mirror of
https://github.com/f-droid/fdroidserver.git
synced 2025-11-04 14:30:30 +03:00
Merge branch 'fix_pylint' into 'master'
Fix pylint See merge request fdroid/fdroidserver!1179
This commit is contained in:
commit
6394ededa1
17 changed files with 43 additions and 33 deletions
|
|
@ -191,7 +191,7 @@ def check_tags(app, pattern):
|
||||||
root_dir = build_dir / subdir
|
root_dir = build_dir / subdir
|
||||||
paths = common.manifest_paths(root_dir, last_build.gradle)
|
paths = common.manifest_paths(root_dir, last_build.gradle)
|
||||||
version, vercode, _package = common.parse_androidmanifests(paths, app)
|
version, vercode, _package = common.parse_androidmanifests(paths, app)
|
||||||
if version == 'Unknown' or version == 'Ignore':
|
if version in ('Unknown', 'Ignore'):
|
||||||
version = tag
|
version = tag
|
||||||
if vercode:
|
if vercode:
|
||||||
logging.debug("Manifest exists in subdir '{0}'. Found version {1} ({2})"
|
logging.debug("Manifest exists in subdir '{0}'. Found version {1} ({2})"
|
||||||
|
|
|
||||||
|
|
@ -1331,7 +1331,7 @@ class vcs_gitsvn(vcs):
|
||||||
# git-svn sucks at certificate validation, this throws useful errors:
|
# git-svn sucks at certificate validation, this throws useful errors:
|
||||||
try:
|
try:
|
||||||
import requests
|
import requests
|
||||||
r = requests.head(remote)
|
r = requests.head(remote, timeout=300)
|
||||||
r.raise_for_status()
|
r.raise_for_status()
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
raise VCSException('SVN certificate pre-validation failed: ' + str(e)) from e
|
raise VCSException('SVN certificate pre-validation failed: ' + str(e)) from e
|
||||||
|
|
@ -2616,7 +2616,7 @@ def get_apk_id_androguard(apkfile):
|
||||||
|
|
||||||
if axml.getName() == 'manifest':
|
if axml.getName() == 'manifest':
|
||||||
break
|
break
|
||||||
elif _type == END_TAG or _type == TEXT or _type == END_DOCUMENT:
|
elif _type in (END_TAG, TEXT, END_DOCUMENT):
|
||||||
raise RuntimeError('{path}: <manifest> must be the first element in AndroidManifest.xml'
|
raise RuntimeError('{path}: <manifest> must be the first element in AndroidManifest.xml'
|
||||||
.format(path=apkfile))
|
.format(path=apkfile))
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -506,7 +506,7 @@ def upload_apk_to_android_observatory(path):
|
||||||
apkfilename = os.path.basename(path)
|
apkfilename = os.path.basename(path)
|
||||||
r = requests.post('https://androidobservatory.org/',
|
r = requests.post('https://androidobservatory.org/',
|
||||||
data={'q': update.sha256sum(path), 'searchby': 'hash'},
|
data={'q': update.sha256sum(path), 'searchby': 'hash'},
|
||||||
headers=net.HEADERS)
|
headers=net.HEADERS, timeout=300)
|
||||||
if r.status_code == 200:
|
if r.status_code == 200:
|
||||||
# from now on XPath will be used to retrieve the message in the HTML
|
# from now on XPath will be used to retrieve the message in the HTML
|
||||||
# androidobservatory doesn't have a nice API to talk with
|
# androidobservatory doesn't have a nice API to talk with
|
||||||
|
|
@ -534,7 +534,7 @@ def upload_apk_to_android_observatory(path):
|
||||||
r = requests.post('https://androidobservatory.org/upload',
|
r = requests.post('https://androidobservatory.org/upload',
|
||||||
files={'apk': (apkfilename, open(path, 'rb'))},
|
files={'apk': (apkfilename, open(path, 'rb'))},
|
||||||
headers=net.HEADERS,
|
headers=net.HEADERS,
|
||||||
allow_redirects=False)
|
allow_redirects=False, timeout=300)
|
||||||
|
|
||||||
|
|
||||||
def upload_to_virustotal(repo_section, virustotal_apikey):
|
def upload_to_virustotal(repo_section, virustotal_apikey):
|
||||||
|
|
@ -586,7 +586,7 @@ def upload_apk_to_virustotal(virustotal_apikey, packageName, apkName, hash,
|
||||||
needs_file_upload = False
|
needs_file_upload = False
|
||||||
while True:
|
while True:
|
||||||
r = requests.get('https://www.virustotal.com/vtapi/v2/file/report?'
|
r = requests.get('https://www.virustotal.com/vtapi/v2/file/report?'
|
||||||
+ urllib.parse.urlencode(data), headers=headers)
|
+ urllib.parse.urlencode(data), headers=headers, timeout=300)
|
||||||
if r.status_code == 200:
|
if r.status_code == 200:
|
||||||
response = r.json()
|
response = r.json()
|
||||||
if response['response_code'] == 0:
|
if response['response_code'] == 0:
|
||||||
|
|
@ -620,7 +620,7 @@ def upload_apk_to_virustotal(virustotal_apikey, packageName, apkName, hash,
|
||||||
elif size > 32000000:
|
elif size > 32000000:
|
||||||
# VirusTotal API requires fetching a URL to upload bigger files
|
# VirusTotal API requires fetching a URL to upload bigger files
|
||||||
r = requests.get('https://www.virustotal.com/vtapi/v2/file/scan/upload_url?'
|
r = requests.get('https://www.virustotal.com/vtapi/v2/file/scan/upload_url?'
|
||||||
+ urllib.parse.urlencode(data), headers=headers)
|
+ urllib.parse.urlencode(data), headers=headers, timeout=300)
|
||||||
if r.status_code == 200:
|
if r.status_code == 200:
|
||||||
upload_url = r.json().get('upload_url')
|
upload_url = r.json().get('upload_url')
|
||||||
elif r.status_code == 403:
|
elif r.status_code == 403:
|
||||||
|
|
@ -638,7 +638,7 @@ def upload_apk_to_virustotal(virustotal_apikey, packageName, apkName, hash,
|
||||||
files = {
|
files = {
|
||||||
'file': (apkName, open(repofilename, 'rb'))
|
'file': (apkName, open(repofilename, 'rb'))
|
||||||
}
|
}
|
||||||
r = requests.post(upload_url, data=data, headers=headers, files=files)
|
r = requests.post(upload_url, data=data, headers=headers, files=files, timeout=300)
|
||||||
logging.debug(_('If this upload fails, try manually uploading to {url}')
|
logging.debug(_('If this upload fails, try manually uploading to {url}')
|
||||||
.format(url=manual_url))
|
.format(url=manual_url))
|
||||||
r.raise_for_status()
|
r.raise_for_status()
|
||||||
|
|
|
||||||
|
|
@ -142,7 +142,7 @@ def get_app_from_url(url):
|
||||||
app.RepoType = 'git'
|
app.RepoType = 'git'
|
||||||
app.SourceCode = url
|
app.SourceCode = url
|
||||||
app.IssueTracker = url + '/issues'
|
app.IssueTracker = url + '/issues'
|
||||||
elif parsed.netloc == 'gitlab.com' or parsed.netloc == 'framagit.org':
|
elif parsed.netloc in ('gitlab.com', 'framagit.org'):
|
||||||
# git can be fussy with gitlab URLs unless they end in .git
|
# git can be fussy with gitlab URLs unless they end in .git
|
||||||
if url.endswith('.git'):
|
if url.endswith('.git'):
|
||||||
url = url[:-4]
|
url = url[:-4]
|
||||||
|
|
|
||||||
|
|
@ -98,7 +98,7 @@ def main():
|
||||||
# exist, prompt the user using platform-specific default
|
# exist, prompt the user using platform-specific default
|
||||||
# and if the user leaves it blank, ignore and move on.
|
# and if the user leaves it blank, ignore and move on.
|
||||||
default_sdk_path = ''
|
default_sdk_path = ''
|
||||||
if sys.platform == 'win32' or sys.platform == 'cygwin':
|
if sys.platform in ('win32', 'cygwin'):
|
||||||
p = os.path.join(
|
p = os.path.join(
|
||||||
os.getenv('USERPROFILE'), 'AppData', 'Local', 'Android', 'android-sdk'
|
os.getenv('USERPROFILE'), 'AppData', 'Local', 'Android', 'android-sdk'
|
||||||
)
|
)
|
||||||
|
|
|
||||||
|
|
@ -28,7 +28,9 @@ def download_file(url, local_filename=None, dldir='tmp'):
|
||||||
if local_filename is None:
|
if local_filename is None:
|
||||||
local_filename = os.path.join(dldir, filename)
|
local_filename = os.path.join(dldir, filename)
|
||||||
# the stream=True parameter keeps memory usage low
|
# the stream=True parameter keeps memory usage low
|
||||||
r = requests.get(url, stream=True, allow_redirects=True, headers=HEADERS)
|
r = requests.get(
|
||||||
|
url, stream=True, allow_redirects=True, headers=HEADERS, timeout=300
|
||||||
|
)
|
||||||
r.raise_for_status()
|
r.raise_for_status()
|
||||||
with open(local_filename, 'wb') as f:
|
with open(local_filename, 'wb') as f:
|
||||||
for chunk in r.iter_content(chunk_size=1024):
|
for chunk in r.iter_content(chunk_size=1024):
|
||||||
|
|
|
||||||
|
|
@ -174,7 +174,7 @@ def load_exodus_trackers_signatures():
|
||||||
"""
|
"""
|
||||||
signatures = []
|
signatures = []
|
||||||
exodus_url = "https://reports.exodus-privacy.eu.org/api/trackers"
|
exodus_url = "https://reports.exodus-privacy.eu.org/api/trackers"
|
||||||
r = requests.get(exodus_url)
|
r = requests.get(exodus_url, timeout=300)
|
||||||
data = r.json()
|
data = r.json()
|
||||||
for e in data['trackers']:
|
for e in data['trackers']:
|
||||||
signatures.append(
|
signatures.append(
|
||||||
|
|
|
||||||
|
|
@ -108,7 +108,7 @@ def px_to_dpi(px):
|
||||||
|
|
||||||
|
|
||||||
def get_icon_dir(repodir, density):
|
def get_icon_dir(repodir, density):
|
||||||
if density == '0' or density == '65534':
|
if density in ('0', '65534'):
|
||||||
return os.path.join(repodir, "icons")
|
return os.path.join(repodir, "icons")
|
||||||
else:
|
else:
|
||||||
return os.path.join(repodir, "icons-%s" % density)
|
return os.path.join(repodir, "icons-%s" % density)
|
||||||
|
|
@ -647,7 +647,7 @@ def _strip_and_copy_image(in_file, outpath):
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
logging.error(_("Failed copying {path}: {error}".format(path=in_file, error=e)))
|
logging.error(_("Failed copying {path}: {error}".format(path=in_file, error=e)))
|
||||||
return
|
return
|
||||||
elif extension == 'jpg' or extension == 'jpeg':
|
elif extension in ('jpg', 'jpeg'):
|
||||||
try:
|
try:
|
||||||
with open(in_file, 'rb') as fp:
|
with open(in_file, 'rb') as fp:
|
||||||
in_image = Image.open(fp)
|
in_image = Image.open(fp)
|
||||||
|
|
@ -866,16 +866,16 @@ def copy_triple_t_store_metadata(apps):
|
||||||
locale = segments[-2]
|
locale = segments[-2]
|
||||||
|
|
||||||
for f in files:
|
for f in files:
|
||||||
if f == 'fulldescription' or f == 'full-description.txt':
|
if f in ('fulldescription', 'full-description.txt'):
|
||||||
_set_localized_text_entry(app, locale, 'description',
|
_set_localized_text_entry(app, locale, 'description',
|
||||||
os.path.join(root, f))
|
os.path.join(root, f))
|
||||||
elif f == 'shortdescription' or f == 'short-description.txt':
|
elif f in ('shortdescription', 'short-description.txt'):
|
||||||
_set_localized_text_entry(app, locale, 'summary',
|
_set_localized_text_entry(app, locale, 'summary',
|
||||||
os.path.join(root, f))
|
os.path.join(root, f))
|
||||||
elif f == 'title' or f == 'title.txt':
|
elif f in ('title', 'title.txt'):
|
||||||
_set_localized_text_entry(app, locale, 'name',
|
_set_localized_text_entry(app, locale, 'name',
|
||||||
os.path.join(root, f))
|
os.path.join(root, f))
|
||||||
elif f == 'video' or f == 'video-url.txt':
|
elif f in ('video', 'video-url.txt'):
|
||||||
_set_localized_text_entry(app, locale, 'video',
|
_set_localized_text_entry(app, locale, 'video',
|
||||||
os.path.join(root, f))
|
os.path.join(root, f))
|
||||||
elif f == 'whatsnew':
|
elif f == 'whatsnew':
|
||||||
|
|
@ -884,11 +884,11 @@ def copy_triple_t_store_metadata(apps):
|
||||||
elif f == 'default.txt' and segments[-2] == 'release-notes':
|
elif f == 'default.txt' and segments[-2] == 'release-notes':
|
||||||
_set_localized_text_entry(app, locale, 'whatsNew',
|
_set_localized_text_entry(app, locale, 'whatsNew',
|
||||||
os.path.join(root, f))
|
os.path.join(root, f))
|
||||||
elif f == 'contactEmail' or f == 'contact-email.txt':
|
elif f in ('contactEmail', 'contact-email.txt'):
|
||||||
_set_author_entry(app, 'authorEmail', os.path.join(root, f))
|
_set_author_entry(app, 'authorEmail', os.path.join(root, f))
|
||||||
elif f == 'contactPhone' or f == 'contact-phone.txt':
|
elif f in ('contactPhone', 'contact-phone.txt'):
|
||||||
_set_author_entry(app, 'authorPhone', os.path.join(root, f))
|
_set_author_entry(app, 'authorPhone', os.path.join(root, f))
|
||||||
elif f == 'contactWebsite' or f == 'contact-website.txt':
|
elif f in ('contactWebsite', 'contact-website.txt'):
|
||||||
_set_author_entry(app, 'authorWebSite', os.path.join(root, f))
|
_set_author_entry(app, 'authorWebSite', os.path.join(root, f))
|
||||||
else:
|
else:
|
||||||
base, extension = common.get_extension(f)
|
base, extension = common.get_extension(f)
|
||||||
|
|
@ -1113,7 +1113,7 @@ def scan_repo_files(apkcache, repodir, knownapks, use_date_from_file=False):
|
||||||
repodir = repodir.encode()
|
repodir = repodir.encode()
|
||||||
for name in os.listdir(repodir):
|
for name in os.listdir(repodir):
|
||||||
file_extension = common.get_file_extension(name)
|
file_extension = common.get_file_extension(name)
|
||||||
if file_extension == 'apk' or file_extension == 'obb':
|
if file_extension in ('apk', 'obb'):
|
||||||
continue
|
continue
|
||||||
filename = os.path.join(repodir, name)
|
filename = os.path.join(repodir, name)
|
||||||
name_utf8 = name.decode()
|
name_utf8 = name.decode()
|
||||||
|
|
@ -1405,8 +1405,10 @@ def scan_apk_androguard(apk, apkfile):
|
||||||
if key not in item.attrib:
|
if key not in item.attrib:
|
||||||
continue
|
continue
|
||||||
feature = str(item.attrib[key])
|
feature = str(item.attrib[key])
|
||||||
if feature != "android.hardware.screen.portrait" \
|
if feature not in (
|
||||||
and feature != "android.hardware.screen.landscape":
|
'android.hardware.screen.portrait',
|
||||||
|
'android.hardware.screen.landscape',
|
||||||
|
):
|
||||||
if feature.startswith("android.feature."):
|
if feature.startswith("android.feature."):
|
||||||
feature = feature[16:]
|
feature = feature[16:]
|
||||||
required = item.attrib.get(xmlns + 'required')
|
required = item.attrib.get(xmlns + 'required')
|
||||||
|
|
|
||||||
|
|
@ -616,7 +616,7 @@ if __name__ == '__main__':
|
||||||
virt = subprocess.check_output('/usr/bin/systemd-detect-virt').strip().decode('utf-8')
|
virt = subprocess.check_output('/usr/bin/systemd-detect-virt').strip().decode('utf-8')
|
||||||
except subprocess.CalledProcessError:
|
except subprocess.CalledProcessError:
|
||||||
virt = 'none'
|
virt = 'none'
|
||||||
if virt == 'qemu' or virt == 'kvm' or virt == 'bochs':
|
if virt in ('qemu', 'kvm', 'bochs'):
|
||||||
logging.info('Running in a VM guest, defaulting to QEMU/KVM via libvirt')
|
logging.info('Running in a VM guest, defaulting to QEMU/KVM via libvirt')
|
||||||
config['vm_provider'] = 'libvirt'
|
config['vm_provider'] = 'libvirt'
|
||||||
elif virt != 'none':
|
elif virt != 'none':
|
||||||
|
|
|
||||||
|
|
@ -112,7 +112,7 @@ def main(args):
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
logging.basicConfig(format='%(message)s', level=logging.DEBUG)
|
logging.basicConfig(format='%(message)s', level=logging.DEBUG)
|
||||||
|
|
||||||
parser = ArgumentParser(description="""\
|
parser = ArgumentParser(description="""\
|
||||||
This is intended for manually testing vmtools.py
|
This is intended for manually testing vmtools.py
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,10 @@ checksums = None
|
||||||
versions = dict()
|
versions = dict()
|
||||||
|
|
||||||
while not checksums:
|
while not checksums:
|
||||||
r = requests.get('https://gitlab.com/fdroid/gradle-transparency-log/-/raw/master/checksums.json')
|
r = requests.get(
|
||||||
|
'https://gitlab.com/fdroid/gradle-transparency-log/-/raw/master/checksums.json',
|
||||||
|
timeout=300,
|
||||||
|
)
|
||||||
if r.status_code == 200:
|
if r.status_code == 200:
|
||||||
checksums = r.json()
|
checksums = r.json()
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -45,7 +45,7 @@ class ImportTest(unittest.TestCase):
|
||||||
fdroidserver.common.config = config
|
fdroidserver.common.config = config
|
||||||
|
|
||||||
url = 'https://gitlab.com/fdroid/ci-test-app'
|
url = 'https://gitlab.com/fdroid/ci-test-app'
|
||||||
r = requests.head(url)
|
r = requests.head(url, timeout=300)
|
||||||
if r.status_code != 200:
|
if r.status_code != 200:
|
||||||
print("ERROR", url, 'unreachable (', r.status_code, ')')
|
print("ERROR", url, 'unreachable (', r.status_code, ')')
|
||||||
print('Skipping ImportTest!')
|
print('Skipping ImportTest!')
|
||||||
|
|
|
||||||
|
|
@ -15,7 +15,8 @@ versions = dict()
|
||||||
|
|
||||||
while not checksums:
|
while not checksums:
|
||||||
r = requests.get(
|
r = requests.get(
|
||||||
'https://gitlab.com/fdroid/android-sdk-transparency-log/-/raw/master/checksums.json'
|
'https://gitlab.com/fdroid/android-sdk-transparency-log/-/raw/master/checksums.json',
|
||||||
|
timeout=300,
|
||||||
)
|
)
|
||||||
if r.status_code == 200:
|
if r.status_code == 200:
|
||||||
checksums = r.json()
|
checksums = r.json()
|
||||||
|
|
|
||||||
|
|
@ -35,7 +35,7 @@ class NetTest(unittest.TestCase):
|
||||||
|
|
||||||
@patch('requests.get')
|
@patch('requests.get')
|
||||||
def test_download_file_url_parsing(self, requests_get):
|
def test_download_file_url_parsing(self, requests_get):
|
||||||
def _get(url, stream, allow_redirects, headers): # pylint: disable=W0613
|
def _get(url, stream, allow_redirects, headers, timeout): # pylint: disable=W0613
|
||||||
return MagicMock()
|
return MagicMock()
|
||||||
|
|
||||||
requests_get.side_effect = _get
|
requests_get.side_effect = _get
|
||||||
|
|
|
||||||
|
|
@ -33,7 +33,7 @@ class NightlyTest(unittest.TestCase):
|
||||||
]:
|
]:
|
||||||
url = nightly.get_repo_base_url(clone_url, repo_git_base)
|
url = nightly.get_repo_base_url(clone_url, repo_git_base)
|
||||||
self.assertEqual(result, url)
|
self.assertEqual(result, url)
|
||||||
r = requests.head(os.path.join(url, 'repo/index-v1.jar'))
|
r = requests.head(os.path.join(url, 'repo/index-v1.jar'), timeout=300)
|
||||||
# gitlab.com often returns 403 Forbidden from their cloudflare restrictions
|
# gitlab.com often returns 403 Forbidden from their cloudflare restrictions
|
||||||
self.assertTrue(r.status_code in (200, 403), 'should not be a redirect')
|
self.assertTrue(r.status_code in (200, 403), 'should not be a redirect')
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,7 @@ import requests
|
||||||
versions = [
|
versions = [
|
||||||
]
|
]
|
||||||
|
|
||||||
r = requests.get('https://www.openssl.org/news/changelog.html')
|
r = requests.get('https://www.openssl.org/news/changelog.html', timeout=300)
|
||||||
|
|
||||||
safe = set()
|
safe = set()
|
||||||
bad = set()
|
bad = set()
|
||||||
|
|
|
||||||
|
|
@ -428,7 +428,9 @@ class Test_load_exodus_trackers_signatures(unittest.TestCase):
|
||||||
"fdroidserver.scanner._exodus_compile_signatures", self.compilesig_func
|
"fdroidserver.scanner._exodus_compile_signatures", self.compilesig_func
|
||||||
):
|
):
|
||||||
result_sigs, result_regex = fdroidserver.scanner.load_exodus_trackers_signatures()
|
result_sigs, result_regex = fdroidserver.scanner.load_exodus_trackers_signatures()
|
||||||
self.requests_func.assert_called_once_with("https://reports.exodus-privacy.eu.org/api/trackers")
|
self.requests_func.assert_called_once_with(
|
||||||
|
"https://reports.exodus-privacy.eu.org/api/trackers", timeout=300
|
||||||
|
)
|
||||||
self.assertEqual(len(result_sigs), 2)
|
self.assertEqual(len(result_sigs), 2)
|
||||||
self.assertListEqual([1, 2], sorted([x.id for x in result_sigs]))
|
self.assertListEqual([1, 2], sorted([x.id for x in result_sigs]))
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue