Personal tools
Skip to content. | Skip to navigation
An interface for creating both directed and non directed graphs from Python. Currently all attributes implemented in the Dot language are supported (up to Graphviz 2.16). Output can be inlined in Postscript into interactive scientific environments like TeXmacs, or output in any of the format's supported by the Graphviz tools dot, neato, twopi.
PyGraphviz is a Python interface to the Graphviz graph layout and visualization package. With PyGraphviz you can create, edit, read, write, and draw graphs using Python to access the Graphviz graph data structure and layout algorithms. PyGraphviz is independent from NetworkX but provides a similar programming interface. This package contains the version for Python 3.
python3-Bottleneck is a collection of fast NumPy array functions written in Cython.
The numexpr package evaluates multiple-operator array expressions many times faster than NumPy can. It accepts the expression as a string, analyzes it, rewrites it more efficiently, and compiles it to faster Python code on the fly. It’s the next best thing to writing the expression in C and compiling it with a specialized just-in-time (JIT) compiler, i.e. it does not require a compiler at runtime. This is the version for Python 3.
This is just a collection of utilities for python-requests, but don’t really belong in requests proper. Python 3 version.
PyTables is a package for managing hierarchical datasets and designed to efficiently and easily cope with extremely large amounts of data. This is the version for Python 3.
This project is the python equivalent of google-gflags, a Google commandline flag implementation for C++. It is intended to be used in situations where a project wants to mimic the command-line flag handling of a C++ app that uses google-gflags, or for a Python app that, via swig or some other means, is linked with a C++ app that uses google-gflags. The gflags package contains a library that implements commandline flags processing. As such it's a replacement for getopt(). It has increased flexibility, including built-in support for Python types, and the ability to define flags in the source file in which they're used. (This last is its major difference from OptParse.)
pulp_ansible A Pulp plugin to support hosting Role and Collection Ansible content.For more information, please see the documentation < Collection Support .. warning:: The 'Collection' content type is currently in tech-preview. Breaking changes could be introduced in the future.pulp_ansible can manage the multi-role repository content < installing.htmlmulti-role-repositories>_ referred to as a...
Fetch, Upload, Organize, and Distribute Software Packages # noqa: E501
This is the pulp_certguard Plugin for the Pulp Project 3.0+. This plugin provides X.509 certificate based content protection. The X509CertGuard authenticates the web request by validating the client certificate passed in the SSL_CLIENT_CERTIFICATE HTTP header using the CA (Certificate Authority) certificate that it has been configured with. All REST API examples bellow use httpie to perform the requests. The httpie commands below assume that the user executing the commands has a .netrc file in the home directory. The ~/.netrc should have the following configuration: machine localhost login admin password admin If you configured the admin user with a different password, adjust the configuration accordingly. If you prefer to specify the username and password with each request, please see httpie documentation on how to do that. This documentation makes use of the jq library to parse the json received from requests, in order to get the unique urls generated when objects are created. To follow this documentation as-is please install the jq library with: $ sudo dnf install jq Install pulpcore Follow the installation instructions provided with pulpcore. Users should install from either PyPI or source. Install pulp-certguard from source source ~/pulpvenv/bin/activate git clone https:/github.com/pulp/pulp-certguard.git cd pulp-certguard pip install -e . Install pulp-certguard From PyPI source ~/pulpvenv/bin/activate pip install pulp-certguard Make and Run Migrations django-admin makemigrations certguard django-admin migrate certguard Create a content guard named foo This example assumes that ~/ca.pem is a PEM encoded CA certificate. $ http --form POST http:/localhost:8000/pulp/api/v3/contentguards/certguard/x509/ name=foo ca_certificate@~/ca.pem { ... "_href": "/pulp/api/v3/contentguards/certguard/x509/3046291f-d432-4a85-9d7e-fad12b0aaed7/", ... } $ export GUARD_HREF=$(http localhost:8000/pulp/api/v3/contentguards/certguard/x509/?name=foo | jq -r '.results[0]._href') Create a distribution with content protection `` $ http POST http:/localhost:8000/pulp/api/v3/distributions/ name=bar base_path=files content_guard=${GUARD_HREF}`` { ... "_href": "/pulp/api/v3/distributions/305adfe0-4851-432f-9de3-13f9b10fe131/" ... } Add content protection to an existing distribution `` $ http PATCH http:/localhost:8000/pulp/api/v3/distributions/1/ content_guard=${GUARD_HREF}`` { ... "_href": "/pulp/api/v3/distributions/0fbb102a-cb38-4d5c-afc2-b9a76e862a1d/" ... } Download protected content The following examples assume there is a file named 1.iso published under the files distribution. Further, they assume there is a PEM encoded client certificate at ~/client.pem signed by the CA at ~/ca.pem. And, a PEM encoded private key at ~/key.pem. Example of GET directly to the content application running on port 8080 over HTTP. When setting the SSL-CLIENT-CERTIFICATE manually, the newlines need to be stripped due to restrictions on legal characters in HTTP header values. $ http localhost:8080/pulp/content/files/1.iso SSL-CLIENT-CERTIFICATE:"$(tr -d 'n' < ~/client.pem)" +-----------------------------------------+ | NOTE: binary data not shown in terminal | +-----------------------------------------+ Example of GET through a reverse proxy using HTTPS (like apache or nginx) in front of the content application. Its assumed that the reverse proxy has been configured to set the SSL-CLIENT-CERTIFICATE header using the client certificate exchanged as part of the SSL negotiation. $ http https:/localhost/pulp/content/files/1.iso --cert=~/client.pem --cert-key=~/key.pem --verify=no +-----------------------------------------+ | NOTE: binary data not shown in terminal | +-----------------------------------------+