Updates redisearch instance with igdb data used for kimosabe

Overview

igdb-pdt

Update RediSearch with IGDB games data in the following Format:

{
  "game_slug": {
    "name": "game_name",
    "cover": "igdb_coverart_url",
    "thumb": "igdb_thumbart_url",
    "summary": "summary text",
    "alt_names_%i": "alt_name_i"
  }
}

The only games that are pulled in by this script have the following properties:

  • lan, offline, or online co-op
  • category of 0 (base game) or 9 (remaster)

Note: Only the name, alt_names, and summary are used as fields that impact the search, with weights 10, 10, and 1 respectively.

Usage

CLIENT_ID=client_id; CLIENT_SECRET=client_secret; ./populate_db.py

Flags

--mock: gets data from data.json file instead of IGDB.
--persist: save to RediSearch.
--output: display data from IGDB to console. (used for creating mock data.json via ./populate_db.py --output > data.json)

Environment Variables

CLIENT_ID: Client ID for IGDB. Required if not using mock file.
CLIENT_SECRET: Client Secret for IGDB. Required if not using mock file.
REDIS_HOSTNAME: Hostname for Redis instance. Required.
REDIS_PORT: Port of Redis. Defaults to 6379.

Docker image

Runs script every day at 2:30 AM via cronjob.

TODO

  • add support for caching authorization token, and only refreshing if expired, otherwise keep it
  • seperate logging and output
Comments
  • [Snyk] Security upgrade python from 3.8.8-slim to 3.8.10-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3.8.10-slim

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.8.10-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 1
  • [Snyk] Security upgrade python from 3.8.8-slim to 3.9.5-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3.9.5-slim

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8.8-slim to 3-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3-slim

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8.5-slim to 3.8.8-slim

    [Snyk] Security upgrade python from 3.8.5-slim to 3.8.8-slim

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.8.8-slim, as this image has only 64 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 571 | Use After Free
    SNYK-DEBIAN10-GNUTLS28-1085094 | No Known Exploit | | high severity | 571 | Use After Free
    SNYK-DEBIAN10-GNUTLS28-1085097 | No Known Exploit | | high severity | 571 | Incorrect Default Permissions
    SNYK-DEBIAN10-LIBZSTD-1080893 | No Known Exploit | | high severity | 571 | Incorrect Default Permissions
    SNYK-DEBIAN10-LIBZSTD-1080899 | No Known Exploit | | high severity | 714 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-OPENSSL-1075326 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ?? View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade aiohttp from 3.6.2 to 3.7.4

    [Snyk] Security upgrade aiohttp from 3.6.2 to 3.7.4

    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 435/1000
    Why? Has a fix available, CVSS 4.2 | Open Redirect
    SNYK-PYTHON-AIOHTTP-1079232 | aiohttp:
    3.6.2 -> 3.7.4
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the effected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.12.0a3

    [Snyk] Security upgrade python from 3.9.5 to 3.12.0a3

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.12.0a3, as this image has only 272 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | critical severity | 714 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-PYTHON37-3090928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.15

    [Snyk] Security upgrade python from 3.9.5 to 3.9.15

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.15, as this image has only 295 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.10.7

    [Snyk] Security upgrade python from 3.9.5 to 3.10.7

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.7, as this image has only 281 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade aiohttp from 3.7.4 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by ZRui98 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.13

    [Snyk] Security upgrade python from 3.9.5 to 3.9.13

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.13, as this image has only 289 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.11.0rc2

    [Snyk] Security upgrade python from 3.9.5 to 3.11.0rc2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.11.0rc2, as this image has only 278 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
Releases(v0.5.3)
Owner
6rotoms
6rotoms
Forward and backwards compatibility layer for Django 1.4, 1.7, 1.8, 1.9, 1.10, and 1.11

django-compat Forward and backwards compatibility layer for Django 1.4 , 1.7 , 1.8, 1.9, 1.10 and 1.11 Consider django-compat as an experiment based o

arteria GmbH 106 Mar 28, 2022
Python CSS/Javascript minifier

Squeezeit - Python CSS and Javascript minifier Copyright (C) 2011 Sam Rudge This program is free software: you can redistribute it and/or modify it un

Smudge 152 Apr 03, 2022
Book search Django web project that uses requests python library and openlibrary API.

Book Search API Developer: Vladimir Vojtenko Book search Django web project that uses requests python library and openlibrary API. #requests #openlibr

1 Dec 08, 2021
Fast / fuzzy PostgreSQL counts for Django

Created by Stephen McDonald Introduction Up until PostgreSQL 9.2, COUNT queries generally required scanning every row in a database table. With millio

stephenmcd 85 Oct 25, 2021
demo project for django channels tutorial

django_channels_chat_official_tutorial demo project for django channels tutorial code from tutorial page: https://channels.readthedocs.io/en/stable/tu

lightsong 1 Oct 22, 2021
Актуальный сборник шаблонов для создания проектов и приложений на Django

О чем этот проект Этот репозиторий с шаблонами для быстрого создания Django проекта. В шаблоне проекта настроены следующий технологий: Django gunicorn

Denis Kustov 16 Oct 20, 2022
🏭 An easy-to-use implementation of Creation Methods for Django, backed by Faker.

Django-fakery An easy-to-use implementation of Creation Methods (aka Object Factory) for Django, backed by Faker. django_fakery will try to guess the

Flavio Curella 93 Oct 12, 2022
Auto-detecting the n+1 queries problem in Python

nplusone nplusone is a library for detecting the n+1 queries problem in Python ORMs, including SQLAlchemy, Peewee, and the Django ORM. The Problem Man

Joshua Carp 837 Dec 29, 2022
Zendesk Assignment - Django Based Ticket Viewer

Zendesk-Coding-Challenge Django Based Ticket Viewer The assignment has been made using Django. Important methods have been scripted in views.py. Excep

Akash Sampurnanand Pandey 0 Dec 23, 2021
Django Federated Login provides an authentication bridge between Django projects and OpenID-enabled identity providers.

Django Federated Login Django Federated Login provides an authentication bridge between Django projects and OpenID-enabled identity providers. The bri

Bouke Haarsma 18 Dec 29, 2020
Logan is a toolkit for building standalone Django applications

Logan Logan is a toolkit for running standalone Django applications. It provides you with tools to create a CLI runner, manage settings, and the abili

David Cramer 206 Jan 03, 2023
Template for Django Project Using Docker

You want a Django project who use Docker and Docker-compose for Development and for Production ? It's for you !

1 Dec 17, 2021
A simple Django dev environment setup with docker for demo purposes for GalsenDev community

GalsenDEV Docker Demo This is a basic Django dev environment setup with docker and docker-compose for a GalsenDev Meetup. The main purposes was to mak

3 Jul 03, 2021
Run Django tests with testcontainers.

django-rdtwt (Run Django Tests With Testcontainers) This targets users who wish to forget setting up a database for tests. There's no manually startin

2 Jan 09, 2022
Realtime data read and write without page refresh using Ajax in Django.

Realtime read-write with AJAX Hey,this is the basic implementation type of ajax realtime read write from the database. where you can insert or view re

Mehedi Hasan 3 Dec 13, 2022
Simple tagging for django

django-taggit This is a Jazzband project. By contributing you agree to abide by the Contributor Code of Conduct and follow the guidelines. django-tagg

Jazzband 3k Jan 02, 2023
A UUIDField for Django

django-uuidfield Provides a UUIDField for your Django models. Installation Install it with pip (or easy_install): pip install django-uuidfield Usage

David Cramer 265 Nov 30, 2022
Easily share data across your company via SQL queries. From Grove Collab.

SQL Explorer SQL Explorer aims to make the flow of data between people fast, simple, and confusion-free. It is a Django-based application that you can

Grove Collaborative 2.1k Dec 30, 2022
Add Chart.js visualizations to your Django admin using a mixin class

django-admincharts Add Chart.js visualizations to your Django admin using a mixin class. Example from django.contrib import admin from .models import

Dropseed 22 Nov 22, 2022
A simple polling app made in Django and Bootstrap

DjangoPolls A Simple Polling app made with Django Instructions Make sure you have Python installed Step 1. Open a terminal Step 2. Paste the given cod

Aditya Priyadarshi 1 Nov 10, 2021