Updates redisearch instance with igdb data used for kimosabe

Overview

igdb-pdt

Update RediSearch with IGDB games data in the following Format:

{
  "game_slug": {
    "name": "game_name",
    "cover": "igdb_coverart_url",
    "thumb": "igdb_thumbart_url",
    "summary": "summary text",
    "alt_names_%i": "alt_name_i"
  }
}

The only games that are pulled in by this script have the following properties:

  • lan, offline, or online co-op
  • category of 0 (base game) or 9 (remaster)

Note: Only the name, alt_names, and summary are used as fields that impact the search, with weights 10, 10, and 1 respectively.

Usage

CLIENT_ID=client_id; CLIENT_SECRET=client_secret; ./populate_db.py

Flags

--mock: gets data from data.json file instead of IGDB.
--persist: save to RediSearch.
--output: display data from IGDB to console. (used for creating mock data.json via ./populate_db.py --output > data.json)

Environment Variables

CLIENT_ID: Client ID for IGDB. Required if not using mock file.
CLIENT_SECRET: Client Secret for IGDB. Required if not using mock file.
REDIS_HOSTNAME: Hostname for Redis instance. Required.
REDIS_PORT: Port of Redis. Defaults to 6379.

Docker image

Runs script every day at 2:30 AM via cronjob.

TODO

  • add support for caching authorization token, and only refreshing if expired, otherwise keep it
  • seperate logging and output
Comments
  • [Snyk] Security upgrade python from 3.8.8-slim to 3.8.10-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3.8.10-slim

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.8.10-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings

    opened by snyk-bot 1
  • [Snyk] Security upgrade python from 3.8.8-slim to 3.9.5-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3.9.5-slim

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8.8-slim to 3-slim

    [Snyk] Security upgrade python from 3.8.8-slim to 3-slim

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3-slim, as this image has only 68 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 714 | Information Exposure
    SNYK-DEBIAN10-LIBGCRYPT20-1297893 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Privilege Chaining
    SNYK-DEBIAN10-SYSTEMD-345386 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit | | high severity | 500 | Incorrect Privilege Assignment
    SNYK-DEBIAN10-SYSTEMD-345391 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8.5-slim to 3.8.8-slim

    [Snyk] Security upgrade python from 3.8.5-slim to 3.8.8-slim

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.8.8-slim, as this image has only 64 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 571 | Use After Free
    SNYK-DEBIAN10-GNUTLS28-1085094 | No Known Exploit | | high severity | 571 | Use After Free
    SNYK-DEBIAN10-GNUTLS28-1085097 | No Known Exploit | | high severity | 571 | Incorrect Default Permissions
    SNYK-DEBIAN10-LIBZSTD-1080893 | No Known Exploit | | high severity | 571 | Incorrect Default Permissions
    SNYK-DEBIAN10-LIBZSTD-1080899 | No Known Exploit | | high severity | 714 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-OPENSSL-1075326 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ?? View latest project report

    ๐Ÿ›  Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade aiohttp from 3.6.2 to 3.7.4

    [Snyk] Security upgrade aiohttp from 3.6.2 to 3.7.4

    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 435/1000
    Why? Has a fix available, CVSS 4.2 | Open Redirect
    SNYK-PYTHON-AIOHTTP-1079232 | aiohttp:
    3.6.2 -> 3.7.4
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the effected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings

    ๐Ÿ“š Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.12.0a3

    [Snyk] Security upgrade python from 3.9.5 to 3.12.0a3

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.12.0a3, as this image has only 272 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | critical severity | 714 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-PYTHON37-3090928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.15

    [Snyk] Security upgrade python from 3.9.5 to 3.9.15

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.15, as this image has only 295 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.10.7

    [Snyk] Security upgrade python from 3.9.5 to 3.10.7

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.7, as this image has only 281 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade aiohttp from 3.7.4 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings

    ๐Ÿ“š Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by ZRui98 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.13

    [Snyk] Security upgrade python from 3.9.5 to 3.9.13

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.13, as this image has only 289 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.11.0rc2

    [Snyk] Security upgrade python from 3.9.5 to 3.11.0rc2

    Keeping your Docker base image up-to-date means youโ€™ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.11.0rc2, as this image has only 278 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Improper Input Validation
    SNYK-DEBIAN10-XZUTILS-2444279 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: ๐Ÿง View latest project report

    ๐Ÿ›  Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    ๐Ÿฆ‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
Releases(v0.5.3)
Owner
6rotoms
6rotoms
Integarting Celery with Django to asynchronous tasks ๐Ÿ“ƒ

Integrating ๐Ÿ”— Celery with Django via Redis server ,To-Do asynchronously ๐Ÿ‘€task without stopping the main-flow ๐Ÿ“ƒ of Django-project . It increase your speed ๐Ÿš€ and user experience ๐Ÿคต of website

Rushi Patel 4 Jul 15, 2022
A ToDO Rest API using Django, PostgreSQL and Docker

This Rest API uses PostgreSQL, Docker and Django to implements a ToDo application.

Brenno Lima dos Santos 2 Jan 05, 2022
Per object permissions for Django

django-guardian django-guardian is an implementation of per object permissions [1] on top of Django's authorization backend Documentation Online docum

3.3k Jan 04, 2023
A simple polling app made in Django and Bootstrap

DjangoPolls A Simple Polling app made with Django Instructions Make sure you have Python installed Step 1. Open a terminal Step 2. Paste the given cod

Aditya Priyadarshi 1 Nov 10, 2021
English dictionary using Django based on freecodecamp

English Dictionary Hi there, i made this english dictionary using Django based on freecodecamp.org tutorial :) Table of Contents Preview Technologies

Aline Alencar 3 May 09, 2022
Extensions for using Rich with Django.

django-rich Extensions for using Rich with Django. Requirements Python 3.6 to 3.10 supported. Django 2.2 to 4.0 supported. Are your tests slow? Check

Adam Johnson 88 Dec 26, 2022
Service request portal on top of Ansible Tower

Squest - A service request portal based on Ansible Tower Squest is a Web portal that allow to expose Tower based automation as a service. If you want

Hewlett Packard Enterprise 183 Jan 04, 2023
Use heroicons in your Django and Jinja templates.

heroicons Use heroicons in your Django and Jinja templates. Requirements Python 3.6 to 3.9 supported. Django 2.2 to 3.2 supported. Are your tests slow

Adam Johnson 52 Dec 14, 2022
Run Django tests with testcontainers.

django-rdtwt (Run Django Tests With Testcontainers) This targets users who wish to forget setting up a database for tests. There's no manually startin

2 Jan 09, 2022
A package to handle images in django

Django Image Tools Django Image Tools is a small app that will allow you to manage your project's images without worrying much about image sizes, how

The Bonsai Studio 42 Jun 02, 2022
The little ASGI framework that shines. ๐ŸŒŸ

โœจ The little ASGI framework that shines. โœจ Documentation: https://www.starlette.io/ Community: https://discuss.encode.io/c/starlette Starlette Starlet

Encode 7.7k Dec 31, 2022
Packs a bunch of smaller CSS files together from 1 folder.

Packs a bunch of smaller CSS files together from 1 folder.

1 Dec 09, 2021
A tool to automatically fix Django deprecations.

A tool to help upgrade Django projects to newer version of the framework by automatically fixing deprecations. The problem When maintaining a Django s

Bruno Alla 155 Dec 14, 2022
A debug/profiling overlay for Django

Django Debug Toolbar The Django Debug Toolbar is a configurable set of panels that display various debug information about the current request/respons

David Cramer 228 Oct 17, 2022
Helps working with singletons - things like global settings that you want to edit from the admin site.

Django Solo +---------------------------+ | | | | | \ | Django Solo helps

Sylvain Toรฉ 726 Jan 08, 2023
A prettier way to see Django requests while developing

A prettier way to see Django requests while developing

Adam Hill 35 Dec 02, 2022
A middleware to log the requests and responses using loguru.

Django Loguru The extension was based on another one and added some extra flavours. One of the biggest problems with the apps is the logging and that

Tiago Silva 9 Oct 11, 2022
Django GUID attaches a unique correlation ID/request ID to all your log outputs for every request.

Django GUID Now with ASGI support! Django GUID attaches a unique correlation ID/request ID to all your log outputs for every request. In other words,

snok 300 Dec 29, 2022
Radically simplified static file serving for Python web apps

WhiteNoise Radically simplified static file serving for Python web apps With a couple of lines of config WhiteNoise allows your web app to serve its o

Dave Evans 2.1k Dec 15, 2022
Django API that scrapes and provides the last news of the city of Carlos Casares by semantic way (RDF format).

"Casares News" API Api that scrapes and provides the last news of the city of Carlos Casares by semantic way (RDF format). Usage Consume the articles

Andrรฉs Milla 6 May 12, 2022