Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SMILES Canonicalization With Very Long SMILES Values Crashed KNIME #50

Open
manuelschwarze opened this issue Jul 17, 2018 · 3 comments
Open
Assignees

Comments

@manuelschwarze
Copy link
Contributor

A colleague encountered that KNIME crashes based on an RDKit crash that is caused by very long SMILES values when passed into the RDKit Canonicalize SMILES node. The SMILES in which this occurred link together Cyclooctine. The correct behavior would be to generate an error for such a SMILES if atom count is too large, but it should of course not crash.

@greglandrum
Copy link
Member

Agreed. That is bad behavior.
Which version of the nodes are being used? Which version of KNIME and which OS?
Can you provide a SMILES that allows the problem to be reproduced?

@manuelschwarze
Copy link
Contributor Author

manuelschwarze commented Jul 19, 2018 via email

@greglandrum
Copy link
Member

Unfortunately that doesn't help. We do tests like that already as part of the normal RDKit testing suite and it's not a general problem.
Here's an example of generating canonical SMILES for 1600 atoms (it's "cyclooctene", which may be what you meant?).
Using the RDKit SMILES generator:

In [3]: rdBase.rdkitVersion
Out[3]: '2018.03.2'

In [8]: m = Chem.MolFromSmiles('C1CCCC=CCC1'*200)

In [9]: s = Chem.MolToSmiles(m)

In [10]: len(s)
Out[10]: 2202

and using the AvalonTools smiles generator:

In [11]: s2 = pyAvalonTools.GetCanonSmiles(m)
2: clearing ring closure buffers

In [12]: len(s2)
Out[12]: 2360

@manuelschwarze manuelschwarze self-assigned this May 20, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants