Skip to content

Commit

Permalink
Minor Python cleanups to make flake8 pass with the new rules enabled
Browse files Browse the repository at this point in the history
  • Loading branch information
practicalswift committed Apr 16, 2018
1 parent 0d69921 commit f020aca
Show file tree
Hide file tree
Showing 21 changed files with 58 additions and 50 deletions.
8 changes: 4 additions & 4 deletions contrib/devtools/copyright_header.py
Original file line number Diff line number Diff line change
Expand Up @@ -286,7 +286,7 @@ def exec_report(base_directory, verbose):
def report_cmd(argv):
if len(argv) == 2:
sys.exit(REPORT_USAGE)

base_directory = argv[2]
if not os.path.exists(base_directory):
sys.exit("*** bad <base_directory>: %s" % base_directory)
Expand Down Expand Up @@ -444,7 +444,7 @@ def print_file_action_message(filename, action):
def update_cmd(argv):
if len(argv) != 3:
sys.exit(UPDATE_USAGE)

base_directory = argv[2]
if not os.path.exists(base_directory):
sys.exit("*** bad base_directory: %s" % base_directory)
Expand Down Expand Up @@ -570,13 +570,13 @@ def insert_cmd(argv):
_, extension = os.path.splitext(filename)
if extension not in ['.h', '.cpp', '.cc', '.c', '.py']:
sys.exit("*** cannot insert for file extension %s" % extension)

if extension == '.py':
style = 'python'
else:
style = 'cpp'
exec_insert_header(filename, style)

################################################################################
# UI
################################################################################
Expand Down
3 changes: 2 additions & 1 deletion contrib/devtools/github-merge.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,8 @@
import hashlib
import subprocess
import sys
import json,codecs
import json
import codecs
try:
from urllib.request import Request,urlopen
except:
Expand Down
8 changes: 4 additions & 4 deletions contrib/devtools/optimize-pngs.py
Original file line number Diff line number Diff line change
Expand Up @@ -41,19 +41,19 @@ def content_hash(filename):
file_path = os.path.join(absFolder, file)
fileMetaMap = {'file' : file, 'osize': os.path.getsize(file_path), 'sha256Old' : file_hash(file_path)}
fileMetaMap['contentHashPre'] = content_hash(file_path)

try:
subprocess.call([pngcrush, "-brute", "-ow", "-rem", "gAMA", "-rem", "cHRM", "-rem", "iCCP", "-rem", "sRGB", "-rem", "alla", "-rem", "text", file_path],
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
except:
print("pngcrush is not installed, aborting...")
sys.exit(0)

#verify
if "Not a PNG file" in subprocess.check_output([pngcrush, "-n", "-v", file_path], stderr=subprocess.STDOUT, universal_newlines=True):
print("PNG file "+file+" is corrupted after crushing, check out pngcursh version")
sys.exit(1)

fileMetaMap['sha256New'] = file_hash(file_path)
fileMetaMap['contentHashPost'] = content_hash(file_path)

Expand All @@ -72,5 +72,5 @@ def content_hash(filename):
totalSaveBytes += fileDict['osize'] - fileDict['psize']
noHashChange = noHashChange and (oldHash == newHash)
print(fileDict['file']+"\n size diff from: "+str(fileDict['osize'])+" to: "+str(fileDict['psize'])+"\n old sha256: "+oldHash+"\n new sha256: "+newHash+"\n")

print("completed. Checksum stable: "+str(noHashChange)+". Total reduction: "+str(totalSaveBytes)+" bytes")
1 change: 0 additions & 1 deletion contrib/linearize/linearize-data.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@

settings = {}

##### Switch endian-ness #####
def hex_switchEndian(s):
""" Switches the endianness of a hex string (in pairs of hex chars) """
pairList = [s[i:i+2].encode() for i in range(0, len(s), 2)]
Expand Down
1 change: 0 additions & 1 deletion contrib/linearize/linearize-hashes.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@

settings = {}

##### Switch endian-ness #####
def hex_switchEndian(s):
""" Switches the endianness of a hex string (in pairs of hex chars) """
pairList = [s[i:i+2].encode() for i in range(0, len(s), 2)]
Expand Down
7 changes: 4 additions & 3 deletions contrib/seeds/generate-seeds.py
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,8 @@

from base64 import b32decode
from binascii import a2b_hex
import sys, os
import sys
import os
import re

# ipv4 in ipv6 prefix
Expand All @@ -46,7 +47,7 @@ def name_to_ipv6(addr):
if len(addr)>6 and addr.endswith('.onion'):
vchAddr = b32decode(addr[0:-6], True)
if len(vchAddr) != 16-len(pchOnionCat):
raise ValueError('Invalid onion %s' % s)
raise ValueError('Invalid onion %s' % vchAddr)
return pchOnionCat + vchAddr
elif '.' in addr: # IPv4
return pchIPv4 + bytearray((int(x) for x in addr.split('.')))
Expand Down Expand Up @@ -132,7 +133,7 @@ def main():
with open(os.path.join(indir,'nodes_test.txt'),'r') as f:
process_nodes(g, f, 'pnSeed6_test', 18333)
g.write('#endif // BITCOIN_CHAINPARAMSSEEDS_H\n')

if __name__ == '__main__':
main()

10 changes: 5 additions & 5 deletions contrib/seeds/makeseeds.py
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,11 @@
# Generate seeds.txt from Pieter's DNS seeder
#

import re
import sys
import dns.resolver
import collections

NSEEDS=512

MAX_SEEDS_PER_ASN=2
Expand All @@ -22,11 +27,6 @@
"54.94.195.96", "54.94.200.247"
}

import re
import sys
import dns.resolver
import collections

PATTERN_IPV4 = re.compile(r"^((\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})):(\d+)$")
PATTERN_IPV6 = re.compile(r"^\[([0-9a-z:]+)\]:(\d+)$")
PATTERN_ONION = re.compile(r"^([abcdefghijklmnopqrstuvwxyz234567]{16}\.onion):(\d+)$")
Expand Down
9 changes: 6 additions & 3 deletions contrib/testgen/base58.py
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,10 @@ def b58encode(v):
# leading 0-bytes in the input become leading-1s
nPad = 0
for c in v:
if c == 0: nPad += 1
else: break
if c == 0:
nPad += 1
else:
break

return (__b58chars[0]*nPad) + result

Expand Down Expand Up @@ -98,7 +100,8 @@ def b58decode_chk(v):
def get_bcaddress_version(strAddress):
""" Returns None if strAddress is invalid. Otherwise returns integer version of address. """
addr = b58decode_chk(strAddress)
if addr is None or len(addr)!=21: return None
if addr is None or len(addr)!=21:
return None
version = addr[0]
return ord(version)

Expand Down
9 changes: 5 additions & 4 deletions contrib/testgen/gen_base58_test_vectors.py
Original file line number Diff line number Diff line change
Expand Up @@ -74,12 +74,12 @@ def gen_invalid_vector(template, corrupt_prefix, randomize_payload_size, corrupt
prefix = os.urandom(1)
else:
prefix = bytearray(template[0])

if randomize_payload_size:
payload = os.urandom(max(int(random.expovariate(0.5)), 50))
else:
payload = os.urandom(template[1])

if corrupt_suffix:
suffix = os.urandom(len(template[2]))
else:
Expand Down Expand Up @@ -114,7 +114,8 @@ def gen_invalid_vectors():
yield val,

if __name__ == '__main__':
import sys, json
import sys
import json
iters = {'valid':gen_valid_vectors, 'invalid':gen_invalid_vectors}
try:
uiter = iters[sys.argv[1]]
Expand All @@ -124,7 +125,7 @@ def gen_invalid_vectors():
count = int(sys.argv[2])
except IndexError:
count = 0

data = list(islice(uiter(), count))
json.dump(data, sys.stdout, sort_keys=True, indent=4)
sys.stdout.write('\n')
Expand Down
2 changes: 1 addition & 1 deletion share/rpcauth/rpcauth.py
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@

#Create 32 byte b64 password
password = base64.urlsafe_b64encode(os.urandom(32)).decode("utf-8")

m = hmac.new(bytearray(salt, 'utf-8'), bytearray(password, 'utf-8'), "SHA256")
result = m.hexdigest()

Expand Down
4 changes: 2 additions & 2 deletions test/functional/feature_bip68_sequence.py
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ def test_sequence_lock_confirmed_inputs(self):

# Track whether any sequence locks used should fail
should_pass = True

# Track whether this transaction was built with sequence locks
using_sequence_locks = False

Expand Down Expand Up @@ -343,7 +343,7 @@ def test_bip68_not_consensus(self):
tx2.rehash()

self.nodes[0].sendrawtransaction(ToHex(tx2))

# Now make an invalid spend of tx2 according to BIP68
sequence_value = 100 # 100 block relative locktime

Expand Down
2 changes: 1 addition & 1 deletion test/functional/feature_maxuploadtarget.py
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ def on_block(self, message):
self.block_receive_map[message.block.sha256] += 1

class MaxUploadTest(BitcoinTestFramework):

def set_test_params(self):
self.setup_clean_chain = True
self.num_nodes = 1
Expand Down
2 changes: 1 addition & 1 deletion test/functional/feature_proxy.py
Original file line number Diff line number Diff line change
Expand Up @@ -182,7 +182,7 @@ def networks_dict(d):
assert_equal(n1['onion']['proxy'], '%s:%i' % (self.conf2.addr))
assert_equal(n1['onion']['proxy_randomize_credentials'], False)
assert_equal(n1['onion']['reachable'], True)

n2 = networks_dict(self.nodes[2].getnetworkinfo())
for net in ['ipv4','ipv6','onion']:
assert_equal(n2[net]['proxy'], '%s:%i' % (self.conf2.addr))
Expand Down
4 changes: 2 additions & 2 deletions test/functional/interface_rest.py
Original file line number Diff line number Diff line change
Expand Up @@ -186,10 +186,10 @@ def run_test(self):
self.test_rest_request("/getutxos/checkmempool", http_method='POST', req_type=ReqType.JSON, status=400, ret_type=RetType.OBJ)

# Test limits
long_uri = '/'.join(["{}-{}".format(txid, n) for n in range(20)])
long_uri = '/'.join(["{}-{}".format(txid, n_) for n_ in range(20)])
self.test_rest_request("/getutxos/checkmempool/{}".format(long_uri), http_method='POST', status=400, ret_type=RetType.OBJ)

long_uri = '/'.join(['{}-{}'.format(txid, n) for n in range(15)])
long_uri = '/'.join(['{}-{}'.format(txid, n_) for n_ in range(15)])
self.test_rest_request("/getutxos/checkmempool/{}".format(long_uri), http_method='POST', status=200)

self.nodes[0].generate(1) # generate block to not affect upcoming tests
Expand Down
2 changes: 1 addition & 1 deletion test/functional/p2p_mempool.py
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,6 @@ def run_test(self):

#mininode must be disconnected at this point
assert_equal(len(self.nodes[0].getpeerinfo()), 0)

if __name__ == '__main__':
P2PMempoolTests().main()
6 changes: 3 additions & 3 deletions test/functional/p2p_segwit.py
Original file line number Diff line number Diff line change
Expand Up @@ -450,7 +450,7 @@ def test_witness_block_size(self):
block = self.build_next_block()

assert(len(self.utxo) > 0)

# Create a P2WSH transaction.
# The witness program will be a bunch of OP_2DROP's, followed by OP_TRUE.
# This should give us plenty of room to tweak the spending tx's
Expand Down Expand Up @@ -562,7 +562,7 @@ def test_extra_witness_data(self):
self.log.info("Testing extra witness data in tx")

assert(len(self.utxo) > 0)

block = self.build_next_block()

witness_program = CScript([OP_DROP, OP_TRUE])
Expand Down Expand Up @@ -730,7 +730,7 @@ def test_witness_input_length(self):
witness_program = CScript([OP_DROP, OP_TRUE])
witness_hash = sha256(witness_program)
scriptPubKey = CScript([OP_0, witness_hash])

# Create a transaction that splits our utxo into many outputs
tx = CTransaction()
tx.vin.append(CTxIn(COutPoint(self.utxo[0].sha256, self.utxo[0].n), b""))
Expand Down
12 changes: 7 additions & 5 deletions test/functional/test_framework/socks5.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,14 @@
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
"""Dummy Socks5 server for testing."""

import socket, threading, queue
import socket
import threading
import queue
import logging

logger = logging.getLogger("TestFramework.socks5")

### Protocol constants
# Protocol constants
class Command:
CONNECT = 0x01

Expand All @@ -18,7 +20,7 @@ class AddressType:
DOMAINNAME = 0x03
IPV6 = 0x04

### Utility functions
# Utility functions
def recvall(s, n):
"""Receive n bytes from a socket, or fail."""
rv = bytearray()
Expand All @@ -30,7 +32,7 @@ def recvall(s, n):
n -= len(d)
return rv

### Implementation classes
# Implementation classes
class Socks5Configuration():
"""Proxy configuration."""
def __init__(self):
Expand Down Expand Up @@ -141,7 +143,7 @@ def run(self):
thread = threading.Thread(None, conn.handle)
thread.daemon = True
thread.start()

def start(self):
assert(not self.running)
self.running = True
Expand Down
2 changes: 1 addition & 1 deletion test/functional/wallet_importprunedfunds.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ def run_test(self):
self.nodes[0].generate(101)

self.sync_all()

# address
address1 = self.nodes[0].getnewaddress()
# pubkey
Expand Down
2 changes: 1 addition & 1 deletion test/functional/wallet_keypool.py
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ def run_test(self):
addr_before_encrypting_data = nodes[0].getaddressinfo(addr_before_encrypting)
wallet_info_old = nodes[0].getwalletinfo()
assert(addr_before_encrypting_data['hdmasterkeyid'] == wallet_info_old['hdmasterkeyid'])

# Encrypt wallet and wait to terminate
nodes[0].node_encrypt_wallet('test')
# Restart node 0
Expand Down
5 changes: 3 additions & 2 deletions test/functional/wallet_txn_clone.py
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,8 @@ def run_test(self):
# Node0's balance should be starting balance, plus 50BTC for another
# matured block, minus tx1 and tx2 amounts, and minus transaction fees:
expected = starting_balance + fund_foo_tx["fee"] + fund_bar_tx["fee"]
if self.options.mine_block: expected += 50
if self.options.mine_block:
expected += 50
expected += tx1["amount"] + tx1["fee"]
expected += tx2["amount"] + tx2["fee"]
assert_equal(self.nodes[0].getbalance(), expected)
Expand Down Expand Up @@ -131,7 +132,7 @@ def run_test(self):
tx1 = self.nodes[0].gettransaction(txid1)
tx1_clone = self.nodes[0].gettransaction(txid1_clone)
tx2 = self.nodes[0].gettransaction(txid2)

# Verify expected confirmations
assert_equal(tx1["confirmations"], -2)
assert_equal(tx1_clone["confirmations"], 2)
Expand Down
Loading

0 comments on commit f020aca

Please sign in to comment.