[tor-commits] [stem/master] Conforming to E225 (missing whitespace around operator)

atagar at torproject.org atagar at torproject.org
Mon Jan 7 09:08:00 UTC 2013


commit 28a39f1127c7b455076e86364eb4880ae19e9c18
Author: Damian Johnson <atagar at torproject.org>
Date:   Sun Jan 6 20:12:50 2013 -0800

    Conforming to E225 (missing whitespace around operator)
    
    Ok, PEP8 is trying to make me like it again. These I definitely agree with.
    Shame on me for letting 'em slip in.
---
 stem/control.py          |    4 ++--
 test/check_whitespace.py |    2 +-
 test/mocking.py          |   24 ++++++++++++++++++++----
 3 files changed, 23 insertions(+), 7 deletions(-)

diff --git a/stem/control.py b/stem/control.py
index 6dfb7f2..6435c38 100644
--- a/stem/control.py
+++ b/stem/control.py
@@ -1676,7 +1676,7 @@ class Controller(BaseController):
     :raises: :class:`stem.InvalidRequest` if not enough information is provided
     """
     
-    response = self.msg("CLOSECIRCUIT %s %s"% (str(circuit_id), flag))
+    response = self.msg("CLOSECIRCUIT %s %s" % (circuit_id, flag))
     stem.response.convert("SINGLELINE", response)
     
     if not response.is_ok():
@@ -1757,7 +1757,7 @@ class Controller(BaseController):
     # there's a single value offset between RelayEndReason.index_of() and the
     # value that tor expects since tor's value starts with the index of one
     
-    response = self.msg("CLOSESTREAM %s %s %s"% (stream_id, stem.RelayEndReason.index_of(reason) + 1, flag))
+    response = self.msg("CLOSESTREAM %s %s %s" % (stream_id, stem.RelayEndReason.index_of(reason) + 1, flag))
     stem.response.convert("SINGLELINE", response)
     
     if not response.is_ok():
diff --git a/test/check_whitespace.py b/test/check_whitespace.py
index d6ad946..7bb1437 100644
--- a/test/check_whitespace.py
+++ b/test/check_whitespace.py
@@ -47,7 +47,7 @@ def pep8_issues(base_path = DEFAULT_TARGET):
   # We're gonna trim these down by cateogry but include the pep8 checks to
   # prevent regression.
   
-  ignored_issues = "E111,E121,W293,E501,E302,E701,E251,E261,W391,E127,E241,E128,E226,E231,E202,E201,E203,E124,E211,E222,E225"
+  ignored_issues = "E111,E121,W293,E501,E302,E701,E251,E261,W391,E127,E241,E128,E226,E231,E202,E201,E203,E124,E211,E222"
   
   issues = {}
   pep8_output = system.call("pep8 --ignore %s %s" % (ignored_issues, base_path))
diff --git a/test/mocking.py b/test/mocking.py
index 259d88d..693d977 100644
--- a/test/mocking.py
+++ b/test/mocking.py
@@ -859,61 +859,76 @@ def sign_descriptor_content(desc_content):
     public_key_string = base64.b64encode(seq_as_string)
     
     # split public key into lines 64 characters long
-    public_key_string =  public_key_string [:64] + "\n" +public_key_string[64:128] +"\n" +public_key_string[128:]
+    public_key_string =  public_key_string [:64] + "\n" + public_key_string[64:128] + "\n" + public_key_string[128:]
     
     # generate the new signing key string
+    
     signing_key_token = "\nsigning-key\n" # note the trailing '\n' is important here so as not to match the string elsewhere
     signing_key_token_start = "-----BEGIN RSA PUBLIC KEY-----\n"
     signing_key_token_end = "\n-----END RSA PUBLIC KEY-----\n"
-    new_sk = signing_key_token+ signing_key_token_start+public_key_string+signing_key_token_end
+    new_sk = signing_key_token + signing_key_token_start + public_key_string + signing_key_token_end
     
     # update the descriptor string with the new signing key
+    
     skt_start = desc_content.find(signing_key_token)
     skt_end = desc_content.find(signing_key_token_end, skt_start)
-    desc_content = desc_content[:skt_start]+new_sk+ desc_content[skt_end+len(signing_key_token_end):]
+    desc_content = desc_content[:skt_start] + new_sk + desc_content[skt_end + len(signing_key_token_end):]
     
     # generate the new fingerprint string
+    
     key_hash = hashlib.sha1(seq_as_string).hexdigest().upper()
     grouped_fingerprint = ""
+    
     for x in range(0, len(key_hash), 4):
       grouped_fingerprint += " " + key_hash[x:x+4]
       fingerprint_token = "\nfingerprint"
       new_fp = fingerprint_token + grouped_fingerprint
       
     # update the descriptor string with the new fingerprint
+    
     ft_start = desc_content.find(fingerprint_token)
     if ft_start < 0:
       fingerprint_token = "\nopt fingerprint"
       ft_start = desc_content.find(fingerprint_token)
     
     # if the descriptor does not already contain a fingerprint do not add one
+    
     if ft_start >= 0:
       ft_end = desc_content.find("\n", ft_start+1)
       desc_content = desc_content[:ft_start]+new_fp+desc_content[ft_end:]
     
     # create a temporary object to use to calculate the digest
+    
     tempDesc = stem.descriptor.server_descriptor.RelayDescriptor(desc_content, validate=False)
+    
     # calculate the new digest for the descriptor
+    
     new_digest_hex = tempDesc.digest().lower()
+    
     # remove the hex encoding
+    
     new_digest = new_digest_hex.decode('hex')
     
     # Generate the digest buffer.
     #  block is 128 bytes in size
     #  2 bytes for the type info
     #  1 byte for the separator
+    
     padding = ""
+    
     for x in range(125 - len(new_digest)):
       padding += '\xFF'
       digestBuffer = '\x00\x01' + padding + '\x00' + new_digest
     
     # generate a new signature by signing the digest buffer with the private key
+    
     (signature, ) = private_key.sign(digestBuffer, None)
     signature_as_bytes = long_to_bytes(signature, 128)
     signature_base64 = base64.b64encode(signature_as_bytes)
-    signature_base64 =  signature_base64 [:64] + "\n" +signature_base64[64:128] +"\n" +signature_base64[128:]
+    signature_base64 = signature_base64 [:64] + "\n" + signature_base64[64:128] + "\n" + signature_base64[128:]
     
     # update the descriptor string with the new signature
+    
     router_signature_token = "\nrouter-signature\n"
     router_signature_start = "-----BEGIN SIGNATURE-----\n"
     router_signature_end = "\n-----END SIGNATURE-----\n"
@@ -921,3 +936,4 @@ def sign_descriptor_content(desc_content):
     desc_content = desc_content[:rst_start] + router_signature_token + router_signature_start + signature_base64 + router_signature_end
     
     return desc_content
+





More information about the tor-commits mailing list