Added nodes check
This commit is contained in:
parent
29ef5cba55
commit
10d301d784
3 changed files with 176 additions and 26 deletions
|
@ -34,7 +34,7 @@ usage: tox_savefile.py [-h]
|
||||||
[--command info|decrypt|nodes|edit]
|
[--command info|decrypt|nodes|edit]
|
||||||
[--info info|repr|yaml|json|pprint|nmap_udp|nmap_tcp]
|
[--info info|repr|yaml|json|pprint|nmap_udp|nmap_tcp]
|
||||||
[--indent INDENT]
|
[--indent INDENT]
|
||||||
[--nodes select_tcp|select_udp|select_version|nmap_tcp|nmap_udp,download]
|
[--nodes select_tcp|select_udp|select_version|nmap_tcp|nmap_udp|download|check]
|
||||||
[--download_nodes_url DOWNLOAD_NODES_URL]
|
[--download_nodes_url DOWNLOAD_NODES_URL]
|
||||||
[--edit help|section,num,key,val]
|
[--edit help|section,num,key,val]
|
||||||
[--output OUTPUT]
|
[--output OUTPUT]
|
||||||
|
@ -165,7 +165,7 @@ required. It's available in most distros, or <https://nmap.org/>
|
||||||
|
|
||||||
## Issues
|
## Issues
|
||||||
|
|
||||||
https://git.macaw.me/emdee/tox_profile/issues
|
https://git.plastiras.org/emdee/tox_profile/issues
|
||||||
|
|
||||||
## Future Directions
|
## Future Directions
|
||||||
|
|
||||||
|
@ -179,3 +179,6 @@ supporting multidevices:
|
||||||
|
|
||||||
There is a copy of the Tox [spec](https://toktok.ltd/spec.html)
|
There is a copy of the Tox [spec](https://toktok.ltd/spec.html)
|
||||||
in the repo - it is missing any description of the groups section.
|
in the repo - it is missing any description of the groups section.
|
||||||
|
|
||||||
|
Work on this project is suspended until the
|
||||||
|
[MultiDevice](https://git.plastiras.org/emdee/tox_profile/wiki/MultiDevice-Announcements-POC) problem is solved. Fork me!
|
||||||
|
|
189
tox_savefile.py
189
tox_savefile.py
|
@ -33,13 +33,14 @@ commands, or the filename of the nodes file for the nodes command.
|
||||||
--indent for pprint/yaml/json default=2
|
--indent for pprint/yaml/json default=2
|
||||||
|
|
||||||
--nodes
|
--nodes
|
||||||
choices=[select_tcp, select_udp, nmap_tcp, select_version, nmap_udp]
|
choices=[select_tcp, select_udp, nmap_tcp, select_version, nmap_udp, check, download]
|
||||||
select_udp - select udp nodes
|
select_udp - select udp nodes
|
||||||
select_tcp - select tcp nodes
|
select_tcp - select tcp nodes
|
||||||
nmap_udp - test UDP nodes with nmap
|
nmap_udp - test UDP nodes with nmap
|
||||||
nmap_tcp - test TCP nodes with nmap
|
nmap_tcp - test TCP nodes with nmap
|
||||||
select_version - select nodes that are the latest version
|
select_version - select nodes that are the latest version
|
||||||
download - download nodes from --download_nodes_url
|
download - download nodes from --download_nodes_url
|
||||||
|
check - check nodes from --download_nodes_url
|
||||||
--download_nodes_url https://nodes.tox.chat/json
|
--download_nodes_url https://nodes.tox.chat/json
|
||||||
|
|
||||||
--edit
|
--edit
|
||||||
|
@ -61,6 +62,7 @@ import logging
|
||||||
import argparse
|
import argparse
|
||||||
from pprint import pprint
|
from pprint import pprint
|
||||||
import shutil
|
import shutil
|
||||||
|
import json
|
||||||
|
|
||||||
try:
|
try:
|
||||||
# https://pypi.org/project/msgpack/
|
# https://pypi.org/project/msgpack/
|
||||||
|
@ -71,10 +73,6 @@ try:
|
||||||
import yaml
|
import yaml
|
||||||
except ImportError as e:
|
except ImportError as e:
|
||||||
yaml = None
|
yaml = None
|
||||||
try:
|
|
||||||
import json
|
|
||||||
except ImportError as e:
|
|
||||||
json = None
|
|
||||||
try:
|
try:
|
||||||
# https://pypi.org/project/coloredlogs/
|
# https://pypi.org/project/coloredlogs/
|
||||||
import coloredlogs
|
import coloredlogs
|
||||||
|
@ -86,8 +84,9 @@ try:
|
||||||
# https://git.plastiras.org/emdee/toxygen_wrapper
|
# https://git.plastiras.org/emdee/toxygen_wrapper
|
||||||
from wrapper.toxencryptsave import ToxEncryptSave
|
from wrapper.toxencryptsave import ToxEncryptSave
|
||||||
from wrapper_tests.support_http import download_url, bAreWeConnected
|
from wrapper_tests.support_http import download_url, bAreWeConnected
|
||||||
|
from wrapper_tests.support_testing import sTorResolve
|
||||||
except ImportError as e:
|
except ImportError as e:
|
||||||
print(f"Import Error {e}")
|
print(f"Import Warning {e}")
|
||||||
print("Download toxygen_wrapper to deal with encrypted tox files, from:")
|
print("Download toxygen_wrapper to deal with encrypted tox files, from:")
|
||||||
print("https://git.plastiras.org/emdee/toxygen_wrapper")
|
print("https://git.plastiras.org/emdee/toxygen_wrapper")
|
||||||
print("Just put the parent of the wrapper directory on your PYTHONPATH")
|
print("Just put the parent of the wrapper directory on your PYTHONPATH")
|
||||||
|
@ -96,13 +95,20 @@ except ImportError as e:
|
||||||
print("Link all 3 from libtoxcore.so if you have only libtoxcore.so")
|
print("Link all 3 from libtoxcore.so if you have only libtoxcore.so")
|
||||||
ToxEncryptSave = None
|
ToxEncryptSave = None
|
||||||
download_url = None
|
download_url = None
|
||||||
|
bAreWeConnected = None
|
||||||
|
sTorResolve = None
|
||||||
|
|
||||||
LOG = logging.getLogger('TSF')
|
LOG = logging.getLogger('TSF')
|
||||||
|
|
||||||
# Fix for Windows
|
# Fix for Windows
|
||||||
sDIR = os.environ.get('TMPDIR', '/tmp')
|
sDIR = os.environ.get('TMPDIR', '/tmp')
|
||||||
sTOX_VERSION = "1000002018"
|
sTOX_VERSION = "1000002018"
|
||||||
|
sVER_WANT = "1000002018"
|
||||||
|
# 3 months
|
||||||
|
iOLD_SECS = 60*60*24*30*3
|
||||||
|
|
||||||
bHAVE_NMAP = shutil.which('nmap')
|
bHAVE_NMAP = shutil.which('nmap')
|
||||||
|
bHAVE_TOR = shutil.which('tor')
|
||||||
bHAVE_JQ = shutil.which('jq')
|
bHAVE_JQ = shutil.which('jq')
|
||||||
bHAVE_BASH = shutil.which('bash')
|
bHAVE_BASH = shutil.which('bash')
|
||||||
bMARK = b'\x00\x00\x00\x00\x1f\x1b\xed\x15'
|
bMARK = b'\x00\x00\x00\x00\x1f\x1b\xed\x15'
|
||||||
|
@ -716,6 +722,142 @@ def vBashFileNmapUdp():
|
||||||
os.chmod(sFile, 0o0775)
|
os.chmod(sFile, 0o0775)
|
||||||
return sFile
|
return sFile
|
||||||
|
|
||||||
|
sBLURB = """
|
||||||
|
I see you have a torrc. You can help the network by running a bootstrap daemon
|
||||||
|
as a hidden service, or even using the --tcp_server option of your client.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def iNodesCheckNodes(json_nodes, oArgs):
|
||||||
|
"""
|
||||||
|
Checking NODES.json
|
||||||
|
"""
|
||||||
|
iWarns = 0
|
||||||
|
iErrs = 0
|
||||||
|
# assert type(json_nodes) == dict
|
||||||
|
for node in json_nodes:
|
||||||
|
for ipv in ['ipv4','ipv6']:
|
||||||
|
if not node[ipv] in lNULLS:
|
||||||
|
LOG.info(f"Checking {node[ipv]}")
|
||||||
|
for fam in ["status_tcp", "status_udp"]:
|
||||||
|
if node[ipv] in lNULLS \
|
||||||
|
and node[fam] in [True, "true"]:
|
||||||
|
LOG.warn(f"{ipv} {node[ipv]} in [-, 'NONE'] but node[{fam}] is true")
|
||||||
|
if bHAVE_NMAP and bAreWeConnected and bAreWeConnected() \
|
||||||
|
and not node[ipv] in lNULLS:
|
||||||
|
# nmap test the ipv4/ipv6
|
||||||
|
lElts = [[node[host], node[port], node[key]]]
|
||||||
|
ts.bootstrap_iNmapInfo(lElts, oArgs, bIS_LOCAL=False, iNODES=2)
|
||||||
|
|
||||||
|
if node['ipv4'] in lNULLS and node['ipv6'] in lNULLS and \
|
||||||
|
not node['tcp_ports'] and not '.onion' in node['location']:
|
||||||
|
LOG.warn("No ports to contact the daemon on")
|
||||||
|
|
||||||
|
if node["version"] < "1000002013":
|
||||||
|
iErrs += 1
|
||||||
|
LOG.error(f"vulnerable version {node['version']} < 1000002013")
|
||||||
|
elif node["version"] < sVER_WANT:
|
||||||
|
LOG.warn(f"outdated version {node['version']} < {sVER_WANT}")
|
||||||
|
|
||||||
|
# Put the onion address in the location after the country code
|
||||||
|
if len(node["location"]) not in [2, 65]:
|
||||||
|
LOG.warn(f"location {location} should be a 2 digit country code, or 'code onion'")
|
||||||
|
elif len(node["location"]) == 65 and \
|
||||||
|
not node["location"].endswith('.onion') :
|
||||||
|
LOG.warn(f"location {location} should be a 2 digit country code 'code onion'")
|
||||||
|
elif len(node["location"]) == 65 and \
|
||||||
|
node["location"].endswith('.onion') and bHAVE_TOR:
|
||||||
|
onion = node["location"][3:]
|
||||||
|
if bHAVE_TOR and bAreWeConnected and bAreWeConnected() \
|
||||||
|
and (not node[ipv] in lNULLS and
|
||||||
|
not node[ipv] in lNULLS ):
|
||||||
|
# torresolve the onion
|
||||||
|
# Fixme - see if tor is running
|
||||||
|
try:
|
||||||
|
s = sTorResolve(onion,
|
||||||
|
verbose=False,
|
||||||
|
sHost='127.0.0.1',
|
||||||
|
iPort=9050)
|
||||||
|
except:
|
||||||
|
# assume tor isnt running
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
if s:
|
||||||
|
LOG.info(f"Found an onion that resolves to {s}")
|
||||||
|
else:
|
||||||
|
LOG.warn(f"Found an onion that resolves to {s}")
|
||||||
|
|
||||||
|
if node['last_ping'] == 0:
|
||||||
|
iErrs += 1
|
||||||
|
LOG.error(f"node has never been pinged")
|
||||||
|
elif time.time() - node['last_ping'] > iOLD_SECS:
|
||||||
|
LOG.error(f"node has not been pinged in more than 3 months")
|
||||||
|
|
||||||
|
# suggestions YMMV
|
||||||
|
if str(node['port']).startswith('3344'):
|
||||||
|
LOG.debug(f"Maybe run on a non-standard port to resist blocking {node['port']}")
|
||||||
|
|
||||||
|
if node['tcp_ports']:
|
||||||
|
for port in node['tcp_ports']:
|
||||||
|
if str(port).startswith('3344') or port in [33445, 3389]:
|
||||||
|
LOG.debug(f"Maybe run tcp_ports on a non-standard port to resist blocking: {node['port']}")
|
||||||
|
|
||||||
|
if len(node['maintainer']) < 75 and len(node['motd']) < 75:
|
||||||
|
LOG.debug(f"Maybe add a ToxID: in the motd so people can contact you.")
|
||||||
|
elif len(node['maintainer']) > 75 and len(node['motd']) < 75:
|
||||||
|
LOG.debug(f"Maybe put the ToxID: in motd so people can contact you.")
|
||||||
|
elif len(node['maintainer']) > 0 and len(node['motd']) < 1:
|
||||||
|
LOG.debug(f"Maybe put a ToxID: in motd so people can contact you.")
|
||||||
|
|
||||||
|
# fixme look for /etc/tor/torrc but it may not be readable
|
||||||
|
if bHAVE_TOR and os.path.exists('/etc/tor/torrc'):
|
||||||
|
print(sBLURB)
|
||||||
|
return iErrs
|
||||||
|
|
||||||
|
def iNodesFileCheck(sProOrNodes):
|
||||||
|
try:
|
||||||
|
if not os.path.exists(sProOrNodes):
|
||||||
|
raise RuntimeError("iNodesFileCheck file not found " +sProOrNodes)
|
||||||
|
with open(sProOrNodes, 'rt') as fl:
|
||||||
|
json_nodes = json.loads(fl.read())['nodes']
|
||||||
|
except Exception as e:
|
||||||
|
LOG.exception(f"{oArgs.command} error reading {sProOrNodes}")
|
||||||
|
return 1
|
||||||
|
|
||||||
|
LOG.info(f"iNodesFileCheck checking JSON")
|
||||||
|
i = 0
|
||||||
|
try:
|
||||||
|
i = iNodesCheckNodes(json_nodes, oArgs)
|
||||||
|
except Exception as e:
|
||||||
|
LOG.exception(f"iNodesFileCheck error checking JSON")
|
||||||
|
i = -2
|
||||||
|
else:
|
||||||
|
if i:
|
||||||
|
LOG.error(f"iNodesFileCheck {i} errors in {sProOrNodes}")
|
||||||
|
else:
|
||||||
|
LOG.info(f"iNodesFileCheck NO errors in {sProOrNodes}")
|
||||||
|
return i
|
||||||
|
|
||||||
|
def iNodesFileClean(sProOrNodes):
|
||||||
|
# unused
|
||||||
|
return 0
|
||||||
|
f = "DHTNodes.clean"
|
||||||
|
if not oArgs.output:
|
||||||
|
sOut = os.path.join(sDIR, f)
|
||||||
|
else:
|
||||||
|
sOut = oArgs.output
|
||||||
|
|
||||||
|
try:
|
||||||
|
LOG.debug(f"iNodesFileClean saving to {sOut}")
|
||||||
|
oStream = open(sOut, 'wt', encoding=sENC)
|
||||||
|
json.dump(aOUT, oStream, indent=oArgs.indent)
|
||||||
|
if oStream.write('\n') > 0: iRet = 0
|
||||||
|
except Exception as e:
|
||||||
|
LOG.exception(f"iNodesFileClean error dumping JSON to {sOUT}")
|
||||||
|
return 3
|
||||||
|
|
||||||
|
LOG.info(f"{oArgs.info}ing iRet={iRet} to {oArgs.output}")
|
||||||
|
return 0
|
||||||
|
|
||||||
def vOsSystemNmapUdp(l, oArgs):
|
def vOsSystemNmapUdp(l, oArgs):
|
||||||
iErrs = 0
|
iErrs = 0
|
||||||
for elt in aOUT["DHT"]:
|
for elt in aOUT["DHT"]:
|
||||||
|
@ -757,20 +899,20 @@ def vSetupLogging(loglevel=logging.DEBUG):
|
||||||
logging._defaultFormatter.default_time_format = '%m-%d %H:%M:%S'
|
logging._defaultFormatter.default_time_format = '%m-%d %H:%M:%S'
|
||||||
logging._defaultFormatter.default_msec_format = ''
|
logging._defaultFormatter.default_msec_format = ''
|
||||||
|
|
||||||
def iMain(sFile, oArgs):
|
def iMain(sProOrNodes, oArgs):
|
||||||
global bOUT, aOUT, sENC
|
global bOUT, aOUT, sENC
|
||||||
global bSAVE
|
global bSAVE
|
||||||
|
|
||||||
assert os.path.isfile(sFile), sFile
|
assert os.path.isfile(sProOrNodes), sProOrNodes
|
||||||
|
|
||||||
sENC = oArgs.encoding
|
sENC = oArgs.encoding
|
||||||
|
|
||||||
bSAVE = open(sFile, 'rb').read()
|
bSAVE = open(sProOrNodes, 'rb').read()
|
||||||
if ToxEncryptSave and bSAVE[:8] == b'toxEsave':
|
if ToxEncryptSave and bSAVE[:8] == b'toxEsave':
|
||||||
try:
|
try:
|
||||||
bSAVE = decrypt_data(bSAVE)
|
bSAVE = decrypt_data(bSAVE)
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
LOG.error(f"decrypting {sFile} - {e}")
|
LOG.error(f"decrypting {sProOrNodes} - {e}")
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
assert bSAVE
|
assert bSAVE
|
||||||
|
|
||||||
|
@ -793,7 +935,7 @@ def iMain(sFile, oArgs):
|
||||||
assert bHAVE_JQ, "jq is required for this command"
|
assert bHAVE_JQ, "jq is required for this command"
|
||||||
with open(oArgs.output, 'wt') as oFd:
|
with open(oArgs.output, 'wt') as oFd:
|
||||||
oFd.write(json_head)
|
oFd.write(json_head)
|
||||||
cmd = f"cat '{sFile}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_tcp)|select(.ipv4|match(\".\"))' "
|
cmd = f"cat '{sProOrNodes}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_tcp)|select(.ipv4|match(\".\"))' "
|
||||||
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
||||||
with open(oArgs.output, 'at') as oFd: oFd.write(']}\n')
|
with open(oArgs.output, 'at') as oFd: oFd.write(']}\n')
|
||||||
|
|
||||||
|
@ -802,7 +944,7 @@ def iMain(sFile, oArgs):
|
||||||
assert bHAVE_JQ, "jq is required for this command"
|
assert bHAVE_JQ, "jq is required for this command"
|
||||||
with open(oArgs.output, 'wt') as oFd:
|
with open(oArgs.output, 'wt') as oFd:
|
||||||
oFd.write(json_head)
|
oFd.write(json_head)
|
||||||
cmd = f"cat '{sFile}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_udp)|select(.ipv4|match(\".\"))' "
|
cmd = f"cat '{sProOrNodes}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_udp)|select(.ipv4|match(\".\"))' "
|
||||||
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
||||||
with open(oArgs.output, 'at') as oFd: oFd.write(']}\n')
|
with open(oArgs.output, 'at') as oFd: oFd.write(']}\n')
|
||||||
|
|
||||||
|
@ -811,7 +953,7 @@ def iMain(sFile, oArgs):
|
||||||
assert oArgs.output, "--output required for this command"
|
assert oArgs.output, "--output required for this command"
|
||||||
with open(oArgs.output, 'wt') as oFd:
|
with open(oArgs.output, 'wt') as oFd:
|
||||||
oFd.write(json_head)
|
oFd.write(json_head)
|
||||||
cmd = f"cat '{sFile}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_udp)|select(.version|match(\"{sTOX_VERSION}\"))'"
|
cmd = f"cat '{sProOrNodes}' | jq '.|with_entries(select(.key|match(\"nodes\"))).nodes[]|select(.status_udp)|select(.version|match(\"{sTOX_VERSION}\"))'"
|
||||||
|
|
||||||
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
iRet = os.system(cmd +"| sed -e '2,$s/^{/,{/'" +f" >>{oArgs.output}")
|
||||||
with open(oArgs.output, 'at') as oFd:
|
with open(oArgs.output, 'at') as oFd:
|
||||||
|
@ -822,14 +964,14 @@ def iMain(sFile, oArgs):
|
||||||
if not bAreWeConnected():
|
if not bAreWeConnected():
|
||||||
LOG.warn(f"{oArgs.nodes} we are not connected")
|
LOG.warn(f"{oArgs.nodes} we are not connected")
|
||||||
cmd = vBashFileNmapTcp()
|
cmd = vBashFileNmapTcp()
|
||||||
iRet = os.system(f"bash {cmd} < '{sFile}'" +f" >'{oArgs.output}'")
|
iRet = os.system(f"bash {cmd} < '{sProOrNodes}'" +f" >'{oArgs.output}'")
|
||||||
|
|
||||||
elif oArgs.nodes == 'nmap_udp':
|
elif oArgs.nodes == 'nmap_udp':
|
||||||
assert oArgs.output, "--output required for this command"
|
assert oArgs.output, "--output required for this command"
|
||||||
if not bAreWeConnected():
|
if not bAreWeConnected():
|
||||||
LOG.warn(f"{oArgs.nodes} we are not connected")
|
LOG.warn(f"{oArgs.nodes} we are not connected")
|
||||||
cmd = vBashFileNmapUdp()
|
cmd = vBashFileNmapUdp()
|
||||||
iRet = os.system(f"bash {cmd} < '{sFile}'" +f" >'{oArgs.output}'")
|
iRet = os.system(f"bash {cmd} < '{sProOrNodes}'" +f" >'{oArgs.output}'")
|
||||||
|
|
||||||
elif oArgs.nodes == 'download' and download_url:
|
elif oArgs.nodes == 'download' and download_url:
|
||||||
if not bAreWeConnected():
|
if not bAreWeConnected():
|
||||||
|
@ -849,6 +991,10 @@ def iMain(sFile, oArgs):
|
||||||
iRet = -1
|
iRet = -1
|
||||||
LOG.info(f"downloaded list of nodes to {oStream}")
|
LOG.info(f"downloaded list of nodes to {oStream}")
|
||||||
|
|
||||||
|
elif oArgs.nodes == 'check':
|
||||||
|
i = iNodesFileCheck(sProOrNodes)
|
||||||
|
return i
|
||||||
|
|
||||||
if iRet > 0:
|
if iRet > 0:
|
||||||
LOG.warn(f"{oArgs.nodes} iRet={iRet} to {oArgs.output}")
|
LOG.warn(f"{oArgs.nodes} iRet={iRet} to {oArgs.output}")
|
||||||
elif iRet == 0:
|
elif iRet == 0:
|
||||||
|
@ -945,7 +1091,7 @@ def oMainArgparser(_=None):
|
||||||
parser.add_argument('--info', type=str, default='info',
|
parser.add_argument('--info', type=str, default='info',
|
||||||
choices=choices,
|
choices=choices,
|
||||||
help='Format for info command')
|
help='Format for info command')
|
||||||
choices = []
|
choices = ['check']
|
||||||
if bHAVE_JQ:
|
if bHAVE_JQ:
|
||||||
choices += ['select_tcp', 'select_udp', 'select_version']
|
choices += ['select_tcp', 'select_udp', 'select_version']
|
||||||
if bHAVE_NMAP: choices += ['nmap_tcp', 'nmap_udp']
|
if bHAVE_NMAP: choices += ['nmap_tcp', 'nmap_udp']
|
||||||
|
@ -957,8 +1103,8 @@ def oMainArgparser(_=None):
|
||||||
parser.add_argument('--download_nodes_url', type=str,
|
parser.add_argument('--download_nodes_url', type=str,
|
||||||
default='https://nodes.tox.chat/json')
|
default='https://nodes.tox.chat/json')
|
||||||
parser.add_argument('--encoding', type=str, default=sENC)
|
parser.add_argument('--encoding', type=str, default=sENC)
|
||||||
parser.add_argument('profile', type=str, nargs='+', default=None,
|
parser.add_argument('lprofile', type=str, nargs='+', default=None,
|
||||||
help='tox profile file - may be encrypted')
|
help='tox profile files - may be encrypted')
|
||||||
return parser
|
return parser
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
@ -973,7 +1119,8 @@ if __name__ == '__main__':
|
||||||
sys.exit(0)
|
sys.exit(0)
|
||||||
|
|
||||||
vSetupLogging()
|
vSetupLogging()
|
||||||
for sFile in oArgs.profile:
|
i = 0
|
||||||
iMain(sFile, oArgs)
|
for sProOrNodes in oArgs.lprofile:
|
||||||
|
i = iMain(sProOrNodes, oArgs)
|
||||||
|
|
||||||
sys.exit(0)
|
sys.exit(i)
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
|
|
||||||
# tox_savefile.py has a lot of features so it needs test coverage
|
# tox_savefile.py has a lot of features so it needs test coverage
|
||||||
|
|
||||||
PREFIX=/o/var/local/src
|
PREFIX=/mnt/o/var/local/src
|
||||||
EXE=python3.sh
|
EXE=python3.sh
|
||||||
WRAPPER=$PREFIX/toxygen_wrapper
|
WRAPPER=$PREFIX/toxygen_wrapper
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue