├── .gitignore ├── .pre-commit-config.yaml ├── .pylintrc ├── LICENSE ├── Makefile ├── Pipfile ├── Pipfile.lock ├── README.md ├── pyproject.toml ├── setup.cfg ├── textual_query_sandbox ├── __init__.py ├── __main__.py └── sandbox.py └── tqs.png /.gitignore: -------------------------------------------------------------------------------- 1 | .venv/ 2 | .coverage 3 | .coverage_report/ 4 | .DS_Store 5 | *.egg-info/ 6 | build/ 7 | dist/ 8 | __pycache__ 9 | -------------------------------------------------------------------------------- /.pre-commit-config.yaml: -------------------------------------------------------------------------------- 1 | repos: 2 | - repo: https://github.com/psf/black 3 | rev: 23.3.0 4 | hooks: 5 | - id: black 6 | language_version: python3.8 7 | 8 | -------------------------------------------------------------------------------- /.pylintrc: -------------------------------------------------------------------------------- 1 | [BASIC] 2 | good-names=n 3 | 4 | [FORMAT] 5 | max-line-length=120 6 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | -------------------------------------------------------------------------------- /Makefile: -------------------------------------------------------------------------------- 1 | ############################################################################### 2 | # Common make values. 3 | lib := textual_query_sandbox 4 | run := pipenv run 5 | python := $(run) python 6 | lint := $(run) pylint 7 | mypy := $(run) mypy 8 | build := $(python) -m build 9 | twine := $(run) twine 10 | black := $(run) black 11 | 12 | ############################################################################## 13 | # Run the application. 14 | .PHONY: run 15 | run: 16 | $(python) -m $(lib) 17 | 18 | .PHONY: debug 19 | debug: 20 | TEXTUAL=devtools make 21 | 22 | .PHONY: console 23 | console: 24 | $(run) textual console 25 | 26 | ############################################################################## 27 | # Setup/update packages the system requires. 28 | .PHONY: setup 29 | setup: # Install all dependencies 30 | pipenv sync --dev 31 | $(run) pre-commit install 32 | 33 | .PHONY: resetup 34 | resetup: # Recreate the virtual environment from scratch 35 | rm -rf $(shell pipenv --venv) 36 | pipenv sync --dev 37 | 38 | .PHONY: depsoutdated 39 | depsoutdated: # Show a list of outdated dependencies 40 | pipenv update --outdated 41 | 42 | .PHONY: depsupdate 43 | depsupdate: # Update all dependencies 44 | pipenv update --dev 45 | 46 | .PHONY: depsshow 47 | depsshow: # Show the dependency graph 48 | pipenv graph 49 | 50 | ############################################################################## 51 | # Checking/testing/linting/etc. 52 | .PHONY: lint 53 | lint: # Run Pylint over the library 54 | $(lint) $(lib) 55 | 56 | .PHONY: typecheck 57 | typecheck: # Perform static type checks with mypy 58 | $(mypy) --scripts-are-modules $(lib) 59 | 60 | .PHONY: stricttypecheck 61 | stricttypecheck: # Perform a strict static type checks with mypy 62 | $(mypy) --scripts-are-modules --strict $(lib) 63 | 64 | .PHONY: checkall 65 | checkall: lint stricttypecheck # Check all the things 66 | 67 | ############################################################################## 68 | # Package/publish. 69 | .PHONY: package 70 | package: # Package the library 71 | $(build) -w 72 | 73 | .PHONY: spackage 74 | spackage: # Create a source package for the library 75 | $(build) -s 76 | 77 | .PHONY: packagecheck 78 | packagecheck: package spackage # Check the packaging. 79 | $(twine) check dist/* 80 | 81 | .PHONY: testdist 82 | testdist: packagecheck # Perform a test distribution 83 | $(twine) upload --skip-existing --repository testpypi dist/* 84 | 85 | .PHONY: dist 86 | dist: packagecheck # Upload to pypi 87 | $(twine) upload --skip-existing dist/* 88 | 89 | ############################################################################## 90 | # Utility. 91 | .PHONY: ugly 92 | ugly: # Reformat the code with black. 93 | $(black) $(lib) 94 | 95 | .PHONY: repl 96 | repl: # Start a Python REPL 97 | $(python) 98 | 99 | .PHONY: clean 100 | clean: # Clean the build directories 101 | rm -rf build dist $(lib).egg-info 102 | 103 | .PHONY: help 104 | help: # Display this help 105 | @grep -Eh "^[a-z]+:.+# " $(MAKEFILE_LIST) | sort | awk 'BEGIN {FS = ":.+# "}; {printf "%-20s %s\n", $$1, $$2}' 106 | 107 | ############################################################################## 108 | # Housekeeping tasks. 109 | .PHONY: housekeeping 110 | housekeeping: # Perform some git housekeeping 111 | git fsck 112 | git gc --aggressive 113 | git remote update --prune 114 | 115 | ### Makefile ends here 116 | -------------------------------------------------------------------------------- /Pipfile: -------------------------------------------------------------------------------- 1 | [[source]] 2 | url = "https://pypi.org/simple" 3 | verify_ssl = true 4 | name = "pypi" 5 | 6 | [packages] 7 | textual = "*" 8 | 9 | [dev-packages] 10 | twine = "*" 11 | pylint = "*" 12 | mypy = "*" 13 | build = "*" 14 | pre-commit = "*" 15 | black = "*" 16 | 17 | [requires] 18 | python_version = "3.8" 19 | -------------------------------------------------------------------------------- /Pipfile.lock: -------------------------------------------------------------------------------- 1 | { 2 | "_meta": { 3 | "hash": { 4 | "sha256": "abee1fdbfb309e0d26c164744bc6dd2d6362416cd7db896ff62e4f1782822700" 5 | }, 6 | "pipfile-spec": 6, 7 | "requires": { 8 | "python_version": "3.8" 9 | }, 10 | "sources": [ 11 | { 12 | "name": "pypi", 13 | "url": "https://pypi.org/simple", 14 | "verify_ssl": true 15 | } 16 | ] 17 | }, 18 | "default": { 19 | "linkify-it-py": { 20 | "hashes": [ 21 | "sha256:68cda27e162e9215c17d786649d1da0021a451bdc436ef9e0fa0ba5234b9b048", 22 | "sha256:6bcbc417b0ac14323382aef5c5192c0075bf8a9d6b41820a2b66371eac6b6d79" 23 | ], 24 | "version": "==2.0.3" 25 | }, 26 | "markdown-it-py": { 27 | "extras": [ 28 | "linkify", 29 | "plugins" 30 | ], 31 | "hashes": [ 32 | "sha256:355216845c60bd96232cd8d8c40e8f9765cc86f46880e43a8fd22dc1a1a8cab1", 33 | "sha256:e3f60a94fa066dc52ec76661e37c851cb232d92f9886b15cb560aaada2df8feb" 34 | ], 35 | "markers": "python_version >= '3.8'", 36 | "version": "==3.0.0" 37 | }, 38 | "mdit-py-plugins": { 39 | "hashes": [ 40 | "sha256:b51b3bb70691f57f974e257e367107857a93b36f322a9e6d44ca5bf28ec2def9", 41 | "sha256:d8ab27e9aed6c38aa716819fedfde15ca275715955f8a185a8e1cf90fb1d2c1b" 42 | ], 43 | "version": "==0.4.0" 44 | }, 45 | "mdurl": { 46 | "hashes": [ 47 | "sha256:84008a41e51615a49fc9966191ff91509e3c40b939176e643fd50a5c2196b8f8", 48 | "sha256:bb413d29f5eea38f31dd4754dd7377d4465116fb207585f97bf925588687c1ba" 49 | ], 50 | "markers": "python_version >= '3.7'", 51 | "version": "==0.1.2" 52 | }, 53 | "pygments": { 54 | "hashes": [ 55 | "sha256:b27c2826c47d0f3219f29554824c30c5e8945175d888647acd804ddd04af846c", 56 | "sha256:da46cec9fd2de5be3a8a784f434e4c4ab670b4ff54d605c4c2717e9d49c4c367" 57 | ], 58 | "markers": "python_version >= '3.7'", 59 | "version": "==2.17.2" 60 | }, 61 | "rich": { 62 | "hashes": [ 63 | "sha256:4edbae314f59eb482f54e9e30bf00d33350aaa94f4bfcd4e9e3110e64d0d7222", 64 | "sha256:9be308cb1fe2f1f57d67ce99e95af38a1e2bc71ad9813b0e247cf7ffbcc3a432" 65 | ], 66 | "markers": "python_full_version >= '3.7.0'", 67 | "version": "==13.7.1" 68 | }, 69 | "textual": { 70 | "hashes": [ 71 | "sha256:9549a005a31658cd4dce7f73a247bc699b6173c74afc52c5dfdddb0afd4a67e2", 72 | "sha256:bb876b16382b4a0b8d1e667055af28dad8d2a720f4298ec950e00d791b95b7ac" 73 | ], 74 | "index": "pypi", 75 | "markers": "python_version >= '3.8' and python_version < '4.0'", 76 | "version": "==0.56.3" 77 | }, 78 | "typing-extensions": { 79 | "hashes": [ 80 | "sha256:83f085bd5ca59c80295fc2a82ab5dac679cbe02b9f33f7d83af68e241bea51b0", 81 | "sha256:c1f94d72897edaf4ce775bb7558d5b79d8126906a14ea5ed1635921406c0387a" 82 | ], 83 | "markers": "python_version >= '3.8'", 84 | "version": "==4.11.0" 85 | }, 86 | "uc-micro-py": { 87 | "hashes": [ 88 | "sha256:d321b92cff673ec58027c04015fcaa8bb1e005478643ff4a500882eaab88c48a", 89 | "sha256:db1dffff340817673d7b466ec86114a9dc0e9d4d9b5ba229d9d60e5c12600cd5" 90 | ], 91 | "markers": "python_version >= '3.7'", 92 | "version": "==1.0.3" 93 | } 94 | }, 95 | "develop": { 96 | "astroid": { 97 | "hashes": [ 98 | "sha256:951798f922990137ac090c53af473db7ab4e70c770e6d7fae0cec59f74411819", 99 | "sha256:ac248253bfa4bd924a0de213707e7ebeeb3138abeb48d798784ead1e56d419d4" 100 | ], 101 | "markers": "python_full_version >= '3.8.0'", 102 | "version": "==3.1.0" 103 | }, 104 | "backports.tarfile": { 105 | "hashes": [ 106 | "sha256:2688f159c21afd56a07b75f01306f9f52c79aebcc5f4a117fb8fbb4445352c75", 107 | "sha256:bcd36290d9684beb524d3fe74f4a2db056824c47746583f090b8e55daf0776e4" 108 | ], 109 | "markers": "python_version < '3.12'", 110 | "version": "==1.0.0" 111 | }, 112 | "black": { 113 | "hashes": [ 114 | "sha256:2818cf72dfd5d289e48f37ccfa08b460bf469e67fb7c4abb07edc2e9f16fb63f", 115 | "sha256:41622020d7120e01d377f74249e677039d20e6344ff5851de8a10f11f513bf93", 116 | "sha256:4acf672def7eb1725f41f38bf6bf425c8237248bb0804faa3965c036f7672d11", 117 | "sha256:4be5bb28e090456adfc1255e03967fb67ca846a03be7aadf6249096100ee32d0", 118 | "sha256:4f1373a7808a8f135b774039f61d59e4be7eb56b2513d3d2f02a8b9365b8a8a9", 119 | "sha256:56f52cfbd3dabe2798d76dbdd299faa046a901041faf2cf33288bc4e6dae57b5", 120 | "sha256:65b76c275e4c1c5ce6e9870911384bff5ca31ab63d19c76811cb1fb162678213", 121 | "sha256:65c02e4ea2ae09d16314d30912a58ada9a5c4fdfedf9512d23326128ac08ac3d", 122 | "sha256:6905238a754ceb7788a73f02b45637d820b2f5478b20fec82ea865e4f5d4d9f7", 123 | "sha256:79dcf34b33e38ed1b17434693763301d7ccbd1c5860674a8f871bd15139e7837", 124 | "sha256:7bb041dca0d784697af4646d3b62ba4a6b028276ae878e53f6b4f74ddd6db99f", 125 | "sha256:7d5e026f8da0322b5662fa7a8e752b3fa2dac1c1cbc213c3d7ff9bdd0ab12395", 126 | "sha256:9f50ea1132e2189d8dff0115ab75b65590a3e97de1e143795adb4ce317934995", 127 | "sha256:a0c9c4a0771afc6919578cec71ce82a3e31e054904e7197deacbc9382671c41f", 128 | "sha256:aadf7a02d947936ee418777e0247ea114f78aff0d0959461057cae8a04f20597", 129 | "sha256:b5991d523eee14756f3c8d5df5231550ae8993e2286b8014e2fdea7156ed0959", 130 | "sha256:bf21b7b230718a5f08bd32d5e4f1db7fc8788345c8aea1d155fc17852b3410f5", 131 | "sha256:c45f8dff244b3c431b36e3224b6be4a127c6aca780853574c00faf99258041eb", 132 | "sha256:c7ed6668cbbfcd231fa0dc1b137d3e40c04c7f786e626b405c62bcd5db5857e4", 133 | "sha256:d7de8d330763c66663661a1ffd432274a2f92f07feeddd89ffd085b5744f85e7", 134 | "sha256:e19cb1c6365fd6dc38a6eae2dcb691d7d83935c10215aef8e6c38edee3f77abd", 135 | "sha256:e2af80566f43c85f5797365077fb64a393861a3730bd110971ab7a0c94e873e7" 136 | ], 137 | "index": "pypi", 138 | "markers": "python_version >= '3.8'", 139 | "version": "==24.3.0" 140 | }, 141 | "build": { 142 | "hashes": [ 143 | "sha256:526263f4870c26f26c433545579475377b2b7588b6f1eac76a001e873ae3e19d", 144 | "sha256:75e10f767a433d9a86e50d83f418e83efc18ede923ee5ff7df93b6cb0306c5d4" 145 | ], 146 | "index": "pypi", 147 | "markers": "python_version >= '3.8'", 148 | "version": "==1.2.1" 149 | }, 150 | "certifi": { 151 | "hashes": [ 152 | "sha256:0569859f95fc761b18b45ef421b1290a0f65f147e92a1e5eb3e635f9a5e4e66f", 153 | "sha256:dc383c07b76109f368f6106eee2b593b04a011ea4d55f652c6ca24a754d1cdd1" 154 | ], 155 | "markers": "python_version >= '3.6'", 156 | "version": "==2024.2.2" 157 | }, 158 | "cfgv": { 159 | "hashes": [ 160 | "sha256:b7265b1f29fd3316bfcd2b330d63d024f2bfd8bcb8b0272f8e19a504856c48f9", 161 | "sha256:e52591d4c5f5dead8e0f673fb16db7949d2cfb3f7da4582893288f0ded8fe560" 162 | ], 163 | "markers": "python_version >= '3.8'", 164 | "version": "==3.4.0" 165 | }, 166 | "charset-normalizer": { 167 | "hashes": [ 168 | "sha256:06435b539f889b1f6f4ac1758871aae42dc3a8c0e24ac9e60c2384973ad73027", 169 | "sha256:06a81e93cd441c56a9b65d8e1d043daeb97a3d0856d177d5c90ba85acb3db087", 170 | "sha256:0a55554a2fa0d408816b3b5cedf0045f4b8e1a6065aec45849de2d6f3f8e9786", 171 | "sha256:0b2b64d2bb6d3fb9112bafa732def486049e63de9618b5843bcdd081d8144cd8", 172 | "sha256:10955842570876604d404661fbccbc9c7e684caf432c09c715ec38fbae45ae09", 173 | "sha256:122c7fa62b130ed55f8f285bfd56d5f4b4a5b503609d181f9ad85e55c89f4185", 174 | "sha256:1ceae2f17a9c33cb48e3263960dc5fc8005351ee19db217e9b1bb15d28c02574", 175 | "sha256:1d3193f4a680c64b4b6a9115943538edb896edc190f0b222e73761716519268e", 176 | "sha256:1f79682fbe303db92bc2b1136016a38a42e835d932bab5b3b1bfcfbf0640e519", 177 | "sha256:2127566c664442652f024c837091890cb1942c30937add288223dc895793f898", 178 | "sha256:22afcb9f253dac0696b5a4be4a1c0f8762f8239e21b99680099abd9b2b1b2269", 179 | "sha256:25baf083bf6f6b341f4121c2f3c548875ee6f5339300e08be3f2b2ba1721cdd3", 180 | "sha256:2e81c7b9c8979ce92ed306c249d46894776a909505d8f5a4ba55b14206e3222f", 181 | "sha256:3287761bc4ee9e33561a7e058c72ac0938c4f57fe49a09eae428fd88aafe7bb6", 182 | "sha256:34d1c8da1e78d2e001f363791c98a272bb734000fcef47a491c1e3b0505657a8", 183 | "sha256:37e55c8e51c236f95b033f6fb391d7d7970ba5fe7ff453dad675e88cf303377a", 184 | "sha256:3d47fa203a7bd9c5b6cee4736ee84ca03b8ef23193c0d1ca99b5089f72645c73", 185 | "sha256:3e4d1f6587322d2788836a99c69062fbb091331ec940e02d12d179c1d53e25fc", 186 | "sha256:42cb296636fcc8b0644486d15c12376cb9fa75443e00fb25de0b8602e64c1714", 187 | "sha256:45485e01ff4d3630ec0d9617310448a8702f70e9c01906b0d0118bdf9d124cf2", 188 | "sha256:4a78b2b446bd7c934f5dcedc588903fb2f5eec172f3d29e52a9096a43722adfc", 189 | "sha256:4ab2fe47fae9e0f9dee8c04187ce5d09f48eabe611be8259444906793ab7cbce", 190 | "sha256:4d0d1650369165a14e14e1e47b372cfcb31d6ab44e6e33cb2d4e57265290044d", 191 | "sha256:549a3a73da901d5bc3ce8d24e0600d1fa85524c10287f6004fbab87672bf3e1e", 192 | "sha256:55086ee1064215781fff39a1af09518bc9255b50d6333f2e4c74ca09fac6a8f6", 193 | "sha256:572c3763a264ba47b3cf708a44ce965d98555f618ca42c926a9c1616d8f34269", 194 | "sha256:573f6eac48f4769d667c4442081b1794f52919e7edada77495aaed9236d13a96", 195 | "sha256:5b4c145409bef602a690e7cfad0a15a55c13320ff7a3ad7ca59c13bb8ba4d45d", 196 | "sha256:6463effa3186ea09411d50efc7d85360b38d5f09b870c48e4600f63af490e56a", 197 | "sha256:65f6f63034100ead094b8744b3b97965785388f308a64cf8d7c34f2f2e5be0c4", 198 | "sha256:663946639d296df6a2bb2aa51b60a2454ca1cb29835324c640dafb5ff2131a77", 199 | "sha256:6897af51655e3691ff853668779c7bad41579facacf5fd7253b0133308cf000d", 200 | "sha256:68d1f8a9e9e37c1223b656399be5d6b448dea850bed7d0f87a8311f1ff3dabb0", 201 | "sha256:6ac7ffc7ad6d040517be39eb591cac5ff87416c2537df6ba3cba3bae290c0fed", 202 | "sha256:6b3251890fff30ee142c44144871185dbe13b11bab478a88887a639655be1068", 203 | "sha256:6c4caeef8fa63d06bd437cd4bdcf3ffefe6738fb1b25951440d80dc7df8c03ac", 204 | "sha256:6ef1d82a3af9d3eecdba2321dc1b3c238245d890843e040e41e470ffa64c3e25", 205 | "sha256:753f10e867343b4511128c6ed8c82f7bec3bd026875576dfd88483c5c73b2fd8", 206 | "sha256:7cd13a2e3ddeed6913a65e66e94b51d80a041145a026c27e6bb76c31a853c6ab", 207 | "sha256:7ed9e526742851e8d5cc9e6cf41427dfc6068d4f5a3bb03659444b4cabf6bc26", 208 | "sha256:7f04c839ed0b6b98b1a7501a002144b76c18fb1c1850c8b98d458ac269e26ed2", 209 | "sha256:802fe99cca7457642125a8a88a084cef28ff0cf9407060f7b93dca5aa25480db", 210 | "sha256:80402cd6ee291dcb72644d6eac93785fe2c8b9cb30893c1af5b8fdd753b9d40f", 211 | "sha256:8465322196c8b4d7ab6d1e049e4c5cb460d0394da4a27d23cc242fbf0034b6b5", 212 | "sha256:86216b5cee4b06df986d214f664305142d9c76df9b6512be2738aa72a2048f99", 213 | "sha256:87d1351268731db79e0f8e745d92493ee2841c974128ef629dc518b937d9194c", 214 | "sha256:8bdb58ff7ba23002a4c5808d608e4e6c687175724f54a5dade5fa8c67b604e4d", 215 | "sha256:8c622a5fe39a48f78944a87d4fb8a53ee07344641b0562c540d840748571b811", 216 | "sha256:8d756e44e94489e49571086ef83b2bb8ce311e730092d2c34ca8f7d925cb20aa", 217 | "sha256:8f4a014bc36d3c57402e2977dada34f9c12300af536839dc38c0beab8878f38a", 218 | "sha256:9063e24fdb1e498ab71cb7419e24622516c4a04476b17a2dab57e8baa30d6e03", 219 | "sha256:90d558489962fd4918143277a773316e56c72da56ec7aa3dc3dbbe20fdfed15b", 220 | "sha256:923c0c831b7cfcb071580d3f46c4baf50f174be571576556269530f4bbd79d04", 221 | "sha256:95f2a5796329323b8f0512e09dbb7a1860c46a39da62ecb2324f116fa8fdc85c", 222 | "sha256:96b02a3dc4381e5494fad39be677abcb5e6634bf7b4fa83a6dd3112607547001", 223 | "sha256:9f96df6923e21816da7e0ad3fd47dd8f94b2a5ce594e00677c0013018b813458", 224 | "sha256:a10af20b82360ab00827f916a6058451b723b4e65030c5a18577c8b2de5b3389", 225 | "sha256:a50aebfa173e157099939b17f18600f72f84eed3049e743b68ad15bd69b6bf99", 226 | "sha256:a981a536974bbc7a512cf44ed14938cf01030a99e9b3a06dd59578882f06f985", 227 | "sha256:a9a8e9031d613fd2009c182b69c7b2c1ef8239a0efb1df3f7c8da66d5dd3d537", 228 | "sha256:ae5f4161f18c61806f411a13b0310bea87f987c7d2ecdbdaad0e94eb2e404238", 229 | "sha256:aed38f6e4fb3f5d6bf81bfa990a07806be9d83cf7bacef998ab1a9bd660a581f", 230 | "sha256:b01b88d45a6fcb69667cd6d2f7a9aeb4bf53760d7fc536bf679ec94fe9f3ff3d", 231 | "sha256:b261ccdec7821281dade748d088bb6e9b69e6d15b30652b74cbbac25e280b796", 232 | "sha256:b2b0a0c0517616b6869869f8c581d4eb2dd83a4d79e0ebcb7d373ef9956aeb0a", 233 | "sha256:b4a23f61ce87adf89be746c8a8974fe1c823c891d8f86eb218bb957c924bb143", 234 | "sha256:bd8f7df7d12c2db9fab40bdd87a7c09b1530128315d047a086fa3ae3435cb3a8", 235 | "sha256:beb58fe5cdb101e3a055192ac291b7a21e3b7ef4f67fa1d74e331a7f2124341c", 236 | "sha256:c002b4ffc0be611f0d9da932eb0f704fe2602a9a949d1f738e4c34c75b0863d5", 237 | "sha256:c083af607d2515612056a31f0a8d9e0fcb5876b7bfc0abad3ecd275bc4ebc2d5", 238 | "sha256:c180f51afb394e165eafe4ac2936a14bee3eb10debc9d9e4db8958fe36afe711", 239 | "sha256:c235ebd9baae02f1b77bcea61bce332cb4331dc3617d254df3323aa01ab47bd4", 240 | "sha256:cd70574b12bb8a4d2aaa0094515df2463cb429d8536cfb6c7ce983246983e5a6", 241 | "sha256:d0eccceffcb53201b5bfebb52600a5fb483a20b61da9dbc885f8b103cbe7598c", 242 | "sha256:d965bba47ddeec8cd560687584e88cf699fd28f192ceb452d1d7ee807c5597b7", 243 | "sha256:db364eca23f876da6f9e16c9da0df51aa4f104a972735574842618b8c6d999d4", 244 | "sha256:ddbb2551d7e0102e7252db79ba445cdab71b26640817ab1e3e3648dad515003b", 245 | "sha256:deb6be0ac38ece9ba87dea880e438f25ca3eddfac8b002a2ec3d9183a454e8ae", 246 | "sha256:e06ed3eb3218bc64786f7db41917d4e686cc4856944f53d5bdf83a6884432e12", 247 | "sha256:e27ad930a842b4c5eb8ac0016b0a54f5aebbe679340c26101df33424142c143c", 248 | "sha256:e537484df0d8f426ce2afb2d0f8e1c3d0b114b83f8850e5f2fbea0e797bd82ae", 249 | "sha256:eb00ed941194665c332bf8e078baf037d6c35d7c4f3102ea2d4f16ca94a26dc8", 250 | "sha256:eb6904c354526e758fda7167b33005998fb68c46fbc10e013ca97f21ca5c8887", 251 | "sha256:eb8821e09e916165e160797a6c17edda0679379a4be5c716c260e836e122f54b", 252 | "sha256:efcb3f6676480691518c177e3b465bcddf57cea040302f9f4e6e191af91174d4", 253 | "sha256:f27273b60488abe721a075bcca6d7f3964f9f6f067c8c4c605743023d7d3944f", 254 | "sha256:f30c3cb33b24454a82faecaf01b19c18562b1e89558fb6c56de4d9118a032fd5", 255 | "sha256:fb69256e180cb6c8a894fee62b3afebae785babc1ee98b81cdf68bbca1987f33", 256 | "sha256:fd1abc0d89e30cc4e02e4064dc67fcc51bd941eb395c502aac3ec19fab46b519", 257 | "sha256:ff8fa367d09b717b2a17a052544193ad76cd49979c805768879cb63d9ca50561" 258 | ], 259 | "markers": "python_full_version >= '3.7.0'", 260 | "version": "==3.3.2" 261 | }, 262 | "click": { 263 | "hashes": [ 264 | "sha256:ae74fb96c20a0277a1d615f1e4d73c8414f5a98db8b799a7931d1582f3390c28", 265 | "sha256:ca9853ad459e787e2192211578cc907e7594e294c7ccc834310722b41b9ca6de" 266 | ], 267 | "markers": "python_version >= '3.7'", 268 | "version": "==8.1.7" 269 | }, 270 | "dill": { 271 | "hashes": [ 272 | "sha256:3ebe3c479ad625c4553aca177444d89b486b1d84982eeacded644afc0cf797ca", 273 | "sha256:c36ca9ffb54365bdd2f8eb3eff7d2a21237f8452b57ace88b1ac615b7e815bd7" 274 | ], 275 | "markers": "python_version < '3.11'", 276 | "version": "==0.3.8" 277 | }, 278 | "distlib": { 279 | "hashes": [ 280 | "sha256:034db59a0b96f8ca18035f36290806a9a6e6bd9d1ff91e45a7f172eb17e51784", 281 | "sha256:1530ea13e350031b6312d8580ddb6b27a104275a31106523b8f123787f494f64" 282 | ], 283 | "version": "==0.3.8" 284 | }, 285 | "docutils": { 286 | "hashes": [ 287 | "sha256:96f387a2c5562db4476f09f13bbab2192e764cac08ebbf3a34a95d9b1e4a59d6", 288 | "sha256:f08a4e276c3a1583a86dce3e34aba3fe04d02bba2dd51ed16106244e8a923e3b" 289 | ], 290 | "markers": "python_version >= '3.7'", 291 | "version": "==0.20.1" 292 | }, 293 | "filelock": { 294 | "hashes": [ 295 | "sha256:5ffa845303983e7a0b7ae17636509bc97997d58afeafa72fb141a17b152284cb", 296 | "sha256:a79895a25bbefdf55d1a2a0a80968f7dbb28edcd6d4234a0afb3f37ecde4b546" 297 | ], 298 | "markers": "python_version >= '3.8'", 299 | "version": "==3.13.3" 300 | }, 301 | "identify": { 302 | "hashes": [ 303 | "sha256:10a7ca245cfcd756a554a7288159f72ff105ad233c7c4b9c6f0f4d108f5f6791", 304 | "sha256:c4de0081837b211594f8e877a6b4fad7ca32bbfc1a9307fdd61c28bfe923f13e" 305 | ], 306 | "markers": "python_version >= '3.8'", 307 | "version": "==2.5.35" 308 | }, 309 | "idna": { 310 | "hashes": [ 311 | "sha256:9ecdbbd083b06798ae1e86adcbfe8ab1479cf864e4ee30fe4e46a003d12491ca", 312 | "sha256:c05567e9c24a6b9faaa835c4821bad0590fbb9d5779e7caa6e1cc4978e7eb24f" 313 | ], 314 | "markers": "python_version >= '3.5'", 315 | "version": "==3.6" 316 | }, 317 | "importlib-metadata": { 318 | "hashes": [ 319 | "sha256:30962b96c0c223483ed6cc7280e7f0199feb01a0e40cfae4d4450fc6fab1f570", 320 | "sha256:b78938b926ee8d5f020fc4772d487045805a55ddbad2ecf21c6d60938dc7fcd2" 321 | ], 322 | "markers": "python_version >= '3.8'", 323 | "version": "==7.1.0" 324 | }, 325 | "importlib-resources": { 326 | "hashes": [ 327 | "sha256:50d10f043df931902d4194ea07ec57960f66a80449ff867bfe782b4c486ba78c", 328 | "sha256:cdb2b453b8046ca4e3798eb1d84f3cce1446a0e8e7b5ef4efb600f19fc398145" 329 | ], 330 | "markers": "python_version < '3.9'", 331 | "version": "==6.4.0" 332 | }, 333 | "isort": { 334 | "hashes": [ 335 | "sha256:48fdfcb9face5d58a4f6dde2e72a1fb8dcaf8ab26f95ab49fab84c2ddefb0109", 336 | "sha256:8ca5e72a8d85860d5a3fa69b8745237f2939afe12dbf656afbcb47fe72d947a6" 337 | ], 338 | "markers": "python_full_version >= '3.8.0'", 339 | "version": "==5.13.2" 340 | }, 341 | "jaraco.classes": { 342 | "hashes": [ 343 | "sha256:47a024b51d0239c0dd8c8540c6c7f484be3b8fcf0b2d85c13825780d3b3f3acd", 344 | "sha256:f662826b6bed8cace05e7ff873ce0f9283b5c924470fe664fff1c2f00f581790" 345 | ], 346 | "markers": "python_version >= '3.8'", 347 | "version": "==3.4.0" 348 | }, 349 | "jaraco.context": { 350 | "hashes": [ 351 | "sha256:3e16388f7da43d384a1a7cd3452e72e14732ac9fe459678773a3608a812bf266", 352 | "sha256:c2f67165ce1f9be20f32f650f25d8edfc1646a8aeee48ae06fb35f90763576d2" 353 | ], 354 | "markers": "python_version >= '3.8'", 355 | "version": "==5.3.0" 356 | }, 357 | "jaraco.functools": { 358 | "hashes": [ 359 | "sha256:c279cb24c93d694ef7270f970d499cab4d3813f4e08273f95398651a634f0925", 360 | "sha256:daf276ddf234bea897ef14f43c4e1bf9eefeac7b7a82a4dd69228ac20acff68d" 361 | ], 362 | "markers": "python_version >= '3.8'", 363 | "version": "==4.0.0" 364 | }, 365 | "keyring": { 366 | "hashes": [ 367 | "sha256:26fc12e6a329d61d24aa47b22a7c5c3f35753df7d8f2860973cf94f4e1fb3427", 368 | "sha256:7230ea690525133f6ad536a9b5def74a4bd52642abe594761028fc044d7c7893" 369 | ], 370 | "markers": "python_version >= '3.8'", 371 | "version": "==25.1.0" 372 | }, 373 | "markdown-it-py": { 374 | "extras": [ 375 | "linkify", 376 | "plugins" 377 | ], 378 | "hashes": [ 379 | "sha256:355216845c60bd96232cd8d8c40e8f9765cc86f46880e43a8fd22dc1a1a8cab1", 380 | "sha256:e3f60a94fa066dc52ec76661e37c851cb232d92f9886b15cb560aaada2df8feb" 381 | ], 382 | "markers": "python_version >= '3.8'", 383 | "version": "==3.0.0" 384 | }, 385 | "mccabe": { 386 | "hashes": [ 387 | "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325", 388 | "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" 389 | ], 390 | "markers": "python_version >= '3.6'", 391 | "version": "==0.7.0" 392 | }, 393 | "mdurl": { 394 | "hashes": [ 395 | "sha256:84008a41e51615a49fc9966191ff91509e3c40b939176e643fd50a5c2196b8f8", 396 | "sha256:bb413d29f5eea38f31dd4754dd7377d4465116fb207585f97bf925588687c1ba" 397 | ], 398 | "markers": "python_version >= '3.7'", 399 | "version": "==0.1.2" 400 | }, 401 | "more-itertools": { 402 | "hashes": [ 403 | "sha256:686b06abe565edfab151cb8fd385a05651e1fdf8f0a14191e4439283421f8684", 404 | "sha256:8fccb480c43d3e99a00087634c06dd02b0d50fbf088b380de5a41a015ec239e1" 405 | ], 406 | "markers": "python_version >= '3.8'", 407 | "version": "==10.2.0" 408 | }, 409 | "mypy": { 410 | "hashes": [ 411 | "sha256:0235391f1c6f6ce487b23b9dbd1327b4ec33bb93934aa986efe8a9563d9349e6", 412 | "sha256:190da1ee69b427d7efa8aa0d5e5ccd67a4fb04038c380237a0d96829cb157913", 413 | "sha256:2418488264eb41f69cc64a69a745fad4a8f86649af4b1041a4c64ee61fc61129", 414 | "sha256:3a3c007ff3ee90f69cf0a15cbcdf0995749569b86b6d2f327af01fd1b8aee9dc", 415 | "sha256:3cc5da0127e6a478cddd906068496a97a7618a21ce9b54bde5bf7e539c7af974", 416 | "sha256:48533cdd345c3c2e5ef48ba3b0d3880b257b423e7995dada04248725c6f77374", 417 | "sha256:49c87c15aed320de9b438ae7b00c1ac91cd393c1b854c2ce538e2a72d55df150", 418 | "sha256:4d3dbd346cfec7cb98e6cbb6e0f3c23618af826316188d587d1c1bc34f0ede03", 419 | "sha256:571741dc4194b4f82d344b15e8837e8c5fcc462d66d076748142327626a1b6e9", 420 | "sha256:587ce887f75dd9700252a3abbc9c97bbe165a4a630597845c61279cf32dfbf02", 421 | "sha256:5d741d3fc7c4da608764073089e5f58ef6352bedc223ff58f2f038c2c4698a89", 422 | "sha256:5e6061f44f2313b94f920e91b204ec600982961e07a17e0f6cd83371cb23f5c2", 423 | "sha256:61758fabd58ce4b0720ae1e2fea5cfd4431591d6d590b197775329264f86311d", 424 | "sha256:653265f9a2784db65bfca694d1edd23093ce49740b2244cde583aeb134c008f3", 425 | "sha256:68edad3dc7d70f2f17ae4c6c1b9471a56138ca22722487eebacfd1eb5321d612", 426 | "sha256:81a10926e5473c5fc3da8abb04119a1f5811a236dc3a38d92015cb1e6ba4cb9e", 427 | "sha256:85ca5fcc24f0b4aeedc1d02f93707bccc04733f21d41c88334c5482219b1ccb3", 428 | "sha256:a260627a570559181a9ea5de61ac6297aa5af202f06fd7ab093ce74e7181e43e", 429 | "sha256:aceb1db093b04db5cd390821464504111b8ec3e351eb85afd1433490163d60cd", 430 | "sha256:b685154e22e4e9199fc95f298661deea28aaede5ae16ccc8cbb1045e716b3e04", 431 | "sha256:d357423fa57a489e8c47b7c85dfb96698caba13d66e086b412298a1a0ea3b0ed", 432 | "sha256:d4d5ddc13421ba3e2e082a6c2d74c2ddb3979c39b582dacd53dd5d9431237185", 433 | "sha256:e49499be624dead83927e70c756970a0bc8240e9f769389cdf5714b0784ca6bf", 434 | "sha256:e54396d70be04b34f31d2edf3362c1edd023246c82f1730bbf8768c28db5361b", 435 | "sha256:f88566144752999351725ac623471661c9d1cd8caa0134ff98cceeea181789f4", 436 | "sha256:f8a67616990062232ee4c3952f41c779afac41405806042a8126fe96e098419f", 437 | "sha256:fe28657de3bfec596bbeef01cb219833ad9d38dd5393fc649f4b366840baefe6" 438 | ], 439 | "index": "pypi", 440 | "markers": "python_version >= '3.8'", 441 | "version": "==1.9.0" 442 | }, 443 | "mypy-extensions": { 444 | "hashes": [ 445 | "sha256:4392f6c0eb8a5668a69e23d168ffa70f0be9ccfd32b5cc2d26a34ae5b844552d", 446 | "sha256:75dbf8955dc00442a438fc4d0666508a9a97b6bd41aa2f0ffe9d2f2725af0782" 447 | ], 448 | "markers": "python_version >= '3.5'", 449 | "version": "==1.0.0" 450 | }, 451 | "nh3": { 452 | "hashes": [ 453 | "sha256:0316c25b76289cf23be6b66c77d3608a4fdf537b35426280032f432f14291b9a", 454 | "sha256:1a814dd7bba1cb0aba5bcb9bebcc88fd801b63e21e2450ae6c52d3b3336bc911", 455 | "sha256:1aa52a7def528297f256de0844e8dd680ee279e79583c76d6fa73a978186ddfb", 456 | "sha256:22c26e20acbb253a5bdd33d432a326d18508a910e4dcf9a3316179860d53345a", 457 | "sha256:40015514022af31975c0b3bca4014634fa13cb5dc4dbcbc00570acc781316dcc", 458 | "sha256:40d0741a19c3d645e54efba71cb0d8c475b59135c1e3c580f879ad5514cbf028", 459 | "sha256:551672fd71d06cd828e282abdb810d1be24e1abb7ae2543a8fa36a71c1006fe9", 460 | "sha256:66f17d78826096291bd264f260213d2b3905e3c7fae6dfc5337d49429f1dc9f3", 461 | "sha256:85cdbcca8ef10733bd31f931956f7fbb85145a4d11ab9e6742bbf44d88b7e351", 462 | "sha256:a3f55fabe29164ba6026b5ad5c3151c314d136fd67415a17660b4aaddacf1b10", 463 | "sha256:b4427ef0d2dfdec10b641ed0bdaf17957eb625b2ec0ea9329b3d28806c153d71", 464 | "sha256:ba73a2f8d3a1b966e9cdba7b211779ad8a2561d2dba9674b8a19ed817923f65f", 465 | "sha256:c21bac1a7245cbd88c0b0e4a420221b7bfa838a2814ee5bb924e9c2f10a1120b", 466 | "sha256:c551eb2a3876e8ff2ac63dff1585236ed5dfec5ffd82216a7a174f7c5082a78a", 467 | "sha256:c790769152308421283679a142dbdb3d1c46c79c823008ecea8e8141db1a2062", 468 | "sha256:d7a25fd8c86657f5d9d576268e3b3767c5cd4f42867c9383618be8517f0f022a" 469 | ], 470 | "version": "==0.2.17" 471 | }, 472 | "nodeenv": { 473 | "hashes": [ 474 | "sha256:d51e0c37e64fbf47d017feac3145cdbb58836d7eee8c6f6d3b6880c5456227d2", 475 | "sha256:df865724bb3c3adc86b3876fa209771517b0cfe596beff01a92700e0e8be4cec" 476 | ], 477 | "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6'", 478 | "version": "==1.8.0" 479 | }, 480 | "packaging": { 481 | "hashes": [ 482 | "sha256:2ddfb553fdf02fb784c234c7ba6ccc288296ceabec964ad2eae3777778130bc5", 483 | "sha256:eb82c5e3e56209074766e6885bb04b8c38a0c015d0a30036ebe7ece34c9989e9" 484 | ], 485 | "markers": "python_version >= '3.7'", 486 | "version": "==24.0" 487 | }, 488 | "pathspec": { 489 | "hashes": [ 490 | "sha256:a0d503e138a4c123b27490a4f7beda6a01c6f288df0e4a8b79c7eb0dc7b4cc08", 491 | "sha256:a482d51503a1ab33b1c67a6c3813a26953dbdc71c31dacaef9a838c4e29f5712" 492 | ], 493 | "markers": "python_version >= '3.8'", 494 | "version": "==0.12.1" 495 | }, 496 | "pkginfo": { 497 | "hashes": [ 498 | "sha256:5df73835398d10db79f8eecd5cd86b1f6d29317589ea70796994d49399af6297", 499 | "sha256:889a6da2ed7ffc58ab5b900d888ddce90bce912f2d2de1dc1c26f4cb9fe65097" 500 | ], 501 | "markers": "python_version >= '3.6'", 502 | "version": "==1.10.0" 503 | }, 504 | "platformdirs": { 505 | "hashes": [ 506 | "sha256:0614df2a2f37e1a662acbd8e2b25b92ccf8632929bc6d43467e17fe89c75e068", 507 | "sha256:ef0cc731df711022c174543cb70a9b5bd22e5a9337c8624ef2c2ceb8ddad8768" 508 | ], 509 | "markers": "python_version >= '3.8'", 510 | "version": "==4.2.0" 511 | }, 512 | "pre-commit": { 513 | "hashes": [ 514 | "sha256:5804465c675b659b0862f07907f96295d490822a450c4c40e747d0b1c6ebcb32", 515 | "sha256:841dc9aef25daba9a0238cd27984041fa0467b4199fc4852e27950664919f660" 516 | ], 517 | "index": "pypi", 518 | "markers": "python_version >= '3.8'", 519 | "version": "==3.5.0" 520 | }, 521 | "pygments": { 522 | "hashes": [ 523 | "sha256:b27c2826c47d0f3219f29554824c30c5e8945175d888647acd804ddd04af846c", 524 | "sha256:da46cec9fd2de5be3a8a784f434e4c4ab670b4ff54d605c4c2717e9d49c4c367" 525 | ], 526 | "markers": "python_version >= '3.7'", 527 | "version": "==2.17.2" 528 | }, 529 | "pylint": { 530 | "hashes": [ 531 | "sha256:507a5b60953874766d8a366e8e8c7af63e058b26345cfcb5f91f89d987fd6b74", 532 | "sha256:6a69beb4a6f63debebaab0a3477ecd0f559aa726af4954fc948c51f7a2549e23" 533 | ], 534 | "index": "pypi", 535 | "markers": "python_full_version >= '3.8.0'", 536 | "version": "==3.1.0" 537 | }, 538 | "pyproject-hooks": { 539 | "hashes": [ 540 | "sha256:283c11acd6b928d2f6a7c73fa0d01cb2bdc5f07c57a2eeb6e83d5e56b97976f8", 541 | "sha256:f271b298b97f5955d53fb12b72c1fb1948c22c1a6b70b315c54cedaca0264ef5" 542 | ], 543 | "markers": "python_version >= '3.7'", 544 | "version": "==1.0.0" 545 | }, 546 | "pyyaml": { 547 | "hashes": [ 548 | "sha256:04ac92ad1925b2cff1db0cfebffb6ffc43457495c9b3c39d3fcae417d7125dc5", 549 | "sha256:062582fca9fabdd2c8b54a3ef1c978d786e0f6b3a1510e0ac93ef59e0ddae2bc", 550 | "sha256:0d3304d8c0adc42be59c5f8a4d9e3d7379e6955ad754aa9d6ab7a398b59dd1df", 551 | "sha256:1635fd110e8d85d55237ab316b5b011de701ea0f29d07611174a1b42f1444741", 552 | "sha256:184c5108a2aca3c5b3d3bf9395d50893a7ab82a38004c8f61c258d4428e80206", 553 | "sha256:18aeb1bf9a78867dc38b259769503436b7c72f7a1f1f4c93ff9a17de54319b27", 554 | "sha256:1d4c7e777c441b20e32f52bd377e0c409713e8bb1386e1099c2415f26e479595", 555 | "sha256:1e2722cc9fbb45d9b87631ac70924c11d3a401b2d7f410cc0e3bbf249f2dca62", 556 | "sha256:1fe35611261b29bd1de0070f0b2f47cb6ff71fa6595c077e42bd0c419fa27b98", 557 | "sha256:28c119d996beec18c05208a8bd78cbe4007878c6dd15091efb73a30e90539696", 558 | "sha256:326c013efe8048858a6d312ddd31d56e468118ad4cdeda36c719bf5bb6192290", 559 | "sha256:40df9b996c2b73138957fe23a16a4f0ba614f4c0efce1e9406a184b6d07fa3a9", 560 | "sha256:42f8152b8dbc4fe7d96729ec2b99c7097d656dc1213a3229ca5383f973a5ed6d", 561 | "sha256:49a183be227561de579b4a36efbb21b3eab9651dd81b1858589f796549873dd6", 562 | "sha256:4fb147e7a67ef577a588a0e2c17b6db51dda102c71de36f8549b6816a96e1867", 563 | "sha256:50550eb667afee136e9a77d6dc71ae76a44df8b3e51e41b77f6de2932bfe0f47", 564 | "sha256:510c9deebc5c0225e8c96813043e62b680ba2f9c50a08d3724c7f28a747d1486", 565 | "sha256:5773183b6446b2c99bb77e77595dd486303b4faab2b086e7b17bc6bef28865f6", 566 | "sha256:596106435fa6ad000c2991a98fa58eeb8656ef2325d7e158344fb33864ed87e3", 567 | "sha256:6965a7bc3cf88e5a1c3bd2e0b5c22f8d677dc88a455344035f03399034eb3007", 568 | "sha256:69b023b2b4daa7548bcfbd4aa3da05b3a74b772db9e23b982788168117739938", 569 | "sha256:6c22bec3fbe2524cde73d7ada88f6566758a8f7227bfbf93a408a9d86bcc12a0", 570 | "sha256:704219a11b772aea0d8ecd7058d0082713c3562b4e271b849ad7dc4a5c90c13c", 571 | "sha256:7e07cbde391ba96ab58e532ff4803f79c4129397514e1413a7dc761ccd755735", 572 | "sha256:81e0b275a9ecc9c0c0c07b4b90ba548307583c125f54d5b6946cfee6360c733d", 573 | "sha256:855fb52b0dc35af121542a76b9a84f8d1cd886ea97c84703eaa6d88e37a2ad28", 574 | "sha256:8d4e9c88387b0f5c7d5f281e55304de64cf7f9c0021a3525bd3b1c542da3b0e4", 575 | "sha256:9046c58c4395dff28dd494285c82ba00b546adfc7ef001486fbf0324bc174fba", 576 | "sha256:9eb6caa9a297fc2c2fb8862bc5370d0303ddba53ba97e71f08023b6cd73d16a8", 577 | "sha256:a08c6f0fe150303c1c6b71ebcd7213c2858041a7e01975da3a99aed1e7a378ef", 578 | "sha256:a0cd17c15d3bb3fa06978b4e8958dcdc6e0174ccea823003a106c7d4d7899ac5", 579 | "sha256:afd7e57eddb1a54f0f1a974bc4391af8bcce0b444685d936840f125cf046d5bd", 580 | "sha256:b1275ad35a5d18c62a7220633c913e1b42d44b46ee12554e5fd39c70a243d6a3", 581 | "sha256:b786eecbdf8499b9ca1d697215862083bd6d2a99965554781d0d8d1ad31e13a0", 582 | "sha256:ba336e390cd8e4d1739f42dfe9bb83a3cc2e80f567d8805e11b46f4a943f5515", 583 | "sha256:baa90d3f661d43131ca170712d903e6295d1f7a0f595074f151c0aed377c9b9c", 584 | "sha256:bc1bf2925a1ecd43da378f4db9e4f799775d6367bdb94671027b73b393a7c42c", 585 | "sha256:bd4af7373a854424dabd882decdc5579653d7868b8fb26dc7d0e99f823aa5924", 586 | "sha256:bf07ee2fef7014951eeb99f56f39c9bb4af143d8aa3c21b1677805985307da34", 587 | "sha256:bfdf460b1736c775f2ba9f6a92bca30bc2095067b8a9d77876d1fad6cc3b4a43", 588 | "sha256:c8098ddcc2a85b61647b2590f825f3db38891662cfc2fc776415143f599bb859", 589 | "sha256:d2b04aac4d386b172d5b9692e2d2da8de7bfb6c387fa4f801fbf6fb2e6ba4673", 590 | "sha256:d483d2cdf104e7c9fa60c544d92981f12ad66a457afae824d146093b8c294c54", 591 | "sha256:d858aa552c999bc8a8d57426ed01e40bef403cd8ccdd0fc5f6f04a00414cac2a", 592 | "sha256:e7d73685e87afe9f3b36c799222440d6cf362062f78be1013661b00c5c6f678b", 593 | "sha256:f003ed9ad21d6a4713f0a9b5a7a0a79e08dd0f221aff4525a2be4c346ee60aab", 594 | "sha256:f22ac1c3cac4dbc50079e965eba2c1058622631e526bd9afd45fedd49ba781fa", 595 | "sha256:faca3bdcf85b2fc05d06ff3fbc1f83e1391b3e724afa3feba7d13eeab355484c", 596 | "sha256:fca0e3a251908a499833aa292323f32437106001d436eca0e6e7833256674585", 597 | "sha256:fd1592b3fdf65fff2ad0004b5e363300ef59ced41c2e6b3a99d4089fa8c5435d", 598 | "sha256:fd66fc5d0da6d9815ba2cebeb4205f95818ff4b79c3ebe268e75d961704af52f" 599 | ], 600 | "markers": "python_version >= '3.6'", 601 | "version": "==6.0.1" 602 | }, 603 | "readme-renderer": { 604 | "hashes": [ 605 | "sha256:1818dd28140813509eeed8d62687f7cd4f7bad90d4db586001c5dc09d4fde311", 606 | "sha256:19db308d86ecd60e5affa3b2a98f017af384678c63c88e5d4556a380e674f3f9" 607 | ], 608 | "markers": "python_version >= '3.8'", 609 | "version": "==43.0" 610 | }, 611 | "requests": { 612 | "hashes": [ 613 | "sha256:58cd2187c01e70e6e26505bca751777aa9f2ee0b7f4300988b709f44e013003f", 614 | "sha256:942c5a758f98d790eaed1a29cb6eefc7ffb0d1cf7af05c3d2791656dbd6ad1e1" 615 | ], 616 | "markers": "python_version >= '3.7'", 617 | "version": "==2.31.0" 618 | }, 619 | "requests-toolbelt": { 620 | "hashes": [ 621 | "sha256:7681a0a3d047012b5bdc0ee37d7f8f07ebe76ab08caeccfc3921ce23c88d5bc6", 622 | "sha256:cccfdd665f0a24fcf4726e690f65639d272bb0637b9b92dfd91a5568ccf6bd06" 623 | ], 624 | "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", 625 | "version": "==1.0.0" 626 | }, 627 | "rfc3986": { 628 | "hashes": [ 629 | "sha256:50b1502b60e289cb37883f3dfd34532b8873c7de9f49bb546641ce9cbd256ebd", 630 | "sha256:97aacf9dbd4bfd829baad6e6309fa6573aaf1be3f6fa735c8ab05e46cecb261c" 631 | ], 632 | "markers": "python_version >= '3.7'", 633 | "version": "==2.0.0" 634 | }, 635 | "rich": { 636 | "hashes": [ 637 | "sha256:4edbae314f59eb482f54e9e30bf00d33350aaa94f4bfcd4e9e3110e64d0d7222", 638 | "sha256:9be308cb1fe2f1f57d67ce99e95af38a1e2bc71ad9813b0e247cf7ffbcc3a432" 639 | ], 640 | "markers": "python_full_version >= '3.7.0'", 641 | "version": "==13.7.1" 642 | }, 643 | "setuptools": { 644 | "hashes": [ 645 | "sha256:0ff4183f8f42cd8fa3acea16c45205521a4ef28f73c6391d8a25e92893134f2e", 646 | "sha256:c21c49fb1042386df081cb5d86759792ab89efca84cf114889191cd09aacc80c" 647 | ], 648 | "markers": "python_version >= '3.8'", 649 | "version": "==69.2.0" 650 | }, 651 | "tomli": { 652 | "hashes": [ 653 | "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc", 654 | "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f" 655 | ], 656 | "markers": "python_version < '3.11'", 657 | "version": "==2.0.1" 658 | }, 659 | "tomlkit": { 660 | "hashes": [ 661 | "sha256:5cd82d48a3dd89dee1f9d64420aa20ae65cfbd00668d6f094d7578a78efbb77b", 662 | "sha256:7ca1cfc12232806517a8515047ba66a19369e71edf2439d0f5824f91032b6cc3" 663 | ], 664 | "markers": "python_version >= '3.7'", 665 | "version": "==0.12.4" 666 | }, 667 | "twine": { 668 | "hashes": [ 669 | "sha256:89b0cc7d370a4b66421cc6102f269aa910fe0f1861c124f573cf2ddedbc10cf4", 670 | "sha256:a262933de0b484c53408f9edae2e7821c1c45a3314ff2df9bdd343aa7ab8edc0" 671 | ], 672 | "index": "pypi", 673 | "markers": "python_version >= '3.8'", 674 | "version": "==5.0.0" 675 | }, 676 | "typing-extensions": { 677 | "hashes": [ 678 | "sha256:83f085bd5ca59c80295fc2a82ab5dac679cbe02b9f33f7d83af68e241bea51b0", 679 | "sha256:c1f94d72897edaf4ce775bb7558d5b79d8126906a14ea5ed1635921406c0387a" 680 | ], 681 | "markers": "python_version >= '3.8'", 682 | "version": "==4.11.0" 683 | }, 684 | "urllib3": { 685 | "hashes": [ 686 | "sha256:450b20ec296a467077128bff42b73080516e71b56ff59a60a02bef2232c4fa9d", 687 | "sha256:d0570876c61ab9e520d776c38acbbb5b05a776d3f9ff98a5c8fd5162a444cf19" 688 | ], 689 | "markers": "python_version >= '3.8'", 690 | "version": "==2.2.1" 691 | }, 692 | "virtualenv": { 693 | "hashes": [ 694 | "sha256:961c026ac520bac5f69acb8ea063e8a4f071bcc9457b9c1f28f6b085c511583a", 695 | "sha256:e08e13ecdca7a0bd53798f356d5831434afa5b07b93f0abdf0797b7a06ffe197" 696 | ], 697 | "markers": "python_version >= '3.7'", 698 | "version": "==20.25.1" 699 | }, 700 | "zipp": { 701 | "hashes": [ 702 | "sha256:206f5a15f2af3dbaee80769fb7dc6f249695e940acca08dfb2a4769fe61e538b", 703 | "sha256:2884ed22e7d8961de1c9a05142eb69a247f120291bc0206a00a7642f09b5b715" 704 | ], 705 | "markers": "python_version >= '3.8'", 706 | "version": "==3.18.1" 707 | } 708 | } 709 | } 710 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Textual Query Sandbox 2 | 3 | A quick spur-of-the-moment hack that will likely grow into something a wee 4 | bit more useful. For now though, it's a simple/pragmatic tool for quickly 5 | testing [Textual queries](https://textual.textualize.io/guide/queries/). 6 | 7 | ## Installation 8 | 9 | ### pipx 10 | 11 | The package can be installed using [`pipx`](https://pypa.github.io/pipx/): 12 | 13 | ```sh 14 | $ pipx install textual-query-sandbox 15 | ``` 16 | 17 | ### Homebrew 18 | 19 | The package can be installed using Homebrew. Use the following commands to 20 | install: 21 | 22 | ```sh 23 | $ brew tap davep/homebrew 24 | $ brew install textual-query-sandbox 25 | ``` 26 | 27 | ## Running 28 | 29 | Once installed run the `tqs` command. 30 | 31 | ![Textual Query Sandbox](https://raw.githubusercontent.com/davep/textual-query-sandbox/main/tqs.png) 32 | 33 | [//]: # (README.md ends here) 34 | -------------------------------------------------------------------------------- /pyproject.toml: -------------------------------------------------------------------------------- 1 | [build-system] 2 | requires = ["setuptools>=42", "wheel"] 3 | build-backend = "setuptools.build_meta" 4 | 5 | ### pyproject.toml ends here 6 | -------------------------------------------------------------------------------- /setup.cfg: -------------------------------------------------------------------------------- 1 | [metadata] 2 | name = textual-query-sandbox 3 | description = A sandbox for practicing Textual queries 4 | version = attr: textual_query_sandbox.__version__ 5 | long_description = file: README.md 6 | long_description_content_type = text/markdown 7 | url = https://github.com/davep/textual-query-sandbox 8 | author = Dave Pearson 9 | author_email = davep@davep.org 10 | maintainer = Dave Pearson 11 | maintainer_email = davep@davep.org 12 | license = License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+) 13 | license_files = LICENCE 14 | keywords = terminal 15 | classifiers = 16 | License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+) 17 | Environment :: Console 18 | Development Status :: 3 - Alpha 19 | Intended Audience :: Developers 20 | Operating System :: OS Independent 21 | Programming Language :: Python :: 3.8 22 | Programming Language :: Python :: 3.9 23 | Programming Language :: Python :: 3.10 24 | Programming Language :: Python :: 3.11 25 | Programming Language :: Python :: 3.12 26 | Topic :: Terminals 27 | project_urls = 28 | Documentation = https://github.com/davep/textual-query-sandbox/blob/main/README.md 29 | Source = https://github.com/davep/textual-query-sandbox 30 | Issues = https://github.com/davep/textual-query-sandbox/issues 31 | Discussions = https://github.com/davep/textual-query-sandbox/discussions 32 | 33 | [options] 34 | packages = find: 35 | platforms = any 36 | include_package_data = True 37 | install_requires = 38 | textual>=0.56.3 39 | python_requires = >=3.8 40 | 41 | [options.entry_points] 42 | console_scripts = 43 | tqs = textual_query_sandbox.__main__:run 44 | 45 | ### setup.cfg ends here 46 | -------------------------------------------------------------------------------- /textual_query_sandbox/__init__.py: -------------------------------------------------------------------------------- 1 | """A simple tool for experimenting with Textual DOM queries..""" 2 | 3 | ###################################################################### 4 | # Main app information. 5 | __author__ = "Dave Pearson" 6 | __copyright__ = "Copyright 2023-2024, Dave Pearson" 7 | __credits__ = ["Dave Pearson"] 8 | __maintainer__ = "Dave Pearson" 9 | __email__ = "davep@davep.org" 10 | __version__ = "0.6.0" 11 | __licence__ = "GPLv3+" 12 | 13 | ### __init__.py ends here 14 | -------------------------------------------------------------------------------- /textual_query_sandbox/__main__.py: -------------------------------------------------------------------------------- 1 | """Main entry point for the application.""" 2 | 3 | from .sandbox import QuerySandboxApp 4 | 5 | 6 | def run() -> None: 7 | """Run the application.""" 8 | QuerySandboxApp().run() 9 | 10 | 11 | if __name__ == "__main__": 12 | run() 13 | 14 | ### __main__.py ends here 15 | -------------------------------------------------------------------------------- /textual_query_sandbox/sandbox.py: -------------------------------------------------------------------------------- 1 | """A simple textual DOM query sandbox.""" 2 | 3 | from __future__ import annotations 4 | 5 | from itertools import cycle 6 | 7 | from textual import on 8 | from textual.app import App, ComposeResult 9 | from textual.binding import Binding 10 | from textual.containers import Grid, Horizontal, Vertical, VerticalScroll 11 | from textual.message import Message 12 | from textual.widget import Widget 13 | from textual.widgets import Button, Input, Pretty, Static, TabbedContent, TabPane, Label 14 | 15 | 16 | class Playground(Vertical, inherit_css=False): 17 | """The playground container.""" 18 | 19 | BORDER_TITLE = "Playground" 20 | 21 | DEFAULT_CSS = """ 22 | Playground { 23 | border: panel cornflowerblue; 24 | height: 2fr; 25 | } 26 | """ 27 | 28 | def on_mount(self) -> None: 29 | """Set up the playground once the DOM is mounted.""" 30 | # There's little point in anything in the playground getting focus, 31 | # so remove that ability from everything in here. 32 | for child in self.query("*"): 33 | child.can_focus = False 34 | 35 | 36 | def title(widget: Widget, main_title: str | None = None) -> Widget: 37 | """Add a title to a widget. 38 | 39 | Args: 40 | widget: The widget to name. 41 | main_title: The optional title to give the widget. 42 | 43 | Returns: 44 | The widget. 45 | """ 46 | border_title = main_title 47 | if main_title is None: 48 | border_title = widget.__class__.__name__ 49 | if widget.id is not None: 50 | border_title = f"{border_title}#{widget.id}" 51 | if widget.classes: 52 | border_title = f"{border_title}.{'.'.join(widget.classes)}" 53 | widget.border_title = border_title 54 | return widget 55 | 56 | 57 | class NestedContainers(Playground): 58 | """A Playground made of nested containers.""" 59 | 60 | def compose(self) -> ComposeResult: 61 | """Compose the playground.""" 62 | with title(Vertical(id="one", classes="foo bar")): 63 | with title(Vertical(id="two")): 64 | with title(Horizontal(id="three", classes="baz")): 65 | for n in range(3): 66 | yield title( 67 | Vertical(id=f"three-{n}", classes=f"wibble wobble-{n}") 68 | ) 69 | with title(Vertical(id="four")): 70 | yield title(Vertical(id="innermost", classes="foo baz")) 71 | 72 | 73 | class VariousWidgets(Playground): 74 | """A playground made of some widgets.""" 75 | 76 | DEFAULT_CSS = """ 77 | VariousWidgets Label { 78 | width: 1fr; 79 | } 80 | """ 81 | 82 | def compose(self) -> ComposeResult: 83 | """Compose the playground.""" 84 | with title(Horizontal()): 85 | classes = cycle(("foo", "bar")) 86 | with title(Vertical(id="input-widgets")): 87 | for n in range(5): 88 | yield title( 89 | Input( 90 | placeholder=f"Example input {n}", 91 | id=f"input-{n}", 92 | classes=next(classes), 93 | ) 94 | ) 95 | with title(Vertical(id="static-and-labels")): 96 | for n in range(3): 97 | yield title( 98 | Static( 99 | "Can you find me?", id=f"static-{n}", classes=next(classes) 100 | ) 101 | ) 102 | yield title( 103 | Label( 104 | "Can you find me?", id=f"label-{n}", classes=next(classes) 105 | ) 106 | ) 107 | 108 | 109 | class IDAndClassGrid(Playground): 110 | """A playground of ID and class combinations.""" 111 | 112 | DEFAULT_CSS = """ 113 | IDAndClassGrid Grid { 114 | grid-size: 3 3; 115 | } 116 | 117 | IDAndClassGrid Static { 118 | height: 100%; 119 | content-align: center middle; 120 | } 121 | """ 122 | 123 | def compose(self) -> ComposeResult: 124 | """Compose the child widgets.""" 125 | two_cycle = cycle(("even", "odd")) 126 | three_cycle = cycle(("yes", "no", "maybe")) 127 | six_cycle = cycle(("up", "down", "strange", "charm", "bottom", "top")) 128 | with title(Grid()): 129 | for n in range(9): 130 | yield title( 131 | Static( 132 | str(n), 133 | id=f"cell-{n}", 134 | classes=f"{next(two_cycle)} {next(three_cycle)} {next(six_cycle)}", 135 | ) 136 | ) 137 | 138 | 139 | class QuerySandboxApp(App[None]): 140 | """A Textual CSS query sandbox application.""" 141 | 142 | CSS = """ 143 | Static { 144 | color: $text-muted; 145 | } 146 | 147 | Input { 148 | width: 1fr; 149 | } 150 | 151 | #input { 152 | height: 4; 153 | } 154 | 155 | TabbedContent { 156 | height: 2fr; 157 | } 158 | 159 | Playground * { 160 | margin: 1; 161 | border: panel red 40%; 162 | border-title-color: $text 50%; 163 | } 164 | 165 | Playground .hit { 166 | border: panel green; 167 | background: green 10%; 168 | border-title-color: $boost; 169 | } 170 | 171 | VerticalScroll { 172 | margin-top: 1; 173 | height: 1fr; 174 | border: panel cornflowerblue 60%; 175 | padding: 1; 176 | } 177 | 178 | VerticalScroll:focus { 179 | border: panel cornflowerblue; 180 | } 181 | 182 | #output { 183 | height: 1fr; 184 | } 185 | 186 | #results { 187 | width: 3fr; 188 | } 189 | 190 | #tree { 191 | width: 2fr; 192 | } 193 | """ 194 | 195 | BINDINGS = [ 196 | Binding("f1", "playground('tab-1')"), 197 | Binding("f2", "playground('tab-2')"), 198 | Binding("f3", "playground('tab-3')"), 199 | ] 200 | 201 | def compose(self) -> ComposeResult: 202 | """Compose the DOM for the application.""" 203 | with Horizontal(id="input"): 204 | yield Input() 205 | yield Button("Query") 206 | with TabbedContent(): 207 | with TabPane("Nested Containers (F1)"): 208 | yield NestedContainers() 209 | with TabPane("Various Widgets (F2)"): 210 | yield VariousWidgets() 211 | with TabPane("IDs and Classes (F3)"): 212 | yield IDAndClassGrid() 213 | with Horizontal(id="output"): 214 | with title(VerticalScroll(id="results"), "Query Results"): 215 | yield Pretty([]) 216 | with title(VerticalScroll(id="tree"), "Playground DOM Tree"): 217 | yield Static("") 218 | 219 | @property 220 | def input(self) -> Input: 221 | """The main input widget.""" 222 | return self.query_one("#input Input", Input) 223 | 224 | @property 225 | def playground(self) -> Playground: 226 | """The current playground widget.""" 227 | return self.query_one( 228 | f"TabPane#{self.query_one(TabbedContent).active} Playground", Playground 229 | ) 230 | 231 | @on(Input.Submitted) 232 | @on(Button.Pressed) 233 | @on(TabbedContent.TabActivated) 234 | def do_query(self, event: Message | None = None) -> None: 235 | """Perform the query and show the result.""" 236 | self.query("Playground *").remove_class("hit") 237 | result: list[Widget] | Exception 238 | try: 239 | result = list( 240 | self.playground.query(f"Playground {self.input.value}").add_class("hit") 241 | ) 242 | except Exception as error: # pylint:disable=broad-exception-caught 243 | result = error 244 | self.query_one("#results > Pretty", Pretty).update(result) 245 | self.query_one("#tree > Static", Static).update( 246 | self.playground.children[0].tree 247 | ) 248 | if not isinstance(event, TabbedContent.TabActivated): 249 | self.input.focus() 250 | 251 | def action_playground(self, playground: str) -> None: 252 | """Switch between different playgrounds. 253 | 254 | Args: 255 | playground: The playground to switch to. 256 | """ 257 | self.query_one(TabbedContent).active = playground 258 | self.do_query() 259 | 260 | 261 | ### sandbox.py ends here 262 | -------------------------------------------------------------------------------- /tqs.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/davep/textual-query-sandbox/9457f2530007874fa6015c85fd83b8ca96659f5f/tqs.png --------------------------------------------------------------------------------