text
stringlengths 0
828
|
---|
} |
resp = requests.post(self.__app.api_proxy_url + ""/"" + method, body_str, timeout=3600, stream=stream, |
headers=headers) |
self.check_err(resp, analyze_json_error_param=analyze_json_error_param, |
retry_request_substr_variants=retry_request_substr_variants) |
return resp |
except (RetryHttpRequestError, RateLimitError, ConnectionError) as e: |
self.__app.log.warning(""Sleep retry query: "" + str(e), log_ctx) |
sleep_time = 20 |
if e.__class__.__name__ == ""RateLimitError"": |
sleep_time = e.waiting_time |
time.sleep(sleep_time) |
raise EndOfTriesError(""Api of api proxy tries request"")" |
4922,"def call_proxy_with_paging(self, engine, payload, method, analyze_json_error_param, retry_request_substr_variants, |
max_pages=MAX_PAGES): |
"""""" |
Постраничный запрос |
:param engine: Система |
:param payload: Данные для запроса |
:param method: string Может содержать native_call | tsv | json_newline |
:param analyze_json_error_param: Нужно ли производить анализ параметра error в ответе прокси |
:param retry_request_substr_variants: Список подстрок, при наличии которых в ответе будет происходить перезапрос |
:param max_pages: Максимальное количество страниц в запросе |
:return: объект генератор |
"""""" |
copy_payload = copy.deepcopy(payload) |
idx = 0 |
for idx in range(max_pages): |
resp = self.__api_proxy_call(engine, copy_payload, method, analyze_json_error_param, |
retry_request_substr_variants) |
yield resp |
paging_resp = resp.json().get(""paging"") |
if not paging_resp: |
break |
copy_payload[""paging""] = paging_resp |
if idx >= max_pages: |
self.__app.log.warning(""Достигнут максимальный предел страниц"", {""max_pages"": max_pages})" |
4923,"def call_proxy(self, engine, payload, method, analyze_json_error_param, retry_request_substr_variants, |
stream=False): |
"""""" |
:param engine: Система |
:param payload: Данные для запроса |
:param method: string Может содержать native_call | tsv | json_newline |
:param analyze_json_error_param: Нужно ли производить анализ параметра error в ответе прокси |
:param retry_request_substr_variants: Список подстрок, при наличии которых в ответе будет происходить перезапрос |
:param stream: |
:return: |
"""""" |
return self.__api_proxy_call(engine, payload, method, analyze_json_error_param, retry_request_substr_variants, |
stream)" |
4924,"def check_err(resp, analyze_json_error_param=False, retry_request_substr_variants=None): |
"""""" |
:type retry_request_substr_variants: list Список вхождений строк, при налиции которых в ошибке апи будет произведен повторный запрос к апи |
"""""" |
if retry_request_substr_variants is None: |
retry_request_substr_variants = [] |
# РКН блокировки вызывают ошибку SSL |
retry_request_substr_variants.append(""TLSV1_ALERT_ACCESS_DENIED"") |
if resp.status_code in [502, 503, 504]: |
raise RetryHttpRequestError(resp.text) |
if resp.status_code >= 400: |
rtext = resp.text |
for v_ in retry_request_substr_variants: |
if v_ in rtext: |
raise RetryHttpRequestError(rtext) |
raise UnexpectedError(""HTTP request failed: {} {}"".format(resp.status_code, rtext)) |
if analyze_json_error_param: |
data_ = resp.json() |
if 'error' in data_ and data_.get('error'): |
error = data_.get('error') |
full_err_ = json.dumps(error) |
if error.get(""type"") == ""RateLimitError"": |
raise RateLimitError(error.get(""message""), waiting_time=error.get(""waiting_time"")) |
for v_ in retry_request_substr_variants: |
if v_ in full_err_: |
raise RetryHttpRequestError(full_err_) |
raise ApiProxyError(full_err_) |
return resp" |
4925,"def has_rabf_motif(self): |
""""""Checks if the sequence has enough RabF motifs within the G domain |
If there exists more than one G domain in the sequence enough RabF motifs is required in at least one |
of those domains to classify the sequence as a Rab. |
"""""" |
if self.rabf_motifs: |
for gdomain in self.gdomain_regions: |
beg, end = map(int, gdomain.split('-')) |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.