Index: recipe_engine/third_party/setuptools/package_index.py |
diff --git a/recipe_engine/third_party/setuptools/package_index.py b/recipe_engine/third_party/setuptools/package_index.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..58572ce6636f9ab7f71788406d8430db1cd8520f |
--- /dev/null |
+++ b/recipe_engine/third_party/setuptools/package_index.py |
@@ -0,0 +1,1055 @@ |
+"""PyPI and direct package downloading""" |
+import sys |
+import os |
+import re |
+import shutil |
+import socket |
+import base64 |
+import hashlib |
+from functools import wraps |
+ |
+from pkg_resources import ( |
+ CHECKOUT_DIST, Distribution, BINARY_DIST, normalize_path, SOURCE_DIST, |
+ require, Environment, find_distributions, safe_name, safe_version, |
+ to_filename, Requirement, DEVELOP_DIST, |
+) |
+from setuptools import ssl_support |
+from distutils import log |
+from distutils.errors import DistutilsError |
+from setuptools.compat import (urllib2, httplib, StringIO, HTTPError, |
+ urlparse, urlunparse, unquote, splituser, |
+ url2pathname, name2codepoint, |
+ unichr, urljoin, urlsplit, urlunsplit, |
+ ConfigParser) |
+from setuptools.compat import filterfalse |
+from fnmatch import translate |
+from setuptools.py26compat import strip_fragment |
+from setuptools.py27compat import get_all_headers |
+ |
+EGG_FRAGMENT = re.compile(r'^egg=([-A-Za-z0-9_.]+)$') |
+HREF = re.compile("""href\\s*=\\s*['"]?([^'"> ]+)""", re.I) |
+# this is here to fix emacs' cruddy broken syntax highlighting |
+PYPI_MD5 = re.compile( |
+ '<a href="([^"#]+)">([^<]+)</a>\n\s+\\(<a (?:title="MD5 hash"\n\s+)' |
+ 'href="[^?]+\?:action=show_md5&digest=([0-9a-f]{32})">md5</a>\\)' |
+) |
+URL_SCHEME = re.compile('([-+.a-z0-9]{2,}):',re.I).match |
+EXTENSIONS = ".tar.gz .tar.bz2 .tar .zip .tgz".split() |
+ |
+__all__ = [ |
+ 'PackageIndex', 'distros_for_url', 'parse_bdist_wininst', |
+ 'interpret_distro_name', |
+] |
+ |
+_SOCKET_TIMEOUT = 15 |
+ |
+def parse_bdist_wininst(name): |
+ """Return (base,pyversion) or (None,None) for possible .exe name""" |
+ |
+ lower = name.lower() |
+ base, py_ver, plat = None, None, None |
+ |
+ if lower.endswith('.exe'): |
+ if lower.endswith('.win32.exe'): |
+ base = name[:-10] |
+ plat = 'win32' |
+ elif lower.startswith('.win32-py',-16): |
+ py_ver = name[-7:-4] |
+ base = name[:-16] |
+ plat = 'win32' |
+ elif lower.endswith('.win-amd64.exe'): |
+ base = name[:-14] |
+ plat = 'win-amd64' |
+ elif lower.startswith('.win-amd64-py',-20): |
+ py_ver = name[-7:-4] |
+ base = name[:-20] |
+ plat = 'win-amd64' |
+ return base,py_ver,plat |
+ |
+ |
+def egg_info_for_url(url): |
+ scheme, server, path, parameters, query, fragment = urlparse(url) |
+ base = unquote(path.split('/')[-1]) |
+ if server=='sourceforge.net' and base=='download': # XXX Yuck |
+ base = unquote(path.split('/')[-2]) |
+ if '#' in base: base, fragment = base.split('#',1) |
+ return base,fragment |
+ |
+def distros_for_url(url, metadata=None): |
+ """Yield egg or source distribution objects that might be found at a URL""" |
+ base, fragment = egg_info_for_url(url) |
+ for dist in distros_for_location(url, base, metadata): yield dist |
+ if fragment: |
+ match = EGG_FRAGMENT.match(fragment) |
+ if match: |
+ for dist in interpret_distro_name( |
+ url, match.group(1), metadata, precedence = CHECKOUT_DIST |
+ ): |
+ yield dist |
+ |
+def distros_for_location(location, basename, metadata=None): |
+ """Yield egg or source distribution objects based on basename""" |
+ if basename.endswith('.egg.zip'): |
+ basename = basename[:-4] # strip the .zip |
+ if basename.endswith('.egg') and '-' in basename: |
+ # only one, unambiguous interpretation |
+ return [Distribution.from_location(location, basename, metadata)] |
+ if basename.endswith('.exe'): |
+ win_base, py_ver, platform = parse_bdist_wininst(basename) |
+ if win_base is not None: |
+ return interpret_distro_name( |
+ location, win_base, metadata, py_ver, BINARY_DIST, platform |
+ ) |
+ # Try source distro extensions (.zip, .tgz, etc.) |
+ # |
+ for ext in EXTENSIONS: |
+ if basename.endswith(ext): |
+ basename = basename[:-len(ext)] |
+ return interpret_distro_name(location, basename, metadata) |
+ return [] # no extension matched |
+ |
+def distros_for_filename(filename, metadata=None): |
+ """Yield possible egg or source distribution objects based on a filename""" |
+ return distros_for_location( |
+ normalize_path(filename), os.path.basename(filename), metadata |
+ ) |
+ |
+ |
+def interpret_distro_name( |
+ location, basename, metadata, py_version=None, precedence=SOURCE_DIST, |
+ platform=None |
+ ): |
+ """Generate alternative interpretations of a source distro name |
+ |
+ Note: if `location` is a filesystem filename, you should call |
+ ``pkg_resources.normalize_path()`` on it before passing it to this |
+ routine! |
+ """ |
+ # Generate alternative interpretations of a source distro name |
+ # Because some packages are ambiguous as to name/versions split |
+ # e.g. "adns-python-1.1.0", "egenix-mx-commercial", etc. |
+ # So, we generate each possible interepretation (e.g. "adns, python-1.1.0" |
+ # "adns-python, 1.1.0", and "adns-python-1.1.0, no version"). In practice, |
+ # the spurious interpretations should be ignored, because in the event |
+ # there's also an "adns" package, the spurious "python-1.1.0" version will |
+ # compare lower than any numeric version number, and is therefore unlikely |
+ # to match a request for it. It's still a potential problem, though, and |
+ # in the long run PyPI and the distutils should go for "safe" names and |
+ # versions in distribution archive names (sdist and bdist). |
+ |
+ parts = basename.split('-') |
+ if not py_version: |
+ for i,p in enumerate(parts[2:]): |
+ if len(p)==5 and p.startswith('py2.'): |
+ return # It's a bdist_dumb, not an sdist -- bail out |
+ |
+ for p in range(1,len(parts)+1): |
+ yield Distribution( |
+ location, metadata, '-'.join(parts[:p]), '-'.join(parts[p:]), |
+ py_version=py_version, precedence = precedence, |
+ platform = platform |
+ ) |
+ |
+# From Python 2.7 docs |
+def unique_everseen(iterable, key=None): |
+ "List unique elements, preserving order. Remember all elements ever seen." |
+ # unique_everseen('AAAABBBCCDAABBB') --> A B C D |
+ # unique_everseen('ABBCcAD', str.lower) --> A B C D |
+ seen = set() |
+ seen_add = seen.add |
+ if key is None: |
+ for element in filterfalse(seen.__contains__, iterable): |
+ seen_add(element) |
+ yield element |
+ else: |
+ for element in iterable: |
+ k = key(element) |
+ if k not in seen: |
+ seen_add(k) |
+ yield element |
+ |
+def unique_values(func): |
+ """ |
+ Wrap a function returning an iterable such that the resulting iterable |
+ only ever yields unique items. |
+ """ |
+ @wraps(func) |
+ def wrapper(*args, **kwargs): |
+ return unique_everseen(func(*args, **kwargs)) |
+ return wrapper |
+ |
+REL = re.compile("""<([^>]*\srel\s*=\s*['"]?([^'">]+)[^>]*)>""", re.I) |
+# this line is here to fix emacs' cruddy broken syntax highlighting |
+ |
+@unique_values |
+def find_external_links(url, page): |
+ """Find rel="homepage" and rel="download" links in `page`, yielding URLs""" |
+ |
+ for match in REL.finditer(page): |
+ tag, rel = match.groups() |
+ rels = set(map(str.strip, rel.lower().split(','))) |
+ if 'homepage' in rels or 'download' in rels: |
+ for match in HREF.finditer(tag): |
+ yield urljoin(url, htmldecode(match.group(1))) |
+ |
+ for tag in ("<th>Home Page", "<th>Download URL"): |
+ pos = page.find(tag) |
+ if pos!=-1: |
+ match = HREF.search(page,pos) |
+ if match: |
+ yield urljoin(url, htmldecode(match.group(1))) |
+ |
+user_agent = "Python-urllib/%s setuptools/%s" % ( |
+ sys.version[:3], require('setuptools')[0].version |
+) |
+ |
+class ContentChecker(object): |
+ """ |
+ A null content checker that defines the interface for checking content |
+ """ |
+ def feed(self, block): |
+ """ |
+ Feed a block of data to the hash. |
+ """ |
+ return |
+ |
+ def is_valid(self): |
+ """ |
+ Check the hash. Return False if validation fails. |
+ """ |
+ return True |
+ |
+ def report(self, reporter, template): |
+ """ |
+ Call reporter with information about the checker (hash name) |
+ substituted into the template. |
+ """ |
+ return |
+ |
+class HashChecker(ContentChecker): |
+ pattern = re.compile( |
+ r'(?P<hash_name>sha1|sha224|sha384|sha256|sha512|md5)=' |
+ r'(?P<expected>[a-f0-9]+)' |
+ ) |
+ |
+ def __init__(self, hash_name, expected): |
+ self.hash_name = hash_name |
+ self.hash = hashlib.new(hash_name) |
+ self.expected = expected |
+ |
+ @classmethod |
+ def from_url(cls, url): |
+ "Construct a (possibly null) ContentChecker from a URL" |
+ fragment = urlparse(url)[-1] |
+ if not fragment: |
+ return ContentChecker() |
+ match = cls.pattern.search(fragment) |
+ if not match: |
+ return ContentChecker() |
+ return cls(**match.groupdict()) |
+ |
+ def feed(self, block): |
+ self.hash.update(block) |
+ |
+ def is_valid(self): |
+ return self.hash.hexdigest() == self.expected |
+ |
+ def report(self, reporter, template): |
+ msg = template % self.hash_name |
+ return reporter(msg) |
+ |
+ |
+class PackageIndex(Environment): |
+ """A distribution index that scans web pages for download URLs""" |
+ |
+ def __init__( |
+ self, index_url="https://pypi.python.org/simple", hosts=('*',), |
+ ca_bundle=None, verify_ssl=True, *args, **kw |
+ ): |
+ Environment.__init__(self,*args,**kw) |
+ self.index_url = index_url + "/"[:not index_url.endswith('/')] |
+ self.scanned_urls = {} |
+ self.fetched_urls = {} |
+ self.package_pages = {} |
+ self.allows = re.compile('|'.join(map(translate,hosts))).match |
+ self.to_scan = [] |
+ if verify_ssl and ssl_support.is_available and (ca_bundle or ssl_support.find_ca_bundle()): |
+ self.opener = ssl_support.opener_for(ca_bundle) |
+ else: self.opener = urllib2.urlopen |
+ |
+ def process_url(self, url, retrieve=False): |
+ """Evaluate a URL as a possible download, and maybe retrieve it""" |
+ if url in self.scanned_urls and not retrieve: |
+ return |
+ self.scanned_urls[url] = True |
+ if not URL_SCHEME(url): |
+ self.process_filename(url) |
+ return |
+ else: |
+ dists = list(distros_for_url(url)) |
+ if dists: |
+ if not self.url_ok(url): |
+ return |
+ self.debug("Found link: %s", url) |
+ |
+ if dists or not retrieve or url in self.fetched_urls: |
+ list(map(self.add, dists)) |
+ return # don't need the actual page |
+ |
+ if not self.url_ok(url): |
+ self.fetched_urls[url] = True |
+ return |
+ |
+ self.info("Reading %s", url) |
+ self.fetched_urls[url] = True # prevent multiple fetch attempts |
+ f = self.open_url(url, "Download error on %s: %%s -- Some packages may not be found!" % url) |
+ if f is None: return |
+ self.fetched_urls[f.url] = True |
+ if 'html' not in f.headers.get('content-type', '').lower(): |
+ f.close() # not html, we can't process it |
+ return |
+ |
+ base = f.url # handle redirects |
+ page = f.read() |
+ if not isinstance(page, str): # We are in Python 3 and got bytes. We want str. |
+ if isinstance(f, HTTPError): |
+ # Errors have no charset, assume latin1: |
+ charset = 'latin-1' |
+ else: |
+ charset = f.headers.get_param('charset') or 'latin-1' |
+ page = page.decode(charset, "ignore") |
+ f.close() |
+ for match in HREF.finditer(page): |
+ link = urljoin(base, htmldecode(match.group(1))) |
+ self.process_url(link) |
+ if url.startswith(self.index_url) and getattr(f,'code',None)!=404: |
+ page = self.process_index(url, page) |
+ |
+ def process_filename(self, fn, nested=False): |
+ # process filenames or directories |
+ if not os.path.exists(fn): |
+ self.warn("Not found: %s", fn) |
+ return |
+ |
+ if os.path.isdir(fn) and not nested: |
+ path = os.path.realpath(fn) |
+ for item in os.listdir(path): |
+ self.process_filename(os.path.join(path,item), True) |
+ |
+ dists = distros_for_filename(fn) |
+ if dists: |
+ self.debug("Found: %s", fn) |
+ list(map(self.add, dists)) |
+ |
+ def url_ok(self, url, fatal=False): |
+ s = URL_SCHEME(url) |
+ if (s and s.group(1).lower()=='file') or self.allows(urlparse(url)[1]): |
+ return True |
+ msg = ("\nNote: Bypassing %s (disallowed host; see " |
+ "http://bit.ly/1dg9ijs for details).\n") |
+ if fatal: |
+ raise DistutilsError(msg % url) |
+ else: |
+ self.warn(msg, url) |
+ |
+ def scan_egg_links(self, search_path): |
+ for item in search_path: |
+ if os.path.isdir(item): |
+ for entry in os.listdir(item): |
+ if entry.endswith('.egg-link'): |
+ self.scan_egg_link(item, entry) |
+ |
+ def scan_egg_link(self, path, entry): |
+ lines = [_f for _f in map(str.strip, |
+ open(os.path.join(path, entry))) if _f] |
+ if len(lines)==2: |
+ for dist in find_distributions(os.path.join(path, lines[0])): |
+ dist.location = os.path.join(path, *lines) |
+ dist.precedence = SOURCE_DIST |
+ self.add(dist) |
+ |
+ def process_index(self,url,page): |
+ """Process the contents of a PyPI page""" |
+ def scan(link): |
+ # Process a URL to see if it's for a package page |
+ if link.startswith(self.index_url): |
+ parts = list(map( |
+ unquote, link[len(self.index_url):].split('/') |
+ )) |
+ if len(parts)==2 and '#' not in parts[1]: |
+ # it's a package page, sanitize and index it |
+ pkg = safe_name(parts[0]) |
+ ver = safe_version(parts[1]) |
+ self.package_pages.setdefault(pkg.lower(),{})[link] = True |
+ return to_filename(pkg), to_filename(ver) |
+ return None, None |
+ |
+ # process an index page into the package-page index |
+ for match in HREF.finditer(page): |
+ try: |
+ scan(urljoin(url, htmldecode(match.group(1)))) |
+ except ValueError: |
+ pass |
+ |
+ pkg, ver = scan(url) # ensure this page is in the page index |
+ if pkg: |
+ # process individual package page |
+ for new_url in find_external_links(url, page): |
+ # Process the found URL |
+ base, frag = egg_info_for_url(new_url) |
+ if base.endswith('.py') and not frag: |
+ if ver: |
+ new_url+='#egg=%s-%s' % (pkg,ver) |
+ else: |
+ self.need_version_info(url) |
+ self.scan_url(new_url) |
+ |
+ return PYPI_MD5.sub( |
+ lambda m: '<a href="%s#md5=%s">%s</a>' % m.group(1,3,2), page |
+ ) |
+ else: |
+ return "" # no sense double-scanning non-package pages |
+ |
+ def need_version_info(self, url): |
+ self.scan_all( |
+ "Page at %s links to .py file(s) without version info; an index " |
+ "scan is required.", url |
+ ) |
+ |
+ def scan_all(self, msg=None, *args): |
+ if self.index_url not in self.fetched_urls: |
+ if msg: self.warn(msg,*args) |
+ self.info( |
+ "Scanning index of all packages (this may take a while)" |
+ ) |
+ self.scan_url(self.index_url) |
+ |
+ def find_packages(self, requirement): |
+ self.scan_url(self.index_url + requirement.unsafe_name+'/') |
+ |
+ if not self.package_pages.get(requirement.key): |
+ # Fall back to safe version of the name |
+ self.scan_url(self.index_url + requirement.project_name+'/') |
+ |
+ if not self.package_pages.get(requirement.key): |
+ # We couldn't find the target package, so search the index page too |
+ self.not_found_in_index(requirement) |
+ |
+ for url in list(self.package_pages.get(requirement.key,())): |
+ # scan each page that might be related to the desired package |
+ self.scan_url(url) |
+ |
+ def obtain(self, requirement, installer=None): |
+ self.prescan() |
+ self.find_packages(requirement) |
+ for dist in self[requirement.key]: |
+ if dist in requirement: |
+ return dist |
+ self.debug("%s does not match %s", requirement, dist) |
+ return super(PackageIndex, self).obtain(requirement,installer) |
+ |
+ def check_hash(self, checker, filename, tfp): |
+ """ |
+ checker is a ContentChecker |
+ """ |
+ checker.report(self.debug, |
+ "Validating %%s checksum for %s" % filename) |
+ if not checker.is_valid(): |
+ tfp.close() |
+ os.unlink(filename) |
+ raise DistutilsError( |
+ "%s validation failed for %s; " |
+ "possible download problem?" % ( |
+ checker.hash.name, os.path.basename(filename)) |
+ ) |
+ |
+ def add_find_links(self, urls): |
+ """Add `urls` to the list that will be prescanned for searches""" |
+ for url in urls: |
+ if ( |
+ self.to_scan is None # if we have already "gone online" |
+ or not URL_SCHEME(url) # or it's a local file/directory |
+ or url.startswith('file:') |
+ or list(distros_for_url(url)) # or a direct package link |
+ ): |
+ # then go ahead and process it now |
+ self.scan_url(url) |
+ else: |
+ # otherwise, defer retrieval till later |
+ self.to_scan.append(url) |
+ |
+ def prescan(self): |
+ """Scan urls scheduled for prescanning (e.g. --find-links)""" |
+ if self.to_scan: |
+ list(map(self.scan_url, self.to_scan)) |
+ self.to_scan = None # from now on, go ahead and process immediately |
+ |
+ def not_found_in_index(self, requirement): |
+ if self[requirement.key]: # we've seen at least one distro |
+ meth, msg = self.info, "Couldn't retrieve index page for %r" |
+ else: # no distros seen for this name, might be misspelled |
+ meth, msg = (self.warn, |
+ "Couldn't find index page for %r (maybe misspelled?)") |
+ meth(msg, requirement.unsafe_name) |
+ self.scan_all() |
+ |
+ def download(self, spec, tmpdir): |
+ """Locate and/or download `spec` to `tmpdir`, returning a local path |
+ |
+ `spec` may be a ``Requirement`` object, or a string containing a URL, |
+ an existing local filename, or a project/version requirement spec |
+ (i.e. the string form of a ``Requirement`` object). If it is the URL |
+ of a .py file with an unambiguous ``#egg=name-version`` tag (i.e., one |
+ that escapes ``-`` as ``_`` throughout), a trivial ``setup.py`` is |
+ automatically created alongside the downloaded file. |
+ |
+ If `spec` is a ``Requirement`` object or a string containing a |
+ project/version requirement spec, this method returns the location of |
+ a matching distribution (possibly after downloading it to `tmpdir`). |
+ If `spec` is a locally existing file or directory name, it is simply |
+ returned unchanged. If `spec` is a URL, it is downloaded to a subpath |
+ of `tmpdir`, and the local filename is returned. Various errors may be |
+ raised if a problem occurs during downloading. |
+ """ |
+ if not isinstance(spec,Requirement): |
+ scheme = URL_SCHEME(spec) |
+ if scheme: |
+ # It's a url, download it to tmpdir |
+ found = self._download_url(scheme.group(1), spec, tmpdir) |
+ base, fragment = egg_info_for_url(spec) |
+ if base.endswith('.py'): |
+ found = self.gen_setup(found,fragment,tmpdir) |
+ return found |
+ elif os.path.exists(spec): |
+ # Existing file or directory, just return it |
+ return spec |
+ else: |
+ try: |
+ spec = Requirement.parse(spec) |
+ except ValueError: |
+ raise DistutilsError( |
+ "Not a URL, existing file, or requirement spec: %r" % |
+ (spec,) |
+ ) |
+ return getattr(self.fetch_distribution(spec, tmpdir),'location',None) |
+ |
+ def fetch_distribution( |
+ self, requirement, tmpdir, force_scan=False, source=False, |
+ develop_ok=False, local_index=None |
+ ): |
+ """Obtain a distribution suitable for fulfilling `requirement` |
+ |
+ `requirement` must be a ``pkg_resources.Requirement`` instance. |
+ If necessary, or if the `force_scan` flag is set, the requirement is |
+ searched for in the (online) package index as well as the locally |
+ installed packages. If a distribution matching `requirement` is found, |
+ the returned distribution's ``location`` is the value you would have |
+ gotten from calling the ``download()`` method with the matching |
+ distribution's URL or filename. If no matching distribution is found, |
+ ``None`` is returned. |
+ |
+ If the `source` flag is set, only source distributions and source |
+ checkout links will be considered. Unless the `develop_ok` flag is |
+ set, development and system eggs (i.e., those using the ``.egg-info`` |
+ format) will be ignored. |
+ """ |
+ # process a Requirement |
+ self.info("Searching for %s", requirement) |
+ skipped = {} |
+ dist = None |
+ |
+ def find(req, env=None): |
+ if env is None: |
+ env = self |
+ # Find a matching distribution; may be called more than once |
+ |
+ for dist in env[req.key]: |
+ |
+ if dist.precedence==DEVELOP_DIST and not develop_ok: |
+ if dist not in skipped: |
+ self.warn("Skipping development or system egg: %s",dist) |
+ skipped[dist] = 1 |
+ continue |
+ |
+ if dist in req and (dist.precedence<=SOURCE_DIST or not source): |
+ return dist |
+ |
+ if force_scan: |
+ self.prescan() |
+ self.find_packages(requirement) |
+ dist = find(requirement) |
+ |
+ if local_index is not None: |
+ dist = dist or find(requirement, local_index) |
+ |
+ if dist is None: |
+ if self.to_scan is not None: |
+ self.prescan() |
+ dist = find(requirement) |
+ |
+ if dist is None and not force_scan: |
+ self.find_packages(requirement) |
+ dist = find(requirement) |
+ |
+ if dist is None: |
+ self.warn( |
+ "No local packages or download links found for %s%s", |
+ (source and "a source distribution of " or ""), |
+ requirement, |
+ ) |
+ else: |
+ self.info("Best match: %s", dist) |
+ return dist.clone(location=self.download(dist.location, tmpdir)) |
+ |
+ def fetch(self, requirement, tmpdir, force_scan=False, source=False): |
+ """Obtain a file suitable for fulfilling `requirement` |
+ |
+ DEPRECATED; use the ``fetch_distribution()`` method now instead. For |
+ backward compatibility, this routine is identical but returns the |
+ ``location`` of the downloaded distribution instead of a distribution |
+ object. |
+ """ |
+ dist = self.fetch_distribution(requirement,tmpdir,force_scan,source) |
+ if dist is not None: |
+ return dist.location |
+ return None |
+ |
+ def gen_setup(self, filename, fragment, tmpdir): |
+ match = EGG_FRAGMENT.match(fragment) |
+ dists = match and [ |
+ d for d in |
+ interpret_distro_name(filename, match.group(1), None) if d.version |
+ ] or [] |
+ |
+ if len(dists)==1: # unambiguous ``#egg`` fragment |
+ basename = os.path.basename(filename) |
+ |
+ # Make sure the file has been downloaded to the temp dir. |
+ if os.path.dirname(filename) != tmpdir: |
+ dst = os.path.join(tmpdir, basename) |
+ from setuptools.command.easy_install import samefile |
+ if not samefile(filename, dst): |
+ shutil.copy2(filename, dst) |
+ filename=dst |
+ |
+ with open(os.path.join(tmpdir, 'setup.py'), 'w') as file: |
+ file.write( |
+ "from setuptools import setup\n" |
+ "setup(name=%r, version=%r, py_modules=[%r])\n" |
+ % ( |
+ dists[0].project_name, dists[0].version, |
+ os.path.splitext(basename)[0] |
+ ) |
+ ) |
+ return filename |
+ |
+ elif match: |
+ raise DistutilsError( |
+ "Can't unambiguously interpret project/version identifier %r; " |
+ "any dashes in the name or version should be escaped using " |
+ "underscores. %r" % (fragment,dists) |
+ ) |
+ else: |
+ raise DistutilsError( |
+ "Can't process plain .py files without an '#egg=name-version'" |
+ " suffix to enable automatic setup script generation." |
+ ) |
+ |
+ dl_blocksize = 8192 |
+ def _download_to(self, url, filename): |
+ self.info("Downloading %s", url) |
+ # Download the file |
+ fp, info = None, None |
+ try: |
+ checker = HashChecker.from_url(url) |
+ fp = self.open_url(strip_fragment(url)) |
+ if isinstance(fp, HTTPError): |
+ raise DistutilsError( |
+ "Can't download %s: %s %s" % (url, fp.code,fp.msg) |
+ ) |
+ headers = fp.info() |
+ blocknum = 0 |
+ bs = self.dl_blocksize |
+ size = -1 |
+ if "content-length" in headers: |
+ # Some servers return multiple Content-Length headers :( |
+ sizes = get_all_headers(headers, 'Content-Length') |
+ size = max(map(int, sizes)) |
+ self.reporthook(url, filename, blocknum, bs, size) |
+ with open(filename,'wb') as tfp: |
+ while True: |
+ block = fp.read(bs) |
+ if block: |
+ checker.feed(block) |
+ tfp.write(block) |
+ blocknum += 1 |
+ self.reporthook(url, filename, blocknum, bs, size) |
+ else: |
+ break |
+ self.check_hash(checker, filename, tfp) |
+ return headers |
+ finally: |
+ if fp: fp.close() |
+ |
+ def reporthook(self, url, filename, blocknum, blksize, size): |
+ pass # no-op |
+ |
+ def open_url(self, url, warning=None): |
+ if url.startswith('file:'): |
+ return local_open(url) |
+ try: |
+ return open_with_auth(url, self.opener) |
+ except (ValueError, httplib.InvalidURL): |
+ v = sys.exc_info()[1] |
+ msg = ' '.join([str(arg) for arg in v.args]) |
+ if warning: |
+ self.warn(warning, msg) |
+ else: |
+ raise DistutilsError('%s %s' % (url, msg)) |
+ except urllib2.HTTPError: |
+ v = sys.exc_info()[1] |
+ return v |
+ except urllib2.URLError: |
+ v = sys.exc_info()[1] |
+ if warning: |
+ self.warn(warning, v.reason) |
+ else: |
+ raise DistutilsError("Download error for %s: %s" |
+ % (url, v.reason)) |
+ except httplib.BadStatusLine: |
+ v = sys.exc_info()[1] |
+ if warning: |
+ self.warn(warning, v.line) |
+ else: |
+ raise DistutilsError( |
+ '%s returned a bad status line. The server might be ' |
+ 'down, %s' % |
+ (url, v.line) |
+ ) |
+ except httplib.HTTPException: |
+ v = sys.exc_info()[1] |
+ if warning: |
+ self.warn(warning, v) |
+ else: |
+ raise DistutilsError("Download error for %s: %s" |
+ % (url, v)) |
+ |
+ def _download_url(self, scheme, url, tmpdir): |
+ # Determine download filename |
+ # |
+ name, fragment = egg_info_for_url(url) |
+ if name: |
+ while '..' in name: |
+ name = name.replace('..','.').replace('\\','_') |
+ else: |
+ name = "__downloaded__" # default if URL has no path contents |
+ |
+ if name.endswith('.egg.zip'): |
+ name = name[:-4] # strip the extra .zip before download |
+ |
+ filename = os.path.join(tmpdir,name) |
+ |
+ # Download the file |
+ # |
+ if scheme=='svn' or scheme.startswith('svn+'): |
+ return self._download_svn(url, filename) |
+ elif scheme=='git' or scheme.startswith('git+'): |
+ return self._download_git(url, filename) |
+ elif scheme.startswith('hg+'): |
+ return self._download_hg(url, filename) |
+ elif scheme=='file': |
+ return url2pathname(urlparse(url)[2]) |
+ else: |
+ self.url_ok(url, True) # raises error if not allowed |
+ return self._attempt_download(url, filename) |
+ |
+ def scan_url(self, url): |
+ self.process_url(url, True) |
+ |
+ def _attempt_download(self, url, filename): |
+ headers = self._download_to(url, filename) |
+ if 'html' in headers.get('content-type','').lower(): |
+ return self._download_html(url, headers, filename) |
+ else: |
+ return filename |
+ |
+ def _download_html(self, url, headers, filename): |
+ file = open(filename) |
+ for line in file: |
+ if line.strip(): |
+ # Check for a subversion index page |
+ if re.search(r'<title>([^- ]+ - )?Revision \d+:', line): |
+ # it's a subversion index page: |
+ file.close() |
+ os.unlink(filename) |
+ return self._download_svn(url, filename) |
+ break # not an index page |
+ file.close() |
+ os.unlink(filename) |
+ raise DistutilsError("Unexpected HTML page found at "+url) |
+ |
+ def _download_svn(self, url, filename): |
+ url = url.split('#',1)[0] # remove any fragment for svn's sake |
+ creds = '' |
+ if url.lower().startswith('svn:') and '@' in url: |
+ scheme, netloc, path, p, q, f = urlparse(url) |
+ if not netloc and path.startswith('//') and '/' in path[2:]: |
+ netloc, path = path[2:].split('/',1) |
+ auth, host = splituser(netloc) |
+ if auth: |
+ if ':' in auth: |
+ user, pw = auth.split(':',1) |
+ creds = " --username=%s --password=%s" % (user, pw) |
+ else: |
+ creds = " --username="+auth |
+ netloc = host |
+ url = urlunparse((scheme, netloc, url, p, q, f)) |
+ self.info("Doing subversion checkout from %s to %s", url, filename) |
+ os.system("svn checkout%s -q %s %s" % (creds, url, filename)) |
+ return filename |
+ |
+ @staticmethod |
+ def _vcs_split_rev_from_url(url, pop_prefix=False): |
+ scheme, netloc, path, query, frag = urlsplit(url) |
+ |
+ scheme = scheme.split('+', 1)[-1] |
+ |
+ # Some fragment identification fails |
+ path = path.split('#',1)[0] |
+ |
+ rev = None |
+ if '@' in path: |
+ path, rev = path.rsplit('@', 1) |
+ |
+ # Also, discard fragment |
+ url = urlunsplit((scheme, netloc, path, query, '')) |
+ |
+ return url, rev |
+ |
+ def _download_git(self, url, filename): |
+ filename = filename.split('#',1)[0] |
+ url, rev = self._vcs_split_rev_from_url(url, pop_prefix=True) |
+ |
+ self.info("Doing git clone from %s to %s", url, filename) |
+ os.system("git clone --quiet %s %s" % (url, filename)) |
+ |
+ if rev is not None: |
+ self.info("Checking out %s", rev) |
+ os.system("(cd %s && git checkout --quiet %s)" % ( |
+ filename, |
+ rev, |
+ )) |
+ |
+ return filename |
+ |
+ def _download_hg(self, url, filename): |
+ filename = filename.split('#',1)[0] |
+ url, rev = self._vcs_split_rev_from_url(url, pop_prefix=True) |
+ |
+ self.info("Doing hg clone from %s to %s", url, filename) |
+ os.system("hg clone --quiet %s %s" % (url, filename)) |
+ |
+ if rev is not None: |
+ self.info("Updating to %s", rev) |
+ os.system("(cd %s && hg up -C -r %s >&-)" % ( |
+ filename, |
+ rev, |
+ )) |
+ |
+ return filename |
+ |
+ def debug(self, msg, *args): |
+ log.debug(msg, *args) |
+ |
+ def info(self, msg, *args): |
+ log.info(msg, *args) |
+ |
+ def warn(self, msg, *args): |
+ log.warn(msg, *args) |
+ |
+# This pattern matches a character entity reference (a decimal numeric |
+# references, a hexadecimal numeric reference, or a named reference). |
+entity_sub = re.compile(r'&(#(\d+|x[\da-fA-F]+)|[\w.:-]+);?').sub |
+ |
+def uchr(c): |
+ if not isinstance(c, int): |
+ return c |
+ if c>255: return unichr(c) |
+ return chr(c) |
+ |
+def decode_entity(match): |
+ what = match.group(1) |
+ if what.startswith('#x'): |
+ what = int(what[2:], 16) |
+ elif what.startswith('#'): |
+ what = int(what[1:]) |
+ else: |
+ what = name2codepoint.get(what, match.group(0)) |
+ return uchr(what) |
+ |
+def htmldecode(text): |
+ """Decode HTML entities in the given text.""" |
+ return entity_sub(decode_entity, text) |
+ |
+def socket_timeout(timeout=15): |
+ def _socket_timeout(func): |
+ def _socket_timeout(*args, **kwargs): |
+ old_timeout = socket.getdefaulttimeout() |
+ socket.setdefaulttimeout(timeout) |
+ try: |
+ return func(*args, **kwargs) |
+ finally: |
+ socket.setdefaulttimeout(old_timeout) |
+ return _socket_timeout |
+ return _socket_timeout |
+ |
+def _encode_auth(auth): |
+ """ |
+ A function compatible with Python 2.3-3.3 that will encode |
+ auth from a URL suitable for an HTTP header. |
+ >>> str(_encode_auth('username%3Apassword')) |
+ 'dXNlcm5hbWU6cGFzc3dvcmQ=' |
+ |
+ Long auth strings should not cause a newline to be inserted. |
+ >>> long_auth = 'username:' + 'password'*10 |
+ >>> chr(10) in str(_encode_auth(long_auth)) |
+ False |
+ """ |
+ auth_s = unquote(auth) |
+ # convert to bytes |
+ auth_bytes = auth_s.encode() |
+ # use the legacy interface for Python 2.3 support |
+ encoded_bytes = base64.encodestring(auth_bytes) |
+ # convert back to a string |
+ encoded = encoded_bytes.decode() |
+ # strip the trailing carriage return |
+ return encoded.replace('\n','') |
+ |
+class Credential(object): |
+ """ |
+ A username/password pair. Use like a namedtuple. |
+ """ |
+ def __init__(self, username, password): |
+ self.username = username |
+ self.password = password |
+ |
+ def __iter__(self): |
+ yield self.username |
+ yield self.password |
+ |
+ def __str__(self): |
+ return '%(username)s:%(password)s' % vars(self) |
+ |
+class PyPIConfig(ConfigParser.ConfigParser): |
+ |
+ def __init__(self): |
+ """ |
+ Load from ~/.pypirc |
+ """ |
+ defaults = dict.fromkeys(['username', 'password', 'repository'], '') |
+ ConfigParser.ConfigParser.__init__(self, defaults) |
+ |
+ rc = os.path.join(os.path.expanduser('~'), '.pypirc') |
+ if os.path.exists(rc): |
+ self.read(rc) |
+ |
+ @property |
+ def creds_by_repository(self): |
+ sections_with_repositories = [ |
+ section for section in self.sections() |
+ if self.get(section, 'repository').strip() |
+ ] |
+ |
+ return dict(map(self._get_repo_cred, sections_with_repositories)) |
+ |
+ def _get_repo_cred(self, section): |
+ repo = self.get(section, 'repository').strip() |
+ return repo, Credential( |
+ self.get(section, 'username').strip(), |
+ self.get(section, 'password').strip(), |
+ ) |
+ |
+ def find_credential(self, url): |
+ """ |
+ If the URL indicated appears to be a repository defined in this |
+ config, return the credential for that repository. |
+ """ |
+ for repository, cred in self.creds_by_repository.items(): |
+ if url.startswith(repository): |
+ return cred |
+ |
+ |
+def open_with_auth(url, opener=urllib2.urlopen): |
+ """Open a urllib2 request, handling HTTP authentication""" |
+ |
+ scheme, netloc, path, params, query, frag = urlparse(url) |
+ |
+ # Double scheme does not raise on Mac OS X as revealed by a |
+ # failing test. We would expect "nonnumeric port". Refs #20. |
+ if netloc.endswith(':'): |
+ raise httplib.InvalidURL("nonnumeric port: ''") |
+ |
+ if scheme in ('http', 'https'): |
+ auth, host = splituser(netloc) |
+ else: |
+ auth = None |
+ |
+ if not auth: |
+ cred = PyPIConfig().find_credential(url) |
+ if cred: |
+ auth = str(cred) |
+ info = cred.username, url |
+ log.info('Authenticating as %s for %s (from .pypirc)' % info) |
+ |
+ if auth: |
+ auth = "Basic " + _encode_auth(auth) |
+ new_url = urlunparse((scheme,host,path,params,query,frag)) |
+ request = urllib2.Request(new_url) |
+ request.add_header("Authorization", auth) |
+ else: |
+ request = urllib2.Request(url) |
+ |
+ request.add_header('User-Agent', user_agent) |
+ fp = opener(request) |
+ |
+ if auth: |
+ # Put authentication info back into request URL if same host, |
+ # so that links found on the page will work |
+ s2, h2, path2, param2, query2, frag2 = urlparse(fp.url) |
+ if s2==scheme and h2==host: |
+ fp.url = urlunparse((s2,netloc,path2,param2,query2,frag2)) |
+ |
+ return fp |
+ |
+# adding a timeout to avoid freezing package_index |
+open_with_auth = socket_timeout(_SOCKET_TIMEOUT)(open_with_auth) |
+ |
+ |
+def fix_sf_url(url): |
+ return url # backward compatibility |
+ |
+def local_open(url): |
+ """Read a local path, with special support for directories""" |
+ scheme, server, path, param, query, frag = urlparse(url) |
+ filename = url2pathname(path) |
+ if os.path.isfile(filename): |
+ return urllib2.urlopen(url) |
+ elif path.endswith('/') and os.path.isdir(filename): |
+ files = [] |
+ for f in os.listdir(filename): |
+ if f=='index.html': |
+ with open(os.path.join(filename,f),'r') as fp: |
+ body = fp.read() |
+ break |
+ elif os.path.isdir(os.path.join(filename,f)): |
+ f+='/' |
+ files.append("<a href=%r>%s</a>" % (f,f)) |
+ else: |
+ body = ("<html><head><title>%s</title>" % url) + \ |
+ "</head><body>%s</body></html>" % '\n'.join(files) |
+ status, message = 200, "OK" |
+ else: |
+ status, message, body = 404, "Path not found", "Not found" |
+ |
+ headers = {'content-type': 'text/html'} |
+ return HTTPError(url, status, message, headers, StringIO(body)) |