Current Path: > > opt > cloudlinux > venv > lib > > python3.11 > site-packages > prospector > tools > > dodgy
Operation : Linux host59.registrar-servers.com 4.18.0-513.18.1.lve.2.el8.x86_64 #1 SMP Sat Mar 30 15:36:11 UTC 2024 x86_64 Software : Apache Server IP : 198.54.126.42 | Your IP: 216.73.216.135 Domains : 1034 Domain(s) Permission : [ 0755 ]
Name | Type | Size | Last Modified | Actions |
---|---|---|---|---|
__pycache__ | Directory | - | - | |
__init__.py | File | 1481 bytes | April 17 2025 13:10:59. |
import mimetypes from pathlib import Path from dodgy.checks import check_file_contents from prospector.encoding import CouldNotHandleEncoding, read_py_file from prospector.finder import FileFinder from prospector.message import Location, Message from prospector.tools.base import ToolBase def module_from_path(path: Path): # TODO hacky... return ".".join(path.parts[1:-1] + (path.stem,)) class DodgyTool(ToolBase): def configure(self, prospector_config, found_files): # empty: just implementing to satisfy the ABC contract pass def run(self, found_files: FileFinder): warnings = [] for filepath in found_files.files: mimetype = mimetypes.guess_type(str(filepath.absolute())) if mimetype[0] is None or not mimetype[0].startswith("text/") or mimetype[1] is not None: continue try: contents = read_py_file(filepath) except CouldNotHandleEncoding: continue for line, code, message in check_file_contents(contents): warnings.append({"line": line, "code": code, "message": message, "path": filepath}) messages = [] for warning in warnings: path = warning["path"] loc = Location(path, module_from_path(path), "", warning["line"], 0) msg = Message("dodgy", warning["code"], loc, warning["message"]) messages.append(msg) return messages
SILENT KILLER Tool