repository_name
stringlengths
7
55
func_path_in_repository
stringlengths
4
223
func_name
stringlengths
1
134
whole_func_string
stringlengths
75
104k
language
stringclasses
1 value
func_code_string
stringlengths
75
104k
func_code_tokens
listlengths
19
28.4k
func_documentation_string
stringlengths
1
46.9k
func_documentation_tokens
listlengths
1
1.97k
split_name
stringclasses
1 value
func_code_url
stringlengths
87
315
Hackerfleet/hfos
hfos/tool/installer.py
update
def update(ctx, no_restart, no_rebuild): """Update a HFOS node""" # 0. (NOT YET! MAKE A BACKUP OF EVERYTHING) # 1. update repository # 2. update frontend repository # 3. (Not yet: update venv) # 4. rebuild frontend # 5. restart service instance = ctx.obj['instance'] log('Pulling github updates') run_process('.', ['git', 'pull', 'origin', 'master']) run_process('./frontend', ['git', 'pull', 'origin', 'master']) if not no_rebuild: log('Rebuilding frontend') install_frontend(instance, forcerebuild=True, install=False, development=True) if not no_restart: log('Restaring service') if instance != 'hfos': instance = 'hfos-' + instance run_process('.', ['sudo', 'systemctl', 'restart', instance]) log('Done')
python
def update(ctx, no_restart, no_rebuild): """Update a HFOS node""" # 0. (NOT YET! MAKE A BACKUP OF EVERYTHING) # 1. update repository # 2. update frontend repository # 3. (Not yet: update venv) # 4. rebuild frontend # 5. restart service instance = ctx.obj['instance'] log('Pulling github updates') run_process('.', ['git', 'pull', 'origin', 'master']) run_process('./frontend', ['git', 'pull', 'origin', 'master']) if not no_rebuild: log('Rebuilding frontend') install_frontend(instance, forcerebuild=True, install=False, development=True) if not no_restart: log('Restaring service') if instance != 'hfos': instance = 'hfos-' + instance run_process('.', ['sudo', 'systemctl', 'restart', instance]) log('Done')
[ "def", "update", "(", "ctx", ",", "no_restart", ",", "no_rebuild", ")", ":", "# 0. (NOT YET! MAKE A BACKUP OF EVERYTHING)", "# 1. update repository", "# 2. update frontend repository", "# 3. (Not yet: update venv)", "# 4. rebuild frontend", "# 5. restart service", "instance", "=", "ctx", ".", "obj", "[", "'instance'", "]", "log", "(", "'Pulling github updates'", ")", "run_process", "(", "'.'", ",", "[", "'git'", ",", "'pull'", ",", "'origin'", ",", "'master'", "]", ")", "run_process", "(", "'./frontend'", ",", "[", "'git'", ",", "'pull'", ",", "'origin'", ",", "'master'", "]", ")", "if", "not", "no_rebuild", ":", "log", "(", "'Rebuilding frontend'", ")", "install_frontend", "(", "instance", ",", "forcerebuild", "=", "True", ",", "install", "=", "False", ",", "development", "=", "True", ")", "if", "not", "no_restart", ":", "log", "(", "'Restaring service'", ")", "if", "instance", "!=", "'hfos'", ":", "instance", "=", "'hfos-'", "+", "instance", "run_process", "(", "'.'", ",", "[", "'sudo'", ",", "'systemctl'", ",", "'restart'", ",", "instance", "]", ")", "log", "(", "'Done'", ")" ]
Update a HFOS node
[ "Update", "a", "HFOS", "node" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/installer.py#L688-L715
Hackerfleet/hfos
modules/nmea/hfos/nmea/nmea.py
NMEAParser.raw_data
def raw_data(self, event): """Handles incoming raw sensor data :param event: Raw sentences incoming data """ self.log('Received raw data from bus', lvl=events) if not parse: return nmea_time = event.data[0] try: parsed_data = parse(event.data[1]) except Exception as e: self.log('Unparseable sentence:', event.data[1], e, type(e), exc=True, lvl=warn) self.unparsable += event return bus = event.bus sensor_data_package = self._handle(parsed_data) self.log("Sensor data:", sensor_data_package, lvl=verbose) if sensor_data_package: # pprint(sensor_data_package) self.fireEvent(sensordata(sensor_data_package, nmea_time, bus), "navdata")
python
def raw_data(self, event): """Handles incoming raw sensor data :param event: Raw sentences incoming data """ self.log('Received raw data from bus', lvl=events) if not parse: return nmea_time = event.data[0] try: parsed_data = parse(event.data[1]) except Exception as e: self.log('Unparseable sentence:', event.data[1], e, type(e), exc=True, lvl=warn) self.unparsable += event return bus = event.bus sensor_data_package = self._handle(parsed_data) self.log("Sensor data:", sensor_data_package, lvl=verbose) if sensor_data_package: # pprint(sensor_data_package) self.fireEvent(sensordata(sensor_data_package, nmea_time, bus), "navdata")
[ "def", "raw_data", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Received raw data from bus'", ",", "lvl", "=", "events", ")", "if", "not", "parse", ":", "return", "nmea_time", "=", "event", ".", "data", "[", "0", "]", "try", ":", "parsed_data", "=", "parse", "(", "event", ".", "data", "[", "1", "]", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "'Unparseable sentence:'", ",", "event", ".", "data", "[", "1", "]", ",", "e", ",", "type", "(", "e", ")", ",", "exc", "=", "True", ",", "lvl", "=", "warn", ")", "self", ".", "unparsable", "+=", "event", "return", "bus", "=", "event", ".", "bus", "sensor_data_package", "=", "self", ".", "_handle", "(", "parsed_data", ")", "self", ".", "log", "(", "\"Sensor data:\"", ",", "sensor_data_package", ",", "lvl", "=", "verbose", ")", "if", "sensor_data_package", ":", "# pprint(sensor_data_package)", "self", ".", "fireEvent", "(", "sensordata", "(", "sensor_data_package", ",", "nmea_time", ",", "bus", ")", ",", "\"navdata\"", ")" ]
Handles incoming raw sensor data :param event: Raw sentences incoming data
[ "Handles", "incoming", "raw", "sensor", "data", ":", "param", "event", ":", "Raw", "sentences", "incoming", "data" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/nmea/hfos/nmea/nmea.py#L106-L133
Hackerfleet/hfos
hfos/database.py
clear_all
def clear_all(): """DANGER! *This command is a maintenance tool and clears the complete database.* """ sure = input("Are you sure to drop the complete database content? (Type " "in upppercase YES)") if not (sure == 'YES'): db_log('Not deleting the database.') sys.exit(5) client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] for col in db.collection_names(include_system_collections=False): db_log("Dropping collection ", col, lvl=warn) db.drop_collection(col)
python
def clear_all(): """DANGER! *This command is a maintenance tool and clears the complete database.* """ sure = input("Are you sure to drop the complete database content? (Type " "in upppercase YES)") if not (sure == 'YES'): db_log('Not deleting the database.') sys.exit(5) client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] for col in db.collection_names(include_system_collections=False): db_log("Dropping collection ", col, lvl=warn) db.drop_collection(col)
[ "def", "clear_all", "(", ")", ":", "sure", "=", "input", "(", "\"Are you sure to drop the complete database content? (Type \"", "\"in upppercase YES)\"", ")", "if", "not", "(", "sure", "==", "'YES'", ")", ":", "db_log", "(", "'Not deleting the database.'", ")", "sys", ".", "exit", "(", "5", ")", "client", "=", "pymongo", ".", "MongoClient", "(", "host", "=", "dbhost", ",", "port", "=", "dbport", ")", "db", "=", "client", "[", "dbname", "]", "for", "col", "in", "db", ".", "collection_names", "(", "include_system_collections", "=", "False", ")", ":", "db_log", "(", "\"Dropping collection \"", ",", "col", ",", "lvl", "=", "warn", ")", "db", ".", "drop_collection", "(", "col", ")" ]
DANGER! *This command is a maintenance tool and clears the complete database.*
[ "DANGER!", "*", "This", "command", "is", "a", "maintenance", "tool", "and", "clears", "the", "complete", "database", ".", "*" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L102-L118
Hackerfleet/hfos
hfos/database.py
_build_model_factories
def _build_model_factories(store): """Generate factories to construct objects from schemata""" result = {} for schemaname in store: schema = None try: schema = store[schemaname]['schema'] except KeyError: schemata_log("No schema found for ", schemaname, lvl=critical, exc=True) try: result[schemaname] = warmongo.model_factory(schema) except Exception as e: schemata_log("Could not create factory for schema ", schemaname, schema, lvl=critical, exc=True) return result
python
def _build_model_factories(store): """Generate factories to construct objects from schemata""" result = {} for schemaname in store: schema = None try: schema = store[schemaname]['schema'] except KeyError: schemata_log("No schema found for ", schemaname, lvl=critical, exc=True) try: result[schemaname] = warmongo.model_factory(schema) except Exception as e: schemata_log("Could not create factory for schema ", schemaname, schema, lvl=critical, exc=True) return result
[ "def", "_build_model_factories", "(", "store", ")", ":", "result", "=", "{", "}", "for", "schemaname", "in", "store", ":", "schema", "=", "None", "try", ":", "schema", "=", "store", "[", "schemaname", "]", "[", "'schema'", "]", "except", "KeyError", ":", "schemata_log", "(", "\"No schema found for \"", ",", "schemaname", ",", "lvl", "=", "critical", ",", "exc", "=", "True", ")", "try", ":", "result", "[", "schemaname", "]", "=", "warmongo", ".", "model_factory", "(", "schema", ")", "except", "Exception", "as", "e", ":", "schemata_log", "(", "\"Could not create factory for schema \"", ",", "schemaname", ",", "schema", ",", "lvl", "=", "critical", ",", "exc", "=", "True", ")", "return", "result" ]
Generate factories to construct objects from schemata
[ "Generate", "factories", "to", "construct", "objects", "from", "schemata" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L257-L276
Hackerfleet/hfos
hfos/database.py
_build_collections
def _build_collections(store): """Generate database collections with indices from the schemastore""" result = {} client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] for schemaname in store: schema = None indices = None try: schema = store[schemaname]['schema'] indices = store[schemaname].get('indices', None) except KeyError: db_log("No schema found for ", schemaname, lvl=critical) try: result[schemaname] = db[schemaname] except Exception: db_log("Could not get collection for schema ", schemaname, schema, lvl=critical, exc=True) if indices is not None: col = db[schemaname] db_log('Adding indices to', schemaname, lvl=debug) i = 0 keys = list(indices.keys()) while i < len(indices): index_name = keys[i] index = indices[index_name] index_type = index.get('type', None) index_unique = index.get('unique', False) index_sparse = index.get('sparse', True) index_reindex = index.get('reindex', False) if index_type in (None, 'text'): index_type = pymongo.TEXT elif index_type == '2dsphere': index_type = pymongo.GEOSPHERE def do_index(): col.ensure_index([(index_name, index_type)], unique=index_unique, sparse=index_sparse) db_log('Enabling index of type', index_type, 'on', index_name, lvl=debug) try: do_index() i += 1 except pymongo.errors.OperationFailure: db_log(col.list_indexes().__dict__, pretty=True, lvl=verbose) if not index_reindex: db_log('Index was not created!', lvl=warn) i += 1 else: try: col.drop_index(index_name) do_index() i += 1 except pymongo.errors.OperationFailure as e: db_log('Index recreation problem:', exc=True, lvl=error) col.drop_indexes() i = 0 # for index in col.list_indexes(): # db_log("Index: ", index) return result
python
def _build_collections(store): """Generate database collections with indices from the schemastore""" result = {} client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] for schemaname in store: schema = None indices = None try: schema = store[schemaname]['schema'] indices = store[schemaname].get('indices', None) except KeyError: db_log("No schema found for ", schemaname, lvl=critical) try: result[schemaname] = db[schemaname] except Exception: db_log("Could not get collection for schema ", schemaname, schema, lvl=critical, exc=True) if indices is not None: col = db[schemaname] db_log('Adding indices to', schemaname, lvl=debug) i = 0 keys = list(indices.keys()) while i < len(indices): index_name = keys[i] index = indices[index_name] index_type = index.get('type', None) index_unique = index.get('unique', False) index_sparse = index.get('sparse', True) index_reindex = index.get('reindex', False) if index_type in (None, 'text'): index_type = pymongo.TEXT elif index_type == '2dsphere': index_type = pymongo.GEOSPHERE def do_index(): col.ensure_index([(index_name, index_type)], unique=index_unique, sparse=index_sparse) db_log('Enabling index of type', index_type, 'on', index_name, lvl=debug) try: do_index() i += 1 except pymongo.errors.OperationFailure: db_log(col.list_indexes().__dict__, pretty=True, lvl=verbose) if not index_reindex: db_log('Index was not created!', lvl=warn) i += 1 else: try: col.drop_index(index_name) do_index() i += 1 except pymongo.errors.OperationFailure as e: db_log('Index recreation problem:', exc=True, lvl=error) col.drop_indexes() i = 0 # for index in col.list_indexes(): # db_log("Index: ", index) return result
[ "def", "_build_collections", "(", "store", ")", ":", "result", "=", "{", "}", "client", "=", "pymongo", ".", "MongoClient", "(", "host", "=", "dbhost", ",", "port", "=", "dbport", ")", "db", "=", "client", "[", "dbname", "]", "for", "schemaname", "in", "store", ":", "schema", "=", "None", "indices", "=", "None", "try", ":", "schema", "=", "store", "[", "schemaname", "]", "[", "'schema'", "]", "indices", "=", "store", "[", "schemaname", "]", ".", "get", "(", "'indices'", ",", "None", ")", "except", "KeyError", ":", "db_log", "(", "\"No schema found for \"", ",", "schemaname", ",", "lvl", "=", "critical", ")", "try", ":", "result", "[", "schemaname", "]", "=", "db", "[", "schemaname", "]", "except", "Exception", ":", "db_log", "(", "\"Could not get collection for schema \"", ",", "schemaname", ",", "schema", ",", "lvl", "=", "critical", ",", "exc", "=", "True", ")", "if", "indices", "is", "not", "None", ":", "col", "=", "db", "[", "schemaname", "]", "db_log", "(", "'Adding indices to'", ",", "schemaname", ",", "lvl", "=", "debug", ")", "i", "=", "0", "keys", "=", "list", "(", "indices", ".", "keys", "(", ")", ")", "while", "i", "<", "len", "(", "indices", ")", ":", "index_name", "=", "keys", "[", "i", "]", "index", "=", "indices", "[", "index_name", "]", "index_type", "=", "index", ".", "get", "(", "'type'", ",", "None", ")", "index_unique", "=", "index", ".", "get", "(", "'unique'", ",", "False", ")", "index_sparse", "=", "index", ".", "get", "(", "'sparse'", ",", "True", ")", "index_reindex", "=", "index", ".", "get", "(", "'reindex'", ",", "False", ")", "if", "index_type", "in", "(", "None", ",", "'text'", ")", ":", "index_type", "=", "pymongo", ".", "TEXT", "elif", "index_type", "==", "'2dsphere'", ":", "index_type", "=", "pymongo", ".", "GEOSPHERE", "def", "do_index", "(", ")", ":", "col", ".", "ensure_index", "(", "[", "(", "index_name", ",", "index_type", ")", "]", ",", "unique", "=", "index_unique", ",", "sparse", "=", "index_sparse", ")", "db_log", "(", "'Enabling index of type'", ",", "index_type", ",", "'on'", ",", "index_name", ",", "lvl", "=", "debug", ")", "try", ":", "do_index", "(", ")", "i", "+=", "1", "except", "pymongo", ".", "errors", ".", "OperationFailure", ":", "db_log", "(", "col", ".", "list_indexes", "(", ")", ".", "__dict__", ",", "pretty", "=", "True", ",", "lvl", "=", "verbose", ")", "if", "not", "index_reindex", ":", "db_log", "(", "'Index was not created!'", ",", "lvl", "=", "warn", ")", "i", "+=", "1", "else", ":", "try", ":", "col", ".", "drop_index", "(", "index_name", ")", "do_index", "(", ")", "i", "+=", "1", "except", "pymongo", ".", "errors", ".", "OperationFailure", "as", "e", ":", "db_log", "(", "'Index recreation problem:'", ",", "exc", "=", "True", ",", "lvl", "=", "error", ")", "col", ".", "drop_indexes", "(", ")", "i", "=", "0", "# for index in col.list_indexes():", "# db_log(\"Index: \", index)", "return", "result" ]
Generate database collections with indices from the schemastore
[ "Generate", "database", "collections", "with", "indices", "from", "the", "schemastore" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L279-L349
Hackerfleet/hfos
hfos/database.py
initialize
def initialize(address='127.0.0.1:27017', database_name='hfos', instance_name="default", reload=False): """Initializes the database connectivity, schemata and finally object models""" global schemastore global l10n_schemastore global objectmodels global collections global dbhost global dbport global dbname global instance global initialized if initialized and not reload: hfoslog('Already initialized and not reloading.', lvl=warn, emitter="DB", frame_ref=2) return dbhost = address.split(':')[0] dbport = int(address.split(":")[1]) if ":" in address else 27017 dbname = database_name db_log("Using database:", dbname, '@', dbhost, ':', dbport) try: client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] db_log("Database: ", db.command('buildinfo'), lvl=debug) except Exception as e: db_log("No database available! Check if you have mongodb > 3.0 " "installed and running as well as listening on port 27017 " "of localhost. (Error: %s) -> EXIT" % e, lvl=critical) sys.exit(5) warmongo.connect(database_name) schemastore = _build_schemastore_new() l10n_schemastore = _build_l10n_schemastore(schemastore) objectmodels = _build_model_factories(schemastore) collections = _build_collections(schemastore) instance = instance_name initialized = True
python
def initialize(address='127.0.0.1:27017', database_name='hfos', instance_name="default", reload=False): """Initializes the database connectivity, schemata and finally object models""" global schemastore global l10n_schemastore global objectmodels global collections global dbhost global dbport global dbname global instance global initialized if initialized and not reload: hfoslog('Already initialized and not reloading.', lvl=warn, emitter="DB", frame_ref=2) return dbhost = address.split(':')[0] dbport = int(address.split(":")[1]) if ":" in address else 27017 dbname = database_name db_log("Using database:", dbname, '@', dbhost, ':', dbport) try: client = pymongo.MongoClient(host=dbhost, port=dbport) db = client[dbname] db_log("Database: ", db.command('buildinfo'), lvl=debug) except Exception as e: db_log("No database available! Check if you have mongodb > 3.0 " "installed and running as well as listening on port 27017 " "of localhost. (Error: %s) -> EXIT" % e, lvl=critical) sys.exit(5) warmongo.connect(database_name) schemastore = _build_schemastore_new() l10n_schemastore = _build_l10n_schemastore(schemastore) objectmodels = _build_model_factories(schemastore) collections = _build_collections(schemastore) instance = instance_name initialized = True
[ "def", "initialize", "(", "address", "=", "'127.0.0.1:27017'", ",", "database_name", "=", "'hfos'", ",", "instance_name", "=", "\"default\"", ",", "reload", "=", "False", ")", ":", "global", "schemastore", "global", "l10n_schemastore", "global", "objectmodels", "global", "collections", "global", "dbhost", "global", "dbport", "global", "dbname", "global", "instance", "global", "initialized", "if", "initialized", "and", "not", "reload", ":", "hfoslog", "(", "'Already initialized and not reloading.'", ",", "lvl", "=", "warn", ",", "emitter", "=", "\"DB\"", ",", "frame_ref", "=", "2", ")", "return", "dbhost", "=", "address", ".", "split", "(", "':'", ")", "[", "0", "]", "dbport", "=", "int", "(", "address", ".", "split", "(", "\":\"", ")", "[", "1", "]", ")", "if", "\":\"", "in", "address", "else", "27017", "dbname", "=", "database_name", "db_log", "(", "\"Using database:\"", ",", "dbname", ",", "'@'", ",", "dbhost", ",", "':'", ",", "dbport", ")", "try", ":", "client", "=", "pymongo", ".", "MongoClient", "(", "host", "=", "dbhost", ",", "port", "=", "dbport", ")", "db", "=", "client", "[", "dbname", "]", "db_log", "(", "\"Database: \"", ",", "db", ".", "command", "(", "'buildinfo'", ")", ",", "lvl", "=", "debug", ")", "except", "Exception", "as", "e", ":", "db_log", "(", "\"No database available! Check if you have mongodb > 3.0 \"", "\"installed and running as well as listening on port 27017 \"", "\"of localhost. (Error: %s) -> EXIT\"", "%", "e", ",", "lvl", "=", "critical", ")", "sys", ".", "exit", "(", "5", ")", "warmongo", ".", "connect", "(", "database_name", ")", "schemastore", "=", "_build_schemastore_new", "(", ")", "l10n_schemastore", "=", "_build_l10n_schemastore", "(", "schemastore", ")", "objectmodels", "=", "_build_model_factories", "(", "schemastore", ")", "collections", "=", "_build_collections", "(", "schemastore", ")", "instance", "=", "instance_name", "initialized", "=", "True" ]
Initializes the database connectivity, schemata and finally object models
[ "Initializes", "the", "database", "connectivity", "schemata", "and", "finally", "object", "models" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L352-L392
Hackerfleet/hfos
hfos/database.py
profile
def profile(schemaname='sensordata', profiletype='pjs'): """Profiles object model handling with a very simple benchmarking test""" db_log("Profiling ", schemaname) schema = schemastore[schemaname]['schema'] db_log("Schema: ", schema, lvl=debug) testclass = None if profiletype == 'warmongo': db_log("Running Warmongo benchmark") testclass = warmongo.model_factory(schema) elif profiletype == 'pjs': db_log("Running PJS benchmark") try: import python_jsonschema_objects as pjs except ImportError: db_log("PJS benchmark selected but not available. Install " "python_jsonschema_objects (PJS)") return db_log() builder = pjs.ObjectBuilder(schema) ns = builder.build_classes() pprint(ns) testclass = ns[schemaname] db_log("ns: ", ns, lvl=warn) if testclass is not None: db_log("Instantiating elements...") for i in range(100): testclass() else: db_log("No Profiletype available!") db_log("Profiling done")
python
def profile(schemaname='sensordata', profiletype='pjs'): """Profiles object model handling with a very simple benchmarking test""" db_log("Profiling ", schemaname) schema = schemastore[schemaname]['schema'] db_log("Schema: ", schema, lvl=debug) testclass = None if profiletype == 'warmongo': db_log("Running Warmongo benchmark") testclass = warmongo.model_factory(schema) elif profiletype == 'pjs': db_log("Running PJS benchmark") try: import python_jsonschema_objects as pjs except ImportError: db_log("PJS benchmark selected but not available. Install " "python_jsonschema_objects (PJS)") return db_log() builder = pjs.ObjectBuilder(schema) ns = builder.build_classes() pprint(ns) testclass = ns[schemaname] db_log("ns: ", ns, lvl=warn) if testclass is not None: db_log("Instantiating elements...") for i in range(100): testclass() else: db_log("No Profiletype available!") db_log("Profiling done")
[ "def", "profile", "(", "schemaname", "=", "'sensordata'", ",", "profiletype", "=", "'pjs'", ")", ":", "db_log", "(", "\"Profiling \"", ",", "schemaname", ")", "schema", "=", "schemastore", "[", "schemaname", "]", "[", "'schema'", "]", "db_log", "(", "\"Schema: \"", ",", "schema", ",", "lvl", "=", "debug", ")", "testclass", "=", "None", "if", "profiletype", "==", "'warmongo'", ":", "db_log", "(", "\"Running Warmongo benchmark\"", ")", "testclass", "=", "warmongo", ".", "model_factory", "(", "schema", ")", "elif", "profiletype", "==", "'pjs'", ":", "db_log", "(", "\"Running PJS benchmark\"", ")", "try", ":", "import", "python_jsonschema_objects", "as", "pjs", "except", "ImportError", ":", "db_log", "(", "\"PJS benchmark selected but not available. Install \"", "\"python_jsonschema_objects (PJS)\"", ")", "return", "db_log", "(", ")", "builder", "=", "pjs", ".", "ObjectBuilder", "(", "schema", ")", "ns", "=", "builder", ".", "build_classes", "(", ")", "pprint", "(", "ns", ")", "testclass", "=", "ns", "[", "schemaname", "]", "db_log", "(", "\"ns: \"", ",", "ns", ",", "lvl", "=", "warn", ")", "if", "testclass", "is", "not", "None", ":", "db_log", "(", "\"Instantiating elements...\"", ")", "for", "i", "in", "range", "(", "100", ")", ":", "testclass", "(", ")", "else", ":", "db_log", "(", "\"No Profiletype available!\"", ")", "db_log", "(", "\"Profiling done\"", ")" ]
Profiles object model handling with a very simple benchmarking test
[ "Profiles", "object", "model", "handling", "with", "a", "very", "simple", "benchmarking", "test" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L412-L449
Hackerfleet/hfos
hfos/database.py
backup
def backup(schema, uuid, export_filter, export_format, filename, pretty, export_all, omit): """Exports all collections to (JSON-) files.""" export_format = export_format.upper() if pretty: indent = 4 else: indent = 0 f = None if filename: try: f = open(filename, 'w') except (IOError, PermissionError) as e: backup_log('Could not open output file for writing:', exc=True, lvl=error) return def output(what, convert=False): """Output the backup in a specified format.""" if convert: if export_format == 'JSON': data = json.dumps(what, indent=indent) else: data = "" else: data = what if not filename: print(data) else: f.write(data) if schema is None: if export_all is False: backup_log('No schema given.', lvl=warn) return else: schemata = objectmodels.keys() else: schemata = [schema] all_items = {} for schema_item in schemata: model = objectmodels[schema_item] if uuid: obj = model.find({'uuid': uuid}) elif export_filter: obj = model.find(literal_eval(export_filter)) else: obj = model.find() items = [] for item in obj: fields = item.serializablefields() for field in omit: try: fields.pop(field) except KeyError: pass items.append(fields) all_items[schema_item] = items # if pretty is True: # output('\n// Objectmodel: ' + schema_item + '\n\n') # output(schema_item + ' = [\n') output(all_items, convert=True) if f is not None: f.flush() f.close()
python
def backup(schema, uuid, export_filter, export_format, filename, pretty, export_all, omit): """Exports all collections to (JSON-) files.""" export_format = export_format.upper() if pretty: indent = 4 else: indent = 0 f = None if filename: try: f = open(filename, 'w') except (IOError, PermissionError) as e: backup_log('Could not open output file for writing:', exc=True, lvl=error) return def output(what, convert=False): """Output the backup in a specified format.""" if convert: if export_format == 'JSON': data = json.dumps(what, indent=indent) else: data = "" else: data = what if not filename: print(data) else: f.write(data) if schema is None: if export_all is False: backup_log('No schema given.', lvl=warn) return else: schemata = objectmodels.keys() else: schemata = [schema] all_items = {} for schema_item in schemata: model = objectmodels[schema_item] if uuid: obj = model.find({'uuid': uuid}) elif export_filter: obj = model.find(literal_eval(export_filter)) else: obj = model.find() items = [] for item in obj: fields = item.serializablefields() for field in omit: try: fields.pop(field) except KeyError: pass items.append(fields) all_items[schema_item] = items # if pretty is True: # output('\n// Objectmodel: ' + schema_item + '\n\n') # output(schema_item + ' = [\n') output(all_items, convert=True) if f is not None: f.flush() f.close()
[ "def", "backup", "(", "schema", ",", "uuid", ",", "export_filter", ",", "export_format", ",", "filename", ",", "pretty", ",", "export_all", ",", "omit", ")", ":", "export_format", "=", "export_format", ".", "upper", "(", ")", "if", "pretty", ":", "indent", "=", "4", "else", ":", "indent", "=", "0", "f", "=", "None", "if", "filename", ":", "try", ":", "f", "=", "open", "(", "filename", ",", "'w'", ")", "except", "(", "IOError", ",", "PermissionError", ")", "as", "e", ":", "backup_log", "(", "'Could not open output file for writing:'", ",", "exc", "=", "True", ",", "lvl", "=", "error", ")", "return", "def", "output", "(", "what", ",", "convert", "=", "False", ")", ":", "\"\"\"Output the backup in a specified format.\"\"\"", "if", "convert", ":", "if", "export_format", "==", "'JSON'", ":", "data", "=", "json", ".", "dumps", "(", "what", ",", "indent", "=", "indent", ")", "else", ":", "data", "=", "\"\"", "else", ":", "data", "=", "what", "if", "not", "filename", ":", "print", "(", "data", ")", "else", ":", "f", ".", "write", "(", "data", ")", "if", "schema", "is", "None", ":", "if", "export_all", "is", "False", ":", "backup_log", "(", "'No schema given.'", ",", "lvl", "=", "warn", ")", "return", "else", ":", "schemata", "=", "objectmodels", ".", "keys", "(", ")", "else", ":", "schemata", "=", "[", "schema", "]", "all_items", "=", "{", "}", "for", "schema_item", "in", "schemata", ":", "model", "=", "objectmodels", "[", "schema_item", "]", "if", "uuid", ":", "obj", "=", "model", ".", "find", "(", "{", "'uuid'", ":", "uuid", "}", ")", "elif", "export_filter", ":", "obj", "=", "model", ".", "find", "(", "literal_eval", "(", "export_filter", ")", ")", "else", ":", "obj", "=", "model", ".", "find", "(", ")", "items", "=", "[", "]", "for", "item", "in", "obj", ":", "fields", "=", "item", ".", "serializablefields", "(", ")", "for", "field", "in", "omit", ":", "try", ":", "fields", ".", "pop", "(", "field", ")", "except", "KeyError", ":", "pass", "items", ".", "append", "(", "fields", ")", "all_items", "[", "schema_item", "]", "=", "items", "# if pretty is True:", "# output('\\n// Objectmodel: ' + schema_item + '\\n\\n')", "# output(schema_item + ' = [\\n')", "output", "(", "all_items", ",", "convert", "=", "True", ")", "if", "f", "is", "not", "None", ":", "f", ".", "flush", "(", ")", "f", ".", "close", "(", ")" ]
Exports all collections to (JSON-) files.
[ "Exports", "all", "collections", "to", "(", "JSON", "-", ")", "files", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L657-L733
Hackerfleet/hfos
hfos/database.py
Maintenance._check_collections
def _check_collections(self): """Checks node local collection storage sizes""" self.collection_sizes = {} self.collection_total = 0 for col in self.db.collection_names(include_system_collections=False): self.collection_sizes[col] = self.db.command('collstats', col).get( 'storageSize', 0) self.collection_total += self.collection_sizes[col] sorted_x = sorted(self.collection_sizes.items(), key=operator.itemgetter(1)) for item in sorted_x: self.log("Collection size (%s): %.2f MB" % ( item[0], item[1] / 1024.0 / 1024), lvl=verbose) self.log("Total collection sizes: %.2f MB" % (self.collection_total / 1024.0 / 1024))
python
def _check_collections(self): """Checks node local collection storage sizes""" self.collection_sizes = {} self.collection_total = 0 for col in self.db.collection_names(include_system_collections=False): self.collection_sizes[col] = self.db.command('collstats', col).get( 'storageSize', 0) self.collection_total += self.collection_sizes[col] sorted_x = sorted(self.collection_sizes.items(), key=operator.itemgetter(1)) for item in sorted_x: self.log("Collection size (%s): %.2f MB" % ( item[0], item[1] / 1024.0 / 1024), lvl=verbose) self.log("Total collection sizes: %.2f MB" % (self.collection_total / 1024.0 / 1024))
[ "def", "_check_collections", "(", "self", ")", ":", "self", ".", "collection_sizes", "=", "{", "}", "self", ".", "collection_total", "=", "0", "for", "col", "in", "self", ".", "db", ".", "collection_names", "(", "include_system_collections", "=", "False", ")", ":", "self", ".", "collection_sizes", "[", "col", "]", "=", "self", ".", "db", ".", "command", "(", "'collstats'", ",", "col", ")", ".", "get", "(", "'storageSize'", ",", "0", ")", "self", ".", "collection_total", "+=", "self", ".", "collection_sizes", "[", "col", "]", "sorted_x", "=", "sorted", "(", "self", ".", "collection_sizes", ".", "items", "(", ")", ",", "key", "=", "operator", ".", "itemgetter", "(", "1", ")", ")", "for", "item", "in", "sorted_x", ":", "self", ".", "log", "(", "\"Collection size (%s): %.2f MB\"", "%", "(", "item", "[", "0", "]", ",", "item", "[", "1", "]", "/", "1024.0", "/", "1024", ")", ",", "lvl", "=", "verbose", ")", "self", ".", "log", "(", "\"Total collection sizes: %.2f MB\"", "%", "(", "self", ".", "collection_total", "/", "1024.0", "/", "1024", ")", ")" ]
Checks node local collection storage sizes
[ "Checks", "node", "local", "collection", "storage", "sizes" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L558-L577
Hackerfleet/hfos
hfos/database.py
Maintenance._check_free_space
def _check_free_space(self): """Checks used filesystem storage sizes""" def get_folder_size(path): """Aggregates used size of a specified path, recursively""" total_size = 0 for item in walk(path): for file in item[2]: try: total_size = total_size + getsize(join(item[0], file)) except (OSError, PermissionError) as e: self.log("error with file: " + join(item[0], file), e) return total_size for name, checkpoint in self.config.locations.items(): try: stats = statvfs(checkpoint['location']) except (OSError, PermissionError) as e: self.log('Location unavailable:', name, e, type(e), lvl=error, exc=True) continue free_space = stats.f_frsize * stats.f_bavail used_space = get_folder_size( checkpoint['location'] ) / 1024.0 / 1024 self.log('Location %s uses %.2f MB' % (name, used_space)) if free_space < checkpoint['minimum']: self.log('Short of free space on %s: %.2f MB left' % ( name, free_space / 1024.0 / 1024 / 1024), lvl=warn)
python
def _check_free_space(self): """Checks used filesystem storage sizes""" def get_folder_size(path): """Aggregates used size of a specified path, recursively""" total_size = 0 for item in walk(path): for file in item[2]: try: total_size = total_size + getsize(join(item[0], file)) except (OSError, PermissionError) as e: self.log("error with file: " + join(item[0], file), e) return total_size for name, checkpoint in self.config.locations.items(): try: stats = statvfs(checkpoint['location']) except (OSError, PermissionError) as e: self.log('Location unavailable:', name, e, type(e), lvl=error, exc=True) continue free_space = stats.f_frsize * stats.f_bavail used_space = get_folder_size( checkpoint['location'] ) / 1024.0 / 1024 self.log('Location %s uses %.2f MB' % (name, used_space)) if free_space < checkpoint['minimum']: self.log('Short of free space on %s: %.2f MB left' % ( name, free_space / 1024.0 / 1024 / 1024), lvl=warn)
[ "def", "_check_free_space", "(", "self", ")", ":", "def", "get_folder_size", "(", "path", ")", ":", "\"\"\"Aggregates used size of a specified path, recursively\"\"\"", "total_size", "=", "0", "for", "item", "in", "walk", "(", "path", ")", ":", "for", "file", "in", "item", "[", "2", "]", ":", "try", ":", "total_size", "=", "total_size", "+", "getsize", "(", "join", "(", "item", "[", "0", "]", ",", "file", ")", ")", "except", "(", "OSError", ",", "PermissionError", ")", "as", "e", ":", "self", ".", "log", "(", "\"error with file: \"", "+", "join", "(", "item", "[", "0", "]", ",", "file", ")", ",", "e", ")", "return", "total_size", "for", "name", ",", "checkpoint", "in", "self", ".", "config", ".", "locations", ".", "items", "(", ")", ":", "try", ":", "stats", "=", "statvfs", "(", "checkpoint", "[", "'location'", "]", ")", "except", "(", "OSError", ",", "PermissionError", ")", "as", "e", ":", "self", ".", "log", "(", "'Location unavailable:'", ",", "name", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ",", "exc", "=", "True", ")", "continue", "free_space", "=", "stats", ".", "f_frsize", "*", "stats", ".", "f_bavail", "used_space", "=", "get_folder_size", "(", "checkpoint", "[", "'location'", "]", ")", "/", "1024.0", "/", "1024", "self", ".", "log", "(", "'Location %s uses %.2f MB'", "%", "(", "name", ",", "used_space", ")", ")", "if", "free_space", "<", "checkpoint", "[", "'minimum'", "]", ":", "self", ".", "log", "(", "'Short of free space on %s: %.2f MB left'", "%", "(", "name", ",", "free_space", "/", "1024.0", "/", "1024", "/", "1024", ")", ",", "lvl", "=", "warn", ")" ]
Checks used filesystem storage sizes
[ "Checks", "used", "filesystem", "storage", "sizes" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/database.py#L579-L611
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
send_mail_worker
def send_mail_worker(config, mail, event): """Worker task to send out an email, which blocks the process unless it is threaded""" log = "" try: if config.mail_ssl: server = SMTP_SSL(config.mail_server, port=config.mail_server_port, timeout=30) else: server = SMTP(config.mail_server, port=config.mail_server_port, timeout=30) if config.mail_tls: log += 'Starting TLS\n' server.starttls() if config.mail_username != '': log += 'Logging in with ' + str(config.mail_username) + "\n" server.login(config.mail_username, config.mail_password) else: log += 'No username, trying anonymous access\n' log += 'Sending Mail\n' response_send = server.send_message(mail) server.quit() except timeout as e: log += 'Could not send email to enrollee, mailserver timeout: ' + str(e) + "\n" return False, log, event log += 'Server response:' + str(response_send) return True, log, event
python
def send_mail_worker(config, mail, event): """Worker task to send out an email, which blocks the process unless it is threaded""" log = "" try: if config.mail_ssl: server = SMTP_SSL(config.mail_server, port=config.mail_server_port, timeout=30) else: server = SMTP(config.mail_server, port=config.mail_server_port, timeout=30) if config.mail_tls: log += 'Starting TLS\n' server.starttls() if config.mail_username != '': log += 'Logging in with ' + str(config.mail_username) + "\n" server.login(config.mail_username, config.mail_password) else: log += 'No username, trying anonymous access\n' log += 'Sending Mail\n' response_send = server.send_message(mail) server.quit() except timeout as e: log += 'Could not send email to enrollee, mailserver timeout: ' + str(e) + "\n" return False, log, event log += 'Server response:' + str(response_send) return True, log, event
[ "def", "send_mail_worker", "(", "config", ",", "mail", ",", "event", ")", ":", "log", "=", "\"\"", "try", ":", "if", "config", ".", "mail_ssl", ":", "server", "=", "SMTP_SSL", "(", "config", ".", "mail_server", ",", "port", "=", "config", ".", "mail_server_port", ",", "timeout", "=", "30", ")", "else", ":", "server", "=", "SMTP", "(", "config", ".", "mail_server", ",", "port", "=", "config", ".", "mail_server_port", ",", "timeout", "=", "30", ")", "if", "config", ".", "mail_tls", ":", "log", "+=", "'Starting TLS\\n'", "server", ".", "starttls", "(", ")", "if", "config", ".", "mail_username", "!=", "''", ":", "log", "+=", "'Logging in with '", "+", "str", "(", "config", ".", "mail_username", ")", "+", "\"\\n\"", "server", ".", "login", "(", "config", ".", "mail_username", ",", "config", ".", "mail_password", ")", "else", ":", "log", "+=", "'No username, trying anonymous access\\n'", "log", "+=", "'Sending Mail\\n'", "response_send", "=", "server", ".", "send_message", "(", "mail", ")", "server", ".", "quit", "(", ")", "except", "timeout", "as", "e", ":", "log", "+=", "'Could not send email to enrollee, mailserver timeout: '", "+", "str", "(", "e", ")", "+", "\"\\n\"", "return", "False", ",", "log", ",", "event", "log", "+=", "'Server response:'", "+", "str", "(", "response_send", ")", "return", "True", ",", "log", ",", "event" ]
Worker task to send out an email, which blocks the process unless it is threaded
[ "Worker", "task", "to", "send", "out", "an", "email", "which", "blocks", "the", "process", "unless", "it", "is", "threaded" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L792-L821
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.reload_configuration
def reload_configuration(self, event): """Reload the current configuration and set up everything depending on it""" super(EnrolManager, self).reload_configuration(event) self.log('Reloaded configuration.') self._setup()
python
def reload_configuration(self, event): """Reload the current configuration and set up everything depending on it""" super(EnrolManager, self).reload_configuration(event) self.log('Reloaded configuration.') self._setup()
[ "def", "reload_configuration", "(", "self", ",", "event", ")", ":", "super", "(", "EnrolManager", ",", "self", ")", ".", "reload_configuration", "(", "event", ")", "self", ".", "log", "(", "'Reloaded configuration.'", ")", "self", ".", "_setup", "(", ")" ]
Reload the current configuration and set up everything depending on it
[ "Reload", "the", "current", "configuration", "and", "set", "up", "everything", "depending", "on", "it" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L261-L266
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.change
def change(self, event): """An admin user requests a change to an enrolment""" uuid = event.data['uuid'] status = event.data['status'] if status not in ['Open', 'Pending', 'Accepted', 'Denied', 'Resend']: self.log('Erroneous status for enrollment requested!', lvl=warn) return self.log('Changing status of an enrollment', uuid, 'to', status) enrollment = objectmodels['enrollment'].find_one({'uuid': uuid}) if enrollment is not None: self.log('Enrollment found', lvl=debug) else: return if status == 'Resend': enrollment.timestamp = std_now() enrollment.save() self._send_invitation(enrollment, event) reply = {True: 'Resent'} else: enrollment.status = status enrollment.save() reply = {True: enrollment.serializablefields()} if status == 'Accepted' and enrollment.method == 'Enrolled': self._create_user(enrollment.name, enrollment.password, enrollment.email, 'Invited', event.client.uuid) self._send_acceptance(enrollment, None, event) packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'change', 'data': reply } self.log('packet:', packet, lvl=verbose) self.fireEvent(send(event.client.uuid, packet)) self.log('Enrollment changed', lvl=debug)
python
def change(self, event): """An admin user requests a change to an enrolment""" uuid = event.data['uuid'] status = event.data['status'] if status not in ['Open', 'Pending', 'Accepted', 'Denied', 'Resend']: self.log('Erroneous status for enrollment requested!', lvl=warn) return self.log('Changing status of an enrollment', uuid, 'to', status) enrollment = objectmodels['enrollment'].find_one({'uuid': uuid}) if enrollment is not None: self.log('Enrollment found', lvl=debug) else: return if status == 'Resend': enrollment.timestamp = std_now() enrollment.save() self._send_invitation(enrollment, event) reply = {True: 'Resent'} else: enrollment.status = status enrollment.save() reply = {True: enrollment.serializablefields()} if status == 'Accepted' and enrollment.method == 'Enrolled': self._create_user(enrollment.name, enrollment.password, enrollment.email, 'Invited', event.client.uuid) self._send_acceptance(enrollment, None, event) packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'change', 'data': reply } self.log('packet:', packet, lvl=verbose) self.fireEvent(send(event.client.uuid, packet)) self.log('Enrollment changed', lvl=debug)
[ "def", "change", "(", "self", ",", "event", ")", ":", "uuid", "=", "event", ".", "data", "[", "'uuid'", "]", "status", "=", "event", ".", "data", "[", "'status'", "]", "if", "status", "not", "in", "[", "'Open'", ",", "'Pending'", ",", "'Accepted'", ",", "'Denied'", ",", "'Resend'", "]", ":", "self", ".", "log", "(", "'Erroneous status for enrollment requested!'", ",", "lvl", "=", "warn", ")", "return", "self", ".", "log", "(", "'Changing status of an enrollment'", ",", "uuid", ",", "'to'", ",", "status", ")", "enrollment", "=", "objectmodels", "[", "'enrollment'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "uuid", "}", ")", "if", "enrollment", "is", "not", "None", ":", "self", ".", "log", "(", "'Enrollment found'", ",", "lvl", "=", "debug", ")", "else", ":", "return", "if", "status", "==", "'Resend'", ":", "enrollment", ".", "timestamp", "=", "std_now", "(", ")", "enrollment", ".", "save", "(", ")", "self", ".", "_send_invitation", "(", "enrollment", ",", "event", ")", "reply", "=", "{", "True", ":", "'Resent'", "}", "else", ":", "enrollment", ".", "status", "=", "status", "enrollment", ".", "save", "(", ")", "reply", "=", "{", "True", ":", "enrollment", ".", "serializablefields", "(", ")", "}", "if", "status", "==", "'Accepted'", "and", "enrollment", ".", "method", "==", "'Enrolled'", ":", "self", ".", "_create_user", "(", "enrollment", ".", "name", ",", "enrollment", ".", "password", ",", "enrollment", ".", "email", ",", "'Invited'", ",", "event", ".", "client", ".", "uuid", ")", "self", ".", "_send_acceptance", "(", "enrollment", ",", "None", ",", "event", ")", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'change'", ",", "'data'", ":", "reply", "}", "self", ".", "log", "(", "'packet:'", ",", "packet", ",", "lvl", "=", "verbose", ")", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "packet", ")", ")", "self", ".", "log", "(", "'Enrollment changed'", ",", "lvl", "=", "debug", ")" ]
An admin user requests a change to an enrolment
[ "An", "admin", "user", "requests", "a", "change", "to", "an", "enrolment" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L315-L354
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.changepassword
def changepassword(self, event): """An enrolled user wants to change their password""" old = event.data['old'] new = event.data['new'] uuid = event.user.uuid # TODO: Write email to notify user of password change user = objectmodels['user'].find_one({'uuid': uuid}) if std_hash(old, self.salt) == user.passhash: user.passhash = std_hash(new, self.salt) user.save() packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'changepassword', 'data': True } self.fireEvent(send(event.client.uuid, packet)) self.log('Successfully changed password for user', uuid) else: packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'changepassword', 'data': False } self.fireEvent(send(event.client.uuid, packet)) self.log('User tried to change password without supplying old one', lvl=warn)
python
def changepassword(self, event): """An enrolled user wants to change their password""" old = event.data['old'] new = event.data['new'] uuid = event.user.uuid # TODO: Write email to notify user of password change user = objectmodels['user'].find_one({'uuid': uuid}) if std_hash(old, self.salt) == user.passhash: user.passhash = std_hash(new, self.salt) user.save() packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'changepassword', 'data': True } self.fireEvent(send(event.client.uuid, packet)) self.log('Successfully changed password for user', uuid) else: packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'changepassword', 'data': False } self.fireEvent(send(event.client.uuid, packet)) self.log('User tried to change password without supplying old one', lvl=warn)
[ "def", "changepassword", "(", "self", ",", "event", ")", ":", "old", "=", "event", ".", "data", "[", "'old'", "]", "new", "=", "event", ".", "data", "[", "'new'", "]", "uuid", "=", "event", ".", "user", ".", "uuid", "# TODO: Write email to notify user of password change", "user", "=", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "uuid", "}", ")", "if", "std_hash", "(", "old", ",", "self", ".", "salt", ")", "==", "user", ".", "passhash", ":", "user", ".", "passhash", "=", "std_hash", "(", "new", ",", "self", ".", "salt", ")", "user", ".", "save", "(", ")", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'changepassword'", ",", "'data'", ":", "True", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "packet", ")", ")", "self", ".", "log", "(", "'Successfully changed password for user'", ",", "uuid", ")", "else", ":", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'changepassword'", ",", "'data'", ":", "False", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "packet", ")", ")", "self", ".", "log", "(", "'User tried to change password without supplying old one'", ",", "lvl", "=", "warn", ")" ]
An enrolled user wants to change their password
[ "An", "enrolled", "user", "wants", "to", "change", "their", "password" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L357-L385
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.invite
def invite(self, event): """A new user has been invited to enrol by an admin user""" self.log('Inviting new user to enrol') name = event.data['name'] email = event.data['email'] method = event.data['method'] self._invite(name, method, email, event.client.uuid, event)
python
def invite(self, event): """A new user has been invited to enrol by an admin user""" self.log('Inviting new user to enrol') name = event.data['name'] email = event.data['email'] method = event.data['method'] self._invite(name, method, email, event.client.uuid, event)
[ "def", "invite", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Inviting new user to enrol'", ")", "name", "=", "event", ".", "data", "[", "'name'", "]", "email", "=", "event", ".", "data", "[", "'email'", "]", "method", "=", "event", ".", "data", "[", "'method'", "]", "self", ".", "_invite", "(", "name", ",", "method", ",", "email", ",", "event", ".", "client", ".", "uuid", ",", "event", ")" ]
A new user has been invited to enrol by an admin user
[ "A", "new", "user", "has", "been", "invited", "to", "enrol", "by", "an", "admin", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L388-L396
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.enrol
def enrol(self, event): """A user tries to self-enrol with the enrolment form""" if self.config.allow_registration is False: self.log('Someone tried to register although enrolment is closed.') return self.log('Client trying to register a new account:', event, pretty=True) # self.log(event.data, pretty=True) uuid = event.client.uuid if uuid in self.captchas and event.data.get('captcha', None) == self.captchas[uuid]['text']: self.log('Captcha solved!') else: self.log('Captcha failed!') self._fail(event, _('You did not solve the captcha correctly.', event)) self._generate_captcha(event) return mail = event.data.get('mail', None) if mail is None: self._fail(event, _('You have to supply all required fields.', event)) return elif not validate_email(mail): self._fail(event, _('The supplied email address seems invalid', event)) return if objectmodels['user'].count({'mail': mail}) > 0: self._fail(event, _('Your mail address cannot be used.', event)) return password = event.data.get('password', None) if password is None or len(password) < 5: self._fail(event, _('Your password is not long enough.', event)) return username = event.data.get('username', None) if username is None or len(username) < 1: self._fail(event, _('Your username is not long enough.', event)) return elif (objectmodels['user'].count({'name': username}) > 0) or \ (objectmodels['enrollment'].count({'name': username}) > 0): self._fail(event, _('The username you supplied is not available.', event)) return self.log('Provided data is good to enrol.') if self.config.no_verify: self._create_user(username, password, mail, 'Enrolled', uuid) else: self._invite(username, 'Enrolled', mail, uuid, event, password)
python
def enrol(self, event): """A user tries to self-enrol with the enrolment form""" if self.config.allow_registration is False: self.log('Someone tried to register although enrolment is closed.') return self.log('Client trying to register a new account:', event, pretty=True) # self.log(event.data, pretty=True) uuid = event.client.uuid if uuid in self.captchas and event.data.get('captcha', None) == self.captchas[uuid]['text']: self.log('Captcha solved!') else: self.log('Captcha failed!') self._fail(event, _('You did not solve the captcha correctly.', event)) self._generate_captcha(event) return mail = event.data.get('mail', None) if mail is None: self._fail(event, _('You have to supply all required fields.', event)) return elif not validate_email(mail): self._fail(event, _('The supplied email address seems invalid', event)) return if objectmodels['user'].count({'mail': mail}) > 0: self._fail(event, _('Your mail address cannot be used.', event)) return password = event.data.get('password', None) if password is None or len(password) < 5: self._fail(event, _('Your password is not long enough.', event)) return username = event.data.get('username', None) if username is None or len(username) < 1: self._fail(event, _('Your username is not long enough.', event)) return elif (objectmodels['user'].count({'name': username}) > 0) or \ (objectmodels['enrollment'].count({'name': username}) > 0): self._fail(event, _('The username you supplied is not available.', event)) return self.log('Provided data is good to enrol.') if self.config.no_verify: self._create_user(username, password, mail, 'Enrolled', uuid) else: self._invite(username, 'Enrolled', mail, uuid, event, password)
[ "def", "enrol", "(", "self", ",", "event", ")", ":", "if", "self", ".", "config", ".", "allow_registration", "is", "False", ":", "self", ".", "log", "(", "'Someone tried to register although enrolment is closed.'", ")", "return", "self", ".", "log", "(", "'Client trying to register a new account:'", ",", "event", ",", "pretty", "=", "True", ")", "# self.log(event.data, pretty=True)", "uuid", "=", "event", ".", "client", ".", "uuid", "if", "uuid", "in", "self", ".", "captchas", "and", "event", ".", "data", ".", "get", "(", "'captcha'", ",", "None", ")", "==", "self", ".", "captchas", "[", "uuid", "]", "[", "'text'", "]", ":", "self", ".", "log", "(", "'Captcha solved!'", ")", "else", ":", "self", ".", "log", "(", "'Captcha failed!'", ")", "self", ".", "_fail", "(", "event", ",", "_", "(", "'You did not solve the captcha correctly.'", ",", "event", ")", ")", "self", ".", "_generate_captcha", "(", "event", ")", "return", "mail", "=", "event", ".", "data", ".", "get", "(", "'mail'", ",", "None", ")", "if", "mail", "is", "None", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'You have to supply all required fields.'", ",", "event", ")", ")", "return", "elif", "not", "validate_email", "(", "mail", ")", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'The supplied email address seems invalid'", ",", "event", ")", ")", "return", "if", "objectmodels", "[", "'user'", "]", ".", "count", "(", "{", "'mail'", ":", "mail", "}", ")", ">", "0", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'Your mail address cannot be used.'", ",", "event", ")", ")", "return", "password", "=", "event", ".", "data", ".", "get", "(", "'password'", ",", "None", ")", "if", "password", "is", "None", "or", "len", "(", "password", ")", "<", "5", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'Your password is not long enough.'", ",", "event", ")", ")", "return", "username", "=", "event", ".", "data", ".", "get", "(", "'username'", ",", "None", ")", "if", "username", "is", "None", "or", "len", "(", "username", ")", "<", "1", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'Your username is not long enough.'", ",", "event", ")", ")", "return", "elif", "(", "objectmodels", "[", "'user'", "]", ".", "count", "(", "{", "'name'", ":", "username", "}", ")", ">", "0", ")", "or", "(", "objectmodels", "[", "'enrollment'", "]", ".", "count", "(", "{", "'name'", ":", "username", "}", ")", ">", "0", ")", ":", "self", ".", "_fail", "(", "event", ",", "_", "(", "'The username you supplied is not available.'", ",", "event", ")", ")", "return", "self", ".", "log", "(", "'Provided data is good to enrol.'", ")", "if", "self", ".", "config", ".", "no_verify", ":", "self", ".", "_create_user", "(", "username", ",", "password", ",", "mail", ",", "'Enrolled'", ",", "uuid", ")", "else", ":", "self", ".", "_invite", "(", "username", ",", "'Enrolled'", ",", "mail", ",", "uuid", ",", "event", ",", "password", ")" ]
A user tries to self-enrol with the enrolment form
[ "A", "user", "tries", "to", "self", "-", "enrol", "with", "the", "enrolment", "form" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L399-L450
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.accept
def accept(self, event): """A challenge/response for an enrolment has been accepted""" self.log('Invitation accepted:', event.__dict__, lvl=debug) try: uuid = event.data enrollment = objectmodels['enrollment'].find_one({ 'uuid': uuid }) if enrollment is not None: self.log('Enrollment found', lvl=debug) if enrollment.status == 'Open': self.log('Enrollment is still open', lvl=debug) if enrollment.method == 'Invited' and self.config.auto_accept_invited: enrollment.status = 'Accepted' data = 'You should have received an email with your new password ' \ 'and can now log in to the system and start to use it. <br/>' \ 'Please change your password immediately after logging in' password = std_human_uid().replace(" ", '') self._create_user(enrollment.name, password, enrollment.email, enrollment.method, uuid) self._send_acceptance(enrollment, password, event) elif enrollment.method == 'Enrolled' and self.config.auto_accept_enrolled: enrollment.status = 'Accepted' data = 'Your account is now activated.' self._create_user(enrollment.name, enrollment.password, enrollment.email, enrollment.method, uuid) # TODO: Evaluate if sending an acceptance mail makes sense # self._send_acceptance(enrollment, "", event) else: enrollment.status = 'Pending' data = 'Someone has to confirm your enrollment ' \ 'first. Thank you, for your patience.' # TODO: Alert admin users enrollment.save() # Reaffirm acceptance to end user, when clicking on the link multiple times elif enrollment.status == 'Accepted': data = 'You can now log in to the system and start to use it.' elif enrollment.status == 'Pending': data = 'Someone has to confirm your enrollment ' \ 'first. Thank you, for your patience.' else: self.log('Enrollment has been closed already!', lvl=warn) self._fail(event) return packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'accept', 'data': {True: data} } self.fireEvent(send(event.client.uuid, packet)) else: self.log('No enrollment available.', lvl=warn) self._fail(event) except Exception as e: self.log('Error during invitation accept handling:', e, type(e), lvl=warn, exc=True)
python
def accept(self, event): """A challenge/response for an enrolment has been accepted""" self.log('Invitation accepted:', event.__dict__, lvl=debug) try: uuid = event.data enrollment = objectmodels['enrollment'].find_one({ 'uuid': uuid }) if enrollment is not None: self.log('Enrollment found', lvl=debug) if enrollment.status == 'Open': self.log('Enrollment is still open', lvl=debug) if enrollment.method == 'Invited' and self.config.auto_accept_invited: enrollment.status = 'Accepted' data = 'You should have received an email with your new password ' \ 'and can now log in to the system and start to use it. <br/>' \ 'Please change your password immediately after logging in' password = std_human_uid().replace(" ", '') self._create_user(enrollment.name, password, enrollment.email, enrollment.method, uuid) self._send_acceptance(enrollment, password, event) elif enrollment.method == 'Enrolled' and self.config.auto_accept_enrolled: enrollment.status = 'Accepted' data = 'Your account is now activated.' self._create_user(enrollment.name, enrollment.password, enrollment.email, enrollment.method, uuid) # TODO: Evaluate if sending an acceptance mail makes sense # self._send_acceptance(enrollment, "", event) else: enrollment.status = 'Pending' data = 'Someone has to confirm your enrollment ' \ 'first. Thank you, for your patience.' # TODO: Alert admin users enrollment.save() # Reaffirm acceptance to end user, when clicking on the link multiple times elif enrollment.status == 'Accepted': data = 'You can now log in to the system and start to use it.' elif enrollment.status == 'Pending': data = 'Someone has to confirm your enrollment ' \ 'first. Thank you, for your patience.' else: self.log('Enrollment has been closed already!', lvl=warn) self._fail(event) return packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'accept', 'data': {True: data} } self.fireEvent(send(event.client.uuid, packet)) else: self.log('No enrollment available.', lvl=warn) self._fail(event) except Exception as e: self.log('Error during invitation accept handling:', e, type(e), lvl=warn, exc=True)
[ "def", "accept", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Invitation accepted:'", ",", "event", ".", "__dict__", ",", "lvl", "=", "debug", ")", "try", ":", "uuid", "=", "event", ".", "data", "enrollment", "=", "objectmodels", "[", "'enrollment'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "uuid", "}", ")", "if", "enrollment", "is", "not", "None", ":", "self", ".", "log", "(", "'Enrollment found'", ",", "lvl", "=", "debug", ")", "if", "enrollment", ".", "status", "==", "'Open'", ":", "self", ".", "log", "(", "'Enrollment is still open'", ",", "lvl", "=", "debug", ")", "if", "enrollment", ".", "method", "==", "'Invited'", "and", "self", ".", "config", ".", "auto_accept_invited", ":", "enrollment", ".", "status", "=", "'Accepted'", "data", "=", "'You should have received an email with your new password '", "'and can now log in to the system and start to use it. <br/>'", "'Please change your password immediately after logging in'", "password", "=", "std_human_uid", "(", ")", ".", "replace", "(", "\" \"", ",", "''", ")", "self", ".", "_create_user", "(", "enrollment", ".", "name", ",", "password", ",", "enrollment", ".", "email", ",", "enrollment", ".", "method", ",", "uuid", ")", "self", ".", "_send_acceptance", "(", "enrollment", ",", "password", ",", "event", ")", "elif", "enrollment", ".", "method", "==", "'Enrolled'", "and", "self", ".", "config", ".", "auto_accept_enrolled", ":", "enrollment", ".", "status", "=", "'Accepted'", "data", "=", "'Your account is now activated.'", "self", ".", "_create_user", "(", "enrollment", ".", "name", ",", "enrollment", ".", "password", ",", "enrollment", ".", "email", ",", "enrollment", ".", "method", ",", "uuid", ")", "# TODO: Evaluate if sending an acceptance mail makes sense", "# self._send_acceptance(enrollment, \"\", event)", "else", ":", "enrollment", ".", "status", "=", "'Pending'", "data", "=", "'Someone has to confirm your enrollment '", "'first. Thank you, for your patience.'", "# TODO: Alert admin users", "enrollment", ".", "save", "(", ")", "# Reaffirm acceptance to end user, when clicking on the link multiple times", "elif", "enrollment", ".", "status", "==", "'Accepted'", ":", "data", "=", "'You can now log in to the system and start to use it.'", "elif", "enrollment", ".", "status", "==", "'Pending'", ":", "data", "=", "'Someone has to confirm your enrollment '", "'first. Thank you, for your patience.'", "else", ":", "self", ".", "log", "(", "'Enrollment has been closed already!'", ",", "lvl", "=", "warn", ")", "self", ".", "_fail", "(", "event", ")", "return", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'accept'", ",", "'data'", ":", "{", "True", ":", "data", "}", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "packet", ")", ")", "else", ":", "self", ".", "log", "(", "'No enrollment available.'", ",", "lvl", "=", "warn", ")", "self", ".", "_fail", "(", "event", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "'Error during invitation accept handling:'", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "warn", ",", "exc", "=", "True", ")" ]
A challenge/response for an enrolment has been accepted
[ "A", "challenge", "/", "response", "for", "an", "enrolment", "has", "been", "accepted" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L453-L514
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.status
def status(self, event): """An anonymous client wants to know if we're open for enrollment""" self.log('Registration status requested') response = { 'component': 'hfos.enrol.enrolmanager', 'action': 'status', 'data': self.config.allow_registration } self.fire(send(event.client.uuid, response))
python
def status(self, event): """An anonymous client wants to know if we're open for enrollment""" self.log('Registration status requested') response = { 'component': 'hfos.enrol.enrolmanager', 'action': 'status', 'data': self.config.allow_registration } self.fire(send(event.client.uuid, response))
[ "def", "status", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Registration status requested'", ")", "response", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'status'", ",", "'data'", ":", "self", ".", "config", ".", "allow_registration", "}", "self", ".", "fire", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "response", ")", ")" ]
An anonymous client wants to know if we're open for enrollment
[ "An", "anonymous", "client", "wants", "to", "know", "if", "we", "re", "open", "for", "enrollment" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L517-L528
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.request_reset
def request_reset(self, event): """An anonymous client requests a password reset""" self.log('Password reset request received:', event.__dict__, lvl=hilight) user_object = objectmodels['user'] email = event.data.get('email', None) email_user = None if email is not None and user_object.count({'mail': email}) > 0: email_user = user_object.find_one({'mail': email}) if email_user is None: self._fail(event, msg="Mail address unknown") return
python
def request_reset(self, event): """An anonymous client requests a password reset""" self.log('Password reset request received:', event.__dict__, lvl=hilight) user_object = objectmodels['user'] email = event.data.get('email', None) email_user = None if email is not None and user_object.count({'mail': email}) > 0: email_user = user_object.find_one({'mail': email}) if email_user is None: self._fail(event, msg="Mail address unknown") return
[ "def", "request_reset", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Password reset request received:'", ",", "event", ".", "__dict__", ",", "lvl", "=", "hilight", ")", "user_object", "=", "objectmodels", "[", "'user'", "]", "email", "=", "event", ".", "data", ".", "get", "(", "'email'", ",", "None", ")", "email_user", "=", "None", "if", "email", "is", "not", "None", "and", "user_object", ".", "count", "(", "{", "'mail'", ":", "email", "}", ")", ">", "0", ":", "email_user", "=", "user_object", ".", "find_one", "(", "{", "'mail'", ":", "email", "}", ")", "if", "email_user", "is", "None", ":", "self", ".", "_fail", "(", "event", ",", "msg", "=", "\"Mail address unknown\"", ")", "return" ]
An anonymous client requests a password reset
[ "An", "anonymous", "client", "requests", "a", "password", "reset" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L537-L552
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager.captcha_transmit
def captcha_transmit(self, captcha, uuid): """Delayed transmission of a requested captcha""" self.log('Transmitting captcha') response = { 'component': 'hfos.enrol.enrolmanager', 'action': 'captcha', 'data': b64encode(captcha['image'].getvalue()).decode('utf-8') } self.fire(send(uuid, response))
python
def captcha_transmit(self, captcha, uuid): """Delayed transmission of a requested captcha""" self.log('Transmitting captcha') response = { 'component': 'hfos.enrol.enrolmanager', 'action': 'captcha', 'data': b64encode(captcha['image'].getvalue()).decode('utf-8') } self.fire(send(uuid, response))
[ "def", "captcha_transmit", "(", "self", ",", "captcha", ",", "uuid", ")", ":", "self", ".", "log", "(", "'Transmitting captcha'", ")", "response", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'captcha'", ",", "'data'", ":", "b64encode", "(", "captcha", "[", "'image'", "]", ".", "getvalue", "(", ")", ")", ".", "decode", "(", "'utf-8'", ")", "}", "self", ".", "fire", "(", "send", "(", "uuid", ",", "response", ")", ")" ]
Delayed transmission of a requested captcha
[ "Delayed", "transmission", "of", "a", "requested", "captcha" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L639-L649
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager._invite
def _invite(self, name, method, email, uuid, event, password=""): """Actually invite a given user""" props = { 'uuid': std_uuid(), 'status': 'Open', 'name': name, 'method': method, 'email': email, 'password': password, 'timestamp': std_now() } enrollment = objectmodels['enrollment'](props) enrollment.save() self.log('Enrollment stored', lvl=debug) self._send_invitation(enrollment, event) packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'invite', 'data': [True, email] } self.fireEvent(send(uuid, packet))
python
def _invite(self, name, method, email, uuid, event, password=""): """Actually invite a given user""" props = { 'uuid': std_uuid(), 'status': 'Open', 'name': name, 'method': method, 'email': email, 'password': password, 'timestamp': std_now() } enrollment = objectmodels['enrollment'](props) enrollment.save() self.log('Enrollment stored', lvl=debug) self._send_invitation(enrollment, event) packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'invite', 'data': [True, email] } self.fireEvent(send(uuid, packet))
[ "def", "_invite", "(", "self", ",", "name", ",", "method", ",", "email", ",", "uuid", ",", "event", ",", "password", "=", "\"\"", ")", ":", "props", "=", "{", "'uuid'", ":", "std_uuid", "(", ")", ",", "'status'", ":", "'Open'", ",", "'name'", ":", "name", ",", "'method'", ":", "method", ",", "'email'", ":", "email", ",", "'password'", ":", "password", ",", "'timestamp'", ":", "std_now", "(", ")", "}", "enrollment", "=", "objectmodels", "[", "'enrollment'", "]", "(", "props", ")", "enrollment", ".", "save", "(", ")", "self", ".", "log", "(", "'Enrollment stored'", ",", "lvl", "=", "debug", ")", "self", ".", "_send_invitation", "(", "enrollment", ",", "event", ")", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'invite'", ",", "'data'", ":", "[", "True", ",", "email", "]", "}", "self", ".", "fireEvent", "(", "send", "(", "uuid", ",", "packet", ")", ")" ]
Actually invite a given user
[ "Actually", "invite", "a", "given", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L651-L675
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager._create_user
def _create_user(self, username, password, mail, method, uuid): """Create a new user and all initial data""" try: if method == 'Invited': config_role = self.config.group_accept_invited else: config_role = self.config.group_accept_enrolled roles = [] if ',' in config_role: for item in config_role.split(','): roles.append(item.lstrip().rstrip()) else: roles = [config_role] newuser = objectmodels['user']({ 'name': username, 'passhash': std_hash(password, self.salt), 'mail': mail, 'uuid': std_uuid(), 'roles': roles, 'created': std_now() }) if method == 'Invited': newuser.needs_password_change = True newuser.save() except Exception as e: self.log("Problem creating new user: ", type(e), e, lvl=error) return try: newprofile = objectmodels['profile']({ 'uuid': std_uuid(), 'owner': newuser.uuid }) self.log("New profile uuid: ", newprofile.uuid, lvl=verbose) newprofile.save() packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'enrol', 'data': [True, mail] } self.fireEvent(send(uuid, packet)) # TODO: Notify crew-admins except Exception as e: self.log("Problem creating new profile: ", type(e), e, lvl=error)
python
def _create_user(self, username, password, mail, method, uuid): """Create a new user and all initial data""" try: if method == 'Invited': config_role = self.config.group_accept_invited else: config_role = self.config.group_accept_enrolled roles = [] if ',' in config_role: for item in config_role.split(','): roles.append(item.lstrip().rstrip()) else: roles = [config_role] newuser = objectmodels['user']({ 'name': username, 'passhash': std_hash(password, self.salt), 'mail': mail, 'uuid': std_uuid(), 'roles': roles, 'created': std_now() }) if method == 'Invited': newuser.needs_password_change = True newuser.save() except Exception as e: self.log("Problem creating new user: ", type(e), e, lvl=error) return try: newprofile = objectmodels['profile']({ 'uuid': std_uuid(), 'owner': newuser.uuid }) self.log("New profile uuid: ", newprofile.uuid, lvl=verbose) newprofile.save() packet = { 'component': 'hfos.enrol.enrolmanager', 'action': 'enrol', 'data': [True, mail] } self.fireEvent(send(uuid, packet)) # TODO: Notify crew-admins except Exception as e: self.log("Problem creating new profile: ", type(e), e, lvl=error)
[ "def", "_create_user", "(", "self", ",", "username", ",", "password", ",", "mail", ",", "method", ",", "uuid", ")", ":", "try", ":", "if", "method", "==", "'Invited'", ":", "config_role", "=", "self", ".", "config", ".", "group_accept_invited", "else", ":", "config_role", "=", "self", ".", "config", ".", "group_accept_enrolled", "roles", "=", "[", "]", "if", "','", "in", "config_role", ":", "for", "item", "in", "config_role", ".", "split", "(", "','", ")", ":", "roles", ".", "append", "(", "item", ".", "lstrip", "(", ")", ".", "rstrip", "(", ")", ")", "else", ":", "roles", "=", "[", "config_role", "]", "newuser", "=", "objectmodels", "[", "'user'", "]", "(", "{", "'name'", ":", "username", ",", "'passhash'", ":", "std_hash", "(", "password", ",", "self", ".", "salt", ")", ",", "'mail'", ":", "mail", ",", "'uuid'", ":", "std_uuid", "(", ")", ",", "'roles'", ":", "roles", ",", "'created'", ":", "std_now", "(", ")", "}", ")", "if", "method", "==", "'Invited'", ":", "newuser", ".", "needs_password_change", "=", "True", "newuser", ".", "save", "(", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Problem creating new user: \"", ",", "type", "(", "e", ")", ",", "e", ",", "lvl", "=", "error", ")", "return", "try", ":", "newprofile", "=", "objectmodels", "[", "'profile'", "]", "(", "{", "'uuid'", ":", "std_uuid", "(", ")", ",", "'owner'", ":", "newuser", ".", "uuid", "}", ")", "self", ".", "log", "(", "\"New profile uuid: \"", ",", "newprofile", ".", "uuid", ",", "lvl", "=", "verbose", ")", "newprofile", ".", "save", "(", ")", "packet", "=", "{", "'component'", ":", "'hfos.enrol.enrolmanager'", ",", "'action'", ":", "'enrol'", ",", "'data'", ":", "[", "True", ",", "mail", "]", "}", "self", ".", "fireEvent", "(", "send", "(", "uuid", ",", "packet", ")", ")", "# TODO: Notify crew-admins", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Problem creating new profile: \"", ",", "type", "(", "e", ")", ",", "e", ",", "lvl", "=", "error", ")" ]
Create a new user and all initial data
[ "Create", "a", "new", "user", "and", "all", "initial", "data" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L677-L731
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager._send_invitation
def _send_invitation(self, enrollment, event): """Send an invitation mail to an open enrolment""" self.log('Sending enrollment status mail to user') self._send_mail(self.config.invitation_subject, self.config.invitation_mail, enrollment, event)
python
def _send_invitation(self, enrollment, event): """Send an invitation mail to an open enrolment""" self.log('Sending enrollment status mail to user') self._send_mail(self.config.invitation_subject, self.config.invitation_mail, enrollment, event)
[ "def", "_send_invitation", "(", "self", ",", "enrollment", ",", "event", ")", ":", "self", ".", "log", "(", "'Sending enrollment status mail to user'", ")", "self", ".", "_send_mail", "(", "self", ".", "config", ".", "invitation_subject", ",", "self", ".", "config", ".", "invitation_mail", ",", "enrollment", ",", "event", ")" ]
Send an invitation mail to an open enrolment
[ "Send", "an", "invitation", "mail", "to", "an", "open", "enrolment" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L733-L738
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager._send_acceptance
def _send_acceptance(self, enrollment, password, event): """Send an acceptance mail to an open enrolment""" self.log('Sending acceptance status mail to user') if password is not "": password_hint = '\n\nPS: Your new password is ' + password + ' - please change it after your first login!' acceptance_text = self.config.acceptance_mail + password_hint else: acceptance_text = self.config.acceptance_mail self._send_mail(self.config.acceptance_subject, acceptance_text, enrollment, event)
python
def _send_acceptance(self, enrollment, password, event): """Send an acceptance mail to an open enrolment""" self.log('Sending acceptance status mail to user') if password is not "": password_hint = '\n\nPS: Your new password is ' + password + ' - please change it after your first login!' acceptance_text = self.config.acceptance_mail + password_hint else: acceptance_text = self.config.acceptance_mail self._send_mail(self.config.acceptance_subject, acceptance_text, enrollment, event)
[ "def", "_send_acceptance", "(", "self", ",", "enrollment", ",", "password", ",", "event", ")", ":", "self", ".", "log", "(", "'Sending acceptance status mail to user'", ")", "if", "password", "is", "not", "\"\"", ":", "password_hint", "=", "'\\n\\nPS: Your new password is '", "+", "password", "+", "' - please change it after your first login!'", "acceptance_text", "=", "self", ".", "config", ".", "acceptance_mail", "+", "password_hint", "else", ":", "acceptance_text", "=", "self", ".", "config", ".", "acceptance_mail", "self", ".", "_send_mail", "(", "self", ".", "config", ".", "acceptance_subject", ",", "acceptance_text", ",", "enrollment", ",", "event", ")" ]
Send an acceptance mail to an open enrolment
[ "Send", "an", "acceptance", "mail", "to", "an", "open", "enrolment" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L740-L752
Hackerfleet/hfos
modules/enrol/hfos/enrol/enrolmanager.py
EnrolManager._send_mail
def _send_mail(self, subject, template, enrollment, event): """Connect to mail server and send actual email""" context = { 'name': enrollment.name, 'invitation_url': self.invitation_url, 'node_name': self.node_name, 'node_url': self.node_url, 'uuid': enrollment.uuid } mail = render(template, context) self.log('Mail:', mail, lvl=verbose) mime_mail = MIMEText(mail) mime_mail['Subject'] = render(subject, context) mime_mail['From'] = render(self.config.mail_from, {'hostname': self.hostname}) mime_mail['To'] = enrollment.email self.log('MimeMail:', mime_mail, lvl=verbose) if self.config.mail_send is True: self.log('Sending mail to', enrollment.email) self.fireEvent(task(send_mail_worker, self.config, mime_mail, event), "enrolworkers") else: self.log('Not sending mail, here it is for debugging info:', mail, pretty=True)
python
def _send_mail(self, subject, template, enrollment, event): """Connect to mail server and send actual email""" context = { 'name': enrollment.name, 'invitation_url': self.invitation_url, 'node_name': self.node_name, 'node_url': self.node_url, 'uuid': enrollment.uuid } mail = render(template, context) self.log('Mail:', mail, lvl=verbose) mime_mail = MIMEText(mail) mime_mail['Subject'] = render(subject, context) mime_mail['From'] = render(self.config.mail_from, {'hostname': self.hostname}) mime_mail['To'] = enrollment.email self.log('MimeMail:', mime_mail, lvl=verbose) if self.config.mail_send is True: self.log('Sending mail to', enrollment.email) self.fireEvent(task(send_mail_worker, self.config, mime_mail, event), "enrolworkers") else: self.log('Not sending mail, here it is for debugging info:', mail, pretty=True)
[ "def", "_send_mail", "(", "self", ",", "subject", ",", "template", ",", "enrollment", ",", "event", ")", ":", "context", "=", "{", "'name'", ":", "enrollment", ".", "name", ",", "'invitation_url'", ":", "self", ".", "invitation_url", ",", "'node_name'", ":", "self", ".", "node_name", ",", "'node_url'", ":", "self", ".", "node_url", ",", "'uuid'", ":", "enrollment", ".", "uuid", "}", "mail", "=", "render", "(", "template", ",", "context", ")", "self", ".", "log", "(", "'Mail:'", ",", "mail", ",", "lvl", "=", "verbose", ")", "mime_mail", "=", "MIMEText", "(", "mail", ")", "mime_mail", "[", "'Subject'", "]", "=", "render", "(", "subject", ",", "context", ")", "mime_mail", "[", "'From'", "]", "=", "render", "(", "self", ".", "config", ".", "mail_from", ",", "{", "'hostname'", ":", "self", ".", "hostname", "}", ")", "mime_mail", "[", "'To'", "]", "=", "enrollment", ".", "email", "self", ".", "log", "(", "'MimeMail:'", ",", "mime_mail", ",", "lvl", "=", "verbose", ")", "if", "self", ".", "config", ".", "mail_send", "is", "True", ":", "self", ".", "log", "(", "'Sending mail to'", ",", "enrollment", ".", "email", ")", "self", ".", "fireEvent", "(", "task", "(", "send_mail_worker", ",", "self", ".", "config", ",", "mime_mail", ",", "event", ")", ",", "\"enrolworkers\"", ")", "else", ":", "self", ".", "log", "(", "'Not sending mail, here it is for debugging info:'", ",", "mail", ",", "pretty", "=", "True", ")" ]
Connect to mail server and send actual email
[ "Connect", "to", "mail", "server", "and", "send", "actual", "email" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/enrol/hfos/enrol/enrolmanager.py#L754-L778
Hackerfleet/hfos
modules/chat/hfos/chat/bot.py
Bot.say
def say(self, event): """Chat event handler for incoming events :param event: say-event with incoming chat message """ try: userid = event.user.uuid recipient = self._get_recipient(event) content = self._get_content(event) if self.config.name in content: self.log('I think, someone mentioned me:', content) except Exception as e: self.log("Error: '%s' %s" % (e, type(e)), exc=True, lvl=error)
python
def say(self, event): """Chat event handler for incoming events :param event: say-event with incoming chat message """ try: userid = event.user.uuid recipient = self._get_recipient(event) content = self._get_content(event) if self.config.name in content: self.log('I think, someone mentioned me:', content) except Exception as e: self.log("Error: '%s' %s" % (e, type(e)), exc=True, lvl=error)
[ "def", "say", "(", "self", ",", "event", ")", ":", "try", ":", "userid", "=", "event", ".", "user", ".", "uuid", "recipient", "=", "self", ".", "_get_recipient", "(", "event", ")", "content", "=", "self", ".", "_get_content", "(", "event", ")", "if", "self", ".", "config", ".", "name", "in", "content", ":", "self", ".", "log", "(", "'I think, someone mentioned me:'", ",", "content", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Error: '%s' %s\"", "%", "(", "e", ",", "type", "(", "e", ")", ")", ",", "exc", "=", "True", ",", "lvl", "=", "error", ")" ]
Chat event handler for incoming events :param event: say-event with incoming chat message
[ "Chat", "event", "handler", "for", "incoming", "events", ":", "param", "event", ":", "say", "-", "event", "with", "incoming", "chat", "message" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/chat/hfos/chat/bot.py#L67-L81
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator.add_auth_hook
def add_auth_hook(self, event): """Register event hook on reception of add_auth_hook-event""" self.log('Adding authentication hook for', event.authenticator_name) self.auth_hooks[event.authenticator_name] = event.event
python
def add_auth_hook(self, event): """Register event hook on reception of add_auth_hook-event""" self.log('Adding authentication hook for', event.authenticator_name) self.auth_hooks[event.authenticator_name] = event.event
[ "def", "add_auth_hook", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Adding authentication hook for'", ",", "event", ".", "authenticator_name", ")", "self", ".", "auth_hooks", "[", "event", ".", "authenticator_name", "]", "=", "event", ".", "event" ]
Register event hook on reception of add_auth_hook-event
[ "Register", "event", "hook", "on", "reception", "of", "add_auth_hook", "-", "event" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L90-L94
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator._fail
def _fail(self, event, message='Invalid credentials'): """Sends a failure message to the requesting client""" notification = { 'component': 'auth', 'action': 'fail', 'data': message } ip = event.sock.getpeername()[0] self.failing_clients[ip] = event Timer(3, Event.create('notify_fail', event.clientuuid, notification, ip)).register(self)
python
def _fail(self, event, message='Invalid credentials'): """Sends a failure message to the requesting client""" notification = { 'component': 'auth', 'action': 'fail', 'data': message } ip = event.sock.getpeername()[0] self.failing_clients[ip] = event Timer(3, Event.create('notify_fail', event.clientuuid, notification, ip)).register(self)
[ "def", "_fail", "(", "self", ",", "event", ",", "message", "=", "'Invalid credentials'", ")", ":", "notification", "=", "{", "'component'", ":", "'auth'", ",", "'action'", ":", "'fail'", ",", "'data'", ":", "message", "}", "ip", "=", "event", ".", "sock", ".", "getpeername", "(", ")", "[", "0", "]", "self", ".", "failing_clients", "[", "ip", "]", "=", "event", "Timer", "(", "3", ",", "Event", ".", "create", "(", "'notify_fail'", ",", "event", ".", "clientuuid", ",", "notification", ",", "ip", ")", ")", ".", "register", "(", "self", ")" ]
Sends a failure message to the requesting client
[ "Sends", "a", "failure", "message", "to", "the", "requesting", "client" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L96-L108
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator._login
def _login(self, event, user_account, user_profile, client_config): """Send login notification to client""" user_account.lastlogin = std_now() user_account.save() user_account.passhash = "" self.fireEvent( authentication(user_account.name, ( user_account, user_profile, client_config), event.clientuuid, user_account.uuid, event.sock), "auth")
python
def _login(self, event, user_account, user_profile, client_config): """Send login notification to client""" user_account.lastlogin = std_now() user_account.save() user_account.passhash = "" self.fireEvent( authentication(user_account.name, ( user_account, user_profile, client_config), event.clientuuid, user_account.uuid, event.sock), "auth")
[ "def", "_login", "(", "self", ",", "event", ",", "user_account", ",", "user_profile", ",", "client_config", ")", ":", "user_account", ".", "lastlogin", "=", "std_now", "(", ")", "user_account", ".", "save", "(", ")", "user_account", ".", "passhash", "=", "\"\"", "self", ".", "fireEvent", "(", "authentication", "(", "user_account", ".", "name", ",", "(", "user_account", ",", "user_profile", ",", "client_config", ")", ",", "event", ".", "clientuuid", ",", "user_account", ".", "uuid", ",", "event", ".", "sock", ")", ",", "\"auth\"", ")" ]
Send login notification to client
[ "Send", "login", "notification", "to", "client" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L115-L128
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator.authenticationrequest
def authenticationrequest(self, event): """Handles authentication requests from clients :param event: AuthenticationRequest with user's credentials """ if event.sock.getpeername()[0] in self.failing_clients: self.log('Client failed a login and has to wait', lvl=debug) return if event.auto: self._handle_autologin(event) else: self._handle_login(event)
python
def authenticationrequest(self, event): """Handles authentication requests from clients :param event: AuthenticationRequest with user's credentials """ if event.sock.getpeername()[0] in self.failing_clients: self.log('Client failed a login and has to wait', lvl=debug) return if event.auto: self._handle_autologin(event) else: self._handle_login(event)
[ "def", "authenticationrequest", "(", "self", ",", "event", ")", ":", "if", "event", ".", "sock", ".", "getpeername", "(", ")", "[", "0", "]", "in", "self", ".", "failing_clients", ":", "self", ".", "log", "(", "'Client failed a login and has to wait'", ",", "lvl", "=", "debug", ")", "return", "if", "event", ".", "auto", ":", "self", ".", "_handle_autologin", "(", "event", ")", "else", ":", "self", ".", "_handle_login", "(", "event", ")" ]
Handles authentication requests from clients :param event: AuthenticationRequest with user's credentials
[ "Handles", "authentication", "requests", "from", "clients", ":", "param", "event", ":", "AuthenticationRequest", "with", "user", "s", "credentials" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L131-L143
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator._handle_autologin
def _handle_autologin(self, event): """Automatic logins for client configurations that allow it""" self.log("Verifying automatic login request") # TODO: Check for a common secret # noinspection PyBroadException try: client_config = objectmodels['client'].find_one({ 'uuid': event.requestedclientuuid }) except Exception: client_config = None if client_config is None or client_config.autologin is False: self.log("Autologin failed:", event.requestedclientuuid, lvl=error) self._fail(event) return try: user_account = objectmodels['user'].find_one({ 'uuid': client_config.owner }) if user_account is None: raise AuthenticationError self.log("Autologin for", user_account.name, lvl=debug) except Exception as e: self.log("No user object due to error: ", e, type(e), lvl=error) self._fail(event) return if user_account.active is False: self.log("Account deactivated.") self._fail(event, 'Account deactivated.') return user_profile = self._get_profile(user_account) self._login(event, user_account, user_profile, client_config) self.log("Autologin successful!", lvl=warn)
python
def _handle_autologin(self, event): """Automatic logins for client configurations that allow it""" self.log("Verifying automatic login request") # TODO: Check for a common secret # noinspection PyBroadException try: client_config = objectmodels['client'].find_one({ 'uuid': event.requestedclientuuid }) except Exception: client_config = None if client_config is None or client_config.autologin is False: self.log("Autologin failed:", event.requestedclientuuid, lvl=error) self._fail(event) return try: user_account = objectmodels['user'].find_one({ 'uuid': client_config.owner }) if user_account is None: raise AuthenticationError self.log("Autologin for", user_account.name, lvl=debug) except Exception as e: self.log("No user object due to error: ", e, type(e), lvl=error) self._fail(event) return if user_account.active is False: self.log("Account deactivated.") self._fail(event, 'Account deactivated.') return user_profile = self._get_profile(user_account) self._login(event, user_account, user_profile, client_config) self.log("Autologin successful!", lvl=warn)
[ "def", "_handle_autologin", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "\"Verifying automatic login request\"", ")", "# TODO: Check for a common secret", "# noinspection PyBroadException", "try", ":", "client_config", "=", "objectmodels", "[", "'client'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "event", ".", "requestedclientuuid", "}", ")", "except", "Exception", ":", "client_config", "=", "None", "if", "client_config", "is", "None", "or", "client_config", ".", "autologin", "is", "False", ":", "self", ".", "log", "(", "\"Autologin failed:\"", ",", "event", ".", "requestedclientuuid", ",", "lvl", "=", "error", ")", "self", ".", "_fail", "(", "event", ")", "return", "try", ":", "user_account", "=", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "client_config", ".", "owner", "}", ")", "if", "user_account", "is", "None", ":", "raise", "AuthenticationError", "self", ".", "log", "(", "\"Autologin for\"", ",", "user_account", ".", "name", ",", "lvl", "=", "debug", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"No user object due to error: \"", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ")", "self", ".", "_fail", "(", "event", ")", "return", "if", "user_account", ".", "active", "is", "False", ":", "self", ".", "log", "(", "\"Account deactivated.\"", ")", "self", ".", "_fail", "(", "event", ",", "'Account deactivated.'", ")", "return", "user_profile", "=", "self", ".", "_get_profile", "(", "user_account", ")", "self", ".", "_login", "(", "event", ",", "user_account", ",", "user_profile", ",", "client_config", ")", "self", ".", "log", "(", "\"Autologin successful!\"", ",", "lvl", "=", "warn", ")" ]
Automatic logins for client configurations that allow it
[ "Automatic", "logins", "for", "client", "configurations", "that", "allow", "it" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L145-L188
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator._handle_login
def _handle_login(self, event): """Manual password based login""" # TODO: Refactor to simplify self.log("Auth request for ", event.username, 'client:', event.clientuuid) # TODO: Define the requirements for secure passwords etc. # They're also required in the Enrol module..! if (len(event.username) < 1) or (len(event.password) < 5): self.log("Illegal username or password received, login cancelled", lvl=warn) self._fail(event, 'Password or username too short') return client_config = None try: user_account = objectmodels['user'].find_one({ 'name': event.username }) # self.log("Account: %s" % user_account._fields, lvl=debug) if user_account is None: raise AuthenticationError except Exception as e: self.log("No userobject due to error: ", e, type(e), lvl=error) self._fail(event) return self.log("User found.", lvl=debug) if user_account.active is False: self.log("Account deactivated.") self._fail(event, 'Account deactivated.') return if not std_hash(event.password, self.salt) == user_account.passhash: self.log("Password was wrong!", lvl=warn) self._fail(event) return self.log("Passhash matches, checking client and profile.", lvl=debug) requested_client_uuid = event.requestedclientuuid if requested_client_uuid is not None: client_config = objectmodels['client'].find_one({ 'uuid': requested_client_uuid }) if client_config: self.log("Checking client configuration permissions", lvl=debug) # TODO: Shareable client configurations? if client_config.owner != user_account.uuid: client_config = None self.log("Unauthorized client configuration " "requested", lvl=warn) else: self.log("Unknown client configuration requested: ", requested_client_uuid, event.__dict__, lvl=warn) if not client_config: self.log("Creating new default client configuration") # Either no configuration was found or not requested # -> Create a new client configuration uuid = event.clientuuid if event.clientuuid is not None else str(uuid4()) client_config = objectmodels['client']({'uuid': uuid}) client_config.name = std_human_uid(kind='place') client_config.description = "New client configuration from " + user_account.name client_config.owner = user_account.uuid # TODO: Get client configuration storage done right, this one is too simple client_config.save() user_profile = self._get_profile(user_account) self._login(event, user_account, user_profile, client_config) self.log("Done with Login request", lvl=debug)
python
def _handle_login(self, event): """Manual password based login""" # TODO: Refactor to simplify self.log("Auth request for ", event.username, 'client:', event.clientuuid) # TODO: Define the requirements for secure passwords etc. # They're also required in the Enrol module..! if (len(event.username) < 1) or (len(event.password) < 5): self.log("Illegal username or password received, login cancelled", lvl=warn) self._fail(event, 'Password or username too short') return client_config = None try: user_account = objectmodels['user'].find_one({ 'name': event.username }) # self.log("Account: %s" % user_account._fields, lvl=debug) if user_account is None: raise AuthenticationError except Exception as e: self.log("No userobject due to error: ", e, type(e), lvl=error) self._fail(event) return self.log("User found.", lvl=debug) if user_account.active is False: self.log("Account deactivated.") self._fail(event, 'Account deactivated.') return if not std_hash(event.password, self.salt) == user_account.passhash: self.log("Password was wrong!", lvl=warn) self._fail(event) return self.log("Passhash matches, checking client and profile.", lvl=debug) requested_client_uuid = event.requestedclientuuid if requested_client_uuid is not None: client_config = objectmodels['client'].find_one({ 'uuid': requested_client_uuid }) if client_config: self.log("Checking client configuration permissions", lvl=debug) # TODO: Shareable client configurations? if client_config.owner != user_account.uuid: client_config = None self.log("Unauthorized client configuration " "requested", lvl=warn) else: self.log("Unknown client configuration requested: ", requested_client_uuid, event.__dict__, lvl=warn) if not client_config: self.log("Creating new default client configuration") # Either no configuration was found or not requested # -> Create a new client configuration uuid = event.clientuuid if event.clientuuid is not None else str(uuid4()) client_config = objectmodels['client']({'uuid': uuid}) client_config.name = std_human_uid(kind='place') client_config.description = "New client configuration from " + user_account.name client_config.owner = user_account.uuid # TODO: Get client configuration storage done right, this one is too simple client_config.save() user_profile = self._get_profile(user_account) self._login(event, user_account, user_profile, client_config) self.log("Done with Login request", lvl=debug)
[ "def", "_handle_login", "(", "self", ",", "event", ")", ":", "# TODO: Refactor to simplify", "self", ".", "log", "(", "\"Auth request for \"", ",", "event", ".", "username", ",", "'client:'", ",", "event", ".", "clientuuid", ")", "# TODO: Define the requirements for secure passwords etc.", "# They're also required in the Enrol module..!", "if", "(", "len", "(", "event", ".", "username", ")", "<", "1", ")", "or", "(", "len", "(", "event", ".", "password", ")", "<", "5", ")", ":", "self", ".", "log", "(", "\"Illegal username or password received, login cancelled\"", ",", "lvl", "=", "warn", ")", "self", ".", "_fail", "(", "event", ",", "'Password or username too short'", ")", "return", "client_config", "=", "None", "try", ":", "user_account", "=", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "event", ".", "username", "}", ")", "# self.log(\"Account: %s\" % user_account._fields, lvl=debug)", "if", "user_account", "is", "None", ":", "raise", "AuthenticationError", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"No userobject due to error: \"", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ")", "self", ".", "_fail", "(", "event", ")", "return", "self", ".", "log", "(", "\"User found.\"", ",", "lvl", "=", "debug", ")", "if", "user_account", ".", "active", "is", "False", ":", "self", ".", "log", "(", "\"Account deactivated.\"", ")", "self", ".", "_fail", "(", "event", ",", "'Account deactivated.'", ")", "return", "if", "not", "std_hash", "(", "event", ".", "password", ",", "self", ".", "salt", ")", "==", "user_account", ".", "passhash", ":", "self", ".", "log", "(", "\"Password was wrong!\"", ",", "lvl", "=", "warn", ")", "self", ".", "_fail", "(", "event", ")", "return", "self", ".", "log", "(", "\"Passhash matches, checking client and profile.\"", ",", "lvl", "=", "debug", ")", "requested_client_uuid", "=", "event", ".", "requestedclientuuid", "if", "requested_client_uuid", "is", "not", "None", ":", "client_config", "=", "objectmodels", "[", "'client'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "requested_client_uuid", "}", ")", "if", "client_config", ":", "self", ".", "log", "(", "\"Checking client configuration permissions\"", ",", "lvl", "=", "debug", ")", "# TODO: Shareable client configurations?", "if", "client_config", ".", "owner", "!=", "user_account", ".", "uuid", ":", "client_config", "=", "None", "self", ".", "log", "(", "\"Unauthorized client configuration \"", "\"requested\"", ",", "lvl", "=", "warn", ")", "else", ":", "self", ".", "log", "(", "\"Unknown client configuration requested: \"", ",", "requested_client_uuid", ",", "event", ".", "__dict__", ",", "lvl", "=", "warn", ")", "if", "not", "client_config", ":", "self", ".", "log", "(", "\"Creating new default client configuration\"", ")", "# Either no configuration was found or not requested", "# -> Create a new client configuration", "uuid", "=", "event", ".", "clientuuid", "if", "event", ".", "clientuuid", "is", "not", "None", "else", "str", "(", "uuid4", "(", ")", ")", "client_config", "=", "objectmodels", "[", "'client'", "]", "(", "{", "'uuid'", ":", "uuid", "}", ")", "client_config", ".", "name", "=", "std_human_uid", "(", "kind", "=", "'place'", ")", "client_config", ".", "description", "=", "\"New client configuration from \"", "+", "user_account", ".", "name", "client_config", ".", "owner", "=", "user_account", ".", "uuid", "# TODO: Get client configuration storage done right, this one is too simple", "client_config", ".", "save", "(", ")", "user_profile", "=", "self", ".", "_get_profile", "(", "user_account", ")", "self", ".", "_login", "(", "event", ",", "user_account", ",", "user_profile", ",", "client_config", ")", "self", ".", "log", "(", "\"Done with Login request\"", ",", "lvl", "=", "debug", ")" ]
Manual password based login
[ "Manual", "password", "based", "login" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L190-L275
Hackerfleet/hfos
hfos/ui/auth.py
Authenticator._get_profile
def _get_profile(self, user_account): """Retrieves a user's profile""" try: # TODO: Load active profile, not just any user_profile = objectmodels['profile'].find_one( {'owner': str(user_account.uuid)}) self.log("Profile: ", user_profile, user_account.uuid, lvl=debug) except Exception as e: self.log("No profile due to error: ", e, type(e), lvl=error) user_profile = None if not user_profile: default = { 'uuid': std_uuid(), 'owner': user_account.uuid, 'userdata': { 'notes': 'Default profile of ' + user_account.name } } user_profile = objectmodels['profile'](default) user_profile.save() return user_profile
python
def _get_profile(self, user_account): """Retrieves a user's profile""" try: # TODO: Load active profile, not just any user_profile = objectmodels['profile'].find_one( {'owner': str(user_account.uuid)}) self.log("Profile: ", user_profile, user_account.uuid, lvl=debug) except Exception as e: self.log("No profile due to error: ", e, type(e), lvl=error) user_profile = None if not user_profile: default = { 'uuid': std_uuid(), 'owner': user_account.uuid, 'userdata': { 'notes': 'Default profile of ' + user_account.name } } user_profile = objectmodels['profile'](default) user_profile.save() return user_profile
[ "def", "_get_profile", "(", "self", ",", "user_account", ")", ":", "try", ":", "# TODO: Load active profile, not just any", "user_profile", "=", "objectmodels", "[", "'profile'", "]", ".", "find_one", "(", "{", "'owner'", ":", "str", "(", "user_account", ".", "uuid", ")", "}", ")", "self", ".", "log", "(", "\"Profile: \"", ",", "user_profile", ",", "user_account", ".", "uuid", ",", "lvl", "=", "debug", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"No profile due to error: \"", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ")", "user_profile", "=", "None", "if", "not", "user_profile", ":", "default", "=", "{", "'uuid'", ":", "std_uuid", "(", ")", ",", "'owner'", ":", "user_account", ".", "uuid", ",", "'userdata'", ":", "{", "'notes'", ":", "'Default profile of '", "+", "user_account", ".", "name", "}", "}", "user_profile", "=", "objectmodels", "[", "'profile'", "]", "(", "default", ")", "user_profile", ".", "save", "(", ")", "return", "user_profile" ]
Retrieves a user's profile
[ "Retrieves", "a", "user", "s", "profile" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/auth.py#L277-L302
Hackerfleet/hfos
modules/navdata/hfos/navdata/bus.py
SerialBusManager._parse
def _parse(self, bus, data): """ Called when a sensor sends a new raw data to this serial connector. The data is sanitized and sent to the registered protocol listeners as time/raw/bus sentence tuple. """ sen_time = time.time() try: # Split up multiple sentences if isinstance(data, bytes): data = data.decode('ascii') dirtysentences = data.split("\n") sentences = [(sen_time, x) for x in dirtysentences if x] def unique(it): s = set() for el in it: if el not in s: s.add(el) yield el else: # TODO: Make sure, this is not identical but new data self.log("Duplicate sentence received: ", el, lvl=debug) sentences = list(unique(sentences)) return sentences except Exception as e: self.log("Error during data unpacking: ", e, type(e), lvl=error, exc=True)
python
def _parse(self, bus, data): """ Called when a sensor sends a new raw data to this serial connector. The data is sanitized and sent to the registered protocol listeners as time/raw/bus sentence tuple. """ sen_time = time.time() try: # Split up multiple sentences if isinstance(data, bytes): data = data.decode('ascii') dirtysentences = data.split("\n") sentences = [(sen_time, x) for x in dirtysentences if x] def unique(it): s = set() for el in it: if el not in s: s.add(el) yield el else: # TODO: Make sure, this is not identical but new data self.log("Duplicate sentence received: ", el, lvl=debug) sentences = list(unique(sentences)) return sentences except Exception as e: self.log("Error during data unpacking: ", e, type(e), lvl=error, exc=True)
[ "def", "_parse", "(", "self", ",", "bus", ",", "data", ")", ":", "sen_time", "=", "time", ".", "time", "(", ")", "try", ":", "# Split up multiple sentences", "if", "isinstance", "(", "data", ",", "bytes", ")", ":", "data", "=", "data", ".", "decode", "(", "'ascii'", ")", "dirtysentences", "=", "data", ".", "split", "(", "\"\\n\"", ")", "sentences", "=", "[", "(", "sen_time", ",", "x", ")", "for", "x", "in", "dirtysentences", "if", "x", "]", "def", "unique", "(", "it", ")", ":", "s", "=", "set", "(", ")", "for", "el", "in", "it", ":", "if", "el", "not", "in", "s", ":", "s", ".", "add", "(", "el", ")", "yield", "el", "else", ":", "# TODO: Make sure, this is not identical but new data", "self", ".", "log", "(", "\"Duplicate sentence received: \"", ",", "el", ",", "lvl", "=", "debug", ")", "sentences", "=", "list", "(", "unique", "(", "sentences", ")", ")", "return", "sentences", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Error during data unpacking: \"", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ",", "exc", "=", "True", ")" ]
Called when a sensor sends a new raw data to this serial connector. The data is sanitized and sent to the registered protocol listeners as time/raw/bus sentence tuple.
[ "Called", "when", "a", "sensor", "sends", "a", "new", "raw", "data", "to", "this", "serial", "connector", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/navdata/hfos/navdata/bus.py#L534-L567
Hackerfleet/hfos
modules/navdata/hfos/navdata/bus.py
SerialBusManager.serial_packet
def serial_packet(self, event): """Handles incoming raw sensor data :param data: raw incoming data """ self.log('Incoming serial packet:', event.__dict__, lvl=verbose) if self.scanning: pass else: # self.log("Incoming data: ", '%.50s ...' % event.data, lvl=debug) sanitized_data = self._parse(event.bus, event.data) self.log('Sanitized data:', sanitized_data, lvl=verbose) if sanitized_data is not None: self._broadcast(event.bus, sanitized_data)
python
def serial_packet(self, event): """Handles incoming raw sensor data :param data: raw incoming data """ self.log('Incoming serial packet:', event.__dict__, lvl=verbose) if self.scanning: pass else: # self.log("Incoming data: ", '%.50s ...' % event.data, lvl=debug) sanitized_data = self._parse(event.bus, event.data) self.log('Sanitized data:', sanitized_data, lvl=verbose) if sanitized_data is not None: self._broadcast(event.bus, sanitized_data)
[ "def", "serial_packet", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Incoming serial packet:'", ",", "event", ".", "__dict__", ",", "lvl", "=", "verbose", ")", "if", "self", ".", "scanning", ":", "pass", "else", ":", "# self.log(\"Incoming data: \", '%.50s ...' % event.data, lvl=debug)", "sanitized_data", "=", "self", ".", "_parse", "(", "event", ".", "bus", ",", "event", ".", "data", ")", "self", ".", "log", "(", "'Sanitized data:'", ",", "sanitized_data", ",", "lvl", "=", "verbose", ")", "if", "sanitized_data", "is", "not", "None", ":", "self", ".", "_broadcast", "(", "event", ".", "bus", ",", "sanitized_data", ")" ]
Handles incoming raw sensor data :param data: raw incoming data
[ "Handles", "incoming", "raw", "sensor", "data", ":", "param", "data", ":", "raw", "incoming", "data" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/navdata/hfos/navdata/bus.py#L583-L597
aburrell/apexpy
src/apexpy/__main__.py
main
def main(): """Entry point for the script""" desc = 'Converts between geodetic, modified apex, quasi-dipole and MLT' parser = argparse.ArgumentParser(description=desc, prog='apexpy') parser.add_argument('source', metavar='SOURCE', choices=['geo', 'apex', 'qd', 'mlt'], help='Convert from {geo, apex, qd, mlt}') parser.add_argument('dest', metavar='DEST', choices=['geo', 'apex', 'qd', 'mlt'], help='Convert to {geo, apex, qd, mlt}') desc = 'YYYY[MM[DD[HHMMSS]]] date/time for IGRF coefficients, time part ' desc += 'required for MLT calculations' parser.add_argument('date', metavar='DATE', help=desc) parser.add_argument('--height', dest='height', default=0, metavar='HEIGHT', type=float, help='height for conversion') parser.add_argument('--refh', dest='refh', metavar='REFH', type=float, default=0, help='reference height for modified apex coordinates') parser.add_argument('-i', '--input', dest='file_in', metavar='FILE_IN', type=argparse.FileType('r'), default=STDIN, help='input file (stdin if none specified)') parser.add_argument('-o', '--output', dest='file_out', metavar='FILE_OUT', type=argparse.FileType('wb'), default=STDOUT, help='output file (stdout if none specified)') args = parser.parse_args() array = np.loadtxt(args.file_in, ndmin=2) if 'mlt' in [args.source, args.dest] and len(args.date) < 14: desc = 'full date/time YYYYMMDDHHMMSS required for MLT calculations' raise ValueError(desc) if 9 <= len(args.date) <= 13: desc = 'full date/time must be given as YYYYMMDDHHMMSS, not ' + \ 'YYYYMMDDHHMMSS'[:len(args.date)] raise ValueError(desc) datetime = dt.datetime.strptime(args.date, '%Y%m%d%H%M%S'[:len(args.date)-2]) A = apexpy.Apex(date=datetime, refh=args.refh) lats, lons = A.convert(array[:, 0], array[:, 1], args.source, args.dest, args.height, datetime=datetime) np.savetxt(args.file_out, np.column_stack((lats, lons)), fmt='%.8f')
python
def main(): """Entry point for the script""" desc = 'Converts between geodetic, modified apex, quasi-dipole and MLT' parser = argparse.ArgumentParser(description=desc, prog='apexpy') parser.add_argument('source', metavar='SOURCE', choices=['geo', 'apex', 'qd', 'mlt'], help='Convert from {geo, apex, qd, mlt}') parser.add_argument('dest', metavar='DEST', choices=['geo', 'apex', 'qd', 'mlt'], help='Convert to {geo, apex, qd, mlt}') desc = 'YYYY[MM[DD[HHMMSS]]] date/time for IGRF coefficients, time part ' desc += 'required for MLT calculations' parser.add_argument('date', metavar='DATE', help=desc) parser.add_argument('--height', dest='height', default=0, metavar='HEIGHT', type=float, help='height for conversion') parser.add_argument('--refh', dest='refh', metavar='REFH', type=float, default=0, help='reference height for modified apex coordinates') parser.add_argument('-i', '--input', dest='file_in', metavar='FILE_IN', type=argparse.FileType('r'), default=STDIN, help='input file (stdin if none specified)') parser.add_argument('-o', '--output', dest='file_out', metavar='FILE_OUT', type=argparse.FileType('wb'), default=STDOUT, help='output file (stdout if none specified)') args = parser.parse_args() array = np.loadtxt(args.file_in, ndmin=2) if 'mlt' in [args.source, args.dest] and len(args.date) < 14: desc = 'full date/time YYYYMMDDHHMMSS required for MLT calculations' raise ValueError(desc) if 9 <= len(args.date) <= 13: desc = 'full date/time must be given as YYYYMMDDHHMMSS, not ' + \ 'YYYYMMDDHHMMSS'[:len(args.date)] raise ValueError(desc) datetime = dt.datetime.strptime(args.date, '%Y%m%d%H%M%S'[:len(args.date)-2]) A = apexpy.Apex(date=datetime, refh=args.refh) lats, lons = A.convert(array[:, 0], array[:, 1], args.source, args.dest, args.height, datetime=datetime) np.savetxt(args.file_out, np.column_stack((lats, lons)), fmt='%.8f')
[ "def", "main", "(", ")", ":", "desc", "=", "'Converts between geodetic, modified apex, quasi-dipole and MLT'", "parser", "=", "argparse", ".", "ArgumentParser", "(", "description", "=", "desc", ",", "prog", "=", "'apexpy'", ")", "parser", ".", "add_argument", "(", "'source'", ",", "metavar", "=", "'SOURCE'", ",", "choices", "=", "[", "'geo'", ",", "'apex'", ",", "'qd'", ",", "'mlt'", "]", ",", "help", "=", "'Convert from {geo, apex, qd, mlt}'", ")", "parser", ".", "add_argument", "(", "'dest'", ",", "metavar", "=", "'DEST'", ",", "choices", "=", "[", "'geo'", ",", "'apex'", ",", "'qd'", ",", "'mlt'", "]", ",", "help", "=", "'Convert to {geo, apex, qd, mlt}'", ")", "desc", "=", "'YYYY[MM[DD[HHMMSS]]] date/time for IGRF coefficients, time part '", "desc", "+=", "'required for MLT calculations'", "parser", ".", "add_argument", "(", "'date'", ",", "metavar", "=", "'DATE'", ",", "help", "=", "desc", ")", "parser", ".", "add_argument", "(", "'--height'", ",", "dest", "=", "'height'", ",", "default", "=", "0", ",", "metavar", "=", "'HEIGHT'", ",", "type", "=", "float", ",", "help", "=", "'height for conversion'", ")", "parser", ".", "add_argument", "(", "'--refh'", ",", "dest", "=", "'refh'", ",", "metavar", "=", "'REFH'", ",", "type", "=", "float", ",", "default", "=", "0", ",", "help", "=", "'reference height for modified apex coordinates'", ")", "parser", ".", "add_argument", "(", "'-i'", ",", "'--input'", ",", "dest", "=", "'file_in'", ",", "metavar", "=", "'FILE_IN'", ",", "type", "=", "argparse", ".", "FileType", "(", "'r'", ")", ",", "default", "=", "STDIN", ",", "help", "=", "'input file (stdin if none specified)'", ")", "parser", ".", "add_argument", "(", "'-o'", ",", "'--output'", ",", "dest", "=", "'file_out'", ",", "metavar", "=", "'FILE_OUT'", ",", "type", "=", "argparse", ".", "FileType", "(", "'wb'", ")", ",", "default", "=", "STDOUT", ",", "help", "=", "'output file (stdout if none specified)'", ")", "args", "=", "parser", ".", "parse_args", "(", ")", "array", "=", "np", ".", "loadtxt", "(", "args", ".", "file_in", ",", "ndmin", "=", "2", ")", "if", "'mlt'", "in", "[", "args", ".", "source", ",", "args", ".", "dest", "]", "and", "len", "(", "args", ".", "date", ")", "<", "14", ":", "desc", "=", "'full date/time YYYYMMDDHHMMSS required for MLT calculations'", "raise", "ValueError", "(", "desc", ")", "if", "9", "<=", "len", "(", "args", ".", "date", ")", "<=", "13", ":", "desc", "=", "'full date/time must be given as YYYYMMDDHHMMSS, not '", "+", "'YYYYMMDDHHMMSS'", "[", ":", "len", "(", "args", ".", "date", ")", "]", "raise", "ValueError", "(", "desc", ")", "datetime", "=", "dt", ".", "datetime", ".", "strptime", "(", "args", ".", "date", ",", "'%Y%m%d%H%M%S'", "[", ":", "len", "(", "args", ".", "date", ")", "-", "2", "]", ")", "A", "=", "apexpy", ".", "Apex", "(", "date", "=", "datetime", ",", "refh", "=", "args", ".", "refh", ")", "lats", ",", "lons", "=", "A", ".", "convert", "(", "array", "[", ":", ",", "0", "]", ",", "array", "[", ":", ",", "1", "]", ",", "args", ".", "source", ",", "args", ".", "dest", ",", "args", ".", "height", ",", "datetime", "=", "datetime", ")", "np", ".", "savetxt", "(", "args", ".", "file_out", ",", "np", ".", "column_stack", "(", "(", "lats", ",", "lons", ")", ")", ",", "fmt", "=", "'%.8f'", ")" ]
Entry point for the script
[ "Entry", "point", "for", "the", "script" ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/__main__.py#L24-L68
Hackerfleet/hfos
hfos/tool/__init__.py
run_process
def run_process(cwd, args): """Executes an external process via subprocess.Popen""" try: process = check_output(args, cwd=cwd, stderr=STDOUT) return process except CalledProcessError as e: log('Uh oh, the teapot broke again! Error:', e, type(e), lvl=verbose, pretty=True) log(e.cmd, e.returncode, e.output, lvl=verbose) return e.output
python
def run_process(cwd, args): """Executes an external process via subprocess.Popen""" try: process = check_output(args, cwd=cwd, stderr=STDOUT) return process except CalledProcessError as e: log('Uh oh, the teapot broke again! Error:', e, type(e), lvl=verbose, pretty=True) log(e.cmd, e.returncode, e.output, lvl=verbose) return e.output
[ "def", "run_process", "(", "cwd", ",", "args", ")", ":", "try", ":", "process", "=", "check_output", "(", "args", ",", "cwd", "=", "cwd", ",", "stderr", "=", "STDOUT", ")", "return", "process", "except", "CalledProcessError", "as", "e", ":", "log", "(", "'Uh oh, the teapot broke again! Error:'", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "verbose", ",", "pretty", "=", "True", ")", "log", "(", "e", ".", "cmd", ",", "e", ".", "returncode", ",", "e", ".", "output", ",", "lvl", "=", "verbose", ")", "return", "e", ".", "output" ]
Executes an external process via subprocess.Popen
[ "Executes", "an", "external", "process", "via", "subprocess", ".", "Popen" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/__init__.py#L66-L75
Hackerfleet/hfos
hfos/tool/__init__.py
_ask_password
def _ask_password(): """Securely and interactively ask for a password""" password = "Foo" password_trial = "" while password != password_trial: password = getpass.getpass() password_trial = getpass.getpass(prompt="Repeat:") if password != password_trial: print("\nPasswords do not match!") return password
python
def _ask_password(): """Securely and interactively ask for a password""" password = "Foo" password_trial = "" while password != password_trial: password = getpass.getpass() password_trial = getpass.getpass(prompt="Repeat:") if password != password_trial: print("\nPasswords do not match!") return password
[ "def", "_ask_password", "(", ")", ":", "password", "=", "\"Foo\"", "password_trial", "=", "\"\"", "while", "password", "!=", "password_trial", ":", "password", "=", "getpass", ".", "getpass", "(", ")", "password_trial", "=", "getpass", ".", "getpass", "(", "prompt", "=", "\"Repeat:\"", ")", "if", "password", "!=", "password_trial", ":", "print", "(", "\"\\nPasswords do not match!\"", ")", "return", "password" ]
Securely and interactively ask for a password
[ "Securely", "and", "interactively", "ask", "for", "a", "password" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/__init__.py#L78-L90
Hackerfleet/hfos
hfos/tool/__init__.py
_get_credentials
def _get_credentials(username=None, password=None, dbhost=None): """Obtain user credentials by arguments or asking the user""" # Database salt system_config = dbhost.objectmodels['systemconfig'].find_one({ 'active': True }) try: salt = system_config.salt.encode('ascii') except (KeyError, AttributeError): log('No systemconfig or it is without a salt! ' 'Reinstall the system provisioning with' 'hfos_manage.py install provisions -p system') sys.exit(3) if username is None: username = _ask("Please enter username: ") else: username = username if password is None: password = _ask_password() else: password = password try: password = password.encode('utf-8') except UnicodeDecodeError: password = password passhash = hashlib.sha512(password) passhash.update(salt) return username, passhash.hexdigest()
python
def _get_credentials(username=None, password=None, dbhost=None): """Obtain user credentials by arguments or asking the user""" # Database salt system_config = dbhost.objectmodels['systemconfig'].find_one({ 'active': True }) try: salt = system_config.salt.encode('ascii') except (KeyError, AttributeError): log('No systemconfig or it is without a salt! ' 'Reinstall the system provisioning with' 'hfos_manage.py install provisions -p system') sys.exit(3) if username is None: username = _ask("Please enter username: ") else: username = username if password is None: password = _ask_password() else: password = password try: password = password.encode('utf-8') except UnicodeDecodeError: password = password passhash = hashlib.sha512(password) passhash.update(salt) return username, passhash.hexdigest()
[ "def", "_get_credentials", "(", "username", "=", "None", ",", "password", "=", "None", ",", "dbhost", "=", "None", ")", ":", "# Database salt", "system_config", "=", "dbhost", ".", "objectmodels", "[", "'systemconfig'", "]", ".", "find_one", "(", "{", "'active'", ":", "True", "}", ")", "try", ":", "salt", "=", "system_config", ".", "salt", ".", "encode", "(", "'ascii'", ")", "except", "(", "KeyError", ",", "AttributeError", ")", ":", "log", "(", "'No systemconfig or it is without a salt! '", "'Reinstall the system provisioning with'", "'hfos_manage.py install provisions -p system'", ")", "sys", ".", "exit", "(", "3", ")", "if", "username", "is", "None", ":", "username", "=", "_ask", "(", "\"Please enter username: \"", ")", "else", ":", "username", "=", "username", "if", "password", "is", "None", ":", "password", "=", "_ask_password", "(", ")", "else", ":", "password", "=", "password", "try", ":", "password", "=", "password", ".", "encode", "(", "'utf-8'", ")", "except", "UnicodeDecodeError", ":", "password", "=", "password", "passhash", "=", "hashlib", ".", "sha512", "(", "password", ")", "passhash", ".", "update", "(", "salt", ")", "return", "username", ",", "passhash", ".", "hexdigest", "(", ")" ]
Obtain user credentials by arguments or asking the user
[ "Obtain", "user", "credentials", "by", "arguments", "or", "asking", "the", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/__init__.py#L93-L127
Hackerfleet/hfos
hfos/tool/__init__.py
_ask
def _ask(question, default=None, data_type='str', show_hint=False): """Interactively ask the user for data""" data = default if data_type == 'bool': data = None default_string = "Y" if default else "N" while data not in ('Y', 'J', 'N', '1', '0'): data = input("%s? [%s]: " % (question, default_string)).upper() if data == '': return default return data in ('Y', 'J', '1') elif data_type in ('str', 'unicode'): if show_hint: msg = "%s? [%s] (%s): " % (question, default, data_type) else: msg = question data = input(msg) if len(data) == 0: data = default elif data_type == 'int': if show_hint: msg = "%s? [%s] (%s): " % (question, default, data_type) else: msg = question data = input(msg) if len(data) == 0: data = int(default) else: data = int(data) return data
python
def _ask(question, default=None, data_type='str', show_hint=False): """Interactively ask the user for data""" data = default if data_type == 'bool': data = None default_string = "Y" if default else "N" while data not in ('Y', 'J', 'N', '1', '0'): data = input("%s? [%s]: " % (question, default_string)).upper() if data == '': return default return data in ('Y', 'J', '1') elif data_type in ('str', 'unicode'): if show_hint: msg = "%s? [%s] (%s): " % (question, default, data_type) else: msg = question data = input(msg) if len(data) == 0: data = default elif data_type == 'int': if show_hint: msg = "%s? [%s] (%s): " % (question, default, data_type) else: msg = question data = input(msg) if len(data) == 0: data = int(default) else: data = int(data) return data
[ "def", "_ask", "(", "question", ",", "default", "=", "None", ",", "data_type", "=", "'str'", ",", "show_hint", "=", "False", ")", ":", "data", "=", "default", "if", "data_type", "==", "'bool'", ":", "data", "=", "None", "default_string", "=", "\"Y\"", "if", "default", "else", "\"N\"", "while", "data", "not", "in", "(", "'Y'", ",", "'J'", ",", "'N'", ",", "'1'", ",", "'0'", ")", ":", "data", "=", "input", "(", "\"%s? [%s]: \"", "%", "(", "question", ",", "default_string", ")", ")", ".", "upper", "(", ")", "if", "data", "==", "''", ":", "return", "default", "return", "data", "in", "(", "'Y'", ",", "'J'", ",", "'1'", ")", "elif", "data_type", "in", "(", "'str'", ",", "'unicode'", ")", ":", "if", "show_hint", ":", "msg", "=", "\"%s? [%s] (%s): \"", "%", "(", "question", ",", "default", ",", "data_type", ")", "else", ":", "msg", "=", "question", "data", "=", "input", "(", "msg", ")", "if", "len", "(", "data", ")", "==", "0", ":", "data", "=", "default", "elif", "data_type", "==", "'int'", ":", "if", "show_hint", ":", "msg", "=", "\"%s? [%s] (%s): \"", "%", "(", "question", ",", "default", ",", "data_type", ")", "else", ":", "msg", "=", "question", "data", "=", "input", "(", "msg", ")", "if", "len", "(", "data", ")", "==", "0", ":", "data", "=", "int", "(", "default", ")", "else", ":", "data", "=", "int", "(", "data", ")", "return", "data" ]
Interactively ask the user for data
[ "Interactively", "ask", "the", "user", "for", "data" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/__init__.py#L140-L180
aburrell/apexpy
src/apexpy/helpers.py
checklat
def checklat(lat, name='lat'): """Makes sure the latitude is inside [-90, 90], clipping close values (tolerance 1e-4). Parameters ========== lat : array_like latitude name : str, optional parameter name to use in the exception message Returns ======= lat : ndarray or float Same as input where values just outside the range have been clipped to [-90, 90] Raises ====== ValueError if any values are too far outside the range [-90, 90] """ if np.all(np.float64(lat) >= -90) and np.all(np.float64(lat) <= 90): return lat if np.isscalar(lat): if lat > 90 and np.isclose(lat, 90, rtol=0, atol=1e-4): lat = 90 return lat elif lat < -90 and np.isclose(lat, -90, rtol=0, atol=1e-4): lat = -90 return lat else: lat = np.float64(lat) # make sure we have an array, not list lat[(lat > 90) & (np.isclose(lat, 90, rtol=0, atol=1e-4))] = 90 lat[(lat < -90) & (np.isclose(lat, -90, rtol=0, atol=1e-4))] = -90 if np.all(lat >= -90) and np.all(lat <= 90): return lat # we haven't returned yet, so raise exception raise ValueError(name + ' must be in [-90, 90]')
python
def checklat(lat, name='lat'): """Makes sure the latitude is inside [-90, 90], clipping close values (tolerance 1e-4). Parameters ========== lat : array_like latitude name : str, optional parameter name to use in the exception message Returns ======= lat : ndarray or float Same as input where values just outside the range have been clipped to [-90, 90] Raises ====== ValueError if any values are too far outside the range [-90, 90] """ if np.all(np.float64(lat) >= -90) and np.all(np.float64(lat) <= 90): return lat if np.isscalar(lat): if lat > 90 and np.isclose(lat, 90, rtol=0, atol=1e-4): lat = 90 return lat elif lat < -90 and np.isclose(lat, -90, rtol=0, atol=1e-4): lat = -90 return lat else: lat = np.float64(lat) # make sure we have an array, not list lat[(lat > 90) & (np.isclose(lat, 90, rtol=0, atol=1e-4))] = 90 lat[(lat < -90) & (np.isclose(lat, -90, rtol=0, atol=1e-4))] = -90 if np.all(lat >= -90) and np.all(lat <= 90): return lat # we haven't returned yet, so raise exception raise ValueError(name + ' must be in [-90, 90]')
[ "def", "checklat", "(", "lat", ",", "name", "=", "'lat'", ")", ":", "if", "np", ".", "all", "(", "np", ".", "float64", "(", "lat", ")", ">=", "-", "90", ")", "and", "np", ".", "all", "(", "np", ".", "float64", "(", "lat", ")", "<=", "90", ")", ":", "return", "lat", "if", "np", ".", "isscalar", "(", "lat", ")", ":", "if", "lat", ">", "90", "and", "np", ".", "isclose", "(", "lat", ",", "90", ",", "rtol", "=", "0", ",", "atol", "=", "1e-4", ")", ":", "lat", "=", "90", "return", "lat", "elif", "lat", "<", "-", "90", "and", "np", ".", "isclose", "(", "lat", ",", "-", "90", ",", "rtol", "=", "0", ",", "atol", "=", "1e-4", ")", ":", "lat", "=", "-", "90", "return", "lat", "else", ":", "lat", "=", "np", ".", "float64", "(", "lat", ")", "# make sure we have an array, not list", "lat", "[", "(", "lat", ">", "90", ")", "&", "(", "np", ".", "isclose", "(", "lat", ",", "90", ",", "rtol", "=", "0", ",", "atol", "=", "1e-4", ")", ")", "]", "=", "90", "lat", "[", "(", "lat", "<", "-", "90", ")", "&", "(", "np", ".", "isclose", "(", "lat", ",", "-", "90", ",", "rtol", "=", "0", ",", "atol", "=", "1e-4", ")", ")", "]", "=", "-", "90", "if", "np", ".", "all", "(", "lat", ">=", "-", "90", ")", "and", "np", ".", "all", "(", "lat", "<=", "90", ")", ":", "return", "lat", "# we haven't returned yet, so raise exception", "raise", "ValueError", "(", "name", "+", "' must be in [-90, 90]'", ")" ]
Makes sure the latitude is inside [-90, 90], clipping close values (tolerance 1e-4). Parameters ========== lat : array_like latitude name : str, optional parameter name to use in the exception message Returns ======= lat : ndarray or float Same as input where values just outside the range have been clipped to [-90, 90] Raises ====== ValueError if any values are too far outside the range [-90, 90]
[ "Makes", "sure", "the", "latitude", "is", "inside", "[", "-", "90", "90", "]", "clipping", "close", "values", "(", "tolerance", "1e", "-", "4", ")", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L11-L52
aburrell/apexpy
src/apexpy/helpers.py
getsinIm
def getsinIm(alat): """Computes sinIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= sinIm : ndarray or float """ alat = np.float64(alat) return 2*np.sin(np.radians(alat))/np.sqrt(4 - 3*np.cos(np.radians(alat))**2)
python
def getsinIm(alat): """Computes sinIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= sinIm : ndarray or float """ alat = np.float64(alat) return 2*np.sin(np.radians(alat))/np.sqrt(4 - 3*np.cos(np.radians(alat))**2)
[ "def", "getsinIm", "(", "alat", ")", ":", "alat", "=", "np", ".", "float64", "(", "alat", ")", "return", "2", "*", "np", ".", "sin", "(", "np", ".", "radians", "(", "alat", ")", ")", "/", "np", ".", "sqrt", "(", "4", "-", "3", "*", "np", ".", "cos", "(", "np", ".", "radians", "(", "alat", ")", ")", "**", "2", ")" ]
Computes sinIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= sinIm : ndarray or float
[ "Computes", "sinIm", "from", "modified", "apex", "latitude", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L55-L71
aburrell/apexpy
src/apexpy/helpers.py
getcosIm
def getcosIm(alat): """Computes cosIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= cosIm : ndarray or float """ alat = np.float64(alat) return np.cos(np.radians(alat))/np.sqrt(4 - 3*np.cos(np.radians(alat))**2)
python
def getcosIm(alat): """Computes cosIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= cosIm : ndarray or float """ alat = np.float64(alat) return np.cos(np.radians(alat))/np.sqrt(4 - 3*np.cos(np.radians(alat))**2)
[ "def", "getcosIm", "(", "alat", ")", ":", "alat", "=", "np", ".", "float64", "(", "alat", ")", "return", "np", ".", "cos", "(", "np", ".", "radians", "(", "alat", ")", ")", "/", "np", ".", "sqrt", "(", "4", "-", "3", "*", "np", ".", "cos", "(", "np", ".", "radians", "(", "alat", ")", ")", "**", "2", ")" ]
Computes cosIm from modified apex latitude. Parameters ========== alat : array_like Modified apex latitude Returns ======= cosIm : ndarray or float
[ "Computes", "cosIm", "from", "modified", "apex", "latitude", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L74-L90
aburrell/apexpy
src/apexpy/helpers.py
toYearFraction
def toYearFraction(date): """Converts :class:`datetime.date` or :class:`datetime.datetime` to decimal year. Parameters ========== date : :class:`datetime.date` or :class:`datetime.datetime` Returns ======= year : float Decimal year Notes ===== The algorithm is taken from http://stackoverflow.com/a/6451892/2978652 """ def sinceEpoch(date): """returns seconds since epoch""" return time.mktime(date.timetuple()) year = date.year startOfThisYear = dt.datetime(year=year, month=1, day=1) startOfNextYear = dt.datetime(year=year+1, month=1, day=1) yearElapsed = sinceEpoch(date) - sinceEpoch(startOfThisYear) yearDuration = sinceEpoch(startOfNextYear) - sinceEpoch(startOfThisYear) fraction = yearElapsed/yearDuration return date.year + fraction
python
def toYearFraction(date): """Converts :class:`datetime.date` or :class:`datetime.datetime` to decimal year. Parameters ========== date : :class:`datetime.date` or :class:`datetime.datetime` Returns ======= year : float Decimal year Notes ===== The algorithm is taken from http://stackoverflow.com/a/6451892/2978652 """ def sinceEpoch(date): """returns seconds since epoch""" return time.mktime(date.timetuple()) year = date.year startOfThisYear = dt.datetime(year=year, month=1, day=1) startOfNextYear = dt.datetime(year=year+1, month=1, day=1) yearElapsed = sinceEpoch(date) - sinceEpoch(startOfThisYear) yearDuration = sinceEpoch(startOfNextYear) - sinceEpoch(startOfThisYear) fraction = yearElapsed/yearDuration return date.year + fraction
[ "def", "toYearFraction", "(", "date", ")", ":", "def", "sinceEpoch", "(", "date", ")", ":", "\"\"\"returns seconds since epoch\"\"\"", "return", "time", ".", "mktime", "(", "date", ".", "timetuple", "(", ")", ")", "year", "=", "date", ".", "year", "startOfThisYear", "=", "dt", ".", "datetime", "(", "year", "=", "year", ",", "month", "=", "1", ",", "day", "=", "1", ")", "startOfNextYear", "=", "dt", ".", "datetime", "(", "year", "=", "year", "+", "1", ",", "month", "=", "1", ",", "day", "=", "1", ")", "yearElapsed", "=", "sinceEpoch", "(", "date", ")", "-", "sinceEpoch", "(", "startOfThisYear", ")", "yearDuration", "=", "sinceEpoch", "(", "startOfNextYear", ")", "-", "sinceEpoch", "(", "startOfThisYear", ")", "fraction", "=", "yearElapsed", "/", "yearDuration", "return", "date", ".", "year", "+", "fraction" ]
Converts :class:`datetime.date` or :class:`datetime.datetime` to decimal year. Parameters ========== date : :class:`datetime.date` or :class:`datetime.datetime` Returns ======= year : float Decimal year Notes ===== The algorithm is taken from http://stackoverflow.com/a/6451892/2978652
[ "Converts", ":", "class", ":", "datetime", ".", "date", "or", ":", "class", ":", "datetime", ".", "datetime", "to", "decimal", "year", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L93-L123
aburrell/apexpy
src/apexpy/helpers.py
gc2gdlat
def gc2gdlat(gclat): """Converts geocentric latitude to geodetic latitude using WGS84. Parameters ========== gclat : array_like Geocentric latitude Returns ======= gdlat : ndarray or float Geodetic latitude """ WGS84_e2 = 0.006694379990141317 # WGS84 first eccentricity squared return np.rad2deg(-np.arctan(np.tan(np.deg2rad(gclat))/(WGS84_e2 - 1)))
python
def gc2gdlat(gclat): """Converts geocentric latitude to geodetic latitude using WGS84. Parameters ========== gclat : array_like Geocentric latitude Returns ======= gdlat : ndarray or float Geodetic latitude """ WGS84_e2 = 0.006694379990141317 # WGS84 first eccentricity squared return np.rad2deg(-np.arctan(np.tan(np.deg2rad(gclat))/(WGS84_e2 - 1)))
[ "def", "gc2gdlat", "(", "gclat", ")", ":", "WGS84_e2", "=", "0.006694379990141317", "# WGS84 first eccentricity squared", "return", "np", ".", "rad2deg", "(", "-", "np", ".", "arctan", "(", "np", ".", "tan", "(", "np", ".", "deg2rad", "(", "gclat", ")", ")", "/", "(", "WGS84_e2", "-", "1", ")", ")", ")" ]
Converts geocentric latitude to geodetic latitude using WGS84. Parameters ========== gclat : array_like Geocentric latitude Returns ======= gdlat : ndarray or float Geodetic latitude
[ "Converts", "geocentric", "latitude", "to", "geodetic", "latitude", "using", "WGS84", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L126-L141
aburrell/apexpy
src/apexpy/helpers.py
subsol
def subsol(datetime): """Finds subsolar geocentric latitude and longitude. Parameters ========== datetime : :class:`datetime.datetime` Returns ======= sbsllat : float Latitude of subsolar point sbsllon : float Longitude of subsolar point Notes ===== Based on formulas in Astronomical Almanac for the year 1996, p. C24. (U.S. Government Printing Office, 1994). Usable for years 1601-2100, inclusive. According to the Almanac, results are good to at least 0.01 degree latitude and 0.025 degrees longitude between years 1950 and 2050. Accuracy for other years has not been tested. Every day is assumed to have exactly 86400 seconds; thus leap seconds that sometimes occur on December 31 are ignored (their effect is below the accuracy threshold of the algorithm). After Fortran code by A. D. Richmond, NCAR. Translated from IDL by K. Laundal. """ # convert to year, day of year and seconds since midnight year = datetime.year doy = datetime.timetuple().tm_yday ut = datetime.hour * 3600 + datetime.minute * 60 + datetime.second if not 1601 <= year <= 2100: raise ValueError('Year must be in [1601, 2100]') yr = year - 2000 nleap = int(np.floor((year - 1601.0) / 4.0)) nleap -= 99 if year <= 1900: ncent = int(np.floor((year - 1601.0) / 100.0)) ncent = 3 - ncent nleap = nleap + ncent l0 = -79.549 + (-0.238699 * (yr - 4.0 * nleap) + 3.08514e-2 * nleap) g0 = -2.472 + (-0.2558905 * (yr - 4.0 * nleap) - 3.79617e-2 * nleap) # Days (including fraction) since 12 UT on January 1 of IYR: df = (ut / 86400.0 - 1.5) + doy # Mean longitude of Sun: lmean = l0 + 0.9856474 * df # Mean anomaly in radians: grad = np.radians(g0 + 0.9856003 * df) # Ecliptic longitude: lmrad = np.radians(lmean + 1.915 * np.sin(grad) + 0.020 * np.sin(2.0 * grad)) sinlm = np.sin(lmrad) # Obliquity of ecliptic in radians: epsrad = np.radians(23.439 - 4e-7 * (df + 365 * yr + nleap)) # Right ascension: alpha = np.degrees(np.arctan2(np.cos(epsrad) * sinlm, np.cos(lmrad))) # Declination, which is also the subsolar latitude: sslat = np.degrees(np.arcsin(np.sin(epsrad) * sinlm)) # Equation of time (degrees): etdeg = lmean - alpha nrot = round(etdeg / 360.0) etdeg = etdeg - 360.0 * nrot # Subsolar longitude: sslon = 180.0 - (ut / 240.0 + etdeg) # Earth rotates one degree every 240 s. nrot = round(sslon / 360.0) sslon = sslon - 360.0 * nrot return sslat, sslon
python
def subsol(datetime): """Finds subsolar geocentric latitude and longitude. Parameters ========== datetime : :class:`datetime.datetime` Returns ======= sbsllat : float Latitude of subsolar point sbsllon : float Longitude of subsolar point Notes ===== Based on formulas in Astronomical Almanac for the year 1996, p. C24. (U.S. Government Printing Office, 1994). Usable for years 1601-2100, inclusive. According to the Almanac, results are good to at least 0.01 degree latitude and 0.025 degrees longitude between years 1950 and 2050. Accuracy for other years has not been tested. Every day is assumed to have exactly 86400 seconds; thus leap seconds that sometimes occur on December 31 are ignored (their effect is below the accuracy threshold of the algorithm). After Fortran code by A. D. Richmond, NCAR. Translated from IDL by K. Laundal. """ # convert to year, day of year and seconds since midnight year = datetime.year doy = datetime.timetuple().tm_yday ut = datetime.hour * 3600 + datetime.minute * 60 + datetime.second if not 1601 <= year <= 2100: raise ValueError('Year must be in [1601, 2100]') yr = year - 2000 nleap = int(np.floor((year - 1601.0) / 4.0)) nleap -= 99 if year <= 1900: ncent = int(np.floor((year - 1601.0) / 100.0)) ncent = 3 - ncent nleap = nleap + ncent l0 = -79.549 + (-0.238699 * (yr - 4.0 * nleap) + 3.08514e-2 * nleap) g0 = -2.472 + (-0.2558905 * (yr - 4.0 * nleap) - 3.79617e-2 * nleap) # Days (including fraction) since 12 UT on January 1 of IYR: df = (ut / 86400.0 - 1.5) + doy # Mean longitude of Sun: lmean = l0 + 0.9856474 * df # Mean anomaly in radians: grad = np.radians(g0 + 0.9856003 * df) # Ecliptic longitude: lmrad = np.radians(lmean + 1.915 * np.sin(grad) + 0.020 * np.sin(2.0 * grad)) sinlm = np.sin(lmrad) # Obliquity of ecliptic in radians: epsrad = np.radians(23.439 - 4e-7 * (df + 365 * yr + nleap)) # Right ascension: alpha = np.degrees(np.arctan2(np.cos(epsrad) * sinlm, np.cos(lmrad))) # Declination, which is also the subsolar latitude: sslat = np.degrees(np.arcsin(np.sin(epsrad) * sinlm)) # Equation of time (degrees): etdeg = lmean - alpha nrot = round(etdeg / 360.0) etdeg = etdeg - 360.0 * nrot # Subsolar longitude: sslon = 180.0 - (ut / 240.0 + etdeg) # Earth rotates one degree every 240 s. nrot = round(sslon / 360.0) sslon = sslon - 360.0 * nrot return sslat, sslon
[ "def", "subsol", "(", "datetime", ")", ":", "# convert to year, day of year and seconds since midnight", "year", "=", "datetime", ".", "year", "doy", "=", "datetime", ".", "timetuple", "(", ")", ".", "tm_yday", "ut", "=", "datetime", ".", "hour", "*", "3600", "+", "datetime", ".", "minute", "*", "60", "+", "datetime", ".", "second", "if", "not", "1601", "<=", "year", "<=", "2100", ":", "raise", "ValueError", "(", "'Year must be in [1601, 2100]'", ")", "yr", "=", "year", "-", "2000", "nleap", "=", "int", "(", "np", ".", "floor", "(", "(", "year", "-", "1601.0", ")", "/", "4.0", ")", ")", "nleap", "-=", "99", "if", "year", "<=", "1900", ":", "ncent", "=", "int", "(", "np", ".", "floor", "(", "(", "year", "-", "1601.0", ")", "/", "100.0", ")", ")", "ncent", "=", "3", "-", "ncent", "nleap", "=", "nleap", "+", "ncent", "l0", "=", "-", "79.549", "+", "(", "-", "0.238699", "*", "(", "yr", "-", "4.0", "*", "nleap", ")", "+", "3.08514e-2", "*", "nleap", ")", "g0", "=", "-", "2.472", "+", "(", "-", "0.2558905", "*", "(", "yr", "-", "4.0", "*", "nleap", ")", "-", "3.79617e-2", "*", "nleap", ")", "# Days (including fraction) since 12 UT on January 1 of IYR:", "df", "=", "(", "ut", "/", "86400.0", "-", "1.5", ")", "+", "doy", "# Mean longitude of Sun:", "lmean", "=", "l0", "+", "0.9856474", "*", "df", "# Mean anomaly in radians:", "grad", "=", "np", ".", "radians", "(", "g0", "+", "0.9856003", "*", "df", ")", "# Ecliptic longitude:", "lmrad", "=", "np", ".", "radians", "(", "lmean", "+", "1.915", "*", "np", ".", "sin", "(", "grad", ")", "+", "0.020", "*", "np", ".", "sin", "(", "2.0", "*", "grad", ")", ")", "sinlm", "=", "np", ".", "sin", "(", "lmrad", ")", "# Obliquity of ecliptic in radians:", "epsrad", "=", "np", ".", "radians", "(", "23.439", "-", "4e-7", "*", "(", "df", "+", "365", "*", "yr", "+", "nleap", ")", ")", "# Right ascension:", "alpha", "=", "np", ".", "degrees", "(", "np", ".", "arctan2", "(", "np", ".", "cos", "(", "epsrad", ")", "*", "sinlm", ",", "np", ".", "cos", "(", "lmrad", ")", ")", ")", "# Declination, which is also the subsolar latitude:", "sslat", "=", "np", ".", "degrees", "(", "np", ".", "arcsin", "(", "np", ".", "sin", "(", "epsrad", ")", "*", "sinlm", ")", ")", "# Equation of time (degrees):", "etdeg", "=", "lmean", "-", "alpha", "nrot", "=", "round", "(", "etdeg", "/", "360.0", ")", "etdeg", "=", "etdeg", "-", "360.0", "*", "nrot", "# Subsolar longitude:", "sslon", "=", "180.0", "-", "(", "ut", "/", "240.0", "+", "etdeg", ")", "# Earth rotates one degree every 240 s.", "nrot", "=", "round", "(", "sslon", "/", "360.0", ")", "sslon", "=", "sslon", "-", "360.0", "*", "nrot", "return", "sslat", ",", "sslon" ]
Finds subsolar geocentric latitude and longitude. Parameters ========== datetime : :class:`datetime.datetime` Returns ======= sbsllat : float Latitude of subsolar point sbsllon : float Longitude of subsolar point Notes ===== Based on formulas in Astronomical Almanac for the year 1996, p. C24. (U.S. Government Printing Office, 1994). Usable for years 1601-2100, inclusive. According to the Almanac, results are good to at least 0.01 degree latitude and 0.025 degrees longitude between years 1950 and 2050. Accuracy for other years has not been tested. Every day is assumed to have exactly 86400 seconds; thus leap seconds that sometimes occur on December 31 are ignored (their effect is below the accuracy threshold of the algorithm). After Fortran code by A. D. Richmond, NCAR. Translated from IDL by K. Laundal.
[ "Finds", "subsolar", "geocentric", "latitude", "and", "longitude", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/src/apexpy/helpers.py#L144-L226
aburrell/apexpy
ci/appveyor-download.py
make_auth_headers
def make_auth_headers(): """Make the authentication headers needed to use the Appveyor API.""" if not os.path.exists(".appveyor.token"): raise RuntimeError( "Please create a file named `.appveyor.token` in the current directory. " "You can get the token from https://ci.appveyor.com/api-token" ) with open(".appveyor.token") as f: token = f.read().strip() headers = { 'Authorization': 'Bearer {}'.format(token), } return headers
python
def make_auth_headers(): """Make the authentication headers needed to use the Appveyor API.""" if not os.path.exists(".appveyor.token"): raise RuntimeError( "Please create a file named `.appveyor.token` in the current directory. " "You can get the token from https://ci.appveyor.com/api-token" ) with open(".appveyor.token") as f: token = f.read().strip() headers = { 'Authorization': 'Bearer {}'.format(token), } return headers
[ "def", "make_auth_headers", "(", ")", ":", "if", "not", "os", ".", "path", ".", "exists", "(", "\".appveyor.token\"", ")", ":", "raise", "RuntimeError", "(", "\"Please create a file named `.appveyor.token` in the current directory. \"", "\"You can get the token from https://ci.appveyor.com/api-token\"", ")", "with", "open", "(", "\".appveyor.token\"", ")", "as", "f", ":", "token", "=", "f", ".", "read", "(", ")", ".", "strip", "(", ")", "headers", "=", "{", "'Authorization'", ":", "'Bearer {}'", ".", "format", "(", "token", ")", ",", "}", "return", "headers" ]
Make the authentication headers needed to use the Appveyor API.
[ "Make", "the", "authentication", "headers", "needed", "to", "use", "the", "Appveyor", "API", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/ci/appveyor-download.py#L15-L28
aburrell/apexpy
ci/appveyor-download.py
get_project_build
def get_project_build(account_project): """Get the details of the latest Appveyor build.""" url = make_url("/projects/{account_project}", account_project=account_project) response = requests.get(url, headers=make_auth_headers()) return response.json()
python
def get_project_build(account_project): """Get the details of the latest Appveyor build.""" url = make_url("/projects/{account_project}", account_project=account_project) response = requests.get(url, headers=make_auth_headers()) return response.json()
[ "def", "get_project_build", "(", "account_project", ")", ":", "url", "=", "make_url", "(", "\"/projects/{account_project}\"", ",", "account_project", "=", "account_project", ")", "response", "=", "requests", ".", "get", "(", "url", ",", "headers", "=", "make_auth_headers", "(", ")", ")", "return", "response", ".", "json", "(", ")" ]
Get the details of the latest Appveyor build.
[ "Get", "the", "details", "of", "the", "latest", "Appveyor", "build", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/ci/appveyor-download.py#L36-L40
aburrell/apexpy
ci/appveyor-download.py
download_url
def download_url(url, filename, headers): """Download a file from `url` to `filename`.""" ensure_dirs(filename) response = requests.get(url, headers=headers, stream=True) if response.status_code == 200: with open(filename, 'wb') as f: for chunk in response.iter_content(16 * 1024): f.write(chunk)
python
def download_url(url, filename, headers): """Download a file from `url` to `filename`.""" ensure_dirs(filename) response = requests.get(url, headers=headers, stream=True) if response.status_code == 200: with open(filename, 'wb') as f: for chunk in response.iter_content(16 * 1024): f.write(chunk)
[ "def", "download_url", "(", "url", ",", "filename", ",", "headers", ")", ":", "ensure_dirs", "(", "filename", ")", "response", "=", "requests", ".", "get", "(", "url", ",", "headers", "=", "headers", ",", "stream", "=", "True", ")", "if", "response", ".", "status_code", "==", "200", ":", "with", "open", "(", "filename", ",", "'wb'", ")", "as", "f", ":", "for", "chunk", "in", "response", ".", "iter_content", "(", "16", "*", "1024", ")", ":", "f", ".", "write", "(", "chunk", ")" ]
Download a file from `url` to `filename`.
[ "Download", "a", "file", "from", "url", "to", "filename", "." ]
train
https://github.com/aburrell/apexpy/blob/a2e919fd9ea9a65d49c4c22c9eb030c8ccf48386/ci/appveyor-download.py#L80-L87
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.cli_schemata_list
def cli_schemata_list(self, *args): """Display a list of registered schemata""" self.log('Registered schemata languages:', ",".join(sorted(l10n_schemastore.keys()))) self.log('Registered Schemata:', ",".join(sorted(schemastore.keys()))) if '-c' in args or '-config' in args: self.log('Registered Configuration Schemata:', ",".join(sorted(configschemastore.keys())), pretty=True)
python
def cli_schemata_list(self, *args): """Display a list of registered schemata""" self.log('Registered schemata languages:', ",".join(sorted(l10n_schemastore.keys()))) self.log('Registered Schemata:', ",".join(sorted(schemastore.keys()))) if '-c' in args or '-config' in args: self.log('Registered Configuration Schemata:', ",".join(sorted(configschemastore.keys())), pretty=True)
[ "def", "cli_schemata_list", "(", "self", ",", "*", "args", ")", ":", "self", ".", "log", "(", "'Registered schemata languages:'", ",", "\",\"", ".", "join", "(", "sorted", "(", "l10n_schemastore", ".", "keys", "(", ")", ")", ")", ")", "self", ".", "log", "(", "'Registered Schemata:'", ",", "\",\"", ".", "join", "(", "sorted", "(", "schemastore", ".", "keys", "(", ")", ")", ")", ")", "if", "'-c'", "in", "args", "or", "'-config'", "in", "args", ":", "self", ".", "log", "(", "'Registered Configuration Schemata:'", ",", "\",\"", ".", "join", "(", "sorted", "(", "configschemastore", ".", "keys", "(", ")", ")", ")", ",", "pretty", "=", "True", ")" ]
Display a list of registered schemata
[ "Display", "a", "list", "of", "registered", "schemata" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L87-L93
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.cli_form
def cli_form(self, *args): """Display a schemata's form definition""" if args[0] == '*': for schema in schemastore: self.log(schema, ':', schemastore[schema]['form'], pretty=True) else: self.log(schemastore[args[0]]['form'], pretty=True)
python
def cli_form(self, *args): """Display a schemata's form definition""" if args[0] == '*': for schema in schemastore: self.log(schema, ':', schemastore[schema]['form'], pretty=True) else: self.log(schemastore[args[0]]['form'], pretty=True)
[ "def", "cli_form", "(", "self", ",", "*", "args", ")", ":", "if", "args", "[", "0", "]", "==", "'*'", ":", "for", "schema", "in", "schemastore", ":", "self", ".", "log", "(", "schema", ",", "':'", ",", "schemastore", "[", "schema", "]", "[", "'form'", "]", ",", "pretty", "=", "True", ")", "else", ":", "self", ".", "log", "(", "schemastore", "[", "args", "[", "0", "]", "]", "[", "'form'", "]", ",", "pretty", "=", "True", ")" ]
Display a schemata's form definition
[ "Display", "a", "schemata", "s", "form", "definition" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L96-L103
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.cli_schema
def cli_schema(self, *args): """Display a single schema definition""" key = None if len(args) > 1: key = args[1] args = list(args) if '-config' in args or '-c' in args: store = configschemastore try: args.remove('-c') args.remove('-config') except ValueError: pass else: store = schemastore def output(schema): self.log("%s :" % schema) if key == 'props': self.log(store[schema]['schema']['properties'], pretty=True) elif key == 'perms': try: self.log(store[schema]['schema']['roles_create'], pretty=True) except KeyError: self.log('Schema', schema, 'has no role for creation', lvl=warn) try: self.log(store[schema]['schema']['properties']['perms']['properties'], pretty=True) except KeyError: self.log('Schema', schema, 'has no permissions', lvl=warn) else: self.log(store[schema]['schema'], pretty=True) if '*' in args: for schema in store: output(schema) else: output(args[0])
python
def cli_schema(self, *args): """Display a single schema definition""" key = None if len(args) > 1: key = args[1] args = list(args) if '-config' in args or '-c' in args: store = configschemastore try: args.remove('-c') args.remove('-config') except ValueError: pass else: store = schemastore def output(schema): self.log("%s :" % schema) if key == 'props': self.log(store[schema]['schema']['properties'], pretty=True) elif key == 'perms': try: self.log(store[schema]['schema']['roles_create'], pretty=True) except KeyError: self.log('Schema', schema, 'has no role for creation', lvl=warn) try: self.log(store[schema]['schema']['properties']['perms']['properties'], pretty=True) except KeyError: self.log('Schema', schema, 'has no permissions', lvl=warn) else: self.log(store[schema]['schema'], pretty=True) if '*' in args: for schema in store: output(schema) else: output(args[0])
[ "def", "cli_schema", "(", "self", ",", "*", "args", ")", ":", "key", "=", "None", "if", "len", "(", "args", ")", ">", "1", ":", "key", "=", "args", "[", "1", "]", "args", "=", "list", "(", "args", ")", "if", "'-config'", "in", "args", "or", "'-c'", "in", "args", ":", "store", "=", "configschemastore", "try", ":", "args", ".", "remove", "(", "'-c'", ")", "args", ".", "remove", "(", "'-config'", ")", "except", "ValueError", ":", "pass", "else", ":", "store", "=", "schemastore", "def", "output", "(", "schema", ")", ":", "self", ".", "log", "(", "\"%s :\"", "%", "schema", ")", "if", "key", "==", "'props'", ":", "self", ".", "log", "(", "store", "[", "schema", "]", "[", "'schema'", "]", "[", "'properties'", "]", ",", "pretty", "=", "True", ")", "elif", "key", "==", "'perms'", ":", "try", ":", "self", ".", "log", "(", "store", "[", "schema", "]", "[", "'schema'", "]", "[", "'roles_create'", "]", ",", "pretty", "=", "True", ")", "except", "KeyError", ":", "self", ".", "log", "(", "'Schema'", ",", "schema", ",", "'has no role for creation'", ",", "lvl", "=", "warn", ")", "try", ":", "self", ".", "log", "(", "store", "[", "schema", "]", "[", "'schema'", "]", "[", "'properties'", "]", "[", "'perms'", "]", "[", "'properties'", "]", ",", "pretty", "=", "True", ")", "except", "KeyError", ":", "self", ".", "log", "(", "'Schema'", ",", "schema", ",", "'has no permissions'", ",", "lvl", "=", "warn", ")", "else", ":", "self", ".", "log", "(", "store", "[", "schema", "]", "[", "'schema'", "]", ",", "pretty", "=", "True", ")", "if", "'*'", "in", "args", ":", "for", "schema", "in", "store", ":", "output", "(", "schema", ")", "else", ":", "output", "(", "args", "[", "0", "]", ")" ]
Display a single schema definition
[ "Display", "a", "single", "schema", "definition" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L106-L144
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.cli_forms
def cli_forms(self, *args): """List all available form definitions""" forms = [] missing = [] for key, item in schemastore.items(): if 'form' in item and len(item['form']) > 0: forms.append(key) else: missing.append(key) self.log('Schemata with form:', forms) self.log('Missing forms:', missing)
python
def cli_forms(self, *args): """List all available form definitions""" forms = [] missing = [] for key, item in schemastore.items(): if 'form' in item and len(item['form']) > 0: forms.append(key) else: missing.append(key) self.log('Schemata with form:', forms) self.log('Missing forms:', missing)
[ "def", "cli_forms", "(", "self", ",", "*", "args", ")", ":", "forms", "=", "[", "]", "missing", "=", "[", "]", "for", "key", ",", "item", "in", "schemastore", ".", "items", "(", ")", ":", "if", "'form'", "in", "item", "and", "len", "(", "item", "[", "'form'", "]", ")", ">", "0", ":", "forms", ".", "append", "(", "key", ")", "else", ":", "missing", ".", "append", "(", "key", ")", "self", ".", "log", "(", "'Schemata with form:'", ",", "forms", ")", "self", ".", "log", "(", "'Missing forms:'", ",", "missing", ")" ]
List all available form definitions
[ "List", "all", "available", "form", "definitions" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L147-L160
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.cli_default_perms
def cli_default_perms(self, *args): """Show default permissions for all schemata""" for key, item in schemastore.items(): # self.log(item, pretty=True) if item['schema'].get('no_perms', False): self.log('Schema without permissions:', key) continue try: perms = item['schema']['properties']['perms']['properties'] if perms == {}: self.log('Schema:', item, pretty=True) self.log( 'Schema:', key, 'read', perms['read']['default'], 'write', perms['write']['default'], 'list', perms['list']['default'], 'create', item['schema']['roles_create'] ) except KeyError as e: self.log('Fishy schema found:', key, e, lvl=error) self.log(item, pretty=True)
python
def cli_default_perms(self, *args): """Show default permissions for all schemata""" for key, item in schemastore.items(): # self.log(item, pretty=True) if item['schema'].get('no_perms', False): self.log('Schema without permissions:', key) continue try: perms = item['schema']['properties']['perms']['properties'] if perms == {}: self.log('Schema:', item, pretty=True) self.log( 'Schema:', key, 'read', perms['read']['default'], 'write', perms['write']['default'], 'list', perms['list']['default'], 'create', item['schema']['roles_create'] ) except KeyError as e: self.log('Fishy schema found:', key, e, lvl=error) self.log(item, pretty=True)
[ "def", "cli_default_perms", "(", "self", ",", "*", "args", ")", ":", "for", "key", ",", "item", "in", "schemastore", ".", "items", "(", ")", ":", "# self.log(item, pretty=True)", "if", "item", "[", "'schema'", "]", ".", "get", "(", "'no_perms'", ",", "False", ")", ":", "self", ".", "log", "(", "'Schema without permissions:'", ",", "key", ")", "continue", "try", ":", "perms", "=", "item", "[", "'schema'", "]", "[", "'properties'", "]", "[", "'perms'", "]", "[", "'properties'", "]", "if", "perms", "==", "{", "}", ":", "self", ".", "log", "(", "'Schema:'", ",", "item", ",", "pretty", "=", "True", ")", "self", ".", "log", "(", "'Schema:'", ",", "key", ",", "'read'", ",", "perms", "[", "'read'", "]", "[", "'default'", "]", ",", "'write'", ",", "perms", "[", "'write'", "]", "[", "'default'", "]", ",", "'list'", ",", "perms", "[", "'list'", "]", "[", "'default'", "]", ",", "'create'", ",", "item", "[", "'schema'", "]", "[", "'roles_create'", "]", ")", "except", "KeyError", "as", "e", ":", "self", ".", "log", "(", "'Fishy schema found:'", ",", "key", ",", "e", ",", "lvl", "=", "error", ")", "self", ".", "log", "(", "item", ",", "pretty", "=", "True", ")" ]
Show default permissions for all schemata
[ "Show", "default", "permissions", "for", "all", "schemata" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L163-L185
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.ready
def ready(self): """Sets up the application after startup.""" self.log('Got', len(schemastore), 'data and', len(configschemastore), 'component schemata.', lvl=debug)
python
def ready(self): """Sets up the application after startup.""" self.log('Got', len(schemastore), 'data and', len(configschemastore), 'component schemata.', lvl=debug)
[ "def", "ready", "(", "self", ")", ":", "self", ".", "log", "(", "'Got'", ",", "len", "(", "schemastore", ")", ",", "'data and'", ",", "len", "(", "configschemastore", ")", ",", "'component schemata.'", ",", "lvl", "=", "debug", ")" ]
Sets up the application after startup.
[ "Sets", "up", "the", "application", "after", "startup", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L188-L192
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.all
def all(self, event): """Return all known schemata to the requesting client""" self.log("Schemarequest for all schemata from", event.user, lvl=debug) response = { 'component': 'hfos.events.schemamanager', 'action': 'all', 'data': l10n_schemastore[event.client.language] } self.fireEvent(send(event.client.uuid, response))
python
def all(self, event): """Return all known schemata to the requesting client""" self.log("Schemarequest for all schemata from", event.user, lvl=debug) response = { 'component': 'hfos.events.schemamanager', 'action': 'all', 'data': l10n_schemastore[event.client.language] } self.fireEvent(send(event.client.uuid, response))
[ "def", "all", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "\"Schemarequest for all schemata from\"", ",", "event", ".", "user", ",", "lvl", "=", "debug", ")", "response", "=", "{", "'component'", ":", "'hfos.events.schemamanager'", ",", "'action'", ":", "'all'", ",", "'data'", ":", "l10n_schemastore", "[", "event", ".", "client", ".", "language", "]", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "response", ")", ")" ]
Return all known schemata to the requesting client
[ "Return", "all", "known", "schemata", "to", "the", "requesting", "client" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L198-L208
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.get
def get(self, event): """Return a single schema""" self.log("Schemarequest for", event.data, "from", event.user, lvl=debug) if event.data in schemastore: response = { 'component': 'hfos.events.schemamanager', 'action': 'get', 'data': l10n_schemastore[event.client.language][event.data] } self.fireEvent(send(event.client.uuid, response)) else: self.log("Unavailable schema requested!", lvl=warn)
python
def get(self, event): """Return a single schema""" self.log("Schemarequest for", event.data, "from", event.user, lvl=debug) if event.data in schemastore: response = { 'component': 'hfos.events.schemamanager', 'action': 'get', 'data': l10n_schemastore[event.client.language][event.data] } self.fireEvent(send(event.client.uuid, response)) else: self.log("Unavailable schema requested!", lvl=warn)
[ "def", "get", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "\"Schemarequest for\"", ",", "event", ".", "data", ",", "\"from\"", ",", "event", ".", "user", ",", "lvl", "=", "debug", ")", "if", "event", ".", "data", "in", "schemastore", ":", "response", "=", "{", "'component'", ":", "'hfos.events.schemamanager'", ",", "'action'", ":", "'get'", ",", "'data'", ":", "l10n_schemastore", "[", "event", ".", "client", ".", "language", "]", "[", "event", ".", "data", "]", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "response", ")", ")", "else", ":", "self", ".", "log", "(", "\"Unavailable schema requested!\"", ",", "lvl", "=", "warn", ")" ]
Return a single schema
[ "Return", "a", "single", "schema" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L211-L223
Hackerfleet/hfos
hfos/ui/schemamanager.py
SchemaManager.configuration
def configuration(self, event): """Return all configurable components' schemata""" try: self.log("Schemarequest for all configuration schemata from", event.user.account.name, lvl=debug) response = { 'component': 'hfos.events.schemamanager', 'action': 'configuration', 'data': configschemastore } self.fireEvent(send(event.client.uuid, response)) except Exception as e: self.log("ERROR:", e)
python
def configuration(self, event): """Return all configurable components' schemata""" try: self.log("Schemarequest for all configuration schemata from", event.user.account.name, lvl=debug) response = { 'component': 'hfos.events.schemamanager', 'action': 'configuration', 'data': configschemastore } self.fireEvent(send(event.client.uuid, response)) except Exception as e: self.log("ERROR:", e)
[ "def", "configuration", "(", "self", ",", "event", ")", ":", "try", ":", "self", ".", "log", "(", "\"Schemarequest for all configuration schemata from\"", ",", "event", ".", "user", ".", "account", ".", "name", ",", "lvl", "=", "debug", ")", "response", "=", "{", "'component'", ":", "'hfos.events.schemamanager'", ",", "'action'", ":", "'configuration'", ",", "'data'", ":", "configschemastore", "}", "self", ".", "fireEvent", "(", "send", "(", "event", ".", "client", ".", "uuid", ",", "response", ")", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"ERROR:\"", ",", "e", ")" ]
Return all configurable components' schemata
[ "Return", "all", "configurable", "components", "schemata" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/ui/schemamanager.py#L226-L239
Hackerfleet/hfos
hfos/schemata/base.py
uuid_object
def uuid_object(title="Reference", description="Select an object", default=None, display=True): """Generates a regular expression controlled UUID field""" uuid = { 'pattern': '^[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{' '4}-[' 'a-fA-F0-9]{4}-[a-fA-F0-9]{12}$', 'type': 'string', 'title': title, 'description': description, } if not display: uuid['x-schema-form'] = { 'condition': "false" } if default is not None: uuid['default'] = default return uuid
python
def uuid_object(title="Reference", description="Select an object", default=None, display=True): """Generates a regular expression controlled UUID field""" uuid = { 'pattern': '^[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{' '4}-[' 'a-fA-F0-9]{4}-[a-fA-F0-9]{12}$', 'type': 'string', 'title': title, 'description': description, } if not display: uuid['x-schema-form'] = { 'condition': "false" } if default is not None: uuid['default'] = default return uuid
[ "def", "uuid_object", "(", "title", "=", "\"Reference\"", ",", "description", "=", "\"Select an object\"", ",", "default", "=", "None", ",", "display", "=", "True", ")", ":", "uuid", "=", "{", "'pattern'", ":", "'^[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{'", "'4}-['", "'a-fA-F0-9]{4}-[a-fA-F0-9]{12}$'", ",", "'type'", ":", "'string'", ",", "'title'", ":", "title", ",", "'description'", ":", "description", ",", "}", "if", "not", "display", ":", "uuid", "[", "'x-schema-form'", "]", "=", "{", "'condition'", ":", "\"false\"", "}", "if", "default", "is", "not", "None", ":", "uuid", "[", "'default'", "]", "=", "default", "return", "uuid" ]
Generates a regular expression controlled UUID field
[ "Generates", "a", "regular", "expression", "controlled", "UUID", "field" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/schemata/base.py#L42-L62
Hackerfleet/hfos
hfos/schemata/base.py
base_object
def base_object(name, no_perms=False, has_owner=True, hide_owner=True, has_uuid=True, roles_write=None, roles_read=None, roles_list=None, roles_create=None, all_roles=None): """Generates a basic object with RBAC properties""" base_schema = { 'id': '#' + name, 'type': 'object', 'name': name, 'properties': {} } if not no_perms: if all_roles: roles_create = ['admin', all_roles] roles_write = ['admin', all_roles] roles_read = ['admin', all_roles] roles_list = ['admin', all_roles] else: if roles_write is None: roles_write = ['admin'] if roles_read is None: roles_read = ['admin'] if roles_list is None: roles_list = ['admin'] if roles_create is None: roles_create = ['admin'] if isinstance(roles_create, str): roles_create = [roles_create] if isinstance(roles_write, str): roles_write = [roles_write] if isinstance(roles_read, str): roles_read = [roles_read] if isinstance(roles_list, str): roles_list = [roles_list] if has_owner: roles_write.append('owner') roles_read.append('owner') roles_list.append('owner') base_schema['roles_create'] = roles_create base_schema['properties'].update({ 'perms': { 'id': '#perms', 'type': 'object', 'name': 'perms', 'properties': { 'write': { 'type': 'array', 'default': roles_write, 'items': { 'type': 'string', } }, 'read': { 'type': 'array', 'default': roles_read, 'items': { 'type': 'string', } }, 'list': { 'type': 'array', 'default': roles_list, 'items': { 'type': 'string', } } }, 'default': {}, 'x-schema-form': { 'condition': "false" } }, 'name': { 'type': 'string', 'description': 'Name of ' + name } }) if has_owner: # TODO: Schema should allow specification of non-local owners as # well as special accounts like admin or even system perhaps # base_schema['required'] = base_schema.get('required', []) # base_schema['required'].append('owner') base_schema['properties'].update({ 'owner': uuid_object(title='Unique Owner ID', display=hide_owner) }) else: base_schema['no_perms'] = True # TODO: Using this causes all sorts of (obvious) problems with the object # manager if has_uuid: base_schema['properties'].update({ 'uuid': uuid_object(title='Unique ' + name + ' ID', display=False) }) base_schema['required'] = ["uuid"] return base_schema
python
def base_object(name, no_perms=False, has_owner=True, hide_owner=True, has_uuid=True, roles_write=None, roles_read=None, roles_list=None, roles_create=None, all_roles=None): """Generates a basic object with RBAC properties""" base_schema = { 'id': '#' + name, 'type': 'object', 'name': name, 'properties': {} } if not no_perms: if all_roles: roles_create = ['admin', all_roles] roles_write = ['admin', all_roles] roles_read = ['admin', all_roles] roles_list = ['admin', all_roles] else: if roles_write is None: roles_write = ['admin'] if roles_read is None: roles_read = ['admin'] if roles_list is None: roles_list = ['admin'] if roles_create is None: roles_create = ['admin'] if isinstance(roles_create, str): roles_create = [roles_create] if isinstance(roles_write, str): roles_write = [roles_write] if isinstance(roles_read, str): roles_read = [roles_read] if isinstance(roles_list, str): roles_list = [roles_list] if has_owner: roles_write.append('owner') roles_read.append('owner') roles_list.append('owner') base_schema['roles_create'] = roles_create base_schema['properties'].update({ 'perms': { 'id': '#perms', 'type': 'object', 'name': 'perms', 'properties': { 'write': { 'type': 'array', 'default': roles_write, 'items': { 'type': 'string', } }, 'read': { 'type': 'array', 'default': roles_read, 'items': { 'type': 'string', } }, 'list': { 'type': 'array', 'default': roles_list, 'items': { 'type': 'string', } } }, 'default': {}, 'x-schema-form': { 'condition': "false" } }, 'name': { 'type': 'string', 'description': 'Name of ' + name } }) if has_owner: # TODO: Schema should allow specification of non-local owners as # well as special accounts like admin or even system perhaps # base_schema['required'] = base_schema.get('required', []) # base_schema['required'].append('owner') base_schema['properties'].update({ 'owner': uuid_object(title='Unique Owner ID', display=hide_owner) }) else: base_schema['no_perms'] = True # TODO: Using this causes all sorts of (obvious) problems with the object # manager if has_uuid: base_schema['properties'].update({ 'uuid': uuid_object(title='Unique ' + name + ' ID', display=False) }) base_schema['required'] = ["uuid"] return base_schema
[ "def", "base_object", "(", "name", ",", "no_perms", "=", "False", ",", "has_owner", "=", "True", ",", "hide_owner", "=", "True", ",", "has_uuid", "=", "True", ",", "roles_write", "=", "None", ",", "roles_read", "=", "None", ",", "roles_list", "=", "None", ",", "roles_create", "=", "None", ",", "all_roles", "=", "None", ")", ":", "base_schema", "=", "{", "'id'", ":", "'#'", "+", "name", ",", "'type'", ":", "'object'", ",", "'name'", ":", "name", ",", "'properties'", ":", "{", "}", "}", "if", "not", "no_perms", ":", "if", "all_roles", ":", "roles_create", "=", "[", "'admin'", ",", "all_roles", "]", "roles_write", "=", "[", "'admin'", ",", "all_roles", "]", "roles_read", "=", "[", "'admin'", ",", "all_roles", "]", "roles_list", "=", "[", "'admin'", ",", "all_roles", "]", "else", ":", "if", "roles_write", "is", "None", ":", "roles_write", "=", "[", "'admin'", "]", "if", "roles_read", "is", "None", ":", "roles_read", "=", "[", "'admin'", "]", "if", "roles_list", "is", "None", ":", "roles_list", "=", "[", "'admin'", "]", "if", "roles_create", "is", "None", ":", "roles_create", "=", "[", "'admin'", "]", "if", "isinstance", "(", "roles_create", ",", "str", ")", ":", "roles_create", "=", "[", "roles_create", "]", "if", "isinstance", "(", "roles_write", ",", "str", ")", ":", "roles_write", "=", "[", "roles_write", "]", "if", "isinstance", "(", "roles_read", ",", "str", ")", ":", "roles_read", "=", "[", "roles_read", "]", "if", "isinstance", "(", "roles_list", ",", "str", ")", ":", "roles_list", "=", "[", "roles_list", "]", "if", "has_owner", ":", "roles_write", ".", "append", "(", "'owner'", ")", "roles_read", ".", "append", "(", "'owner'", ")", "roles_list", ".", "append", "(", "'owner'", ")", "base_schema", "[", "'roles_create'", "]", "=", "roles_create", "base_schema", "[", "'properties'", "]", ".", "update", "(", "{", "'perms'", ":", "{", "'id'", ":", "'#perms'", ",", "'type'", ":", "'object'", ",", "'name'", ":", "'perms'", ",", "'properties'", ":", "{", "'write'", ":", "{", "'type'", ":", "'array'", ",", "'default'", ":", "roles_write", ",", "'items'", ":", "{", "'type'", ":", "'string'", ",", "}", "}", ",", "'read'", ":", "{", "'type'", ":", "'array'", ",", "'default'", ":", "roles_read", ",", "'items'", ":", "{", "'type'", ":", "'string'", ",", "}", "}", ",", "'list'", ":", "{", "'type'", ":", "'array'", ",", "'default'", ":", "roles_list", ",", "'items'", ":", "{", "'type'", ":", "'string'", ",", "}", "}", "}", ",", "'default'", ":", "{", "}", ",", "'x-schema-form'", ":", "{", "'condition'", ":", "\"false\"", "}", "}", ",", "'name'", ":", "{", "'type'", ":", "'string'", ",", "'description'", ":", "'Name of '", "+", "name", "}", "}", ")", "if", "has_owner", ":", "# TODO: Schema should allow specification of non-local owners as", "# well as special accounts like admin or even system perhaps", "# base_schema['required'] = base_schema.get('required', [])", "# base_schema['required'].append('owner')", "base_schema", "[", "'properties'", "]", ".", "update", "(", "{", "'owner'", ":", "uuid_object", "(", "title", "=", "'Unique Owner ID'", ",", "display", "=", "hide_owner", ")", "}", ")", "else", ":", "base_schema", "[", "'no_perms'", "]", "=", "True", "# TODO: Using this causes all sorts of (obvious) problems with the object", "# manager", "if", "has_uuid", ":", "base_schema", "[", "'properties'", "]", ".", "update", "(", "{", "'uuid'", ":", "uuid_object", "(", "title", "=", "'Unique '", "+", "name", "+", "' ID'", ",", "display", "=", "False", ")", "}", ")", "base_schema", "[", "'required'", "]", "=", "[", "\"uuid\"", "]", "return", "base_schema" ]
Generates a basic object with RBAC properties
[ "Generates", "a", "basic", "object", "with", "RBAC", "properties" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/schemata/base.py#L65-L172
Hackerfleet/hfos
modules/navdata/hfos/navdata/sensors.py
serial_ports
def serial_ports(): """ Lists serial port names :raises EnvironmentError: On unsupported or unknown platforms :returns: A list of the serial ports available on the system Courtesy: Thomas ( http://stackoverflow.com/questions/12090503 /listing-available-com-ports-with-python ) """ if sys.platform.startswith('win'): ports = ['COM%s' % (i + 1) for i in range(256)] elif sys.platform.startswith('linux') or sys.platform.startswith('cygwin'): # this excludes your current terminal "/dev/tty" ports = glob.glob('/dev/tty[A-Za-z]*') elif sys.platform.startswith('darwin'): ports = glob.glob('/dev/tty.*') else: raise EnvironmentError('Unsupported platform') result = [] for port in ports: try: s = serial.Serial(port) s.close() result.append(port) except (OSError, serial.SerialException) as e: hfoslog('Could not open serial port:', port, e, type(e), exc=True, lvl=warn) return result
python
def serial_ports(): """ Lists serial port names :raises EnvironmentError: On unsupported or unknown platforms :returns: A list of the serial ports available on the system Courtesy: Thomas ( http://stackoverflow.com/questions/12090503 /listing-available-com-ports-with-python ) """ if sys.platform.startswith('win'): ports = ['COM%s' % (i + 1) for i in range(256)] elif sys.platform.startswith('linux') or sys.platform.startswith('cygwin'): # this excludes your current terminal "/dev/tty" ports = glob.glob('/dev/tty[A-Za-z]*') elif sys.platform.startswith('darwin'): ports = glob.glob('/dev/tty.*') else: raise EnvironmentError('Unsupported platform') result = [] for port in ports: try: s = serial.Serial(port) s.close() result.append(port) except (OSError, serial.SerialException) as e: hfoslog('Could not open serial port:', port, e, type(e), exc=True, lvl=warn) return result
[ "def", "serial_ports", "(", ")", ":", "if", "sys", ".", "platform", ".", "startswith", "(", "'win'", ")", ":", "ports", "=", "[", "'COM%s'", "%", "(", "i", "+", "1", ")", "for", "i", "in", "range", "(", "256", ")", "]", "elif", "sys", ".", "platform", ".", "startswith", "(", "'linux'", ")", "or", "sys", ".", "platform", ".", "startswith", "(", "'cygwin'", ")", ":", "# this excludes your current terminal \"/dev/tty\"", "ports", "=", "glob", ".", "glob", "(", "'/dev/tty[A-Za-z]*'", ")", "elif", "sys", ".", "platform", ".", "startswith", "(", "'darwin'", ")", ":", "ports", "=", "glob", ".", "glob", "(", "'/dev/tty.*'", ")", "else", ":", "raise", "EnvironmentError", "(", "'Unsupported platform'", ")", "result", "=", "[", "]", "for", "port", "in", "ports", ":", "try", ":", "s", "=", "serial", ".", "Serial", "(", "port", ")", "s", ".", "close", "(", ")", "result", ".", "append", "(", "port", ")", "except", "(", "OSError", ",", "serial", ".", "SerialException", ")", "as", "e", ":", "hfoslog", "(", "'Could not open serial port:'", ",", "port", ",", "e", ",", "type", "(", "e", ")", ",", "exc", "=", "True", ",", "lvl", "=", "warn", ")", "return", "result" ]
Lists serial port names :raises EnvironmentError: On unsupported or unknown platforms :returns: A list of the serial ports available on the system Courtesy: Thomas ( http://stackoverflow.com/questions/12090503 /listing-available-com-ports-with-python )
[ "Lists", "serial", "port", "names" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/navdata/hfos/navdata/sensors.py#L61-L91
Hackerfleet/hfos
modules/navdata/hfos/navdata/sensors.py
Sensors.sensordata
def sensordata(self, event): """ Generates a new reference frame from incoming sensordata :param event: new sensordata to be merged into referenceframe """ if len(self.datatypes) == 0: return data = event.data timestamp = event.timestamp # bus = event.bus # TODO: What about multiple busses? That is prepared, but how exactly # should they be handled? self.log("New incoming navdata:", data, lvl=verbose) for name, value in data.items(): if name in self.datatypes: ref = self.datatypes[name] self.sensed[name] = ref if ref.lastvalue != str(value): # self.log("Reference outdated:", ref._fields) item = { 'value': value, 'timestamp': timestamp, 'type': name } self.referenceframe[name] = value self.referenceages[name] = timestamp # self.log("Subscriptions:", self.subscriptions, ref.name) if ref.name in self.subscriptions: packet = { 'component': 'hfos.navdata.sensors', 'action': 'update', 'data': item } self.log("Serving update: ", packet, lvl=verbose) for uuid in self.subscriptions[ref.name]: self.log("Serving to ", uuid, lvl=events) self.fireEvent(send(uuid, packet), 'hfosweb') # self.log("New item: ", item) sensordata = objectmodels['sensordata'](item) # self.log("Value entry:", sensordata._fields) if ref.record: self.log("Recording updated reference:", sensordata._fields) sensordata.save() ref.lastvalue = str(value) ref.timestamp = timestamp else: self.log("Unknown sensor data received!", data, lvl=warn)
python
def sensordata(self, event): """ Generates a new reference frame from incoming sensordata :param event: new sensordata to be merged into referenceframe """ if len(self.datatypes) == 0: return data = event.data timestamp = event.timestamp # bus = event.bus # TODO: What about multiple busses? That is prepared, but how exactly # should they be handled? self.log("New incoming navdata:", data, lvl=verbose) for name, value in data.items(): if name in self.datatypes: ref = self.datatypes[name] self.sensed[name] = ref if ref.lastvalue != str(value): # self.log("Reference outdated:", ref._fields) item = { 'value': value, 'timestamp': timestamp, 'type': name } self.referenceframe[name] = value self.referenceages[name] = timestamp # self.log("Subscriptions:", self.subscriptions, ref.name) if ref.name in self.subscriptions: packet = { 'component': 'hfos.navdata.sensors', 'action': 'update', 'data': item } self.log("Serving update: ", packet, lvl=verbose) for uuid in self.subscriptions[ref.name]: self.log("Serving to ", uuid, lvl=events) self.fireEvent(send(uuid, packet), 'hfosweb') # self.log("New item: ", item) sensordata = objectmodels['sensordata'](item) # self.log("Value entry:", sensordata._fields) if ref.record: self.log("Recording updated reference:", sensordata._fields) sensordata.save() ref.lastvalue = str(value) ref.timestamp = timestamp else: self.log("Unknown sensor data received!", data, lvl=warn)
[ "def", "sensordata", "(", "self", ",", "event", ")", ":", "if", "len", "(", "self", ".", "datatypes", ")", "==", "0", ":", "return", "data", "=", "event", ".", "data", "timestamp", "=", "event", ".", "timestamp", "# bus = event.bus", "# TODO: What about multiple busses? That is prepared, but how exactly", "# should they be handled?", "self", ".", "log", "(", "\"New incoming navdata:\"", ",", "data", ",", "lvl", "=", "verbose", ")", "for", "name", ",", "value", "in", "data", ".", "items", "(", ")", ":", "if", "name", "in", "self", ".", "datatypes", ":", "ref", "=", "self", ".", "datatypes", "[", "name", "]", "self", ".", "sensed", "[", "name", "]", "=", "ref", "if", "ref", ".", "lastvalue", "!=", "str", "(", "value", ")", ":", "# self.log(\"Reference outdated:\", ref._fields)", "item", "=", "{", "'value'", ":", "value", ",", "'timestamp'", ":", "timestamp", ",", "'type'", ":", "name", "}", "self", ".", "referenceframe", "[", "name", "]", "=", "value", "self", ".", "referenceages", "[", "name", "]", "=", "timestamp", "# self.log(\"Subscriptions:\", self.subscriptions, ref.name)", "if", "ref", ".", "name", "in", "self", ".", "subscriptions", ":", "packet", "=", "{", "'component'", ":", "'hfos.navdata.sensors'", ",", "'action'", ":", "'update'", ",", "'data'", ":", "item", "}", "self", ".", "log", "(", "\"Serving update: \"", ",", "packet", ",", "lvl", "=", "verbose", ")", "for", "uuid", "in", "self", ".", "subscriptions", "[", "ref", ".", "name", "]", ":", "self", ".", "log", "(", "\"Serving to \"", ",", "uuid", ",", "lvl", "=", "events", ")", "self", ".", "fireEvent", "(", "send", "(", "uuid", ",", "packet", ")", ",", "'hfosweb'", ")", "# self.log(\"New item: \", item)", "sensordata", "=", "objectmodels", "[", "'sensordata'", "]", "(", "item", ")", "# self.log(\"Value entry:\", sensordata._fields)", "if", "ref", ".", "record", ":", "self", ".", "log", "(", "\"Recording updated reference:\"", ",", "sensordata", ".", "_fields", ")", "sensordata", ".", "save", "(", ")", "ref", ".", "lastvalue", "=", "str", "(", "value", ")", "ref", ".", "timestamp", "=", "timestamp", "else", ":", "self", ".", "log", "(", "\"Unknown sensor data received!\"", ",", "data", ",", "lvl", "=", "warn", ")" ]
Generates a new reference frame from incoming sensordata :param event: new sensordata to be merged into referenceframe
[ "Generates", "a", "new", "reference", "frame", "from", "incoming", "sensordata" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/navdata/hfos/navdata/sensors.py#L225-L288
Hackerfleet/hfos
modules/navdata/hfos/navdata/sensors.py
Sensors.navdatapush
def navdatapush(self): """ Pushes the current :referenceframe: out to clients. :return: """ try: self.fireEvent(referenceframe({ 'data': self.referenceframe, 'ages': self.referenceages }), "navdata") self.intervalcount += 1 if self.intervalcount == self.passiveinterval and len( self.referenceframe) > 0: self.fireEvent(broadcast('users', { 'component': 'hfos.navdata.sensors', 'action': 'update', 'data': { 'data': self.referenceframe, 'ages': self.referenceages } }), "hfosweb") self.intervalcount = 0 # self.log("Reference frame successfully pushed.", # lvl=verbose) except Exception as e: self.log("Could not push referenceframe: ", e, type(e), lvl=critical)
python
def navdatapush(self): """ Pushes the current :referenceframe: out to clients. :return: """ try: self.fireEvent(referenceframe({ 'data': self.referenceframe, 'ages': self.referenceages }), "navdata") self.intervalcount += 1 if self.intervalcount == self.passiveinterval and len( self.referenceframe) > 0: self.fireEvent(broadcast('users', { 'component': 'hfos.navdata.sensors', 'action': 'update', 'data': { 'data': self.referenceframe, 'ages': self.referenceages } }), "hfosweb") self.intervalcount = 0 # self.log("Reference frame successfully pushed.", # lvl=verbose) except Exception as e: self.log("Could not push referenceframe: ", e, type(e), lvl=critical)
[ "def", "navdatapush", "(", "self", ")", ":", "try", ":", "self", ".", "fireEvent", "(", "referenceframe", "(", "{", "'data'", ":", "self", ".", "referenceframe", ",", "'ages'", ":", "self", ".", "referenceages", "}", ")", ",", "\"navdata\"", ")", "self", ".", "intervalcount", "+=", "1", "if", "self", ".", "intervalcount", "==", "self", ".", "passiveinterval", "and", "len", "(", "self", ".", "referenceframe", ")", ">", "0", ":", "self", ".", "fireEvent", "(", "broadcast", "(", "'users'", ",", "{", "'component'", ":", "'hfos.navdata.sensors'", ",", "'action'", ":", "'update'", ",", "'data'", ":", "{", "'data'", ":", "self", ".", "referenceframe", ",", "'ages'", ":", "self", ".", "referenceages", "}", "}", ")", ",", "\"hfosweb\"", ")", "self", ".", "intervalcount", "=", "0", "# self.log(\"Reference frame successfully pushed.\",", "# lvl=verbose)", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Could not push referenceframe: \"", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "critical", ")" ]
Pushes the current :referenceframe: out to clients. :return:
[ "Pushes", "the", "current", ":", "referenceframe", ":", "out", "to", "clients", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/navdata/hfos/navdata/sensors.py#L290-L318
Hackerfleet/hfos
hfos/tool/backup.py
db_export
def db_export(schema, uuid, object_filter, export_format, filename, pretty, all_schemata, omit): """Export stored objects Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!""" internal_backup(schema, uuid, object_filter, export_format, filename, pretty, all_schemata, omit)
python
def db_export(schema, uuid, object_filter, export_format, filename, pretty, all_schemata, omit): """Export stored objects Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!""" internal_backup(schema, uuid, object_filter, export_format, filename, pretty, all_schemata, omit)
[ "def", "db_export", "(", "schema", ",", "uuid", ",", "object_filter", ",", "export_format", ",", "filename", ",", "pretty", ",", "all_schemata", ",", "omit", ")", ":", "internal_backup", "(", "schema", ",", "uuid", ",", "object_filter", ",", "export_format", ",", "filename", ",", "pretty", ",", "all_schemata", ",", "omit", ")" ]
Export stored objects Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!
[ "Export", "stored", "objects" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/backup.py#L45-L51
Hackerfleet/hfos
hfos/tool/backup.py
db_import
def db_import(ctx, schema, uuid, object_filter, import_format, filename, all_schemata, dry): """Import objects from file Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!""" import_format = import_format.upper() with open(filename, 'r') as f: json_data = f.read() data = json.loads(json_data) # , parse_float=True, parse_int=True) if schema is None: if all_schemata is False: log('No schema given. Read the help', lvl=warn) return else: schemata = data.keys() else: schemata = [schema] from hfos import database database.initialize(ctx.obj['dbhost'], ctx.obj['dbname']) all_items = {} total = 0 for schema_item in schemata: model = database.objectmodels[schema_item] objects = data[schema_item] if uuid: for item in objects: if item['uuid'] == uuid: items = [model(item)] else: items = [] for item in objects: thing = model(item) items.append(thing) schema_total = len(items) total += schema_total if dry: log('Would import', schema_total, 'items of', schema_item) all_items[schema_item] = items if dry: log('Would import', total, 'objects.') else: log('Importing', total, 'objects.') for schema_name, item_list in all_items.items(): log('Importing', len(item_list), 'objects of type', schema_name) for item in item_list: item._fields['_id'] = bson.objectid.ObjectId(item._fields['_id']) item.save()
python
def db_import(ctx, schema, uuid, object_filter, import_format, filename, all_schemata, dry): """Import objects from file Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!""" import_format = import_format.upper() with open(filename, 'r') as f: json_data = f.read() data = json.loads(json_data) # , parse_float=True, parse_int=True) if schema is None: if all_schemata is False: log('No schema given. Read the help', lvl=warn) return else: schemata = data.keys() else: schemata = [schema] from hfos import database database.initialize(ctx.obj['dbhost'], ctx.obj['dbname']) all_items = {} total = 0 for schema_item in schemata: model = database.objectmodels[schema_item] objects = data[schema_item] if uuid: for item in objects: if item['uuid'] == uuid: items = [model(item)] else: items = [] for item in objects: thing = model(item) items.append(thing) schema_total = len(items) total += schema_total if dry: log('Would import', schema_total, 'items of', schema_item) all_items[schema_item] = items if dry: log('Would import', total, 'objects.') else: log('Importing', total, 'objects.') for schema_name, item_list in all_items.items(): log('Importing', len(item_list), 'objects of type', schema_name) for item in item_list: item._fields['_id'] = bson.objectid.ObjectId(item._fields['_id']) item.save()
[ "def", "db_import", "(", "ctx", ",", "schema", ",", "uuid", ",", "object_filter", ",", "import_format", ",", "filename", ",", "all_schemata", ",", "dry", ")", ":", "import_format", "=", "import_format", ".", "upper", "(", ")", "with", "open", "(", "filename", ",", "'r'", ")", "as", "f", ":", "json_data", "=", "f", ".", "read", "(", ")", "data", "=", "json", ".", "loads", "(", "json_data", ")", "# , parse_float=True, parse_int=True)", "if", "schema", "is", "None", ":", "if", "all_schemata", "is", "False", ":", "log", "(", "'No schema given. Read the help'", ",", "lvl", "=", "warn", ")", "return", "else", ":", "schemata", "=", "data", ".", "keys", "(", ")", "else", ":", "schemata", "=", "[", "schema", "]", "from", "hfos", "import", "database", "database", ".", "initialize", "(", "ctx", ".", "obj", "[", "'dbhost'", "]", ",", "ctx", ".", "obj", "[", "'dbname'", "]", ")", "all_items", "=", "{", "}", "total", "=", "0", "for", "schema_item", "in", "schemata", ":", "model", "=", "database", ".", "objectmodels", "[", "schema_item", "]", "objects", "=", "data", "[", "schema_item", "]", "if", "uuid", ":", "for", "item", "in", "objects", ":", "if", "item", "[", "'uuid'", "]", "==", "uuid", ":", "items", "=", "[", "model", "(", "item", ")", "]", "else", ":", "items", "=", "[", "]", "for", "item", "in", "objects", ":", "thing", "=", "model", "(", "item", ")", "items", ".", "append", "(", "thing", ")", "schema_total", "=", "len", "(", "items", ")", "total", "+=", "schema_total", "if", "dry", ":", "log", "(", "'Would import'", ",", "schema_total", ",", "'items of'", ",", "schema_item", ")", "all_items", "[", "schema_item", "]", "=", "items", "if", "dry", ":", "log", "(", "'Would import'", ",", "total", ",", "'objects.'", ")", "else", ":", "log", "(", "'Importing'", ",", "total", ",", "'objects.'", ")", "for", "schema_name", ",", "item_list", "in", "all_items", ".", "items", "(", ")", ":", "log", "(", "'Importing'", ",", "len", "(", "item_list", ")", ",", "'objects of type'", ",", "schema_name", ")", "for", "item", "in", "item_list", ":", "item", ".", "_fields", "[", "'_id'", "]", "=", "bson", ".", "objectid", ".", "ObjectId", "(", "item", ".", "_fields", "[", "'_id'", "]", ")", "item", ".", "save", "(", ")" ]
Import objects from file Warning! This functionality is work in progress and you may destroy live data by using it! Be very careful when using the export/import functionality!
[ "Import", "objects", "from", "file" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/backup.py#L65-L121
Hackerfleet/hfos
modules/wiki/hfos/wiki/wiki.py
Wiki._page_update
def _page_update(self, event): """ Checks if the newly created object is a wikipage.. If so, rerenders the automatic index. :param event: objectchange or objectcreation event """ try: if event.schema == 'wikipage': self._update_index() except Exception as e: self.log("Page creation notification error: ", event, e, type(e), lvl=error)
python
def _page_update(self, event): """ Checks if the newly created object is a wikipage.. If so, rerenders the automatic index. :param event: objectchange or objectcreation event """ try: if event.schema == 'wikipage': self._update_index() except Exception as e: self.log("Page creation notification error: ", event, e, type(e), lvl=error)
[ "def", "_page_update", "(", "self", ",", "event", ")", ":", "try", ":", "if", "event", ".", "schema", "==", "'wikipage'", ":", "self", ".", "_update_index", "(", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Page creation notification error: \"", ",", "event", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ")" ]
Checks if the newly created object is a wikipage.. If so, rerenders the automatic index. :param event: objectchange or objectcreation event
[ "Checks", "if", "the", "newly", "created", "object", "is", "a", "wikipage", "..", "If", "so", "rerenders", "the", "automatic", "index", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/wiki/hfos/wiki/wiki.py#L73-L86
Hackerfleet/hfos
hfos/launcher.py
drop_privileges
def drop_privileges(uid_name='hfos', gid_name='hfos'): """Attempt to drop privileges and change user to 'hfos' user/group""" if os.getuid() != 0: hfoslog("Not root, cannot drop privileges", lvl=warn, emitter='CORE') return try: # Get the uid/gid from the name running_uid = pwd.getpwnam(uid_name).pw_uid running_gid = grp.getgrnam(gid_name).gr_gid # Remove group privileges os.setgroups([]) # Try setting the new uid/gid os.setgid(running_gid) os.setuid(running_uid) # Ensure a very conservative umask # old_umask = os.umask(22) hfoslog('Privileges dropped', emitter='CORE') except Exception as e: hfoslog('Could not drop privileges:', e, type(e), exc=True, lvl=error, emitter='CORE')
python
def drop_privileges(uid_name='hfos', gid_name='hfos'): """Attempt to drop privileges and change user to 'hfos' user/group""" if os.getuid() != 0: hfoslog("Not root, cannot drop privileges", lvl=warn, emitter='CORE') return try: # Get the uid/gid from the name running_uid = pwd.getpwnam(uid_name).pw_uid running_gid = grp.getgrnam(gid_name).gr_gid # Remove group privileges os.setgroups([]) # Try setting the new uid/gid os.setgid(running_gid) os.setuid(running_uid) # Ensure a very conservative umask # old_umask = os.umask(22) hfoslog('Privileges dropped', emitter='CORE') except Exception as e: hfoslog('Could not drop privileges:', e, type(e), exc=True, lvl=error, emitter='CORE')
[ "def", "drop_privileges", "(", "uid_name", "=", "'hfos'", ",", "gid_name", "=", "'hfos'", ")", ":", "if", "os", ".", "getuid", "(", ")", "!=", "0", ":", "hfoslog", "(", "\"Not root, cannot drop privileges\"", ",", "lvl", "=", "warn", ",", "emitter", "=", "'CORE'", ")", "return", "try", ":", "# Get the uid/gid from the name", "running_uid", "=", "pwd", ".", "getpwnam", "(", "uid_name", ")", ".", "pw_uid", "running_gid", "=", "grp", ".", "getgrnam", "(", "gid_name", ")", ".", "gr_gid", "# Remove group privileges", "os", ".", "setgroups", "(", "[", "]", ")", "# Try setting the new uid/gid", "os", ".", "setgid", "(", "running_gid", ")", "os", ".", "setuid", "(", "running_uid", ")", "# Ensure a very conservative umask", "# old_umask = os.umask(22)", "hfoslog", "(", "'Privileges dropped'", ",", "emitter", "=", "'CORE'", ")", "except", "Exception", "as", "e", ":", "hfoslog", "(", "'Could not drop privileges:'", ",", "e", ",", "type", "(", "e", ")", ",", "exc", "=", "True", ",", "lvl", "=", "error", ",", "emitter", "=", "'CORE'", ")" ]
Attempt to drop privileges and change user to 'hfos' user/group
[ "Attempt", "to", "drop", "privileges", "and", "change", "user", "to", "hfos", "user", "/", "group" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L108-L131
Hackerfleet/hfos
hfos/launcher.py
construct_graph
def construct_graph(args): """Preliminary HFOS application Launcher""" app = Core(args) setup_root(app) if args['debug']: from circuits import Debugger hfoslog("Starting circuits debugger", lvl=warn, emitter='GRAPH') dbg = Debugger().register(app) # TODO: Make these configurable from modules, navdata is _very_ noisy # but should not be listed _here_ dbg.IgnoreEvents.extend([ "read", "_read", "write", "_write", "stream_success", "stream_complete", "serial_packet", "raw_data", "stream", "navdatapush", "referenceframe", "updateposition", "updatesubscriptions", "generatevesseldata", "generatenavdata", "sensordata", "reset_flood_offenders", "reset_flood_counters", # Flood counters "task_success", "task_done", # Thread completion "keepalive" # IRC Gateway ]) hfoslog("Beginning graph assembly.", emitter='GRAPH') if args['drawgraph']: from circuits.tools import graph graph(app) if args['opengui']: import webbrowser # TODO: Fix up that url: webbrowser.open("http://%s:%i/" % (args['host'], args['port'])) hfoslog("Graph assembly done.", emitter='GRAPH') return app
python
def construct_graph(args): """Preliminary HFOS application Launcher""" app = Core(args) setup_root(app) if args['debug']: from circuits import Debugger hfoslog("Starting circuits debugger", lvl=warn, emitter='GRAPH') dbg = Debugger().register(app) # TODO: Make these configurable from modules, navdata is _very_ noisy # but should not be listed _here_ dbg.IgnoreEvents.extend([ "read", "_read", "write", "_write", "stream_success", "stream_complete", "serial_packet", "raw_data", "stream", "navdatapush", "referenceframe", "updateposition", "updatesubscriptions", "generatevesseldata", "generatenavdata", "sensordata", "reset_flood_offenders", "reset_flood_counters", # Flood counters "task_success", "task_done", # Thread completion "keepalive" # IRC Gateway ]) hfoslog("Beginning graph assembly.", emitter='GRAPH') if args['drawgraph']: from circuits.tools import graph graph(app) if args['opengui']: import webbrowser # TODO: Fix up that url: webbrowser.open("http://%s:%i/" % (args['host'], args['port'])) hfoslog("Graph assembly done.", emitter='GRAPH') return app
[ "def", "construct_graph", "(", "args", ")", ":", "app", "=", "Core", "(", "args", ")", "setup_root", "(", "app", ")", "if", "args", "[", "'debug'", "]", ":", "from", "circuits", "import", "Debugger", "hfoslog", "(", "\"Starting circuits debugger\"", ",", "lvl", "=", "warn", ",", "emitter", "=", "'GRAPH'", ")", "dbg", "=", "Debugger", "(", ")", ".", "register", "(", "app", ")", "# TODO: Make these configurable from modules, navdata is _very_ noisy", "# but should not be listed _here_", "dbg", ".", "IgnoreEvents", ".", "extend", "(", "[", "\"read\"", ",", "\"_read\"", ",", "\"write\"", ",", "\"_write\"", ",", "\"stream_success\"", ",", "\"stream_complete\"", ",", "\"serial_packet\"", ",", "\"raw_data\"", ",", "\"stream\"", ",", "\"navdatapush\"", ",", "\"referenceframe\"", ",", "\"updateposition\"", ",", "\"updatesubscriptions\"", ",", "\"generatevesseldata\"", ",", "\"generatenavdata\"", ",", "\"sensordata\"", ",", "\"reset_flood_offenders\"", ",", "\"reset_flood_counters\"", ",", "# Flood counters", "\"task_success\"", ",", "\"task_done\"", ",", "# Thread completion", "\"keepalive\"", "# IRC Gateway", "]", ")", "hfoslog", "(", "\"Beginning graph assembly.\"", ",", "emitter", "=", "'GRAPH'", ")", "if", "args", "[", "'drawgraph'", "]", ":", "from", "circuits", ".", "tools", "import", "graph", "graph", "(", "app", ")", "if", "args", "[", "'opengui'", "]", ":", "import", "webbrowser", "# TODO: Fix up that url:", "webbrowser", ".", "open", "(", "\"http://%s:%i/\"", "%", "(", "args", "[", "'host'", "]", ",", "args", "[", "'port'", "]", ")", ")", "hfoslog", "(", "\"Graph assembly done.\"", ",", "emitter", "=", "'GRAPH'", ")", "return", "app" ]
Preliminary HFOS application Launcher
[ "Preliminary", "HFOS", "application", "Launcher" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L512-L551
Hackerfleet/hfos
hfos/launcher.py
launch
def launch(run=True, **args): """Bootstrap basics, assemble graph and hand over control to the Core component""" verbosity['console'] = args['log'] if not args['quiet'] else 100 verbosity['global'] = min(args['log'], args['logfileverbosity']) verbosity['file'] = args['logfileverbosity'] if args['dolog'] else 100 set_logfile(args['logfilepath'], args['instance']) if args['livelog'] is True: from hfos import logger logger.live = True hfoslog("Running with Python", sys.version.replace("\n", ""), sys.platform, lvl=debug, emitter='CORE') hfoslog("Interpreter executable:", sys.executable, emitter='CORE') if args['cert'] is not None: hfoslog("Warning! Using SSL without nginx is currently not broken!", lvl=critical, emitter='CORE') hfoslog("Initializing database access", emitter='CORE', lvl=debug) initialize(args['dbhost'], args['dbname'], args['instance']) server = construct_graph(args) if run and not args['norun']: server.run() return server
python
def launch(run=True, **args): """Bootstrap basics, assemble graph and hand over control to the Core component""" verbosity['console'] = args['log'] if not args['quiet'] else 100 verbosity['global'] = min(args['log'], args['logfileverbosity']) verbosity['file'] = args['logfileverbosity'] if args['dolog'] else 100 set_logfile(args['logfilepath'], args['instance']) if args['livelog'] is True: from hfos import logger logger.live = True hfoslog("Running with Python", sys.version.replace("\n", ""), sys.platform, lvl=debug, emitter='CORE') hfoslog("Interpreter executable:", sys.executable, emitter='CORE') if args['cert'] is not None: hfoslog("Warning! Using SSL without nginx is currently not broken!", lvl=critical, emitter='CORE') hfoslog("Initializing database access", emitter='CORE', lvl=debug) initialize(args['dbhost'], args['dbname'], args['instance']) server = construct_graph(args) if run and not args['norun']: server.run() return server
[ "def", "launch", "(", "run", "=", "True", ",", "*", "*", "args", ")", ":", "verbosity", "[", "'console'", "]", "=", "args", "[", "'log'", "]", "if", "not", "args", "[", "'quiet'", "]", "else", "100", "verbosity", "[", "'global'", "]", "=", "min", "(", "args", "[", "'log'", "]", ",", "args", "[", "'logfileverbosity'", "]", ")", "verbosity", "[", "'file'", "]", "=", "args", "[", "'logfileverbosity'", "]", "if", "args", "[", "'dolog'", "]", "else", "100", "set_logfile", "(", "args", "[", "'logfilepath'", "]", ",", "args", "[", "'instance'", "]", ")", "if", "args", "[", "'livelog'", "]", "is", "True", ":", "from", "hfos", "import", "logger", "logger", ".", "live", "=", "True", "hfoslog", "(", "\"Running with Python\"", ",", "sys", ".", "version", ".", "replace", "(", "\"\\n\"", ",", "\"\"", ")", ",", "sys", ".", "platform", ",", "lvl", "=", "debug", ",", "emitter", "=", "'CORE'", ")", "hfoslog", "(", "\"Interpreter executable:\"", ",", "sys", ".", "executable", ",", "emitter", "=", "'CORE'", ")", "if", "args", "[", "'cert'", "]", "is", "not", "None", ":", "hfoslog", "(", "\"Warning! Using SSL without nginx is currently not broken!\"", ",", "lvl", "=", "critical", ",", "emitter", "=", "'CORE'", ")", "hfoslog", "(", "\"Initializing database access\"", ",", "emitter", "=", "'CORE'", ",", "lvl", "=", "debug", ")", "initialize", "(", "args", "[", "'dbhost'", "]", ",", "args", "[", "'dbname'", "]", ",", "args", "[", "'instance'", "]", ")", "server", "=", "construct_graph", "(", "args", ")", "if", "run", "and", "not", "args", "[", "'norun'", "]", ":", "server", ".", "run", "(", ")", "return", "server" ]
Bootstrap basics, assemble graph and hand over control to the Core component
[ "Bootstrap", "basics", "assemble", "graph", "and", "hand", "over", "control", "to", "the", "Core", "component" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L585-L612
Hackerfleet/hfos
hfos/launcher.py
Core.ready
def ready(self, source): """All components have initialized, set up the component configuration schema-store, run the local server and drop privileges""" from hfos.database import configschemastore configschemastore[self.name] = self.configschema self._start_server() if not self.insecure: self._drop_privileges() self.fireEvent(cli_register_event('components', cli_components)) self.fireEvent(cli_register_event('drop_privileges', cli_drop_privileges)) self.fireEvent(cli_register_event('reload_db', cli_reload_db)) self.fireEvent(cli_register_event('reload', cli_reload)) self.fireEvent(cli_register_event('quit', cli_quit)) self.fireEvent(cli_register_event('info', cli_info))
python
def ready(self, source): """All components have initialized, set up the component configuration schema-store, run the local server and drop privileges""" from hfos.database import configschemastore configschemastore[self.name] = self.configschema self._start_server() if not self.insecure: self._drop_privileges() self.fireEvent(cli_register_event('components', cli_components)) self.fireEvent(cli_register_event('drop_privileges', cli_drop_privileges)) self.fireEvent(cli_register_event('reload_db', cli_reload_db)) self.fireEvent(cli_register_event('reload', cli_reload)) self.fireEvent(cli_register_event('quit', cli_quit)) self.fireEvent(cli_register_event('info', cli_info))
[ "def", "ready", "(", "self", ",", "source", ")", ":", "from", "hfos", ".", "database", "import", "configschemastore", "configschemastore", "[", "self", ".", "name", "]", "=", "self", ".", "configschema", "self", ".", "_start_server", "(", ")", "if", "not", "self", ".", "insecure", ":", "self", ".", "_drop_privileges", "(", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'components'", ",", "cli_components", ")", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'drop_privileges'", ",", "cli_drop_privileges", ")", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'reload_db'", ",", "cli_reload_db", ")", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'reload'", ",", "cli_reload", ")", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'quit'", ",", "cli_quit", ")", ")", "self", ".", "fireEvent", "(", "cli_register_event", "(", "'info'", ",", "cli_info", ")", ")" ]
All components have initialized, set up the component configuration schema-store, run the local server and drop privileges
[ "All", "components", "have", "initialized", "set", "up", "the", "component", "configuration", "schema", "-", "store", "run", "the", "local", "server", "and", "drop", "privileges" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L228-L245
Hackerfleet/hfos
hfos/launcher.py
Core.trigger_frontend_build
def trigger_frontend_build(self, event): """Event hook to trigger a new frontend build""" from hfos.database import instance install_frontend(instance=instance, forcerebuild=event.force, install=event.install, development=self.development )
python
def trigger_frontend_build(self, event): """Event hook to trigger a new frontend build""" from hfos.database import instance install_frontend(instance=instance, forcerebuild=event.force, install=event.install, development=self.development )
[ "def", "trigger_frontend_build", "(", "self", ",", "event", ")", ":", "from", "hfos", ".", "database", "import", "instance", "install_frontend", "(", "instance", "=", "instance", ",", "forcerebuild", "=", "event", ".", "force", ",", "install", "=", "event", ".", "install", ",", "development", "=", "self", ".", "development", ")" ]
Event hook to trigger a new frontend build
[ "Event", "hook", "to", "trigger", "a", "new", "frontend", "build" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L248-L256
Hackerfleet/hfos
hfos/launcher.py
Core.cli_reload
def cli_reload(self, event): """Experimental call to reload the component tree""" self.log('Reloading all components.') self.update_components(forcereload=True) initialize() from hfos.debugger import cli_compgraph self.fireEvent(cli_compgraph())
python
def cli_reload(self, event): """Experimental call to reload the component tree""" self.log('Reloading all components.') self.update_components(forcereload=True) initialize() from hfos.debugger import cli_compgraph self.fireEvent(cli_compgraph())
[ "def", "cli_reload", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Reloading all components.'", ")", "self", ".", "update_components", "(", "forcereload", "=", "True", ")", "initialize", "(", ")", "from", "hfos", ".", "debugger", "import", "cli_compgraph", "self", ".", "fireEvent", "(", "cli_compgraph", "(", ")", ")" ]
Experimental call to reload the component tree
[ "Experimental", "call", "to", "reload", "the", "component", "tree" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L280-L289
Hackerfleet/hfos
hfos/launcher.py
Core.cli_info
def cli_info(self, event): """Provides information about the running instance""" self.log('Instance:', self.instance, 'Dev:', self.development, 'Host:', self.host, 'Port:', self.port, 'Insecure:', self.insecure, 'Frontend:', self.frontendtarget)
python
def cli_info(self, event): """Provides information about the running instance""" self.log('Instance:', self.instance, 'Dev:', self.development, 'Host:', self.host, 'Port:', self.port, 'Insecure:', self.insecure, 'Frontend:', self.frontendtarget)
[ "def", "cli_info", "(", "self", ",", "event", ")", ":", "self", ".", "log", "(", "'Instance:'", ",", "self", ".", "instance", ",", "'Dev:'", ",", "self", ".", "development", ",", "'Host:'", ",", "self", ".", "host", ",", "'Port:'", ",", "self", ".", "port", ",", "'Insecure:'", ",", "self", ".", "insecure", ",", "'Frontend:'", ",", "self", ".", "frontendtarget", ")" ]
Provides information about the running instance
[ "Provides", "information", "about", "the", "running", "instance" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L299-L307
Hackerfleet/hfos
hfos/launcher.py
Core._start_server
def _start_server(self, *args): """Run the node local server""" self.log("Starting server", args) secure = self.certificate is not None if secure: self.log("Running SSL server with cert:", self.certificate) else: self.log("Running insecure server without SSL. Do not use without SSL proxy in production!", lvl=warn) try: self.server = Server( (self.host, self.port), secure=secure, certfile=self.certificate # , # inherit=True ).register(self) except PermissionError: self.log('Could not open (privileged?) port, check ' 'permissions!', lvl=critical)
python
def _start_server(self, *args): """Run the node local server""" self.log("Starting server", args) secure = self.certificate is not None if secure: self.log("Running SSL server with cert:", self.certificate) else: self.log("Running insecure server without SSL. Do not use without SSL proxy in production!", lvl=warn) try: self.server = Server( (self.host, self.port), secure=secure, certfile=self.certificate # , # inherit=True ).register(self) except PermissionError: self.log('Could not open (privileged?) port, check ' 'permissions!', lvl=critical)
[ "def", "_start_server", "(", "self", ",", "*", "args", ")", ":", "self", ".", "log", "(", "\"Starting server\"", ",", "args", ")", "secure", "=", "self", ".", "certificate", "is", "not", "None", "if", "secure", ":", "self", ".", "log", "(", "\"Running SSL server with cert:\"", ",", "self", ".", "certificate", ")", "else", ":", "self", ".", "log", "(", "\"Running insecure server without SSL. Do not use without SSL proxy in production!\"", ",", "lvl", "=", "warn", ")", "try", ":", "self", ".", "server", "=", "Server", "(", "(", "self", ".", "host", ",", "self", ".", "port", ")", ",", "secure", "=", "secure", ",", "certfile", "=", "self", ".", "certificate", "# ,", "# inherit=True", ")", ".", "register", "(", "self", ")", "except", "PermissionError", ":", "self", ".", "log", "(", "'Could not open (privileged?) port, check '", "'permissions!'", ",", "lvl", "=", "critical", ")" ]
Run the node local server
[ "Run", "the", "node", "local", "server" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L309-L328
Hackerfleet/hfos
hfos/launcher.py
Core.update_components
def update_components(self, forcereload=False, forcerebuild=False, forcecopy=True, install=False): """Check all known entry points for components. If necessary, manage configuration updates""" # TODO: See if we can pull out major parts of the component handling. # They are also used in the manage tool to instantiate the # component frontend bits. self.log("Updating components") components = {} if True: # try: from pkg_resources import iter_entry_points entry_point_tuple = ( iter_entry_points(group='hfos.base', name=None), iter_entry_points(group='hfos.sails', name=None), iter_entry_points(group='hfos.components', name=None) ) for iterator in entry_point_tuple: for entry_point in iterator: try: name = entry_point.name location = entry_point.dist.location loaded = entry_point.load() self.log("Entry point: ", entry_point, name, entry_point.resolve(), lvl=verbose) self.log("Loaded: ", loaded, lvl=verbose) comp = { 'package': entry_point.dist.project_name, 'location': location, 'version': str(entry_point.dist.parsed_version), 'description': loaded.__doc__ } components[name] = comp self.loadable_components[name] = loaded self.log("Loaded component:", comp, lvl=verbose) except Exception as e: self.log("Could not inspect entrypoint: ", e, type(e), entry_point, iterator, lvl=error, exc=True) # for name in components.keys(): # try: # self.log(self.loadable_components[name]) # configobject = { # 'type': 'object', # 'properties': # self.loadable_components[name].configprops # } # ComponentBaseConfigSchema['schema'][ # 'properties'][ # 'settings'][ # 'oneOf'].append(configobject) # except (KeyError, AttributeError) as e: # self.log('Problematic configuration # properties in ' # 'component ', name, exc=True) # # schemastore['component'] = ComponentBaseConfigSchema # except Exception as e: # self.log("Error: ", e, type(e), lvl=error, exc=True) # return self.log("Checking component frontend bits in ", self.frontendroot, lvl=verbose) # pprint(self.config._fields) diff = set(components) ^ set(self.config.components) if diff or forcecopy and self.config.frontendenabled: self.log("Old component configuration differs:", diff, lvl=debug) self.log(self.config.components, components, lvl=verbose) self.config.components = components else: self.log("No component configuration change. Proceeding.") if forcereload: self.log("Restarting all components.", lvl=warn) self._instantiate_components(clear=True)
python
def update_components(self, forcereload=False, forcerebuild=False, forcecopy=True, install=False): """Check all known entry points for components. If necessary, manage configuration updates""" # TODO: See if we can pull out major parts of the component handling. # They are also used in the manage tool to instantiate the # component frontend bits. self.log("Updating components") components = {} if True: # try: from pkg_resources import iter_entry_points entry_point_tuple = ( iter_entry_points(group='hfos.base', name=None), iter_entry_points(group='hfos.sails', name=None), iter_entry_points(group='hfos.components', name=None) ) for iterator in entry_point_tuple: for entry_point in iterator: try: name = entry_point.name location = entry_point.dist.location loaded = entry_point.load() self.log("Entry point: ", entry_point, name, entry_point.resolve(), lvl=verbose) self.log("Loaded: ", loaded, lvl=verbose) comp = { 'package': entry_point.dist.project_name, 'location': location, 'version': str(entry_point.dist.parsed_version), 'description': loaded.__doc__ } components[name] = comp self.loadable_components[name] = loaded self.log("Loaded component:", comp, lvl=verbose) except Exception as e: self.log("Could not inspect entrypoint: ", e, type(e), entry_point, iterator, lvl=error, exc=True) # for name in components.keys(): # try: # self.log(self.loadable_components[name]) # configobject = { # 'type': 'object', # 'properties': # self.loadable_components[name].configprops # } # ComponentBaseConfigSchema['schema'][ # 'properties'][ # 'settings'][ # 'oneOf'].append(configobject) # except (KeyError, AttributeError) as e: # self.log('Problematic configuration # properties in ' # 'component ', name, exc=True) # # schemastore['component'] = ComponentBaseConfigSchema # except Exception as e: # self.log("Error: ", e, type(e), lvl=error, exc=True) # return self.log("Checking component frontend bits in ", self.frontendroot, lvl=verbose) # pprint(self.config._fields) diff = set(components) ^ set(self.config.components) if diff or forcecopy and self.config.frontendenabled: self.log("Old component configuration differs:", diff, lvl=debug) self.log(self.config.components, components, lvl=verbose) self.config.components = components else: self.log("No component configuration change. Proceeding.") if forcereload: self.log("Restarting all components.", lvl=warn) self._instantiate_components(clear=True)
[ "def", "update_components", "(", "self", ",", "forcereload", "=", "False", ",", "forcerebuild", "=", "False", ",", "forcecopy", "=", "True", ",", "install", "=", "False", ")", ":", "# TODO: See if we can pull out major parts of the component handling.", "# They are also used in the manage tool to instantiate the", "# component frontend bits.", "self", ".", "log", "(", "\"Updating components\"", ")", "components", "=", "{", "}", "if", "True", ":", "# try:", "from", "pkg_resources", "import", "iter_entry_points", "entry_point_tuple", "=", "(", "iter_entry_points", "(", "group", "=", "'hfos.base'", ",", "name", "=", "None", ")", ",", "iter_entry_points", "(", "group", "=", "'hfos.sails'", ",", "name", "=", "None", ")", ",", "iter_entry_points", "(", "group", "=", "'hfos.components'", ",", "name", "=", "None", ")", ")", "for", "iterator", "in", "entry_point_tuple", ":", "for", "entry_point", "in", "iterator", ":", "try", ":", "name", "=", "entry_point", ".", "name", "location", "=", "entry_point", ".", "dist", ".", "location", "loaded", "=", "entry_point", ".", "load", "(", ")", "self", ".", "log", "(", "\"Entry point: \"", ",", "entry_point", ",", "name", ",", "entry_point", ".", "resolve", "(", ")", ",", "lvl", "=", "verbose", ")", "self", ".", "log", "(", "\"Loaded: \"", ",", "loaded", ",", "lvl", "=", "verbose", ")", "comp", "=", "{", "'package'", ":", "entry_point", ".", "dist", ".", "project_name", ",", "'location'", ":", "location", ",", "'version'", ":", "str", "(", "entry_point", ".", "dist", ".", "parsed_version", ")", ",", "'description'", ":", "loaded", ".", "__doc__", "}", "components", "[", "name", "]", "=", "comp", "self", ".", "loadable_components", "[", "name", "]", "=", "loaded", "self", ".", "log", "(", "\"Loaded component:\"", ",", "comp", ",", "lvl", "=", "verbose", ")", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Could not inspect entrypoint: \"", ",", "e", ",", "type", "(", "e", ")", ",", "entry_point", ",", "iterator", ",", "lvl", "=", "error", ",", "exc", "=", "True", ")", "# for name in components.keys():", "# try:", "# self.log(self.loadable_components[name])", "# configobject = {", "# 'type': 'object',", "# 'properties':", "# self.loadable_components[name].configprops", "# }", "# ComponentBaseConfigSchema['schema'][", "# 'properties'][", "# 'settings'][", "# 'oneOf'].append(configobject)", "# except (KeyError, AttributeError) as e:", "# self.log('Problematic configuration", "# properties in '", "# 'component ', name, exc=True)", "#", "# schemastore['component'] = ComponentBaseConfigSchema", "# except Exception as e:", "# self.log(\"Error: \", e, type(e), lvl=error, exc=True)", "# return", "self", ".", "log", "(", "\"Checking component frontend bits in \"", ",", "self", ".", "frontendroot", ",", "lvl", "=", "verbose", ")", "# pprint(self.config._fields)", "diff", "=", "set", "(", "components", ")", "^", "set", "(", "self", ".", "config", ".", "components", ")", "if", "diff", "or", "forcecopy", "and", "self", ".", "config", ".", "frontendenabled", ":", "self", ".", "log", "(", "\"Old component configuration differs:\"", ",", "diff", ",", "lvl", "=", "debug", ")", "self", ".", "log", "(", "self", ".", "config", ".", "components", ",", "components", ",", "lvl", "=", "verbose", ")", "self", ".", "config", ".", "components", "=", "components", "else", ":", "self", ".", "log", "(", "\"No component configuration change. Proceeding.\"", ")", "if", "forcereload", ":", "self", ".", "log", "(", "\"Restarting all components.\"", ",", "lvl", "=", "warn", ")", "self", ".", "_instantiate_components", "(", "clear", "=", "True", ")" ]
Check all known entry points for components. If necessary, manage configuration updates
[ "Check", "all", "known", "entry", "points", "for", "components", ".", "If", "necessary", "manage", "configuration", "updates" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L340-L428
Hackerfleet/hfos
hfos/launcher.py
Core._start_frontend
def _start_frontend(self, restart=False): """Check if it is enabled and start the frontend http & websocket""" self.log(self.config, self.config.frontendenabled, lvl=verbose) if self.config.frontendenabled and not self.frontendrunning or restart: self.log("Restarting webfrontend services on", self.frontendtarget) self.static = Static("/", docroot=self.frontendtarget).register( self) self.websocket = WebSocketsDispatcher("/websocket").register(self) self.frontendrunning = True
python
def _start_frontend(self, restart=False): """Check if it is enabled and start the frontend http & websocket""" self.log(self.config, self.config.frontendenabled, lvl=verbose) if self.config.frontendenabled and not self.frontendrunning or restart: self.log("Restarting webfrontend services on", self.frontendtarget) self.static = Static("/", docroot=self.frontendtarget).register( self) self.websocket = WebSocketsDispatcher("/websocket").register(self) self.frontendrunning = True
[ "def", "_start_frontend", "(", "self", ",", "restart", "=", "False", ")", ":", "self", ".", "log", "(", "self", ".", "config", ",", "self", ".", "config", ".", "frontendenabled", ",", "lvl", "=", "verbose", ")", "if", "self", ".", "config", ".", "frontendenabled", "and", "not", "self", ".", "frontendrunning", "or", "restart", ":", "self", ".", "log", "(", "\"Restarting webfrontend services on\"", ",", "self", ".", "frontendtarget", ")", "self", ".", "static", "=", "Static", "(", "\"/\"", ",", "docroot", "=", "self", ".", "frontendtarget", ")", ".", "register", "(", "self", ")", "self", ".", "websocket", "=", "WebSocketsDispatcher", "(", "\"/websocket\"", ")", ".", "register", "(", "self", ")", "self", ".", "frontendrunning", "=", "True" ]
Check if it is enabled and start the frontend http & websocket
[ "Check", "if", "it", "is", "enabled", "and", "start", "the", "frontend", "http", "&", "websocket" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L430-L442
Hackerfleet/hfos
hfos/launcher.py
Core._instantiate_components
def _instantiate_components(self, clear=True): """Inspect all loadable components and run them""" if clear: import objgraph from copy import deepcopy from circuits.tools import kill from circuits import Component for comp in self.runningcomponents.values(): self.log(comp, type(comp), isinstance(comp, Component), pretty=True) kill(comp) # removables = deepcopy(list(self.runningcomponents.keys())) # # for key in removables: # comp = self.runningcomponents[key] # self.log(comp) # comp.unregister() # comp.stop() # self.runningcomponents.pop(key) # # objgraph.show_backrefs([comp], # max_depth=5, # filter=lambda x: type(x) not in [list, tuple, set], # highlight=lambda x: type(x) in [ConfigurableComponent], # filename='backref-graph_%s.png' % comp.uniquename) # del comp # del removables self.runningcomponents = {} self.log('Not running blacklisted components: ', self.component_blacklist, lvl=debug) running = set(self.loadable_components.keys()).difference( self.component_blacklist) self.log('Starting components: ', sorted(running)) for name, componentdata in self.loadable_components.items(): if name in self.component_blacklist: continue self.log("Running component: ", name, lvl=verbose) try: if name in self.runningcomponents: self.log("Component already running: ", name, lvl=warn) else: runningcomponent = componentdata() runningcomponent.register(self) self.runningcomponents[name] = runningcomponent except Exception as e: self.log("Could not register component: ", name, e, type(e), lvl=error, exc=True)
python
def _instantiate_components(self, clear=True): """Inspect all loadable components and run them""" if clear: import objgraph from copy import deepcopy from circuits.tools import kill from circuits import Component for comp in self.runningcomponents.values(): self.log(comp, type(comp), isinstance(comp, Component), pretty=True) kill(comp) # removables = deepcopy(list(self.runningcomponents.keys())) # # for key in removables: # comp = self.runningcomponents[key] # self.log(comp) # comp.unregister() # comp.stop() # self.runningcomponents.pop(key) # # objgraph.show_backrefs([comp], # max_depth=5, # filter=lambda x: type(x) not in [list, tuple, set], # highlight=lambda x: type(x) in [ConfigurableComponent], # filename='backref-graph_%s.png' % comp.uniquename) # del comp # del removables self.runningcomponents = {} self.log('Not running blacklisted components: ', self.component_blacklist, lvl=debug) running = set(self.loadable_components.keys()).difference( self.component_blacklist) self.log('Starting components: ', sorted(running)) for name, componentdata in self.loadable_components.items(): if name in self.component_blacklist: continue self.log("Running component: ", name, lvl=verbose) try: if name in self.runningcomponents: self.log("Component already running: ", name, lvl=warn) else: runningcomponent = componentdata() runningcomponent.register(self) self.runningcomponents[name] = runningcomponent except Exception as e: self.log("Could not register component: ", name, e, type(e), lvl=error, exc=True)
[ "def", "_instantiate_components", "(", "self", ",", "clear", "=", "True", ")", ":", "if", "clear", ":", "import", "objgraph", "from", "copy", "import", "deepcopy", "from", "circuits", ".", "tools", "import", "kill", "from", "circuits", "import", "Component", "for", "comp", "in", "self", ".", "runningcomponents", ".", "values", "(", ")", ":", "self", ".", "log", "(", "comp", ",", "type", "(", "comp", ")", ",", "isinstance", "(", "comp", ",", "Component", ")", ",", "pretty", "=", "True", ")", "kill", "(", "comp", ")", "# removables = deepcopy(list(self.runningcomponents.keys()))", "#", "# for key in removables:", "# comp = self.runningcomponents[key]", "# self.log(comp)", "# comp.unregister()", "# comp.stop()", "# self.runningcomponents.pop(key)", "#", "# objgraph.show_backrefs([comp],", "# max_depth=5,", "# filter=lambda x: type(x) not in [list, tuple, set],", "# highlight=lambda x: type(x) in [ConfigurableComponent],", "# filename='backref-graph_%s.png' % comp.uniquename)", "# del comp", "# del removables", "self", ".", "runningcomponents", "=", "{", "}", "self", ".", "log", "(", "'Not running blacklisted components: '", ",", "self", ".", "component_blacklist", ",", "lvl", "=", "debug", ")", "running", "=", "set", "(", "self", ".", "loadable_components", ".", "keys", "(", ")", ")", ".", "difference", "(", "self", ".", "component_blacklist", ")", "self", ".", "log", "(", "'Starting components: '", ",", "sorted", "(", "running", ")", ")", "for", "name", ",", "componentdata", "in", "self", ".", "loadable_components", ".", "items", "(", ")", ":", "if", "name", "in", "self", ".", "component_blacklist", ":", "continue", "self", ".", "log", "(", "\"Running component: \"", ",", "name", ",", "lvl", "=", "verbose", ")", "try", ":", "if", "name", "in", "self", ".", "runningcomponents", ":", "self", ".", "log", "(", "\"Component already running: \"", ",", "name", ",", "lvl", "=", "warn", ")", "else", ":", "runningcomponent", "=", "componentdata", "(", ")", "runningcomponent", ".", "register", "(", "self", ")", "self", ".", "runningcomponents", "[", "name", "]", "=", "runningcomponent", "except", "Exception", "as", "e", ":", "self", ".", "log", "(", "\"Could not register component: \"", ",", "name", ",", "e", ",", "type", "(", "e", ")", ",", "lvl", "=", "error", ",", "exc", "=", "True", ")" ]
Inspect all loadable components and run them
[ "Inspect", "all", "loadable", "components", "and", "run", "them" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L444-L494
Hackerfleet/hfos
hfos/launcher.py
Core.started
def started(self, component): """Sets up the application after startup.""" self.log("Running.") self.log("Started event origin: ", component, lvl=verbose) populate_user_events() from hfos.events.system import AuthorizedEvents self.log(len(AuthorizedEvents), "authorized event sources:", list(AuthorizedEvents.keys()), lvl=debug) self._instantiate_components() self._start_frontend() self.fire(ready(), "hfosweb")
python
def started(self, component): """Sets up the application after startup.""" self.log("Running.") self.log("Started event origin: ", component, lvl=verbose) populate_user_events() from hfos.events.system import AuthorizedEvents self.log(len(AuthorizedEvents), "authorized event sources:", list(AuthorizedEvents.keys()), lvl=debug) self._instantiate_components() self._start_frontend() self.fire(ready(), "hfosweb")
[ "def", "started", "(", "self", ",", "component", ")", ":", "self", ".", "log", "(", "\"Running.\"", ")", "self", ".", "log", "(", "\"Started event origin: \"", ",", "component", ",", "lvl", "=", "verbose", ")", "populate_user_events", "(", ")", "from", "hfos", ".", "events", ".", "system", "import", "AuthorizedEvents", "self", ".", "log", "(", "len", "(", "AuthorizedEvents", ")", ",", "\"authorized event sources:\"", ",", "list", "(", "AuthorizedEvents", ".", "keys", "(", ")", ")", ",", "lvl", "=", "debug", ")", "self", ".", "_instantiate_components", "(", ")", "self", ".", "_start_frontend", "(", ")", "self", ".", "fire", "(", "ready", "(", ")", ",", "\"hfosweb\"", ")" ]
Sets up the application after startup.
[ "Sets", "up", "the", "application", "after", "startup", "." ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/launcher.py#L496-L509
Hackerfleet/hfos
hfos/tool/user.py
user
def user(ctx, username, password): """[GROUP] User management operations""" ctx.obj['username'] = username ctx.obj['password'] = password
python
def user(ctx, username, password): """[GROUP] User management operations""" ctx.obj['username'] = username ctx.obj['password'] = password
[ "def", "user", "(", "ctx", ",", "username", ",", "password", ")", ":", "ctx", ".", "obj", "[", "'username'", "]", "=", "username", "ctx", ".", "obj", "[", "'password'", "]", "=", "password" ]
[GROUP] User management operations
[ "[", "GROUP", "]", "User", "management", "operations" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L41-L45
Hackerfleet/hfos
hfos/tool/user.py
_create_user
def _create_user(ctx): """Internal method to create a normal user""" username, passhash = _get_credentials(ctx.obj['username'], ctx.obj['password'], ctx.obj['db']) if ctx.obj['db'].objectmodels['user'].count({'name': username}) > 0: raise KeyError() new_user = ctx.obj['db'].objectmodels['user']({ 'uuid': str(uuid4()), 'created': std_now() }) new_user.name = username new_user.passhash = passhash return new_user
python
def _create_user(ctx): """Internal method to create a normal user""" username, passhash = _get_credentials(ctx.obj['username'], ctx.obj['password'], ctx.obj['db']) if ctx.obj['db'].objectmodels['user'].count({'name': username}) > 0: raise KeyError() new_user = ctx.obj['db'].objectmodels['user']({ 'uuid': str(uuid4()), 'created': std_now() }) new_user.name = username new_user.passhash = passhash return new_user
[ "def", "_create_user", "(", "ctx", ")", ":", "username", ",", "passhash", "=", "_get_credentials", "(", "ctx", ".", "obj", "[", "'username'", "]", ",", "ctx", ".", "obj", "[", "'password'", "]", ",", "ctx", ".", "obj", "[", "'db'", "]", ")", "if", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "count", "(", "{", "'name'", ":", "username", "}", ")", ">", "0", ":", "raise", "KeyError", "(", ")", "new_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", "(", "{", "'uuid'", ":", "str", "(", "uuid4", "(", ")", ")", ",", "'created'", ":", "std_now", "(", ")", "}", ")", "new_user", ".", "name", "=", "username", "new_user", ".", "passhash", "=", "passhash", "return", "new_user" ]
Internal method to create a normal user
[ "Internal", "method", "to", "create", "a", "normal", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L48-L66
Hackerfleet/hfos
hfos/tool/user.py
create_user
def create_user(ctx): """Creates a new local user""" try: new_user = _create_user(ctx) new_user.save() log("Done") except KeyError: log('User already exists', lvl=warn)
python
def create_user(ctx): """Creates a new local user""" try: new_user = _create_user(ctx) new_user.save() log("Done") except KeyError: log('User already exists', lvl=warn)
[ "def", "create_user", "(", "ctx", ")", ":", "try", ":", "new_user", "=", "_create_user", "(", "ctx", ")", "new_user", ".", "save", "(", ")", "log", "(", "\"Done\"", ")", "except", "KeyError", ":", "log", "(", "'User already exists'", ",", "lvl", "=", "warn", ")" ]
Creates a new local user
[ "Creates", "a", "new", "local", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L71-L80
Hackerfleet/hfos
hfos/tool/user.py
create_admin
def create_admin(ctx): """Creates a new local user and assigns admin role""" try: admin = _create_user(ctx) admin.roles.append('admin') admin.save() log("Done") except KeyError: log('User already exists', lvl=warn)
python
def create_admin(ctx): """Creates a new local user and assigns admin role""" try: admin = _create_user(ctx) admin.roles.append('admin') admin.save() log("Done") except KeyError: log('User already exists', lvl=warn)
[ "def", "create_admin", "(", "ctx", ")", ":", "try", ":", "admin", "=", "_create_user", "(", "ctx", ")", "admin", ".", "roles", ".", "append", "(", "'admin'", ")", "admin", ".", "save", "(", ")", "log", "(", "\"Done\"", ")", "except", "KeyError", ":", "log", "(", "'User already exists'", ",", "lvl", "=", "warn", ")" ]
Creates a new local user and assigns admin role
[ "Creates", "a", "new", "local", "user", "and", "assigns", "admin", "role" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L85-L95
Hackerfleet/hfos
hfos/tool/user.py
delete_user
def delete_user(ctx, yes): """Delete a local user""" if ctx.obj['username'] is None: username = _ask("Please enter username:") else: username = ctx.obj['username'] del_user = ctx.obj['db'].objectmodels['user'].find_one({'name': username}) if yes or _ask('Confirm deletion', default=False, data_type='bool'): try: del_user.delete() log("Done") except AttributeError: log('User not found', lvl=warn) else: log("Cancelled")
python
def delete_user(ctx, yes): """Delete a local user""" if ctx.obj['username'] is None: username = _ask("Please enter username:") else: username = ctx.obj['username'] del_user = ctx.obj['db'].objectmodels['user'].find_one({'name': username}) if yes or _ask('Confirm deletion', default=False, data_type='bool'): try: del_user.delete() log("Done") except AttributeError: log('User not found', lvl=warn) else: log("Cancelled")
[ "def", "delete_user", "(", "ctx", ",", "yes", ")", ":", "if", "ctx", ".", "obj", "[", "'username'", "]", "is", "None", ":", "username", "=", "_ask", "(", "\"Please enter username:\"", ")", "else", ":", "username", "=", "ctx", ".", "obj", "[", "'username'", "]", "del_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "username", "}", ")", "if", "yes", "or", "_ask", "(", "'Confirm deletion'", ",", "default", "=", "False", ",", "data_type", "=", "'bool'", ")", ":", "try", ":", "del_user", ".", "delete", "(", ")", "log", "(", "\"Done\"", ")", "except", "AttributeError", ":", "log", "(", "'User not found'", ",", "lvl", "=", "warn", ")", "else", ":", "log", "(", "\"Cancelled\"", ")" ]
Delete a local user
[ "Delete", "a", "local", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L102-L118
Hackerfleet/hfos
hfos/tool/user.py
change_password
def change_password(ctx): """Change password of an existing user""" username, passhash = _get_credentials(ctx.obj['username'], ctx.obj['password'], ctx.obj['db']) change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': username }) if change_user is None: log('No such user', lvl=warn) return change_user.passhash = passhash change_user.save() log("Done")
python
def change_password(ctx): """Change password of an existing user""" username, passhash = _get_credentials(ctx.obj['username'], ctx.obj['password'], ctx.obj['db']) change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': username }) if change_user is None: log('No such user', lvl=warn) return change_user.passhash = passhash change_user.save() log("Done")
[ "def", "change_password", "(", "ctx", ")", ":", "username", ",", "passhash", "=", "_get_credentials", "(", "ctx", ".", "obj", "[", "'username'", "]", ",", "ctx", ".", "obj", "[", "'password'", "]", ",", "ctx", ".", "obj", "[", "'db'", "]", ")", "change_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "username", "}", ")", "if", "change_user", "is", "None", ":", "log", "(", "'No such user'", ",", "lvl", "=", "warn", ")", "return", "change_user", ".", "passhash", "=", "passhash", "change_user", ".", "save", "(", ")", "log", "(", "\"Done\"", ")" ]
Change password of an existing user
[ "Change", "password", "of", "an", "existing", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L123-L140
Hackerfleet/hfos
hfos/tool/user.py
list_users
def list_users(ctx, search, uuid, active): """List all locally known users""" users = ctx.obj['db'].objectmodels['user'] for found_user in users.find(): if not search or (search and search in found_user.name): # TODO: Not 2.x compatible print(found_user.name, end=' ' if active or uuid else '\n') if uuid: print(found_user.uuid, end=' ' if active else '\n') if active: print(found_user.active) log("Done")
python
def list_users(ctx, search, uuid, active): """List all locally known users""" users = ctx.obj['db'].objectmodels['user'] for found_user in users.find(): if not search or (search and search in found_user.name): # TODO: Not 2.x compatible print(found_user.name, end=' ' if active or uuid else '\n') if uuid: print(found_user.uuid, end=' ' if active else '\n') if active: print(found_user.active) log("Done")
[ "def", "list_users", "(", "ctx", ",", "search", ",", "uuid", ",", "active", ")", ":", "users", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", "for", "found_user", "in", "users", ".", "find", "(", ")", ":", "if", "not", "search", "or", "(", "search", "and", "search", "in", "found_user", ".", "name", ")", ":", "# TODO: Not 2.x compatible", "print", "(", "found_user", ".", "name", ",", "end", "=", "' '", "if", "active", "or", "uuid", "else", "'\\n'", ")", "if", "uuid", ":", "print", "(", "found_user", ".", "uuid", ",", "end", "=", "' '", "if", "active", "else", "'\\n'", ")", "if", "active", ":", "print", "(", "found_user", ".", "active", ")", "log", "(", "\"Done\"", ")" ]
List all locally known users
[ "List", "all", "locally", "known", "users" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L151-L165
Hackerfleet/hfos
hfos/tool/user.py
disable
def disable(ctx): """Disable an existing user""" if ctx.obj['username'] is None: log('Specify the username with "iso db user --username ..."') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) change_user.active = False change_user.save() log('Done')
python
def disable(ctx): """Disable an existing user""" if ctx.obj['username'] is None: log('Specify the username with "iso db user --username ..."') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) change_user.active = False change_user.save() log('Done')
[ "def", "disable", "(", "ctx", ")", ":", "if", "ctx", ".", "obj", "[", "'username'", "]", "is", "None", ":", "log", "(", "'Specify the username with \"iso db user --username ...\"'", ")", "return", "change_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "ctx", ".", "obj", "[", "'username'", "]", "}", ")", "change_user", ".", "active", "=", "False", "change_user", ".", "save", "(", ")", "log", "(", "'Done'", ")" ]
Disable an existing user
[ "Disable", "an", "existing", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L170-L183
Hackerfleet/hfos
hfos/tool/user.py
enable
def enable(ctx): """Enable an existing user""" if ctx.obj['username'] is None: log('Specify the username with "iso db user --username ..."') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) change_user.active = True change_user.save() log('Done')
python
def enable(ctx): """Enable an existing user""" if ctx.obj['username'] is None: log('Specify the username with "iso db user --username ..."') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) change_user.active = True change_user.save() log('Done')
[ "def", "enable", "(", "ctx", ")", ":", "if", "ctx", ".", "obj", "[", "'username'", "]", "is", "None", ":", "log", "(", "'Specify the username with \"iso db user --username ...\"'", ")", "return", "change_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "ctx", ".", "obj", "[", "'username'", "]", "}", ")", "change_user", ".", "active", "=", "True", "change_user", ".", "save", "(", ")", "log", "(", "'Done'", ")" ]
Enable an existing user
[ "Enable", "an", "existing", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L188-L201
Hackerfleet/hfos
hfos/tool/user.py
add_role
def add_role(ctx, role): """Grant a role to an existing user""" if role is None: log('Specify the role with --role') return if ctx.obj['username'] is None: log('Specify the username with --username') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) if role not in change_user.roles: change_user.roles.append(role) change_user.save() log('Done') else: log('User already has that role!', lvl=warn)
python
def add_role(ctx, role): """Grant a role to an existing user""" if role is None: log('Specify the role with --role') return if ctx.obj['username'] is None: log('Specify the username with --username') return change_user = ctx.obj['db'].objectmodels['user'].find_one({ 'name': ctx.obj['username'] }) if role not in change_user.roles: change_user.roles.append(role) change_user.save() log('Done') else: log('User already has that role!', lvl=warn)
[ "def", "add_role", "(", "ctx", ",", "role", ")", ":", "if", "role", "is", "None", ":", "log", "(", "'Specify the role with --role'", ")", "return", "if", "ctx", ".", "obj", "[", "'username'", "]", "is", "None", ":", "log", "(", "'Specify the username with --username'", ")", "return", "change_user", "=", "ctx", ".", "obj", "[", "'db'", "]", ".", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'name'", ":", "ctx", ".", "obj", "[", "'username'", "]", "}", ")", "if", "role", "not", "in", "change_user", ".", "roles", ":", "change_user", ".", "roles", ".", "append", "(", "role", ")", "change_user", ".", "save", "(", ")", "log", "(", "'Done'", ")", "else", ":", "log", "(", "'User already has that role!'", ",", "lvl", "=", "warn", ")" ]
Grant a role to an existing user
[ "Grant", "a", "role", "to", "an", "existing", "user" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/user.py#L207-L225
andychase/reparse
reparse/tools/expression_checker.py
check_expression
def check_expression(testing_framework, expression_dict): """ >>> class mock_framework: ... def assertIn(self, item, list, msg="Failed asserting item is in list"): ... if item not in list: raise Exception(msg) ... def assertTrue(self, value, msg="Failed asserting true"): ... if not value: raise Exception(msg) ... def assertFalse(self, value, msg): self.assertTrue(not value, msg) >>> check_expression(mock_framework(), ... {'class': {'group' :{'Matches': " 0 | 1", 'Non-Matches': "2 | 0 2", 'Expression': "[0-1]"}}}) """ expression_sub = get_expression_sub() for expression_type_name, expression_type in expression_dict.items(): for name, expression_object in expression_type.items(): if 'Matches' in expression_object.keys(): for test in expression_object['Matches'].split('|'): # Substitute and check to make sure that the entire string matches result = expression_sub(expression_object['Expression'], '', test.strip()) == '' testing_framework.assertTrue(result, match_error_msg.format(expression_type_name, name, test)) if 'Non-Matches' in expression_object.keys(): for test in expression_object['Non-Matches'].split('|'): result = expression_sub(expression_object['Expression'], '', test.strip()) == '' testing_framework.assertFalse(result, non_match_error_msg.format(expression_type_name, name, test))
python
def check_expression(testing_framework, expression_dict): """ >>> class mock_framework: ... def assertIn(self, item, list, msg="Failed asserting item is in list"): ... if item not in list: raise Exception(msg) ... def assertTrue(self, value, msg="Failed asserting true"): ... if not value: raise Exception(msg) ... def assertFalse(self, value, msg): self.assertTrue(not value, msg) >>> check_expression(mock_framework(), ... {'class': {'group' :{'Matches': " 0 | 1", 'Non-Matches': "2 | 0 2", 'Expression': "[0-1]"}}}) """ expression_sub = get_expression_sub() for expression_type_name, expression_type in expression_dict.items(): for name, expression_object in expression_type.items(): if 'Matches' in expression_object.keys(): for test in expression_object['Matches'].split('|'): # Substitute and check to make sure that the entire string matches result = expression_sub(expression_object['Expression'], '', test.strip()) == '' testing_framework.assertTrue(result, match_error_msg.format(expression_type_name, name, test)) if 'Non-Matches' in expression_object.keys(): for test in expression_object['Non-Matches'].split('|'): result = expression_sub(expression_object['Expression'], '', test.strip()) == '' testing_framework.assertFalse(result, non_match_error_msg.format(expression_type_name, name, test))
[ "def", "check_expression", "(", "testing_framework", ",", "expression_dict", ")", ":", "expression_sub", "=", "get_expression_sub", "(", ")", "for", "expression_type_name", ",", "expression_type", "in", "expression_dict", ".", "items", "(", ")", ":", "for", "name", ",", "expression_object", "in", "expression_type", ".", "items", "(", ")", ":", "if", "'Matches'", "in", "expression_object", ".", "keys", "(", ")", ":", "for", "test", "in", "expression_object", "[", "'Matches'", "]", ".", "split", "(", "'|'", ")", ":", "# Substitute and check to make sure that the entire string matches", "result", "=", "expression_sub", "(", "expression_object", "[", "'Expression'", "]", ",", "''", ",", "test", ".", "strip", "(", ")", ")", "==", "''", "testing_framework", ".", "assertTrue", "(", "result", ",", "match_error_msg", ".", "format", "(", "expression_type_name", ",", "name", ",", "test", ")", ")", "if", "'Non-Matches'", "in", "expression_object", ".", "keys", "(", ")", ":", "for", "test", "in", "expression_object", "[", "'Non-Matches'", "]", ".", "split", "(", "'|'", ")", ":", "result", "=", "expression_sub", "(", "expression_object", "[", "'Expression'", "]", ",", "''", ",", "test", ".", "strip", "(", ")", ")", "==", "''", "testing_framework", ".", "assertFalse", "(", "result", ",", "non_match_error_msg", ".", "format", "(", "expression_type_name", ",", "name", ",", "test", ")", ")" ]
>>> class mock_framework: ... def assertIn(self, item, list, msg="Failed asserting item is in list"): ... if item not in list: raise Exception(msg) ... def assertTrue(self, value, msg="Failed asserting true"): ... if not value: raise Exception(msg) ... def assertFalse(self, value, msg): self.assertTrue(not value, msg) >>> check_expression(mock_framework(), ... {'class': {'group' :{'Matches': " 0 | 1", 'Non-Matches': "2 | 0 2", 'Expression': "[0-1]"}}})
[ ">>>", "class", "mock_framework", ":", "...", "def", "assertIn", "(", "self", "item", "list", "msg", "=", "Failed", "asserting", "item", "is", "in", "list", ")", ":", "...", "if", "item", "not", "in", "list", ":", "raise", "Exception", "(", "msg", ")", "...", "def", "assertTrue", "(", "self", "value", "msg", "=", "Failed", "asserting", "true", ")", ":", "...", "if", "not", "value", ":", "raise", "Exception", "(", "msg", ")", "...", "def", "assertFalse", "(", "self", "value", "msg", ")", ":", "self", ".", "assertTrue", "(", "not", "value", "msg", ")", ">>>", "check_expression", "(", "mock_framework", "()", "...", "{", "class", ":", "{", "group", ":", "{", "Matches", ":", "0", "|", "1", "Non", "-", "Matches", ":", "2", "|", "0", "2", "Expression", ":", "[", "0", "-", "1", "]", "}}}", ")" ]
train
https://github.com/andychase/reparse/blob/5f46cdd0fc4e239c0ddeca4b542e48a5ae95c508/reparse/tools/expression_checker.py#L25-L48
Hackerfleet/hfos
modules/project/hfos/project/projectservice.py
ProjectService._get_future_tasks
def _get_future_tasks(self): """Assemble a list of future alerts""" self.alerts = {} now = std_now() for task in objectmodels['task'].find({'alert_time': {'$gt': now}}): self.alerts[task.alert_time] = task self.log('Found', len(self.alerts), 'future tasks')
python
def _get_future_tasks(self): """Assemble a list of future alerts""" self.alerts = {} now = std_now() for task in objectmodels['task'].find({'alert_time': {'$gt': now}}): self.alerts[task.alert_time] = task self.log('Found', len(self.alerts), 'future tasks')
[ "def", "_get_future_tasks", "(", "self", ")", ":", "self", ".", "alerts", "=", "{", "}", "now", "=", "std_now", "(", ")", "for", "task", "in", "objectmodels", "[", "'task'", "]", ".", "find", "(", "{", "'alert_time'", ":", "{", "'$gt'", ":", "now", "}", "}", ")", ":", "self", ".", "alerts", "[", "task", ".", "alert_time", "]", "=", "task", "self", ".", "log", "(", "'Found'", ",", "len", "(", "self", ".", "alerts", ")", ",", "'future tasks'", ")" ]
Assemble a list of future alerts
[ "Assemble", "a", "list", "of", "future", "alerts" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/project/hfos/project/projectservice.py#L69-L78
Hackerfleet/hfos
modules/project/hfos/project/projectservice.py
ProjectService.check_alerts
def check_alerts(self): """Periodical check to issue due alerts""" alerted = [] for alert_time, task in self.alerts.items(): task_time = dateutil.parser.parse(alert_time) if task_time < get_time(): self.log('Alerting about task now:', task) address = objectmodels['user'].find_one({'uuid': task.owner}).mail subject = "Task alert: %s" % task.name text = """Task alert is due:\n%s""" % task.notes self.fireEvent(send_mail(address, subject, text)) alerted.append(task.alert_time) for item in alerted: del self.alerts[item]
python
def check_alerts(self): """Periodical check to issue due alerts""" alerted = [] for alert_time, task in self.alerts.items(): task_time = dateutil.parser.parse(alert_time) if task_time < get_time(): self.log('Alerting about task now:', task) address = objectmodels['user'].find_one({'uuid': task.owner}).mail subject = "Task alert: %s" % task.name text = """Task alert is due:\n%s""" % task.notes self.fireEvent(send_mail(address, subject, text)) alerted.append(task.alert_time) for item in alerted: del self.alerts[item]
[ "def", "check_alerts", "(", "self", ")", ":", "alerted", "=", "[", "]", "for", "alert_time", ",", "task", "in", "self", ".", "alerts", ".", "items", "(", ")", ":", "task_time", "=", "dateutil", ".", "parser", ".", "parse", "(", "alert_time", ")", "if", "task_time", "<", "get_time", "(", ")", ":", "self", ".", "log", "(", "'Alerting about task now:'", ",", "task", ")", "address", "=", "objectmodels", "[", "'user'", "]", ".", "find_one", "(", "{", "'uuid'", ":", "task", ".", "owner", "}", ")", ".", "mail", "subject", "=", "\"Task alert: %s\"", "%", "task", ".", "name", "text", "=", "\"\"\"Task alert is due:\\n%s\"\"\"", "%", "task", ".", "notes", "self", ".", "fireEvent", "(", "send_mail", "(", "address", ",", "subject", ",", "text", ")", ")", "alerted", ".", "append", "(", "task", ".", "alert_time", ")", "for", "item", "in", "alerted", ":", "del", "self", ".", "alerts", "[", "item", "]" ]
Periodical check to issue due alerts
[ "Periodical", "check", "to", "issue", "due", "alerts" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/project/hfos/project/projectservice.py#L103-L122
Hackerfleet/hfos
modules/busrepeater/hfos/busrepeater/busrepeater.py
BusRepeater.read
def read(self, data): """Handles incoming raw sensor data and broadcasts it to specified udp servers and connected tcp clients :param data: NMEA raw sentences incoming data """ self.log('Received NMEA data:', data, lvl=debug) # self.log(data, pretty=True) if self._tcp_socket is not None and \ len(self._connected_tcp_endpoints) > 0: self.log('Publishing data on tcp server', lvl=debug) for endpoint in self._connected_tcp_endpoints: self.fireEvent( write( endpoint, bytes(data, 'ascii')), self.channel + '_tcp' ) if self._udp_socket is not None and \ len(self.config.udp_endpoints) > 0: self.log('Publishing data to udp endpoints', lvl=debug) for endpoint in self.config.udp_endpoints: host, port = endpoint.split(":") self.log('Transmitting to', endpoint, lvl=verbose) self.fireEvent( write( (host, int(port)), bytes(data, 'ascii') ), self.channel + '_udp' )
python
def read(self, data): """Handles incoming raw sensor data and broadcasts it to specified udp servers and connected tcp clients :param data: NMEA raw sentences incoming data """ self.log('Received NMEA data:', data, lvl=debug) # self.log(data, pretty=True) if self._tcp_socket is not None and \ len(self._connected_tcp_endpoints) > 0: self.log('Publishing data on tcp server', lvl=debug) for endpoint in self._connected_tcp_endpoints: self.fireEvent( write( endpoint, bytes(data, 'ascii')), self.channel + '_tcp' ) if self._udp_socket is not None and \ len(self.config.udp_endpoints) > 0: self.log('Publishing data to udp endpoints', lvl=debug) for endpoint in self.config.udp_endpoints: host, port = endpoint.split(":") self.log('Transmitting to', endpoint, lvl=verbose) self.fireEvent( write( (host, int(port)), bytes(data, 'ascii') ), self.channel + '_udp' )
[ "def", "read", "(", "self", ",", "data", ")", ":", "self", ".", "log", "(", "'Received NMEA data:'", ",", "data", ",", "lvl", "=", "debug", ")", "# self.log(data, pretty=True)", "if", "self", ".", "_tcp_socket", "is", "not", "None", "and", "len", "(", "self", ".", "_connected_tcp_endpoints", ")", ">", "0", ":", "self", ".", "log", "(", "'Publishing data on tcp server'", ",", "lvl", "=", "debug", ")", "for", "endpoint", "in", "self", ".", "_connected_tcp_endpoints", ":", "self", ".", "fireEvent", "(", "write", "(", "endpoint", ",", "bytes", "(", "data", ",", "'ascii'", ")", ")", ",", "self", ".", "channel", "+", "'_tcp'", ")", "if", "self", ".", "_udp_socket", "is", "not", "None", "and", "len", "(", "self", ".", "config", ".", "udp_endpoints", ")", ">", "0", ":", "self", ".", "log", "(", "'Publishing data to udp endpoints'", ",", "lvl", "=", "debug", ")", "for", "endpoint", "in", "self", ".", "config", ".", "udp_endpoints", ":", "host", ",", "port", "=", "endpoint", ".", "split", "(", "\":\"", ")", "self", ".", "log", "(", "'Transmitting to'", ",", "endpoint", ",", "lvl", "=", "verbose", ")", "self", ".", "fireEvent", "(", "write", "(", "(", "host", ",", "int", "(", "port", ")", ")", ",", "bytes", "(", "data", ",", "'ascii'", ")", ")", ",", "self", ".", "channel", "+", "'_udp'", ")" ]
Handles incoming raw sensor data and broadcasts it to specified udp servers and connected tcp clients :param data: NMEA raw sentences incoming data
[ "Handles", "incoming", "raw", "sensor", "data", "and", "broadcasts", "it", "to", "specified", "udp", "servers", "and", "connected", "tcp", "clients", ":", "param", "data", ":", "NMEA", "raw", "sentences", "incoming", "data" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/modules/busrepeater/hfos/busrepeater/busrepeater.py#L130-L163
Hackerfleet/hfos
hfos/tool/misc.py
cmdmap
def cmdmap(xdot): """Generates a command map""" # TODO: Integrate the output into documentation from copy import copy def print_commands(command, map_output, groups=None, depth=0): if groups is None: groups = [] if 'commands' in command.__dict__: if len(groups) > 0: if xdot: line = " %s -> %s [weight=1.0];\n" % (groups[-1], command.name) else: line = " " * (depth - 1) + "%s %s\n" % (groups[-1], command.name) map_output.append(line) for item in command.commands.values(): subgroups = copy(groups) subgroups.append(command.name) print_commands(item, map_output, subgroups, depth + 1) else: if xdot: line = " %s -> %s [weight=%1.1f];\n" % (groups[-1], command.name, len(groups)) else: line = " " * (len(groups) - 3 + depth) + "%s %s\n" % (groups[-1], command.name) map_output.append(line) output = [] print_commands(cli, output) output = [line.replace("cli", "isomer") for line in output] if xdot: with open('iso.dot', 'w') as f: f.write('strict digraph {\n') f.writelines(sorted(output)) f.write('}') run_process('.', ['xdot', 'iso.dot']) else: print("".join(output))
python
def cmdmap(xdot): """Generates a command map""" # TODO: Integrate the output into documentation from copy import copy def print_commands(command, map_output, groups=None, depth=0): if groups is None: groups = [] if 'commands' in command.__dict__: if len(groups) > 0: if xdot: line = " %s -> %s [weight=1.0];\n" % (groups[-1], command.name) else: line = " " * (depth - 1) + "%s %s\n" % (groups[-1], command.name) map_output.append(line) for item in command.commands.values(): subgroups = copy(groups) subgroups.append(command.name) print_commands(item, map_output, subgroups, depth + 1) else: if xdot: line = " %s -> %s [weight=%1.1f];\n" % (groups[-1], command.name, len(groups)) else: line = " " * (len(groups) - 3 + depth) + "%s %s\n" % (groups[-1], command.name) map_output.append(line) output = [] print_commands(cli, output) output = [line.replace("cli", "isomer") for line in output] if xdot: with open('iso.dot', 'w') as f: f.write('strict digraph {\n') f.writelines(sorted(output)) f.write('}') run_process('.', ['xdot', 'iso.dot']) else: print("".join(output))
[ "def", "cmdmap", "(", "xdot", ")", ":", "# TODO: Integrate the output into documentation", "from", "copy", "import", "copy", "def", "print_commands", "(", "command", ",", "map_output", ",", "groups", "=", "None", ",", "depth", "=", "0", ")", ":", "if", "groups", "is", "None", ":", "groups", "=", "[", "]", "if", "'commands'", "in", "command", ".", "__dict__", ":", "if", "len", "(", "groups", ")", ">", "0", ":", "if", "xdot", ":", "line", "=", "\" %s -> %s [weight=1.0];\\n\"", "%", "(", "groups", "[", "-", "1", "]", ",", "command", ".", "name", ")", "else", ":", "line", "=", "\" \"", "*", "(", "depth", "-", "1", ")", "+", "\"%s %s\\n\"", "%", "(", "groups", "[", "-", "1", "]", ",", "command", ".", "name", ")", "map_output", ".", "append", "(", "line", ")", "for", "item", "in", "command", ".", "commands", ".", "values", "(", ")", ":", "subgroups", "=", "copy", "(", "groups", ")", "subgroups", ".", "append", "(", "command", ".", "name", ")", "print_commands", "(", "item", ",", "map_output", ",", "subgroups", ",", "depth", "+", "1", ")", "else", ":", "if", "xdot", ":", "line", "=", "\" %s -> %s [weight=%1.1f];\\n\"", "%", "(", "groups", "[", "-", "1", "]", ",", "command", ".", "name", ",", "len", "(", "groups", ")", ")", "else", ":", "line", "=", "\" \"", "*", "(", "len", "(", "groups", ")", "-", "3", "+", "depth", ")", "+", "\"%s %s\\n\"", "%", "(", "groups", "[", "-", "1", "]", ",", "command", ".", "name", ")", "map_output", ".", "append", "(", "line", ")", "output", "=", "[", "]", "print_commands", "(", "cli", ",", "output", ")", "output", "=", "[", "line", ".", "replace", "(", "\"cli\"", ",", "\"isomer\"", ")", "for", "line", "in", "output", "]", "if", "xdot", ":", "with", "open", "(", "'iso.dot'", ",", "'w'", ")", "as", "f", ":", "f", ".", "write", "(", "'strict digraph {\\n'", ")", "f", ".", "writelines", "(", "sorted", "(", "output", ")", ")", "f", ".", "write", "(", "'}'", ")", "run_process", "(", "'.'", ",", "[", "'xdot'", ",", "'iso.dot'", "]", ")", "else", ":", "print", "(", "\"\"", ".", "join", "(", "output", ")", ")" ]
Generates a command map
[ "Generates", "a", "command", "map" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/misc.py#L47-L88
Hackerfleet/hfos
hfos/tool/templates.py
format_template
def format_template(template, content): """Render a given pystache template with given content""" import pystache result = u"" if True: # try: result = pystache.render(template, content, string_encoding='utf-8') # except (ValueError, KeyError) as e: # print("Templating error: %s %s" % (e, type(e))) # pprint(result) return result
python
def format_template(template, content): """Render a given pystache template with given content""" import pystache result = u"" if True: # try: result = pystache.render(template, content, string_encoding='utf-8') # except (ValueError, KeyError) as e: # print("Templating error: %s %s" % (e, type(e))) # pprint(result) return result
[ "def", "format_template", "(", "template", ",", "content", ")", ":", "import", "pystache", "result", "=", "u\"\"", "if", "True", ":", "# try:", "result", "=", "pystache", ".", "render", "(", "template", ",", "content", ",", "string_encoding", "=", "'utf-8'", ")", "# except (ValueError, KeyError) as e:", "# print(\"Templating error: %s %s\" % (e, type(e)))", "# pprint(result)", "return", "result" ]
Render a given pystache template with given content
[ "Render", "a", "given", "pystache", "template", "with", "given", "content" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/templates.py#L27-L39
Hackerfleet/hfos
hfos/tool/templates.py
format_template_file
def format_template_file(filename, content): """Render a given pystache template file with given content""" with open(filename, 'r') as f: template = f.read() if type(template) != str: template = template.decode('utf-8') return format_template(template, content)
python
def format_template_file(filename, content): """Render a given pystache template file with given content""" with open(filename, 'r') as f: template = f.read() if type(template) != str: template = template.decode('utf-8') return format_template(template, content)
[ "def", "format_template_file", "(", "filename", ",", "content", ")", ":", "with", "open", "(", "filename", ",", "'r'", ")", "as", "f", ":", "template", "=", "f", ".", "read", "(", ")", "if", "type", "(", "template", ")", "!=", "str", ":", "template", "=", "template", ".", "decode", "(", "'utf-8'", ")", "return", "format_template", "(", "template", ",", "content", ")" ]
Render a given pystache template file with given content
[ "Render", "a", "given", "pystache", "template", "file", "with", "given", "content" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/templates.py#L42-L50
Hackerfleet/hfos
hfos/tool/templates.py
write_template_file
def write_template_file(source, target, content): """Write a new file from a given pystache template file and content""" # print(formatTemplateFile(source, content)) print(target) data = format_template_file(source, content) with open(target, 'w') as f: for line in data: if type(line) != str: line = line.encode('utf-8') f.write(line)
python
def write_template_file(source, target, content): """Write a new file from a given pystache template file and content""" # print(formatTemplateFile(source, content)) print(target) data = format_template_file(source, content) with open(target, 'w') as f: for line in data: if type(line) != str: line = line.encode('utf-8') f.write(line)
[ "def", "write_template_file", "(", "source", ",", "target", ",", "content", ")", ":", "# print(formatTemplateFile(source, content))", "print", "(", "target", ")", "data", "=", "format_template_file", "(", "source", ",", "content", ")", "with", "open", "(", "target", ",", "'w'", ")", "as", "f", ":", "for", "line", "in", "data", ":", "if", "type", "(", "line", ")", "!=", "str", ":", "line", "=", "line", ".", "encode", "(", "'utf-8'", ")", "f", ".", "write", "(", "line", ")" ]
Write a new file from a given pystache template file and content
[ "Write", "a", "new", "file", "from", "a", "given", "pystache", "template", "file", "and", "content" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/templates.py#L53-L63
Hackerfleet/hfos
hfos/tool/templates.py
insert_nginx_service
def insert_nginx_service(definition): # pragma: no cover """Insert a new nginx service definition""" config_file = '/etc/nginx/sites-available/hfos.conf' splitter = "### SERVICE DEFINITIONS ###" with open(config_file, 'r') as f: old_config = "".join(f.readlines()) pprint(old_config) if definition in old_config: print("Service definition already inserted") return parts = old_config.split(splitter) print(len(parts)) if len(parts) != 3: print("Nginx configuration seems to be changed and cannot be " "extended automatically anymore!") pprint(parts) return try: with open(config_file, "w") as f: f.write(parts[0]) f.write(splitter + "\n") f.write(parts[1]) for line in definition: f.write(line) f.write("\n " + splitter) f.write(parts[2]) except Exception as e: print("Error during Nginx configuration extension:", type(e), e)
python
def insert_nginx_service(definition): # pragma: no cover """Insert a new nginx service definition""" config_file = '/etc/nginx/sites-available/hfos.conf' splitter = "### SERVICE DEFINITIONS ###" with open(config_file, 'r') as f: old_config = "".join(f.readlines()) pprint(old_config) if definition in old_config: print("Service definition already inserted") return parts = old_config.split(splitter) print(len(parts)) if len(parts) != 3: print("Nginx configuration seems to be changed and cannot be " "extended automatically anymore!") pprint(parts) return try: with open(config_file, "w") as f: f.write(parts[0]) f.write(splitter + "\n") f.write(parts[1]) for line in definition: f.write(line) f.write("\n " + splitter) f.write(parts[2]) except Exception as e: print("Error during Nginx configuration extension:", type(e), e)
[ "def", "insert_nginx_service", "(", "definition", ")", ":", "# pragma: no cover", "config_file", "=", "'/etc/nginx/sites-available/hfos.conf'", "splitter", "=", "\"### SERVICE DEFINITIONS ###\"", "with", "open", "(", "config_file", ",", "'r'", ")", "as", "f", ":", "old_config", "=", "\"\"", ".", "join", "(", "f", ".", "readlines", "(", ")", ")", "pprint", "(", "old_config", ")", "if", "definition", "in", "old_config", ":", "print", "(", "\"Service definition already inserted\"", ")", "return", "parts", "=", "old_config", ".", "split", "(", "splitter", ")", "print", "(", "len", "(", "parts", ")", ")", "if", "len", "(", "parts", ")", "!=", "3", ":", "print", "(", "\"Nginx configuration seems to be changed and cannot be \"", "\"extended automatically anymore!\"", ")", "pprint", "(", "parts", ")", "return", "try", ":", "with", "open", "(", "config_file", ",", "\"w\"", ")", "as", "f", ":", "f", ".", "write", "(", "parts", "[", "0", "]", ")", "f", ".", "write", "(", "splitter", "+", "\"\\n\"", ")", "f", ".", "write", "(", "parts", "[", "1", "]", ")", "for", "line", "in", "definition", ":", "f", ".", "write", "(", "line", ")", "f", ".", "write", "(", "\"\\n \"", "+", "splitter", ")", "f", ".", "write", "(", "parts", "[", "2", "]", ")", "except", "Exception", "as", "e", ":", "print", "(", "\"Error during Nginx configuration extension:\"", ",", "type", "(", "e", ")", ",", "e", ")" ]
Insert a new nginx service definition
[ "Insert", "a", "new", "nginx", "service", "definition" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/templates.py#L66-L99
Hackerfleet/hfos
hfos/tool/rbac.py
rbac
def rbac(ctx, schema, object_filter, action, role, all_schemata): """[GROUP] Role based access control""" database = ctx.obj['db'] if schema is None: if all_schemata is False: log('No schema given. Read the RBAC group help', lvl=warn) sys.exit() else: schemata = database.objectmodels.keys() else: schemata = [schema] things = [] if object_filter is None: parsed_filter = {} else: parsed_filter = json.loads(object_filter) for schema in schemata: for obj in database.objectmodels[schema].find(parsed_filter): things.append(obj) if len(things) == 0: log('No objects matched the criteria.', lvl=warn) sys.exit() ctx.obj['objects'] = things ctx.obj['action'] = action ctx.obj['role'] = role
python
def rbac(ctx, schema, object_filter, action, role, all_schemata): """[GROUP] Role based access control""" database = ctx.obj['db'] if schema is None: if all_schemata is False: log('No schema given. Read the RBAC group help', lvl=warn) sys.exit() else: schemata = database.objectmodels.keys() else: schemata = [schema] things = [] if object_filter is None: parsed_filter = {} else: parsed_filter = json.loads(object_filter) for schema in schemata: for obj in database.objectmodels[schema].find(parsed_filter): things.append(obj) if len(things) == 0: log('No objects matched the criteria.', lvl=warn) sys.exit() ctx.obj['objects'] = things ctx.obj['action'] = action ctx.obj['role'] = role
[ "def", "rbac", "(", "ctx", ",", "schema", ",", "object_filter", ",", "action", ",", "role", ",", "all_schemata", ")", ":", "database", "=", "ctx", ".", "obj", "[", "'db'", "]", "if", "schema", "is", "None", ":", "if", "all_schemata", "is", "False", ":", "log", "(", "'No schema given. Read the RBAC group help'", ",", "lvl", "=", "warn", ")", "sys", ".", "exit", "(", ")", "else", ":", "schemata", "=", "database", ".", "objectmodels", ".", "keys", "(", ")", "else", ":", "schemata", "=", "[", "schema", "]", "things", "=", "[", "]", "if", "object_filter", "is", "None", ":", "parsed_filter", "=", "{", "}", "else", ":", "parsed_filter", "=", "json", ".", "loads", "(", "object_filter", ")", "for", "schema", "in", "schemata", ":", "for", "obj", "in", "database", ".", "objectmodels", "[", "schema", "]", ".", "find", "(", "parsed_filter", ")", ":", "things", ".", "append", "(", "obj", ")", "if", "len", "(", "things", ")", "==", "0", ":", "log", "(", "'No objects matched the criteria.'", ",", "lvl", "=", "warn", ")", "sys", ".", "exit", "(", ")", "ctx", ".", "obj", "[", "'objects'", "]", "=", "things", "ctx", ".", "obj", "[", "'action'", "]", "=", "action", "ctx", ".", "obj", "[", "'role'", "]", "=", "role" ]
[GROUP] Role based access control
[ "[", "GROUP", "]", "Role", "based", "access", "control" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/rbac.py#L42-L73
Hackerfleet/hfos
hfos/tool/rbac.py
add_action_role
def add_action_role(ctx): """Adds a role to an action on objects""" objects = ctx.obj['objects'] action = ctx.obj['action'] role = ctx.obj['role'] if action is None or role is None: log('You need to specify an action or role to the RBAC command group for this to work.', lvl=warn) return for item in objects: if role not in item.perms[action]: item.perms[action].append(role) item.save() log("Done")
python
def add_action_role(ctx): """Adds a role to an action on objects""" objects = ctx.obj['objects'] action = ctx.obj['action'] role = ctx.obj['role'] if action is None or role is None: log('You need to specify an action or role to the RBAC command group for this to work.', lvl=warn) return for item in objects: if role not in item.perms[action]: item.perms[action].append(role) item.save() log("Done")
[ "def", "add_action_role", "(", "ctx", ")", ":", "objects", "=", "ctx", ".", "obj", "[", "'objects'", "]", "action", "=", "ctx", ".", "obj", "[", "'action'", "]", "role", "=", "ctx", ".", "obj", "[", "'role'", "]", "if", "action", "is", "None", "or", "role", "is", "None", ":", "log", "(", "'You need to specify an action or role to the RBAC command group for this to work.'", ",", "lvl", "=", "warn", ")", "return", "for", "item", "in", "objects", ":", "if", "role", "not", "in", "item", ".", "perms", "[", "action", "]", ":", "item", ".", "perms", "[", "action", "]", ".", "append", "(", "role", ")", "item", ".", "save", "(", ")", "log", "(", "\"Done\"", ")" ]
Adds a role to an action on objects
[ "Adds", "a", "role", "to", "an", "action", "on", "objects" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/rbac.py#L78-L94
Hackerfleet/hfos
hfos/tool/rbac.py
del_action_role
def del_action_role(ctx): """Deletes a role from an action on objects""" objects = ctx.obj['objects'] action = ctx.obj['action'] role = ctx.obj['role'] if action is None or role is None: log('You need to specify an action or role to the RBAC command group for this to work.', lvl=warn) return for item in objects: if role in item.perms[action]: item.perms[action].remove(role) item.save() log("Done")
python
def del_action_role(ctx): """Deletes a role from an action on objects""" objects = ctx.obj['objects'] action = ctx.obj['action'] role = ctx.obj['role'] if action is None or role is None: log('You need to specify an action or role to the RBAC command group for this to work.', lvl=warn) return for item in objects: if role in item.perms[action]: item.perms[action].remove(role) item.save() log("Done")
[ "def", "del_action_role", "(", "ctx", ")", ":", "objects", "=", "ctx", ".", "obj", "[", "'objects'", "]", "action", "=", "ctx", ".", "obj", "[", "'action'", "]", "role", "=", "ctx", ".", "obj", "[", "'role'", "]", "if", "action", "is", "None", "or", "role", "is", "None", ":", "log", "(", "'You need to specify an action or role to the RBAC command group for this to work.'", ",", "lvl", "=", "warn", ")", "return", "for", "item", "in", "objects", ":", "if", "role", "in", "item", ".", "perms", "[", "action", "]", ":", "item", ".", "perms", "[", "action", "]", ".", "remove", "(", "role", ")", "item", ".", "save", "(", ")", "log", "(", "\"Done\"", ")" ]
Deletes a role from an action on objects
[ "Deletes", "a", "role", "from", "an", "action", "on", "objects" ]
train
https://github.com/Hackerfleet/hfos/blob/b6df14eacaffb6be5c844108873ff8763ec7f0c9/hfos/tool/rbac.py#L99-L115