Remove unused print statement

This commit is contained in:
surbhi 2019-05-31 19:47:03 +05:30
parent 2c666dddc7
commit 3549330dce
No known key found for this signature in database
GPG Key ID: 88928762974D3618
33 changed files with 34 additions and 29 deletions

BIN
src/alice.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 669 B

View File

@ -5,6 +5,7 @@ import queues
from semaphores import kivyuisignaler
from helper_sql import SqlBulkExecute, sqlExecute, sqlQuery, sqlStoredProcedure
class UIkivySignaler(Thread):
def run(self):
@ -12,7 +13,6 @@ class UIkivySignaler(Thread):
while state.shutdown == 0:
try:
command, data = queues.UISignalQueue.get()
print("ssssssseeeeeeeeeeeeeeeeeeeeeeeeeewuhatsacomment.................", command)
if command == 'writeNewAddressToTable':
label, address, streamNumber = data
state.kivyapp.variable_1.append(address)
@ -20,4 +20,4 @@ class UIkivySignaler(Thread):
state.kivyapp.obj_1.refreshs()
except Exception as e:
print(e)
print(e)

BIN
src/bob.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 640 B

View File

@ -50,7 +50,6 @@ class singleWorker(StoppableThread):
def __init__(self):
super(singleWorker, self).__init__(name="singleWorker")
proofofwork.init()
print("I am in single worker 52.....................................................")
def stopThread(self):
"""Signal through the queue that the thread should be stopped"""

BIN
src/dave.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 650 B

View File

@ -32,7 +32,6 @@ import helper_startup
import state
helper_startup.loadConfig()
print("333333333333333333333333333333333333333333333333333333333333333333333333333333333")
# Now can be overriden from a config file, which uses standard python
# logging.config.fileConfig interface
# examples are here:

View File

@ -231,7 +231,6 @@ def check_sqlite():
def check_openssl():
print(state.kivy, "state.kivystate.kivystate.kivystate.kivystate.kivystate.kivystate.kivystate.kivy")
"""Do openssl dependency check.
Here we are checking for openssl with its all dependent libraries
@ -250,7 +249,6 @@ def check_openssl():
import os.path
paths.insert(0, os.path.join(sys._MEIPASS, 'libeay32.dll'))
elif state.kivy:
print("kivykivykivykivykivykivykivy...........................")
return True
else:
paths = ['libcrypto.so', 'libcrypto.so.1.0.0']
@ -283,7 +281,6 @@ def check_openssl():
logger.info('Checking OpenSSL at %s', path)
try:
library = ctypes.CDLL(path)
print("I am loading here in depends file................................................................")
except OSError:
continue
logger.info('OpenSSL Name: %s', library._name)

BIN
src/eve.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 651 B

View File

@ -44,7 +44,6 @@ def _loadTrustedPeer():
def loadConfig():
"""Load the config"""
config = BMConfigParser()
print("I am coming in loadConfig now................................................................")
if state.appdata:
config.read(state.appdata + 'keys.dat')

BIN
src/image.svg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 704 B

BIN
src/images/black_cross.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.1 KiB

BIN
src/images/left_arrow.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.4 KiB

BIN
src/images/red.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 56 KiB

BIN
src/images/search_mail.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.9 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.9 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.7 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.6 KiB

BIN
src/images/transparent.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 24 KiB

BIN
src/images/white.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 80 KiB

View File

@ -19,9 +19,7 @@ class BMNetworkThread(StoppableThread):
def run(self):
try:
while not self._stopped and state.shutdown == 0:
print("I am running in run method which calls a loop for BMConnectionPool line19..................................")
BMConnectionPool().loop()
print("I am running in run method which calls a loop for BMConnectionPool line 21..................................")
except Exception as e:
excQueue.put((self.name, e))
raise

View File

@ -24,7 +24,6 @@ def lookupExeFolder():
def lookupAppdataFolder():
print("HIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII", platform)
import traceback
print(traceback.print_tb)
APPNAME = "PyBitmessage"
@ -45,7 +44,6 @@ def lookupAppdataFolder():
elif platform == 'android':
# dataFolder = path.join(os.path.dirname(os.path.abspath("__file__")), "PyBitmessage") + '/'
dataFolder = path.join('/sdcard/', 'DCIM/', APPNAME) + '/'
print("YOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO", dataFolder)
elif 'win32' in sys.platform or 'win64' in sys.platform:
dataFolder = path.join(environ['APPDATA'].decode(sys.getfilesystemencoding(), 'ignore'), APPNAME) + path.sep

View File

@ -230,7 +230,6 @@ def buildCPoW():
call(["make", "-C", os.path.join(paths.codePath(), "bitmsghash"), '-f', 'Makefile.bsd'])
else:
# GNU make
print("I am in buildCPoW hurray.......................................", os.path.join(paths.codePath(), "bitmsghash"))
call(["make", "-C", os.path.join(paths.codePath(), "bitmsghash")])
if os.path.exists(os.path.join(paths.codePath(), "bitmsghash", "bitmsghash.so")):
init()
@ -322,12 +321,10 @@ def init():
logger.error("C PoW test fail.", exc_info=True)
bso = None
elif platform == "android":
print(sys.platform)
try:
bso = ctypes.CDLL('libbitmsghash.so')
except Exception as e:
bso = None
print(e)
else:
try:

View File

@ -72,9 +72,7 @@ class _OpenSSL:
"""
Build the wrapper
"""
print("I am on openssl ctypes loading...............................................")
self._lib = ctypes.CDLL(library)
print(library, "library12library12library12library12library12library12library12")
self._version, self._hexversion, self._cflags = get_version(self._lib)
self._libreSSL = self._version.startswith("LibreSSL")
@ -687,7 +685,6 @@ def loadOpenSSL():
libdir.append(find_library('libeay32'))
for library in libdir:
try:
print(library, "librarylibrarylibrarylibrarylibrarylibrarylibrarylibrarylibrarylibrarylibrary")
OpenSSL = _OpenSSL(library)
return
except:

View File

@ -116,30 +116,22 @@ def decodeWalletImportFormat(WIFstring):
def reloadMyAddressHashes():
logger.debug('reloading keys from keys.dat file')
print("SHARED 146 begins.....................................................................")
myECCryptorObjects.clear()
myAddressesByHash.clear()
myAddressesByTag.clear()
# myPrivateKeys.clear()
print("SHARED 152 begins.....................................................................")
keyfileSecure = checkSensitiveFilePermissions(state.appdata + 'keys.dat')
hasEnabledKeys = False
print("SHARED 156 begins.....................................................................")
print(BMConfigParser().addresses())
for addressInKeysFile in BMConfigParser().addresses():
print("SHARED 158 begins.....................................................................")
isEnabled = BMConfigParser().getboolean(addressInKeysFile, 'enabled')
print("SHARED 160 begins.....................................................................")
if isEnabled:
print("SHARED 161 begins.....................................................................")
hasEnabledKeys = True
# status
_, addressVersionNumber, streamNumber, hash = \
decodeAddress(addressInKeysFile)
if addressVersionNumber in (2, 3, 4):
print("SHARED 166 begins.....................................................................")
# Returns a simple 32 bytes of information encoded
# in 64 Hex characters, or null if there was an error.
privEncryptionKey = hexlify(decodeWalletImportFormat(
@ -158,17 +150,14 @@ def reloadMyAddressHashes():
myAddressesByTag[tag] = addressInKeysFile
else:
print("SHARED 185 begins.....................................................................")
logger.error(
'Error in reloadMyAddressHashes: Can\'t handle'
' address versions other than 2, 3, or 4.\n'
)
print("SHARED 187 begins.....................................................................")
if not platform == "android":
if not keyfileSecure:
fixSensitiveFilePermissions(state.appdata + 'keys.dat', hasEnabledKeys)
print("SHARED 196 begins.....................................................................")
def reloadBroadcastSendersForWhichImWatching():

32
src/suravata.py Normal file
View File

@ -0,0 +1,32 @@
#!/usr/bin/env python
# Import the libraries.
import pdb;pdb.set_trace()
import pydenticon100000000000000000000000
import hashlib
# Set-up some test data.
users = ["alice", "bob", "eve", "dave"]
# Set-up a list of foreground colours (taken from Sigil).
foreground = ["rgb(45,79,255)",
"rgb(254,180,44)",
"rgb(226,121,234)",
"rgb(30,179,253)",
"rgb(232,77,65)",
"rgb(49,203,115)",
"rgb(141,69,170)"]
# Set-up a background colour (taken from Sigil).
background = "rgb(224,224,224)"
# Set-up the padding (top, bottom, left, right) in pixels.
padding = (20, 20, 20, 20)
# Instantiate a generator that will create 5x5 block identicons using SHA1
# digest.
generator = pydenticon.Generator(5, 5, digest=hashlib.sha1, foreground=foreground, background=background)
# identicon_ascii = generator.generate("john.doe@example.com", 200, 200,
# output_format="ascii")
# print identicon_ascii
for user in users:
identicon = generator.generate(user, 200, 200, padding=padding, output_format="png")
filename = user + ".png"
with open(filename, "wb") as f:
f.write(identicon)