240 lines
7.8 KiB
Python
240 lines
7.8 KiB
Python
"""Exceptions used throughout package"""
|
|
from __future__ import absolute_import
|
|
|
|
from itertools import chain, groupby, repeat
|
|
|
|
from pip._vendor.six import iteritems
|
|
|
|
|
|
class PipError(Exception):
|
|
"""Base pip exception"""
|
|
|
|
|
|
class InstallationError(PipError):
|
|
"""General exception during installation"""
|
|
|
|
|
|
class UninstallationError(PipError):
|
|
"""General exception during uninstallation"""
|
|
|
|
|
|
class DistributionNotFound(InstallationError):
|
|
"""Raised when a distribution cannot be found to satisfy a requirement"""
|
|
|
|
|
|
class RequirementsFileParseError(InstallationError):
|
|
"""Raised when a general error occurs parsing a requirements file line."""
|
|
|
|
|
|
class BestVersionAlreadyInstalled(PipError):
|
|
"""Raised when the most up-to-date version of a package is already
|
|
installed."""
|
|
|
|
|
|
class BadCommand(PipError):
|
|
"""Raised when virtualenv or a command is not found"""
|
|
|
|
|
|
class CommandError(PipError):
|
|
"""Raised when there is an error in command-line arguments"""
|
|
|
|
|
|
class PreviousBuildDirError(PipError):
|
|
"""Raised when there's a previous conflicting build directory"""
|
|
|
|
|
|
class InvalidWheelFilename(InstallationError):
|
|
"""Invalid wheel filename."""
|
|
|
|
|
|
class UnsupportedWheel(InstallationError):
|
|
"""Unsupported wheel."""
|
|
|
|
|
|
class HashErrors(InstallationError):
|
|
"""Multiple HashError instances rolled into one for reporting"""
|
|
|
|
def __init__(self):
|
|
self.errors = []
|
|
|
|
def append(self, error):
|
|
self.errors.append(error)
|
|
|
|
def __str__(self):
|
|
lines = []
|
|
self.errors.sort(key=lambda e: e.order)
|
|
for cls, errors_of_cls in groupby(self.errors, lambda e: e.__class__):
|
|
lines.append(cls.head)
|
|
lines.extend(e.body() for e in errors_of_cls)
|
|
if lines:
|
|
return '\n'.join(lines)
|
|
|
|
def __nonzero__(self):
|
|
return bool(self.errors)
|
|
|
|
def __bool__(self):
|
|
return self.__nonzero__()
|
|
|
|
|
|
class HashError(InstallationError):
|
|
"""
|
|
A failure to verify a package against known-good hashes
|
|
|
|
:cvar order: An int sorting hash exception classes by difficulty of
|
|
recovery (lower being harder), so the user doesn't bother fretting
|
|
about unpinned packages when he has deeper issues, like VCS
|
|
dependencies, to deal with. Also keeps error reports in a
|
|
deterministic order.
|
|
:cvar head: A section heading for display above potentially many
|
|
exceptions of this kind
|
|
:ivar req: The InstallRequirement that triggered this error. This is
|
|
pasted on after the exception is instantiated, because it's not
|
|
typically available earlier.
|
|
|
|
"""
|
|
req = None
|
|
head = ''
|
|
|
|
def body(self):
|
|
"""Return a summary of me for display under the heading.
|
|
|
|
This default implementation simply prints a description of the
|
|
triggering requirement.
|
|
|
|
:param req: The InstallRequirement that provoked this error, with
|
|
populate_link() having already been called
|
|
|
|
"""
|
|
return ' %s' % self._requirement_name()
|
|
|
|
def __str__(self):
|
|
return '%s\n%s' % (self.head, self.body())
|
|
|
|
def _requirement_name(self):
|
|
"""Return a description of the requirement that triggered me.
|
|
|
|
This default implementation returns long description of the req, with
|
|
line numbers
|
|
|
|
"""
|
|
return str(self.req) if self.req else 'unknown package'
|
|
|
|
|
|
class VcsHashUnsupported(HashError):
|
|
"""A hash was provided for a version-control-system-based requirement, but
|
|
we don't have a method for hashing those."""
|
|
|
|
order = 0
|
|
head = ("Can't verify hashes for these requirements because we don't "
|
|
"have a way to hash version control repositories:")
|
|
|
|
|
|
class DirectoryUrlHashUnsupported(HashError):
|
|
"""A hash was provided for a version-control-system-based requirement, but
|
|
we don't have a method for hashing those."""
|
|
|
|
order = 1
|
|
head = ("Can't verify hashes for these file:// requirements because they "
|
|
"point to directories:")
|
|
|
|
|
|
class HashMissing(HashError):
|
|
"""A hash was needed for a requirement but is absent."""
|
|
|
|
order = 2
|
|
head = ('Hashes are required in --require-hashes mode, but they are '
|
|
'missing from some requirements. Here is a list of those '
|
|
'requirements along with the hashes their downloaded archives '
|
|
'actually had. Add lines like these to your requirements files to '
|
|
'prevent tampering. (If you did not enable --require-hashes '
|
|
'manually, note that it turns on automatically when any package '
|
|
'has a hash.)')
|
|
|
|
def __init__(self, gotten_hash):
|
|
"""
|
|
:param gotten_hash: The hash of the (possibly malicious) archive we
|
|
just downloaded
|
|
"""
|
|
self.gotten_hash = gotten_hash
|
|
|
|
def body(self):
|
|
from pip.utils.hashes import FAVORITE_HASH # Dodge circular import.
|
|
|
|
package = None
|
|
if self.req:
|
|
# In the case of URL-based requirements, display the original URL
|
|
# seen in the requirements file rather than the package name,
|
|
# so the output can be directly copied into the requirements file.
|
|
package = (self.req.original_link if self.req.original_link
|
|
# In case someone feeds something downright stupid
|
|
# to InstallRequirement's constructor.
|
|
else getattr(self.req, 'req', None))
|
|
return ' %s --hash=%s:%s' % (package or 'unknown package',
|
|
FAVORITE_HASH,
|
|
self.gotten_hash)
|
|
|
|
|
|
class HashUnpinned(HashError):
|
|
"""A requirement had a hash specified but was not pinned to a specific
|
|
version."""
|
|
|
|
order = 3
|
|
head = ('In --require-hashes mode, all requirements must have their '
|
|
'versions pinned with ==. These do not:')
|
|
|
|
|
|
class HashMismatch(HashError):
|
|
"""
|
|
Distribution file hash values don't match.
|
|
|
|
:ivar package_name: The name of the package that triggered the hash
|
|
mismatch. Feel free to write to this after the exception is raise to
|
|
improve its error message.
|
|
|
|
"""
|
|
order = 4
|
|
head = ('THESE PACKAGES DO NOT MATCH THE HASHES FROM THE REQUIREMENTS '
|
|
'FILE. If you have updated the package versions, please update '
|
|
'the hashes. Otherwise, examine the package contents carefully; '
|
|
'someone may have tampered with them.')
|
|
|
|
def __init__(self, allowed, gots):
|
|
"""
|
|
:param allowed: A dict of algorithm names pointing to lists of allowed
|
|
hex digests
|
|
:param gots: A dict of algorithm names pointing to hashes we
|
|
actually got from the files under suspicion
|
|
"""
|
|
self.allowed = allowed
|
|
self.gots = gots
|
|
|
|
def body(self):
|
|
return ' %s:\n%s' % (self._requirement_name(),
|
|
self._hash_comparison())
|
|
|
|
def _hash_comparison(self):
|
|
"""
|
|
Return a comparison of actual and expected hash values.
|
|
|
|
Example::
|
|
|
|
Expected sha256 abcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcde
|
|
or 123451234512345123451234512345123451234512345
|
|
Got bcdefbcdefbcdefbcdefbcdefbcdefbcdefbcdefbcdef
|
|
|
|
"""
|
|
def hash_then_or(hash_name):
|
|
# For now, all the decent hashes have 6-char names, so we can get
|
|
# away with hard-coding space literals.
|
|
return chain([hash_name], repeat(' or'))
|
|
|
|
lines = []
|
|
for hash_name, expecteds in iteritems(self.allowed):
|
|
prefix = hash_then_or(hash_name)
|
|
lines.extend((' Expected %s %s' % (next(prefix), e))
|
|
for e in expecteds)
|
|
lines.append(' Got %s\n' %
|
|
self.gots[hash_name].hexdigest())
|
|
prefix = ' or'
|
|
return '\n'.join(lines)
|