
38dace778a60ef15c674019b799386e41e752233 | 42 | py | Python | nlpete/models/__init__.py | kstats/nlp-models | 0ae6ea31a52509f9a1c8289e8ecfed643f254e30 | [
"MIT"
] | 95 | 2018-10-21T19:54:47.000Z | 2021-09-28T16:16:26.000Z | nlpete/models/__init__.py | kstats/nlp-models | 0ae6ea31a52509f9a1c8289e8ecfed643f254e30 | [
"MIT"
] | 30 | 2018-10-09T18:47:18.000Z | 2021-04-12T20:23:39.000Z | nlpete/models/__init__.py | kstats/nlp-models | 0ae6ea31a52509f9a1c8289e8ecfed643f254e30 | [
"MIT"
] | 12 | 2018-11-09T17:38:41.000Z | 2020-07-10T15:46:33.000Z | from nlpete.models.copynet import CopyNet
| 21 | 41 | 0.857143 | 6 | 42 | 6 | 0.833333 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.095238 | 42 | 1 | 42 | 42 | 0.947368 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
2a0fb91e95f43a756d8e2d8ae360b5b62b81ba88 | 224 | py | Python | aplus_client/django/apps.py | apluslms/a-plus-client | 21cf1575ef70baf6ece70d6ae99f7bcee554e9b1 | [
"MIT"
] | 1 | 2019-10-13T10:21:51.000Z | 2019-10-13T10:21:51.000Z | aplus_client/django/apps.py | apluslms/a-plus-client | 21cf1575ef70baf6ece70d6ae99f7bcee554e9b1 | [
"MIT"
] | null | null | null | aplus_client/django/apps.py | apluslms/a-plus-client | 21cf1575ef70baf6ece70d6ae99f7bcee554e9b1 | [
"MIT"
] | 1 | 2018-08-28T18:32:20.000Z | 2018-08-28T18:32:20.000Z | from django.apps import AppConfig
from django.utils.translation import gettext_lazy as _
class AplusClientConfig(AppConfig):
name = 'aplus_client.django'
label = 'aplus_client'
verbose_name = _("Aplus client")
| 24.888889 | 54 | 0.758929 | 27 | 224 | 6.074074 | 0.62963 | 0.20122 | 0.182927 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.160714 | 224 | 8 | 55 | 28 | 0.87234 | 0 | 0 | 0 | 0 | 0 | 0.191964 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0.333333 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
2a2c49f7a43904587471aecb73a899dc46879da9 | 60 | py | Python | api/v2/models/parties.py | Davidodari/POLITICO-API | 479560f7accc3a6e46a8cec34c4f435ae9284138 | [
"MIT"
] | 1 | 2019-09-05T23:20:21.000Z | 2019-09-05T23:20:21.000Z | api/v2/models/parties.py | Davidodari/POLITICO-API | 479560f7accc3a6e46a8cec34c4f435ae9284138 | [
"MIT"
] | 4 | 2019-02-12T10:06:12.000Z | 2019-02-20T05:00:40.000Z | api/v2/models/parties.py | Davidodari/POLITICO-API | 479560f7accc3a6e46a8cec34c4f435ae9284138 | [
"MIT"
] | 4 | 2019-02-08T23:54:24.000Z | 2019-02-19T16:26:59.000Z | from . import Model
class PartiesModelDb(Model):
pass
| 10 | 28 | 0.716667 | 7 | 60 | 6.142857 | 0.857143 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.216667 | 60 | 5 | 29 | 12 | 0.914894 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0.333333 | 0.333333 | 0 | 0.666667 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 1 | 0 | 0 | 6 |
2a6fcd5410449d2f19d4ab46be35ecf078c9daa3 | 42 | py | Python | core/preprocess/__init__.py | BarryZM/KnowYouAI | 8c9d96238090fa8fd70b8581ac536bb1b0691eb5 | [
"MIT"
] | null | null | null | core/preprocess/__init__.py | BarryZM/KnowYouAI | 8c9d96238090fa8fd70b8581ac536bb1b0691eb5 | [
"MIT"
] | null | null | null | core/preprocess/__init__.py | BarryZM/KnowYouAI | 8c9d96238090fa8fd70b8581ac536bb1b0691eb5 | [
"MIT"
] | 1 | 2020-12-31T11:13:30.000Z | 2020-12-31T11:13:30.000Z | from .v1 import PreProcessV1 as PreProcess | 42 | 42 | 0.857143 | 6 | 42 | 6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.054054 | 0.119048 | 42 | 1 | 42 | 42 | 0.918919 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
aaa42e4e4b42a3c58d19fa755851b9b66301d88b | 150 | py | Python | interface/__init__.py | jeremiahmarks/todo2017 | a81e9a2b2a016654305bfacdc8c92bc72da92294 | [
"MIT"
] | null | null | null | interface/__init__.py | jeremiahmarks/todo2017 | a81e9a2b2a016654305bfacdc8c92bc72da92294 | [
"MIT"
] | null | null | null | interface/__init__.py | jeremiahmarks/todo2017 | a81e9a2b2a016654305bfacdc8c92bc72da92294 | [
"MIT"
] | null | null | null | # -*- coding: utf-8 -*-
# @Author: Jeremiah
# @Date: 2017-04-22 15:18:17
# @Last Modified by: Jeremiah
# @Last Modified time: 2017-04-22 15:18:17
| 25 | 42 | 0.626667 | 25 | 150 | 3.76 | 0.64 | 0.12766 | 0.170213 | 0.212766 | 0.297872 | 0.297872 | 0 | 0 | 0 | 0 | 0 | 0.235772 | 0.18 | 150 | 5 | 43 | 30 | 0.528455 | 0.926667 | 0 | null | 0 | null | 0 | 0 | null | 0 | 0 | 0 | null | 1 | null | true | 0 | 0 | null | null | null | 1 | 0 | 0 | null | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
6303f0cc54c3316ef3e92c69d099da8a0466d80c | 9,500 | py | Python | sociallink.py | nepalese-noob/sociallink | 89ea75f960003731ff34bd4f38c17d11bea116d0 | [
"MIT"
] | 2 | 2022-03-26T04:06:29.000Z | 2022-03-29T14:59:02.000Z | sociallink.py | nepalese-noob/sociallink | 89ea75f960003731ff34bd4f38c17d11bea116d0 | [
"MIT"
] | null | null | null | sociallink.py | nepalese-noob/sociallink | 89ea75f960003731ff34bd4f38c17d11bea116d0 | [
"MIT"
] | null | null | null | from tkinter import *
import os
def sites():
def fishinsta():
link = os.system("cd assets/sites/instagram; hostit -f cloudflare 8080 --silent> ../../../process/link.txt 2>&1; grep -o 'https://[-0-9a-z]*\.trycloudflare.com' '../../../process/link.txt' > ../../../process/new.txt; rm ../../../process/link.txt")
def capture():
file_size = os.path.getsize('assets/sites/instagram/log.txt')
while True:
new_size=os.path.getsize('assets/sites/instagram/log.txt')
if (new_size > file_size):
os.system("bash assets/bashscript.sh instagram")
break
def uname():
g= open('process/username.txt', 'r')
unameplace.delete(0, END)
unameplace.insert(INSERT, g.read())
def pwget():
h = open("process/password.txt")
pwarea.delete(0, END)
pwarea.insert(INSERT, h.read())
def copying(event):
copybutton.config(text="copied link",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN)
copier = Tk()
r = open("process/new.txt")
copier.withdraw()
copier.clipboard_clear()
copier.clipboard_append(r.read())
copier.update()
copier.destroy()
def destroy():
root.destroy()
root1.destroy()
root4.destroy()
def otpget():
i = open("process/otp.txt")
otparea.delete(0, END)
otparea.insert(INSERT, i.read())
def ipfinder():
j = open("process/ip.txt")
ipplace.delete(0, END)
ipplace.insert(INSERT, j.read())
root4 = Tk()
root4.title("Instagram link")
copyplace = Entry(root4, width=60, font="Calibri 10")
copyplace.grid(row=0,column=2)
copyplace.insert(INSERT, "click copy link to get link")
copybutton = Button(root4,text="copy button",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN)
copybutton.bind('<Enter>', copying)
copybutton.grid(row=0, column=0)
listener = Button(root4, text="start capturing",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=capture).grid(row=1,column=0)
ip = Button(root4,text="ip",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= ipfinder)
ip.grid(row=2, column=0)
ipplace= Entry(root4, width=60, font="Calibri 10")
ipplace.grid(row=2, column=2)
ipplace.insert(INSERT, "click ip to update")
username = Button(root4,text="username",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= uname)
username.grid(row=3, column=0)
unameplace= Entry(root4, width=60, font="Calibri 10")
unameplace.grid(row=3, column=2)
unameplace.insert(INSERT, "click username to update")
pw = Button(root4,text="password",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= pwget)
pw.grid(row=4, column=0)
pwarea = Entry(root4, width=60, font="Calibri 10")
pwarea.grid(row=4,column=2)
pwarea.insert(INSERT, "click password to update")
otp = Button(root4,text="OTP",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= otpget)
otp.grid(row=5, column=0)
otparea = Entry(root4, width=60, font="Calibri 10")
otparea.grid(row=5,column=2)
otparea.insert(INSERT, "click OTP to update")
closeall=Button(root4, text="Exit all",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= destroy).grid(row=6, column=2),
root4.mainloop()
def fishfacebook():
link = os.system("cd assets/sites/facebook; hostit -f cloudflare 8080 --silent> ../../../process/link.txt 2>&1; grep -o 'https://[-0-9a-z]*\.trycloudflare.com' '../../../process/link.txt' > ../../../process/new.txt; rm ../../../process/link.txt")
def capture():
file_size = os.path.getsize('assets/sites/facebook/log.txt')
while True:
new_size=os.path.getsize('assets/sites/facebook/log.txt')
if (new_size > file_size):
os.system("bash assets/bashscript.sh facebook")
break
def uname():
g= open('process/username.txt', 'r')
unameplace.delete(0, END)
unameplace.insert(INSERT, g.read())
def pwget():
h = open("process/password.txt")
pwarea.delete(0, END)
pwarea.insert(INSERT, h.read())
def copying(event):
copybutton.config(text="copied link",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN)
copier = Tk()
r = open("process/new.txt")
copier.withdraw()
copier.clipboard_clear()
copier.clipboard_append(r.read())
copier.update()
copier.destroy()
def destroy():
root.destroy()
root1.destroy()
root3.destroy()
def otpget():
i = open("process/otp.txt")
otparea.delete(0, END)
otparea.insert(INSERT, i.read())
def ipfinder():
j = open("process/ip.txt")
ipplace.delete(0, END)
ipplace.insert(INSERT, j.read())
root3 = Tk()
root3.title("facebook link")
copyplace = Entry(root3, width=60, font="Calibri 10")
copyplace.grid(row=0,column=2)
copyplace.insert(INSERT, "click copy link to get link")
copybutton = Button(root3,text="copy button",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN)
copybutton.bind('<Enter>', copying)
copybutton.grid(row=0, column=0)
listener = Button(root3, text="start capturing",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=capture).grid(row=1,column=0)
ip = Button(root3,text="ip",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= ipfinder)
ip.grid(row=2, column=0)
ipplace= Entry(root3, width=60, font="Calibri 10")
ipplace.grid(row=2, column=2)
ipplace.insert(INSERT, "click ip to update")
username = Button(root3,text="username",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= uname)
username.grid(row=3, column=0)
unameplace= Entry(root3, width=60, font="Calibri 10")
unameplace.grid(row=3, column=2)
unameplace.insert(INSERT, "click username to update")
pw = Button(root3,text="password",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= pwget)
pw.grid(row=4, column=0)
pwarea = Entry(root3, width=60, font="Calibri 10")
pwarea.grid(row=4,column=2)
pwarea.insert(INSERT, "click password to update")
otp = Button(root3,text="OTP",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= otpget)
otp.grid(row=5, column=0)
otparea = Entry(root3, width=60, font="Calibri 10")
otparea.grid(row=5,column=2)
otparea.insert(INSERT, "click OTP to update")
closeall=Button(root3, text="Exit all",font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command= destroy).grid(row=6, column=2),
root3.mainloop()
root1 = Tk()
root1.geometry('500x100+500+760')
root1.title("coose option")
option1 = Button(root1, text = 'Facebook',font=('Times New Roman', 18,'bold'), bg="blue", fg="white", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command = fishfacebook).grid(row = 0, column = 0)
option1 = Button(root1, text = 'instagram',font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="pink", activeforeground="red", cursor="hand2", relief=SUNKEN,command = fishinsta).grid(row = 0, column = 1)
toolcloser = Button(root1, text = 'Quit !',font=('Times New Roman', 18,'bold'), bg="red", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command = root1.destroy).grid(row = 0, column = 3)
root1.mainloop()
os.system("""
#!/bin/bash
if [ -f process/new.txt ]; then
rm process/new.txt
fi
""")
os.system("""if [ ! -d process ]; then mkdir -p process; fi""")
root=Tk()
root.title("practise")
root.geometry("300x100+600+900")
button1=Button(root, text="Start!", font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=sites).grid(row=0, column=3)
button2=Button(root, text="exit", font=('Times New Roman', 18,'bold'), bg="purple", fg="yellow", state="normal", activebackground="blue", activeforeground="red", cursor="hand2", relief=SUNKEN, command=root.destroy).grid(row=0, column=4)
root.mainloop()
| 54.285714 | 250 | 0.683895 | 1,309 | 9,500 | 4.954163 | 0.120703 | 0.031303 | 0.038859 | 0.05505 | 0.891596 | 0.880339 | 0.872629 | 0.848111 | 0.848111 | 0.842868 | 0 | 0.030448 | 0.118421 | 9,500 | 174 | 251 | 54.597701 | 0.743881 | 0 | 0 | 0.596273 | 0 | 0.012422 | 0.266 | 0.038632 | 0 | 0 | 0 | 0 | 0 | 1 | 0.10559 | false | 0.037267 | 0.012422 | 0 | 0.118012 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
2d6d95ebb8b86219e60c3decc8d65488963ca2e1 | 33 | py | Python | VAEs/SimpleVAE/__init__.py | TeaKatz/Models_Corpus | 6d9e91eb97829e73d88ecfc4754492f6324ef383 | [
"MIT"
] | null | null | null | VAEs/SimpleVAE/__init__.py | TeaKatz/Models_Corpus | 6d9e91eb97829e73d88ecfc4754492f6324ef383 | [
"MIT"
] | null | null | null | VAEs/SimpleVAE/__init__.py | TeaKatz/Models_Corpus | 6d9e91eb97829e73d88ecfc4754492f6324ef383 | [
"MIT"
] | null | null | null | from .SimpleVAE import SimpleVAE
| 16.5 | 32 | 0.848485 | 4 | 33 | 7 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.121212 | 33 | 1 | 33 | 33 | 0.965517 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
2da303fcee860450dca491d65e249220141e7f21 | 57,910 | py | Python | ghostwriter/reporting/forms.py | bbhunter/Ghostwriter | 1b684ddd119feed9891e83b39c9b314b41d086ca | [
"BSD-3-Clause"
] | null | null | null | ghostwriter/reporting/forms.py | bbhunter/Ghostwriter | 1b684ddd119feed9891e83b39c9b314b41d086ca | [
"BSD-3-Clause"
] | null | null | null | ghostwriter/reporting/forms.py | bbhunter/Ghostwriter | 1b684ddd119feed9891e83b39c9b314b41d086ca | [
"BSD-3-Clause"
] | null | null | null | """This contains all of the forms used by the Reporting application."""
# Django Imports
from django import forms
from django.core.exceptions import ValidationError
from django.urls import reverse
from django.utils.translation import gettext_lazy as _
# 3rd Party Libraries
from crispy_forms.bootstrap import Accordion, AccordionGroup, FieldWithButtons
from crispy_forms.helper import FormHelper
from crispy_forms.layout import (
HTML,
ButtonHolder,
Column,
Div,
Field,
Layout,
Row,
Submit,
)
# Ghostwriter Libraries
from ghostwriter.modules.custom_layout_object import SwitchToggle
from ghostwriter.reporting.models import (
Evidence,
Finding,
FindingNote,
LocalFindingNote,
Report,
ReportFindingLink,
ReportTemplate,
)
from ghostwriter.rolodex.models import Project
class FindingForm(forms.ModelForm):
"""
Save an individual :model:`reporting.Finding`.
"""
class Meta:
model = Finding
fields = "__all__"
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
for field in self.fields:
self.fields[field].widget.attrs["autocomplete"] = "off"
self.fields["title"].widget.attrs["placeholder"] = "Finding Title"
self.fields["description"].widget.attrs["placeholder"] = "What is this ..."
self.fields["impact"].widget.attrs["placeholder"] = "What is the impact ..."
self.fields["cvss_score"].widget.attrs["placeholder"] = "What is the CVSS score ..."
self.fields["cvss_vector"].widget.attrs["placeholder"] = "What is the CVSS vector ..."
self.fields["mitigation"].widget.attrs[
"placeholder"
] = "What needs to be done ..."
self.fields["replication_steps"].widget.attrs[
"placeholder"
] = "How to reproduce/find this issue ..."
self.fields["host_detection_techniques"].widget.attrs[
"placeholder"
] = "How to detect it on an endpoint ..."
self.fields["network_detection_techniques"].widget.attrs[
"placeholder"
] = "How to detect it on a network ..."
self.fields["references"].widget.attrs[
"placeholder"
] = "Some useful links and references ..."
self.fields["finding_guidance"].widget.attrs[
"placeholder"
] = "When using this finding in a report be sure to include ..."
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_labels = True
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.layout = Layout(
HTML(
"""
<h4 class="icon search-icon">Categorization</h4>
<hr />
"""
),
"title",
Row(
Column("finding_type", css_class="form-group col-md-6 mb-0"),
Column("severity", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
Row(
Column("cvss_score", css_class="form-group col-md-6 mb-0"),
Column("cvss_vector", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
Accordion(
AccordionGroup(
"CVSS Calculator",
HTML(
"""
<!-- CVSS -->
<!--
Copyright (c) 2015, FIRST.ORG, INC.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<div class="form-row" style="text-align:center;display:inline-block">
<fieldset id="baseMetricGroup">
<legend id="baseMetricGroup_Legend" title="The Base Metric group represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Determine the vulnerable component and score Attack Vector, Attack Complexity, Privileges Required and User Interaction relative to this.">Base Score</legend>
<div class="column column-left">
<div class="metric">
<h3 id="AV_Heading" title="This metric reflects the context by which vulnerability exploitation is possible. The Base Score increases the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component.">Attack Vector (AV)</h3>
<input name="AV" value="N" id="AV_N" type="radio" onclick="CVSSAutoCalc()"><label for="AV_N" id="AV_N_Label" title="A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed "remotely exploitable” and can be thought of as an attack being exploitable one or more network hops away.">Network (N)</label>
<input name="AV" value="A" id="AV_A" type="radio" onclick="CVSSAutoCalc()"><label for="AV_A" id="AV_A_Label" title="A vulnerability exploitable with adjacent network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent (A)</label>
<input name="AV" value="L" id="AV_L" type="radio" onclick="CVSSAutoCalc()"><label for="AV_L" id="AV_L_Label" title="A vulnerability exploitable with local access means that the vulnerable component is not bound to the network stack, and the attacker’s path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file.">Local (L)</label>
<input name="AV" value="P" id="AV_P" type="radio" onclick="CVSSAutoCalc()"><label for="AV_P" id="AV_P_Label" title="A vulnerability exploitable with physical access requires the attacker to physically touch or manipulate the vulnerable component. Physical interaction may be brief or persistent.">Physical (P)</label>
</div>
<div class="metric">
<h3 id="AC_Heading" title="This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Such conditions may require the collection of more information about the target, the presence of certain system configuration settings, or computational exceptions.">Attack Complexity (AC)</h3>
<input name="AC" value="L" id="AC_L" type="radio" onclick="CVSSAutoCalc()"><label for="AC_L" id="AC_L_Label" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low (L)</label>
<input name="AC" value="H" id="AC_H" type="radio" onclick="CVSSAutoCalc()"><label for="AC_H" id="AC_H_Label" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. For example, a successful attack may require the attacker: to perform target-specific reconnaissance; to prepare the target environment to improve exploit reliability; or to inject herself into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g. a man in the middle attack).">High (H)</label>
</div>
<div class="metric">
<h3 id="PR_Heading" title="This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. This Base Score increases as fewer privileges are required.">Privileges Required (PR)</h3>
<input name="PR" value="N" id="PR_N" type="radio" onclick="CVSSAutoCalc()"><label for="PR_N" id="PR_N_Label" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None (N)</label>
<input name="PR" value="L" id="PR_L" type="radio" onclick="CVSSAutoCalc()"><label for="PR_L" id="PR_L_Label" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low (L)</label>
<input name="PR" value="H" id="PR_H" type="radio" onclick="CVSSAutoCalc()"><label for="PR_H" id="PR_H_Label" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High (H)</label>
</div>
<div class="metric">
<h3 id="UI_Heading" title="This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner. The Base Score is highest when no user interaction is required.">User Interaction (UI)</h3>
<input name="UI" value="N" id="UI_N" type="radio" onclick="CVSSAutoCalc()"><label for="UI_N" id="UI_N_Label" title="The vulnerable system can be exploited without any interaction from any user.">None (N)</label>
<input name="UI" value="R" id="UI_R" type="radio" onclick="CVSSAutoCalc()"><label for="UI_R" id="UI_R_Label" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited.">Required (R)</label>
</div>
</div>
<div class="column column-right">
<div class="metric">
<h3 id="S_Heading" title="Does a successful attack impact a component other than the vulnerable component? If so, the Base Score increases and the Confidentiality, Integrity and Authentication metrics should be scored relative to the impacted component.">Scope (S)</h3>
<input name="S" value="U" id="S_U" type="radio" onclick="CVSSAutoCalc()"><label for="S_U" id="S_U_Label" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged (U)</label>
<input name="S" value="C" id="S_C" type="radio" onclick="CVSSAutoCalc()"><label for="S_C" id="S_C_Label" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed (C)</label>
</div>
<div class="metric">
<h3 id="C_Heading" title="This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.">Confidentiality (C)</h3>
<input name="C" value="N" id="C_N" type="radio" onclick="CVSSAutoCalc()"><label for="C_N" id="C_N_Label" title="There is no loss of confidentiality within the impacted component.">None (N)</label>
<input name="C" value="L" id="C_L" type="radio" onclick="CVSSAutoCalc()"><label for="C_L" id="C_L_Label" title="There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.">Low (L)</label>
<input name="C" value="H" id="C_H" type="radio" onclick="CVSSAutoCalc()"><label for="C_H" id="C_H_Label" title="There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact.">High (H)</label>
</div>
<div class="metric">
<h3 id="I_Heading" title="This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.">Integrity (I)</h3>
<input name="I" value="N" id="I_N" type="radio" onclick="CVSSAutoCalc()"><label for="I_N" id="I_N_Label" title="There is no loss of integrity within the impacted component.">None (N)</label>
<input name="I" value="L" id="I_L" type="radio" onclick="CVSSAutoCalc()"><label for="I_L" id="I_L_Label" title="Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.">Low (L)</label>
<input name="I" value="H" id="I_H" type="radio" onclick="CVSSAutoCalc()"><label for="I_H" id="I_H_Label" title="There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.">High (H)</label>
</div>
<div class="metric">
<h3 id="A_Heading" title="This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.">Availability (A)</h3>
<input name="A" value="N" id="A_N" type="radio" onclick="CVSSAutoCalc()"><label for="A_N" id="A_N_Label" title="There is no impact to availability within the impacted component.">None (N)</label>
<input name="A" value="L" id="A_L" type="radio" onclick="CVSSAutoCalc()"><label for="A_L" id="A_L_Label" title="There is reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the impacted component.">Low (L)</label>
<input name="A" value="H" id="A_H" type="radio" onclick="CVSSAutoCalc()"><label for="A_H" id="A_H_Label" title="There is total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).">High (H)</label>
</div>
</div>
<div id="scoreRating" class="scoreRating">
<span id="baseMetricScore"></span>
<span id="baseSeverity">Select values for all base metrics</span>
</div>
</fieldset>
</div>
"""
),
active=False,
template="accordion_group.html",
),
),
HTML(
"""
<h4 class="icon pencil-icon">General Information</h4>
<hr />
"""
),
Field("description"),
Field("impact"),
HTML(
"""
<h4 class="icon shield-icon">Defense</h4>
<hr />
"""
),
Field("mitigation"),
Field("replication_steps"),
Field("host_detection_techniques"),
Field(
"network_detection_techniques",
),
HTML(
"""
<h4 class="icon link-icon">Reference Links</h4>
<hr />
"""
),
"references",
"finding_guidance",
ButtonHolder(
Submit("submit_btn", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
class ReportForm(forms.ModelForm):
"""
Save an individual :model:`reporting.Report` associated with an indivudal
:model:`rolodex.Project`.
"""
class Meta:
model = Report
exclude = ("creation", "last_update", "created_by", "complete")
def __init__(self, project=None, *args, **kwargs):
super().__init__(*args, **kwargs)
self.project_instance = project
# Limit the list to just projects not marked as complete
active_projects = Project.objects.filter(complete=False).order_by(
"-start_date", "client", "project_type"
)
if active_projects:
self.fields["project"].empty_label = "-- Select an Active Project --"
else:
self.fields["project"].empty_label = "-- No Active Projects --"
self.fields["project"].queryset = active_projects
self.fields[
"project"
].label_from_instance = (
lambda obj: f"{obj.start_date} {obj.client.name} {obj.project_type} ({obj.codename})"
)
self.fields["docx_template"].label = "DOCX Template"
self.fields["pptx_template"].label = "PPTX Template"
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_labels = True
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.layout = Layout(
"title",
"project",
HTML(
"""
<h4 class="icon file-icon">Assign Templates</h4>
<hr />
"""
),
Row(
Column("docx_template", css_class="form-group col-md-6 mb-0"),
Column("pptx_template", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
ButtonHolder(
Submit("submit", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
class ReportFindingLinkUpdateForm(forms.ModelForm):
"""
Update an individual :model:`reporting.ReportFindingLink` associated with an
individual :model:`reporting.Report`.
"""
class Meta:
model = ReportFindingLink
exclude = ("report", "position", "finding_guidance")
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
evidence_upload_url = reverse(
"reporting:upload_evidence_modal",
kwargs={"pk": self.instance.id, "modal": "modal"},
)
for field in self.fields:
self.fields[field].widget.attrs["autocomplete"] = "off"
self.fields["affected_entities"].widget.attrs[
"placeholder"
] = "List of Hostnames or IP Addresses"
self.fields["title"].widget.attrs["placeholder"] = "Finding Title"
self.fields["description"].widget.attrs["placeholder"] = "What is this ..."
self.fields["impact"].widget.attrs["placeholder"] = "What is the impact ..."
self.fields["cvss_score"].widget.attrs["placeholder"] = "What is the CVSS score ..."
self.fields["cvss_vector"].widget.attrs["placeholder"] = "What is the CVSS vector ..."
self.fields["mitigation"].widget.attrs[
"placeholder"
] = "What needs to be done ..."
self.fields["replication_steps"].widget.attrs[
"placeholder"
] = "How to reproduce/find this issue ..."
self.fields["host_detection_techniques"].widget.attrs[
"placeholder"
] = "How to detect it on an endpoint ..."
self.fields["network_detection_techniques"].widget.attrs[
"placeholder"
] = "How to detect it on a network ..."
self.fields["references"].widget.attrs[
"placeholder"
] = "Some useful links and references ..."
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_labels = True
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.form_id = "report-finding-form"
self.helper.attrs = {"evidence-upload-modal-url": evidence_upload_url}
self.helper.layout = Layout(
HTML(
"""
<h4 class="icon search-icon">Categorization</h4>
<hr />
"""
),
Row(
Column("title", css_class="form-group col-md-6 mb-0"),
Column("assigned_to", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
Row(
Column("finding_type", css_class="form-group col-md-6 mb-0"),
Column("severity", css_class="form-group col-md-6 mb-0"),
),
Row(
Column("cvss_score", css_class="form-group col-md-6 mb-0"),
Column("cvss_vector", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
Accordion(
AccordionGroup(
"CVSS Calculator",
HTML(
"""
<!-- CVSS -->
<!--
Copyright (c) 2015, FIRST.ORG, INC.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<div class="form-row" style="text-align:center;display:inline-block">
<fieldset id="baseMetricGroup">
<legend id="baseMetricGroup_Legend" title="The Base Metric group represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Determine the vulnerable component and score Attack Vector, Attack Complexity, Privileges Required and User Interaction relative to this.">Base Score</legend>
<div class="column column-left">
<div class="metric">
<h3 id="AV_Heading" title="This metric reflects the context by which vulnerability exploitation is possible. The Base Score increases the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component.">Attack Vector (AV)</h3>
<input name="AV" value="N" id="AV_N" type="radio" onclick="CVSSAutoCalc()"><label for="AV_N" id="AV_N_Label" title="A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed "remotely exploitable” and can be thought of as an attack being exploitable one or more network hops away.">Network (N)</label>
<input name="AV" value="A" id="AV_A" type="radio" onclick="CVSSAutoCalc()"><label for="AV_A" id="AV_A_Label" title="A vulnerability exploitable with adjacent network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent (A)</label>
<input name="AV" value="L" id="AV_L" type="radio" onclick="CVSSAutoCalc()"><label for="AV_L" id="AV_L_Label" title="A vulnerability exploitable with local access means that the vulnerable component is not bound to the network stack, and the attacker’s path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, otherwise, she may rely on User Interaction to execute a malicious file.">Local (L)</label>
<input name="AV" value="P" id="AV_P" type="radio" onclick="CVSSAutoCalc()"><label for="AV_P" id="AV_P_Label" title="A vulnerability exploitable with physical access requires the attacker to physically touch or manipulate the vulnerable component. Physical interaction may be brief or persistent.">Physical (P)</label>
</div>
<div class="metric">
<h3 id="AC_Heading" title="This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Such conditions may require the collection of more information about the target, the presence of certain system configuration settings, or computational exceptions.">Attack Complexity (AC)</h3>
<input name="AC" value="L" id="AC_L" type="radio" onclick="CVSSAutoCalc()"><label for="AC_L" id="AC_L_Label" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low (L)</label>
<input name="AC" value="H" id="AC_H" type="radio" onclick="CVSSAutoCalc()"><label for="AC_H" id="AC_H_Label" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. For example, a successful attack may require the attacker: to perform target-specific reconnaissance; to prepare the target environment to improve exploit reliability; or to inject herself into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g. a man in the middle attack).">High (H)</label>
</div>
<div class="metric">
<h3 id="PR_Heading" title="This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. This Base Score increases as fewer privileges are required.">Privileges Required (PR)</h3>
<input name="PR" value="N" id="PR_N" type="radio" onclick="CVSSAutoCalc()"><label for="PR_N" id="PR_N_Label" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None (N)</label>
<input name="PR" value="L" id="PR_L" type="radio" onclick="CVSSAutoCalc()"><label for="PR_L" id="PR_L_Label" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low (L)</label>
<input name="PR" value="H" id="PR_H" type="radio" onclick="CVSSAutoCalc()"><label for="PR_H" id="PR_H_Label" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High (H)</label>
</div>
<div class="metric">
<h3 id="UI_Heading" title="This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner. The Base Score is highest when no user interaction is required.">User Interaction (UI)</h3>
<input name="UI" value="N" id="UI_N" type="radio" onclick="CVSSAutoCalc()"><label for="UI_N" id="UI_N_Label" title="The vulnerable system can be exploited without any interaction from any user.">None (N)</label>
<input name="UI" value="R" id="UI_R" type="radio" onclick="CVSSAutoCalc()"><label for="UI_R" id="UI_R_Label" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited.">Required (R)</label>
</div>
</div>
<div class="column column-right">
<div class="metric">
<h3 id="S_Heading" title="Does a successful attack impact a component other than the vulnerable component? If so, the Base Score increases and the Confidentiality, Integrity and Authentication metrics should be scored relative to the impacted component.">Scope (S)</h3>
<input name="S" value="U" id="S_U" type="radio" onclick="CVSSAutoCalc()"><label for="S_U" id="S_U_Label" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged (U)</label>
<input name="S" value="C" id="S_C" type="radio" onclick="CVSSAutoCalc()"><label for="S_C" id="S_C_Label" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed (C)</label>
</div>
<div class="metric">
<h3 id="C_Heading" title="This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.">Confidentiality (C)</h3>
<input name="C" value="N" id="C_N" type="radio" onclick="CVSSAutoCalc()"><label for="C_N" id="C_N_Label" title="There is no loss of confidentiality within the impacted component.">None (N)</label>
<input name="C" value="L" id="C_L" type="radio" onclick="CVSSAutoCalc()"><label for="C_L" id="C_L_Label" title="There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.">Low (L)</label>
<input name="C" value="H" id="C_H" type="radio" onclick="CVSSAutoCalc()"><label for="C_H" id="C_H_Label" title="There is total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact.">High (H)</label>
</div>
<div class="metric">
<h3 id="I_Heading" title="This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.">Integrity (I)</h3>
<input name="I" value="N" id="I_N" type="radio" onclick="CVSSAutoCalc()"><label for="I_N" id="I_N_Label" title="There is no loss of integrity within the impacted component.">None (N)</label>
<input name="I" value="L" id="I_L" type="radio" onclick="CVSSAutoCalc()"><label for="I_L" id="I_L_Label" title="Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.">Low (L)</label>
<input name="I" value="H" id="I_H" type="radio" onclick="CVSSAutoCalc()"><label for="I_H" id="I_H_Label" title="There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.">High (H)</label>
</div>
<div class="metric">
<h3 id="A_Heading" title="This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.">Availability (A)</h3>
<input name="A" value="N" id="A_N" type="radio" onclick="CVSSAutoCalc()"><label for="A_N" id="A_N_Label" title="There is no impact to availability within the impacted component.">None (N)</label>
<input name="A" value="L" id="A_L" type="radio" onclick="CVSSAutoCalc()"><label for="A_L" id="A_L_Label" title="There is reduced performance or interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the impacted component are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the impacted component.">Low (L)</label>
<input name="A" value="H" id="A_H" type="radio" onclick="CVSSAutoCalc()"><label for="A_H" id="A_H_Label" title="There is total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).">High (H)</label>
</div>
</div>
<div id="scoreRating" class="scoreRating">
<span id="baseMetricScore"></span>
<span id="baseSeverity">Select values for all base metrics</span>
</div>
</fieldset>
</div>
"""
),
active=False,
template="accordion_group.html",
),
),
HTML(
"""
<h4 class="icon list-icon">Affected Entities</h4>
<hr />
"""
),
Field("affected_entities", css_class="enable-evidence-upload"),
HTML(
"""
<h4 class="icon pencil-icon">General Information</h4>
<hr />
"""
),
Field("description", css_class="enable-evidence-upload"),
Field("impact", css_class="enable-evidence-upload"),
HTML(
"""
<h4 class="icon shield-icon">Defense</h4>
<hr />
"""
),
Field("mitigation", css_class="enable-evidence-upload"),
Field("replication_steps", css_class="enable-evidence-upload"),
Field("host_detection_techniques", css_class="enable-evidence-upload"),
Field(
"network_detection_techniques",
css_class="enable-evidence-upload",
),
HTML(
"""
<h4 class="icon link-icon">Reference Links</h4>
<hr />
"""
),
Field("references", css_class="enable-evidence-upload"),
ButtonHolder(
Submit("submit_btn", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
class EvidenceForm(forms.ModelForm):
"""
Save an individual :model:`reporting.Evidence` associated with an individual
:model:`reporting.ReportFindingLink`.
"""
class Meta:
model = Evidence
fields = (
"friendly_name",
"document",
"description",
"caption",
)
widgets = {
"document": forms.FileInput(attrs={"class": "form-control"}),
}
def __init__(self, *args, **kwargs):
self.is_modal = kwargs.pop("is_modal", None)
self.evidence_queryset = kwargs.pop("evidence_queryset", None)
super().__init__(*args, **kwargs)
self.fields["caption"].required = True
self.fields["caption"].widget.attrs["autocomplete"] = "off"
self.fields["caption"].widget.attrs["placeholder"] = "Report Caption"
self.fields["friendly_name"].required = True
self.fields["friendly_name"].widget.attrs["autocomplete"] = "off"
self.fields["friendly_name"].widget.attrs["placeholder"] = "Friendly Name"
self.fields["description"].widget.attrs[
"placeholder"
] = "Brief Description or Note"
self.fields["document"].widget.attrs["class"] = "custom-file-input"
# Don't set form buttons for a modal pop-up
if self.is_modal:
submit = None
cancel_button = None
else:
submit = Submit(
"submit-button", "Submit", css_class="btn btn-primary col-md-4"
)
cancel_button = HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
)
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_errors = False
self.helper.form_show_labels = False
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.attrs = {"enctype": "multipart/form-data"}
self.helper.form_id = "evidence-upload-form"
self.helper.layout = Layout(
HTML(
"""
<h4 class="icon signature-icon">Report Information</h4>
<hr>
<p>The friendly name is used to reference this evidence in the report and the caption appears below the figures in the generated reports.</p>
"""
),
Row(
Column("friendly_name", css_class="form-group col-md-6 mb-0"),
Column("caption", css_class="form-group col-md-6 mb-0"),
css_class="form-row",
),
"description",
HTML(
"""
<h4 class="icon upload-icon">Upload a File</h4>
<hr>
<p>Attach text evidence (*.txt, *.log, or *.md) or image evidence (*.png, *.jpg, or *.jpeg).</p>
"""
),
Div(
Field(
"document",
id="id_document",
),
HTML(
"""
<label id="filename" class="custom-file-label" for="customFile">Choose evidence file...</label>
"""
),
css_class="custom-file",
),
ButtonHolder(submit, cancel_button, css_class="mt-3"),
)
def clean_document(self):
document = self.cleaned_data["document"]
# Check if evidence file is missing
if not document:
raise ValidationError(
_("You must provide an evidence file"),
"incomplete",
)
return document
def clean_friendly_name(self):
friendly_name = self.cleaned_data["friendly_name"]
if self.evidence_queryset:
# Check if provided name has already been used for another file for this report
report_queryset = self.evidence_queryset.values_list("id", "friendly_name")
for evidence in report_queryset:
if friendly_name == evidence[1] and not self.instance.id == evidence[0]:
raise ValidationError(
_(
"This friendly name has already been used for a file attached to this finding."
),
"duplicate",
)
return friendly_name
class FindingNoteForm(forms.ModelForm):
"""
Save an individual :model:`reporting.FindingNote` associated with an individual
:model:`reporting.Finding`.
"""
class Meta:
model = FindingNote
fields = ("note",)
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
self.helper = FormHelper()
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.form_show_labels = False
self.helper.layout = Layout(
Div("note"),
ButtonHolder(
Submit("submit", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
def clean_note(self):
note = self.cleaned_data["note"]
# Check if note is empty
if not note:
raise ValidationError(
_("You must provide some content for the note"),
code="required",
)
return note
class LocalFindingNoteForm(forms.ModelForm):
"""
Save an individual :model:`reporting.LocalFindingNote` associated with an individual
:model:`ReportFindingLink.
"""
class Meta:
model = LocalFindingNote
fields = ("note",)
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
self.helper = FormHelper()
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.form_show_labels = False
self.helper.layout = Layout(
Div("note"),
ButtonHolder(
Submit("submit", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
def clean_note(self):
note = self.cleaned_data["note"]
# Check if note is empty
if not note:
raise ValidationError(
_("You must provide some content for the note"),
code="required",
)
return note
class ReportTemplateForm(forms.ModelForm):
"""
Save an individual :model:`reporting.ReportTemplate`.
"""
class Meta:
model = ReportTemplate
exclude = ("upload_date", "last_update", "lint_result", "uploaded_by")
widgets = {
"document": forms.FileInput(attrs={"class": "form-control"}),
}
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
self.fields["document"].label = ""
self.fields["document"].widget.attrs["class"] = "custom-file-input"
self.fields["name"].widget.attrs["placeholder"] = "Descriptive Name"
self.fields["description"].widget.attrs[
"placeholder"
] = "Brief Description on Template Usage"
self.fields["changelog"].widget.attrs[
"placeholder"
] = "Track Template Modifications"
self.fields["doc_type"].empty_label = "-- Select a Matching Filetype --"
self.fields["client"].empty_label = "-- Attach to a Client (Optional) --"
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_labels = False
self.helper.form_method = "post"
self.helper.form_class = "newitem"
self.helper.attrs = {"enctype": "multipart/form-data"}
self.helper.layout = Layout(
HTML(
"""
<h4 class="icon file-icon">Template Information</h4>
<hr>
<p>The name appears in the template dropdown menus in reports.</p>
"""
),
Row(
Column("name", css_class="form-group col-md-7 mb-0"),
Column("doc_type", css_class="form-group col-md-5 mb-0"),
css_class="form-row",
),
Row(
Column("client", css_class="form-group col-md-7 mb-0"),
Column(
SwitchToggle(
"protected",
),
css_class="form-group col-md-5 mb-0",
),
),
"description",
HTML(
"""
<h4 class="icon upload-icon">Upload a File</h4>
<hr>
<p>Attach a document that matches your selected filetype to use as a report template</p>
"""
),
Div(
"document",
HTML(
"""
<label id="filename" class="custom-file-label" for="customFile">Choose template file...</label>
"""
),
css_class="custom-file",
),
"changelog",
ButtonHolder(
Submit("submit", "Submit", css_class="btn btn-primary col-md-4"),
HTML(
"""
<button onclick="window.location.href='{{ cancel_link }}'" class="btn btn-outline-secondary col-md-4" type="button">Cancel</button>
"""
),
),
)
def clean_document(self):
document = self.cleaned_data["document"]
# Check if template file is missing
if not document:
raise ValidationError(
_("You must provide a template file"),
"incomplete",
)
return document
class SelectReportTemplateForm(forms.ModelForm):
"""
Modify the ``docx_template`` and ``pptx_template`` values of an individual
:model:`reporting.Report`.
"""
class Meta:
model = Report
fields = ("docx_template", "pptx_template")
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
self.fields["docx_template"].help_text = None
self.fields["pptx_template"].help_text = None
self.fields["docx_template"].empty_label = "-- Select a DOCX Template --"
self.fields["pptx_template"].empty_label = "-- Select a PPTX Template --"
# Design form layout with Crispy FormHelper
self.helper = FormHelper()
self.helper.form_show_labels = False
self.helper.form_method = "post"
self.helper.form_id = "report-template-swap-form"
self.helper.form_tag = True
self.helper.form_action = reverse(
"reporting:ajax_swap_report_template", kwargs={"pk": self.instance.id}
)
self.helper.layout = Layout(
Row(
Column(
HTML(
"""
<p class="text-left mt-1">Template for DOCX</p>
"""
),
css_class="col-md-2",
),
Column(
FieldWithButtons(
"docx_template",
HTML(
"""
<a
class="btn btn-default word-btn js-generate-report"
type="button"
href="{% url 'reporting:generate_docx' report.id %}"
data-toggle="tooltip"
data-placement="top"
title="Generate a DOCX report"
>
</a>
"""
),
),
css_class="col-md-4",
),
css_class="justify-content-md-center",
),
Row(
Column(
HTML(
"""
<p class="text-left mt-1">Template for PPTX</p>
"""
),
css_class="col-md-2",
),
Column(
FieldWithButtons(
"pptx_template",
HTML(
"""
<a
class="btn btn-default pptx-btn"
type="button"
href="{% url 'reporting:generate_pptx' report.id %}"
data-toggle="tooltip"
data-placement="top"
title="Generate a PPTX report"
>
</a>
"""
),
),
css_class="col-md-4",
),
css_class="justify-content-md-center",
),
HTML(
"""
<p class="mb-2">Other report types do not use templates:</p>
<div class="btn-group">
<a class="btn btn-default excel-btn-icon" href="{% url 'reporting:generate_xlsx' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate an XLSX report"></i></a>
<a class="btn btn-default json-btn-icon" href="{% url 'reporting:generate_json' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate exportable JSON"></a>
<a class="btn btn-default archive-btn-icon js-generate-report" href="{% url 'reporting:generate_all' report.id %}" data-toggle="tooltip" data-placement="top" title="Generate and package all report types and evidence in a Zip"></a>
</div>
"""
),
)
| 63.777533 | 922 | 0.600967 | 6,839 | 57,910 | 5.015938 | 0.105863 | 0.014867 | 0.020522 | 0.035914 | 0.881472 | 0.868383 | 0.84649 | 0.834509 | 0.824365 | 0.810576 | 0 | 0.003669 | 0.298791 | 57,910 | 907 | 923 | 63.84785 | 0.841111 | 0.024469 | 0 | 0.656627 | 0 | 0.002008 | 0.233524 | 0.028502 | 0 | 0 | 0 | 0 | 0 | 1 | 0.026104 | false | 0 | 0.02008 | 0 | 0.088353 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
2db7fde821e3e5deded708cdcb4e97fcfa628215 | 5,358 | py | Python | tests/test_segy/test_g.py | iod-ine/philoseismos | 79240d11cf82c3552c4a49d4e19a79b003fa9929 | [
"MIT"
] | 3 | 2020-09-28T17:57:29.000Z | 2021-08-18T03:54:46.000Z | tests/test_segy/test_g.py | iod-ine/philoseismos | 79240d11cf82c3552c4a49d4e19a79b003fa9929 | [
"MIT"
] | 1 | 2021-04-12T15:18:28.000Z | 2021-04-12T15:18:28.000Z | tests/test_segy/test_g.py | iod-ine/philoseismos | 79240d11cf82c3552c4a49d4e19a79b003fa9929 | [
"MIT"
] | 1 | 2020-05-12T07:00:59.000Z | 2020-05-12T07:00:59.000Z | """ philoseismos: engineering seismologist's toolbox.
This file contains tests for the Geometry object.
author: Ivan Dubrovin
e-mail: io.dubrovin@icloud.com """
import numpy as np
from philoseismos.segy.g import Geometry
def test_loading_from_file(manually_crafted_segy_file):
""" Test that Geometry object loads from file correctly. """
g = Geometry.load(manually_crafted_segy_file)
# geometry should behave like a pd.DataFrame.
# main way to access data is .loc property
# check that all the headers are correctly loaded
assert np.alltrue(g.loc[:, 'TRACENO'] == np.arange(1, 25, 1))
assert np.alltrue(g.loc[:, 'fTRACENO'] == np.arange(1, 25, 1))
assert np.alltrue(g.loc[:, 'FFID'] == 375)
assert np.alltrue(g.loc[:, 'ELEVSC'] == -100)
assert np.alltrue(g.loc[:, 'COORDSC'] == -100)
assert np.alltrue(g.loc[:, 'NUMSMP'] == 512)
assert np.alltrue(g.loc[:, 'DT'] == 500)
assert np.alltrue(g.loc[:, 'YEAR'] == 1984)
assert np.alltrue(g.loc[:, 'HOUR'] == 10)
assert np.alltrue(g.loc[:, 'MINUTE'] == 51)
# scalars to coordinates and elevations should be applied automatically
assert np.alltrue(g.loc[:, 'SOU_X'] == 50)
assert np.alltrue(g.loc[:, 'SOU_Y'] == 75)
assert np.alltrue(g.loc[:, 'REC_X'] == np.arange(0, 48, 2))
assert np.alltrue(g.loc[:, 'REC_Y'] == -1)
assert np.alltrue(g.loc[:, 'CDP_X'] == np.arange(25, 49, 1))
assert np.alltrue(g.loc[:, 'CDP_Y'] == 37)
# there should be no NaN values in the Geometry
assert np.all(g._df.notna())
def test_apply_coordinate_scalar_after_unpacking(geometry):
""" Test that scalars for coordinates and elevations are applied correctly. """
# if positive, scalar is used as a multiplier
geometry.loc[:, 'ELEVSC'] = 10
geometry.loc[:, 'COORDSC'] = 10
geometry._apply_scalars_after_unpacking()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000)
# if negative, scalar is used as divisor
geometry.loc[:, 'ELEVSC'] = -100
geometry.loc[:, 'COORDSC'] = -100
geometry._apply_scalars_after_unpacking()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70)
# value of zero is assumed to be a scalar value of 1
geometry.loc[:, 'ELEVSC'] = 0
geometry.loc[:, 'COORDSC'] = 0
geometry._apply_scalars_after_unpacking()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70)
def test_apply_coordinate_scalar_before_packing(geometry):
""" Test that scalars are applied correctly before packing. """
# when unpacking: if positive, scalar is used as a multiplier
# so we reverse it here
geometry.loc[:, 'ELEVSC'] = 10
geometry.loc[:, 'COORDSC'] = 10
geometry._apply_scalars_before_packing()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 10)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 20)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 30)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 40)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 50)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 60)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 70)
# when unpacking: if negative, scalar is used as divisor
# again reverse that
geometry.loc[:, 'ELEVSC'] = -100
geometry.loc[:, 'COORDSC'] = -100
geometry._apply_scalars_before_packing()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000)
# value of zero is assumed to be a scalar value of 1
geometry.loc[:, 'ELEVSC'] = 0
geometry.loc[:, 'COORDSC'] = 0
geometry._apply_scalars_before_packing()
assert np.alltrue(geometry.loc[:, 'REC_ELEV'] == 1000)
assert np.alltrue(geometry.loc[:, 'SOU_ELEV'] == 2000)
assert np.alltrue(geometry.loc[:, 'DEPTH'] == 3000)
assert np.alltrue(geometry.loc[:, 'REC_DATUM'] == 4000)
assert np.alltrue(geometry.loc[:, 'SOU_DATUM'] == 5000)
assert np.alltrue(geometry.loc[:, 'SOU_H2OD'] == 6000)
assert np.alltrue(geometry.loc[:, 'REC_H2OD'] == 7000)
| 40.900763 | 83 | 0.652482 | 745 | 5,358 | 4.577181 | 0.193289 | 0.138416 | 0.255132 | 0.283284 | 0.752786 | 0.702933 | 0.664223 | 0.632551 | 0.612023 | 0.612023 | 0 | 0.047802 | 0.176185 | 5,358 | 130 | 84 | 41.215385 | 0.724739 | 0.173572 | 0 | 0.722892 | 0 | 0 | 0.112047 | 0 | 0 | 0 | 0 | 0 | 0.710843 | 1 | 0.036145 | false | 0 | 0.024096 | 0 | 0.060241 | 0 | 0 | 0 | 0 | null | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
9323cebc609cf72cde63b3160323dc25d139772f | 33 | py | Python | source/py/cmd/demo.py | shakfu/pymax | 67dca5990581d91ffcedf800e585e87646ab94d4 | [
"CC0-1.0"
] | 25 | 2020-08-06T12:38:07.000Z | 2022-03-23T17:35:09.000Z | source/py/cmd/demo.py | shakfu/pymax | 67dca5990581d91ffcedf800e585e87646ab94d4 | [
"CC0-1.0"
] | 7 | 2021-04-02T02:58:56.000Z | 2022-03-31T22:58:19.000Z | source/py/cmd/demo.py | shakfu/pymax | 67dca5990581d91ffcedf800e585e87646ab94d4 | [
"CC0-1.0"
] | 3 | 2021-04-04T05:47:07.000Z | 2021-06-26T03:30:02.000Z | def color(x):
return 100*x
| 6.6 | 16 | 0.575758 | 6 | 33 | 3.166667 | 0.833333 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.130435 | 0.30303 | 33 | 4 | 17 | 8.25 | 0.695652 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.5 | false | 0 | 0 | 0.5 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 6 |
936c681b024c32764e8b1e469d2676121fb67697 | 189 | py | Python | tests/test_main.py | MattBussing/DistancePi | 23b8eca8b8e5cd9f619639cadd06e6f8b194fddb | [
"MIT"
] | null | null | null | tests/test_main.py | MattBussing/DistancePi | 23b8eca8b8e5cd9f619639cadd06e6f8b194fddb | [
"MIT"
] | null | null | null | tests/test_main.py | MattBussing/DistancePi | 23b8eca8b8e5cd9f619639cadd06e6f8b194fddb | [
"MIT"
] | null | null | null | # Author Matt Bussing
from distancepi.__main__ import get_config_loc
def test_get_config_loc():
list = ["asdf", "asf", "--config", "file"]
assert get_config_loc(list) == "file"
| 18.9 | 46 | 0.687831 | 26 | 189 | 4.576923 | 0.653846 | 0.226891 | 0.302521 | 0.268908 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.169312 | 189 | 9 | 47 | 21 | 0.757962 | 0.100529 | 0 | 0 | 0 | 0 | 0.136905 | 0 | 0 | 0 | 0 | 0 | 0.25 | 1 | 0.25 | false | 0 | 0.25 | 0 | 0.5 | 0 | 1 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
fa8bd9004bc0470d037039ed457be35f3ef3c917 | 349 | py | Python | toontown/rpc/AwardManagerUD.py | DankMickey/Project-Altis-Educational-Source | 0a74999fb52d4e690a41b984703119f63c372d20 | [
"Apache-2.0"
] | 1 | 2021-06-25T02:56:32.000Z | 2021-06-25T02:56:32.000Z | toontown/rpc/AwardManagerUD.py | kool601/Project-Altis-Educational-Source | 0a74999fb52d4e690a41b984703119f63c372d20 | [
"Apache-2.0"
] | null | null | null | toontown/rpc/AwardManagerUD.py | kool601/Project-Altis-Educational-Source | 0a74999fb52d4e690a41b984703119f63c372d20 | [
"Apache-2.0"
] | 2 | 2017-12-20T17:46:56.000Z | 2021-06-25T02:56:36.000Z | from direct.directnotify import DirectNotifyGlobal
from direct.distributed.DistributedObjectGlobalUD import DistributedObjectGlobalUD
class AwardManagerUD(DistributedObjectGlobalUD):
notify = DirectNotifyGlobal.directNotify.newCategory("AwardManagerUD")
def giveAwardToToon(self, rewardId, avId, rewardName, hours, seconds):
pass
| 34.9 | 82 | 0.825215 | 28 | 349 | 10.285714 | 0.714286 | 0.069444 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.114613 | 349 | 9 | 83 | 38.777778 | 0.932039 | 0 | 0 | 0 | 0 | 0 | 0.04023 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.166667 | false | 0.166667 | 0.333333 | 0 | 0.833333 | 0 | 1 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 6 |
fab1014650ae3102d809d95ea6678c0317e5b256 | 98 | py | Python | tests/unit/conftest.py | marcelometal/fastlane | 829afd9a9b81110c47cab175cc40b892e0aebebd | [
"MIT"
] | 32 | 2019-02-19T01:37:57.000Z | 2022-03-19T22:12:23.000Z | tests/unit/conftest.py | marcelometal/fastlane | 829afd9a9b81110c47cab175cc40b892e0aebebd | [
"MIT"
] | 15 | 2019-02-18T17:51:57.000Z | 2020-03-20T16:27:38.000Z | tests/unit/conftest.py | marcelometal/fastlane | 829afd9a9b81110c47cab175cc40b892e0aebebd | [
"MIT"
] | 26 | 2019-02-14T20:00:11.000Z | 2020-01-24T18:12:57.000Z | # Fastlane
# 3rd Party
# 3rd Party
from tests.fixtures import auth_client, client, worker # NOQA
| 19.6 | 62 | 0.755102 | 14 | 98 | 5.214286 | 0.785714 | 0.219178 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.024691 | 0.173469 | 98 | 4 | 63 | 24.5 | 0.876543 | 0.336735 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
87eafa52e94f7f3f432cbbfe311f4d4b89796f99 | 74 | py | Python | msgr/__init__.py | cieplak/msgr | d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4 | [
"Apache-2.0"
] | null | null | null | msgr/__init__.py | cieplak/msgr | d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4 | [
"Apache-2.0"
] | null | null | null | msgr/__init__.py | cieplak/msgr | d5a2d93739ddf65d5fc2e77f018ecb31dea3d3f4 | [
"Apache-2.0"
] | null | null | null | from . import brokers
from . import settings
from .message import Message
| 18.5 | 28 | 0.797297 | 10 | 74 | 5.9 | 0.5 | 0.338983 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.162162 | 74 | 3 | 29 | 24.666667 | 0.951613 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
e208c46eb93ae115803072949aa4119ecbea102b | 229 | py | Python | bfgame/generators/__init__.py | ChrisLR/BasicDungeonRL | b293d40bd9a0d3b7aec41b5e1d58441165997ff1 | [
"MIT"
] | 3 | 2017-10-28T11:28:38.000Z | 2018-09-12T09:47:00.000Z | bfgame/generators/__init__.py | ChrisLR/BasicDungeonRL | b293d40bd9a0d3b7aec41b5e1d58441165997ff1 | [
"MIT"
] | null | null | null | bfgame/generators/__init__.py | ChrisLR/BasicDungeonRL | b293d40bd9a0d3b7aec41b5e1d58441165997ff1 | [
"MIT"
] | null | null | null | from bfgame.generators.skeletoncrypt import SkeletonCrypt
from bfgame.generators.goblincamp import GoblinCampGenerator
from bfgame.generators.testing import TestingGenerator
from bfgame.generators.warzone import WarzoneGenerator
| 45.8 | 60 | 0.895197 | 24 | 229 | 8.541667 | 0.458333 | 0.195122 | 0.390244 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.069869 | 229 | 4 | 61 | 57.25 | 0.962441 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
e20a0f52df1eb14a8ed26a5dd5463407d9552cde | 137 | py | Python | menu.py | NinjaCats/split-exr | 084c387fd6309533f6da56d5f16a11001c85f873 | [
"MIT"
] | 11 | 2017-12-30T10:12:21.000Z | 2019-03-25T11:23:44.000Z | menu.py | NinjaCats/split-exr | 084c387fd6309533f6da56d5f16a11001c85f873 | [
"MIT"
] | 2 | 2021-05-16T14:46:54.000Z | 2021-12-02T08:43:19.000Z | menu.py | NinjaCats/split-exr | 084c387fd6309533f6da56d5f16a11001c85f873 | [
"MIT"
] | 6 | 2018-01-13T23:29:58.000Z | 2021-11-01T02:04:28.000Z | import nuke
from split_layers import split_layers
nuke.menu('Nuke').addCommand('Scripts/Split Layers', lambda: split_layers.main())
| 27.4 | 82 | 0.773723 | 19 | 137 | 5.421053 | 0.526316 | 0.427184 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.109489 | 137 | 4 | 83 | 34.25 | 0.844262 | 0 | 0 | 0 | 0 | 0 | 0.180451 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.666667 | 0 | 0.666667 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
e2128683968a7125243edfa86c29a3b38af1d955 | 4,498 | py | Python | resources/dot_PyCharm/system/python_stubs/-762174762/PySide/QtCore/QBitArray.py | basepipe/developer_onboarding | 05b6a776f8974c89517868131b201f11c6c2a5ad | [
"MIT"
] | 1 | 2020-04-20T02:27:20.000Z | 2020-04-20T02:27:20.000Z | resources/dot_PyCharm/system/python_stubs/cache/16012662ddca113c1f50140f9e0d3bd290a511015767475cf362e5267760f062/PySide/QtCore/QBitArray.py | basepipe/developer_onboarding | 05b6a776f8974c89517868131b201f11c6c2a5ad | [
"MIT"
] | null | null | null | resources/dot_PyCharm/system/python_stubs/cache/16012662ddca113c1f50140f9e0d3bd290a511015767475cf362e5267760f062/PySide/QtCore/QBitArray.py | basepipe/developer_onboarding | 05b6a776f8974c89517868131b201f11c6c2a5ad | [
"MIT"
] | null | null | null | # encoding: utf-8
# module PySide.QtCore
# from C:\Python27\lib\site-packages\PySide\QtCore.pyd
# by generator 1.147
# no doc
# imports
import Shiboken as __Shiboken
class QBitArray(__Shiboken.Object):
# no doc
def at(self, *args, **kwargs): # real signature unknown
pass
def clear(self, *args, **kwargs): # real signature unknown
pass
def clearBit(self, *args, **kwargs): # real signature unknown
pass
def count(self, *args, **kwargs): # real signature unknown
pass
def fill(self, *args, **kwargs): # real signature unknown
pass
def isEmpty(self, *args, **kwargs): # real signature unknown
pass
def isNull(self, *args, **kwargs): # real signature unknown
pass
def resize(self, *args, **kwargs): # real signature unknown
pass
def setBit(self, *args, **kwargs): # real signature unknown
pass
def size(self, *args, **kwargs): # real signature unknown
pass
def swap(self, *args, **kwargs): # real signature unknown
pass
def testBit(self, *args, **kwargs): # real signature unknown
pass
def toggleBit(self, *args, **kwargs): # real signature unknown
pass
def truncate(self, *args, **kwargs): # real signature unknown
pass
def __and__(self, y): # real signature unknown; restored from __doc__
""" x.__and__(y) <==> x&y """
pass
def __copy__(self, *args, **kwargs): # real signature unknown
pass
def __delitem__(self, y): # real signature unknown; restored from __doc__
""" x.__delitem__(y) <==> del x[y] """
pass
def __eq__(self, y): # real signature unknown; restored from __doc__
""" x.__eq__(y) <==> x==y """
pass
def __getitem__(self, y): # real signature unknown; restored from __doc__
""" x.__getitem__(y) <==> x[y] """
pass
def __ge__(self, y): # real signature unknown; restored from __doc__
""" x.__ge__(y) <==> x>=y """
pass
def __gt__(self, y): # real signature unknown; restored from __doc__
""" x.__gt__(y) <==> x>y """
pass
def __hash__(self): # real signature unknown; restored from __doc__
""" x.__hash__() <==> hash(x) """
pass
def __iand__(self, y): # real signature unknown; restored from __doc__
""" x.__iand__(y) <==> x&=y """
pass
def __init__(self, *args, **kwargs): # real signature unknown
pass
def __invert__(self): # real signature unknown; restored from __doc__
""" x.__invert__() <==> ~x """
pass
def __ior__(self, y): # real signature unknown; restored from __doc__
""" x.__ior__(y) <==> x|=y """
pass
def __ixor__(self, y): # real signature unknown; restored from __doc__
""" x.__ixor__(y) <==> x^=y """
pass
def __len__(self): # real signature unknown; restored from __doc__
""" x.__len__() <==> len(x) """
pass
def __le__(self, y): # real signature unknown; restored from __doc__
""" x.__le__(y) <==> x<=y """
pass
def __lt__(self, y): # real signature unknown; restored from __doc__
""" x.__lt__(y) <==> x<y """
pass
@staticmethod # known case of __new__
def __new__(S, *more): # real signature unknown; restored from __doc__
""" T.__new__(S, ...) -> a new object with type S, a subtype of T """
pass
def __ne__(self, y): # real signature unknown; restored from __doc__
""" x.__ne__(y) <==> x!=y """
pass
def __nonzero__(self): # real signature unknown; restored from __doc__
""" x.__nonzero__() <==> x != 0 """
pass
def __or__(self, y): # real signature unknown; restored from __doc__
""" x.__or__(y) <==> x|y """
pass
def __rand__(self, y): # real signature unknown; restored from __doc__
""" x.__rand__(y) <==> y&x """
pass
def __ror__(self, y): # real signature unknown; restored from __doc__
""" x.__ror__(y) <==> y|x """
pass
def __rxor__(self, y): # real signature unknown; restored from __doc__
""" x.__rxor__(y) <==> y^x """
pass
def __setitem__(self, i, y): # real signature unknown; restored from __doc__
""" x.__setitem__(i, y) <==> x[i]=y """
pass
def __xor__(self, y): # real signature unknown; restored from __doc__
""" x.__xor__(y) <==> x^y """
pass
| 29.019355 | 80 | 0.576923 | 552 | 4,498 | 4.172101 | 0.163043 | 0.220148 | 0.338689 | 0.279635 | 0.749023 | 0.688233 | 0.673035 | 0.673035 | 0.302649 | 0 | 0 | 0.00247 | 0.279902 | 4,498 | 154 | 81 | 29.207792 | 0.708552 | 0.486661 | 0 | 0.481481 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.481481 | false | 0.481481 | 0.012346 | 0 | 0.506173 | 0 | 0 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 6 |
35570785d56fa014454d372355acb5cfdff8a1d6 | 13,621 | py | Python | toyplex/components.py | yiyinglai/Solver | fdae9274447dc96bbb892be78d321dcb406a7f6c | [
"MIT"
] | null | null | null | toyplex/components.py | yiyinglai/Solver | fdae9274447dc96bbb892be78d321dcb406a7f6c | [
"MIT"
] | null | null | null | toyplex/components.py | yiyinglai/Solver | fdae9274447dc96bbb892be78d321dcb406a7f6c | [
"MIT"
] | null | null | null | from copy import deepcopy
import unittest
class Var:
"""Variables in a solver.
"""
def __init__(self, name, type='cont'):
self.type = type
self.name = name
self.val = None
def __neg__(self):
return LinExpr({self.name: -1})
def __mul__(self, other):
if isinstance(other, (int, float)):
return LinExpr({self.name: other})
def __truediv__(self, other):
if isinstance(other, (int, float)):
return LinExpr({self.name: 1/other})
def __add__(self, other):
# print('Var__add__')
if isinstance(other, (int, float)):
return LinExpr({self.name: 1, 'const': other})
elif isinstance(other, Var):
if other.name == self.name:
return LinExpr({self.name: 2})
else:
return LinExpr({self.name: 1, other.name: 1})
elif isinstance(other, LinExpr):
return other.__radd__(self)
def __eq__(self, other):
if isinstance(other, (int, float)):
return LinConstr(1 * self, '==', LinExpr({'const': other}))
elif isinstance(other, Var):
if other.name == self.name:
print('This is valid, but not necessary')
return LinConstr(1 * self, '==', 1 * other)
else:
return LinConstr(1 * self, '==', 1 * other)
def __le__(self, other):
if isinstance(other, (int, float)):
return LinConstr(1 * self, '<=', LinExpr({'const': other}))
elif isinstance(other, Var):
return LinConstr(1 * self, '<=', 1 * other)
elif isinstance(other, LinExpr):
return LinConstr(1 * self, '<=', other)
def __ge__(self, other):
if isinstance(other, (int, float)):
return LinConstr(1 * self, '>=', LinExpr({'const': other}))
elif isinstance(other, Var):
return LinConstr(1 * self, '>=', 1 * other)
elif isinstance(other, LinExpr):
return LinConstr(1 * self, '>=', other)
def __sub__(self, other):
return self.__add__(-other)
def __rsub__(self, other):
return -self.__sub__(other)
__rmul__ = __mul__
__radd__ = __add__
class LinExpr:
"""Linear expression.
"""
def __init__(self, coeffs):
self.coeffs = coeffs
def __neg__(self):
for key in self.coeffs.keys():
self.coeffs[key] = -self.coeffs[key]
return self
def __mul__(self, other):
if isinstance(other, (int, float)):
selfkeys = self.coeffs.keys()
for key in selfkeys:
self.coeffs[key] *= other
return self
def __truediv__(self, other):
if isinstance(other, (int, float)):
selfkeys = self.coeffs.keys()
for key in selfkeys:
self.coeffs[key] /= other
return self
def __add__(self, other):
if isinstance(other, (int, float)):
if 'const' in self.coeffs.keys():
self.coeffs['const'] += other
else:
self.coeffs['const'] = other
return self
elif isinstance(other, Var):
if other.name in self.coeffs.keys():
self.coeffs[other.name] += 1
else:
self.coeffs[other.name] = 1
return self
elif isinstance(other, LinExpr):
selfkeys = self.coeffs.keys()
otherkeys = other.coeffs.keys()
for key in otherkeys:
if key in selfkeys:
self.coeffs[key] += other.coeffs[key]
else:
self.coeffs[key] = other.coeffs[key]
return self
def __sub__(self, other):
if isinstance(other, (int, float)):
if 'const' in self.coeffs.keys():
self.coeffs['const'] -= other
else:
self.coeffs['const'] = -other
return self
elif isinstance(other, Var):
if other.name in self.coeffs.keys():
self.coeffs[other.name] -= 1
else:
self.coeffs[other.name] = -1
return self
elif isinstance(other, LinExpr):
selfkeys = self.coeffs.keys()
otherkeys = other.coeffs.keys()
for key in otherkeys:
if key in selfkeys:
self.coeffs[key] -= other.coeffs[key]
else:
self.coeffs[key] = -other.coeffs[key]
return self
def __rsub__(self, other):
return -self.__sub__(other)
__rmul__ = __mul__
__radd__ = __add__
def __str__(self):
_str = ''
for idx, key in enumerate(self.coeffs.keys()):
if key == 'const':
if self.coeffs[key] == 0:
if len(self.coeffs.keys()) == 1:
_str += '0'
elif self.coeffs[key] < 0:
_str += str(self.coeffs[key])
elif self.coeffs[key] > 0:
if idx == 0:
_str += str(self.coeffs[key])
else:
_str += '+' + str(self.coeffs[key])
else:
if self.coeffs[key] == 1:
if idx == 0:
_str += key
else:
_str += '+' + key
elif self.coeffs[key] == -1:
_str += '-' + key
elif self.coeffs[key] < 0:
_str += str(self.coeffs[key]) + '*' + key
else:
if idx == 0:
_str += str(self.coeffs[key]) + '*' + key
else:
_str += '+' + str(self.coeffs[key]) + '*' + key
if _str[0] == '+':
_str = _str[1:]
_str = _str.replace('+', ' + ')
_str = _str.replace('-', ' - ')
_str = _str.replace('*', ' * ')
_str = _str.replace('/', ' / ')
_str = _str.replace(' ', ' ')
return _str
def __eq__(self, other):
if isinstance(other, (int, float)):
return LinConstr(self, '==', LinExpr({'const': other}))
elif isinstance(other, Var):
return LinConstr(self, '==', 1 * other)
elif isinstance(other, LinExpr):
return LinConstr(self, '==', rhs=other)
def __le__(self, other):
if isinstance(other, (int, float)):
return LinConstr(self, '<=', LinExpr({'const': other}))
elif isinstance(other, Var):
return LinConstr(self, '<=', 1 * other)
elif isinstance(other, LinExpr):
return LinConstr(self, '<=', other)
def __ge__(self, other):
if isinstance(other, (int, float)):
return LinConstr(self, '>=', LinExpr({'const': other}))
elif isinstance(other, Var):
return LinConstr(self, '>=', 1 * other)
elif isinstance(other, LinExpr):
return LinConstr(self, '>=', other)
class LinConstr:
"""Linear constraint.
"""
def __init__(self, lhs: LinExpr, sense, rhs: LinExpr):
self.lhs = lhs
self.sense = sense
self.rhs = rhs
if 'const' not in lhs.coeffs.keys():
lhs.coeffs['const'] = 0
if 'const' not in rhs.coeffs.keys():
rhs.coeffs['const'] = 0
lhskeys = lhs.coeffs.keys()
rhskeys = rhs.coeffs.keys()
coeffs = deepcopy(lhs.coeffs)
for key in rhskeys:
if key in lhskeys:
coeffs[key] -= rhs.coeffs[key]
else:
coeffs[key] = -rhs.coeffs[key]
# final right hand side
self.b = -coeffs['const']
del coeffs['const']
# final left hand side
self.coeffs = coeffs
def __str__(self):
_str = str(self.lhs) + self.sense + str(self.rhs)
_str = _str.replace('+', ' + ')
_str = _str.replace('-', ' - ')
_str = _str.replace('*', ' * ')
_str = _str.replace('/', ' / ')
_str = _str.replace('==', ' == ')
_str = _str.replace('<=', ' <= ')
_str = _str.replace('>=', ' >= ')
_str = _str.replace(' ', ' ')
return _str
class Test(unittest.TestCase):
def test_Var__neg__(self):
x = Var('x', type='cont')
self.assertEqual((-x).coeffs, {'x': -1})
def test_Var__mul__(self):
x = Var('x', type='cont')
self.assertEqual((x * 1).coeffs, {'x': 1})
def test_Var__rmul__(self):
x = Var('x', type='cont')
self.assertEqual((1 * x).coeffs, {'x': 1})
def test_Var__truediv__(self):
x = Var('x', type='cont')
self.assertEqual((x/2).coeffs, {'x': 1/2})
def test_Var__add__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((x + 1).coeffs, {'x': 1, 'const': 1})
self.assertEqual((x + x).coeffs, {'x': 2})
self.assertEqual((x + y).coeffs, {'x': 1, 'y': 1})
self.assertEqual((x + (x + 1)).coeffs, {'x': 2, 'const': 1})
def test_Var__radd__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((1 + x).coeffs, {'x': 1, 'const': 1})
self.assertEqual((x + x).coeffs, {'x': 2})
self.assertEqual((x + y).coeffs, {'x': 1, 'y': 1})
self.assertEqual(((x + 1) + x).coeffs, {'x': 2, 'const': 1})
def test_Var__sub__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((x - 1).coeffs, {'x': 1, 'const': -1})
self.assertEqual((x - x).coeffs, {'x': 0})
self.assertEqual((x - y).coeffs, {'x': 1, 'y': -1})
self.assertEqual((x - (x + 1)).coeffs, {'x': 0, 'const': -1})
def test_Var__rsub__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((1 - x).coeffs, {'x': -1, 'const': 1})
self.assertEqual((x - x).coeffs, {'x': 0})
self.assertEqual((x - y).coeffs, {'x': 1, 'y': -1})
self.assertEqual(((x + 1) - x).coeffs, {'x': 0, 'const': 1})
def test_LinExpr__neg__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((-(x + 1)).coeffs, {'x': -1, 'const': -1})
self.assertEqual((-(x + y)).coeffs, {'x': -1, 'y': -1})
def test_LinExpr__mul__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual(((x + 1) * 1).coeffs, {'x': 1, 'const': 1})
self.assertEqual(((x + y) * 1).coeffs, {'x': 1, 'y': 1})
def test_LinExpr__rmul__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((1 * (x + 1)).coeffs, {'x': 1, 'const': 1})
self.assertEqual((1 * (x + y)).coeffs, {'x': 1, 'y': 1})
def test_LinExpr__truediv__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual(((x + 1)/2).coeffs, {'x': 1/2, 'const': 1/2})
self.assertEqual(((x + y)/2).coeffs, {'x': 1/2, 'y': 1/2})
def test_LinExpr__add__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((x + 1 + 1).coeffs, {'x': 1, 'const': 2})
self.assertEqual((x + x + y).coeffs, {'x': 2, 'y': 1})
self.assertEqual((x + y + y).coeffs, {'x': 1, 'y': 2})
self.assertEqual(((x + 1) + x).coeffs, {'x': 2, 'const': 1})
def test_LinExpr__radd__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((x + 1 + 1).coeffs, {'x': 1, 'const': 2})
self.assertEqual((x + (x + y)).coeffs, {'x': 2, 'y': 1})
self.assertEqual((x + (y + y)).coeffs, {'x': 1, 'y': 2})
self.assertEqual((x + (1 + x)).coeffs, {'x': 2, 'const': 1})
def test_LinExpr__sub__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((x + 1 - 1).coeffs, {'x': 1, 'const': 0})
self.assertEqual((x + x - y).coeffs, {'x': 2, 'y': -1})
self.assertEqual((x + y - y).coeffs, {'x': 1, 'y': 0})
self.assertEqual(((x + 1) - x).coeffs, {'x': 0, 'const': 1})
def test_LinExpr__rsub__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual((1 - (x + 1)).coeffs, {'x': -1, 'const': 0})
self.assertEqual((x - (x - y)).coeffs, {'x': 0, 'y': 1})
self.assertEqual((x - (y - y)).coeffs, {'x': 1, 'y': 0})
self.assertEqual((x - (1 - x)).coeffs, {'x': 2, 'const': -1})
def test_LinConstr__eq__(self):
x = Var('x', type='cont')
y = Var('y', type='cont')
self.assertEqual(str(x + y == 2), 'x + y == 2')
self.assertEqual(str(1 * x + 2 * y == 2), 'x + 2 * y == 2')
def test_Var__eq__(self):
x = Var('x', type='cont')
self.assertEqual(str(x == 2), 'x == 2')
def test_Var__le__(self):
x = Var('x', type='cont')
self.assertEqual(str(x <= 2), 'x <= 2')
def test_Var__ge__(self):
x = Var('x', type='cont')
self.assertEqual(str(x >= 2), 'x >= 2')
if __name__ == '__main__':
unittest.main()
| 36.226064 | 72 | 0.470597 | 1,587 | 13,621 | 3.853182 | 0.0523 | 0.120196 | 0.099428 | 0.029436 | 0.830417 | 0.800654 | 0.772363 | 0.752412 | 0.733279 | 0.702862 | 0 | 0.019548 | 0.354012 | 13,621 | 375 | 73 | 36.322667 | 0.675418 | 0.010205 | 0 | 0.536508 | 0 | 0 | 0.046757 | 0 | 0 | 0 | 0 | 0 | 0.155556 | 1 | 0.136508 | false | 0 | 0.006349 | 0.012698 | 0.292063 | 0.003175 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
3578b2762ca8526bed9b27488d0c03c351be7b6a | 150 | py | Python | examples/while_loop/py-src/base/__init__.py | magnolia-lang/magnolia-lang | ff29126a72c9f7bec7d098c25e74606fef5464e5 | [
"BSD-3-Clause"
] | 2 | 2021-12-16T14:43:28.000Z | 2022-01-17T09:49:37.000Z | examples/while_loop/py-src/base/__init__.py | magnolia-lang/magnolia-lang | ff29126a72c9f7bec7d098c25e74606fef5464e5 | [
"BSD-3-Clause"
] | 11 | 2021-07-15T11:45:03.000Z | 2022-01-13T16:43:22.000Z | examples/while_loop/py-src/base/__init__.py | magnolia-lang/magnolia-lang | ff29126a72c9f7bec7d098c25e74606fef5464e5 | [
"BSD-3-Clause"
] | 1 | 2021-07-13T15:02:36.000Z | 2021-07-13T15:02:36.000Z | from .int16_utils import int16_utils as int16_utils
from .int32_utils import int32_utils as int32_utils
from .while_ops import while_ops as while_ops
| 37.5 | 51 | 0.86 | 27 | 150 | 4.444444 | 0.296296 | 0.25 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.090909 | 0.12 | 150 | 3 | 52 | 50 | 0.818182 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
35bd219821ac5e38adfaab038dac6b1c08d72ddf | 6,914 | py | Python | DP_framework/pydp_ana.py | aitsam12/GRAM-DP_and_DP-Framework | 094c6369e43adb66ba9a0a02ee3227ca8edc1b53 | [
"MIT"
] | null | null | null | DP_framework/pydp_ana.py | aitsam12/GRAM-DP_and_DP-Framework | 094c6369e43adb66ba9a0a02ee3227ca8edc1b53 | [
"MIT"
] | null | null | null | DP_framework/pydp_ana.py | aitsam12/GRAM-DP_and_DP-Framework | 094c6369e43adb66ba9a0a02ee3227ca8edc1b53 | [
"MIT"
] | null | null | null | import pandas as pd
import numpy as np
from pydp.algorithms import laplacian as dp
import os
#######
# OpenMined-PyDp
#######
def pydp_analysis_count(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations):
if query == 'count':
dp_count_results = []
dp_MSE_results = []
dp_scaled_error_results = []
dp_percentage_error_results = []
true_count = len(dataset_column)
for itr in range(iterations):
x = dp.Count(epsilon=epsilon_value, dtype='float')
dp_count = (x.quick_result(list(dataset_column)))
dp_count_results.append(dp_count)
dp_MSE_results.append(((true_count - dp_count)**2)/iterations)
dp_scaled_error_results.append(abs(true_count - dp_count)/iterations)
dp_percentage_error_results.append(np.square((true_count - dp_count)/true_count))
print('Report for PyDp (count query)')
print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations))
print('Average DP: {dp}'.format(dp = np.mean(dp_count_results)))
print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results)))
print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results)))
#print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_count_results)))
print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100))
print('===========================')
return (np.mean(dp_count_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100)
def pydp_analysis_sum(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations):
if query == 'sum':
dp_sum_results = []
dp_MSE_results = []
dp_scaled_error_results = []
dp_percentage_error_results = []
true_sum = np.sum(dataset_column)
for itr in range(iterations):
x = dp.BoundedSum(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float')
dp_sum = x.quick_result(list(dataset_column))
dp_sum_results.append(dp_sum)
dp_MSE_results.append(((true_sum - dp_sum)**2)/iterations)
dp_scaled_error_results.append(abs(true_sum - dp_sum)/iterations)
dp_percentage_error_results.append(np.square((true_sum - dp_sum)/true_sum))
print('Report for PyDp (sum query)')
print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations))
print('Average DP: {dp}'.format(dp = np.mean(dp_sum_results)))
print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results)))
print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results)))
#print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_sum_results)))
print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100))
print('===========================')
return (np.mean(dp_sum_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100)
def pydp_analysis_mean(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations):
if query == 'mean':
dp_mean_results = []
dp_MSE_results = []
dp_scaled_error_results = []
dp_percentage_error_results = []
true_mean = np.mean(dataset_column)
for itr in range(iterations):
x = dp.BoundedMean(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float')
dp_mean = x.quick_result(list(dataset_column))
dp_mean_results.append(dp_mean)
dp_MSE_results.append(((true_mean - dp_mean)**2)/iterations)
dp_scaled_error_results.append(abs(true_mean - dp_mean)/iterations)
dp_percentage_error_results.append(np.square((true_mean - dp_mean)/true_mean))
print('Report for PyDp (mean query)')
print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations))
print('Average DP: {dp}'.format(dp = np.mean(dp_mean_results)))
print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results)))
print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results)))
#print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_mean_results)))
print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100))
print('===========================')
return (np.mean(dp_mean_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100)
def pydp_analysis_var(query, dataset_column, epsilon_value, upper_bound, lower_bound, iterations):
if query == 'var':
dp_var_results = []
dp_MSE_results = []
dp_scaled_error_results = []
dp_percentage_error_results = []
true_var = np.var(dataset_column)
for itr in range(iterations):
x = dp.BoundedVariance(epsilon_value, lower_bound=lower_bound, upper_bound=upper_bound, dtype='float')
dp_var = x.quick_result(list(dataset_column))
dp_var_results.append(dp_var)
dp_MSE_results.append(((true_var - dp_var)**2)/iterations)
dp_scaled_error_results.append(abs(true_var - dp_var)/iterations)
dp_percentage_error_results.append(np.square((true_var - dp_var)/true_var))
print('Report for PyDp (var query)')
print('Results for {it} iterations of your selected column are as follows:'.format(it=iterations))
print('Average DP: {dp}'.format(dp = np.mean(dp_var_results)))
print('Mean Squared Error (MSE): {mse}'.format(mse = np.mean(dp_MSE_results)))
print('Mean Scaled Error: {mean_scaled}'.format(mean_scaled = np.mean(dp_scaled_error_results)))
#print('Mean Percentage Error: {percent}'.format(percent = np.mean(dp_var_results)))
print('Root Mean Squared Percentage Error (RMSPE): {percent}'.format(percent = np.sqrt(np.mean(dp_percentage_error_results))*100))
print('===========================')
return (np.mean(dp_var_results), np.mean(dp_MSE_results), np.mean(dp_scaled_error_results), np.sqrt(np.mean(dp_percentage_error_results))*100)
#path = os.path.join('Living_Wage.csv')
#df = pd.read_csv(path)
#pydp_analysis_var(query='var', dataset_column=df.livingwage, epsilon_value=1.01, upper_bound=10.0, lower_bound=5.0, iterations=50)
| 60.649123 | 148 | 0.671681 | 938 | 6,914 | 4.656716 | 0.089552 | 0.056319 | 0.065934 | 0.07326 | 0.830128 | 0.806548 | 0.799679 | 0.771291 | 0.771291 | 0.647665 | 0 | 0.006775 | 0.188747 | 6,914 | 113 | 149 | 61.185841 | 0.771974 | 0.078826 | 0 | 0.391304 | 0 | 0 | 0.165459 | 0.017019 | 0 | 0 | 0 | 0 | 0 | 1 | 0.043478 | false | 0 | 0.043478 | 0 | 0.130435 | 0.304348 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
35d487af528998a227b1ac784b07bbc692b29f8d | 214 | py | Python | scripts/analysis/analysis_functions/__init__.py | phcanalytics/ibd_flare_model | 78da4640ab5a3a5d174d604d764f46059ee66dce | [
"MIT"
] | null | null | null | scripts/analysis/analysis_functions/__init__.py | phcanalytics/ibd_flare_model | 78da4640ab5a3a5d174d604d764f46059ee66dce | [
"MIT"
] | null | null | null | scripts/analysis/analysis_functions/__init__.py | phcanalytics/ibd_flare_model | 78da4640ab5a3a5d174d604d764f46059ee66dce | [
"MIT"
] | 1 | 2020-10-05T20:12:18.000Z | 2020-10-05T20:12:18.000Z | """
__init__.py file
Initializes modules used in custom utility functions for the project.
"""
# define custom functions
from analysis_functions import custom_metrics
from analysis_functions import transformers
| 21.4 | 69 | 0.82243 | 27 | 214 | 6.259259 | 0.703704 | 0.142012 | 0.248521 | 0.319527 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.135514 | 214 | 9 | 70 | 23.777778 | 0.913514 | 0.528037 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 6 |
ea08bc1b21ea32a55c12040465ee7773a0f2de13 | 115 | py | Python | TkiWrapper/Positioner.py | Jakub21/Tki-Wrapper | a886cfa28c5c5956bc98aa51b8beb8864f628e2b | [
"MIT"
] | null | null | null | TkiWrapper/Positioner.py | Jakub21/Tki-Wrapper | a886cfa28c5c5956bc98aa51b8beb8864f628e2b | [
"MIT"
] | null | null | null | TkiWrapper/Positioner.py | Jakub21/Tki-Wrapper | a886cfa28c5c5956bc98aa51b8beb8864f628e2b | [
"MIT"
] | null | null | null |
class Positioner:
# @abstractmethod
def __init__(self, frame): pass
# @abstractmethod
def get(self): pass
| 16.428571 | 33 | 0.704348 | 13 | 115 | 5.923077 | 0.692308 | 0.441558 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.191304 | 115 | 6 | 34 | 19.166667 | 0.827957 | 0.269565 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.666667 | false | 0.666667 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 6 |
ea6ffde932050c4e714b56f38466b4aafdd80c9f | 29 | py | Python | src/data/database/mysql_wrapper/__init__.py | super6liu/technical-analysis-julian | dd8868b65d80f78e536f3471d4dc09440de48e62 | [
"MIT"
] | 4 | 2022-03-23T09:22:54.000Z | 2022-03-26T13:18:45.000Z | basisopt/wrappers/__init__.py | robashaw/basisopt | c02fd307bc72c576ed298ea14648818b237d2f30 | [
"MIT"
] | null | null | null | basisopt/wrappers/__init__.py | robashaw/basisopt | c02fd307bc72c576ed298ea14648818b237d2f30 | [
"MIT"
] | 1 | 2022-03-23T09:22:54.000Z | 2022-03-23T09:22:54.000Z | from .wrapper import Wrapper
| 14.5 | 28 | 0.827586 | 4 | 29 | 6 | 0.75 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.137931 | 29 | 1 | 29 | 29 | 0.96 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
ea7cfa38422740a6d8df8ab469aedc662caae04c | 28,542 | py | Python | cinder/tests/volume/drivers/netapp/eseries/test_library.py | tmenjo/cinder-2015.1.1 | 1c83a5daa8041cb99bc85dd0301786d8ca43055a | [
"Apache-2.0"
] | null | null | null | cinder/tests/volume/drivers/netapp/eseries/test_library.py | tmenjo/cinder-2015.1.1 | 1c83a5daa8041cb99bc85dd0301786d8ca43055a | [
"Apache-2.0"
] | null | null | null | cinder/tests/volume/drivers/netapp/eseries/test_library.py | tmenjo/cinder-2015.1.1 | 1c83a5daa8041cb99bc85dd0301786d8ca43055a | [
"Apache-2.0"
] | null | null | null | # Copyright (c) 2014 Andrew Kerr
# Copyright (c) 2015 Alex Meade
# Copyright (c) 2015 Rushil Chugh
# Copyright (c) 2015 Yogesh Kshirsagar
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import copy
import ddt
import mock
from cinder import exception
from cinder import test
from cinder.tests.volume.drivers.netapp.eseries import fakes as \
eseries_fake
from cinder.tests.volume.drivers.netapp import fakes as na_fakes
from cinder.volume.drivers.netapp.eseries import library
from cinder.volume.drivers.netapp import utils as na_utils
from cinder.zonemanager import utils as fczm_utils
def get_fake_volume():
return {
'id': '114774fb-e15a-4fae-8ee2-c9723e3645ef', 'size': 1,
'volume_name': 'lun1', 'host': 'hostname@backend#DDP',
'os_type': 'linux', 'provider_location': 'lun1',
'name_id': '114774fb-e15a-4fae-8ee2-c9723e3645ef',
'provider_auth': 'provider a b', 'project_id': 'project',
'display_name': None, 'display_description': 'lun1',
'volume_type_id': None, 'migration_status': None, 'attach_status':
"detached"
}
@ddt.ddt
class NetAppEseriesLibraryTestCase(test.TestCase):
def setUp(self):
super(NetAppEseriesLibraryTestCase, self).setUp()
kwargs = {'configuration': self.get_config_eseries()}
self.library = library.NetAppESeriesLibrary('FAKE', **kwargs)
self.library._client = mock.Mock()
self.library.check_for_setup_error()
def get_config_eseries(self):
config = na_fakes.create_configuration_eseries()
config.netapp_storage_protocol = 'iscsi'
config.netapp_login = 'rw'
config.netapp_password = 'rw'
config.netapp_server_hostname = '127.0.0.1'
config.netapp_transport_type = 'http'
config.netapp_server_port = '8080'
config.netapp_storage_pools = 'DDP'
config.netapp_storage_family = 'eseries'
config.netapp_sa_password = 'saPass'
config.netapp_controller_ips = '10.11.12.13,10.11.12.14'
config.netapp_webservice_path = '/devmgr/v2'
return config
def test_do_setup(self):
self.mock_object(self.library,
'_check_mode_get_or_register_storage_system')
mock_check_flags = self.mock_object(na_utils, 'check_flags')
self.library.do_setup(mock.Mock())
self.assertTrue(mock_check_flags.called)
def test_update_ssc_info(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'driveMediaType': 'ssd'}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._get_storage_pools = mock.Mock(return_value=pools)
self.library._client.list_storage_pools = mock.Mock(return_value=[])
self.library._client.list_drives = mock.Mock(return_value=drives)
self.library._update_ssc_info()
self.assertEqual({'test_vg1': {'netapp_disk_type': 'SSD',
'netapp_disk_encryption': 'true'}},
self.library._ssc_stats)
def test_update_ssc_disk_types_ssd(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'driveMediaType': 'ssd'}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'SSD'}},
ssc_stats)
def test_update_ssc_disk_types_scsi(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': 'scsi'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'SCSI'}},
ssc_stats)
def test_update_ssc_disk_types_fcal(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': 'fibre'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'FCAL'}},
ssc_stats)
def test_update_ssc_disk_types_sata(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': 'sata'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'SATA'}},
ssc_stats)
def test_update_ssc_disk_types_sas(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': 'sas'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'SAS'}},
ssc_stats)
def test_update_ssc_disk_types_unknown(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': 'unknown'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'unknown'}},
ssc_stats)
def test_update_ssc_disk_types_undefined(self):
drives = [{'currentVolumeGroupRef': 'test_vg1',
'interfaceType': {'driveType': '__UNDEFINED'}}]
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
self.library._client.list_drives = mock.Mock(return_value=drives)
ssc_stats = self.library._update_ssc_disk_types(pools)
self.assertEqual({'test_vg1': {'netapp_disk_type': 'unknown'}},
ssc_stats)
def test_update_ssc_disk_encryption_SecType_enabled(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'enabled'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'true'}},
ssc_stats)
def test_update_ssc_disk_encryption_SecType_unknown(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'unknown'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}},
ssc_stats)
def test_update_ssc_disk_encryption_SecType_none(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'none'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}},
ssc_stats)
def test_update_ssc_disk_encryption_SecType_capable(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'capable'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'}},
ssc_stats)
def test_update_ssc_disk_encryption_SecType_garbage(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'garbage'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertRaises(TypeError, 'test_vg1',
{'netapp_disk_encryption': 'false'}, ssc_stats)
def test_update_ssc_disk_encryption_multiple(self):
pools = [{'volumeGroupRef': 'test_vg1', 'securityType': 'none'},
{'volumeGroupRef': 'test_vg2', 'securityType': 'enabled'}]
ssc_stats = self.library._update_ssc_disk_encryption(pools)
self.assertEqual({'test_vg1': {'netapp_disk_encryption': 'false'},
'test_vg2': {'netapp_disk_encryption': 'true'}},
ssc_stats)
def test_terminate_connection_iscsi_no_hosts(self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_iscsi,
get_fake_volume(),
connector)
def test_terminate_connection_iscsi_volume_not_mapped(self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_iscsi,
get_fake_volume(),
connector)
def test_terminate_connection_iscsi_volume_mapped(self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME)
fake_eseries_volume['listOfMappings'] = [
eseries_fake.VOLUME_MAPPING
]
self.mock_object(self.library._client, 'delete_volume_mapping')
self.mock_object(self.library._client, 'get_volume_mappings',
mock.Mock(return_value=[eseries_fake.VOLUME_MAPPING]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[fake_eseries_volume]))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST]))
self.library.terminate_connection_iscsi(get_fake_volume(), connector)
self.assertTrue(self.library._client.delete_volume_mapping.called)
def test_terminate_connection_iscsi_not_mapped_initiator_does_not_exist(
self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST_2]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_hardware_inventory',
mock.Mock(
return_value=eseries_fake.HARDWARE_INVENTORY))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_iscsi,
get_fake_volume(),
connector)
def test_initialize_connection_iscsi_volume_not_mapped(self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(return_value=eseries_fake.VOLUME_MAPPING))
self.mock_object(self.library._client, 'list_hardware_inventory',
mock.Mock(
return_value=eseries_fake.HARDWARE_INVENTORY))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST]))
self.mock_object(self.library._client, 'list_host_types',
mock.Mock(return_value=eseries_fake.HOST_TYPES))
self.library.initialize_connection_iscsi(get_fake_volume(), connector)
self.assertTrue(self.library._map_volume_to_host.called)
def test_initialize_connection_iscsi_volume_not_mapped_host_does_not_exist(
self):
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'get_volume_mappings',
mock.Mock(return_value=[]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(return_value=eseries_fake.VOLUME_MAPPING))
self.mock_object(self.library._client, 'list_hardware_inventory',
mock.Mock(
return_value=eseries_fake.HARDWARE_INVENTORY))
self.mock_object(self.library._client, 'list_host_types',
mock.Mock(return_value=eseries_fake.HOST_TYPES))
self.library.initialize_connection_iscsi(get_fake_volume(), connector)
self.assertTrue(self.library._map_volume_to_host.called)
def test_initialize_connection_iscsi_volume_already_mapped_to_target_host(
self):
"""Should be a no-op"""
connector = {'initiator': eseries_fake.INITIATOR_NAME}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_hardware_inventory',
mock.Mock(
return_value=eseries_fake.HARDWARE_INVENTORY))
self.mock_object(self.library._client, 'get_volume_mappings',
mock.Mock(return_value=[eseries_fake.VOLUME_MAPPING]))
self.mock_object(self.library._client, 'create_volume_mapping')
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST]))
self.mock_object(self.library._client, 'list_host_types',
mock.Mock(return_value=eseries_fake.HOST_TYPES))
self.library.initialize_connection_iscsi(get_fake_volume(), connector)
self.assertFalse(self.library._client.create_volume_mapping.called)
@ddt.data(eseries_fake.WWPN,
fczm_utils.get_formatted_wwn(eseries_fake.WWPN))
def test_get_host_with_matching_port_wwpn(self, port_id):
port_ids = [port_id]
host = copy.deepcopy(eseries_fake.HOST)
host.update(
{
'hostSidePorts': [{'label': 'NewStore', 'type': 'fc',
'address': eseries_fake.WWPN}]
}
)
host_2 = copy.deepcopy(eseries_fake.HOST_2)
host_2.update(
{
'hostSidePorts': [{'label': 'NewStore', 'type': 'fc',
'address': eseries_fake.WWPN_2}]
}
)
host_list = [host, host_2]
self.mock_object(self.library._client,
'list_hosts',
mock.Mock(return_value=host_list))
actual_host = self.library._get_host_with_matching_port(
port_ids)
self.assertEqual(host, actual_host)
def test_get_host_with_matching_port_iqn(self):
port_ids = [eseries_fake.INITIATOR_NAME]
host = copy.deepcopy(eseries_fake.HOST)
host.update(
{
'hostSidePorts': [{'label': 'NewStore', 'type': 'iscsi',
'address': eseries_fake.INITIATOR_NAME}]
}
)
host_2 = copy.deepcopy(eseries_fake.HOST_2)
host_2.update(
{
'hostSidePorts': [{'label': 'NewStore', 'type': 'iscsi',
'address': eseries_fake.INITIATOR_NAME_2}]
}
)
host_list = [host, host_2]
self.mock_object(self.library._client,
'list_hosts',
mock.Mock(return_value=host_list))
actual_host = self.library._get_host_with_matching_port(
port_ids)
self.assertEqual(host, actual_host)
def test_terminate_connection_fc_no_hosts(self):
connector = {'wwpns': [eseries_fake.WWPN]}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[]))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_fc,
get_fake_volume(),
connector)
def test_terminate_connection_fc_volume_not_mapped(self):
connector = {'wwpns': [eseries_fake.WWPN]}
fake_host = copy.deepcopy(eseries_fake.HOST)
fake_host['hostSidePorts'] = [{
'label': 'NewStore',
'type': 'fc',
'address': eseries_fake.WWPN
}]
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[fake_host]))
self.mock_object(self.library._client, 'get_volume_mappings_for_host',
mock.Mock(return_value=[]))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_fc,
get_fake_volume(),
connector)
def test_terminate_connection_fc_volume_mapped(self):
connector = {'wwpns': [eseries_fake.WWPN]}
fake_host = copy.deepcopy(eseries_fake.HOST)
fake_host['hostSidePorts'] = [{
'label': 'NewStore',
'type': 'fc',
'address': eseries_fake.WWPN
}]
fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME)
fake_eseries_volume['listOfMappings'] = [
copy.deepcopy(eseries_fake.VOLUME_MAPPING)
]
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[fake_host]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[fake_eseries_volume]))
self.mock_object(self.library._client, 'get_volume_mappings_for_host',
mock.Mock(return_value=[
copy.deepcopy(eseries_fake.VOLUME_MAPPING)]))
self.mock_object(self.library._client, 'delete_volume_mapping')
self.library.terminate_connection_fc(get_fake_volume(), connector)
self.assertTrue(self.library._client.delete_volume_mapping.called)
def test_terminate_connection_fc_volume_mapped_no_cleanup_zone(self):
connector = {'wwpns': [eseries_fake.WWPN]}
fake_host = copy.deepcopy(eseries_fake.HOST)
fake_host['hostSidePorts'] = [{
'label': 'NewStore',
'type': 'fc',
'address': eseries_fake.WWPN
}]
expected_target_info = {
'driver_volume_type': 'fibre_channel',
'data': {},
}
fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME)
fake_eseries_volume['listOfMappings'] = [
copy.deepcopy(eseries_fake.VOLUME_MAPPING)
]
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[fake_host]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[fake_eseries_volume]))
self.mock_object(self.library._client, 'delete_volume_mapping')
self.mock_object(self.library._client, 'get_volume_mappings_for_host',
mock.Mock(return_value=[
copy.deepcopy(eseries_fake.VOLUME_MAPPING)]))
target_info = self.library.terminate_connection_fc(get_fake_volume(),
connector)
self.assertDictEqual(expected_target_info, target_info)
self.assertTrue(self.library._client.delete_volume_mapping.called)
def test_terminate_connection_fc_volume_mapped_cleanup_zone(self):
connector = {'wwpns': [eseries_fake.WWPN]}
fake_host = copy.deepcopy(eseries_fake.HOST)
fake_host['hostSidePorts'] = [{
'label': 'NewStore',
'type': 'fc',
'address': eseries_fake.WWPN
}]
expected_target_info = {
'driver_volume_type': 'fibre_channel',
'data': {
'target_wwn': [eseries_fake.WWPN_2],
'initiator_target_map': {
eseries_fake.WWPN: [eseries_fake.WWPN_2]
},
},
}
fake_eseries_volume = copy.deepcopy(eseries_fake.VOLUME)
fake_eseries_volume['listOfMappings'] = [
copy.deepcopy(eseries_fake.VOLUME_MAPPING)
]
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[fake_host]))
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[fake_eseries_volume]))
self.mock_object(self.library._client, 'delete_volume_mapping')
self.mock_object(self.library._client, 'get_volume_mappings_for_host',
mock.Mock(return_value=[]))
self.mock_object(self.library._client, 'list_target_wwpns',
mock.Mock(return_value=[eseries_fake.WWPN_2]))
target_info = self.library.terminate_connection_fc(get_fake_volume(),
connector)
self.assertDictEqual(expected_target_info, target_info)
self.assertTrue(self.library._client.delete_volume_mapping.called)
def test_terminate_connection_fc_not_mapped_host_with_wwpn_does_not_exist(
self):
connector = {'wwpns': [eseries_fake.WWPN]}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[eseries_fake.HOST_2]))
self.assertRaises(exception.NotFound,
self.library.terminate_connection_fc,
get_fake_volume(),
connector)
def test_initialize_connection_fc_volume_not_mapped(self):
connector = {'wwpns': [eseries_fake.WWPN]}
fake_host = copy.deepcopy(eseries_fake.HOST)
fake_host['hostSidePorts'] = [{'label': 'NewStore',
'type': 'fc',
'address': eseries_fake.WWPN}]
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(return_value=eseries_fake.VOLUME_MAPPING))
self.mock_object(self.library._client, 'list_hosts',
mock.Mock(return_value=[fake_host]))
self.mock_object(self.library._client, 'list_host_types',
mock.Mock(return_value=eseries_fake.HOST_TYPES))
self.mock_object(self.library._client, 'list_target_wwpns',
mock.Mock(return_value=[eseries_fake.WWPN_2]))
expected_target_info = {
'driver_volume_type': 'fibre_channel',
'data': {
'target_discovered': True,
'target_lun': 0,
'target_wwn': [eseries_fake.WWPN_2],
'access_mode': 'rw',
'initiator_target_map': {
eseries_fake.WWPN: [eseries_fake.WWPN_2]
}
},
}
target_info = self.library.initialize_connection_fc(get_fake_volume(),
connector)
self.assertDictEqual(expected_target_info, target_info)
def test_initialize_connection_fc_volume_already_mapped_to_target_host(
self):
"""Should be a no-op"""
connector = {'wwpns': [eseries_fake.WWPN]}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library._client, 'list_target_wwpns',
mock.Mock(return_value=[
eseries_fake.FC_TARGET_WWPNS]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(return_value=eseries_fake.VOLUME_MAPPING))
self.library.initialize_connection_fc(get_fake_volume(), connector)
self.assertTrue(self.library._map_volume_to_host.called)
def test_initialize_connection_fc_volume_mapped_to_another_host(self):
"""Should raise error saying multiattach not enabled"""
connector = {'wwpns': [eseries_fake.WWPN]}
fake_mapping_to_other_host = copy.deepcopy(
eseries_fake.VOLUME_MAPPING)
fake_mapping_to_other_host['mapRef'] = eseries_fake.HOST_2[
'hostRef']
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(
side_effect=exception.NetAppDriverException))
self.assertRaises(exception.NetAppDriverException,
self.library.initialize_connection_fc,
get_fake_volume(), connector)
self.assertTrue(self.library._map_volume_to_host.called)
def test_initialize_connection_fc_no_target_wwpns(self):
"""Should be a no-op"""
connector = {'wwpns': [eseries_fake.WWPN]}
self.mock_object(self.library._client, 'list_volumes',
mock.Mock(return_value=[eseries_fake.VOLUME]))
self.mock_object(self.library, '_map_volume_to_host',
mock.Mock(return_value=eseries_fake.VOLUME_MAPPING))
self.mock_object(self.library._client, 'list_target_wwpns',
mock.Mock(return_value=[]))
self.assertRaises(exception.VolumeBackendAPIException,
self.library.initialize_connection_fc,
get_fake_volume(), connector)
self.assertTrue(self.library._map_volume_to_host.called)
def test_build_initiator_target_map_fc_with_lookup_service(
self):
connector = {'wwpns': [eseries_fake.WWPN, eseries_fake.WWPN_2]}
self.library.lookup_service = mock.Mock()
self.library.lookup_service.get_device_mapping_from_network = (
mock.Mock(return_value=eseries_fake.FC_FABRIC_MAP))
self.mock_object(self.library._client, 'list_target_wwpns',
mock.Mock(return_value=[
eseries_fake.FC_TARGET_WWPNS]))
(target_wwpns, initiator_target_map, num_paths) = (
self.library._build_initiator_target_map_fc(connector))
self.assertSetEqual(set(eseries_fake.FC_TARGET_WWPNS),
set(target_wwpns))
self.assertDictEqual(eseries_fake.FC_I_T_MAP, initiator_target_map)
self.assertEqual(4, num_paths)
| 45.161392 | 79 | 0.620104 | 3,053 | 28,542 | 5.418932 | 0.092368 | 0.083112 | 0.073985 | 0.078095 | 0.833353 | 0.814676 | 0.780706 | 0.744862 | 0.721954 | 0.717239 | 0 | 0.00718 | 0.272966 | 28,542 | 631 | 80 | 45.232964 | 0.790082 | 0.028204 | 0 | 0.659363 | 0 | 0 | 0.133394 | 0.02852 | 0 | 0 | 0 | 0 | 0.081673 | 1 | 0.075697 | false | 0.003984 | 0.01992 | 0.001992 | 0.101594 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
5766d5886431297864eee1d46184c038ecaa6e58 | 36 | py | Python | Aula12/Aula12.py | diegocolombo1989/Trabalho-Python | 4603117bebfb6e801c3289e108b4e8f29442ab6f | [
"MIT"
] | null | null | null | Aula12/Aula12.py | diegocolombo1989/Trabalho-Python | 4603117bebfb6e801c3289e108b4e8f29442ab6f | [
"MIT"
] | null | null | null | Aula12/Aula12.py | diegocolombo1989/Trabalho-Python | 4603117bebfb6e801c3289e108b4e8f29442ab6f | [
"MIT"
] | null | null | null | # Aula 12 - 22-11-2019
# Dicionários | 18 | 22 | 0.694444 | 6 | 36 | 4.166667 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.333333 | 0.166667 | 36 | 2 | 23 | 18 | 0.5 | 0.888889 | 0 | null | 0 | null | 0 | 0 | null | 0 | 0 | 0 | null | 1 | null | true | 0 | 0 | null | null | null | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
5775a88576c635d3fc3ab3abea0240440dcce5ad | 4,198 | py | Python | CHIMA/chimaclient.py | ANTLab-polimi/CHIMA | 368602b1555ac46a005b9111446c3a7e0952e72d | [
"Apache-2.0"
] | 1 | 2021-12-16T14:50:50.000Z | 2021-12-16T14:50:50.000Z | CHIMA/chimaclient.py | ANTLab-polimi/CHIMA | 368602b1555ac46a005b9111446c3a7e0952e72d | [
"Apache-2.0"
] | null | null | null | CHIMA/chimaclient.py | ANTLab-polimi/CHIMA | 368602b1555ac46a005b9111446c3a7e0952e72d | [
"Apache-2.0"
] | null | null | null | import requests
CLIENT_PORT = 4243
class ClientRules:
route = 0
path = 1
arp = 2
ip = 3
class CHIMAclient:
def __init__(self, ip):
self.ip = ip
def add_path(self, srcIP, dstIP, stack) -> bool:
try:
code = requests.post("http://%s:%s/path" % (self.ip, CLIENT_PORT), json={"src": srcIP, "dst": dstIP, "stack" : stack }, timeout=5).status_code
if code == 200:
return True
else:
raise Exception("Bad return code %d" % code)
except Exception as ex:
print("ERROR: request to the client %s failed (path)\n->%s" % (self.ip, ex) )
return False
def del_path(self, srcIP, dstIP) -> bool:
try:
code = requests.delete("http://%s:%s/path" % (self.ip, CLIENT_PORT), json={"src": srcIP, "dst": dstIP}, timeout=5).status_code
if code == 200:
return True
else:
raise Exception("Bad return code %d" % code)
except Exception as ex:
print("ERROR: request to the client %s failed (path)\n->%s" % (self.ip, ex) )
return False
###################################################################################################################################### Deprecated
# def add_route(self, subnet) -> bool:
# try:
# code = requests.post("http://%s:%s/route" % (self.ip, CLIENT_PORT), json={"subnet": subnet}, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (route)\n->%s" % (self.ip, ex) )
# return False
# def del_route(self, subnet) -> bool:
# try:
# code = requests.delete("http://%s:%s/route" % (self.ip, CLIENT_PORT), json={"subnet": subnet}, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (route)\n->%s" % (self.ip, ex) )
# return False
# def add_arp(self, ip, mac) -> bool:
# try:
# code = requests.post("http://%s:%s/arp" % (self.ip, CLIENT_PORT), json={"ip": ip, "mac" : mac }, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (arp)\n->%s" % (self.ip, ex) )
# return False
# def del_arp(self, ip) -> bool:
# try:
# code = requests.delete("http://%s:%s/arp" % (self.ip, CLIENT_PORT), json={"ip": ip }, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (arp)\n->%s" % (self.ip, ex) )
# return False
# def add_ip(self, ip) -> bool:
# try:
# code = requests.post("http://%s:%s/ip" % (self.ip, CLIENT_PORT), json={"ip": ip}, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (ip)\n->%s" % (self.ip, ex) )
# return False
# def del_ip(self, ip) -> bool:
# try:
# code = requests.delete("http://%s:%s/ip" % (self.ip, CLIENT_PORT), json={"ip": ip }, timeout=5).status_code
# if code == 200:
# return True
# else:
# raise Exception("Bad return code %d" % code)
# except Exception as ex:
# print("ERROR: request to the client %s failed (ip)\n->%s" % (self.ip, ex) )
# return False | 41.156863 | 154 | 0.481658 | 501 | 4,198 | 3.978044 | 0.11976 | 0.066232 | 0.044155 | 0.076267 | 0.903161 | 0.903161 | 0.903161 | 0.883091 | 0.811841 | 0.799799 | 0 | 0.01453 | 0.344212 | 4,198 | 102 | 155 | 41.156863 | 0.709408 | 0.597666 | 0 | 0.533333 | 0 | 0 | 0.126421 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.1 | false | 0 | 0.033333 | 0 | 0.466667 | 0.066667 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
5784f972cfbf743ca76ad495f277800ad3188030 | 29,163 | py | Python | src/the_tale/the_tale/game/emissaries/tests/test_requests.py | al-arz/the-tale | 542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5 | [
"BSD-3-Clause"
] | 85 | 2017-11-21T12:22:02.000Z | 2022-03-27T23:07:17.000Z | src/the_tale/the_tale/game/emissaries/tests/test_requests.py | al-arz/the-tale | 542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5 | [
"BSD-3-Clause"
] | 545 | 2017-11-04T14:15:04.000Z | 2022-03-27T14:19:27.000Z | src/the_tale/the_tale/game/emissaries/tests/test_requests.py | al-arz/the-tale | 542770257eb6ebd56a5ac44ea1ef93ff4ab19eb5 | [
"BSD-3-Clause"
] | 45 | 2017-11-11T12:36:30.000Z | 2022-02-25T06:10:44.000Z |
import smart_imports
smart_imports.all()
class BaseRequestsTests(utils_testcase.TestCase,
clans_helpers.ClansTestsMixin,
helpers.EmissariesTestsMixin):
def setUp(self):
super().setUp()
self.places = game_logic.create_test_map()
self.prepair_forum_for_clans()
clans_tt_services.currencies.cmd_debug_clear_service()
self.account_1 = self.accounts_factory.create_account()
self.clan_1 = self.create_clan(owner=self.account_1, uid=1)
@contextlib.contextmanager
def check_no_changes_in_emissaries(self, clan):
with self.check_not_changed(lambda: logic.load_emissaries_for_clan(clan.id)):
with self.check_not_changed(lambda: clans_tt_services.currencies.cmd_balance(clan.id)):
yield
class ShowTests(BaseRequestsTests):
def setUp(self):
super().setUp()
clans_tt_services.chronicle.cmd_debug_clear_service()
self.emissary = self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
concrete_event = events.Rest(raw_ability_power=100500)
self.event = logic.create_event(initiator=self.account_1,
emissary=self.emissary,
concrete_event=concrete_event,
days=7)
self.url = utils_urls.url('game:emissaries:show', self.emissary.id)
def test_success__unauthorized(self):
self.request_logout()
self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)])
def test_success__authorized_clan_member__no_permission(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
self.request_login(self.account_1.email)
self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)])
def test_success__authorized_clan_member__has_permission(self):
self.request_login(self.account_1.email)
self.check_html_ok(self.request_html(self.url), texts=['pgf-event-operation'])
def test_success__other_clan_member(self):
account_2 = self.accounts_factory.create_account()
self.create_clan(owner=account_2, uid=2)
self.request_login(account_2.email)
self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)])
def test_success__authorized_not_clan_member(self):
account_2 = self.accounts_factory.create_account()
self.request_login(account_2.email)
self.check_html_ok(self.request_html(self.url), texts=[('pgf-event-operation', 0)])
class CreateDialogTests(BaseRequestsTests):
def setUp(self):
super().setUp()
self.url = utils_urls.url('game:emissaries:create-dialog')
self.request_login(self.account_1.email)
def test_not_authenticated(self):
self.request_logout()
self.check_html_ok(self.request_ajax_html(self.url), texts=['common.login_required'])
def test_has_no_rights__not_member(self):
account = self.accounts_factory.create_account()
self.request_login(account.email)
self.check_html_ok(self.request_ajax_html(self.url), texts=['clans.no_rights'])
def test_has_no_rights__wrong_role(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
self.check_html_ok(self.request_ajax_html(self.url), texts=['clans.no_rights'])
def test_maximum_emissaries_reached(self):
clan_attributes = clans_logic.load_attributes(self.clan_1.id)
for i in range(clan_attributes.emissary_maximum):
self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.maximum_emissaries'])
def test_success(self):
self.check_html_ok(self.request_ajax_html(self.url), texts=[('clans.no_rights', 0),
'form'])
def test_banned(self):
self.account_1.ban_game(1)
self.check_html_ok(self.request_ajax_html(self.url), texts=['common.ban_game'])
class CreateTests(BaseRequestsTests):
def setUp(self):
super().setUp()
self.url = utils_urls.url('game:emissaries:create')
clans_tt_services.currencies.cmd_debug_clear_service()
game_tt_services.debug_clear_service()
clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id,
type='test',
autocommit=True,
amount=tt_clans_constants.PRICE_CREATE_EMISSARY + 1)
self.request_login(self.account_1.email)
def get_post_data(self):
return {'gender': game_relations.GENDER.MALE,
'race': game_relations.RACE.DWARF,
'place': self.places[0].id}
def test_not_authenticated(self):
self.request_logout()
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.login_required')
def test_has_no_rights__not_member(self):
account = self.accounts_factory.create_account()
self.request_login(account.email)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_rights')
def test_has_no_rights__wrong_role(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_rights')
def test_wrong_form(self):
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, {}), 'form_errors')
def test_no_points(self):
balance = clans_tt_services.currencies.cmd_balance(account_id=self.clan_1.id,
currency=clans_relations.CURRENCY.ACTION_POINTS)
clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id,
type='test',
autocommit=True,
amount=-balance)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_enought_clan_points')
def test_maximum_emissaries_reached(self):
clan_attributes = clans_logic.load_attributes(self.clan_1.id)
for i in range(clan_attributes.emissary_maximum):
self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.maximum_emissaries')
def test_maximum_combat_personnel_reached(self):
clan_attributes = clans_logic.load_attributes(self.clan_1.id)
for i in range(clan_attributes.fighters_maximum):
account = self.accounts_factory.create_account()
clans_logic._add_member(clan=self.clan_1,
account=account,
role=clans_relations.MEMBER_ROLE.FIGHTER)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.maximum_fighters')
def test_success(self):
with self.check_changed(lambda: logic.load_emissaries_for_clan(self.clan_1.id)):
with self.check_delta(lambda: clans_tt_services.currencies.cmd_balance(self.clan_1.id,
currency=clans_relations.CURRENCY.ACTION_POINTS),
-tt_clans_constants.PRICE_CREATE_EMISSARY):
self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data()))
emissaries = logic.load_emissaries_for_clan(self.clan_1.id)
self.assertEqual(len(emissaries), 1)
self.assertTrue(emissaries[0].state.is_IN_GAME)
self.assertTrue(emissaries[0].gender.is_MALE)
self.assertTrue(emissaries[0].race.is_DWARF)
self.assertEqual(emissaries[0].place_id, self.places[0].id)
def test_banned(self):
self.account_1.ban_game(1)
with self.check_no_changes_in_emissaries(self.clan_1):
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.ban_game')
class StartEventDialogTests(BaseRequestsTests):
def setUp(self):
super().setUp()
self.emissary = self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
self.url = utils_urls.url('game:emissaries:start-event-dialog', self.emissary.id, event_type=relations.EVENT_TYPE.REST.value)
self.request_login(self.account_1.email)
def test_no_event_type(self):
url = utils_urls.url('game:emissaries:start-event-dialog', self.emissary.id)
self.check_html_ok(self.request_ajax_html(url), texts=['event_type.not_specified'])
def test_not_authenticated(self):
self.request_logout()
self.check_html_ok(self.request_ajax_html(self.url), texts=['common.login_required'])
def test_has_no_rights__not_member(self):
account = self.accounts_factory.create_account()
self.request_login(account.email)
self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights'])
def test_has_no_rights__wrong_role(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights'])
def test_has_no_rights__wrong_clan(self):
account_2 = self.accounts_factory.create_account()
self.create_clan(owner=account_2, uid=2)
self.request_login(account_2.email)
self.check_html_ok(self.request_ajax_html(self.url), texts=['emissaries.no_rights'])
def test_success(self):
self.check_html_ok(self.request_ajax_html(self.url), texts=[('emissaries.no_rights', 0),
'form'])
def test_success__power_warnging(self):
game_tt_services.emissary_impacts.cmd_debug_clear_service()
max_power_to_spend = events.Rest.power_cost(self.emissary, days=events.Rest.max_event_length())
current_power = politic_power_logic.get_emissaries_power(emissaries_ids=[self.emissary.id])[self.emissary.id]
power_delta = max_power_to_spend + conf.settings.SHOW_START_EVENT_WARNING_BARRIER - current_power
politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER,
actor_type=tt_api_impacts.OBJECT_TYPE.HERO,
actor_id=self.account_1.id,
target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY,
target_id=self.emissary.id,
amount=power_delta - 1)])
self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 1),
'form'])
politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER,
actor_type=tt_api_impacts.OBJECT_TYPE.HERO,
actor_id=self.account_1.id,
target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY,
target_id=self.emissary.id,
amount=1)])
self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 1),
'form'])
politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER,
actor_type=tt_api_impacts.OBJECT_TYPE.HERO,
actor_id=self.account_1.id,
target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY,
target_id=self.emissary.id,
amount=1)])
self.check_html_ok(self.request_ajax_html(self.url), texts=[('pgf-power-warning', 0),
'form'])
def test_banned(self):
self.account_1.ban_game(1)
self.check_html_ok(self.request_ajax_html(self.url), texts=['common.ban_game'])
class StartEventTests(BaseRequestsTests):
def setUp(self):
super().setUp()
self.emissary = self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
self.url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.REST.value)
self.request_login(self.account_1.email)
clans_tt_services.currencies.cmd_debug_clear_service()
game_tt_services.debug_clear_service()
clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id,
type='test',
autocommit=True,
amount=tt_clans_constants.MAXIMUM_POINTS)
self.power = 10005000
politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER,
actor_type=tt_api_impacts.OBJECT_TYPE.HERO,
actor_id=self.account_1.id,
target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY,
target_id=self.emissary.id,
amount=self.power)])
@contextlib.contextmanager
def check_no_actions_applied(self):
def get_points():
return clans_tt_services.currencies.cmd_balance(self.clan_1.id,
currency=clans_relations.CURRENCY.ACTION_POINTS)
with self.check_not_changed(models.Event.objects.count):
with self.check_not_changed(lambda: politic_power_logic.get_emissaries_power([self.emissary.id])):
with self.check_not_changed(get_points):
yield
def get_post_data(self):
return {'period': 7}
def test_no_authenticated(self):
self.request_logout()
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.login_required')
def test_no_rights__wrong_role(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights')
def test_no_rights__member_of_other_clan(self):
account_2 = self.accounts_factory.create_account()
self.create_clan(owner=account_2, uid=2)
self.request_login(account_2.email)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights')
def test_no_rights__not_member(self):
account_2 = self.accounts_factory.create_account()
self.request_login(account_2.email)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.no_rights')
def test_no_action_points(self):
clans_tt_services.currencies.cmd_change_balance(account_id=self.clan_1.id,
type='test',
autocommit=True,
amount=-tt_clans_constants.MAXIMUM_POINTS)
clan_points = clans_tt_services.currencies.cmd_balance(self.clan_1.id,
currency=clans_relations.CURRENCY.ACTION_POINTS)
self.assertEqual(clan_points, 0)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'clans.no_enought_clan_points')
def test_no_power(self):
politic_power_logic.add_power_impacts([game_tt_services.PowerImpact(type=game_tt_services.IMPACT_TYPE.EMISSARY_POWER,
actor_type=tt_api_impacts.OBJECT_TYPE.HERO,
actor_id=self.account_1.id,
target_type=tt_api_impacts.OBJECT_TYPE.EMISSARY,
target_id=self.emissary.id,
amount=-self.power * 10)])
self.assertTrue(politic_power_logic.get_emissaries_power([self.emissary.id])[self.emissary.id] < 0)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.no_enough_power')
def test_success(self):
def get_points():
return clans_tt_services.currencies.cmd_balance(self.clan_1.id,
currency=clans_relations.CURRENCY.ACTION_POINTS)
with self.check_delta(models.Event.objects.count, 1):
with self.check_decreased(lambda: politic_power_logic.get_emissaries_power([self.emissary.id])[self.emissary.id]):
with self.check_decreased(get_points):
self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data()))
def test_success__event_saved(self):
self.emissary.place_rating_position = 0
logic.save_emissary(self.emissary)
url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.ARTISANS_SUPPORT.value)
self.check_ajax_ok(self.post_ajax_json(url, self.get_post_data()))
emissary_events = storage.events.emissary_events(self.emissary.id)
self.assertEqual(len(emissary_events), 1)
new_event = emissary_events[0]
effect = places_storage.effects[new_event.concrete_event.effect_id]
self.assertTrue(effect.attribute.is_PRODUCTION)
loaded_event = logic.load_event(new_event.id)
self.assertEqual(loaded_event.concrete_event.effect_id, new_event.concrete_event.effect_id)
def test_banned(self):
self.account_1.ban_game(1)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'common.ban_game')
def test_dublicate_event(self):
self.check_ajax_ok(self.post_ajax_json(self.url, self.get_post_data()))
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.dublicate_event')
def test_maximum_simultaneously_events(self):
logic.create_event(initiator=self.account_1,
emissary=self.emissary,
concrete_event=events.Rest(raw_ability_power=100500),
days=7)
logic.create_event(initiator=self.account_1,
emissary=self.emissary,
concrete_event=events.Dismiss(raw_ability_power=100500),
days=7)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaies.maximum_simultaneously_events')
def test_on_create_failed(self):
@contextlib.contextmanager
def on_create(event, emissary):
raise exceptions.OnEventCreateError(message='test error')
yield
with mock.patch('the_tale.game.emissaries.events.EventBase.on_create', on_create):
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.on_create_error')
def test_event_not_available(self):
@classmethod
def is_available(event_class, emissary, active_events):
return False
with mock.patch('the_tale.game.emissaries.events.EventBase.is_available', is_available):
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url, self.get_post_data()), 'emissaries.event_not_available')
def test_success__after_create_called(self):
places_tt_services.effects.cmd_debug_clear_service()
url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=relations.EVENT_TYPE.ARTISANS_SUPPORT.value)
self.emissary.place_rating_position = 0
with self.check_delta(lambda: len(places_storage.effects.all()), 1):
self.check_ajax_ok(self.post_ajax_json(url, self.get_post_data()))
def check_event_rights(self, event_type):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.OFFICER)
rights = clans_logic.operations_rights(initiator=self.account_1,
clan=self.clan_1,
is_moderator=False)
self.assertTrue(rights.can_emissaries_planing())
self.assertFalse(rights.can_emissaries_relocation())
places_tt_services.effects.cmd_debug_clear_service()
url = utils_urls.url('game:emissaries:start-event', self.emissary.id, event_type=event_type.value)
self.emissary.place_rating_position = 0
with self.check_not_changed(lambda: len(places_storage.effects.all())):
self.check_ajax_error(self.post_ajax_json(url, self.get_post_data()), 'emissaries.no_rights')
def test_restricted_move_event(self):
self.check_event_rights(relations.EVENT_TYPE.RELOCATION)
def test_restricted_dismiss_event(self):
self.check_event_rights(relations.EVENT_TYPE.DISMISS)
class StopEventTests(BaseRequestsTests):
def setUp(self):
super().setUp()
self.emissary = self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
concrete_event = events.Rest(raw_ability_power=100500)
self.event = logic.create_event(initiator=self.account_1,
emissary=self.emissary,
concrete_event=concrete_event,
days=7)
self.url = utils_urls.url('game:emissaries:stop-event', self.emissary.id, event=self.event.id)
self.request_login(self.account_1.email)
clans_tt_services.currencies.cmd_debug_clear_service()
game_tt_services.debug_clear_service()
@contextlib.contextmanager
def check_no_actions_applied(self):
with self.check_not_changed(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count):
yield
def test_no_authenticated(self):
self.request_logout()
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url), 'common.login_required')
def test_no_rights__wrong_role(self):
clans_logic.change_role(self.clan_1,
initiator=self.account_1,
member=self.account_1,
new_role=clans_relations.MEMBER_ROLE.RECRUIT)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights')
def test_no_rights__member_of_other_clan(self):
account_2 = self.accounts_factory.create_account()
self.create_clan(owner=account_2, uid=2)
self.request_login(account_2.email)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights')
def test_no_rights__not_member(self):
account_2 = self.accounts_factory.create_account()
self.request_login(account_2.email)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url), 'emissaries.no_rights')
def test_success(self):
with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count, -1):
with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.STOPPED).count, 1):
self.check_ajax_ok(self.post_ajax_json(self.url))
event = logic.load_event(self.event.id)
self.assertTrue(event.state.is_STOPPED)
def test_banned(self):
self.account_1.ban_game(1)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(self.url), 'common.ban_game')
def test_success__already_stopped(self):
with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.RUNNING).count, -1):
with self.check_delta(models.Event.objects.filter(state=relations.EVENT_STATE.STOPPED).count, 1):
self.check_ajax_ok(self.post_ajax_json(self.url))
with self.check_no_actions_applied():
self.check_ajax_ok(self.post_ajax_json(self.url))
event = logic.load_event(self.event.id)
self.assertTrue(event.state.is_STOPPED)
def test_wrong_emissary(self):
wrong_emissary = self.create_emissary(clan=self.clan_1,
initiator=self.account_1,
place_id=self.places[0].id)
url = utils_urls.url('game:emissaries:stop-event', wrong_emissary.id, event=self.event.id)
with self.check_no_actions_applied():
self.check_ajax_error(self.post_ajax_json(url), 'emissaries.wrong_emissary')
| 44.591743 | 133 | 0.606556 | 3,395 | 29,163 | 4.84595 | 0.067452 | 0.054705 | 0.032823 | 0.033066 | 0.856552 | 0.842572 | 0.798201 | 0.785436 | 0.766351 | 0.739545 | 0 | 0.009405 | 0.303604 | 29,163 | 653 | 134 | 44.660031 | 0.80068 | 0 | 0 | 0.68552 | 0 | 0 | 0.049311 | 0.028256 | 0 | 0 | 0 | 0 | 0.031674 | 1 | 0.156109 | false | 0 | 0.004525 | 0.011312 | 0.187783 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
578e048a0e5e11fff8508555af9fec47fdb52e63 | 56 | py | Python | code/config.py | Artvin2001/db_course_work | cacfcb21a9faa000baa088dedebdea2541e84f61 | [
"MIT"
] | null | null | null | code/config.py | Artvin2001/db_course_work | cacfcb21a9faa000baa088dedebdea2541e84f61 | [
"MIT"
] | null | null | null | code/config.py | Artvin2001/db_course_work | cacfcb21a9faa000baa088dedebdea2541e84f61 | [
"MIT"
] | null | null | null | TOKEN = '5245424575:AAGkWW6TaTA5bxg5bFzBxuFaV5-Q2zL1L1U' | 56 | 56 | 0.875 | 4 | 56 | 12.25 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.314815 | 0.035714 | 56 | 1 | 56 | 56 | 0.592593 | 0 | 0 | 0 | 0 | 0 | 0.807018 | 0.807018 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
57a16a2a6bc99e0c3d7f97f2d71a1983e2611798 | 220 | py | Python | trove/tests/__init__.py | zhujzhuo/openstack-trove | e9d073762732ba405828fd54c86a27dcac95cd25 | [
"Apache-2.0"
] | 1 | 2015-02-26T03:24:38.000Z | 2015-02-26T03:24:38.000Z | trove/tests/__init__.py | zhujzhuo/openstack-trove | e9d073762732ba405828fd54c86a27dcac95cd25 | [
"Apache-2.0"
] | null | null | null | trove/tests/__init__.py | zhujzhuo/openstack-trove | e9d073762732ba405828fd54c86a27dcac95cd25 | [
"Apache-2.0"
] | null | null | null | DBAAS_API = "dbaas.api"
PRE_INSTANCES = "dbaas.api.pre_instances"
INSTANCES = "dbaas.api.instances"
POST_INSTANCES = "dbaas.api.post_instances"
SSH_CMD = 'ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no'
| 36.666667 | 75 | 0.786364 | 30 | 220 | 5.566667 | 0.433333 | 0.239521 | 0.305389 | 0.239521 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.086364 | 220 | 5 | 76 | 44 | 0.830846 | 0 | 0 | 0 | 0 | 0 | 0.627273 | 0.45 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | false | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
57b5176d56c591614905e40454b9e0350d6e03f6 | 96 | py | Python | muLAn/__init__.py | muLAn-project/muLAn | 6144b315f6109715001c22b6a2ae74c1e2803cae | [
"MIT"
] | 8 | 2017-10-17T14:37:42.000Z | 2020-10-27T20:39:20.000Z | muLAn/__init__.py | muLAn-project/muLAn | 6144b315f6109715001c22b6a2ae74c1e2803cae | [
"MIT"
] | 3 | 2018-01-28T22:03:53.000Z | 2022-03-30T20:18:19.000Z | muLAn/__init__.py | muLAn-project/muLAn | 6144b315f6109715001c22b6a2ae74c1e2803cae | [
"MIT"
] | 1 | 2017-09-15T19:20:10.000Z | 2017-09-15T19:20:10.000Z | from __future__ import division, print_function
from ._version import version_info, __version__
| 32 | 47 | 0.864583 | 12 | 96 | 6 | 0.666667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.104167 | 96 | 2 | 48 | 48 | 0.837209 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0.5 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 6 |
57d3006cd48e1a108217ba82f54b2f2de0e5fde4 | 189 | py | Python | app.py | AhmedOzil10/python-docs-hello-world | 4b31a842a8b69cbd79676f830754a3048984575d | [
"MIT"
] | null | null | null | app.py | AhmedOzil10/python-docs-hello-world | 4b31a842a8b69cbd79676f830754a3048984575d | [
"MIT"
] | null | null | null | app.py | AhmedOzil10/python-docs-hello-world | 4b31a842a8b69cbd79676f830754a3048984575d | [
"MIT"
] | null | null | null | from flask import Flask
app = Flask(__name__)
@app.route("/")
def hello():
return "POC by Ahmed Ismail (<a href=https://bugcrowd.com/AhmedOzil10>https://bugcrowd.com/AhmedOzil10</a>)"
| 27 | 112 | 0.708995 | 27 | 189 | 4.814815 | 0.703704 | 0.2 | 0.246154 | 0.415385 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.023952 | 0.116402 | 189 | 6 | 113 | 31.5 | 0.754491 | 0 | 0 | 0 | 0 | 0.2 | 0.529101 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.2 | false | 0 | 0.2 | 0.2 | 0.6 | 0 | 1 | 0 | 0 | null | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 6 |
57dd6e125dd7160b2682ed3745551f477b06c2bf | 34 | py | Python | rapidpro_webhooks/apps/ureport/__init__.py | unicef/rapidpro-webhooks | 773004eaae3a91ec6ac4653318bf8eff1c4b642d | [
"MIT"
] | null | null | null | rapidpro_webhooks/apps/ureport/__init__.py | unicef/rapidpro-webhooks | 773004eaae3a91ec6ac4653318bf8eff1c4b642d | [
"MIT"
] | null | null | null | rapidpro_webhooks/apps/ureport/__init__.py | unicef/rapidpro-webhooks | 773004eaae3a91ec6ac4653318bf8eff1c4b642d | [
"MIT"
] | null | null | null | from .birth_year import * # noqa
| 17 | 33 | 0.705882 | 5 | 34 | 4.6 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.205882 | 34 | 1 | 34 | 34 | 0.851852 | 0.117647 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
17bc36eda023a50a702d91f434fc8949ecf430ed | 123 | py | Python | web/transiq/api/management/data_sync.py | manibhushan05/transiq | 763fafb271ce07d13ac8ce575f2fee653cf39343 | [
"Apache-2.0"
] | null | null | null | web/transiq/api/management/data_sync.py | manibhushan05/transiq | 763fafb271ce07d13ac8ce575f2fee653cf39343 | [
"Apache-2.0"
] | 14 | 2020-06-05T23:06:45.000Z | 2022-03-12T00:00:18.000Z | web/transiq/api/management/data_sync.py | manibhushan05/transiq | 763fafb271ce07d13ac8ce575f2fee653cf39343 | [
"Apache-2.0"
] | null | null | null | from api.models import S3Upload
def update_is_verified_data():
S3Upload.objects.update(verified=True, is_valid=True)
| 20.5 | 57 | 0.796748 | 18 | 123 | 5.222222 | 0.722222 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.018349 | 0.113821 | 123 | 5 | 58 | 24.6 | 0.844037 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0.333333 | true | 0 | 0.333333 | 0 | 0.666667 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
aa420a0fcb108601a375f18778cdb0d9dd61aea1 | 72 | py | Python | src/py_starter/__main__.py | jameskabbes/py_starter | 0638d5835d58f889314f0afe273a628444c494f7 | [
"MIT"
] | null | null | null | src/py_starter/__main__.py | jameskabbes/py_starter | 0638d5835d58f889314f0afe273a628444c494f7 | [
"MIT"
] | null | null | null | src/py_starter/__main__.py | jameskabbes/py_starter | 0638d5835d58f889314f0afe273a628444c494f7 | [
"MIT"
] | null | null | null | import py_starter as ps
ps.print_for_loop( ['Test','For','py_starter'] ) | 36 | 48 | 0.736111 | 13 | 72 | 3.769231 | 0.692308 | 0.367347 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.083333 | 72 | 2 | 48 | 36 | 0.742424 | 0 | 0 | 0 | 0 | 0 | 0.232877 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 0.5 | 0 | 0.5 | 0.5 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 6 |
352ddb36271bc653facccd7da752d95962c43244 | 27 | py | Python | python/8Kyu/Function 2 - squaring an argument.py | athasv/Codewars-data | 5e106466e709fd776f23585ad9f652d0d65b48d3 | [
"MIT"
] | null | null | null | python/8Kyu/Function 2 - squaring an argument.py | athasv/Codewars-data | 5e106466e709fd776f23585ad9f652d0d65b48d3 | [
"MIT"
] | null | null | null | python/8Kyu/Function 2 - squaring an argument.py | athasv/Codewars-data | 5e106466e709fd776f23585ad9f652d0d65b48d3 | [
"MIT"
] | null | null | null | def square(n): return n * n | 27 | 27 | 0.666667 | 6 | 27 | 3 | 0.666667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.185185 | 27 | 1 | 27 | 27 | 0.818182 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | false | 0 | 0 | 1 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 6 |
1023a9a0bb43f5562968eae8dd9745e845501d62 | 56,978 | py | Python | book/models.py | Felix-Raj/library | c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce | [
"Unlicense"
] | 1 | 2018-05-18T17:37:02.000Z | 2018-05-18T17:37:02.000Z | book/models.py | Felix-Raj/library | c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce | [
"Unlicense"
] | null | null | null | book/models.py | Felix-Raj/library | c93dd6dbc5a8cfe80a123a9e03d870687d8fd7ce | [
"Unlicense"
] | null | null | null | import logging
from django.contrib.postgres.fields import JSONField
from django.db import models
logger = logging.getLogger(__name__)
class Book(models.Model):
MAGAZINE = 'magazine'
COMICS = 'comics'
BOOKS = 'books'
EDUCATIONAL = 'educational'
BOOK_CATEGORIES = (
(MAGAZINE, MAGAZINE.capitalize()),
(COMICS, COMICS.capitalize()),
(EDUCATIONAL, EDUCATIONAL.capitalize()),
(BOOKS, BOOKS.capitalize())
)
book_id = models.CharField(null=False, blank=False, max_length=100, default=0, unique=True)
title = models.TextField()
author = models.TextField()
copies = models.IntegerField(default=1)
notes = models.TextField()
copies_on_lent = models.IntegerField(default=0)
category = models.CharField(choices=BOOK_CATEGORIES, default=BOOKS, max_length=10)
price = models.FloatField(default=0)
locked = models.BooleanField(default=False)
preview = JSONField(default={
"value": "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",
"filename": "Church Library logo final.jpg",
"filetype": "image/jpeg"
}, null=True, blank=True)
def __str__(self):
return '{book} by {author}'.format(book=self.title, author=self.author)
def add_tag(self, tag_list):
tag_list = filter(lambda tag: not self.has_tag(tag), tag_list)
for tag in tag_list:
BookTag(book=self, tag=tag.strip().lower()).save()
def has_tag(self, tag):
return self.booktag_set.all().filter(tag__iexact=tag.lower()).count() > 0
def _toggle_lock_state(self):
self.locked = not self.locked
self.save()
def lock(self):
if not self.locked:
self._toggle_lock_state()
def unlock(self):
if self.locked:
self._toggle_lock_state()
def return_book(self, count=1):
self.copies_on_lent -= count
self.save()
def lent_book(self, count=1):
"""
Increases the copies_on_lent by one, only if book is available to lent.
:param count: count of book to lent out
:return:
"""
if self.is_available:
self.copies_on_lent += count
self.save()
else:
logger.warning(msg='Book Not available')
@property
def is_available(self):
return not self.locked and (self.copies > self.copies_on_lent)
class BookTag(models.Model):
book = models.ForeignKey(Book, on_delete=models.CASCADE)
tag = models.CharField(max_length=100)
| 678.309524 | 54,516 | 0.947594 | 2,349 | 56,978 | 22.964666 | 0.868455 | 0.000742 | 0.001112 | 0.00089 | 0.002262 | 0.002262 | 0.002262 | 0 | 0 | 0 | 0 | 0.110898 | 0.010565 | 56,978 | 83 | 54,517 | 686.481928 | 0.845963 | 0.002124 | 0 | 0.081967 | 0 | 0.016393 | 0.961367 | 0.95915 | 0 | 1 | 0 | 0 | 0 | 1 | 0.147541 | false | 0 | 0.04918 | 0.04918 | 0.557377 | 0 | 0 | 0 | 1 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
102629de7034a14113a4ed5f61f03c25f6dd788a | 113 | py | Python | dinuq/__init__.py | spyros-lytras/dinuq | 7a3b637ba6f6cec6211ec9784cdbbfe3029d3544 | [
"MIT"
] | 11 | 2020-07-07T12:37:06.000Z | 2022-03-24T15:49:06.000Z | dinuq/__init__.py | spyros-lytras/dinuq | 7a3b637ba6f6cec6211ec9784cdbbfe3029d3544 | [
"MIT"
] | 4 | 2020-03-18T19:34:51.000Z | 2020-10-30T11:32:07.000Z | build/lib/dinuq/__init__.py | spyros-lytras/dinuq | 7a3b637ba6f6cec6211ec9784cdbbfe3029d3544 | [
"MIT"
] | 2 | 2020-03-27T10:11:32.000Z | 2022-03-23T13:11:50.000Z | from .rscu import *
from .rda import *
from .sduc import *
from .make_ntcont import *
from .thedicts import * | 22.6 | 27 | 0.707965 | 16 | 113 | 4.9375 | 0.5 | 0.506329 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.20354 | 113 | 5 | 28 | 22.6 | 0.877778 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | null | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
1035509c3dd9abf92a9000a4056f447f71130ba8 | 150 | py | Python | Curso de Cisco/Actividades/Funcion de multiplicacion.py | tomasfriz/Curso-de-Cisco | a50ee5fa96bd86d468403e29ccdc3565a181af60 | [
"MIT"
] | null | null | null | Curso de Cisco/Actividades/Funcion de multiplicacion.py | tomasfriz/Curso-de-Cisco | a50ee5fa96bd86d468403e29ccdc3565a181af60 | [
"MIT"
] | null | null | null | Curso de Cisco/Actividades/Funcion de multiplicacion.py | tomasfriz/Curso-de-Cisco | a50ee5fa96bd86d468403e29ccdc3565a181af60 | [
"MIT"
] | null | null | null | def multiply(a, b):
return a * b
print(multiply(3, 4)) # salida: 12
def multiply(a, b):
return
print(multiply(3, 4)) # salida: None | 16.666667 | 40 | 0.586667 | 25 | 150 | 3.56 | 0.48 | 0.067416 | 0.269663 | 0.292135 | 0.898876 | 0 | 0 | 0 | 0 | 0 | 0 | 0.053571 | 0.253333 | 150 | 9 | 40 | 16.666667 | 0.732143 | 0.153333 | 0 | 0.666667 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | null | 0 | 0 | null | null | 0.333333 | 1 | 0 | 0 | null | 0 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
107bdd04ca2e58284b614f79ffb00b7fee01a7e4 | 217 | py | Python | autokeras/tuners/random_search.py | thwang1231/autokeras | 2b8a1c5506896102ed49a3e82db811ada44a1d6c | [
"MIT"
] | 1 | 2020-05-17T23:47:00.000Z | 2020-05-17T23:47:00.000Z | autokeras/tuners/random_search.py | thwang1231/autokeras | 2b8a1c5506896102ed49a3e82db811ada44a1d6c | [
"MIT"
] | null | null | null | autokeras/tuners/random_search.py | thwang1231/autokeras | 2b8a1c5506896102ed49a3e82db811ada44a1d6c | [
"MIT"
] | null | null | null | import kerastuner
from autokeras.engine import tuner as tuner_module
class RandomSearch(tuner_module.AutoTuner, kerastuner.RandomSearch):
"""KerasTuner RandomSearch with preprocessing layer tuning."""
pass
| 24.111111 | 68 | 0.801843 | 24 | 217 | 7.166667 | 0.666667 | 0.127907 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.133641 | 217 | 8 | 69 | 27.125 | 0.914894 | 0.258065 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0.25 | 0.5 | 0 | 0.75 | 0 | 1 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 1 | 0 | 0 | 6 |
52ee40982803b7e607062d1f0cf68786a33cba49 | 42 | py | Python | __main__.py | daveh566/Nelly | c890721fa593c519643d53f66caa24299a02d21f | [
"MIT"
] | null | null | null | __main__.py | daveh566/Nelly | c890721fa593c519643d53f66caa24299a02d21f | [
"MIT"
] | null | null | null | __main__.py | daveh566/Nelly | c890721fa593c519643d53f66caa24299a02d21f | [
"MIT"
] | null | null | null | import start
from pyrogram import filters
| 14 | 28 | 0.857143 | 6 | 42 | 6 | 0.833333 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.142857 | 42 | 2 | 29 | 21 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | true | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 6 |
5e264f2d739fe0df88f233e6f414a950ec3f49ed | 198 | py | Python | pyramda/logic/and_func_test.py | sergiors/pyramda | 5bf200888809b1bc946e813e29460f204bccd13e | [
"MIT"
] | 124 | 2015-07-30T21:34:25.000Z | 2022-02-19T08:45:50.000Z | pyramda/logic/and_func_test.py | sergiors/pyramda | 5bf200888809b1bc946e813e29460f204bccd13e | [
"MIT"
] | 37 | 2015-08-31T23:02:20.000Z | 2022-02-04T04:45:28.000Z | ramda/and_func_test.py | slavaGanzin/pyramda | 4fa7fe28d5eaa798b702d28bdd3948515cb88f48 | [
"MIT"
] | 20 | 2015-08-04T18:59:09.000Z | 2021-12-13T08:08:59.000Z | from .and_func import and_func
def and_func_test():
assert and_func(True, True)
assert not and_func(True, False)
assert not and_func(False, True)
assert not and_func(False, False)
| 22 | 37 | 0.722222 | 33 | 198 | 4.090909 | 0.30303 | 0.362963 | 0.266667 | 0.355556 | 0.488889 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.19697 | 198 | 8 | 38 | 24.75 | 0.849057 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.666667 | 1 | 0.166667 | true | 0 | 0.166667 | 0 | 0.333333 | 0 | 0 | 0 | 0 | null | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
5e2b124d64daa9e7d69cb3433cdddac5ec4943dd | 31,700 | py | Python | tests/components/energy/test_websocket_api.py | jheddings/hass-core | 4270b7535b3cc4d35dc485c4b3d6c5cb61a95768 | [
"Apache-2.0"
] | null | null | null | tests/components/energy/test_websocket_api.py | jheddings/hass-core | 4270b7535b3cc4d35dc485c4b3d6c5cb61a95768 | [
"Apache-2.0"
] | null | null | null | tests/components/energy/test_websocket_api.py | jheddings/hass-core | 4270b7535b3cc4d35dc485c4b3d6c5cb61a95768 | [
"Apache-2.0"
] | null | null | null | """Test the Energy websocket API."""
from unittest.mock import AsyncMock, Mock
import pytest
from homeassistant.components.energy import data, is_configured
from homeassistant.components.recorder.statistics import async_add_external_statistics
from homeassistant.setup import async_setup_component
from homeassistant.util import dt as dt_util
from tests.common import (
MockConfigEntry,
flush_store,
init_recorder_component,
mock_platform,
)
from tests.components.recorder.common import async_wait_recording_done
@pytest.fixture(autouse=True)
async def setup_integration(hass, recorder_mock):
"""Set up the integration."""
assert await async_setup_component(hass, "energy", {})
@pytest.fixture
def mock_energy_platform(hass):
"""Mock an energy platform."""
hass.config.components.add("some_domain")
mock_platform(
hass,
"some_domain.energy",
Mock(
async_get_solar_forecast=AsyncMock(
return_value={
"wh_hours": {
"2021-06-27T13:00:00+00:00": 12,
"2021-06-27T14:00:00+00:00": 8,
}
}
)
),
)
async def test_get_preferences_no_data(hass, hass_ws_client) -> None:
"""Test we get error if no preferences set."""
client = await hass_ws_client(hass)
await client.send_json({"id": 5, "type": "energy/get_prefs"})
msg = await client.receive_json()
assert msg["id"] == 5
assert not msg["success"]
assert msg["error"] == {"code": "not_found", "message": "No prefs"}
async def test_get_preferences_default(hass, hass_ws_client, hass_storage) -> None:
"""Test we get preferences."""
assert not await is_configured(hass)
manager = await data.async_get_manager(hass)
manager.data = data.EnergyManager.default_preferences()
client = await hass_ws_client(hass)
assert not await is_configured(hass)
await client.send_json({"id": 5, "type": "energy/get_prefs"})
msg = await client.receive_json()
assert msg["id"] == 5
assert msg["success"]
assert msg["result"] == data.EnergyManager.default_preferences()
async def test_save_preferences(
hass, hass_ws_client, hass_storage, mock_energy_platform
) -> None:
"""Test we can save preferences."""
client = await hass_ws_client(hass)
# Test saving default prefs is also valid.
default_prefs = data.EnergyManager.default_preferences()
await client.send_json({"id": 5, "type": "energy/save_prefs", **default_prefs})
msg = await client.receive_json()
assert msg["id"] == 5
assert msg["success"]
assert msg["result"] == default_prefs
new_prefs = {
"energy_sources": [
{
"type": "grid",
"flow_from": [
{
"stat_energy_from": "sensor.heat_pump_meter",
"stat_cost": "heat_pump_kwh_cost",
"entity_energy_from": None,
"entity_energy_price": None,
"number_energy_price": None,
},
{
"stat_energy_from": "sensor.heat_pump_meter_2",
"stat_cost": None,
"entity_energy_from": "sensor.heat_pump_meter_2",
"entity_energy_price": None,
"number_energy_price": 0.20,
},
],
"flow_to": [
{
"stat_energy_to": "sensor.return_to_grid_peak",
"stat_compensation": None,
"entity_energy_to": None,
"entity_energy_price": None,
"number_energy_price": None,
},
{
"stat_energy_to": "sensor.return_to_grid_offpeak",
"stat_compensation": None,
"entity_energy_to": "sensor.return_to_grid_offpeak",
"entity_energy_price": None,
"number_energy_price": 0.20,
},
],
"cost_adjustment_day": 1.2,
},
{
"type": "solar",
"stat_energy_from": "my_solar_production",
"config_entry_solar_forecast": ["predicted_config_entry"],
},
{
"type": "battery",
"stat_energy_from": "my_battery_draining",
"stat_energy_to": "my_battery_charging",
},
],
"device_consumption": [{"stat_consumption": "some_device_usage"}],
}
await client.send_json({"id": 6, "type": "energy/save_prefs", **new_prefs})
msg = await client.receive_json()
assert msg["id"] == 6
assert msg["success"]
assert msg["result"] == new_prefs
assert data.STORAGE_KEY not in hass_storage, "expected not to be written yet"
await flush_store((await data.async_get_manager(hass))._store)
assert hass_storage[data.STORAGE_KEY]["data"] == new_prefs
assert await is_configured(hass)
# Verify info reflects data.
await client.send_json({"id": 7, "type": "energy/info"})
msg = await client.receive_json()
assert msg["id"] == 7
assert msg["success"]
assert msg["result"] == {
"cost_sensors": {
"sensor.heat_pump_meter_2": "sensor.heat_pump_meter_2_cost",
"sensor.return_to_grid_offpeak": "sensor.return_to_grid_offpeak_compensation",
},
"solar_forecast_domains": ["some_domain"],
}
# Prefs with limited options
new_prefs_2 = {
"energy_sources": [
{
"type": "grid",
"flow_from": [
{
"stat_energy_from": "sensor.heat_pump_meter",
"stat_cost": None,
"entity_energy_from": None,
"entity_energy_price": None,
"number_energy_price": None,
}
],
"flow_to": [],
"cost_adjustment_day": 1.2,
},
{
"type": "solar",
"stat_energy_from": "my_solar_production",
"config_entry_solar_forecast": None,
},
],
}
await client.send_json({"id": 8, "type": "energy/save_prefs", **new_prefs_2})
msg = await client.receive_json()
assert msg["id"] == 8
assert msg["success"]
assert msg["result"] == {**new_prefs, **new_prefs_2}
async def test_handle_duplicate_from_stat(hass, hass_ws_client) -> None:
"""Test we handle duplicate from stats."""
client = await hass_ws_client(hass)
await client.send_json(
{
"id": 5,
"type": "energy/save_prefs",
"energy_sources": [
{
"type": "grid",
"flow_from": [
{
"stat_energy_from": "sensor.heat_pump_meter",
"stat_cost": None,
"entity_energy_from": None,
"entity_energy_price": None,
"number_energy_price": None,
},
{
"stat_energy_from": "sensor.heat_pump_meter",
"stat_cost": None,
"entity_energy_from": None,
"entity_energy_price": None,
"number_energy_price": None,
},
],
"flow_to": [],
"cost_adjustment_day": 0,
},
],
}
)
msg = await client.receive_json()
assert msg["id"] == 5
assert not msg["success"]
assert msg["error"]["code"] == "invalid_format"
async def test_validate(hass, hass_ws_client) -> None:
"""Test we can validate the preferences."""
client = await hass_ws_client(hass)
await client.send_json({"id": 5, "type": "energy/validate"})
msg = await client.receive_json()
assert msg["id"] == 5
assert msg["success"]
assert msg["result"] == {
"energy_sources": [],
"device_consumption": [],
}
async def test_get_solar_forecast(hass, hass_ws_client, mock_energy_platform) -> None:
"""Test we get preferences."""
entry = MockConfigEntry(domain="some_domain")
entry.add_to_hass(hass)
manager = await data.async_get_manager(hass)
manager.data = data.EnergyManager.default_preferences()
manager.data["energy_sources"].append(
{
"type": "solar",
"stat_energy_from": "my_solar_production",
"config_entry_solar_forecast": [entry.entry_id],
}
)
client = await hass_ws_client(hass)
await client.send_json({"id": 5, "type": "energy/solar_forecast"})
msg = await client.receive_json()
assert msg["id"] == 5
assert msg["success"]
assert msg["result"] == {
entry.entry_id: {
"wh_hours": {
"2021-06-27T13:00:00+00:00": 12,
"2021-06-27T14:00:00+00:00": 8,
}
}
}
@pytest.mark.freeze_time("2021-08-01 00:00:00+00:00")
async def test_fossil_energy_consumption_no_co2(hass, hass_ws_client):
"""Test fossil_energy_consumption when co2 data is missing."""
now = dt_util.utcnow()
later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00"))
await hass.async_add_executor_job(init_recorder_component, hass)
await async_setup_component(hass, "history", {})
await async_setup_component(hass, "sensor", {})
period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00"))
period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00"))
period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00"))
period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00"))
period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00"))
period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00"))
external_energy_statistics_1 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 2,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 3,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 5,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 8,
},
)
external_energy_metadata_1 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_1",
"unit_of_measurement": "kWh",
}
external_energy_statistics_2 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 20,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 30,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 50,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 80,
},
)
external_energy_metadata_2 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_2",
"unit_of_measurement": "kWh",
}
async_add_external_statistics(
hass, external_energy_metadata_1, external_energy_statistics_1
)
async_add_external_statistics(
hass, external_energy_metadata_2, external_energy_statistics_2
)
await async_wait_recording_done(hass)
client = await hass_ws_client()
await client.send_json(
{
"id": 1,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "hour",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2.isoformat(): pytest.approx(33.0 - 22.0),
period3.isoformat(): pytest.approx(55.0 - 33.0),
period4.isoformat(): pytest.approx(88.0 - 55.0),
}
await client.send_json(
{
"id": 2,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "day",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2_day_start.isoformat(): pytest.approx(33.0 - 22.0),
period3.isoformat(): pytest.approx(55.0 - 33.0),
period4_day_start.isoformat(): pytest.approx(88.0 - 55.0),
}
await client.send_json(
{
"id": 3,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "month",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period1.isoformat(): pytest.approx(33.0 - 22.0),
period3.isoformat(): pytest.approx((55.0 - 33.0) + (88.0 - 55.0)),
}
@pytest.mark.freeze_time("2021-08-01 00:00:00+00:00")
async def test_fossil_energy_consumption_hole(hass, hass_ws_client):
"""Test fossil_energy_consumption when some data points lack sum."""
now = dt_util.utcnow()
later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00"))
await hass.async_add_executor_job(init_recorder_component, hass)
await async_setup_component(hass, "history", {})
await async_setup_component(hass, "sensor", {})
period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00"))
period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00"))
period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00"))
period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00"))
period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00"))
period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00"))
external_energy_statistics_1 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": None,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 3,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 5,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 8,
},
)
external_energy_metadata_1 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_1",
"unit_of_measurement": "kWh",
}
external_energy_statistics_2 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 20,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": None,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 50,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 80,
},
)
external_energy_metadata_2 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_2",
"unit_of_measurement": "kWh",
}
async_add_external_statistics(
hass, external_energy_metadata_1, external_energy_statistics_1
)
async_add_external_statistics(
hass, external_energy_metadata_2, external_energy_statistics_2
)
await async_wait_recording_done(hass)
client = await hass_ws_client()
await client.send_json(
{
"id": 1,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "hour",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2.isoformat(): pytest.approx(3.0 - 20.0),
period3.isoformat(): pytest.approx(55.0 - 3.0),
period4.isoformat(): pytest.approx(88.0 - 55.0),
}
await client.send_json(
{
"id": 2,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "day",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2_day_start.isoformat(): pytest.approx(3.0 - 20.0),
period3.isoformat(): pytest.approx(55.0 - 3.0),
period4_day_start.isoformat(): pytest.approx(88.0 - 55.0),
}
await client.send_json(
{
"id": 3,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "month",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period1.isoformat(): pytest.approx(3.0 - 20.0),
period3.isoformat(): pytest.approx((55.0 - 3.0) + (88.0 - 55.0)),
}
@pytest.mark.freeze_time("2021-08-01 00:00:00+00:00")
async def test_fossil_energy_consumption_no_data(hass, hass_ws_client):
"""Test fossil_energy_consumption when there is no data."""
now = dt_util.utcnow()
later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00"))
await hass.async_add_executor_job(init_recorder_component, hass)
await async_setup_component(hass, "history", {})
await async_setup_component(hass, "sensor", {})
period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00"))
period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00"))
period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00"))
period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00"))
external_energy_statistics_1 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": None,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 3,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 5,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 8,
},
)
external_energy_metadata_1 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_1",
"unit_of_measurement": "kWh",
}
external_energy_statistics_2 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 20,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": None,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 50,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 80,
},
)
external_energy_metadata_2 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_2",
"unit_of_measurement": "kWh",
}
async_add_external_statistics(
hass, external_energy_metadata_1, external_energy_statistics_1
)
async_add_external_statistics(
hass, external_energy_metadata_2, external_energy_statistics_2
)
await async_wait_recording_done(hass)
client = await hass_ws_client()
await client.send_json(
{
"id": 1,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1_missing",
"test:total_energy_import_tariff_2_missing",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "hour",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {}
await client.send_json(
{
"id": 2,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1_missing",
"test:total_energy_import_tariff_2_missing",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "day",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {}
await client.send_json(
{
"id": 3,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1_missing",
"test:total_energy_import_tariff_2_missing",
],
"co2_statistic_id": "test:co2_ratio_missing",
"period": "month",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {}
@pytest.mark.freeze_time("2021-08-01 00:00:00+00:00")
async def test_fossil_energy_consumption(hass, hass_ws_client):
"""Test fossil_energy_consumption with co2 sensor data."""
now = dt_util.utcnow()
later = dt_util.as_utc(dt_util.parse_datetime("2022-09-01 00:00:00"))
await hass.async_add_executor_job(init_recorder_component, hass)
await async_setup_component(hass, "history", {})
await async_setup_component(hass, "sensor", {})
period1 = dt_util.as_utc(dt_util.parse_datetime("2021-09-01 00:00:00"))
period2 = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 23:00:00"))
period2_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-09-30 00:00:00"))
period3 = dt_util.as_utc(dt_util.parse_datetime("2021-10-01 00:00:00"))
period4 = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 23:00:00"))
period4_day_start = dt_util.as_utc(dt_util.parse_datetime("2021-10-31 00:00:00"))
external_energy_statistics_1 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 2,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 3,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 4,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 5,
},
)
external_energy_metadata_1 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_1",
"unit_of_measurement": "kWh",
}
external_energy_statistics_2 = (
{
"start": period1,
"last_reset": None,
"state": 0,
"sum": 20,
},
{
"start": period2,
"last_reset": None,
"state": 1,
"sum": 30,
},
{
"start": period3,
"last_reset": None,
"state": 2,
"sum": 40,
},
{
"start": period4,
"last_reset": None,
"state": 3,
"sum": 50,
},
)
external_energy_metadata_2 = {
"has_mean": False,
"has_sum": True,
"name": "Total imported energy",
"source": "test",
"statistic_id": "test:total_energy_import_tariff_2",
"unit_of_measurement": "kWh",
}
external_co2_statistics = (
{
"start": period1,
"last_reset": None,
"mean": 10,
},
{
"start": period2,
"last_reset": None,
"mean": 30,
},
{
"start": period3,
"last_reset": None,
"mean": 60,
},
{
"start": period4,
"last_reset": None,
"mean": 90,
},
)
external_co2_metadata = {
"has_mean": True,
"has_sum": False,
"name": "Fossil percentage",
"source": "test",
"statistic_id": "test:fossil_percentage",
"unit_of_measurement": "%",
}
async_add_external_statistics(
hass, external_energy_metadata_1, external_energy_statistics_1
)
async_add_external_statistics(
hass, external_energy_metadata_2, external_energy_statistics_2
)
async_add_external_statistics(hass, external_co2_metadata, external_co2_statistics)
await async_wait_recording_done(hass)
client = await hass_ws_client()
await client.send_json(
{
"id": 1,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:fossil_percentage",
"period": "hour",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2.isoformat(): pytest.approx((33.0 - 22.0) * 0.3),
period3.isoformat(): pytest.approx((44.0 - 33.0) * 0.6),
period4.isoformat(): pytest.approx((55.0 - 44.0) * 0.9),
}
await client.send_json(
{
"id": 2,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:fossil_percentage",
"period": "day",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period2_day_start.isoformat(): pytest.approx((33.0 - 22.0) * 0.3),
period3.isoformat(): pytest.approx((44.0 - 33.0) * 0.6),
period4_day_start.isoformat(): pytest.approx((55.0 - 44.0) * 0.9),
}
await client.send_json(
{
"id": 3,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": later.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:fossil_percentage",
"period": "month",
}
)
response = await client.receive_json()
assert response["success"]
assert response["result"] == {
period1.isoformat(): pytest.approx((33.0 - 22.0) * 0.3),
period3.isoformat(): pytest.approx(
((44.0 - 33.0) * 0.6) + ((55.0 - 44.0) * 0.9)
),
}
async def test_fossil_energy_consumption_checks(hass, hass_ws_client):
"""Test fossil_energy_consumption parameter validation."""
client = await hass_ws_client(hass)
now = dt_util.utcnow()
await client.send_json(
{
"id": 1,
"type": "energy/fossil_energy_consumption",
"start_time": "donald_duck",
"end_time": now.isoformat(),
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:fossil_percentage",
"period": "hour",
}
)
msg = await client.receive_json()
assert msg["id"] == 1
assert not msg["success"]
assert msg["error"] == {
"code": "invalid_start_time",
"message": "Invalid start_time",
}
await client.send_json(
{
"id": 2,
"type": "energy/fossil_energy_consumption",
"start_time": now.isoformat(),
"end_time": "donald_duck",
"energy_statistic_ids": [
"test:total_energy_import_tariff_1",
"test:total_energy_import_tariff_2",
],
"co2_statistic_id": "test:fossil_percentage",
"period": "hour",
}
)
msg = await client.receive_json()
assert msg["id"] == 2
assert not msg["success"]
assert msg["error"] == {"code": "invalid_end_time", "message": "Invalid end_time"}
| 31.293189 | 90 | 0.538013 | 3,415 | 31,700 | 4.680527 | 0.06735 | 0.018018 | 0.014264 | 0.047297 | 0.873373 | 0.848661 | 0.817317 | 0.800113 | 0.781094 | 0.758634 | 0 | 0.047345 | 0.332366 | 31,700 | 1,012 | 91 | 31.324111 | 0.7079 | 0.004763 | 0 | 0.642857 | 0 | 0 | 0.246578 | 0.084065 | 0 | 0 | 0 | 0 | 0.070313 | 1 | 0.001116 | false | 0 | 0.058036 | 0 | 0.059152 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | null | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.