Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pip_api: initial support for hashed requirements #126

Merged
merged 15 commits into from
Feb 3, 2022
Merged
Show file tree
Hide file tree
Changes from 13 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,14 +72,17 @@ If the command you are trying to use is not compatible, `pip_api` will raise a
> * `Distribution.editable` (`bool`): Whether the distribution is editable or not
> Optionally takes a `local` parameter to filter out globally-installed packages

* `pip_api.parse_requirements(filename, options=None, include_invalid=False)`
> Takes a path to a filename of a Requirements file. Returns a mapping from package name to a [`packaging.requirements.Requirement`](https://packaging.pypa.io/en/latest/requirements/#packaging.requirements.Requirement) object with the following attributes:
* `pip_api.parse_requirements(filename, options=None, include_invalid=False, strict_hashes=False)`
> Takes a path to a filename of a Requirements file. Returns a mapping from package name to a [`packaging.requirements.Requirement`](https://packaging.pypa.io/en/latest/requirements/#packaging.requirements.Requirement) subclass object with the following attributes:
woodruffw marked this conversation as resolved.
Show resolved Hide resolved
> * `Requirement.name` (`string`): The name of the requirement.
> * `Requirement.extras` (`set`): A set of extras that the requirement specifies.
> * `Requirement.specifier` ([`packaging.specifiers.SpecifierSet`](https://packaging.pypa.io/en/latest/specifiers/#packaging.specifiers.SpecifierSet)): A `SpecifierSet` of the version specified by the requirement.
> * `Requirement.marker` ([`packaging.markers.Marker`](https://packaging.pypa.io/en/latest/markers/#packaging.markers.Marker)): A `Marker` of the marker for the requirement. Can be `None`.
> * Additional custom fields: `hashes` for any `--hash=...` options, `filename` and `lineno` for the requirement's parsed location
>
woodruffw marked this conversation as resolved.
Show resolved Hide resolved
> Optionally takes an `options` parameter to override the regex used to skip requirements lines.
> Optionally takes an `include_invalid` parameter to return an `UnparsedRequirement` in the event that a requirement cannot be parsed correctly.
> Optionally takes a `strict_hashes` parameter to require that all requirements have associated hashes.
woodruffw marked this conversation as resolved.
Show resolved Hide resolved

### Available with `pip>=8.0.0`:
* `pip_api.hash(filename, algorithm='sha256')`
Expand Down
6 changes: 5 additions & 1 deletion pip_api/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,8 @@
from pip_api._installed_distributions import installed_distributions

# Import these whenever, doesn't matter
from pip_api._parse_requirements import parse_requirements
from pip_api._parse_requirements import (
Requirement,
UnparsedRequirement,
parse_requirements,
)
54 changes: 49 additions & 5 deletions pip_api/_parse_requirements.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@
import string
import sys

from collections import defaultdict

from typing import Any, Dict, Optional, Union, Tuple

from urllib.parse import urljoin, unquote, urlsplit
Expand All @@ -24,6 +26,7 @@
parser.add_argument("-i", "--index-url")
parser.add_argument("--extra-index-url")
parser.add_argument("-f", "--find-links")
parser.add_argument("--hash", action="append", dest="hashes")

operators = specifiers.Specifier._operators.keys()

Expand All @@ -37,6 +40,8 @@
re.VERBOSE,
)
WINDOWS = sys.platform.startswith("win") or (sys.platform == "cli" and os.name == "nt")
# https://pip.pypa.io/en/stable/cli/pip_hash/
VALID_HASHES = {"sha256", "sha384", "sha512"}


class Link:
Expand Down Expand Up @@ -172,6 +177,15 @@ def _url_to_path(url):
return path


class Requirement(requirements.Requirement):
woodruffw marked this conversation as resolved.
Show resolved Hide resolved
def __init__(self, *args, **kwargs):
self.hashes = kwargs.pop("hashes", None)
self.filename = kwargs.pop("filename")
self.lineno = kwargs.pop("lineno")

super().__init__(*args, **kwargs)


class UnparsedRequirement(object):
def __init__(self, name, msg, filename, lineno):
self.name = name
Expand Down Expand Up @@ -445,8 +459,11 @@ def _parse_requirement_url(req_str):


def parse_requirements(
filename: os.PathLike, options: Optional[Any] = None, include_invalid: bool = False
) -> Dict[str, Union[requirements.Requirement, UnparsedRequirement]]:
filename: os.PathLike,
options: Optional[Any] = None,
include_invalid: bool = False,
strict_hashes: bool = False,
) -> Dict[str, Union[Requirement, UnparsedRequirement]]:
to_parse = {filename}
parsed = set()
name_to_req = {}
Expand All @@ -463,8 +480,20 @@ def parse_requirements(
lines_enum = _skip_regex(lines_enum, options)

for lineno, line in lines_enum:
req: Optional[Union[requirements.Requirement, UnparsedRequirement]] = None
req: Optional[Union[Requirement, UnparsedRequirement]] = None
known, _ = parser.parse_known_args(line.strip().split())

hashes_by_kind = defaultdict(list)
if known.hashes:
for hsh in known.hashes:
kind, hsh = hsh.split(":", 1)
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if it's worth it, but we could also promote any ValueError that happens here (due to a malformed --hash option) into a PipError.

if kind not in VALID_HASHES:
raise PipError(
"Invalid --hash kind %s, expected one of %s"
% (kind, VALID_HASHES)
)
hashes_by_kind[kind].append(hsh)

if known.req:
req_str = str().join(known.req)
try:
Expand All @@ -477,7 +506,12 @@ def parse_requirements(

try: # Try to parse this as a requirement specification
if req is None:
req = requirements.Requirement(parsed_req_str)
req = Requirement(
parsed_req_str,
hashes=dict(hashes_by_kind),
filename=filename,
lineno=lineno,
)
except requirements.InvalidRequirement:
try:
_check_invalid_requirement(req_str)
Expand All @@ -493,7 +527,9 @@ def parse_requirements(
to_parse.add(full_path)
elif known.editable:
name, url = _parse_editable(known.editable)
req = requirements.Requirement("%s @ %s" % (name, url))
req = Requirement(
"%s @ %s" % (name, url), filename=filename, lineno=lineno
)
else:
pass # This is an invalid requirement

Expand All @@ -512,4 +548,12 @@ def parse_requirements(
% (req, name_to_req[req.name], req.name)
)

if strict_hashes:
missing_hashes = [req for req in name_to_req.values() if not req.hashes]
if len(missing_hashes) > 0:
raise PipError(
"Missing hashes for requirement in %s, line %s"
% (missing_hashes[0].filename, missing_hashes[0].lineno)
)

return name_to_req
115 changes: 115 additions & 0 deletions tests/test_parse_requirements.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ def test_parse_requirements(monkeypatch):

assert set(result) == {"foo"}
assert str(result["foo"]) == "foo==1.2.3"
assert result["foo"].hashes == {}


def test_parse_requirements_with_comments(monkeypatch):
Expand Down Expand Up @@ -253,3 +254,117 @@ def test_parse_requirements_with_missing_egg_suffix(monkeypatch):
PipError, match=r"Missing egg fragment in URL: " + PEP508_PIP_EXAMPLE_URL
):
pip_api.parse_requirements("a.txt")


def test_parse_requirements_hashes(monkeypatch):
files = {
"a.txt": [
"foo==1.2.3 "
"--hash=sha256:862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e "
"--hash=sha256:0cfea7e5a53d5a256b4e8609c8a1812ad9af5c611432ec9dccbb4d79dc6a336e "
"--hash=sha384:673546e6c3236a36e5db5f1bc9d2cb5f3f974d3d4e9031f405b1dc7874575e2ad91436d02edf8237a889ab1cecb35d56 "
"--hash=sha512:3b149832490a704091abed6a9bd40ef7f4176b279263d4cbbb440b067ced99cadc006c03bc47488755351022fb49f2f10edfec110f027039bda703d407135c47"
]
}
monkeypatch.setattr(pip_api._parse_requirements, "_read_file", files.get)

result = pip_api.parse_requirements("a.txt")

assert set(result) == {"foo"}
assert result["foo"].hashes == {
"sha256": [
"862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e",
"0cfea7e5a53d5a256b4e8609c8a1812ad9af5c611432ec9dccbb4d79dc6a336e",
],
"sha384": [
"673546e6c3236a36e5db5f1bc9d2cb5f3f974d3d4e9031f405b1dc7874575e2ad91436d02edf8237a889ab1cecb35d56"
],
"sha512": [
"3b149832490a704091abed6a9bd40ef7f4176b279263d4cbbb440b067ced99cadc006c03bc47488755351022fb49f2f10edfec110f027039bda703d407135c47"
],
}


def test_parse_requirements_invalid_hash_kind(monkeypatch):
files = {"a.txt": ["foo==1.2.3 --hash=md5:0d5a28f01dccb5a549c31016883f59c2"]}
monkeypatch.setattr(pip_api._parse_requirements, "_read_file", files.get)

with pytest.raises(PipError, match=r"Invalid --hash kind"):
pip_api.parse_requirements("a.txt")


@pytest.mark.parametrize(
"strict_hashes",
(True, False),
)
def test_parse_requirements_missing_hashes(monkeypatch, strict_hashes):
files = {
"a.txt": [
"foo==1.2.3 --hash=sha256:862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e\n",
"bar==1.2.3\n",
]
}
monkeypatch.setattr(pip_api._parse_requirements, "_read_file", files.get)

if strict_hashes:
with pytest.raises(
PipError, match=r"Missing hashes for requirement in a\.txt, line 2"
):
pip_api.parse_requirements("a.txt", strict_hashes=strict_hashes)
else:
result = pip_api.parse_requirements("a.txt", strict_hashes=strict_hashes)

assert result["foo"].hashes == {
"sha256": [
"862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e"
],
}
assert result["bar"].hashes == {}


@pytest.mark.parametrize(
"strict_hashes",
(True, False),
)
def test_parse_requirements_missing_hashes_late(monkeypatch, strict_hashes):
files = {
"a.txt": [
"foo==1.2.3\n",
"bar==1.2.3\n",
"baz==1.2.3 --hash=sha256:862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e\n",
]
}
monkeypatch.setattr(pip_api._parse_requirements, "_read_file", files.get)

if strict_hashes:
with pytest.raises(
PipError, match=r"Missing hashes for requirement in a\.txt, line 1"
):
pip_api.parse_requirements("a.txt", strict_hashes=strict_hashes)
else:
result = pip_api.parse_requirements("a.txt", strict_hashes=strict_hashes)

assert result["foo"].hashes == {}
assert result["bar"].hashes == {}
assert result["baz"].hashes == {
"sha256": [
"862db587c4257f71293cf07cafc521961712c088a52981f3d81be056eaabc95e"
],
}


def test_parse_requirements_missing_all_hashes_strict(monkeypatch):
files = {
"a.txt": [
"foo==1.2.3\n",
"bar==1.2.3\n",
"baz==1.2.3\n",
]
}

monkeypatch.setattr(pip_api._parse_requirements, "_read_file", files.get)

with pytest.raises(
PipError, match=r"Missing hashes for requirement in a\.txt, line 1"
):
pip_api.parse_requirements("a.txt", strict_hashes=True)