prompt
large_stringlengths
72
9.34k
completion
large_stringlengths
0
7.61k
<|file_name|>tasks.py<|end_file_name|><|fim▁begin|>from celery.task import Task import requests class StracksFlushTask(Task): def <|fim_middle|>(self, url, data): requests.post(url + "/", data=data) <|fim▁end|>
run
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. <|fim▁hole|> if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user))<|fim▁end|>
If both default_project and project is provided, the default_project will be used. """
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): <|fim_middle|> class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
"""Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): <|fim_middle|> <|fim▁end|>
"""Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): <|fim_middle|> @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): <|fim_middle|> @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
"""Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): <|fim_middle|> def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
"""List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): <|fim_middle|> @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
return super(UserManager, self).get( user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): <|fim_middle|> def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
"""Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): <|fim_middle|> def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
"""Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'})
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): <|fim_middle|> def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): <|fim_middle|> def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): <|fim_middle|> def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): <|fim_middle|> <|fim▁end|>
return super(UserManager, self).delete( user_id=base.getid(user))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): <|fim_middle|> @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: <|fim_middle|> default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
LOG.warning(_LW("The project argument is deprecated, " "use default_project instead."))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: <|fim_middle|> default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
LOG.warning(_LW("The project argument is deprecated, " "use default_project instead."))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: <|fim_middle|> else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
base_url = '/groups/%s' % base.getid(group)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: <|fim_middle|> return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
base_url = None
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: <|fim_middle|> default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
LOG.warning(_LW("The project argument is deprecated, " "use default_project instead."))
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): <|fim_middle|> if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: <|fim_middle|> params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg)
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def <|fim_middle|>(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
_require_user_and_group
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def <|fim_middle|>(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
create
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def <|fim_middle|>(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
list
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def <|fim_middle|>(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
get
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def <|fim_middle|>(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
update
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def <|fim_middle|>(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
update_password
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def <|fim_middle|>(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
add_to_group
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def <|fim_middle|>(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
check_in_group
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def <|fim_middle|>(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def delete(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
remove_from_group
<|file_name|>users.py<|end_file_name|><|fim▁begin|># Copyright 2011 OpenStack Foundation # Copyright 2011 Nebula, Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import logging from keystoneclient import base from keystoneclient import exceptions from keystoneclient.i18n import _, _LW from keystoneclient import utils LOG = logging.getLogger(__name__) class User(base.Resource): """Represents an Identity user. Attributes: * id: a uuid that identifies the user """ pass class UserManager(base.CrudManager): """Manager class for manipulating Identity users.""" resource_class = User collection_key = 'users' key = 'user' def _require_user_and_group(self, user, group): if not (user and group): msg = _('Specify both a user and a group') raise exceptions.ValidationError(msg) @utils.positional(1, enforcement=utils.positional.WARN) def create(self, name, domain=None, project=None, password=None, email=None, description=None, enabled=True, default_project=None, **kwargs): """Create a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._create('/users', {'user': user_data}, 'user', log=not bool(password)) @utils.positional(enforcement=utils.positional.WARN) def list(self, project=None, domain=None, group=None, default_project=None, **kwargs): """List users. If project, domain or group are provided, then filter users with those attributes. If ``**kwargs`` are provided, then filter users with attributes matching ``**kwargs``. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) if group: base_url = '/groups/%s' % base.getid(group) else: base_url = None return super(UserManager, self).list( base_url=base_url, domain_id=base.getid(domain), default_project_id=default_project_id, **kwargs) def get(self, user): return super(UserManager, self).get( user_id=base.getid(user)) @utils.positional(enforcement=utils.positional.WARN) def update(self, user, name=None, domain=None, project=None, password=None, email=None, description=None, enabled=None, default_project=None, **kwargs): """Update a user. .. warning:: The project argument is deprecated, use default_project instead. If both default_project and project is provided, the default_project will be used. """ if project: LOG.warning(_LW("The project argument is deprecated, " "use default_project instead.")) default_project_id = base.getid(default_project) or base.getid(project) user_data = base.filter_none(name=name, domain_id=base.getid(domain), default_project_id=default_project_id, password=password, email=email, description=description, enabled=enabled, **kwargs) return self._update('/users/%s' % base.getid(user), {'user': user_data}, 'user', method='PATCH', log=False) def update_password(self, old_password, new_password): """Update the password for the user the token belongs to.""" if not (old_password and new_password): msg = _('Specify both the current password and a new password') raise exceptions.ValidationError(msg) if old_password == new_password: msg = _('Old password and new password must be different.') raise exceptions.ValidationError(msg) params = {'user': {'password': new_password, 'original_password': old_password}} base_url = '/users/%s/password' % self.api.user_id return self._update(base_url, params, method='POST', log=False, endpoint_filter={'interface': 'public'}) def add_to_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).put( base_url=base_url, user_id=base.getid(user)) def check_in_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).head( base_url=base_url, user_id=base.getid(user)) def remove_from_group(self, user, group): self._require_user_and_group(user, group) base_url = '/groups/%s' % base.getid(group) return super(UserManager, self).delete( base_url=base_url, user_id=base.getid(user)) def <|fim_middle|>(self, user): return super(UserManager, self).delete( user_id=base.getid(user)) <|fim▁end|>
delete
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final")<|fim▁hole|> (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d)<|fim▁end|>
words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): <|fim_middle|> nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
return dict(zip(words, range(0, len(words))))
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): <|fim_middle|> def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text)
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): <|fim_middle|> modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: <|fim_middle|> else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: <|fim_middle|> def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: <|fim_middle|> # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': <|fim_middle|> <|fim▁end|>
args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d)
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": <|fim_middle|> if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
if args[1] in ks: k = args[1] args = args[2:]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: <|fim_middle|> args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
k = args[1]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: <|fim_middle|> if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
if args[1] in modes: mode = args[1] args = args[2:]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: <|fim_middle|> args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
mode = args[1]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: <|fim_middle|> if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): <|fim_middle|> args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
num = int(args[1])
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: <|fim_middle|> model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
if args[1] in dist: dfun = args[1] args = args[2:]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: <|fim_middle|> args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
dfun = args[1]
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": <|fim_middle|> elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
metric = distance fmt = '%d'
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": <|fim_middle|> else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
metric = kl_divergence fmt = '%f'
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: <|fim_middle|> papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
metric = kl_divergence fmt = '%f'
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def <|fim_middle|>(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
words_to_dict
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def <|fim_middle|>(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def make_bow(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
tokens
<|file_name|>infer.py<|end_file_name|><|fim▁begin|>import sys, os import pickle import nltk import paths from utils import * def words_to_dict(words): return dict(zip(words, range(0, len(words)))) nltk.data.path.append(paths.nltk_data_path) use_wordnet = True if use_wordnet: stemmer = nltk.stem.wordnet.WordNetLemmatizer() stem = stemmer.lemmatize else: stemmer = nltk.stem.porter.PorterStemmer() stem = stemmer.stem def tokens(text): replacements = [("---"," "), ("--"," "), ("-", "")] # trying to capture multi-word keywords for (src,tgt) in replacements: text = text.replace(src,tgt) return preprocess(text) def <|fim_middle|>(doc,d): bow = {} for word in doc: if word in d: wordid = d[word] bow[wordid] = bow.get(wordid,0) + 1 # XXX we should notify something about non-stopwords that we couldn't parse return bow modes = ["fulltext","abstracts"] ks = ["20","50","100","200"] dist = ["kl","euclidean"] if __name__ == '__main__': args = sys.argv[1:] mode = modes[0] k = ks[0] dfun = dist[0] num = 20 while len(args) > 1: if args[0] == "-k": if args[1] in ks: k = args[1] args = args[2:] if args[0] in ["-m","--mode"]: if args[1] in modes: mode = args[1] args = args[2:] if args[0] in ["-n","--num"]: if int(args[1]) in range(1,50): num = int(args[1]) args = args[2:] if args[0] in ["-d","--distance"]: if args[1] in dist: dfun = args[1] args = args[2:] model = os.path.join(mode,"lda" + k,"final") words = os.path.join(mode,"vocab.dat") docs = os.path.join(mode,"docs.dat") pdf_file = args[0] (base,_) = os.path.splitext(pdf_file) text = os.popen("/usr/bin/pdftotext \"%s\" -" % pdf_file).read() # XXX safe filenames! vocab = words_to_dict(open(words).read().split()) bow = make_bow(map(stem,tokens(text)),vocab) dat_file = base + ".dat" out = open(dat_file,"w") out.write(str(len(bow))) out.write(' ') for term in bow: out.write(str(term)) out.write(':') out.write(str(bow[term])) out.write(' ') out.write('\n') out.close() log = base + ".log" os.system(paths.lda + " inf settings.txt %s %s %s >%s 2>&1" % (model,dat_file,base,log)) # XXX capture output, handle errors inf = read(base + "-gamma.dat") gammas = read(model + ".gamma") papers = zip(read(docs), map(lambda s: map(float,s.split()), gammas)) tgt = ["INPUT PDF"] + map(lambda s: map(float,s.split()), inf) # XXX these are the topic values, if we want to visualize them # XXX be careful to not leak our filenames if dfun == "euclidean": metric = distance fmt = '%d' elif dfun == "kl": metric = kl_divergence fmt = '%f' else: metric = kl_divergence fmt = '%f' papers = map(lambda s: (metric(s[1],tgt[1]),s), papers) papers.sort(lambda x,y: cmp(x[0],y[0])) print "\nRelated papers:\n" for (d,(doc,gs)) in papers[0:num]: print (' %s (' + fmt + ')') % (doc,d) <|fim▁end|>
make_bow
<|file_name|>restore.py<|end_file_name|><|fim▁begin|>import os import shutil from glob import glob print 'Content-type:text/html\r\n\r\n' print '<html>' found_pages = glob('archive/*.py') if found_pages: path = "/cgi-bin/archive/" moveto = "/cgi-bin/pages/" files = os.listdir(path) files.sort()<|fim▁hole|> for f in files: src = path+f dst = moveto+f shutil.move(src, dst) print 'All pages restored' print '<meta http-equiv="refresh" content="1";>' if not found_pages: print 'Nothing to restore' print '</html>' # EOF<|fim▁end|>
<|file_name|>restore.py<|end_file_name|><|fim▁begin|>import os import shutil from glob import glob print 'Content-type:text/html\r\n\r\n' print '<html>' found_pages = glob('archive/*.py') if found_pages: <|fim_middle|> if not found_pages: print 'Nothing to restore' print '</html>' # EOF <|fim▁end|>
path = "/cgi-bin/archive/" moveto = "/cgi-bin/pages/" files = os.listdir(path) files.sort() for f in files: src = path+f dst = moveto+f shutil.move(src, dst) print 'All pages restored' print '<meta http-equiv="refresh" content="1";>'
<|file_name|>restore.py<|end_file_name|><|fim▁begin|>import os import shutil from glob import glob print 'Content-type:text/html\r\n\r\n' print '<html>' found_pages = glob('archive/*.py') if found_pages: path = "/cgi-bin/archive/" moveto = "/cgi-bin/pages/" files = os.listdir(path) files.sort() for f in files: src = path+f dst = moveto+f shutil.move(src, dst) print 'All pages restored' print '<meta http-equiv="refresh" content="1";>' if not found_pages: <|fim_middle|> print '</html>' # EOF <|fim▁end|>
print 'Nothing to restore'
<|file_name|>list.py<|end_file_name|><|fim▁begin|>a = [int(i) for i in input().split()]<|fim▁hole|><|fim▁end|>
print(sum(a))
<|file_name|>user.py<|end_file_name|><|fim▁begin|>from rest_framework import serializers from django.contrib.auth.models import User from dixit.account.models import UserProfile <|fim▁hole|>class UserProfileSerializer(serializers.ModelSerializer): class Meta: model = UserProfile fields = ('name', ) class UserSerializer(serializers.ModelSerializer): """ Serializes User objects """ profile = UserProfileSerializer() class Meta: model = User fields = ('id', 'username', 'email', 'profile', )<|fim▁end|>
<|file_name|>user.py<|end_file_name|><|fim▁begin|> from rest_framework import serializers from django.contrib.auth.models import User from dixit.account.models import UserProfile class UserProfileSerializer(serializers.ModelSerializer): <|fim_middle|> class UserSerializer(serializers.ModelSerializer): """ Serializes User objects """ profile = UserProfileSerializer() class Meta: model = User fields = ('id', 'username', 'email', 'profile', ) <|fim▁end|>
class Meta: model = UserProfile fields = ('name', )
<|file_name|>user.py<|end_file_name|><|fim▁begin|> from rest_framework import serializers from django.contrib.auth.models import User from dixit.account.models import UserProfile class UserProfileSerializer(serializers.ModelSerializer): class Meta: <|fim_middle|> class UserSerializer(serializers.ModelSerializer): """ Serializes User objects """ profile = UserProfileSerializer() class Meta: model = User fields = ('id', 'username', 'email', 'profile', ) <|fim▁end|>
model = UserProfile fields = ('name', )
<|file_name|>user.py<|end_file_name|><|fim▁begin|> from rest_framework import serializers from django.contrib.auth.models import User from dixit.account.models import UserProfile class UserProfileSerializer(serializers.ModelSerializer): class Meta: model = UserProfile fields = ('name', ) class UserSerializer(serializers.ModelSerializer): <|fim_middle|> <|fim▁end|>
""" Serializes User objects """ profile = UserProfileSerializer() class Meta: model = User fields = ('id', 'username', 'email', 'profile', )
<|file_name|>user.py<|end_file_name|><|fim▁begin|> from rest_framework import serializers from django.contrib.auth.models import User from dixit.account.models import UserProfile class UserProfileSerializer(serializers.ModelSerializer): class Meta: model = UserProfile fields = ('name', ) class UserSerializer(serializers.ModelSerializer): """ Serializes User objects """ profile = UserProfileSerializer() class Meta: <|fim_middle|> <|fim▁end|>
model = User fields = ('id', 'username', 'email', 'profile', )
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan <|fim▁hole|> f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini)<|fim▁end|>
dapet = 0 while (dapet==0): try:
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): <|fim_middle|> def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date +'%Y'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): <|fim_middle|> def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date +'%m'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): <|fim_middle|> def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date +'%d'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): <|fim_middle|> def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): <|fim_middle|> def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): <|fim_middle|> #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1]
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): <|fim_middle|> print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
t_bulan = 12 t_tahun = makinGetYear()-1
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def <|fim_middle|>(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetYear
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def <|fim_middle|>(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetMonth
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def <|fim_middle|>(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetDay
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def <|fim_middle|>(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetPrevYear
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def <|fim_middle|>(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def makinGetPrevDay(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetPrevMonth
<|file_name|>b__main_backu.py<|end_file_name|><|fim▁begin|>#!/usr/bin/env python import os,sys folder = "/media/kentir1/Development/Linux_Program/Fundkeep/" def makinGetYear(): return os.popen("date +'%Y'").read()[:-1] def makinGetMonth(): return os.popen("date +'%m'").read()[:-1] def makinGetDay(): return os.popen("date +'%d'").read()[:-1] def makinGetPrevYear(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%Y'").read()[:-1] def makinGetPrevMonth(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%m'").read()[:-1] def <|fim_middle|>(daypassed): return os.popen("date --date='"+str(daypassed)+" day ago' +'%d'").read()[:-1] #last entry f = open(folder+"data/last_entry","r") le = f.read() le_y=le[:4] le_m=le[4:6] le_d=le[6:] #input os.system("gedit "+folder+"var/input") f = open(folder+"var/input","r") data = f.read() f.close() balance_out = int(data[:data.find(" ")]) balance_ket = data[data.find(" ")+1:-1] print balance_ket os.system("mkdir "+folder+"data") os.system("mkdir "+folder+"data/"+makinGetYear()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()) os.system("mkdir "+folder+"data/"+makinGetYear()+"/"+makinGetMonth()+"/"+makinGetDay()) balance_before = 0 #ambil balance dr hari sebelumnya dapet = 0 while (dapet == 0): dpassed = 1 try: f = open(folder+"data/" +makinGetPrevYear(dpassed) +"/" +makinGetPrevMonth(dpassed) +"/" +makinGetPrevDay(dpassed) +"/balance_after","r") if (makinGetDay()=="01"): t_day = 31 t_bulan = ("0"+str(int(makinGetMonth())-1))[-2:] t_tahun = makinGetYear() if (int(makinGetMonth())=1): t_bulan = 12 t_tahun = makinGetYear()-1 print t_bulan dapet = 0 while (dapet==0): try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") print t_day dapet = 1 balance_before = int(f.read()) except: t_day = t_day - 1 f.close() else: t_day = int(makinGetDay())-1 #~ t_bulan = ("0"+str(int(makinGetMonth())))[-2:] t_bulan = makinGetMonth() f = open(folder+"data/"+makinGetYear()+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") balance_before = int(f.read()) #bila fresh input try: f = open(folder+"data/"+t_tahun+"/"+t_bulan+"/"+("0"+str(t_day))[-2:]+"/balance_after","r") except: #bila hanya mengupdate isi balance_out (pengeluaran hari ini) <|fim▁end|>
makinGetPrevDay
<|file_name|>wsgi.py<|end_file_name|><|fim▁begin|>""" WSGI config for Carkinos project. It exposes the WSGI callable as a module-level variable named ``application``. For more information on this file, see https://docs.djangoproject.com/en/1.9/howto/deployment/wsgi/ """ import os from django.core.wsgi import get_wsgi_application os.environ.setdefault("DJANGO_SETTINGS_MODULE", "Carkinos.settings") <|fim▁hole|><|fim▁end|>
application = get_wsgi_application()
<|file_name|>0007_auto_20140805_2253.py<|end_file_name|><|fim▁begin|># -*- coding: utf-8 -*- from __future__ import unicode_literals from django.db import models, migrations class Migration(migrations.Migration): dependencies = [ ('codecompetitions', '0006_auto_20140805_2234'), ] operations = [ migrations.AddField( model_name='problem', name='expected_output', field=models.TextField(default=''), preserve_default=False, ), migrations.AddField( model_name='problem', name='input_data', field=models.TextField(blank=True, null=True), preserve_default=True, ), migrations.AddField( model_name='problem', name='read_from_file',<|fim▁hole|> ), migrations.AddField( model_name='problem', name='time_limit', field=models.PositiveIntegerField(default=5), preserve_default=True, ), ]<|fim▁end|>
field=models.CharField(blank=True, null=True, max_length=80), preserve_default=True,
<|file_name|>0007_auto_20140805_2253.py<|end_file_name|><|fim▁begin|># -*- coding: utf-8 -*- from __future__ import unicode_literals from django.db import models, migrations class Migration(migrations.Migration): <|fim_middle|> <|fim▁end|>
dependencies = [ ('codecompetitions', '0006_auto_20140805_2234'), ] operations = [ migrations.AddField( model_name='problem', name='expected_output', field=models.TextField(default=''), preserve_default=False, ), migrations.AddField( model_name='problem', name='input_data', field=models.TextField(blank=True, null=True), preserve_default=True, ), migrations.AddField( model_name='problem', name='read_from_file', field=models.CharField(blank=True, null=True, max_length=80), preserve_default=True, ), migrations.AddField( model_name='problem', name='time_limit', field=models.PositiveIntegerField(default=5), preserve_default=True, ), ]
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23<|fim▁hole|> RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None def getapiname(self): return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15'<|fim▁end|>
''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): def __init__(self,domain='rds.aliyuncs.com',port=80):
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23 ''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): <|fim_middle|> <|fim▁end|>
def __init__(self,domain='rds.aliyuncs.com',port=80): RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None def getapiname(self): return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15'
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23 ''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): def __init__(self,domain='rds.aliyuncs.com',port=80): <|fim_middle|> def getapiname(self): return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15' <|fim▁end|>
RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23 ''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): def __init__(self,domain='rds.aliyuncs.com',port=80): RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None def getapiname(self): <|fim_middle|> <|fim▁end|>
return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15'
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23 ''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): def <|fim_middle|>(self,domain='rds.aliyuncs.com',port=80): RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None def getapiname(self): return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15' <|fim▁end|>
__init__
<|file_name|>Rds20140815CheckAccountNameAvailableRequest.py<|end_file_name|><|fim▁begin|>''' Created by auto_sdk on 2015.06.23 ''' from aliyun.api.base import RestApi class Rds20140815CheckAccountNameAvailableRequest(RestApi): def __init__(self,domain='rds.aliyuncs.com',port=80): RestApi.__init__(self,domain, port) self.AccountName = None self.DBInstanceId = None self.resourceOwnerAccount = None def <|fim_middle|>(self): return 'rds.aliyuncs.com.CheckAccountNameAvailable.2014-08-15' <|fim▁end|>
getapiname
<|file_name|>0051_auto_20190423_0803.py<|end_file_name|><|fim▁begin|># Generated by Django 2.1.7 on 2019-04-23 06:03 import diventi.accounts.models<|fim▁hole|> class Migration(migrations.Migration): dependencies = [ ('accounts', '0050_auto_20190421_2252'), ] operations = [ migrations.AlterModelManagers( name='diventiuser', managers=[ ('objects', diventi.accounts.models.DiventiUserManager()), ], ), ]<|fim▁end|>
from django.db import migrations
<|file_name|>0051_auto_20190423_0803.py<|end_file_name|><|fim▁begin|># Generated by Django 2.1.7 on 2019-04-23 06:03 import diventi.accounts.models from django.db import migrations class Migration(migrations.Migration): <|fim_middle|> <|fim▁end|>
dependencies = [ ('accounts', '0050_auto_20190421_2252'), ] operations = [ migrations.AlterModelManagers( name='diventiuser', managers=[ ('objects', diventi.accounts.models.DiventiUserManager()), ], ), ]
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """<|fim▁hole|> if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name)<|fim▁end|>
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): <|fim_middle|> <|fim▁end|>
'''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name)
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): <|fim_middle|> netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): <|fim_middle|> @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs)
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): <|fim_middle|> <|fim▁end|>
"""Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name)
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: <|fim_middle|> netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
yield vm
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: <|fim_middle|> for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
return
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): <|fim_middle|> vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
continue
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def <|fim_middle|>(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
appvms
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def <|fim_middle|>(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def on_property_set_child(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
__init__
<|file_name|>templatevm.py<|end_file_name|><|fim▁begin|># # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2014-2016 Wojtek Porczyk <[email protected]> # Copyright (C) 2016 Marek Marczykowski <[email protected]>) # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <[email protected]> # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see <https://www.gnu.org/licenses/>. # ''' This module contains the TemplateVM implementation ''' import qubes import qubes.config import qubes.vm.qubesvm import qubes.vm.mix.net from qubes.config import defaults from qubes.vm.qubesvm import QubesVM class TemplateVM(QubesVM): '''Template for AppVM''' dir_path_prefix = qubes.config.system_path['qubes_templates_dir'] @property def appvms(self): ''' Returns a generator containing all domains based on the current TemplateVM. ''' for vm in self.app.domains: if hasattr(vm, 'template') and vm.template is self: yield vm netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True, default=None, # pylint: disable=protected-access setter=qubes.vm.qubesvm.QubesVM.netvm._setter, doc='VM that provides network connection to this domain. When ' '`None`, machine is disconnected.') def __init__(self, *args, **kwargs): assert 'template' not in kwargs, "A TemplateVM can not have a template" self.volume_config = { 'root': { 'name': 'root', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['root_img_size'], }, 'private': { 'name': 'private', 'snap_on_start': False, 'save_on_stop': True, 'rw': True, 'source': None, 'size': defaults['private_img_size'], 'revisions_to_keep': 0, }, 'volatile': { 'name': 'volatile', 'size': defaults['root_img_size'], 'snap_on_start': False, 'save_on_stop': False, 'rw': True, }, 'kernel': { 'name': 'kernel', 'snap_on_start': False, 'save_on_stop': False, 'rw': False } } super(TemplateVM, self).__init__(*args, **kwargs) @qubes.events.handler('property-set:default_user', 'property-set:kernel', 'property-set:kernelopts', 'property-set:vcpus', 'property-set:memory', 'property-set:maxmem', 'property-set:qrexec_timeout', 'property-set:shutdown_timeout', 'property-set:management_dispvm') def <|fim_middle|>(self, _event, name, newvalue, oldvalue=None): """Send event about default value change to child VMs (which use default inherited from the template). This handler is supposed to be set for properties using `_default_with_template()` function for the default value. """ if newvalue == oldvalue: return for vm in self.appvms: if not vm.property_is_default(name): continue vm.fire_event('property-reset:' + name, name=name) <|fim▁end|>
on_property_set_child
<|file_name|>settings.py<|end_file_name|><|fim▁begin|>""" Django settings for djangoApp project. Generated by 'django-admin startproject' using Django 1.10.5. For more information on this file, see https://docs.djangoproject.com/en/1.10/topics/settings/ <|fim▁hole|>https://docs.djangoproject.com/en/1.10/ref/settings/ """ import os # Build paths inside the project like this: os.path.join(BASE_DIR, ...) BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) # Quick-start development settings - unsuitable for production # See https://docs.djangoproject.com/en/1.10/howto/deployment/checklist/ # SECURITY WARNING: keep the secret key used in production secret! SECRET_KEY = 'r&j)3lay4i$rm44n%h)bsv_q(9ysqhl@7@aibjm2b=1)0fag9n' # SECURITY WARNING: don't run with debug turned on in production! DEBUG = True ALLOWED_HOSTS = [] # Application definition INSTALLED_APPS = [ 'django.contrib.admin', 'django.contrib.auth', 'django.contrib.contenttypes', 'django.contrib.sessions', 'django.contrib.messages', 'django.contrib.staticfiles', ] MIDDLEWARE = [ 'django.middleware.security.SecurityMiddleware', 'django.contrib.sessions.middleware.SessionMiddleware', 'django.middleware.common.CommonMiddleware', 'django.middleware.csrf.CsrfViewMiddleware', 'django.contrib.auth.middleware.AuthenticationMiddleware', 'django.contrib.messages.middleware.MessageMiddleware', 'django.middleware.clickjacking.XFrameOptionsMiddleware', ] ROOT_URLCONF = 'djangoApp.urls' TEMPLATES = [ { 'BACKEND': 'django.template.backends.django.DjangoTemplates', 'DIRS': [], 'APP_DIRS': True, 'OPTIONS': { 'context_processors': [ 'django.template.context_processors.debug', 'django.template.context_processors.request', 'django.contrib.auth.context_processors.auth', 'django.contrib.messages.context_processors.messages', ], }, }, ] WSGI_APPLICATION = 'djangoApp.wsgi.application' # Database # https://docs.djangoproject.com/en/1.10/ref/settings/#databases DATABASES = { 'default': { 'ENGINE': 'django.db.backends.sqlite3', 'NAME': os.path.join(BASE_DIR, 'db.sqlite3'), } } # Password validation # https://docs.djangoproject.com/en/1.10/ref/settings/#auth-password-validators AUTH_PASSWORD_VALIDATORS = [ { 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator', }, { 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator', }, { 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator', }, { 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator', }, ] # Internationalization # https://docs.djangoproject.com/en/1.10/topics/i18n/ LANGUAGE_CODE = 'en-us' TIME_ZONE = 'UTC' USE_I18N = True USE_L10N = True USE_TZ = True # Static files (CSS, JavaScript, Images) # https://docs.djangoproject.com/en/1.10/howto/static-files/ STATIC_URL = '/static/'<|fim▁end|>
For the full list of settings and their values, see