2013-07-30 01:19:04 +08:00
|
|
|
from __future__ import unicode_literals
|
2013-02-13 03:50:47 +08:00
|
|
|
|
2013-02-13 00:58:49 +08:00
|
|
|
import os
|
2013-02-13 03:50:47 +08:00
|
|
|
import sys
|
2015-01-28 20:35:27 +08:00
|
|
|
from subprocess import PIPE, Popen
|
2013-02-13 00:58:49 +08:00
|
|
|
|
2016-05-17 14:52:01 +08:00
|
|
|
from django.apps import apps as installed_apps
|
2013-02-13 03:50:47 +08:00
|
|
|
from django.utils import six
|
2015-04-18 16:09:41 +08:00
|
|
|
from django.utils.crypto import get_random_string
|
2015-01-28 20:35:27 +08:00
|
|
|
from django.utils.encoding import DEFAULT_LOCALE_ENCODING, force_text
|
2013-02-13 03:50:47 +08:00
|
|
|
|
|
|
|
from .base import CommandError
|
2013-03-04 02:58:13 +08:00
|
|
|
|
2013-02-13 00:58:49 +08:00
|
|
|
|
2015-11-05 04:50:16 +08:00
|
|
|
def popen_wrapper(args, os_err_exc_type=CommandError, stdout_encoding='utf-8'):
|
2013-02-13 00:58:49 +08:00
|
|
|
"""
|
|
|
|
Friendly wrapper around Popen.
|
|
|
|
|
|
|
|
Returns stdout output, stderr output and OS status code.
|
|
|
|
"""
|
2013-02-13 03:50:47 +08:00
|
|
|
try:
|
2015-11-05 04:50:16 +08:00
|
|
|
p = Popen(args, shell=False, stdout=PIPE, stderr=PIPE, close_fds=os.name != 'nt')
|
2013-02-13 03:50:47 +08:00
|
|
|
except OSError as e:
|
2015-11-05 04:50:16 +08:00
|
|
|
strerror = force_text(e.strerror, DEFAULT_LOCALE_ENCODING, strings_only=True)
|
2013-02-13 03:50:47 +08:00
|
|
|
six.reraise(os_err_exc_type, os_err_exc_type('Error executing %s: %s' %
|
2014-03-26 07:42:19 +08:00
|
|
|
(args[0], strerror)), sys.exc_info()[2])
|
2013-02-13 00:58:49 +08:00
|
|
|
output, errors = p.communicate()
|
2013-03-04 02:58:13 +08:00
|
|
|
return (
|
2015-11-05 04:50:16 +08:00
|
|
|
force_text(output, stdout_encoding, strings_only=True, errors='strict'),
|
|
|
|
force_text(errors, DEFAULT_LOCALE_ENCODING, strings_only=True, errors='replace'),
|
2013-03-04 02:58:13 +08:00
|
|
|
p.returncode
|
|
|
|
)
|
|
|
|
|
2013-02-27 09:07:22 +08:00
|
|
|
|
2014-11-17 16:24:56 +08:00
|
|
|
def handle_extensions(extensions):
|
2013-02-27 09:07:22 +08:00
|
|
|
"""
|
|
|
|
Organizes multiple extensions that are separated with commas or passed by
|
2014-11-17 16:24:56 +08:00
|
|
|
using --extension/-e multiple times.
|
2013-02-27 09:07:22 +08:00
|
|
|
|
|
|
|
For example: running 'django-admin makemessages -e js,txt -e xhtml -a'
|
|
|
|
would result in an extension list: ['.js', '.txt', '.xhtml']
|
|
|
|
|
|
|
|
>>> handle_extensions(['.html', 'html,js,py,py,py,.py', 'py,.py'])
|
2014-11-17 16:24:56 +08:00
|
|
|
{'.html', '.js', '.py'}
|
2013-02-27 09:07:22 +08:00
|
|
|
>>> handle_extensions(['.html, txt,.tpl'])
|
2014-09-26 20:31:50 +08:00
|
|
|
{'.html', '.tpl', '.txt'}
|
2013-02-27 09:07:22 +08:00
|
|
|
"""
|
|
|
|
ext_list = []
|
|
|
|
for ext in extensions:
|
|
|
|
ext_list.extend(ext.replace(' ', '').split(','))
|
|
|
|
for i, ext in enumerate(ext_list):
|
|
|
|
if not ext.startswith('.'):
|
|
|
|
ext_list[i] = '.%s' % ext_list[i]
|
2014-11-17 16:24:56 +08:00
|
|
|
return set(ext_list)
|
2013-02-13 03:50:47 +08:00
|
|
|
|
2013-11-03 04:12:09 +08:00
|
|
|
|
2013-02-13 03:50:47 +08:00
|
|
|
def find_command(cmd, path=None, pathext=None):
|
|
|
|
if path is None:
|
2014-03-22 23:52:05 +08:00
|
|
|
path = os.environ.get('PATH', '').split(os.pathsep)
|
2013-02-13 03:50:47 +08:00
|
|
|
if isinstance(path, six.string_types):
|
|
|
|
path = [path]
|
|
|
|
# check if there are funny path extensions for executables, e.g. Windows
|
|
|
|
if pathext is None:
|
|
|
|
pathext = os.environ.get('PATHEXT', '.COM;.EXE;.BAT;.CMD').split(os.pathsep)
|
|
|
|
# don't use extensions if the command ends with one of them
|
|
|
|
for ext in pathext:
|
|
|
|
if cmd.endswith(ext):
|
|
|
|
pathext = ['']
|
|
|
|
break
|
|
|
|
# check if we find the command on PATH
|
|
|
|
for p in path:
|
|
|
|
f = os.path.join(p, cmd)
|
|
|
|
if os.path.isfile(f):
|
|
|
|
return f
|
|
|
|
for ext in pathext:
|
|
|
|
fext = f + ext
|
|
|
|
if os.path.isfile(fext):
|
|
|
|
return fext
|
|
|
|
return None
|
2015-04-18 16:09:41 +08:00
|
|
|
|
|
|
|
|
|
|
|
def get_random_secret_key():
|
|
|
|
"""
|
|
|
|
Return a 50 character random string usable as a SECRET_KEY setting value.
|
|
|
|
"""
|
|
|
|
chars = 'abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)'
|
|
|
|
return get_random_string(50, chars)
|
2016-05-17 14:52:01 +08:00
|
|
|
|
|
|
|
|
|
|
|
def parse_apps_and_model_labels(labels):
|
|
|
|
"""
|
|
|
|
Parse a list of "app_label.ModelName" or "app_label" strings into actual
|
|
|
|
objects and return a two-element tuple:
|
|
|
|
(set of model classes, set of app_configs).
|
|
|
|
Raise a CommandError if some specified models or apps don't exist.
|
|
|
|
"""
|
|
|
|
apps = set()
|
|
|
|
models = set()
|
|
|
|
|
|
|
|
for label in labels:
|
|
|
|
if '.' in label:
|
|
|
|
try:
|
|
|
|
model = installed_apps.get_model(label)
|
|
|
|
except LookupError:
|
|
|
|
raise CommandError('Unknown model: %s' % label)
|
|
|
|
models.add(model)
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
app_config = installed_apps.get_app_config(label)
|
|
|
|
except LookupError as e:
|
|
|
|
raise CommandError(str(e))
|
|
|
|
apps.add(app_config)
|
|
|
|
|
|
|
|
return models, apps
|