idx int64 0 251k | question stringlengths 53 3.53k | target stringlengths 5 1.23k | len_question int64 20 893 | len_target int64 3 238 |
|---|---|---|---|---|
241,700 | def com_google_fonts_check_mac_style ( ttFont , style ) : from fontbakery . utils import check_bit_entry from fontbakery . constants import MacStyle # Checking macStyle ITALIC bit: expected = "Italic" in style yield check_bit_entry ( ttFont , "head" , "macStyle" , expected , bitmask = MacStyle . ITALIC , bitname = "ITALIC" ) # Checking macStyle BOLD bit: expected = style in [ "Bold" , "BoldItalic" ] yield check_bit_entry ( ttFont , "head" , "macStyle" , expected , bitmask = MacStyle . BOLD , bitname = "BOLD" ) | Checking head . macStyle value . | 166 | 8 |
241,701 | def com_google_fonts_check_contour_count ( ttFont ) : from fontbakery . glyphdata import desired_glyph_data as glyph_data from fontbakery . utils import ( get_font_glyph_data , pretty_print_list ) # rearrange data structure: desired_glyph_data = { } for glyph in glyph_data : desired_glyph_data [ glyph [ 'unicode' ] ] = glyph bad_glyphs = [ ] desired_glyph_contours = { f : desired_glyph_data [ f ] [ 'contours' ] for f in desired_glyph_data } font_glyph_data = get_font_glyph_data ( ttFont ) if font_glyph_data is None : yield FAIL , "This font lacks cmap data." else : font_glyph_contours = { f [ 'unicode' ] : list ( f [ 'contours' ] ) [ 0 ] for f in font_glyph_data } shared_glyphs = set ( desired_glyph_contours ) & set ( font_glyph_contours ) for glyph in shared_glyphs : if font_glyph_contours [ glyph ] not in desired_glyph_contours [ glyph ] : bad_glyphs . append ( [ glyph , font_glyph_contours [ glyph ] , desired_glyph_contours [ glyph ] ] ) if len ( bad_glyphs ) > 0 : cmap = ttFont [ 'cmap' ] . getcmap ( PlatformID . WINDOWS , WindowsEncodingID . UNICODE_BMP ) . cmap bad_glyphs_name = [ ( "Glyph name: {}\t" "Contours detected: {}\t" "Expected: {}" ) . format ( cmap [ name ] , count , pretty_print_list ( expected , shorten = None , glue = "or" ) ) for name , count , expected in bad_glyphs ] yield WARN , ( ( "This check inspects the glyph outlines and detects the" " total number of contours in each of them. The expected" " values are infered from the typical ammounts of" " contours observed in a large collection of reference" " font families. The divergences listed below may simply" " indicate a significantly different design on some of" " your glyphs. On the other hand, some of these may flag" " actual bugs in the font such as glyphs mapped to an" " incorrect codepoint. Please consider reviewing" " the design and codepoint assignment of these to make" " sure they are correct.\n" "\n" "The following glyphs do not have the recommended" " number of contours:\n" "\n{}" ) . format ( '\n' . join ( bad_glyphs_name ) ) ) else : yield PASS , "All glyphs have the recommended amount of contours" | Check if each glyph has the recommended amount of contours . | 657 | 12 |
241,702 | def com_google_fonts_check_metadata_nameid_copyright ( ttFont , font_metadata ) : failed = False for nameRecord in ttFont [ 'name' ] . names : string = nameRecord . string . decode ( nameRecord . getEncoding ( ) ) if nameRecord . nameID == NameID . COPYRIGHT_NOTICE and string != font_metadata . copyright : failed = True yield FAIL , ( "Copyright field for this font on METADATA.pb ('{}')" " differs from a copyright notice entry" " on the name table:" " '{}'" ) . format ( font_metadata . copyright , string ) if not failed : yield PASS , ( "Copyright field for this font on METADATA.pb matches" " copyright notice entries on the name table." ) | Copyright field for this font on METADATA . pb matches all copyright notice entries on the name table ? | 176 | 22 |
241,703 | def com_google_fonts_check_name_mandatory_entries ( ttFont , style ) : from fontbakery . utils import get_name_entry_strings from fontbakery . constants import RIBBI_STYLE_NAMES required_nameIDs = [ NameID . FONT_FAMILY_NAME , NameID . FONT_SUBFAMILY_NAME , NameID . FULL_FONT_NAME , NameID . POSTSCRIPT_NAME ] if style not in RIBBI_STYLE_NAMES : required_nameIDs += [ NameID . TYPOGRAPHIC_FAMILY_NAME , NameID . TYPOGRAPHIC_SUBFAMILY_NAME ] failed = False # The font must have at least these name IDs: for nameId in required_nameIDs : if len ( get_name_entry_strings ( ttFont , nameId ) ) == 0 : failed = True yield FAIL , ( f"Font lacks entry with nameId={nameId}" f" ({NameID(nameId).name})" ) if not failed : yield PASS , "Font contains values for all mandatory name table entries." | Font has all mandatory name table entries ? | 257 | 8 |
241,704 | def com_google_fonts_check_name_copyright_length ( ttFont ) : from fontbakery . utils import get_name_entries failed = False for notice in get_name_entries ( ttFont , NameID . COPYRIGHT_NOTICE ) : notice_str = notice . string . decode ( notice . getEncoding ( ) ) if len ( notice_str ) > 500 : failed = True yield FAIL , ( "The length of the following copyright notice ({})" " exceeds 500 chars: '{}'" "" ) . format ( len ( notice_str ) , notice_str ) if not failed : yield PASS , ( "All copyright notice name entries on the" " 'name' table are shorter than 500 characters." ) | Length of copyright notice must not exceed 500 characters . | 165 | 10 |
241,705 | def com_google_fonts_check_fontv ( ttFont ) : from fontv . libfv import FontVersion fv = FontVersion ( ttFont ) if fv . version and ( fv . is_development or fv . is_release ) : yield PASS , "Font version string looks GREAT!" else : yield INFO , ( "Version string is: \"{}\"\n" "The version string must ideally include a git commit hash" " and either a 'dev' or a 'release' suffix such as in the" " example below:\n" "\"Version 1.3; git-0d08353-release\"" "" ) . format ( fv . get_name_id5_version_string ( ) ) | Check for font - v versioning | 162 | 7 |
241,706 | def com_google_fonts_check_negative_advance_width ( ttFont ) : failed = False for glyphName in ttFont [ "glyf" ] . glyphs : coords = ttFont [ "glyf" ] [ glyphName ] . coordinates rightX = coords [ - 3 ] [ 0 ] leftX = coords [ - 4 ] [ 0 ] advwidth = rightX - leftX if advwidth < 0 : failed = True yield FAIL , ( "glyph '{}' has bad coordinates on the glyf table," " which may lead to the advance width to be" " interpreted as a negative" " value ({})." ) . format ( glyphName , advwidth ) if not failed : yield PASS , "The x-coordinates of all glyphs look good." | Check that advance widths cannot be inferred as negative . | 174 | 11 |
241,707 | def com_google_fonts_check_varfont_generate_static ( ttFont ) : import tempfile from fontTools . varLib import mutator try : loc = { k . axisTag : float ( ( k . maxValue + k . minValue ) / 2 ) for k in ttFont [ 'fvar' ] . axes } with tempfile . TemporaryFile ( ) as instance : font = mutator . instantiateVariableFont ( ttFont , loc ) font . save ( instance ) yield PASS , ( "fontTools.varLib.mutator generated a static font " "instance" ) except Exception as e : yield FAIL , ( "fontTools.varLib.mutator failed to generated a static font " "instance\n{}" . format ( repr ( e ) ) ) | Check a static ttf can be generated from a variable font . | 172 | 13 |
241,708 | def com_google_fonts_check_smart_dropout ( ttFont ) : INSTRUCTIONS = b"\xb8\x01\xff\x85\xb0\x04\x8d" if ( "prep" in ttFont and INSTRUCTIONS in ttFont [ "prep" ] . program . getBytecode ( ) ) : yield PASS , ( "'prep' table contains instructions" " enabling smart dropout control." ) else : yield FAIL , ( "'prep' table does not contain TrueType " " instructions enabling smart dropout control." " To fix, export the font with autohinting enabled," " or run ttfautohint on the font, or run the " " `gftools fix-nonhinting` script." ) | Font enables smart dropout control in prep table instructions? | 169 | 11 |
241,709 | def com_google_fonts_check_aat ( ttFont ) : UNWANTED_TABLES = { 'EBSC' , 'Zaph' , 'acnt' , 'ankr' , 'bdat' , 'bhed' , 'bloc' , 'bmap' , 'bsln' , 'fdsc' , 'feat' , 'fond' , 'gcid' , 'just' , 'kerx' , 'lcar' , 'ltag' , 'mort' , 'morx' , 'opbd' , 'prop' , 'trak' , 'xref' } unwanted_tables_found = [ ] for table in ttFont . keys ( ) : if table in UNWANTED_TABLES : unwanted_tables_found . append ( table ) if len ( unwanted_tables_found ) > 0 : yield FAIL , ( "Unwanted AAT tables were found" " in the font and should be removed, either by" " fonttools/ttx or by editing them using the tool" " they built with:" " {}" ) . format ( ", " . join ( unwanted_tables_found ) ) else : yield PASS , "There are no unwanted AAT tables." | Are there unwanted Apple tables? | 275 | 6 |
241,710 | def com_google_fonts_check_fvar_name_entries ( ttFont ) : failed = False for instance in ttFont [ "fvar" ] . instances : entries = [ entry for entry in ttFont [ "name" ] . names if entry . nameID == instance . subfamilyNameID ] if len ( entries ) == 0 : failed = True yield FAIL , ( f"Named instance with coordinates {instance.coordinates}" f" lacks an entry on the name table (nameID={instance.subfamilyNameID})." ) if not failed : yield PASS , "OK" | All name entries referenced by fvar instances exist on the name table? | 132 | 14 |
241,711 | def com_google_fonts_check_varfont_weight_instances ( ttFont ) : failed = False for instance in ttFont [ "fvar" ] . instances : if 'wght' in instance . coordinates and instance . coordinates [ 'wght' ] % 100 != 0 : failed = True yield FAIL , ( "Found an variable font instance with" f" 'wght'={instance.coordinates['wght']}." " This should instead be a multiple of 100." ) if not failed : yield PASS , "OK" | Variable font weight coordinates must be multiples of 100 . | 123 | 11 |
241,712 | def com_google_fonts_check_family_tnum_horizontal_metrics ( fonts ) : from fontbakery . constants import RIBBI_STYLE_NAMES from fontTools . ttLib import TTFont RIBBI_ttFonts = [ TTFont ( f ) for f in fonts if style ( f ) in RIBBI_STYLE_NAMES ] tnum_widths = { } for ttFont in RIBBI_ttFonts : glyphs = ttFont . getGlyphSet ( ) tnum_glyphs = [ ( glyph_id , glyphs [ glyph_id ] ) for glyph_id in glyphs . keys ( ) if glyph_id . endswith ( ".tnum" ) ] for glyph_id , glyph in tnum_glyphs : if glyph . width not in tnum_widths : tnum_widths [ glyph . width ] = [ glyph_id ] else : tnum_widths [ glyph . width ] . append ( glyph_id ) if len ( tnum_widths . keys ( ) ) > 1 : max_num = 0 most_common_width = None for width , glyphs in tnum_widths . items ( ) : if len ( glyphs ) > max_num : max_num = len ( glyphs ) most_common_width = width del tnum_widths [ most_common_width ] yield FAIL , ( f"The most common tabular glyph width is {most_common_width}." " But there are other tabular glyphs with different widths" f" such as the following ones:\n\t{tnum_widths}." ) else : yield PASS , "OK" | All tabular figures must have the same width across the RIBBI - family . | 380 | 17 |
241,713 | def com_google_fonts_check_ligature_carets ( ttFont , ligature_glyphs ) : if ligature_glyphs == - 1 : yield FAIL , Message ( "malformed" , "Failed to lookup ligatures." " This font file seems to be malformed." " For more info, read:" " https://github.com" "/googlefonts/fontbakery/issues/1596" ) elif "GDEF" not in ttFont : yield WARN , Message ( "GDEF-missing" , ( "GDEF table is missing, but it is mandatory" " to declare it on fonts that provide ligature" " glyphs because the caret (text cursor)" " positioning for each ligature must be" " provided in this table." ) ) else : lig_caret_list = ttFont [ "GDEF" ] . table . LigCaretList if lig_caret_list is None : missing = set ( ligature_glyphs ) else : missing = set ( ligature_glyphs ) - set ( lig_caret_list . Coverage . glyphs ) if lig_caret_list is None or lig_caret_list . LigGlyphCount == 0 : yield WARN , Message ( "lacks-caret-pos" , ( "This font lacks caret position values for" " ligature glyphs on its GDEF table." ) ) elif missing : missing = "\n\t- " . join ( missing ) yield WARN , Message ( "incomplete-caret-pos-data" , ( "This font lacks caret positioning" " values for these ligature glyphs:" f"\n\t- {missing}\n\n " ) ) else : yield PASS , "Looks good!" | Are there caret positions declared for every ligature? | 390 | 11 |
241,714 | def com_google_fonts_check_kerning_for_non_ligated_sequences ( ttFont , ligatures , has_kerning_info ) : def look_for_nonligated_kern_info ( table ) : for pairpos in table . SubTable : for i , glyph in enumerate ( pairpos . Coverage . glyphs ) : if not hasattr ( pairpos , 'PairSet' ) : continue for pairvalue in pairpos . PairSet [ i ] . PairValueRecord : kern_pair = ( glyph , pairvalue . SecondGlyph ) if kern_pair in ligature_pairs : ligature_pairs . remove ( kern_pair ) def ligatures_str ( pairs ) : result = [ f"\t- {first} + {second}" for first , second in pairs ] return "\n" . join ( result ) if ligatures == - 1 : yield FAIL , Message ( "malformed" , "Failed to lookup ligatures." " This font file seems to be malformed." " For more info, read:" " https://github.com" "/googlefonts/fontbakery/issues/1596" ) else : ligature_pairs = [ ] for first , comp in ligatures . items ( ) : for components in comp : while components : pair = ( first , components [ 0 ] ) if pair not in ligature_pairs : ligature_pairs . append ( pair ) first = components [ 0 ] components . pop ( 0 ) for record in ttFont [ "GSUB" ] . table . FeatureList . FeatureRecord : if record . FeatureTag == 'kern' : for index in record . Feature . LookupListIndex : lookup = ttFont [ "GSUB" ] . table . LookupList . Lookup [ index ] look_for_nonligated_kern_info ( lookup ) if ligature_pairs : yield WARN , Message ( "lacks-kern-info" , ( "GPOS table lacks kerning info for the following" " non-ligated sequences:\n" "{}\n\n " ) . format ( ligatures_str ( ligature_pairs ) ) ) else : yield PASS , ( "GPOS table provides kerning info for " "all non-ligated sequences." ) | Is there kerning info for non - ligated sequences? | 506 | 12 |
241,715 | def com_google_fonts_check_name_family_and_style_max_length ( ttFont ) : from fontbakery . utils import ( get_name_entries , get_name_entry_strings ) failed = False for familyname in get_name_entries ( ttFont , NameID . FONT_FAMILY_NAME ) : # we'll only match family/style name entries with the same platform ID: plat = familyname . platformID familyname_str = familyname . string . decode ( familyname . getEncoding ( ) ) for stylename_str in get_name_entry_strings ( ttFont , NameID . FONT_SUBFAMILY_NAME , platformID = plat ) : if len ( familyname_str + stylename_str ) > 27 : failed = True yield WARN , ( "The combined length of family and style" " exceeds 27 chars in the following '{}' entries:" " FONT_FAMILY_NAME = '{}' / SUBFAMILY_NAME = '{}'" "" ) . format ( PlatformID ( plat ) . name , familyname_str , stylename_str ) yield WARN , ( "Please take a look at the conversation at" " https://github.com/googlefonts/fontbakery/issues/2179" " in order to understand the reasoning behing these" " name table records max-length criteria." ) if not failed : yield PASS , "All name entries are good." | Combined length of family and style must not exceed 27 characters . | 327 | 13 |
241,716 | def com_google_fonts_check_family_control_chars ( ttFonts ) : # list of unacceptable control character glyph names # definition includes the entire control character Unicode block except: # - .null (U+0000) # - CR (U+000D) unacceptable_cc_list = [ "uni0001" , "uni0002" , "uni0003" , "uni0004" , "uni0005" , "uni0006" , "uni0007" , "uni0008" , "uni0009" , "uni000A" , "uni000B" , "uni000C" , "uni000E" , "uni000F" , "uni0010" , "uni0011" , "uni0012" , "uni0013" , "uni0014" , "uni0015" , "uni0016" , "uni0017" , "uni0018" , "uni0019" , "uni001A" , "uni001B" , "uni001C" , "uni001D" , "uni001E" , "uni001F" ] # a dict with key:value of font path that failed check : list of unacceptable glyph names failed_font_dict = { } for ttFont in ttFonts : font_failed = False unacceptable_glyphs_in_set = [ ] # a list of unacceptable glyph names identified glyph_name_set = set ( ttFont [ "glyf" ] . glyphs . keys ( ) ) fontname = ttFont . reader . file . name for unacceptable_glyph_name in unacceptable_cc_list : if unacceptable_glyph_name in glyph_name_set : font_failed = True unacceptable_glyphs_in_set . append ( unacceptable_glyph_name ) if font_failed : failed_font_dict [ fontname ] = unacceptable_glyphs_in_set if len ( failed_font_dict ) > 0 : unacceptable_cc_report_string = "The following unacceptable control characters were identified:\n" for fnt in failed_font_dict . keys ( ) : unacceptable_cc_report_string += " {}: {}\n" . format ( fnt , ", " . join ( failed_font_dict [ fnt ] ) ) yield FAIL , ( "{}" . format ( unacceptable_cc_report_string ) ) else : yield PASS , ( "Unacceptable control characters were not identified." ) | Does font file include unacceptable control character glyphs? | 536 | 10 |
241,717 | def gfonts_repo_structure ( fonts ) : from fontbakery . utils import get_absolute_path # FIXME: Improve this with more details # about the expected structure. abspath = get_absolute_path ( fonts [ 0 ] ) return abspath . split ( os . path . sep ) [ - 3 ] in [ "ufl" , "ofl" , "apache" ] | The family at the given font path follows the files and directory structure typical of a font project hosted on the Google Fonts repo on GitHub ? | 88 | 28 |
241,718 | def com_google_fonts_check_repo_dirname_match_nameid_1 ( fonts , gfonts_repo_structure ) : from fontTools . ttLib import TTFont from fontbakery . utils import ( get_name_entry_strings , get_absolute_path , get_regular ) regular = get_regular ( fonts ) if not regular : yield FAIL , "The font seems to lack a regular." entry = get_name_entry_strings ( TTFont ( regular ) , NameID . FONT_FAMILY_NAME ) [ 0 ] expected = entry . lower ( ) expected = "" . join ( expected . split ( ' ' ) ) expected = "" . join ( expected . split ( '-' ) ) license , familypath , filename = get_absolute_path ( regular ) . split ( os . path . sep ) [ - 3 : ] if familypath == expected : yield PASS , "OK" else : yield FAIL , ( f"Family name on the name table ('{entry}') does not match" f" directory name in the repo structure ('{familypath}')." f" Expected '{expected}'." ) | Directory name in GFonts repo structure must match NameID 1 of the regular . | 256 | 17 |
241,719 | def com_google_fonts_check_family_panose_proportion ( ttFonts ) : failed = False proportion = None for ttFont in ttFonts : if proportion is None : proportion = ttFont [ 'OS/2' ] . panose . bProportion if proportion != ttFont [ 'OS/2' ] . panose . bProportion : failed = True if failed : yield FAIL , ( "PANOSE proportion is not" " the same accross this family." " In order to fix this," " please make sure that the panose.bProportion value" " is the same in the OS/2 table of all of this family" " font files." ) else : yield PASS , "Fonts have consistent PANOSE proportion." | Fonts have consistent PANOSE proportion? | 168 | 8 |
241,720 | def com_google_fonts_check_family_panose_familytype ( ttFonts ) : failed = False familytype = None for ttfont in ttFonts : if familytype is None : familytype = ttfont [ 'OS/2' ] . panose . bFamilyType if familytype != ttfont [ 'OS/2' ] . panose . bFamilyType : failed = True if failed : yield FAIL , ( "PANOSE family type is not" " the same accross this family." " In order to fix this," " please make sure that the panose.bFamilyType value" " is the same in the OS/2 table of all of this family" " font files." ) else : yield PASS , "Fonts have consistent PANOSE family type." | Fonts have consistent PANOSE family type? | 174 | 9 |
241,721 | def com_google_fonts_check_code_pages ( ttFont ) : if not hasattr ( ttFont [ 'OS/2' ] , "ulCodePageRange1" ) or not hasattr ( ttFont [ 'OS/2' ] , "ulCodePageRange2" ) or ( ttFont [ 'OS/2' ] . ulCodePageRange1 == 0 and ttFont [ 'OS/2' ] . ulCodePageRange2 == 0 ) : yield FAIL , ( "No code pages defined in the OS/2 table" " ulCodePageRage1 and CodePageRage2 fields." ) else : yield PASS , "At least one code page is defined." | Check code page character ranges | 155 | 5 |
241,722 | def com_google_fonts_check_glyf_unused_data ( ttFont ) : try : expected_glyphs = len ( ttFont . getGlyphOrder ( ) ) actual_glyphs = len ( ttFont [ 'glyf' ] . glyphs ) diff = actual_glyphs - expected_glyphs if diff < 0 : yield FAIL , Message ( "unreachable-data" , ( "Glyf table has unreachable data at the end of " " the table. Expected glyf table length {}" " (from loca table), got length" " {} (difference: {})" ) . format ( expected_glyphs , actual_glyphs , diff ) ) elif not diff : # negative diff -> exception below yield PASS , "There is no unused data at the end of the glyf table." else : raise Exception ( "Bug: fontTools did not raise an expected exception." ) except fontTools . ttLib . TTLibError as error : if "not enough 'glyf' table data" in format ( error ) : yield FAIL , Message ( "missing-data" , ( "Loca table references data beyond" " the end of the glyf table." " Expected glyf table length {}" " (from loca table)." ) . format ( expected_glyphs ) ) else : raise Exception ( "Bug: Unexpected fontTools exception." ) | Is there any unused data at the end of the glyf table? | 312 | 14 |
241,723 | def com_google_fonts_check_points_out_of_bounds ( ttFont ) : failed = False out_of_bounds = [ ] for glyphName in ttFont [ 'glyf' ] . keys ( ) : glyph = ttFont [ 'glyf' ] [ glyphName ] coords = glyph . getCoordinates ( ttFont [ 'glyf' ] ) [ 0 ] for x , y in coords : if x < glyph . xMin or x > glyph . xMax or y < glyph . yMin or y > glyph . yMax or abs ( x ) > 32766 or abs ( y ) > 32766 : failed = True out_of_bounds . append ( ( glyphName , x , y ) ) if failed : yield WARN , ( "The following glyphs have coordinates which are" " out of bounds:\n{}\nThis happens a lot when points" " are not extremes, which is usually bad. However," " fixing this alert by adding points on extremes may" " do more harm than good, especially with italics," " calligraphic-script, handwriting, rounded and" " other fonts. So it is common to" " ignore this message" . format ( out_of_bounds ) ) else : yield PASS , "All glyph paths have coordinates within bounds!" | Check for points out of bounds . | 286 | 7 |
241,724 | def com_daltonmaag_check_ufolint ( font ) : import subprocess ufolint_cmd = [ "ufolint" , font ] try : subprocess . check_output ( ufolint_cmd , stderr = subprocess . STDOUT ) except subprocess . CalledProcessError as e : yield FAIL , ( "ufolint failed the UFO source. Output follows :" "\n\n{}\n" ) . format ( e . output . decode ( ) ) except OSError : yield ERROR , "ufolint is not available!" else : yield PASS , "ufolint passed the UFO source." | Run ufolint on UFO source directory . | 139 | 9 |
241,725 | def com_daltonmaag_check_required_fields ( ufo_font ) : recommended_fields = [ ] for field in [ "unitsPerEm" , "ascender" , "descender" , "xHeight" , "capHeight" , "familyName" ] : if ufo_font . info . __dict__ . get ( "_" + field ) is None : recommended_fields . append ( field ) if recommended_fields : yield FAIL , f"Required field(s) missing: {recommended_fields}" else : yield PASS , "Required fields present." | Check that required fields are present in the UFO fontinfo . | 126 | 12 |
241,726 | def com_daltonmaag_check_recommended_fields ( ufo_font ) : recommended_fields = [ ] for field in [ "postscriptUnderlineThickness" , "postscriptUnderlinePosition" , "versionMajor" , "versionMinor" , "styleName" , "copyright" , "openTypeOS2Panose" ] : if ufo_font . info . __dict__ . get ( "_" + field ) is None : recommended_fields . append ( field ) if recommended_fields : yield WARN , f"Recommended field(s) missing: {recommended_fields}" else : yield PASS , "Recommended fields present." | Check that recommended fields are present in the UFO fontinfo . | 142 | 12 |
241,727 | def com_daltonmaag_check_unnecessary_fields ( ufo_font ) : unnecessary_fields = [ ] for field in [ "openTypeNameUniqueID" , "openTypeNameVersion" , "postscriptUniqueID" , "year" ] : if ufo_font . info . __dict__ . get ( "_" + field ) is not None : unnecessary_fields . append ( field ) if unnecessary_fields : yield WARN , f"Unnecessary field(s) present: {unnecessary_fields}" else : yield PASS , "Unnecessary fields omitted." | Check that no unnecessary fields are present in the UFO fontinfo . | 124 | 13 |
241,728 | def setup_argparse ( self , argument_parser ) : import glob import logging import argparse def get_fonts ( pattern ) : fonts_to_check = [ ] # use glob.glob to accept *.ufo for fullpath in glob . glob ( pattern ) : fullpath_absolute = os . path . abspath ( fullpath ) if fullpath_absolute . lower ( ) . endswith ( ".ufo" ) and os . path . isdir ( fullpath_absolute ) : fonts_to_check . append ( fullpath ) else : logging . warning ( ( "Skipping '{}' as it does not seem " "to be valid UFO source directory." ) . format ( fullpath ) ) return fonts_to_check class MergeAction ( argparse . Action ) : def __call__ ( self , parser , namespace , values , option_string = None ) : target = [ item for l in values for item in l ] setattr ( namespace , self . dest , target ) argument_parser . add_argument ( 'fonts' , # To allow optional commands like "-L" to work without other input # files: nargs = '*' , type = get_fonts , action = MergeAction , help = 'font file path(s) to check.' ' Wildcards like *.ufo are allowed.' ) return ( 'fonts' , ) | Set up custom arguments needed for this profile . | 295 | 9 |
241,729 | def com_google_fonts_check_whitespace_widths ( ttFont ) : from fontbakery . utils import get_glyph_name space_name = get_glyph_name ( ttFont , 0x0020 ) nbsp_name = get_glyph_name ( ttFont , 0x00A0 ) space_width = ttFont [ 'hmtx' ] [ space_name ] [ 0 ] nbsp_width = ttFont [ 'hmtx' ] [ nbsp_name ] [ 0 ] if space_width > 0 and space_width == nbsp_width : yield PASS , "Whitespace and non-breaking space have the same width." else : yield FAIL , ( "Whitespace and non-breaking space have differing width:" " Whitespace ({}) is {} font units wide, non-breaking space" " ({}) is {} font units wide. Both should be positive and the" " same." ) . format ( space_name , space_width , nbsp_name , nbsp_width ) | Whitespace and non - breaking space have the same width? | 234 | 13 |
241,730 | def update_by_config ( self , config_dict ) : policy_enabling_map = self . _get_enabling_map ( config_dict ) self . enabled_policies = [ ] for policy_name , is_policy_enabled in policy_enabling_map . items ( ) : if not self . _is_policy_exists ( policy_name ) : self . _warn_unexistent_policy ( policy_name ) continue if is_policy_enabled : enabled_policy = self . _get_policy ( policy_name ) self . enabled_policies . append ( enabled_policy ) | Update policies set by the config dictionary . | 135 | 8 |
241,731 | def _build_cmdargs ( argv ) : parser = _build_arg_parser ( ) namespace = parser . parse_args ( argv [ 1 : ] ) cmdargs = vars ( namespace ) return cmdargs | Build command line arguments dict to use ; - displaying usages - vint . linting . env . build_environment | 47 | 25 |
241,732 | def parse ( self , lint_target ) : # type: (AbstractLintTarget) -> Dict[str, Any] decoder = Decoder ( default_decoding_strategy ) decoded = decoder . decode ( lint_target . read ( ) ) decoded_and_lf_normalized = decoded . replace ( '\r\n' , '\n' ) return self . parse_string ( decoded_and_lf_normalized ) | Parse vim script file and return the AST . | 102 | 10 |
241,733 | def parse_string ( self , string ) : # type: (str) -> Dict[str, Any] lines = string . split ( '\n' ) reader = vimlparser . StringReader ( lines ) parser = vimlparser . VimLParser ( self . _enable_neovim ) ast = parser . parse ( reader ) # TOPLEVEL does not have a pos, but we need pos for all nodes ast [ 'pos' ] = { 'col' : 1 , 'i' : 0 , 'lnum' : 1 } for plugin in self . plugins : plugin . process ( ast ) return ast | Parse vim script string and return the AST . | 132 | 10 |
241,734 | def parse_string_expr ( self , string_expr_node ) : string_expr_node_value = string_expr_node [ 'value' ] string_expr_str = string_expr_node_value [ 1 : - 1 ] # Care escaped string literals if string_expr_node_value [ 0 ] == "'" : string_expr_str = string_expr_str . replace ( "''" , "'" ) else : string_expr_str = string_expr_str . replace ( '\\"' , '"' ) # NOTE: This is a hack to parse expr1. See :help expr1 raw_ast = self . parse_string ( 'echo ' + string_expr_str ) # We need the left node of ECHO node parsed_string_expr_nodes = raw_ast [ 'body' ] [ 0 ] [ 'list' ] start_pos = string_expr_node [ 'pos' ] def adjust_position ( node ) : pos = node [ 'pos' ] # Care 1-based index and the length of "echo ". pos [ 'col' ] += start_pos [ 'col' ] - 1 - 5 # Care the length of "echo ". pos [ 'i' ] += start_pos [ 'i' ] - 5 # Care 1-based index pos [ 'lnum' ] += start_pos [ 'lnum' ] - 1 for parsed_string_expr_node in parsed_string_expr_nodes : traverse ( parsed_string_expr_node , on_enter = adjust_position ) return parsed_string_expr_nodes | Parse a string node content . | 347 | 7 |
241,735 | def is_builtin_variable ( id_node ) : # type: (Dict[str, Any]) -> bool # Builtin variables are always IDENTIFIER. if NodeType ( id_node [ 'type' ] ) is not NodeType . IDENTIFIER : return False id_value = id_node [ 'value' ] if id_value . startswith ( 'v:' ) : # It is an explicit builtin variable such as: "v:count", "v:char" # TODO: Add unknown builtin flag return True if is_builtin_function ( id_node ) : return True if id_value in [ 'key' , 'val' ] : # These builtin variable names are available on only map() or filter(). return is_on_lambda_string_context ( id_node ) # It is an implicit builtin variable such as: "count", "char" return id_value in BuiltinVariablesCanHaveImplicitScope | Whether the specified node is a builtin identifier . | 211 | 10 |
241,736 | def is_builtin_function ( id_node ) : # type: (Dict[str, Any]) -> bool # Builtin functions are always IDENTIFIER. if NodeType ( id_node [ 'type' ] ) is not NodeType . IDENTIFIER : return False id_value = id_node [ 'value' ] if not is_function_identifier ( id_node ) : return False # There are difference between a function identifier and variable # identifier: # # let localtime = 0 # echo localtime " => 0 # echo localtime() " => 1420011455 return id_value in BuiltinFunctions | Whether the specified node is a builtin function name identifier . The given identifier should be a child node of NodeType . CALL . | 137 | 26 |
241,737 | def attach_identifier_attributes ( self , ast ) : # type: (Dict[str, Any]) -> Dict[str, Any] redir_assignment_parser = RedirAssignmentParser ( ) ast_with_parsed_redir = redir_assignment_parser . process ( ast ) map_and_filter_parser = CallNodeParser ( ) ast_with_parse_map_and_filter_and_redir = map_and_filter_parser . process ( ast_with_parsed_redir ) traverse ( ast_with_parse_map_and_filter_and_redir , on_enter = lambda node : self . _enter_handler ( node , is_on_lambda_str = None , is_on_lambda_body = None , ) ) return ast | Attach 5 flags to the AST . | 181 | 7 |
241,738 | def create_violation_report ( self , node , lint_context ) : return { 'name' : self . name , 'level' : self . level , 'description' : self . description , 'reference' : self . reference , 'position' : { 'line' : node [ 'pos' ] [ 'lnum' ] , 'column' : node [ 'pos' ] [ 'col' ] , 'path' : lint_context [ 'lint_target' ] . path , } , } | Returns a violation report for the node . | 112 | 8 |
241,739 | def get_policy_config ( self , lint_context ) : policy_config = lint_context [ 'config' ] . get ( 'policies' , { } ) . get ( self . __class__ . __name__ , { } ) return policy_config | Returns a config of the concrete policy . For example a config of ProhibitSomethingEvil is located on config . policies . ProhibitSomethingEvil . | 60 | 29 |
241,740 | def get_violation_if_found ( self , node , lint_context ) : if self . is_valid ( node , lint_context ) : return None return self . create_violation_report ( node , lint_context ) | Returns a violation if the node is invalid . | 54 | 9 |
241,741 | def import_all_policies ( ) : pkg_name = _get_policy_package_name_for_test ( ) pkg_path_list = pkg_name . split ( '.' ) pkg_path = str ( Path ( _get_vint_root ( ) , * pkg_path_list ) . resolve ( ) ) for _ , module_name , is_pkg in pkgutil . iter_modules ( [ pkg_path ] ) : if not is_pkg : module_fqn = pkg_name + '.' + module_name logging . debug ( 'Loading the policy module: `{fqn}`' . format ( fqn = module_fqn ) ) importlib . import_module ( module_fqn ) | Import all policies that were registered by vint . linting . policy_registry . | 174 | 19 |
241,742 | def process ( self , ast ) : # type: (Dict[str, Any]) -> None id_classifier = IdentifierClassifier ( ) attached_ast = id_classifier . attach_identifier_attributes ( ast ) # We are already in script local scope. self . _scope_tree_builder . enter_new_scope ( ScopeVisibility . SCRIPT_LOCAL ) traverse ( attached_ast , on_enter = self . _enter_handler , on_leave = self . _leave_handler ) self . scope_tree = self . _scope_tree_builder . get_global_scope ( ) self . link_registry = self . _scope_tree_builder . link_registry | Build a scope tree and links between scopes and identifiers by the specified ast . You can access the built scope tree and the built links by . scope_tree and . link_registry . | 155 | 39 |
241,743 | def cli ( argv = None ) : kwargs = parse_arguments ( argv or sys . argv [ 1 : ] ) log_level = kwargs . pop ( 'log_level' ) logging . basicConfig ( format = '%(levelname)s | %(message)s' , level = log_level ) logger = logging . getLogger ( __name__ ) # Configure logging levels for sub modules. Set to ERROR by default. sub_log_level = logging . ERROR if log_level == logging . getLevelName ( logging . DEBUG ) : sub_log_level = logging . DEBUG logging . getLogger ( 'redo' ) . setLevel ( sub_log_level ) logging . getLogger ( 'requests' ) . setLevel ( sub_log_level ) logging . getLogger ( 'thclient' ) . setLevel ( sub_log_level ) try : scraper_type = kwargs . pop ( 'scraper_type' ) # If a URL has been specified use the direct scraper if kwargs . get ( 'url' ) : scraper_type = 'direct' build = factory . FactoryScraper ( scraper_type , * * kwargs ) if kwargs . get ( 'print_url' ) : logger . info ( build . url ) else : build . download ( ) except KeyboardInterrupt : logger . error ( 'Download interrupted by the user' ) | CLI entry point for mozdownload . | 315 | 9 |
241,744 | def query_builds_by_revision ( self , revision , job_type_name = 'Build' , debug_build = False ) : builds = set ( ) try : self . logger . info ( 'Querying {url} for list of builds for revision: {revision}' . format ( url = self . client . server_url , revision = revision ) ) # Retrieve the option hash to filter for type of build (opt, and debug for now) option_hash = None for key , values in self . client . get_option_collection_hash ( ) . iteritems ( ) : for value in values : if value [ 'name' ] == ( 'debug' if debug_build else 'opt' ) : option_hash = key break if option_hash : break resultsets = self . client . get_pushes ( self . branch , revision = revision ) # Set filters to speed-up querying jobs kwargs = { 'option_collection_hash' : option_hash , 'job_type_name' : job_type_name , 'exclusion_profile' : False , } kwargs . update ( self . get_treeherder_platform ( self . platform ) ) for resultset in resultsets : kwargs . update ( { 'result_set_id' : resultset [ 'id' ] } ) jobs = self . client . get_jobs ( self . branch , * * kwargs ) for job in jobs : log_urls = self . client . get_job_log_url ( self . branch , job_id = job [ 'id' ] ) for log_url in log_urls : if self . application in log_url [ 'url' ] : self . logger . debug ( 'Found build folder: {}' . format ( log_url [ 'url' ] ) ) builds . update ( [ log_url [ 'url' ] ] ) except Exception : self . logger . exception ( 'Failure occurred when querying Treeherder for builds' ) return list ( builds ) | Retrieve build folders for a given revision with the help of Treeherder . | 442 | 16 |
241,745 | def urljoin ( * fragments ) : # Strip possible already existent final slashes of fragments except for the last one parts = [ fragment . rstrip ( '/' ) for fragment in fragments [ : len ( fragments ) - 1 ] ] parts . append ( fragments [ - 1 ] ) return '/' . join ( parts ) | Concatenate multi part strings into urls . | 67 | 11 |
241,746 | def create_md5 ( path ) : m = hashlib . md5 ( ) # rb necessary to run correctly in windows. with open ( path , "rb" ) as f : while True : data = f . read ( 8192 ) if not data : break m . update ( data ) return m . hexdigest ( ) | Create the md5 hash of a file using the hashlib library . | 71 | 14 |
241,747 | def filter ( self , filter ) : if hasattr ( filter , '__call__' ) : return [ entry for entry in self . entries if filter ( entry ) ] else : pattern = re . compile ( filter , re . IGNORECASE ) return [ entry for entry in self . entries if pattern . match ( entry ) ] | Filter entries by calling function or applying regex . | 70 | 9 |
241,748 | def handle_starttag ( self , tag , attrs ) : if not tag == 'a' : return for attr in attrs : if attr [ 0 ] == 'href' : # Links look like: /pub/firefox/nightly/2015/ # We have to trim the fragment down to the last item. Also to ensure we # always get it, we remove a possible final slash first url = urllib . unquote ( attr [ 1 ] ) self . active_url = url . rstrip ( '/' ) . split ( '/' ) [ - 1 ] return | Callback for when a tag gets opened . | 126 | 8 |
241,749 | def handle_data ( self , data ) : # Only process the data when we are in an active a tag and have an URL. if not self . active_url : return # The visible text can have a final slash so strip it off if data . strip ( '/' ) == self . active_url : self . entries . append ( self . active_url ) | Callback when the data of a tag has been collected . | 77 | 11 |
241,750 | def dst ( self , dt ) : # Daylight saving starts on the second Sunday of March at 2AM standard dst_start_date = self . first_sunday ( dt . year , 3 ) + timedelta ( days = 7 ) + timedelta ( hours = 2 ) # Daylight saving ends on the first Sunday of November at 2AM standard dst_end_date = self . first_sunday ( dt . year , 11 ) + timedelta ( hours = 2 ) if dst_start_date <= dt . replace ( tzinfo = None ) < dst_end_date : return timedelta ( hours = 1 ) else : return timedelta ( 0 ) | Calculate delta for daylight saving . | 144 | 8 |
241,751 | def first_sunday ( self , year , month ) : date = datetime ( year , month , 1 , 0 ) days_until_sunday = 6 - date . weekday ( ) return date + timedelta ( days = days_until_sunday ) | Get the first sunday of a month . | 58 | 9 |
241,752 | def binary ( self ) : def _get_binary ( ) : # Retrieve all entries from the remote virtual folder parser = self . _create_directory_parser ( self . path ) if not parser . entries : raise errors . NotFoundError ( 'No entries found' , self . path ) # Download the first matched directory entry pattern = re . compile ( self . binary_regex , re . IGNORECASE ) for entry in parser . entries : try : self . _binary = pattern . match ( entry ) . group ( ) break except Exception : # No match, continue with next entry continue else : raise errors . NotFoundError ( "Binary not found in folder" , self . path ) self . _retry_check_404 ( _get_binary ) return self . _binary | Return the name of the build . | 168 | 7 |
241,753 | def url ( self ) : return urllib . quote ( urljoin ( self . path , self . binary ) , safe = '%/:=&?~#+!$,;\'@()*[]|' ) | Return the URL of the build . | 48 | 7 |
241,754 | def filename ( self ) : if self . _filename is None : if os . path . splitext ( self . destination ) [ 1 ] : # If the filename has been given make use of it target_file = self . destination else : # Otherwise create it from the build details target_file = os . path . join ( self . destination , self . build_filename ( self . binary ) ) self . _filename = os . path . abspath ( target_file ) return self . _filename | Return the local filename of the build . | 105 | 8 |
241,755 | def download ( self ) : def total_seconds ( td ) : # Keep backward compatibility with Python 2.6 which doesn't have # this method if hasattr ( td , 'total_seconds' ) : return td . total_seconds ( ) else : return ( td . microseconds + ( td . seconds + td . days * 24 * 3600 ) * 10 ** 6 ) / 10 ** 6 # Don't re-download the file if os . path . isfile ( os . path . abspath ( self . filename ) ) : self . logger . info ( "File has already been downloaded: %s" % ( self . filename ) ) return self . filename directory = os . path . dirname ( self . filename ) if not os . path . isdir ( directory ) : os . makedirs ( directory ) self . logger . info ( 'Downloading from: %s' % self . url ) self . logger . info ( 'Saving as: %s' % self . filename ) tmp_file = self . filename + ".part" def _download ( ) : try : start_time = datetime . now ( ) # Enable streaming mode so we can download content in chunks r = self . session . get ( self . url , stream = True ) r . raise_for_status ( ) content_length = r . headers . get ( 'Content-length' ) # ValueError: Value out of range if only total_size given if content_length : total_size = int ( content_length . strip ( ) ) max_value = ( ( total_size / CHUNK_SIZE ) + 1 ) * CHUNK_SIZE bytes_downloaded = 0 log_level = self . logger . getEffectiveLevel ( ) if log_level <= logging . INFO and content_length : widgets = [ pb . Percentage ( ) , ' ' , pb . Bar ( ) , ' ' , pb . ETA ( ) , ' ' , pb . FileTransferSpeed ( ) ] pbar = pb . ProgressBar ( widgets = widgets , maxval = max_value ) . start ( ) with open ( tmp_file , 'wb' ) as f : for chunk in r . iter_content ( CHUNK_SIZE ) : f . write ( chunk ) bytes_downloaded += CHUNK_SIZE if log_level <= logging . INFO and content_length : pbar . update ( bytes_downloaded ) t1 = total_seconds ( datetime . now ( ) - start_time ) if self . timeout_download and t1 >= self . timeout_download : raise errors . TimeoutError if log_level <= logging . INFO and content_length : pbar . finish ( ) except Exception : if os . path . isfile ( tmp_file ) : os . remove ( tmp_file ) raise self . _retry ( _download , retry_exceptions = ( requests . exceptions . RequestException , errors . TimeoutError ) ) os . rename ( tmp_file , self . filename ) return self . filename | Download the specified file . | 647 | 5 |
241,756 | def show_matching_builds ( self , builds ) : self . logger . info ( 'Found %s build%s: %s' % ( len ( builds ) , len ( builds ) > 1 and 's' or '' , len ( builds ) > 10 and ' ... ' . join ( [ ', ' . join ( builds [ : 5 ] ) , ', ' . join ( builds [ - 5 : ] ) ] ) or ', ' . join ( builds ) ) ) | Output the matching builds . | 101 | 5 |
241,757 | def is_build_dir ( self , folder_name ) : # Cannot move up to base scraper due to parser.entries call in # get_build_info_for_date (see below) url = '%s/' % urljoin ( self . base_url , self . monthly_build_list_regex , folder_name ) if self . application in APPLICATIONS_MULTI_LOCALE and self . locale != 'multi' : url = '%s/' % urljoin ( url , self . locale ) parser = self . _create_directory_parser ( url ) pattern = re . compile ( self . binary_regex , re . IGNORECASE ) for entry in parser . entries : try : pattern . match ( entry ) . group ( ) return True except Exception : # No match, continue with next entry continue return False | Return whether or not the given dir contains a build . | 184 | 11 |
241,758 | def get_build_info_for_date ( self , date , build_index = None ) : url = urljoin ( self . base_url , self . monthly_build_list_regex ) has_time = date and date . time ( ) self . logger . info ( 'Retrieving list of builds from %s' % url ) parser = self . _create_directory_parser ( url ) regex = r'%(DATE)s-(\d+-)+%(BRANCH)s%(L10N)s%(PLATFORM)s$' % { 'DATE' : date . strftime ( '%Y-%m-%d' ) , 'BRANCH' : self . branch , # ensure to select the correct subfolder for localized builds 'L10N' : '(-l10n)?' if self . locale_build else '' , 'PLATFORM' : '' if self . application not in ( 'fennec' ) else '-' + self . platform } parser . entries = parser . filter ( regex ) parser . entries = parser . filter ( self . is_build_dir ) if has_time : # If a time is included in the date, use it to determine the # build's index regex = r'.*%s.*' % date . strftime ( '%H-%M-%S' ) parser . entries = parser . filter ( regex ) if not parser . entries : date_format = '%Y-%m-%d-%H-%M-%S' if has_time else '%Y-%m-%d' message = 'Folder for builds on %s has not been found' % self . date . strftime ( date_format ) raise errors . NotFoundError ( message , url ) # If no index has been given, set it to the last build of the day. self . show_matching_builds ( parser . entries ) # If no index has been given, set it to the last build of the day. if build_index is None : # Find the most recent non-empty entry. build_index = len ( parser . entries ) for build in reversed ( parser . entries ) : build_index -= 1 if not build_index or self . is_build_dir ( build ) : break self . logger . info ( 'Selected build: %s' % parser . entries [ build_index ] ) return ( parser . entries , build_index ) | Return the build information for a given date . | 532 | 9 |
241,759 | def monthly_build_list_regex ( self ) : # Regex for possible builds for the given date return r'nightly/%(YEAR)s/%(MONTH)s/' % { 'YEAR' : self . date . year , 'MONTH' : str ( self . date . month ) . zfill ( 2 ) } | Return the regex for the folder containing builds of a month . | 77 | 12 |
241,760 | def filename ( self ) : if os . path . splitext ( self . destination ) [ 1 ] : # If the filename has been given make use of it target_file = self . destination else : # Otherwise determine it from the url. parsed_url = urlparse ( self . url ) source_filename = ( parsed_url . path . rpartition ( '/' ) [ - 1 ] or parsed_url . hostname ) target_file = os . path . join ( self . destination , source_filename ) return os . path . abspath ( target_file ) | File name of the downloaded file . | 122 | 7 |
241,761 | def query_versions ( self , version = None ) : if version not in RELEASE_AND_CANDIDATE_LATEST_VERSIONS : return [ version ] url = urljoin ( self . base_url , 'releases/' ) parser = self . _create_directory_parser ( url ) if version : versions = parser . filter ( RELEASE_AND_CANDIDATE_LATEST_VERSIONS [ version ] ) from distutils . version import LooseVersion versions . sort ( key = LooseVersion ) return [ versions [ - 1 ] ] else : return parser . entries | Check specified version and resolve special values . | 127 | 8 |
241,762 | def build_list_regex ( self ) : regex = 'tinderbox-builds/%(BRANCH)s-%(PLATFORM)s%(L10N)s%(DEBUG)s/' return regex % { 'BRANCH' : self . branch , 'PLATFORM' : '' if self . locale_build else self . platform_regex , 'L10N' : 'l10n' if self . locale_build else '' , 'DEBUG' : '-debug' if self . debug_build else '' } | Return the regex for the folder which contains the list of builds . | 122 | 13 |
241,763 | def date_matches ( self , timestamp ) : if self . date is None : return False timestamp = datetime . fromtimestamp ( float ( timestamp ) , self . timezone ) if self . date . date ( ) == timestamp . date ( ) : return True return False | Determine whether the timestamp date is equal to the argument date . | 58 | 14 |
241,764 | def get_build_info_for_index ( self , build_index = None ) : url = urljoin ( self . base_url , self . build_list_regex ) self . logger . info ( 'Retrieving list of builds from %s' % url ) parser = self . _create_directory_parser ( url ) parser . entries = parser . filter ( r'^\d+$' ) if self . timestamp : # If a timestamp is given, retrieve the folder with the timestamp # as name parser . entries = self . timestamp in parser . entries and [ self . timestamp ] elif self . date : # If date is given, retrieve the subset of builds on that date parser . entries = filter ( self . date_matches , parser . entries ) if not parser . entries : message = 'No builds have been found' raise errors . NotFoundError ( message , url ) self . show_matching_builds ( parser . entries ) # If no index has been given, set it to the last build of the day. if build_index is None : # Find the most recent non-empty entry. build_index = len ( parser . entries ) for build in reversed ( parser . entries ) : build_index -= 1 if not build_index or self . is_build_dir ( build ) : break self . logger . info ( 'Selected build: %s' % parser . entries [ build_index ] ) return ( parser . entries , build_index ) | Get additional information for the build at the given index . | 316 | 11 |
241,765 | def create_default_options_getter ( ) : options = [ ] try : ttyname = subprocess . check_output ( args = [ 'tty' ] ) . strip ( ) options . append ( b'ttyname=' + ttyname ) except subprocess . CalledProcessError as e : log . warning ( 'no TTY found: %s' , e ) display = os . environ . get ( 'DISPLAY' ) if display is not None : options . append ( 'display={}' . format ( display ) . encode ( 'ascii' ) ) else : log . warning ( 'DISPLAY not defined' ) log . info ( 'using %s for pinentry options' , options ) return lambda : options | Return current TTY and DISPLAY settings for GnuPG pinentry . | 158 | 15 |
241,766 | def write ( p , line ) : log . debug ( '%s <- %r' , p . args , line ) p . stdin . write ( line ) p . stdin . flush ( ) | Send and flush a single line to the subprocess stdin . | 43 | 13 |
241,767 | def expect ( p , prefixes , confidential = False ) : resp = p . stdout . readline ( ) log . debug ( '%s -> %r' , p . args , resp if not confidential else '********' ) for prefix in prefixes : if resp . startswith ( prefix ) : return resp [ len ( prefix ) : ] raise UnexpectedError ( resp ) | Read a line and return it without required prefix . | 81 | 10 |
241,768 | def interact ( title , description , prompt , binary , options ) : args = [ binary ] p = subprocess . Popen ( args = args , stdin = subprocess . PIPE , stdout = subprocess . PIPE , env = os . environ ) p . args = args # TODO: remove after Python 2 deprecation. expect ( p , [ b'OK' ] ) title = util . assuan_serialize ( title . encode ( 'ascii' ) ) write ( p , b'SETTITLE ' + title + b'\n' ) expect ( p , [ b'OK' ] ) if description : description = util . assuan_serialize ( description . encode ( 'ascii' ) ) write ( p , b'SETDESC ' + description + b'\n' ) expect ( p , [ b'OK' ] ) if prompt : prompt = util . assuan_serialize ( prompt . encode ( 'ascii' ) ) write ( p , b'SETPROMPT ' + prompt + b'\n' ) expect ( p , [ b'OK' ] ) log . debug ( 'setting %d options' , len ( options ) ) for opt in options : write ( p , b'OPTION ' + opt + b'\n' ) expect ( p , [ b'OK' , b'ERR' ] ) write ( p , b'GETPIN\n' ) pin = expect ( p , [ b'OK' , b'D ' ] , confidential = True ) p . communicate ( ) # close stdin and wait for the process to exit exit_code = p . wait ( ) if exit_code : raise subprocess . CalledProcessError ( exit_code , binary ) return pin . decode ( 'ascii' ) . strip ( ) | Use GPG pinentry program to interact with the user . | 395 | 12 |
241,769 | def get_passphrase ( self , prompt = 'Passphrase:' ) : passphrase = None if self . cached_passphrase_ack : passphrase = self . cached_passphrase_ack . get ( ) if passphrase is None : passphrase = interact ( title = '{} passphrase' . format ( self . device_name ) , prompt = prompt , description = None , binary = self . passphrase_entry_binary , options = self . options_getter ( ) ) if self . cached_passphrase_ack : self . cached_passphrase_ack . set ( passphrase ) return passphrase | Ask the user for passphrase . | 131 | 7 |
241,770 | def export_public_keys ( self , identities ) : public_keys = [ ] with self . device : for i in identities : pubkey = self . device . pubkey ( identity = i ) vk = formats . decompress_pubkey ( pubkey = pubkey , curve_name = i . curve_name ) public_key = formats . export_public_key ( vk = vk , label = i . to_string ( ) ) public_keys . append ( public_key ) return public_keys | Export SSH public keys from the device . | 111 | 8 |
241,771 | def sign_ssh_challenge ( self , blob , identity ) : msg = _parse_ssh_blob ( blob ) log . debug ( '%s: user %r via %r (%r)' , msg [ 'conn' ] , msg [ 'user' ] , msg [ 'auth' ] , msg [ 'key_type' ] ) log . debug ( 'nonce: %r' , msg [ 'nonce' ] ) fp = msg [ 'public_key' ] [ 'fingerprint' ] log . debug ( 'fingerprint: %s' , fp ) log . debug ( 'hidden challenge size: %d bytes' , len ( blob ) ) log . info ( 'please confirm user "%s" login to "%s" using %s...' , msg [ 'user' ] . decode ( 'ascii' ) , identity . to_string ( ) , self . device ) with self . device : return self . device . sign ( blob = blob , identity = identity ) | Sign given blob using a private key on the device . | 216 | 11 |
241,772 | def fingerprint ( blob ) : digest = hashlib . md5 ( blob ) . digest ( ) return ':' . join ( '{:02x}' . format ( c ) for c in bytearray ( digest ) ) | Compute SSH fingerprint for specified blob . | 49 | 8 |
241,773 | def parse_pubkey ( blob ) : fp = fingerprint ( blob ) s = io . BytesIO ( blob ) key_type = util . read_frame ( s ) log . debug ( 'key type: %s' , key_type ) assert key_type in SUPPORTED_KEY_TYPES , key_type result = { 'blob' : blob , 'type' : key_type , 'fingerprint' : fp } if key_type == SSH_NIST256_KEY_TYPE : curve_name = util . read_frame ( s ) log . debug ( 'curve name: %s' , curve_name ) point = util . read_frame ( s ) assert s . read ( ) == b'' _type , point = point [ : 1 ] , point [ 1 : ] assert _type == SSH_NIST256_DER_OCTET size = len ( point ) // 2 assert len ( point ) == 2 * size coords = ( util . bytes2num ( point [ : size ] ) , util . bytes2num ( point [ size : ] ) ) curve = ecdsa . NIST256p point = ecdsa . ellipticcurve . Point ( curve . curve , * coords ) def ecdsa_verifier ( sig , msg ) : assert len ( sig ) == 2 * size sig_decode = ecdsa . util . sigdecode_string vk = ecdsa . VerifyingKey . from_public_point ( point , curve , hashfunc ) vk . verify ( signature = sig , data = msg , sigdecode = sig_decode ) parts = [ sig [ : size ] , sig [ size : ] ] return b'' . join ( [ util . frame ( b'\x00' + p ) for p in parts ] ) result . update ( point = coords , curve = CURVE_NIST256 , verifier = ecdsa_verifier ) if key_type == SSH_ED25519_KEY_TYPE : pubkey = util . read_frame ( s ) assert s . read ( ) == b'' def ed25519_verify ( sig , msg ) : assert len ( sig ) == 64 vk = ed25519 . VerifyingKey ( pubkey ) vk . verify ( sig , msg ) return sig result . update ( curve = CURVE_ED25519 , verifier = ed25519_verify ) return result | Parse SSH public key from given blob . | 529 | 9 |
241,774 | def export_public_key ( vk , label ) : key_type , blob = serialize_verifying_key ( vk ) log . debug ( 'fingerprint: %s' , fingerprint ( blob ) ) b64 = base64 . b64encode ( blob ) . decode ( 'ascii' ) return u'{} {} {}\n' . format ( key_type . decode ( 'ascii' ) , b64 , label ) | Export public key to text format . | 100 | 7 |
241,775 | def import_public_key ( line ) : log . debug ( 'loading SSH public key: %r' , line ) file_type , base64blob , name = line . split ( ) blob = base64 . b64decode ( base64blob ) result = parse_pubkey ( blob ) result [ 'name' ] = name . encode ( 'utf-8' ) assert result [ 'type' ] == file_type . encode ( 'ascii' ) log . debug ( 'loaded %s public key: %s' , file_type , result [ 'fingerprint' ] ) return result | Parse public key textual format as saved at a . pub file . | 132 | 14 |
241,776 | def parse_packets ( stream ) : reader = util . Reader ( stream ) while True : try : value = reader . readfmt ( 'B' ) except EOFError : return log . debug ( 'prefix byte: %s' , bin ( value ) ) assert util . bit ( value , 7 ) == 1 tag = util . low_bits ( value , 6 ) if util . bit ( value , 6 ) == 0 : length_type = util . low_bits ( tag , 2 ) tag = tag >> 2 fmt = { 0 : '>B' , 1 : '>H' , 2 : '>L' } [ length_type ] packet_size = reader . readfmt ( fmt ) else : first = reader . readfmt ( 'B' ) if first < 192 : packet_size = first elif first < 224 : packet_size = ( ( first - 192 ) << 8 ) + reader . readfmt ( 'B' ) + 192 elif first == 255 : packet_size = reader . readfmt ( '>L' ) else : log . error ( 'Partial Body Lengths unsupported' ) log . debug ( 'packet length: %d' , packet_size ) packet_data = reader . read ( packet_size ) packet_type = PACKET_TYPES . get ( tag ) p = { 'type' : 'unknown' , 'tag' : tag , 'raw' : packet_data } if packet_type is not None : try : p = packet_type ( util . Reader ( io . BytesIO ( packet_data ) ) ) p [ 'tag' ] = tag except ValueError : log . exception ( 'Skipping packet: %s' , util . hexlify ( packet_data ) ) log . debug ( 'packet "%s": %s' , p [ 'type' ] , p ) yield p | Support iterative parsing of available GPG packets . | 407 | 10 |
241,777 | def digest_packets ( packets , hasher ) : data_to_hash = io . BytesIO ( ) for p in packets : data_to_hash . write ( p [ '_to_hash' ] ) hasher . update ( data_to_hash . getvalue ( ) ) return hasher . digest ( ) | Compute digest on specified packets according to _to_hash field . | 71 | 14 |
241,778 | def load_by_keygrip ( pubkey_bytes , keygrip ) : stream = io . BytesIO ( pubkey_bytes ) packets = list ( parse_packets ( stream ) ) packets_per_pubkey = [ ] for p in packets : if p [ 'type' ] == 'pubkey' : # Add a new packet list for each pubkey. packets_per_pubkey . append ( [ ] ) packets_per_pubkey [ - 1 ] . append ( p ) for packets in packets_per_pubkey : user_ids = [ p for p in packets if p [ 'type' ] == 'user_id' ] for p in packets : if p . get ( 'keygrip' ) == keygrip : return p , user_ids raise KeyError ( '{} keygrip not found' . format ( util . hexlify ( keygrip ) ) ) | Return public key and first user ID for specified keygrip . | 198 | 13 |
241,779 | def load_signature ( stream , original_data ) : signature , = list ( parse_packets ( ( stream ) ) ) hash_alg = HASH_ALGORITHMS [ signature [ 'hash_alg' ] ] digest = digest_packets ( [ { '_to_hash' : original_data } , signature ] , hasher = hashlib . new ( hash_alg ) ) assert signature [ 'hash_prefix' ] == digest [ : 2 ] return signature , digest | Load signature from stream and compute GPG digest for verification . | 106 | 12 |
241,780 | def remove_armor ( armored_data ) : stream = io . BytesIO ( armored_data ) lines = stream . readlines ( ) [ 3 : - 1 ] data = base64 . b64decode ( b'' . join ( lines ) ) payload , checksum = data [ : - 3 ] , data [ - 3 : ] assert util . crc24 ( payload ) == checksum return payload | Decode armored data into its binary form . | 86 | 9 |
241,781 | def remove_file ( path , remove = os . remove , exists = os . path . exists ) : try : remove ( path ) except OSError : if exists ( path ) : raise | Remove file and raise OSError if still exists . | 41 | 12 |
241,782 | def unix_domain_socket_server ( sock_path ) : log . debug ( 'serving on %s' , sock_path ) remove_file ( sock_path ) server = socket . socket ( socket . AF_UNIX , socket . SOCK_STREAM ) server . bind ( sock_path ) server . listen ( 1 ) try : yield server finally : remove_file ( sock_path ) | Create UNIX - domain socket on specified path . | 87 | 10 |
241,783 | def handle_connection ( conn , handler , mutex ) : try : log . debug ( 'welcome agent' ) with contextlib . closing ( conn ) : while True : msg = util . read_frame ( conn ) with mutex : reply = handler . handle ( msg = msg ) util . send ( conn , reply ) except EOFError : log . debug ( 'goodbye agent' ) except Exception as e : # pylint: disable=broad-except log . warning ( 'error: %s' , e , exc_info = True ) | Handle a single connection using the specified protocol handler in a loop . | 118 | 13 |
241,784 | def retry ( func , exception_type , quit_event ) : while True : if quit_event . is_set ( ) : raise StopIteration try : return func ( ) except exception_type : pass | Run the function retrying when the specified exception_type occurs . | 45 | 13 |
241,785 | def spawn ( func , kwargs ) : t = threading . Thread ( target = func , kwargs = kwargs ) t . start ( ) yield t . join ( ) | Spawn a thread and join it after the context is over . | 40 | 12 |
241,786 | def run_process ( command , environ ) : log . info ( 'running %r with %r' , command , environ ) env = dict ( os . environ ) env . update ( environ ) try : p = subprocess . Popen ( args = command , env = env ) except OSError as e : raise OSError ( 'cannot run %r: %s' % ( command , e ) ) log . debug ( 'subprocess %d is running' , p . pid ) ret = p . wait ( ) log . debug ( 'subprocess %d exited: %d' , p . pid , ret ) return ret | Run the specified process and wait until it finishes . | 141 | 10 |
241,787 | def check_output ( args , env = None , sp = subprocess ) : log . debug ( 'calling %s with env %s' , args , env ) output = sp . check_output ( args = args , env = env ) log . debug ( 'output: %r' , output ) return output | Call an external binary and return its stdout . | 66 | 10 |
241,788 | def get_agent_sock_path ( env = None , sp = subprocess ) : args = [ util . which ( 'gpgconf' ) , '--list-dirs' ] output = check_output ( args = args , env = env , sp = sp ) lines = output . strip ( ) . split ( b'\n' ) dirs = dict ( line . split ( b':' , 1 ) for line in lines ) log . debug ( '%s: %s' , args , dirs ) return dirs [ b'agent-socket' ] | Parse gpgconf output to find out GPG agent UNIX socket path . | 124 | 17 |
241,789 | def connect_to_agent ( env = None , sp = subprocess ) : sock_path = get_agent_sock_path ( sp = sp , env = env ) # Make sure the original gpg-agent is running. check_output ( args = [ 'gpg-connect-agent' , '/bye' ] , sp = sp ) sock = socket . socket ( socket . AF_UNIX , socket . SOCK_STREAM ) sock . connect ( sock_path ) return sock | Connect to GPG agent s UNIX socket . | 106 | 10 |
241,790 | def sendline ( sock , msg , confidential = False ) : log . debug ( '<- %r' , ( '<snip>' if confidential else msg ) ) sock . sendall ( msg + b'\n' ) | Send a binary message followed by EOL . | 50 | 9 |
241,791 | def recvline ( sock ) : reply = io . BytesIO ( ) while True : c = sock . recv ( 1 ) if not c : return None # socket is closed if c == b'\n' : break reply . write ( c ) result = reply . getvalue ( ) log . debug ( '-> %r' , result ) return result | Receive a single line from the socket . | 77 | 9 |
241,792 | def parse_term ( s ) : size , s = s . split ( b':' , 1 ) size = int ( size ) return s [ : size ] , s [ size : ] | Parse single s - expr term from bytes . | 40 | 10 |
241,793 | def parse ( s ) : if s . startswith ( b'(' ) : s = s [ 1 : ] name , s = parse_term ( s ) values = [ name ] while not s . startswith ( b')' ) : value , s = parse ( s ) values . append ( value ) return values , s [ 1 : ] return parse_term ( s ) | Parse full s - expr from bytes . | 82 | 9 |
241,794 | def parse_sig ( sig ) : label , sig = sig assert label == b'sig-val' algo_name = sig [ 0 ] parser = { b'rsa' : _parse_rsa_sig , b'ecdsa' : _parse_ecdsa_sig , b'eddsa' : _parse_eddsa_sig , b'dsa' : _parse_dsa_sig } [ algo_name ] return parser ( args = sig [ 1 : ] ) | Parse signature integer values from s - expr . | 113 | 10 |
241,795 | def sign_digest ( sock , keygrip , digest , sp = subprocess , environ = None ) : hash_algo = 8 # SHA256 assert len ( digest ) == 32 assert communicate ( sock , 'RESET' ) . startswith ( b'OK' ) ttyname = check_output ( args = [ 'tty' ] , sp = sp ) . strip ( ) options = [ 'ttyname={}' . format ( ttyname ) ] # set TTY for passphrase entry display = ( environ or os . environ ) . get ( 'DISPLAY' ) if display is not None : options . append ( 'display={}' . format ( display ) ) for opt in options : assert communicate ( sock , 'OPTION {}' . format ( opt ) ) == b'OK' assert communicate ( sock , 'SIGKEY {}' . format ( keygrip ) ) == b'OK' hex_digest = binascii . hexlify ( digest ) . upper ( ) . decode ( 'ascii' ) assert communicate ( sock , 'SETHASH {} {}' . format ( hash_algo , hex_digest ) ) == b'OK' assert communicate ( sock , 'SETKEYDESC ' 'Sign+a+new+TREZOR-based+subkey' ) == b'OK' assert communicate ( sock , 'PKSIGN' ) == b'OK' while True : line = recvline ( sock ) . strip ( ) if line . startswith ( b'S PROGRESS' ) : continue else : break line = unescape ( line ) log . debug ( 'unescaped: %r' , line ) prefix , sig = line . split ( b' ' , 1 ) if prefix != b'D' : raise ValueError ( prefix ) sig , leftover = parse ( sig ) assert not leftover , leftover return parse_sig ( sig ) | Sign a digest using specified key using GPG agent . | 416 | 11 |
241,796 | def get_gnupg_components ( sp = subprocess ) : args = [ util . which ( 'gpgconf' ) , '--list-components' ] output = check_output ( args = args , sp = sp ) components = dict ( re . findall ( '(.*):.*:(.*)' , output . decode ( 'utf-8' ) ) ) log . debug ( 'gpgconf --list-components: %s' , components ) return components | Parse GnuPG components paths . | 103 | 8 |
241,797 | def gpg_command ( args , env = None ) : if env is None : env = os . environ cmd = get_gnupg_binary ( neopg_binary = env . get ( 'NEOPG_BINARY' ) ) return [ cmd ] + args | Prepare common GPG command line arguments . | 61 | 9 |
241,798 | def export_public_key ( user_id , env = None , sp = subprocess ) : args = gpg_command ( [ '--export' , user_id ] ) result = check_output ( args = args , env = env , sp = sp ) if not result : log . error ( 'could not find public key %r in local GPG keyring' , user_id ) raise KeyError ( user_id ) return result | Export GPG public key for specified user_id . | 95 | 11 |
241,799 | def export_public_keys ( env = None , sp = subprocess ) : args = gpg_command ( [ '--export' ] ) result = check_output ( args = args , env = env , sp = sp ) if not result : raise KeyError ( 'No GPG public keys found at env: {!r}' . format ( env ) ) return result | Export all GPG public keys . | 80 | 7 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.