-
Notifications
You must be signed in to change notification settings - Fork 97
Uncertain ranges #699
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Uncertain ranges #699
Conversation
…rtain ranges, for g. expressions
b67d9c7
to
5054739
Compare
Haven't added for Can use the expressions from here: #225 |
@biocommons/hgvs-maintainers Would we be able to get feedback on this PR? |
This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 7 days. |
It would be great to get this PR in. Can we just make sure the "uncertain" field on BaseOffsetPosition or SimplePosition gets set correctly (and tested in the unit test)? If we express a range in parenthesis, I'd assume we want to express that the whole range is uncertain. At least that's how I'd read the hgvs spec. Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
…Since the behavior is a bit unspecified, we fall back to the inner (confident) interval of the uncertain range for this projection.
Playing around with this branch some more I realized that g_to_c projection was not yet working. As such I had a go at enabling this. Since the behavior of this projection is somewhat undefined, the current approach picks the inner (=confident) interval of the uncertain range and uses that for the .c projection. The resulting hgvs_c string is then "confident" and not "uncertain" any longer. |
This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 7 days. |
This PR was closed because it has been stalled for 7 days with no activity. |
Can we work on this one on Monday during our dev session? |
): | ||
"""This is a unit test for the clinvar uncertain ranges described in | ||
issue #225: https://github.com/biocommons/hgvs/issues/225. | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discussion re: representation and maintenance of precision during projection
On current #699 branch:
Taking var_c1 above, new additional tests in tests/test_hgvs_sequencevariant.py (#699):
While these are good tests, they are not testing the same thing as the clinvar variants. We should generally try for round-trip variant projection and expect to explain cases where this isn't true. Grammar changes
Kinds of locations
-34-? is not be parsed by hgvs currently because Other Action Items:
|
@andreasprlic @theferrit32 I did a bunch of surgery on project config diffs between main and this branch. They're now in sync. Tests pass, including on github (i.e., the cache is intact) Please destroy your venv and rebuild with |
…ithub.com:biocommons/hgvs into 225-uncertain-ranges # Conflicts: # misc/docker-compose.yml
It would be good if you could summarise the current state of things and what needs to be done. From my quick skim - I'm worried about the silent conversion between types eg g_to_n. The HGVS spec doesn't list how conversions should be done, so we are on our own. In This is a valid choice, but I argue it's not the only one. I would argue:
|
…ed to make test-learn for now)
Adding support for going full circle: g.->c.->g. for uncertain ranges.
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
15770347 | Triggered | PostgreSQL Credentials | a1a7ece | misc/docker-compose.yml | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
No description provided.