text
stringlengths 0
828
|
|---|
if name is None:
|
warnings.warn(""Ignoring unnamed metric"", stacklevel=3)
|
return
|
with cls.lock:
|
# register with atexit on first call
|
if cls.dump_atexit and not cls.instances:
|
atexit.register(cls.dump)
|
try:
|
self = cls.instances[name]
|
except KeyError:
|
self = cls.instances[name] = cls(name)
|
self.temp.write(self.struct.pack(count, elapsed))"
|
1078,"def dump(cls):
|
""""""Output all recorded metrics""""""
|
with cls.lock:
|
if not cls.instances: return
|
atexit.unregister(cls.dump)
|
cls._pre_dump()
|
for self in cls.instances.values():
|
self._dump()
|
cls._post_dump()"
|
1079,"def _dump(self):
|
""""""dump data for an individual metric. For internal use only.""""""
|
try:
|
self.temp.seek(0) # seek to beginning
|
arr = np.fromfile(self.temp, self.dtype)
|
self.count_arr = arr['count']
|
self.elapsed_arr = arr['elapsed']
|
if self.calc_stats:
|
# calculate mean & standard deviation
|
self.count_mean = np.mean(self.count_arr)
|
self.count_std = np.std(self.count_arr)
|
self.elapsed_mean = np.mean(self.elapsed_arr)
|
self.elapsed_std = np.std(self.elapsed_arr)
|
self._output()
|
finally:
|
self.temp.close()
|
self._cleanup()"
|
1080,"def list(self, host_rec=None, service_rec=None, hostfilter=None):
|
""""""
|
Returns a list of vulnerabilities based on t_hosts.id or t_services.id.
|
If neither are set then statistical results are added
|
:param host_rec: db.t_hosts.id
|
:param service_rec: db.t_services.id
|
:param hostfilter: Valid hostfilter or None
|
:return: [(vulndata) ...] if host_rec or service_rec set
|
:return: [(vulndata, vuln_cnt, [vuln_ip, ...], [services ...]) ...] if nothing sent
|
""""""
|
return self.send.vuln_list(host_rec, service_rec, hostfilter)"
|
1081,"def ip_info(self, vuln_name=None, vuln_id=None, ip_list_only=True, hostfilter=None):
|
""""""
|
List of all IP Addresses with a vulnerability
|
:param vuln_name: t_vulndata.f_vulnid
|
:param vuln_id: t_vulndata.id
|
:param ip_list_only: IP List only (default) or rest of t_hosts fields
|
:param hostfilter: Valid hostfilter or none
|
:return: [(ip, hostname) ...] or [(ip, hostname, t_service_vulns.f_proof, t_service_vulns.f_status), ...]
|
""""""
|
return self.send.vuln_ip_info(vuln_name, vuln_id, ip_list_only, hostfilter)"
|
1082,"def service_list(self, vuln_name=None, vuln_id=None, hostfilter=None):
|
""""""
|
Returns a dictionary of vulns with services and IP Addresses
|
:param vuln_name: t_vulndata.f_vulnid
|
:param vuln_id: t_vulndata.id
|
:param hostfilter: Valid hostfilter or none
|
:return: {'vuln-id': {'port': [ ip, hostname ]} ...} ...
|
""""""
|
return self.send.vuln_service_list(vuln_name, vuln_id, hostfilter)"
|
1083,"def import_code(mod_code, mod_name):
|
""""""Create a module object by code.
|
@param mod_code: the code that the module contains.
|
@param mod_name: module name.
|
""""""
|
mod_obj = imp.new_module(mod_name)
|
mod_obj.__file__ = None
|
exec_(mod_code, mod_obj.__dict__, mod_obj.__dict__)
|
add_to_sys_modules(mod_name=mod_name, mod_obj=mod_obj)
|
return mod_obj"
|
1084,"def import_name(mod_name):
|
""""""Import a module by module name.
|
@param mod_name: module name.
|
""""""
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.