{ "info": { "author": "Mikolaj Pawlikowski", "author_email": "mikolaj@pawlikowski.pl", "bugtrack_url": null, "classifiers": [ "Development Status :: 4 - Beta", "Intended Audience :: Developers", "Programming Language :: Python :: 3", "Topic :: Software Development :: Quality Assurance" ], "description": "# PowerfulSeal [![Travis](https://img.shields.io/travis/bloomberg/powerfulseal.svg)](https://travis-ci.com/bloomberg/powerfulseal) [![PyPI](https://img.shields.io/pypi/v/powerfulseal.svg)](https://pypi.python.org/pypi/powerfulseal)\n\n__PowerfulSeal__ adds chaos to your Kubernetes clusters, so that you can detect problems in your systems as early as possible. It kills targeted pods and takes VMs up and down.\n\n![Powerful Seal Logo](media/powerful-seal.png)\n\nIt follows the [Principles of Chaos Engineering](http://principlesofchaos.org/), and is inspired by [Chaos Monkey](https://github.com/Netflix/chaosmonkey). [Watch the Seal at KubeCon 2017 Austin](https://youtu.be/00BMn0UjsG4).\n\nEmbrace the inevitable failure. __Embrace The Seal__.\n\n\n## On the menu\n\n- [PowerfulSeal ![Travis](https://travis-ci.com/bloomberg/powerfulseal) ![PyPI](https://pypi.python.org/pypi/powerfulseal)](#powerfulseal-travishttpstravis-cicombloombergpowerfulseal-pypihttpspypipythonorgpypipowerfulseal)\n - [On the menu](#on-the-menu)\n - [Highlights](#highlights)\n - [Introduction](#introduction)\n - [Setup](#setup)\n - [Running inside of the cluster](#running-inside-of-the-cluster)\n - [Running outside of the cluster](#running-outside-of-the-cluster)\n - [Minikube setup](#minikube-setup)\n - [Getting started](#getting-started)\n - [Docker](#docker)\n - [Modes of operation](#modes-of-operation)\n - [Interactive mode](#interactive-mode)\n - [Autonomous mode](#autonomous-mode)\n - [Writing policies](#writing-policies)\n - [Metrics collection](#metrics-collection)\n - [Web User Interface](#web-user-interface)\n - [Label mode](#label-mode)\n - [Demo mode](#demo-mode)\n - [Inventory File](#inventory-file)\n - [Cloud Provider Requirements](#cloud-provider-requirements)\n - [SSH](#ssh)\n - [Azure](#azure)\n - [AWS](#aws)\n - [OpenStack](#openstack)\n - [GCP](#gcp)\n - [Testing](#testing)\n - [Read about the PowerfulSeal](#read-about-the-powerfulseal)\n - [FAQ](#faq)\n - [Where can I learn more about Chaos Engineering ?](#where-can-i-learn-more-about-chaos-engineering)\n - [How is it different from Chaos Monkey ?](#how-is-it-different-from-chaos-monkey)\n - [Can I contribute to The Seal ?](#can-i-contribute-to-the-seal)\n - [Why a Seal ?](#why-a-seal)\n - [Footnotes](#footnotes)\n\n## Highlights\n\n- works with `OpenStack`, `AWS`, `Azure`, `GCP` and local machines\n- speaks `Kubernetes` natively\n- interactive and autonomous, policy-driven mode\n- web interface to interact with PowerfulSeal\n- metric collection and exposition to `Prometheus`\n- minimal setup, easy yaml-based policies\n- easy to extend\n\n\n## Introduction\n\n__PowerfulSeal__ works in several modes:\n\n- __Interactive__ mode is designed to allow you to discover your cluster's components and manually break things to see what happens. It operates on nodes, pods, deployments and namespaces.\n\n- __Autonomous__ mode reads a policy file, which can contain any number of pod and node scenarios. Each scenario describes a list of matches, filters and actions to execute on your cluster, and will be executed in a loop.\n\n- __Label__ mode allows you to specify which pods to kill with a small number of options by adding `seal/` labels to pods. This is a more imperative alternative to autonomous mode. \n\n- __Demo__ mode allows you to point the Seal at a cluster and a `metrics-server` server and let it try to figure out what to kill, based on the resource utilization.\n\n\n\n\n## Setup\n\nThe setup depends on whether you run `PowerfulSeal` inside or outside of your cluster.\n\n\n### Running inside of the cluster\n\nIf you're running inside of the cluster (for example from [the docker image](./build)), the setup is pretty easy.\n\nYou can see an example of how to do it [in ./kubernetes](./kubernetes). The setup involves:\n\n- creating [RBAC rules](./kubernetes/rbac.yml) to allow the seal to list, get and delete pods,\n- creating a [powerfulseal configmap and deployment](./kubernetes/powerfulseal.yml)\n - your scenarios will live in the configmap\n - if you'd like to use the UI, you'll probably also need a service and ingress\n - make sure to use `--use-pod-delete-instead-of-ssh-kill` flag to not need to configure SSH access for killing pods\n- profit!\n - the Seal will self-discover the way to connect to `kubernetes` and start executing your policy\n\n\n### Running outside of the cluster\n\nIf you're running outside of your cluster, the setup will involve:\n\n- pointing PowerfulSeal at your Kubernetes cluster by giving it a Kubernetes config file\n- pointing PowerfulSeal at your cloud by specifying the cloud driver to use and providing credentials\n- making sure the seal can SSH into the nodes in order to execute `docker kill` command\n- writing a set of policies\n\nIt should look something like [this](./media/setup.png).\n\n\n### Minikube setup\n\nIt is possible to test a subset of Seal's functionality using a [`minikube`](https://kubernetes.io/docs/setup/minikube/) setup.\n\nTo achieve that, please inspect the [Makefile](./Makefile). You will need to override the ssh host, specify the correct username and use minikube's ssh keys.\n\n\nIf you'd like to test out the interactive mode, start with this:\n\n```sh\nseal \\\n -vv \\\n interactive \\\n --no-cloud \\\n --inventory-kubernetes \\\n --ssh-allow-missing-host-keys \\\n --remote-user docker \\\n --ssh-path-to-private-key `minikube ssh-key` \\\n --ssh-password `minikube ssh-password` \\\n --override-ssh-host `minikube ip`\n```\n\nFor label mode, try something like this:\n\n```sh\nseal \\\n -vv \\\n label \\\n --no-cloud \\\n --min-seconds-between-runs 3 \\\n --max-seconds-between-runs 10 \\\n --inventory-kubernetes \\\n --ssh-allow-missing-host-keys \\\n --remote-user docker \\\n --ssh-path-to-private-key `minikube ssh-key` \\\n --ssh-password `minikube ssh-password` \\\n --override-ssh-host `minikube ip`\n```\n\nFor autonomous mode, this should get you started:\n\n```sh\nseal \\\n -vv \\\n autonomous \\\n --no-cloud \\\n --policy-file ./examples/policy_kill_random_default.yml \\\n --inventory-kubernetes \\\n --prometheus-collector \\\n --prometheus-host 0.0.0.0 \\\n --prometheus-port 9999 \\\n --ssh-allow-missing-host-keys \\\n --remote-user docker \\\n --ssh-path-to-private-key `minikube ssh-key` \\\n --ssh-password `minikube ssh-password` \\\n --override-ssh-host `minikube ip` \\\n --host 0.0.0.0 \\\n --port 30100\n```\n\n\n\n## Getting started\n\n`PowerfulSeal` is available to install through pip:\n\n```sh\npip install powerfulseal\npowerfulseal --help # or seal --help\n```\n\nTo start the web interface, use flags `--server --server-host [HOST] --server-port [PORT]` when starting PowerfulSeal in autonomous mode and visit the web server at `http://HOST:PORT/`.\n\nBoth Python 3.6 and Python 3.7 are supported.\n\n\n### Docker\n\nThe automatically built docker images are now available on [docker hub](https://hub.docker.com/_/powerfulseal)\n\n```sh\ndocker pull bloomberg/powerfulseal:2.7.0\n```\n\n\n\n## Modes of operation\n\n## Interactive mode\n\n```sh\n$ seal interactive --help\n```\n\nMake sure you hit __tab__ for autocompletion - that's what really makes the seal easy to use.\n\nHere's a sneak peek of what you can do in the interactive mode:\n\n![demo nodes](./media/video-nodes.gif)\n\n![demo pods](./media/video-pods.gif)\n\n\n## Autonomous mode\n\nAutonomous reads the scenarios to execute from the policy file, and runs them:\n\n1. The matches are combined together and deduplicated to produce an initial working set\n2. They are run through a series of filters\n3. For all the items remaining after the filters, all actions are executed\n\n```sh\n$ seal autonomous --help\n```\n\n### Writing policies\n\nA minimal policy file, doing nothing, looks like this:\n\n```yaml\nconfig:\n loopsNumber: 1 # will execute the provided scenarios once and then exit\n\nnodeScenarios: []\n\npodScenarios: [] \n```\n\nA more interesting schema, that kills a random pod in `default` namespace every 1-30 seconds:\n\n```yaml\nconfig:\n # we don't set loopsNumber, so it will loop indefinitely\n minSecondsBetweenRuns: 1\n maxSecondsBetweenRuns: 30\n\nnodeScenarios: []\npodScenarios:\n - name: \"delete random pods in default namespace\"\n\n match:\n - namespace:\n name: \"default\"\n\n filters:\n - randomSample:\n size: 1\n\n actions:\n - kill:\n probability: 0.77\n force: true\n```\n\nA [full featured example](./tests/policy/example_config.yml) listing most of the available options can be found in the [tests](./tests/policy).\n\nThe schemas are validated against the [powerful JSON schema](./powerfulseal/policy/ps-schema.json).\n\n\n### Metrics collection\n\nAutonomous mode also comes with the ability for metrics useful for monitoring to be collected. PowerfulSeal currently has a `stdout`, Prometheus and Datadog collector. However, metric collectors are easily extensible so it is easy to add your own. More details can be found [here](METRICS.md).\n\n\n### Web User Interface\n\n:warning: If you're not going to use the UI, use the flag `--headless` to disable it\n\nPowerfulSeal comes with a web interface to help you navigate Autonomous Mode. Features include:\n\n- starting/stopping autonomous mode\n- viewing and filtering logs\n- changing the configuration (either overwriting the remote policy file or copying the changes to clipboard)\n- stopping/killing individual nodes and pods\n\n\n![web interface](./media/web.png)\n\n\n## Label mode\n\nLabel mode is a more imperative alternative to autonomous mode, allowing you to specify which specific _per-pod_ whether a pod should be killed, the days/times it can be killed and the probability of it being killed.\n\nTo mark a pod for attack, do `kubectl label pods my-app-1 seal/enabled=true`, and the `Seal` will start attacking it, but only during working hours (defaults).\n\nDetailed instructions on how to use label mode can be found in [LABELS.md](LABELS.md).\n\n```sh\n$ seal label --help\n```\n\n\n## Demo mode\n\nThe main way to use PowerfulSeal is to write a policy file for Autonomous mode which reflects realistic failures in your system. However, PowerfulSeal comes with a demo mode to demonstrate how it can cause chaos on your Kubernetes cluster. Demo mode gets all the pods in the cluster, selects those which are using the most resources, then kills them based on a probability.\n\nDemo mode requires [metrics-server](https://github.com/kubernetes-incubator/metrics-server). To run demo mode, use the `demo` subcommand along with `--metrics-server-path` (path to metrics-server without a trailing slash, e.g., `http://localhost:8080/api/v1/namespaces/kube-system/services/https:metrics-server:/proxy`). You can also optionally specify `--aggressiveness` (from `1` (weakest) to `5` (strongest)) inclusive, as well as `--[min/max]-seconds-between-runs`.\n\n```sh\n$ seal demo --help\n```\n\n## Inventory File\n\n`PowerfulSeal` can use an ansible-style inventory file (in ini format)\n```ini\n[mygroup]\nmyhost01\n\n[mygroup2]\nmyhost02\n\n[some_hosts]\nmyhost01\nmyhost02\n```\n\n## Cloud Provider Requirements\n\n### SSH\n\nIn all cases, the SSH Keys must be set up for SSH Client access of the nodes. \n\n> Note: With GCP, running ```gcloud compute config-ssh``` makes SSHing to node instances easier by adding an alias for each instance to the user SSH configuration (~/.ssh/config) file and then being able to use the generated file with ```--ssh-path-to-private-key``` argument.\n\n\n### Azure\n\nThe credentials to connect to Azure may be specified in one of two ways:\n\n1. Supply the full path to an Azure credentials file in the environment variable `AZURE_AUTH_LOCATION`. \nThis is the easiest method. The credentials file can be generated via `az aks get-credentials -n -g -a -f `\n2. Supply the individual credentials in the environment variables: `AZURE_SUBSCRIPTION_ID`, `AZURE_CLIENT_ID`, `AZURE_CLIENT_SECRET`, `AZURE_TENANT_ID`\n\n### AWS\n\nThe credentials to connect to AWS are specified the same as for the [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html)\n\n### OpenStack\n\nThe easiest way to use PowerfulSeal, is to download and source the OpenRC file you can get from Horizon. It should ask you for your password, and it should set all the `OS_*` variables for you. Alternatively, you can set them yourself.\n\nBoth approaches are detailed in [the official documentation](https://docs.openstack.org/mitaka/user-guide/common/cli_set_environment_variables_using_openstack_rc.html).\n\n\n### GCP\n\n>Google Cloud SDK and kubectl are required\n\nThe GCP cloud driver supports managed (GKE) and custom Kubernetes clusters running on top of Google Cloud Compute.\n\nFor setting up ```PowerfulSeal```, the first step is configuring gcloud SDK (as ```PowerfulSeal``` will work with your configured [project](https://cloud.google.com/resource-manager/docs/creating-managing-projects) and [region](https://cloud.google.com/compute/docs/regions-zones/changing-default-zone-region)) and pointing kubectl to your cluster. Both can be configured easily following [this](https://cloud.google.com/kubernetes-engine/docs/how-to/cluster-access-for-kubectl) tutorial (For GKE!). In case you don't want to use the default project/region of gcloud SDK, you can point ```PowerfulSeal``` to the correct one (in json) with ```--gcp-config-file``` argument.\n\nFor being able to run node related commands, credentials have to be specified in one of these [ways](https://cloud.google.com/docs/authentication/):\n\n1. Service account (Recommended): a Google account that is associated with your GCP project, as opposed to a specific user. ```PowerfulSeal``` uses the environment variable and is pretty straightforward to set up using [this](https://cloud.google.com/docs/authentication/getting-started) tutorial.\n2. User account: Not recommended as you can reach easily reach a \"quota exceeded\" or \"API not enabled\" error. ```PowerfulSeal``` uses auto-discovery and to get it working just follow [this](https://cloud.google.com/docs/authentication/end-user).\n\nHaving configuration ready and ssh connection to the node instances working, you can start playing with ```PowerfulSeal``` with this example:\n```powerfulseal interactive --kubeconfig ~/.kube/config --gcp --inventory-kubernetes --ssh-allow-missing-host-keys --ssh-path-to-private-key ~/.ssh/google_compute_engine --remote-user myuser```\n\n> Note: In case of running inside Pyenv and getting ```python2 command not found``` error when running gcloud (and you want to run ```PowerfulSeal``` with Python 3+), [this](https://github.com/pyenv/pyenv/issues/1159#issuecomment-453906182) might be useful, as gcloud requires Python2.\n\n\n## Testing\n\nPowerfulSeal uses [tox](https://github.com/tox-dev/tox) to test with multiple versions on Python. The recommended setup is to install and locally activate the Python versions under `tox.ini` with [pyenv](https://github.com/pyenv/pyenv). \n\nOnce the required Python versions are set up and can be discovered by tox (e.g., by having them discoverable in your PATH), you can run the tests by running `tox`.\n\nFor testing the web server and more details on testing, see [TESTING.md](TESTING.md). \n\n## Read about the PowerfulSeal\n\n- https://www.techatbloomberg.com/blog/powerfulseal-testing-tool-kubernetes-clusters/\n- https://siliconangle.com/blog/2017/12/17/bloomberg-open-sources-powerfulseal-new-tool-testing-kubernetes-clusters/\n- https://github.com/ramitsurana/awesome-kubernetes#testing\n- https://github.com/ramitsurana/awesome-kubernetes#other-useful-videos\n- https://github.com/dastergon/awesome-chaos-engineering#notable-tools\n- https://www.linux.com/news/powerfulseal-testing-tool-kubernetes-clusters-0\n- https://www.infoq.com/news/2018/01/powerfulseal-chaos-kubernetes\n\n## FAQ\n\n### Where can I learn more about Chaos Engineering ?\n\nWe found these two links to be a good start:\n\n- http://principlesofchaos.org/\n- https://github.com/dastergon/awesome-chaos-engineering\n\n### How is it different from Chaos Monkey ?\n\nPowerfulSeal was inspired by Chaos Monkey, but it differs in a couple of important ways.\n\nThe Seal does:\n - speak Kubernetes\n - offer flexible, easy to write YAML scenarios\n - provide interactive mode with awesome tab-completion\n\nThe Seal doesn't:\n - need external dependencies (db, Spinnaker), apart from SSH, cloud and Kubernetes API access\n - need you to setup ```cron```\n\n### Can I contribute to The Seal ?\n\nWe would love you to. In particular, it would be great to get help with:\n\n- get more [cloud drivers](./powerfulseal/clouddrivers/driver.py)\n- get more [awesome filters](./powerfulseal/policy/scenario.py)\n- __get an amazing logo__\n- make the PowerfulSeal more powerful\n\nCheck out our [CONTRIBUTING.md](CONTRIBUTING.md) file for more information about how to contribute.\n\n### Why a Seal ?\n\nIt might have been inspired by [this comic](https://randowis.com/2015/01/07/the-tower/).\n\n\n\n## Footnotes\n\nPowerfulSeal logo Copyright 2018 The Linux Foundation, and distributed under the Creative Commons Attribution (CC-BY-4.0) [license](https://creativecommons.org/licenses/by/4.0/legalcode).\n\n\n", "description_content_type": "text/markdown", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/bloomberg/powerfulseal", "keywords": "", "license": "Apache 2.0", "maintainer": "", "maintainer_email": "", "name": "powerfulseal", "package_url": "https://pypi.org/project/powerfulseal/", "platform": "", "project_url": "https://pypi.org/project/powerfulseal/", "project_urls": { "Homepage": "https://github.com/bloomberg/powerfulseal", "Source": "https://github.com/bloomberg/powerfulseal", "Tracker": "https://github.com/bloomberg/powerfulseal/issues" }, "release_url": "https://pypi.org/project/powerfulseal/2.7.0/", "requires_dist": [ "ConfigArgParse (<1,>=0.11.0)", "Flask (<2,>=1.0.0)", "termcolor (<2,>=1.1.0)", "openstacksdk (<1,>=0.10.0)", "spur (<1,>=0.3.20)", "kubernetes (>=8.0.1<9)", "PyYAML (<6,>=5.1.2)", "jsonschema (<4,>=3.0.2)", "boto3 (<2.0.0,>=1.5.15)", "azure-common (<2.0.0,>=1.1.23)", "azure-mgmt-resource (<3.0.0,>=2.2.0)", "azure-mgmt-network (<3.0.0,>=2.7.0)", "azure-mgmt-compute (<5.0.0,>=4.6.2)", "future (<1,>=0.16.0)", "requests (<3,>=2.21.0)", "prometheus-client (<0.4.0,>=0.3.0)", "flask-cors (<4,>=3.0.6)", "flask-swagger-ui (>=3.18.0<4)", "coloredlogs (<11.0.0,>=10.0.0)", "six (<2,>=1.12.0)", "paramiko (<3,>=2.5.0)", "google-api-python-client (>=1.7.8)", "google-auth (>=1.6.2)", "google-auth-httplib2 (>=0.0.3)", "oauth2client (>=4.1.3)", "datadog (<1.0.0,>=0.29.0)", "pytest (<4,>=3.0) ; extra == 'testing'", "pytest-cov (<3,>=2.5) ; extra == 'testing'", "mock (<3,>=2) ; extra == 'testing'" ], "requires_python": ">=3", "summary": "PowerfulSeal - a powerful testing tool for Kubernetes clusters", "version": "2.7.0" }, "last_serial": 5955142, "releases": { "1.0.1": [ { "comment_text": "", "digests": { "md5": "0328d382168e34281738480433d07e41", "sha256": "f3fc28233bf5b7da00419895f0103f86a5406ffc4a7d6c5488a4b242517127cc" }, "downloads": -1, "filename": "powerfulseal-1.0.1.tar.gz", "has_sig": false, "md5_digest": "0328d382168e34281738480433d07e41", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 28669, "upload_time": "2017-12-07T03:07:40", "url": "https://files.pythonhosted.org/packages/2f/94/7b92a9a7fb12b52ee7a3b408a213db06e494ecc84bd77999c47e332a3dd3/powerfulseal-1.0.1.tar.gz" } ], "1.1.0": [ { "comment_text": "", "digests": { "md5": "241d8d5385905b19057dfb6fde31a65a", "sha256": "9cce2d7f0a503660b100ca435460cb70242fd57a85f0572d86d04b4ae8ab9268" }, "downloads": -1, "filename": "powerfulseal-1.1.0.tar.gz", "has_sig": false, "md5_digest": "241d8d5385905b19057dfb6fde31a65a", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 29167, "upload_time": "2017-12-20T10:51:43", "url": "https://files.pythonhosted.org/packages/44/d9/617186f2f9b07cb8a0342226e21ce20efbf2b48ffe344878e7abdac33d3a/powerfulseal-1.1.0.tar.gz" } ], "1.1.1": [ { "comment_text": "", "digests": { "md5": "40c93b3c84dc23019f7f1d0b34015b06", "sha256": "0e61173e2ea81ab62a76b6caf0ef072c0b31f5a7e4f659393803fe39f191c5c8" }, "downloads": -1, "filename": "powerfulseal-1.1.1.tar.gz", "has_sig": false, "md5_digest": "40c93b3c84dc23019f7f1d0b34015b06", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 28838, "upload_time": "2018-02-07T14:46:49", "url": "https://files.pythonhosted.org/packages/6d/c6/7b2a95ad1f351dc0182b1ac7d937a5dcb2a2cfea5fb9fc7ce1046569fe37/powerfulseal-1.1.1.tar.gz" } ], "1.3.0": [ { "comment_text": "", "digests": { "md5": "7e94141130fddd509462842bbb1bfe51", "sha256": "5ba924fdefdfbe758bb028c8cea3addde8a02a20c1fd7242e12f06d5c9bf3e55" }, "downloads": -1, "filename": "powerfulseal-1.3.0.tar.gz", "has_sig": false, "md5_digest": "7e94141130fddd509462842bbb1bfe51", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 31374, "upload_time": "2018-08-06T10:10:32", "url": "https://files.pythonhosted.org/packages/24/2d/899fd1d6e64c99245537a58b34e5af475b1fd0f29873fbe382b349129d24/powerfulseal-1.3.0.tar.gz" } ], "1.4.0": [ { "comment_text": "", "digests": { "md5": "8aeb0ab926e04f9727a78568cda5cdfb", "sha256": "60c58fc808083adf2384dc11d1b5907a0e7c5bcb0ce3435714e345d7f8b5a9ee" }, "downloads": -1, "filename": "powerfulseal-1.4.0.tar.gz", "has_sig": false, "md5_digest": "8aeb0ab926e04f9727a78568cda5cdfb", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 45197, "upload_time": "2018-08-29T08:47:46", "url": "https://files.pythonhosted.org/packages/b4/9b/271364ddd7d9f87b87e2daed0cac5c6c42b2877b0470d3128a58d95a73dc/powerfulseal-1.4.0.tar.gz" } ], "1.4.1": [ { "comment_text": "", "digests": { "md5": "4554c15f22801cd9e8513aa39b1c495e", "sha256": "92b09b74a75b0b6a4fe402b4acc71464d3194818022042f5b7bb0c8a579855d2" }, "downloads": -1, "filename": "powerfulseal-1.4.1.tar.gz", "has_sig": false, "md5_digest": "4554c15f22801cd9e8513aa39b1c495e", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 45589, "upload_time": "2018-08-29T09:00:06", "url": "https://files.pythonhosted.org/packages/9a/86/6e87b22f8702031c28f21276188c9a2df8de0f904a0b11a09c1867bf57d7/powerfulseal-1.4.1.tar.gz" } ], "1.5.0": [ { "comment_text": "", "digests": { "md5": "c221d2be4c31208b7c4dc5c764ec140f", "sha256": "0f0f83abfd5d2a984648bd6901fa476dca439278d8ecff9cab8a9a966c03d961" }, "downloads": -1, "filename": "powerfulseal-1.5.0.tar.gz", "has_sig": false, "md5_digest": "c221d2be4c31208b7c4dc5c764ec140f", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 48871, "upload_time": "2018-08-31T08:22:32", "url": "https://files.pythonhosted.org/packages/41/97/aa9158113c1bd3ce2a1c987406e8809471a548f94ad759b62f8c54600dc8/powerfulseal-1.5.0.tar.gz" } ], "1.6.0": [ { "comment_text": "", "digests": { "md5": "34856a2547440e2aeed8d15821d00fba", "sha256": "2184d0f93dfb54df46c633a864ef214941ca38990977ee7ced898b2d862b98b3" }, "downloads": -1, "filename": "powerfulseal-1.6.0.tar.gz", "has_sig": false, "md5_digest": "34856a2547440e2aeed8d15821d00fba", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 52168, "upload_time": "2018-08-31T08:27:42", "url": "https://files.pythonhosted.org/packages/a9/5d/f83a76ae8cd5b22ac92ced42e61e75cf3b72842b981f1737e08b98572fa4/powerfulseal-1.6.0.tar.gz" } ], "2.0.1": [ { "comment_text": "", "digests": { "md5": "371de70a40eceabf8ee358d320c1d2e8", "sha256": "d0df5736dcff3ffd775085f3196c989ac56115ea69e3fe60edd998211fa4bcc2" }, "downloads": -1, "filename": "powerfulseal-2.0.1.tar.gz", "has_sig": false, "md5_digest": "371de70a40eceabf8ee358d320c1d2e8", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 1746055, "upload_time": "2018-12-13T17:54:16", "url": "https://files.pythonhosted.org/packages/78/b1/7ff3556f49541e7eac6e8f800434aeafbd80a220e714ecbea4b4fc8a358a/powerfulseal-2.0.1.tar.gz" } ], "2.1.0": [ { "comment_text": "", "digests": { "md5": "92e4a9be7d2b8b2e599f3be1ed8f15fe", "sha256": "f7d79782ea17992bebdd20f6cf86d971021b3e1098121432f3231d4c60e5b253" }, "downloads": -1, "filename": "powerfulseal-2.1.0.tar.gz", "has_sig": false, "md5_digest": "92e4a9be7d2b8b2e599f3be1ed8f15fe", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 1735557, "upload_time": "2019-06-24T15:45:44", "url": "https://files.pythonhosted.org/packages/b0/f7/b86e1f1c9f8403ac1a53e3839b2e9957edbb208c2220dadfd07d9e14539d/powerfulseal-2.1.0.tar.gz" } ], "2.6.0": [ { "comment_text": "", "digests": { "md5": "08e42d5ae3ba171b0f640514deae970d", "sha256": "903f621cf94e02921888f5fda399df73aecbb53d659ccf18d684ab9246a3714b" }, "downloads": -1, "filename": "powerfulseal-2.6.0.tar.gz", "has_sig": false, "md5_digest": "08e42d5ae3ba171b0f640514deae970d", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 1747696, "upload_time": "2019-10-07T09:06:15", "url": "https://files.pythonhosted.org/packages/d7/ee/34452c54774ca317a8f8f93e822936f7a9605acd05bb211082343987e799/powerfulseal-2.6.0.tar.gz" } ], "2.7.0": [ { "comment_text": "", "digests": { "md5": "cb89058414fd16c56f543efe41e34e9d", "sha256": "d7e77729d061775e22621bfdd6d7e4cea90918e9e5cf12b5e09cb57e8d2c1764" }, "downloads": -1, "filename": "powerfulseal-2.7.0-py3-none-any.whl", "has_sig": false, "md5_digest": "cb89058414fd16c56f543efe41e34e9d", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": ">=3", "size": 1804363, "upload_time": "2019-10-10T14:30:34", "url": "https://files.pythonhosted.org/packages/6b/3f/e273d97fdf45c8ff6046b671808fea7d0829823f0c14be861affad55751d/powerfulseal-2.7.0-py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "a19fc9f3cbe6a2bd42e88406c13058f8", "sha256": "9d9443e3554dd301a5823ea4e4afea3387b06eb0477dd5aa67963a395c654377" }, "downloads": -1, "filename": "powerfulseal-2.7.0.tar.gz", "has_sig": false, "md5_digest": "a19fc9f3cbe6a2bd42e88406c13058f8", "packagetype": "sdist", "python_version": "source", "requires_python": ">=3", "size": 1752296, "upload_time": "2019-10-10T14:30:37", "url": "https://files.pythonhosted.org/packages/01/f8/16387a9bdc88629844d1f6ccfca4e5a187f3f29b969021840826e73cb151/powerfulseal-2.7.0.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "cb89058414fd16c56f543efe41e34e9d", "sha256": "d7e77729d061775e22621bfdd6d7e4cea90918e9e5cf12b5e09cb57e8d2c1764" }, "downloads": -1, "filename": "powerfulseal-2.7.0-py3-none-any.whl", "has_sig": false, "md5_digest": "cb89058414fd16c56f543efe41e34e9d", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": ">=3", "size": 1804363, "upload_time": "2019-10-10T14:30:34", "url": "https://files.pythonhosted.org/packages/6b/3f/e273d97fdf45c8ff6046b671808fea7d0829823f0c14be861affad55751d/powerfulseal-2.7.0-py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "a19fc9f3cbe6a2bd42e88406c13058f8", "sha256": "9d9443e3554dd301a5823ea4e4afea3387b06eb0477dd5aa67963a395c654377" }, "downloads": -1, "filename": "powerfulseal-2.7.0.tar.gz", "has_sig": false, "md5_digest": "a19fc9f3cbe6a2bd42e88406c13058f8", "packagetype": "sdist", "python_version": "source", "requires_python": ">=3", "size": 1752296, "upload_time": "2019-10-10T14:30:37", "url": "https://files.pythonhosted.org/packages/01/f8/16387a9bdc88629844d1f6ccfca4e5a187f3f29b969021840826e73cb151/powerfulseal-2.7.0.tar.gz" } ] }